Alert button
Picture for Royi Ronen

Royi Ronen

Alert button

In Search of Truth: An Interrogation Approach to Hallucination Detection

Add code
Bookmark button
Alert button
Mar 05, 2024
Yakir Yehuda, Itzik Malkiel, Oren Barkan, Jonathan Weill, Royi Ronen, Noam Koenigstein

Figure 1 for In Search of Truth: An Interrogation Approach to Hallucination Detection
Figure 2 for In Search of Truth: An Interrogation Approach to Hallucination Detection
Figure 3 for In Search of Truth: An Interrogation Approach to Hallucination Detection
Figure 4 for In Search of Truth: An Interrogation Approach to Hallucination Detection
Viaarxiv icon

GPT-Calls: Enhancing Call Segmentation and Tagging by Generating Synthetic Conversations via Large Language Models

Add code
Bookmark button
Alert button
Jun 09, 2023
Itzik Malkiel, Uri Alon, Yakir Yehuda, Shahar Keren, Oren Barkan, Royi Ronen, Noam Koenigstein

Figure 1 for GPT-Calls: Enhancing Call Segmentation and Tagging by Generating Synthetic Conversations via Large Language Models
Figure 2 for GPT-Calls: Enhancing Call Segmentation and Tagging by Generating Synthetic Conversations via Large Language Models
Figure 3 for GPT-Calls: Enhancing Call Segmentation and Tagging by Generating Synthetic Conversations via Large Language Models
Figure 4 for GPT-Calls: Enhancing Call Segmentation and Tagging by Generating Synthetic Conversations via Large Language Models
Viaarxiv icon

An End-to-End Dialogue Summarization System for Sales Calls

Add code
Bookmark button
Alert button
Apr 28, 2022
Abedelkadir Asi, Song Wang, Roy Eisenstadt, Dean Geckt, Yarin Kuper, Yi Mao, Royi Ronen

Figure 1 for An End-to-End Dialogue Summarization System for Sales Calls
Figure 2 for An End-to-End Dialogue Summarization System for Sales Calls
Figure 3 for An End-to-End Dialogue Summarization System for Sales Calls
Figure 4 for An End-to-End Dialogue Summarization System for Sales Calls
Viaarxiv icon

Learning to Customize Network Security Rules

Add code
Bookmark button
Alert button
Dec 28, 2017
Michael Bargury, Roy Levin, Royi Ronen

Figure 1 for Learning to Customize Network Security Rules
Figure 2 for Learning to Customize Network Security Rules
Figure 3 for Learning to Customize Network Security Rules
Figure 4 for Learning to Customize Network Security Rules
Viaarxiv icon