Follow
Yuxin Su
Yuxin Su
Associate Professor, Sun Yat-sen University
Verified email at mail.sysu.edu.cn
Title
Cited by
Cited by
Year
A survey on automated log analysis for reliability engineering
S He, P He, Z Chen, T Yang, Y Su, MR Lyu
ACM computing surveys (CSUR) 54 (6), 1-37, 2021
1612021
Boosting the transferability of adversarial samples via attention
W Wu, Y Su, X Chen, S Zhao, I King, MR Lyu, YW Tai
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
1282020
Improving adversarial transferability via neuron attribution-based attacks
J Zhang, W Wu, J Huang, Y Huang, W Wang, Y Su, MR Lyu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
952022
Improving the transferability of adversarial samples with adversarial transformations
W Wu, Y Su, MR Lyu, I King
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
852021
Experience report: Deep learning-based system log analysis for anomaly detection
Z Chen, J Liu, W Gu, Y Su, MR Lyu
arXiv preprint arXiv:2107.05908, 2021
782021
Towards global explanations of convolutional neural networks with concept attribution
W Wu, Y Su, X Chen, S Zhao, I King, MR Lyu, YW Tai
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
502020
Boosting response aware model-based collaborative filtering
H Yang, G Ling, Y Su, MR Lyu, I King
IEEE Transactions on Knowledge and Data Engineering 27 (8), 2064-2077, 2015
382015
Reversible data hiding for BTC-compressed images based on bitplane flipping and histogram shifting of mean tables
CH Li, ZM Lu, YX Su
Information technology journal 10 (7), 1421-1426, 2011
372011
Deterministic scale-free small-world networks of arbitrary order
ZM Lu, YX Su, SZ Guo
Physica A: Statistical Mechanics and its Applications 392 (17), 3555-3562, 2013
252013
Improving the transferability of adversarial samples by path-augmented method
J Zhang, J Huang, W Wang, Y Li, W Wu, X Wang, Y Su, MR Lyu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
242023
Deepobfuscation: Securing the structure of convolutional neural networks via knowledge distillation
H Xu, Y Su, Z Zhao, Y Zhou, MR Lyu, I King
arXiv preprint arXiv:1806.10313, 2018
232018
Semparser: A semantic parser for log analytics
Y Huo, Y Su, C Lee, MR Lyu
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
222023
Defuse: A dependency-guided function scheduler to mitigate cold starts on faas platforms
J Shen, T Yang, Y Su, Y Zhou, MR Lyu
2021 IEEE 41st International Conference on Distributed Computing Systems …, 2021
212021
Adaptive performance anomaly detection for online service systems via pattern sketching
Z Chen, J Liu, Y Su, H Zhang, X Ling, Y Yang, MR Lyu
Proceedings of the 44th International Conference on Software Engineering, 61-72, 2022
182022
AEON: a method for automatic evaluation of NLP test cases
J Huang, J Zhang, W Wang, P He, Y Su, MR Lyu
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
162022
AID: efficient prediction of aggregated intensity of dependency in large-scale cloud systems
T Yang, J Shen, Y Su, X Ling, Y Yang, MR Lyu
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
162021
Graph-based incident aggregation for large-scale online service systems
Z Chen, J Liu, Y Su, H Zhang, X Wen, X Ling, Y Yang, MR Lyu
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
152021
Eadro: An end-to-end troubleshooting framework for microservices on multi-source data
C Lee, T Yang, Z Chen, Y Su, MR Lyu
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
142023
{FUSEE}: A fully {Memory-Disaggregated}{Key-Value} store
J Shen, P Zuo, X Luo, T Yang, Y Su, Y Zhou, MR Lyu
21st USENIX Conference on File and Storage Technologies (FAST 23), 81-98, 2023
142023
Learning to Rank Using Localized Geometric Mean Metrics
Y Su, I King, MR Lyu
Proceedings of the 40th International ACM SIGIR Conference on Research and …, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20