Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Make Heterophilic Graphs Better Fit GNN: A Graph Rewiring Approach
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 12Pages 8744–8757https://doi.org/10.1109/TKDE.2024.3441766Graph Neural Networks (GNNs) have shown superior performance in modeling graph data. Existing studies have shown that a lot of GNNs perform well on homophilic graphs while performing poorly on heterophilic graphs. Recently, researchers have turned their ...
- research-articleNovember 2024
Deoxys: A Causal Inference Engine for Unhealthy Node Mitigation in Large-scale Cloud Infrastructure
- Chaoyun Zhang,
- Randolph Yao,
- Si Qin,
- Ze Li,
- Shekhar Agrawal,
- Binit R. Mishra,
- Tri Tran,
- Minghua Ma,
- Qingwei Lin,
- Murali Chintalapati,
- Dongmei Zhang
SoCC '24: Proceedings of the 2024 ACM Symposium on Cloud ComputingPages 361–379https://doi.org/10.1145/3698038.3698534The presence of unhealthy nodes in cloud infrastructure signals the potential failure of machines, which can significantly impact the availability and reliability of cloud services, resulting in negative customer experiences. Effectively addressing ...
- research-articleNovember 2024
An adaptive spatial–temporal prediction model for landslide displacement based on decomposition architecture
Engineering Applications of Artificial Intelligence (EAAI), Volume 137, Issue PBhttps://doi.org/10.1016/j.engappai.2024.109215AbstractLandslide displacement forecasting is a core issue in geohazard research, it is particularly challenging for accumulation-type landslides with complex geological patterns. Traditional landslide displacement prediction methods use single-point ...
- research-articleOctober 2024
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 9875–9884https://doi.org/10.1145/3664647.3681691Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model owners and end-users to determine if a ...
- research-articleOctober 2024
IconDM: Text-Guided Icon Set Expansion Using Diffusion Models
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 156–165https://doi.org/10.1145/3664647.3681057Icons are ubiquitous visual elements in graphic design, yet their creation is often complex and time-consuming. To resolve this problem, we draw inspiration from the booming text-to-image field and propose Text-Guided Icon Set Expansion, a novel task ...
-
- research-articleOctober 2024
COIN: Chance-Constrained Imitation Learning for Safe and Adaptive Resource Oversubscription under Uncertainty
- Lu Wang,
- Mayukh Das,
- Fangkai Yang,
- Chao Du,
- Bo Qiao,
- Hang Dong,
- Chetan Bansal,
- Si Qin,
- Saravan Rajmohan,
- Qingwei Lin,
- Dongmei Zhang,
- Qi Zhang
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 4939–4947https://doi.org/10.1145/3627673.3680060We address the real problem of safe, robust, adaptive resource oversubscription in uncertain environments with our proposed novel technique of chance-constrained imitation learning. Our objective is to enhance resource efficiency while ensuring safety ...
- research-articleAugust 2024
Scalable Differentiable Causal Discovery in the Presence of Latent Confounders with Skeleton Posterior
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 2141–2152https://doi.org/10.1145/3637528.3672031Differentiable causal discovery has made significant advancements in the learning of directed acyclic graphs. However, its application to real-world datasets remains restricted due to the ubiquity of latent confounders and the requirement to learn ...
- research-articleAugust 2024
Pre-trained KPI Anomaly Detection Model Through Disentangled Transformer
- Zhaoyang Yu,
- Changhua Pei,
- Xin Wang,
- Minghua Ma,
- Chetan Bansal,
- Saravan Rajmohan,
- Qingwei Lin,
- Dongmei Zhang,
- Xidao Wen,
- Jianhui Li,
- Gaogang Xie,
- Dan Pei
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 6190–6201https://doi.org/10.1145/3637528.3671522In large-scale online service systems, numerous Key Performance Indicators (KPIs), such as service response time and error rate, are gathered in a time-series format. KPI Anomaly Detection (KAD) is a critical data mining problem due to its widespread ...
- research-articleJuly 2024
MonitorAssistant: Simplifying Cloud Service Monitoring via Large Language Models
- Zhaoyang Yu,
- Minghua Ma,
- Chaoyun Zhang,
- Si Qin,
- Yu Kang,
- Chetan Bansal,
- Saravan Rajmohan,
- Yingnong Dang,
- Changhua Pei,
- Dan Pei,
- Qingwei Lin,
- Dongmei Zhang
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 38–49https://doi.org/10.1145/3663529.3663826In large-scale cloud service systems, monitoring metric data and conducting anomaly detection is an important way to maintain reliability and stability. However, great disparity exists between academic approaches and industrial practice to anomaly ...
- research-articleMay 2024
Table-GPT: Table Fine-tuned GPT for Diverse Table Tasks
- Peng Li,
- Yeye He,
- Dror Yashar,
- Weiwei Cui,
- Song Ge,
- Haidong Zhang,
- Danielle Rifinski Fainman,
- Dongmei Zhang,
- Surajit Chaudhuri
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 3Article No.: 176, Pages 1–28https://doi.org/10.1145/3654979Language models, such as GPT-3 and ChatGPT, demonstrate remarkable abilities to follow diverse human instructions and perform a wide range of tasks, using instruction fine-tuning. However, when we test language models with a range of basic table-...
