Lior Rokach
#104,723
Most Influential Person Now
Israeli scientist
Lior Rokach's AcademicInfluence.com Rankings
Lior Rokachcomputer-science Degrees
Computer Science
#3800
World Rank
#3995
Historical Rank
Data Mining
#46
World Rank
#46
Historical Rank
Machine Learning
#547
World Rank
#554
Historical Rank
Database
#1077
World Rank
#1133
Historical Rank
Download Badge
Computer Science
Why Is Lior Rokach Influential?
(Suggest an Edit or Addition)Lior Rokach's Published Works
Published Works
- Data Mining And Knowledge Discovery Handbook (2005) (2803)
- Introduction to Recommender Systems Handbook (2011) (2334)
- Ensemble-based classifiers (2010) (2230)
- Ensemble learning: A survey (2018) (1124)
- Clustering Methods (2005) (834)
- Top-down induction of decision trees classifiers - a survey (2005) (758)
- Recommender Systems: Introduction and Challenges (2015) (708)
- Data Mining with Decision Trees - Theory and Applications (2007) (603)
- Data Mining and Knowledge Discovery Handbook, 2nd ed (2010) (289)
- Pattern Classification Using Ensemble Methods (2009) (268)
- Decision forest: Twenty years of research (2016) (246)
- An Introduction to Decision Trees (2007) (242)
- Taxonomy for characterizing ensemble methods in classification tasks: A review and annotated bibliography (2009) (229)
- A Survey of Data Leakage Detection and Prevention Solutions (2012) (202)
- Link Prediction in Social Networks Using Computationally Efficient Topological Features (2011) (189)
- Mobile malware detection through analysis of deviations in application network behavior (2014) (165)
- Data Mining with Decision Trees - Theory and Applications. 2nd Edition (2014) (161)
- Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers (2017) (155)
- Facebook single and cross domain data for recommendation systems (2013) (146)
- Improving malware detection by applying multi-inducer ensemble (2009) (144)
- A survey of Clustering Algorithms (2010) (139)
- Recommending citations: translating papers into references (2012) (135)
- User identity verification via mouse dynamics (2012) (134)
- Efficient Multidimensional Suppression for K-Anonymity (2010) (126)
- A practical tutorial on bagging and boosting based ensembles for machine learning: Algorithms, software tools, performance study, practical perspectives and opportunities (2020) (123)
- Dynamic Malware Analysis in the Modern Era—A State of the Art Survey (2019) (122)
- Survey on Collaborative Filtering, Content-based Filtering and Hybrid Recommendation System (2015) (121)
- Introduction to Knowledge Discovery and Data Mining (2010) (111)
- Detection of unknown computer worms based on behavioral classification of the host (2008) (111)
- Privacy-preserving data mining: A feature set partitioning approach (2010) (106)
- Genetic algorithm-based feature set partitioning for classification problems (2008) (102)
- Unknown malware detection using network traffic classification (2015) (101)
- Novel active learning methods for enhanced PC malware detection in windows OS (2014) (101)
- Introduction to Information Security (2012) (100)
- Towards latent context-aware recommendation systems (2016) (96)
- RecSys Challenge 2015 and the YOOCHOOSE Dataset (2015) (96)
- Understanding topics and sentiment in an online cancer survivor community. (2013) (95)
- Ensemble Methods for Classifiers (2005) (95)
- Ensemble methods for multi-label classification (2013) (94)
- Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem (2017) (94)
- Entity Matching in Online Social Networks (2013) (90)
- Troika - An improved stacking schema for classification tasks (2009) (90)
- Computationally efficient link prediction in a variety of social networks (2013) (87)
- Negation recognition in medical narrative reports (2008) (85)
- TALMUD: transfer learning for multiple domains (2012) (85)
- Identity theft, computers and behavioral biometrics (2009) (84)
- Data Mining for Improving the Quality of Manufacturing: A Feature Set Decomposition Approach (2006) (84)
