Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–26 of 26 results for author: Pei, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.13195  [pdf, other

    cs.AR cs.LG

    NAS-Cap: Deep-Learning Driven 3-D Capacitance Extraction with Neural Architecture Search and Data Augmentation

    Authors: Haoyuan Li, Dingcheng Yang, Chunyan Pei, Wenjian Yu

    Abstract: More accurate capacitance extraction is demanded for designing integrated circuits under advanced process technology. The pattern matching approach and the field solver for capacitance extraction have the drawbacks of inaccuracy and large computational cost, respectively. Recent work \cite{yang2023cnn} proposes a grid-based data representation and a convolutional neural network (CNN) based capacit… ▽ More

    Submitted 23 August, 2024; originally announced August 2024.

  2. arXiv:2408.04238  [pdf, other

    cs.OS

    Crash Consistency in DRAM-NVM-Disk Hybrid Storage System

    Authors: Guoyu Wang, Xilong Che, Haoyang Wei, Chenju Pei, Juncheng Hu

    Abstract: NVM is used as a new hierarchy in the storage system, due to its intermediate speed and capacity between DRAM, and its byte granularity. However, consistency problems emerge when we attempt to put DRAM, NVM, and disk together as an efficient whole. In this paper, we discuss the challenging consistency problems faced by heterogeneous storage systems, and propose our solution to the problems. The di… ▽ More

    Submitted 8 August, 2024; originally announced August 2024.

  3. arXiv:2407.20906  [pdf, other

    cs.CL cs.AI physics.data-an

    Automated Review Generation Method Based on Large Language Models

    Authors: Shican Wu, Xiao Ma, Dehui Luo, Lulu Li, Xiangcheng Shi, Xin Chang, Xiaoyun Lin, Ran Luo, Chunlei Pei, Zhi-Jian Zhao, Jinlong Gong

    Abstract: Literature research, vital for scientific advancement, is overwhelmed by the vast ocean of available information. Addressing this, we propose an automated review generation method based on Large Language Models (LLMs) to streamline literature processing and reduce cognitive load. In case study on propane dehydrogenation (PDH) catalysts, our method swiftly generated comprehensive reviews from 343 a… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

    Comments: 16 pages, 3 figures, 3 tables

  4. arXiv:2402.10802  [pdf, other

    cs.LG

    TimeSeriesBench: An Industrial-Grade Benchmark for Time Series Anomaly Detection Models

    Authors: Haotian Si, Jianhui Li, Changhua Pei, Hang Cui, Jingwen Yang, Yongqian Sun, Shenglin Zhang, Jingjing Li, Haiming Zhang, Jing Han, Dan Pei, Gaogang Xie

    Abstract: Time series anomaly detection (TSAD) has gained significant attention due to its real-world applications to improve the stability of modern software systems. However, there is no effective way to verify whether they can meet the requirements for real-world deployment. Firstly, current algorithms typically train a specific model for each time series. Maintaining such many models is impractical in a… ▽ More

    Submitted 2 September, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

    Comments: Accepted by ISSRE'24

  5. arXiv:2402.02820  [pdf, other

    cs.LG

    Revisiting VAE for Unsupervised Time Series Anomaly Detection: A Frequency Perspective

    Authors: Zexin Wang, Changhua Pei, Minghua Ma, Xin Wang, Zhihan Li, Dan Pei, Saravan Rajmohan, Dongmei Zhang, Qingwei Lin, Haiming Zhang, Jianhui Li, Gaogang Xie

    Abstract: Time series Anomaly Detection (AD) plays a crucial role for web systems. Various web systems rely on time series data to monitor and identify anomalies in real time, as well as to initiate diagnosis and remediation procedures. Variational Autoencoders (VAEs) have gained popularity in recent decades due to their superior de-noising capabilities, which are useful for anomaly detection. However, our… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: WWW 2024

  6. arXiv:2401.02508  [pdf, other

    cs.LG

    Towards an Adaptable and Generalizable Optimization Engine in Decision and Control: A Meta Reinforcement Learning Approach