- research-articleMay 2024
Auto-Formula: Recommend Formulas in Spreadsheets using Contrastive Learning for Table Representations
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 3Article No.: 122, Pages 1–27https://doi.org/10.1145/3654925Spreadsheets are widely recognized as the most popular end-user programming tools, which blend the power of formula-based computation, with an intuitive table-based interface. Today, spreadsheets are used by billions of users to manipulate tables, most ...
- research-articleMay 2024
SOIL: Score Conditioned Diffusion Model for Imbalanced Cloud Failure Prediction
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 65–72https://doi.org/10.1145/3589335.3648303Cloud failure prediction (e.g., disk failure prediction, memory failure prediction, node failure prediction, etc.) is a crucial task for ensuring the reliability and performance of cloud systems.However, the problem of class imbalance poses a huge ...
- research-articleMay 2024
Revisiting VAE for Unsupervised Time Series Anomaly Detection: A Frequency Perspective
- Zexin Wang,
- Changhua Pei,
- Minghua Ma,
- Xin Wang,
- Zhihan Li,
- Dan Pei,
- Saravan Rajmohan,
- Dongmei Zhang,
- Qingwei Lin,
- Haiming Zhang,
- Jianhui Li,
- Gaogang Xie
WWW '24: Proceedings of the ACM Web Conference 2024Pages 3096–3105https://doi.org/10.1145/3589334.3645710Time series Anomaly Detection (AD) plays a crucial role for web systems. Various web systems rely on time series data to monitor and identify anomalies in real time, as well as to initiate diagnosis and remediation procedures. Variational Autoencoders (...
- research-articleApril 2024
Automatic Root Cause Analysis via Large Language Models for Cloud Incidents
- Yinfang Chen,
- Huaibing Xie,
- Minghua Ma,
- Yu Kang,
- Xin Gao,
- Liu Shi,
- Yunjie Cao,
- Xuedong Gao,
- Hao Fan,
- Ming Wen,
- Jun Zeng,
- Supriyo Ghosh,
- Xuchao Zhang,
- Chaoyun Zhang,
- Qingwei Lin,
- Saravan Rajmohan,
- Dongmei Zhang,
- Tianyin Xu
EuroSys '24: Proceedings of the Nineteenth European Conference on Computer SystemsPages 674–688https://doi.org/10.1145/3627703.3629553Ensuring the reliability and availability of cloud services necessitates efficient root cause analysis (RCA) for cloud incidents. Traditional RCA methods, which rely on manual investigations of data sources such as logs and traces, are often laborious, ...
- research-articleApril 2024
Xpert: Empowering Incident Management with Query Recommendations via Large Language Models
- Yuxuan Jiang,
- Chaoyun Zhang,
- Shilin He,
- Zhihao Yang,
- Minghua Ma,
- Si Qin,
- Yu Kang,
- Yingnong Dang,
- Saravan Rajmohan,
- Qingwei Lin,
- Dongmei Zhang
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 92, Pages 1–13https://doi.org/10.1145/3597503.3639081Large-scale cloud systems play a pivotal role in modern IT infrastructure. However, incidents occurring within these systems can lead to service disruptions and adversely affect user experience. To swiftly resolve such incidents, on-call engineers depend ...
- research-articleMarch 2024
Source Free Graph Unsupervised Domain Adaptation
WSDM '24: Proceedings of the 17th ACM International Conference on Web Search and Data MiningPages 520–528https://doi.org/10.1145/3616855.3635802Graph Neural Networks (GNNs) have achieved great success on a variety of tasks with graph-structural data, among which node classification is an essential one. Unsupervised Graph Domain Adaptation (UGDA) shows its practical value of reducing the labeling ...
- research-articleMarch 2024
Table Meets LLM: Can Large Language Models Understand Structured Table Data? A Benchmark and Empirical Study
WSDM '24: Proceedings of the 17th ACM International Conference on Web Search and Data MiningPages 645–654https://doi.org/10.1145/3616855.3635752Large language models (LLMs) are becoming attractive as few-shot reasoners to solve Natural Language (NL)-related tasks. However, there is still much to learn about how well LLMs understand structured data, such as tables. Although tables can be used as ...
- research-articleMarch 2024
Prediction of production indicators of fractured-vuggy reservoirs based on improved Graph Attention Network
Engineering Applications of Artificial Intelligence (EAAI), Volume 129, Issue Chttps://doi.org/10.1016/j.engappai.2023.107540AbstractVarious storage and seepage spaces exist in fractured-vuggy carbonate reservoirs composed of multi-scale dissolution pores and fractures. The frequent regulation of the working system causes nonlinear and unstable production data along with ...
- research-articleFebruary 2024
Text-to-image generation for abstract concepts
AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 374, Pages 3360–3368https://doi.org/10.1609/aaai.v38i4.28122Recent years have witnessed the substantial progress of large-scale models across various domains, such as natural language processing and computer vision, facilitating the expression of concrete concepts. Unlike concrete concepts that are usually ...