- Decomposition Methodology for Knowledge Discovery and Data Mining - Theory and Applications (2005) (82)
- Soft Computing for Knowledge Discovery and Data Mining (2007) (81)
- Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features (2012) (80)
- Recommender System from Personal Social Networks (2007) (74)
- CaSTLe – Classification of single cells by transfer learning: Harnessing the power of publicly available single cell RNA sequencing experiments to annotate new experiments (2018) (73)
- Decomposition Methodology for Knowledge Discovery and Data Mining (2005) (72)
- HoneyGen: An automated honeytokens generator (2011) (72)
- Explainable decision forest: Transforming a decision forest into an interpretable tree (2020) (70)
- Detecting unknown computer worm activity via support vector machines and active learning (2012) (67)
- Decision-tree instance-space decomposition with grouped gain-ratio (2007) (67)
- Using the confusion matrix for improving ensemble classifiers (2010) (65)
- Decomposition methodology for classification tasks: a meta decomposer framework (2006) (65)
- Explaining Anomalies Detected by Autoencoders Using SHAP (2019) (64)
- Context-Sensitive Medical Information Retrieval (2004) (63)
- Improving Simple Collaborative Filtering Models Using Ensemble Methods (2013) (59)
- Predicting Student Exam's Scores by Analyzing Social Network Data (2012) (58)
- Approximating XGBoost with an interpretable decision tree (2021) (57)
- SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research (2016) (57)
- Random Projection Ensemble Classifiers (2009) (55)
- SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods (2016) (53)
- A GIS-based decision support system for hotel room rate estimation and temporal price prediction: The hotel brokers' context (2013) (53)
- Improving Supervised Learning by Feature Decomposition (2002) (53)
- A Novel Approach to Mining Travel Sequences Using Collections of Geotagged Photos (2010) (51)
- Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers (2017) (51)
- A Survey of Feature Selection Techniques (2009) (50)
- Recommender Systems for Product Bundling (2016) (49)
- Proactive Data Mining with Decision Trees (2014) (49)
- Continuous Verification Using Keystroke Dynamics (2010) (49)
- Limiting disclosure of sensitive data in sequential releases of databases (2012) (47)
- Safety and efficacy of the BNT162b mRNA COVID-19 vaccine in patients with chronic lymphocytic leukemia (2021) (47)
- Explaining anomalies detected by autoencoders using Shapley Additive Explanations (2021) (47)
- Feature set decomposition for decision trees (2005) (45)
- M-Score: A Misuseability Weight Measure (2012) (44)
- Detecting drug-drug interactions using artificial neural networks and classic graph similarity measures (2019) (44)
- Space Decomposition in Data Mining: A Clustering Approach (2002) (43)
- Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain (2021) (43)
- Ensemble methods for improving the performance of neighborhood-based collaborative filtering (2009) (41)
- Collective-agreement-based pruning of ensembles (2009) (41)
- Introduction to Knowledge Discovery in Databases (2005) (40)
- Information Retrieval System for Medical Narrative Reports (2004) (39)
- Mining manufacturing data using genetic algorithm-based feature set decomposition (2008) (39)
- Taxonomy of mobile users' security awareness (2018) (39)
- Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis (2016) (39)
- Personal price aware multi-seller recommender system: Evidence from eBay (2018) (37)
- The CASH algorithm-cost-sensitive attribute selection using histograms (2013) (36)
- ALDROID: efficient update of Android anti-virus software using designated active learning methods (2016) (36)
- Data mining by attribute decomposition with semiconductor manufacturing case study (2001) (35)
- Combining one-class classifiers via meta learning (2011) (35)
- Data mining opportunities in geosocial networks for improving road safety (2012) (35)
- Session-Based Recommendations Using Item Embedding (2017) (35)