    Authors: Sungwook Yang, Chaoying Pei, Ran Dai, Chuangchuang Sun

    Abstract: Sampling-based model predictive control (MPC) has found significant success in optimal control problems with non-smooth system dynamics and cost function. Many machine learning-based works proposed to improve MPC by a) learning or fine-tuning the dynamics/ cost function, or b) learning to optimize for the update of the MPC controllers. For the latter, imitation learning-based optimizers are traine… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: 3 pages

  7. arXiv:2310.07637  [pdf, other

    cs.AI cs.NI

    OpsEval: A Comprehensive IT Operations Benchmark Suite for Large Language Models

    Authors: Yuhe Liu, Changhua Pei, Longlong Xu, Bohan Chen, Mingze Sun, Zhirui Zhang, Yongqian Sun, Shenglin Zhang, Kun Wang, Haiming Zhang, Jianhui Li, Gaogang Xie, Xidao Wen, Xiaohui Nie, Minghua Ma, Dan Pei

    Abstract: Information Technology (IT) Operations (Ops), particularly Artificial Intelligence for IT Operations (AIOps), is the guarantee for maintaining the orderly and stable operation of existing information systems. According to Gartner's prediction, the use of AI technology for automated IT operations has become a new trend. Large language models (LLMs) that have exhibited remarkable capabilities in NLP… ▽ More

    Submitted 23 August, 2024; v1 submitted 11 October, 2023; originally announced October 2023.

  8. arXiv:2310.04992  [pdf, other

    eess.IV cs.CV

    VisionFM: a Multi-Modal Multi-Task Vision Foundation Model for Generalist Ophthalmic Artificial Intelligence

    Authors: Jianing Qiu, Jian Wu, Hao Wei, Peilun Shi, Minqing Zhang, Yunyun Sun, Lin Li, Hanruo Liu, Hongyi Liu, Simeng Hou, Yuyang Zhao, Xuehui Shi, Junfang Xian, Xiaoxia Qu, Sirui Zhu, Lijie Pan, Xiaoniao Chen, Xiaojia Zhang, Shuai Jiang, Kebing Wang, Chenlong Yang, Mingqiang Chen, Sujie Fan, Jianhua Hu, Aiguo Lv , et al. (17 additional authors not shown)

    Abstract: We present VisionFM, a foundation model pre-trained with 3.4 million ophthalmic images from 560,457 individuals, covering a broad range of ophthalmic diseases, modalities, imaging devices, and demography. After pre-training, VisionFM provides a foundation to foster multiple ophthalmic artificial intelligence (AI) applications, such as disease screening and diagnosis, disease prognosis, subclassifi… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

  9. arXiv:2308.08915  [pdf, other

    cs.LG cs.AI

    Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection

    Authors: Haotian Si, Changhua Pei, Zhihan Li, Yadong Zhao, Jingjing Li, Haiming Zhang, Zulong Diao, Jianhui Li, Gaogang Xie, Dan Pei

    Abstract: Massive key performance indicators (KPIs) are monitored as multivariate time series data (MTS) to ensure the reliability of the software applications and service system. Accurately detecting the abnormality of MTS is very critical for subsequent fault elimination. The scarcity of anomalies and manual labeling has led to the development of various self-supervised MTS anomaly detection (AD) methods,… ▽ More

    Submitted 25 August, 2023; v1 submitted 17 August, 2023; originally announced August 2023.

    Comments: 11 pages, ESEC/FSE industry track 2023

  10. arXiv:2303.05745  [pdf, other

    eess.IV cs.CV

    Multi-site, Multi-domain Airway Tree Modeling (ATM'22): A Public Benchmark for Pulmonary Airway Segmentation

    Authors: Minghui Zhang, Yangqian Wu, Hanxiao Zhang, Yulei Qin, Hao Zheng, Wen Tang, Corey Arnold, Chenhao Pei, Pengxin Yu, Yang Nan, Guang Yang, Simon Walsh, Dominic C. Marshall, Matthieu Komorowski, Puyang Wang, Dazhou Guo, Dakai Jin, Ya'nan Wu, Shuiqing Zhao, Runsheng Chang, Boyu Zhang, Xing Lv, Abdul Qayyum, Moona Mazher, Qi Su , et al. (11 additional authors not shown)

