Picture for Lior Rokach

Lior Rokach

A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach

Add code
Jul 28, 2020
Figure 1 for A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach
Figure 2 for A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach
Figure 3 for A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach
Figure 4 for A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach
Viaarxiv icon

Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate

Add code
Jul 26, 2020
Figure 1 for Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate
Figure 2 for Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate
Figure 3 for Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate
Figure 4 for Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate
Viaarxiv icon

Adversarial Learning in the Cyber Security Domain

Add code
Jul 05, 2020
Figure 1 for Adversarial Learning in the Cyber Security Domain
Figure 2 for Adversarial Learning in the Cyber Security Domain
Figure 3 for Adversarial Learning in the Cyber Security Domain
Figure 4 for Adversarial Learning in the Cyber Security Domain
Viaarxiv icon

PIVEN: A Deep Neural Network for Prediction Intervals with Specific Value Prediction

Add code
Jun 09, 2020
Figure 1 for PIVEN: A Deep Neural Network for Prediction Intervals with Specific Value Prediction
Figure 2 for PIVEN: A Deep Neural Network for Prediction Intervals with Specific Value Prediction
Figure 3 for PIVEN: A Deep Neural Network for Prediction Intervals with Specific Value Prediction
Figure 4 for PIVEN: A Deep Neural Network for Prediction Intervals with Specific Value Prediction
Viaarxiv icon

Automatic Machine Learning Derived from Scholarly Big Data

Add code
Mar 06, 2020
Figure 1 for Automatic Machine Learning Derived from Scholarly Big Data
Figure 2 for Automatic Machine Learning Derived from Scholarly Big Data
Figure 3 for Automatic Machine Learning Derived from Scholarly Big Data
Figure 4 for Automatic Machine Learning Derived from Scholarly Big Data
Viaarxiv icon

PrivGen: Preserving Privacy of Sequences Through Data Generation

Add code
Feb 23, 2020
Figure 1 for PrivGen: Preserving Privacy of Sequences Through Data Generation
Figure 2 for PrivGen: Preserving Privacy of Sequences Through Data Generation
Figure 3 for PrivGen: Preserving Privacy of Sequences Through Data Generation
Figure 4 for PrivGen: Preserving Privacy of Sequences Through Data Generation
Viaarxiv icon

Sequence Preserving Network Traffic Generation

Add code
Feb 23, 2020
Figure 1 for Sequence Preserving Network Traffic Generation
Figure 2 for Sequence Preserving Network Traffic Generation
Figure 3 for Sequence Preserving Network Traffic Generation
Figure 4 for Sequence Preserving Network Traffic Generation
Viaarxiv icon

RankML: a Meta Learning-Based Approach for Pre-Ranking Machine Learning Pipelines

Add code
Nov 20, 2019
Figure 1 for RankML: a Meta Learning-Based Approach for Pre-Ranking Machine Learning Pipelines
Figure 2 for RankML: a Meta Learning-Based Approach for Pre-Ranking Machine Learning Pipelines
Figure 3 for RankML: a Meta Learning-Based Approach for Pre-Ranking Machine Learning Pipelines
Figure 4 for RankML: a Meta Learning-Based Approach for Pre-Ranking Machine Learning Pipelines
Viaarxiv icon

DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering

Add code
Oct 31, 2019
Figure 1 for DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering
Figure 2 for DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering
Figure 3 for DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering
Figure 4 for DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering
Viaarxiv icon

Diversifying Database Activity Monitoring with Bandits

Add code
Oct 23, 2019
Figure 1 for Diversifying Database Activity Monitoring with Bandits
Figure 2 for Diversifying Database Activity Monitoring with Bandits
Figure 3 for Diversifying Database Activity Monitoring with Bandits
Figure 4 for Diversifying Database Activity Monitoring with Bandits
Viaarxiv icon