- Clustering di-graphs for continuously verifying users according to their typing patterns (2010) (33)
- Sensor fault detection and diagnosis for autonomous systems (2013) (33)
- Matching entities across online social networks (2014) (33)
- Using Wikipedia to boost collaborative filtering techniques (2011) (33)
- Defense Methods Against Adversarial Examples for Recurrent Neural Networks (2019) (33)
- Reaching a joint decision with minimal elicitation of voter preferences (2014) (32)
- Exploiting label dependencies for improved sample complexity (2013) (32)
- Classifier evaluation under limited resources (2006) (32)
- Selective Voting - Getting More for Less in Sensor Fusion (2006) (32)
- A figure search engine architecture for a chemistry digital library (2013) (31)
- Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers (2018) (31)
- A Decision Tree Based Recommender System (2010) (31)
- Initial Profile Generation in Recommender Systems Using Pairwise Comparison (2012) (28)
- Decision Trees (2005) (28)
- Improving Sentiment Analysis in an Online Cancer Survivor Community Using Dynamic Sentiment Lexicon (2013) (27)
- Best Usage Context Prediction for Music Tracks (2010) (27)
- User Authentication Based on Representative Users (2012) (27)
- Theory and applications of attribute decomposition (2001) (27)
- Dependency Tree-Based Rules for Concept-Level Aspect-Based Sentiment Analysis (2014) (27)
- Choosing the Right Word: Using Bidirectional LSTM Tagger for Writing Support Systems (2019) (27)
- Pessimistic cost-sensitive active learning of decision trees for profit maximizing targeting campaigns (2008) (26)
- Detecting application update attack on mobile devices through network featur (2013) (26)
- Mining manufacturing databases to discover the effect of operation sequence on the product quality (2008) (26)
- Modeling Graph Database Schema (2017) (26)
- A methodology for the design of a fuzzy data warehouse (2008) (24)
- Ensemble Learning (2019) (24)
- Detecting data misuse by applying context-based data linkage (2010) (24)
- Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis (2016) (23)
- Improving Supervised Learning by Sample Decomposition (2005) (23)
- OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage (2014) (23)
- A Stereotypes-Based Hybrid Recommender System for Media Items (2007) (23)
- Fast Randomized Model Generation for Shapelet-Based Time Series Classification (2012) (23)
- Predicting Refractive Surgery Outcome: Machine Learning Approach With Big Data. (2017) (22)
- A Direct Learning Approach for Neural Network Based Pre-Distortion for Coherent Nonlinear Optical Transmitter (2020) (22)
- Attribute-Driven Hidden Markov Model Trees for Intention Prediction (2012) (22)
- Predict Demographic Information Using Word2vec on Spatial Trajectories (2018) (22)
- Who is going to win the next Association for the Advancement of Artificial Intelligence Fellowship Award? Evaluating researchers by mining bibliographic data (2011) (22)
- Meta-learning for Selecting a Multi-label Classification Algorithm (2011) (22)
- Prediction of sperm extraction in non-obstructive azoospermia patients: a machine-learning perspective. (2020) (21)
- M-score: estimating the potential damage of data leakage incident by assigning misuseability weight (2010) (21)
- Anomaly detection for smartphone data streams (2017) (21)
- A Machine-Learning Model for Automatic Detection of Movement Compensations in Stroke Patients (2020) (20)
- Feature Selection by Combining Multiple Methods (2006) (20)
- Inferring Contextual Preferences Using Deep Auto-Encoding (2017) (19)
- Wikipedia-based query performance prediction (2014) (19)
- Source Model Selection for Deep Learning in the Time Series Domain (2020) (19)
- Auto-Sign: an automatic signature generator for high-speed malware filtering devices (2009) (19)
- Clustering Wi-Fi fingerprints for indoor–outdoor detection (2019) (19)
- Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud (2019) (19)
- RecSys'16 Workshop on Deep Learning for Recommender Systems (DLRS) (2016) (19)