    Abstract: Open international challenges are becoming the de facto standard for assessing computer vision and image analysis algorithms. In recent years, new methods have extended the reach of pulmonary airway segmentation that is closer to the limit of image resolution. Since EXACT'09 pulmonary airway segmentation, limited effort has been directed to quantitative comparison of newly emerged algorithms drive… ▽ More

    Submitted 27 June, 2023; v1 submitted 10 March, 2023; originally announced March 2023.

    Comments: 32 pages, 16 figures. Homepage: https://atm22.grand-challenge.org/. Submitted

  11. arXiv:2209.12212  [pdf, other

    cs.IR cs.LG

    Efficient Long Sequential User Data Modeling for Click-Through Rate Prediction

    Authors: Qiwei Chen, Yue Xu, Changhua Pei, Shanshan Lv, Tao Zhuang, Junfeng Ge

    Abstract: Recent studies on Click-Through Rate (CTR) prediction has reached new levels by modeling longer user behavior sequences. Among others, the two-stage methods stand out as the state-of-the-art (SOTA) solution for industrial applications. The two-stage methods first train a retrieval model to truncate the long behavior sequence beforehand and then use the truncated sequences to train a CTR model. How… ▽ More

    Submitted 25 September, 2022; originally announced September 2022.

    Journal ref: DLP-KDD 2022

  12. arXiv:2206.06003  [pdf, other

    cs.IR

    Deconfounding Duration Bias in Watch-time Prediction for Video Recommendation

    Authors: Ruohan Zhan, Changhua Pei, Qiang Su, Jianfeng Wen, Xueliang Wang, Guanyu Mu, Dong Zheng, Peng Jiang

    Abstract: Watch-time prediction remains to be a key factor in reinforcing user engagement via video recommendations. It has become increasingly important given the ever-growing popularity of online videos. However, prediction of watch time not only depends on the match between the user and the video but is often mislead by the duration of the video itself. With the goal of improving watch time, recommendati… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

    Comments: 10 pages

  13. arXiv:2108.04468  [pdf, other

    cs.IR cs.AI

    End-to-End User Behavior Retrieval in Click-Through RatePrediction Model

    Authors: Qiwei Chen, Changhua Pei, Shanshan Lv, Chao Li, Junfeng Ge, Wenwu Ou

    Abstract: Click-Through Rate (CTR) prediction is one of the core tasks in recommender systems (RS). It predicts a personalized click probability for each user-item pair. Recently, researchers have found that the performance of CTR model can be improved greatly by taking user behavior sequence into consideration, especially long-term user behavior sequence. The report on an e-commerce website shows that 23\%… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

    Comments: 10 pages

  14. Variation Control and Evaluation for Generative SlateRecommendations

    Authors: Shuchang Liu, Fei Sun, Yingqiang Ge, Changhua Pei, Yongfeng Zhang

    Abstract: Slate recommendation generates a list of items as a whole instead of ranking each item individually, so as to better model the intra-list positional biases and item relations. In order to deal with the enormous combinatorial space of slates, recent work considers a generative solution so that a slate distribution can be directly modeled. However, we observe that such approaches -- despite their pr… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

    Comments: 12 pages, 8 figures, to be published in WWW 2021

  15. Towards Long-term Fairness in Recommendation

    Authors: Yingqiang Ge, Shuchang Liu, Ruoyuan Gao, Yikun Xian, Yunqi Li, Xiangyu Zhao, Changhua Pei, Fei Sun, Junfeng Ge, Wenwu Ou, Yongfeng Zhang

    Abstract: As Recommender Systems (RS) influence more and more people in their daily life, the issue of fairness in recommendation is becoming more and more important. Most of the prior approaches to fairness-aware recommendation have been situated in a static or one-shot setting, where the protected groups of items are fixed, and the model provides a one-time fairness solution based on fairness-constrained… ▽ More

    Submitted 10 January, 2021; originally announced January 2021.

