Search Results for author: Yuxin Su

Found 16 papers, 11 papers with code

Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs

1 code implementation31 Mar 2024 Shiwen Shan, Yintong Huo, Yuxin Su, Yichen Li, Dan Li, Zibin Zheng

Based on the insights gained from the preliminary study, we propose an LLM-based two-stage strategy for end-users to localize the root-cause configuration properties based on logs.

Can Language Models Pretend Solvers? Logic Code Simulation with LLMs

no code implementations24 Mar 2024 Minyu Chen, Guoqiang Li, Ling-I Wu, Ruibang Liu, Yuxin Su, Xi Chang, Jianxin Xue

This study delves into a novel aspect, namely logic code simulation, which forces LLMs to emulate logical solvers in predicting the results of logical programs.

Practical Anomaly Detection over Multivariate Monitoring Metrics for Online Services

no code implementations19 Aug 2023 Jinyang Liu, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Cong Feng, Zengyin Yang, Michael R. Lyu

As modern software systems continue to grow in terms of complexity and volume, anomaly detection on multivariate monitoring metrics, which profile systems' health status, becomes more and more critical and challenging.

Anomaly Detection

Improving the Transferability of Adversarial Samples by Path-Augmented Method

1 code implementation CVPR 2023 Jianping Zhang, Jen-tse Huang, Wenxuan Wang, Yichen Li, Weibin Wu, Xiaosen Wang, Yuxin Su, Michael R. Lyu

However, such methods selected the image augmentation path heuristically and may augment images that are semantics-inconsistent with the target images, which harms the transferability of the generated adversarial samples.

Image Augmentation

Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention

2 code implementations14 Feb 2023 Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, Yongqiang Yang, Michael R. Lyu

Our study demonstrates that logs and metrics can manifest system anomalies collaboratively and complementarily, and neither of them only is sufficient.

Anomaly Detection

eBPF-based Working Set Size Estimation in Memory Management

no code implementations17 Jan 2023 Zhilu Lian, Yangzi Li, Zhixiang Chen, Shiwen Shan, Baoxin Han, Yuxin Su

Working set size estimation (WSS) is of great significance to improve the efficiency of program executing and memory arrangement in modern operating systems.

Management

Learning Concordant Attention via Target-aware Alignment for Visible-Infrared Person Re-identification

no code implementations ICCV 2023 Jianbing Wu, Hong Liu, Yuxin Su, Wei Shi, Hao Tang

Owing to the large distribution gap between the heterogeneous data in Visible-Infrared Person Re-identification (VI Re-ID), we point out that existing paradigms often suffer from the inter-modal semantic misalignment issue and thus fail to align and compare local details properly.

Cross-Modal Retrieval Person Re-Identification +1

AEON: A Method for Automatic Evaluation of NLP Test Cases

1 code implementation13 May 2022 Jen-tse Huang, Jianping Zhang, Wenxuan Wang, Pinjia He, Yuxin Su, Michael R. Lyu

However, in practice, many of the generated test cases fail to preserve similar semantic meaning and are unnatural (e. g., grammar errors), which leads to a high false alarm rate and unnatural test cases.

Semantic Similarity Semantic Textual Similarity +1

Graph-based Incident Aggregation for Large-Scale Online Service Systems

1 code implementation27 Aug 2021 Zhuangbin Chen, Jinyang Liu, Yuxin Su, Hongyu Zhang, Xuemin Wen, Xiao Ling, Yongqiang Yang, Michael R. Lyu

The proposed framework is evaluated with real-world incident data collected from a large-scale online service system of Huawei Cloud.

Graph Representation Learning Management

Experience Report: Deep Learning-based System Log Analysis for Anomaly Detection

1 code implementation13 Jul 2021 Zhuangbin Chen, Jinyang Liu, Wenwei Gu, Yuxin Su, Michael R. Lyu

To better understand the characteristics of different anomaly detectors, in this paper, we provide a comprehensive review and evaluation of five popular neural networks used by six state-of-the-art methods.

Anomaly Detection

Improving the Transferability of Adversarial Samples With Adversarial Transformations

1 code implementation CVPR 2021 Weibin Wu, Yuxin Su, Michael R. Lyu, Irwin King

Although deep neural networks (DNNs) have achieved tremendous performance in diverse vision challenges, they are surprisingly susceptible to adversarial examples, which are born of intentionally perturbing benign samples in a human-imperceptible fashion.

DeepObfuscation: Securing the Structure of Convolutional Neural Networks via Knowledge Distillation

no code implementations27 Jun 2018 Hui Xu, Yuxin Su, Zirui Zhao, Yangfan Zhou, Michael R. Lyu, Irwin King

Our obfuscation approach is very effective to protect the critical structure of a deep learning model from being exposed to attackers.

Cryptography and Security

Learning to Rank Using Localized Geometric Mean Metrics

1 code implementation22 May 2017 Yuxin Su, Irwin King, Michael Lyu

First, we design a concept called \textit{ideal candidate document} to introduce metric learning algorithm to query-independent model.

Computational Efficiency Learning-To-Rank +1

Cannot find the paper you are looking for? You can Submit a new open access paper.