- A Hybrid Approach for Automatic Model Recommendation (2018) (19)
- "Please, Not Now!": A Model for Timing Recommendations (2015) (18)
- A Methodology for Improving the Performance of Non-Ranker Feature Selection Filters (2007) (18)
- pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts (2015) (18)
- DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering (2019) (18)
- Ensemble Methods in Supervised Learning (2010) (18)
- Antibody persistence 100 days following the second dose of BNT162b mRNA Covid19 vaccine in patients with chronic lymphocytic leukemia (2021) (18)
- kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity (2009) (17)
- AutoGRD: Model Recommendation Through Graphical Dataset Representation (2019) (17)
- Fast and space-efficient shapelets-based time-series classification (2015) (16)
- Utilizing transfer learning for in-domain collaborative filtering (2016) (16)
- Scheduling Meetings by Agents (2008) (16)
- Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks (2013) (16)
- Links Reconstruction Attack (2013) (16)
- A hybrid approach for improving unsupervised fault detection for robotic systems (2017) (15)
- Ensemble of Feature Chains for Anomaly Detection (2013) (15)
- Behavioral Study of Users When Interacting with Active Honeytokens (2016) (15)
- ConfDTree: Improving Decision Trees Using Confidence Intervals (2012) (15)
- Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure (2011) (14)
- Using Machine Learning to Predict Rehabilitation Outcomes in Post-acute Hip Fracture Patients. (2020) (14)
- Classification Trees (2010) (14)
- CHANGE DETECTION IN CLASSIFICATION MODELS INDUCED FROM TIME SERIES DATA (2004) (14)
- MindDesktop - Computer Accessibility for Severely Handicapped (2011) (14)
- Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers (2018) (14)
- Introduction to Supervised Methods (2005) (14)
- tdGraphEmbed: Temporal Dynamic Graph-Level Embedding (2020) (14)
- Reducing preference elicitation in group decision making (2016) (13)
- Establishing User Profiles in the MediaScout Recommender System (2007) (13)
- Preference Elicitation for Group Decisions Using the Borda Voting Rule (2015) (13)
- Detection of Deviations in Mobile Applications Network Behavior (2012) (13)
- An ensemble method for top-N recommendations from the SVD (2016) (12)
- A hybrid approach for fault detection in autonomous physical agents (2014) (12)
- Identifying Informational vs. Conversational Questions on Community Question Answering Archives (2018) (12)
- A fast and scalable method for threat detection in large-scale DNS logs (2013) (12)
- Comparison of state-of-the-art deep learning APIs for image multi-label classification using semantic metrics (2020) (11)
- Preference elicitation for narrowing the recommended list for groups (2014) (11)
- OPTICAL COHERENCE TOMOGRAPHY BIOMARKERS TO DISTINGUISH DIABETIC MACULAR EDEMA FROM PSEUDOPHAKIC CYSTOID MACULAR EDEMA USING MACHINE LEARNING ALGORITHMS. (2019) (11)
- CyberRank: Knowledge Elicitation for Risk Assessment of Database Security (2016) (11)
- AugBoost: Gradient Boosting Enhanced with Step-Wise Feature Augmentation (2019) (11)
- Constraint learning based gradient boosting trees (2019) (11)
- Leveraging the citation graph to recommend keywords (2013) (11)
- Recommending insurance riders (2013) (11)
- Wikiometrics: a Wikipedia based ranking system (2016) (11)
- Automatic discovery of the root causes for quality drift in high dimensionality manufacturing processes (2012) (11)
- Implicit Dimension Identification in User-Generated Text with LSTM Networks (2019) (11)
- Analyzing movement predictability using human attributes and behavioral patterns (2021) (11)
- Query-Efficient GAN Based Black-Box Attack Against Sequence Based Machine and Deep Learning Classifiers (2018) (11)
- ICU Survival Prediction Incorporating Test-Time Augmentation to Improve the Accuracy of Ensemble-Based Models (2021) (11)
- Methodology for Connecting Nouns to Their Modifying Adjectives (2014) (10)
- ConfDTree: A Statistical Method for Improving Decision Trees (2014) (10)
