Search

Your search keyword '"Lior Rokach"' showing total 56 results

Search Constraints

Start Over You searched for: Author "Lior Rokach" Remove constraint Author: "Lior Rokach" Publisher elsevier bv Remove constraint Publisher: elsevier bv
56 results on '"Lior Rokach"'

Search Results

1. Shapley-based feature augmentation

4. F-PENN— Forest path encoding for neural networks

5. Isolation forests and landmarking-based representations for clustering algorithm recommendation using meta-learning

6. Approximating XGBoost with an interpretable decision tree

7. A practical tutorial on bagging and boosting based ensembles for machine learning: Algorithms, software tools, performance study, practical perspectives and opportunities

8. Explainable decision forest: Transforming a decision forest into an interpretable tree

10. Automatic Feature Engineering for Learning Compact Decision Trees

11. Constraint learning based gradient boosting trees

15. Explainable machine learning for chronic lymphocytic leukemia treatment prediction using only inexpensive tests

18. Personal price aware multi-seller recommender system: Evidence from eBay

19. Taxonomy of mobile users' security awareness

20. Explaining anomalies detected by autoencoders using Shapley Additive Explanations

21. Supporting unknown number of users in keystroke dynamics models

22. A hybrid approach for improving unsupervised fault detection for robotic systems

23. Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem

24. Anomaly detection for smartphone data streams

26. An ensemble method for top-N recommendations from the SVD

27. Analyzing movement predictability using human attributes and behavioral patterns

28. SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods

29. Reducing preference elicitation in group decision making

30. Recommender systems for product bundling

31. Matching entities across online social networks

32. Utilizing transfer learning for in-domain collaborative filtering

33. Towards latent context-aware recommendation systems

34. Decision forest: Twenty years of research

35. XML-AD: Detecting anomalous patterns in XML documents

36. Keystroke dynamics obfuscation using key grouping

37. Machine learning and operation research based method for promotion optimization of products with no price elasticity history

38. Securing keystroke dynamics from replay attacks

39. Local-shapelets for fast classification of spectrographic measurements

40. Novel active learning methods for enhanced PC malware detection in windows OS

41. Reaching a joint decision with minimal elicitation of voter preferences

42. Mobile malware detection through analysis of deviations in application network behavior

43. Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud

44. User identity verification via mouse dynamics

45. Limiting disclosure of sensitive data in sequential releases of databases

46. Privacy-preserving data mining: A feature set partitioning approach

47. Troika – An improved stacking schema for classification tasks

48. Taxonomy for characterizing ensemble methods in classification tasks: A review and annotated bibliography

49. Collective-agreement-based pruning of ensembles

50. Improving malware detection by applying multi-inducer ensemble

Catalog

Books, media, physical & digital resources