  16. arXiv:2010.15647  [pdf, other

    eess.IV cs.CV

    Brain Tumor Segmentation Network Using Attention-based Fusion and Spatial Relationship Constraint

    Authors: Chenyu Liu, Wangbin Ding, Lei Li, Zhen Zhang, Chenhao Pei, Liqin Huang, Xiahai Zhuang

    Abstract: Delineating the brain tumor from magnetic resonance (MR) images is critical for the treatment of gliomas. However, automatic delineation is challenging due to the complex appearance and ambiguous outlines of tumors. Considering that multi-modal MR images can reflect different tumor biological properties, we develop a novel multi-modal tumor segmentation network (MMTSN) to robustly segment brain tu… ▽ More

    Submitted 31 October, 2020; v1 submitted 29 October, 2020; originally announced October 2020.

  17. arXiv:2008.05780  [pdf, other

    eess.IV cs.CV

    Multi-Modality Pathology Segmentation Framework: Application to Cardiac Magnetic Resonance Images

    Authors: Zhen Zhang, Chenyu Liu, Wangbin Ding, Sihan Wang, Chenhao Pei, Mingjing Yang, Liqin Huang

    Abstract: Multi-sequence of cardiac magnetic resonance (CMR) images can provide complementary information for myocardial pathology (scar and edema). However, it is still challenging to fuse these underlying information for pathology segmentation effectively. This work presents an automatic cascade pathology segmentation framework based on multi-modality CMR images. It mainly consists of two neural networks:… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: 12 pages,MyoPS 2020

  18. Understanding Echo Chambers in E-commerce Recommender Systems

    Authors: Yingqiang Ge, Shuya Zhao, Honglu Zhou, Changhua Pei, Fei Sun, Wenwu Ou, Yongfeng Zhang

    Abstract: Personalized recommendation benefits users in accessing contents of interests effectively. Current research on recommender systems mostly focuses on matching users with proper items based on user interests. However, significant efforts are missing to understand how the recommendations influence user preferences and behaviors, e.g., if and how recommendations result in \textit{echo chambers}. Exten… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

  19. arXiv:1907.05171  [pdf, other

    cs.IR cs.LG

    Privileged Features Distillation at Taobao Recommendations

    Authors: Chen Xu, Quan Li, Junfeng Ge, Jinyang Gao, Xiaoyong Yang, Changhua Pei, Fei Sun, Jian Wu, Hanxiao Sun, Wenwu Ou

    Abstract: Features play an important role in the prediction tasks of e-commerce recommendations. To guarantee the consistency of off-line training and on-line serving, we usually utilize the same features that are both available. However, the consistency in turn neglects some discriminative features. For example, when estimating the conversion rate (CVR), i.e., the probability that a user would purchase the… ▽ More

    Submitted 25 February, 2020; v1 submitted 11 July, 2019; originally announced July 2019.

    Comments: 9 pages

  20. arXiv:1904.06813  [pdf, other

    cs.IR cs.AI

    Personalized Re-ranking for Recommendation

    Authors: Changhua Pei, Yi Zhang, Yongfeng Zhang, Fei Sun, Xiao Lin, Hanxiao Sun, Jian Wu, Peng Jiang, Wenwu Ou

    Abstract: Ranking is a core task in recommender systems, which aims at providing an ordered list of items to users. Typically, a ranking function is learned from the labeled dataset to optimize the global performance, which produces a ranking score for each individual item. However, it may be sub-optimal because the scoring function applies to each item individually and does not explicitly consider the mutu… ▽ More

    Submitted 22 July, 2019; v1 submitted 14 April, 2019; originally announced April 2019.

