Search

Your search keyword '"Lior Rokach"' showing total 56 results

Search Constraints

Start Over You searched for: Author "Lior Rokach" Remove constraint Author: "Lior Rokach" Publisher elsevier bv Remove constraint Publisher: elsevier bv
56 results on '"Lior Rokach"'

Search Results

4. F-PENN— Forest path encoding for neural networks

5. Isolation forests and landmarking-based representations for clustering algorithm recommendation using meta-learning

6. Approximating XGBoost with an interpretable decision tree

7. A practical tutorial on bagging and boosting based ensembles for machine learning: Algorithms, software tools, performance study, practical perspectives and opportunities

8. Explainable decision forest: Transforming a decision forest into an interpretable tree

11. Constraint learning based gradient boosting trees

16. Explainable machine learning for chronic lymphocytic leukemia treatment prediction using only inexpensive tests

17. Personal price aware multi-seller recommender system: Evidence from eBay

19. Taxonomy of mobile users' security awareness

20. Explaining anomalies detected by autoencoders using Shapley Additive Explanations

21. A hybrid approach for improving unsupervised fault detection for robotic systems

22. Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem

24. Supporting unknown number of users in keystroke dynamics models

25. Analyzing movement predictability using human attributes and behavioral patterns

26. Anomaly detection for smartphone data streams

27. An ensemble method for top-N recommendations from the SVD

28. SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods

29. Reducing preference elicitation in group decision making

30. Recommender systems for product bundling

31. Matching entities across online social networks

32. Utilizing transfer learning for in-domain collaborative filtering

33. Towards latent context-aware recommendation systems

34. Keystroke dynamics obfuscation using key grouping

35. Decision forest: Twenty years of research

36. XML-AD: Detecting anomalous patterns in XML documents

37. Local-shapelets for fast classification of spectrographic measurements

38. Machine learning and operation research based method for promotion optimization of products with no price elasticity history

39. Novel active learning methods for enhanced PC malware detection in windows OS

40. Reaching a joint decision with minimal elicitation of voter preferences

41. Mobile malware detection through analysis of deviations in application network behavior

42. Securing keystroke dynamics from replay attacks

43. Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud

44. User identity verification via mouse dynamics

45. Limiting disclosure of sensitive data in sequential releases of databases

46. Privacy-preserving data mining: A feature set partitioning approach

47. Troika – An improved stacking schema for classification tasks

48. Taxonomy for characterizing ensemble methods in classification tasks: A review and annotated bibliography

49. Collective-agreement-based pruning of ensembles

50. Improving malware detection by applying multi-inducer ensemble

Catalog

Books, media, physical & digital resources