Search Results for author: Hong Xie

Found 16 papers, 2 papers with code

Federated Contextual Cascading Bandits with Asynchronous Communication and Heterogeneous Users

no code implementations26 Feb 2024 Hantao Yang, Xutong Liu, Zhiyong Wang, Hong Xie, John C. S. Lui, Defu Lian, Enhong Chen

We study the problem of federated contextual combinatorial cascading bandits, where $|\mathcal{U}|$ agents collaborate under the coordination of a central server to provide tailored recommendations to the $|\mathcal{U}|$ corresponding users.

Understanding and Patching Compositional Reasoning in LLMs

no code implementations22 Feb 2024 Zhaoyi Li, Gangwei Jiang, Hong Xie, Linqi Song, Defu Lian, Ying WEI

LLMs have marked a revolutonary shift, yet they falter when faced with compositional reasoning tasks.

Invariant Representation via Decoupling Style and Spurious Features from Images

no code implementations11 Dec 2023 Ruimeng Li, Yuanhao Pu, Zhaoyi Li, Hong Xie, Defu Lian

This paper considers the out-of-distribution (OOD) generalization problem under the setting that both style distribution shift and spurious features exist and domain labels are missing.

Image Generation Representation Learning

Interactive Graph Convolutional Filtering

no code implementations4 Sep 2023 Jin Zhang, Defu Lian, Hong Xie, Yawen Li, Enhong Chen

Furthermore, we employ Bayesian meta-learning methods to effectively address the cold-start problem and derive theoretical regret bounds for our proposed method, ensuring a robust performance guarantee.

Collaborative Filtering Meta-Learning +2

Interactive Log Parsing via Light-weight User Feedback

no code implementations28 Jan 2023 Liming Wang, Hong Xie, Ye Li, Jian Tan, John C. S. Lui

Template mining is one of the foundational tasks to support log analysis, which supports the diagnosis and troubleshooting of large scale Web applications.

Log Parsing

Multiple-Play Stochastic Bandits with Shareable Finite-Capacity Arms

no code implementations17 Jun 2022 Xuchuang Wang, Hong Xie, John C. S. Lui

When the "per-load" reward follows a Gaussian distribution, we prove a sample complexity lower bound of learning the capacity from load-dependent rewards and also a regret lower bound of this new MP-MAB problem.

Multi-Armed Bandits

A New Outlier Removal Strategy Based on Reliability of Correspondence Graph for Fast Point Cloud Registration

1 code implementation16 May 2022 Li Yan, Pengcheng Wei, Hong Xie, Jicheng Dai, Hao Wu, Ming Huang

We use a simple and intuitive method to describe the 6-DOF (degree of freedom) curtailment process in point cloud registration and propose an outlier removal strategy based on the reliability of the correspondence graph.

Point Cloud Registration

LPC-AD: Fast and Accurate Multivariate Time Series Anomaly Detection via Latent Predictive Coding

no code implementations5 May 2022 Zhi Qi, Hong Xie, Ye Li, Jian Tan, Feifei Li, John C. S. Lui

LPC-AD is motivated by the ever-increasing needs for fast and accurate MTS anomaly detection methods to support fast troubleshooting in cloud computing, micro-service systems, etc.

Anomaly Detection Cloud Computing +2

Multi-Player Multi-Armed Bandits with Finite Shareable Resources Arms: Learning Algorithms & Applications

no code implementations28 Apr 2022 Xuchuang Wang, Hong Xie, John C. S. Lui

The reward from a shareable arm is equal to the "per-load" reward multiplied by the minimum between the number of players pulling the arm and the arm's maximal shareable resources.

Edge-computing Multi-Armed Bandits

Does Explicit Prediction Matter in Deep Reinforcement Learning-Based Energy Management?

no code implementations11 Aug 2021 Zhaoming Qin, Huaying Zhang, Yuzhou Zhao, Hong Xie, Junwei Cao

In this work, we implement the standard energy management scheme with prediction using supervised learning and DRL, and the counterpart without prediction using end-to-end DRL.

Decision Making energy management +3

Proposal for a Bell test in cavity optomagnonics

no code implementations11 Mar 2021 Hong Xie, Zhi-Gao Shi, Le-Wei He, Xiang Chen, Chang-Geng Liao, Xiu-Min Lin

Entanglement between magnon mode and one of the two optical modes will be generated by the first pulse, and the state of magnon mode is subsequently mapped into another optical mode via the second pulse.

Quantum Physics

Walking with Perception: Efficient Random Walk Sampling via Common Neighbor Awareness

1 code implementation ‏‏‎ ‎ 2020 Yongkun Li, Zhiyong Wu, Shuai Lin, Hong Xie, Min Lv, Yinlong Xu, John C. S. Lui

Random walk is widely applied to sample large-scale graphs due to its simplicity of implementation and solid theoretical foundations of bias analysis.

Computational Efficiency

Combining Offline Causal Inference and Online Bandit Learning for Data Driven Decision

no code implementations16 Jan 2020 Li Ye, Yishi Lin, Hong Xie, John C. S. Lui

A typical alternative is offline causal inference, which analyzes logged data alone to make decisions.

Causal Inference

Conversational Contextual Bandit: Algorithm and Application

no code implementations4 Jun 2019 Xiaoying Zhang, Hong Xie, Hang Li, John C. S. Lui

Here, a key-term can relate to a subset of arms, for example, a category of articles in news recommendation.

News Recommendation Recommendation Systems

Language Modeling through Long Term Memory Network

no code implementations18 Apr 2019 Anupiya Nugaliyadde, Kok Wai Wong, Ferdous Sohel, Hong Xie

Recurrent Neural Networks (RNN), Long Short-Term Memory Networks (LSTM), and Memory Networks which contain memory are popularly used to learn patterns in sequential data.

Language Modelling

Enhancing Semantic Word Representations by Embedding Deeper Word Relationships

no code implementations22 Jan 2019 Anupiya Nugaliyadde, Kok Wai Wong, Ferdous Sohel, Hong Xie

Furthermore, the use of 3D visual representations has shown to be capable of representing the similarity and association between words.

Natural Language Understanding

Cannot find the paper you are looking for? You can Submit a new open access paper.