    Comments: 9 pages

  21. arXiv:1904.06690  [pdf, other

    cs.IR cs.LG

    BERT4Rec: Sequential Recommendation with Bidirectional Encoder Representations from Transformer

    Authors: Fei Sun, Jun Liu, Jian Wu, Changhua Pei, Xiao Lin, Wenwu Ou, Peng Jiang

    Abstract: Modeling users' dynamic and evolving preferences from their historical behaviors is challenging and crucial for recommendation systems. Previous methods employ sequential neural networks (e.g., Recurrent Neural Network) to encode users' historical interactions from left to right into hidden representations for making recommendations. Although these methods achieve satisfactory results, they often… ▽ More

    Submitted 21 August, 2019; v1 submitted 14 April, 2019; originally announced April 2019.

    Comments: To appear in CIKM 2019

  22. arXiv:1902.00851  [pdf, other

    cs.IR cs.LG

    Value-aware Recommendation based on Reinforced Profit Maximization in E-commerce Systems

    Authors: Changhua Pei, Xinru Yang, Qing Cui, Xiao Lin, Fei Sun, Peng Jiang, Wenwu Ou, Yongfeng Zhang

    Abstract: Existing recommendation algorithms mostly focus on optimizing traditional recommendation measures, such as the accuracy of rating prediction in terms of RMSE or the quality of top-$k$ recommendation lists in terms of precision, recall, MAP, etc. However, an important expectation for commercial recommendation systems is to improve the final revenue/profit of the system. Traditional recommendation t… ▽ More

    Submitted 3 February, 2019; originally announced February 2019.

    Comments: to appear at the webconf 2019

  23. arXiv:1808.06885  [pdf, other

    cs.CL cs.AI cs.IR

    Multi-Source Pointer Network for Product Title Summarization

    Authors: Fei Sun, Peng Jiang, Hanxiao Sun, Changhua Pei, Wenwu Ou, Xiaobo Wang

    Abstract: In this paper, we study the product title summarization problem in E-commerce applications for display on mobile devices. Comparing with conventional sentence summarization, product title summarization has some extra and essential constraints. For example, factual errors or loss of the key information are intolerable for E-commerce applications. Therefore, we abstract two more constraints for prod… ▽ More

    Submitted 8 October, 2018; v1 submitted 21 August, 2018; originally announced August 2018.

    Comments: 10 pages, To appear in CIKM 2018, fix mistakes in dataset stats

  24. arXiv:1701.02528  [pdf, other

    cs.NI

    Why It Takes So Long to Connect to a WiFi Access Point

    Authors: Changhua Pei, Zhi Wang, Youjian Zhao, Zihan Wang, Yuan Meng, Dan Pei, Yuanquan Peng, Wenliang Tang, Xiaodong Qu

    Abstract: Today's WiFi networks deliver a large fraction of traffic. However, the performance and quality of WiFi networks are still far from satisfactory. Among many popular quality metrics (throughput, latency), the probability of successfully connecting to WiFi APs and the time cost of the WiFi connection set-up process are the two of the most critical metrics that affect WiFi users' experience. To under… ▽ More

    Submitted 8 May, 2017; v1 submitted 10 January, 2017; originally announced January 2017.

    Comments: 11pages, conference

  25. arXiv:1602.01959  [pdf, other

    cs.DC

    Lifetime-Based Memory Management for Distributed Data Processing Systems

    Authors: Lu Lu, Xuanhua Shi, Yongluan Zhou, Xiong Zhang, Hai Jin, Cheng Pei, Ligang He, Yuanzhen Geng

    Abstract: In-memory caching of intermediate data and eager combining of data in shuffle buffers have been shown to be very effective in minimizing the re-computation and I/O cost in distributed data processing systems like Spark and Flink. However, it has also been widely reported that these techniques would create a large amount of long-living data objects in the heap, which may quickly saturate the garbag… ▽ More

    Submitted 22 May, 2016; v1 submitted 5 February, 2016; originally announced February 2016.

  26. arXiv:1102.1408   

    cs.CR

    Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    Authors: Zhenghao Zhang, Shuping Gong, Husheng Li, Changxing Pei

    Abstract: Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communi… ▽ More

    Submitted 7 September, 2011; v1 submitted 7 February, 2011; originally announced February 2011.

    Comments: This paper has been withdrawn by the author due to a crucial sign error in derivation