- Investigating confidence displays for top-N recommendations (2013) (9)
- Deep Context-Aware Recommender System Utilizing Sequential Latent Context (2019) (9)
- Proceedings of the 3rd Workshop on Deep Learning for Recommender Systems (2016) (9)
- Highlighting items as means of adaptive assistance (2013) (9)
- Chapter 1 Introduction to Recommender Systems Handbook (2010) (9)
- Leveraging metadata to recommend keywords for academic papers (2016) (9)
- Cyber security threats in the microbial genomics era: implications for public health (2020) (9)
- Transfer Learning for Content-Based Recommender Systems Using Tree Matching (2013) (9)
- Model-Based Diagnosis with Multi-Label Classification (2011) (8)
- Adversarial Learning in the Cyber Security Domain (2020) (8)
- Boosting Simple Collaborative Filtering Models Using Ensemble Methods (2012) (8)
- Personal‐discount sensitivity prediction for mobile coupon conversion optimization (2017) (8)
- Product Bundle Identification using Semi-Supervised Learning (2020) (8)
- Isolation forests and landmarking-based representations for clustering algorithm recommendation using meta-learning (2021) (8)
- Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework (2019) (8)
- Language Models with Pre-Trained (GloVe) Word Embeddings (2016) (8)
- Anytime Algorithms for Recommendation Service Providers (2016) (8)
- Linking Motif Sequences with Tale Types by Machine Learning (2013) (7)
- Sniffing Bacteria with a Carbon-Dot Artificial Nose (2021) (7)
- Mobile security and privacy: Advances, challenges and future research directions (2016) (7)
- Recommender Systems: Techniques, Applications, and Challenges (2022) (7)
- GEO-SPADE - A Generic Google Earth-based Framework for Analyzing and Exploring Spatio-temporal Data (2010) (7)
- Data Leakage Detection/Prevention Solutions (2012) (7)
- A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach (2020) (7)
- Neighborhood Evaluation in Recommender Systems Using the Realization Based Entropy Approach (2014) (7)
- Dynamic Sensitivity-Based Access Control (2011) (7)
- Inferring contextual preferences using deep encoder-decoder learners (2018) (7)
- Contextual security awareness: A context-based approach for assessing the security awareness of users (2022) (7)
- Data Mining using Decomposition Methods (2010) (7)
- An evolutionary algorithm for constructing a decision forest: Combining the classification of disjoints decision trees (2008) (7)
- PIVEN: A Deep Neural Network for Prediction Intervals with Specific Value Prediction (2020) (6)
- Machine-learning-based circuit synthesis (2012) (6)
- Introduction to Soft Computing for Knowledge Discovery and Data Mining (2008) (6)
- XML-AD: Detecting anomalous patterns in XML documents (2016) (6)
- Recommenders benchmark framework (2011) (6)
- Scalable attack propagation model and algorithms for honeypot systems (2016) (6)
- Ensembles of classifiers based on dimensionality reduction (2013) (6)
- New Item Consumption Prediction Using Deep Learning (2019) (6)
- Fast Item-Based Collaborative Filtering (2015) (6)
- Adapted Features and Instance Selection for Improving Co-training (2014) (6)
- Survival Analysis of Automobile Components Using Mutually Exclusive Forests (2014) (6)
- An Overview of IDS Using Anomaly Detection (2009) (6)
- Application Marketplace Malware Detection by User Feedback Analysis (2017) (6)
- Analyzing Group Communication for Preventing Accidental Data Leakage via Email (2010) (5)
- An Exploration of Research Directions in Machine Ensemble Theory and Applications (2012) (5)
- Scholarly Digital Libraries as a Platform for Malware Distribution (2017) (5)
- Evolving Context-Aware Recommender Systems With Users in Mind (2020) (5)
- Using Bandits for Effective Database Activity Monitoring (2020) (5)
- RankML: a Meta Learning-Based Approach for Pre-Ranking Machine Learning Pipelines (2019) (5)
- Optimizing Data Misuse Detection (2014) (5)
- Correction: CaSTLe - Classification of single cells by transfer learning: Harnessing the power of publicly available single cell RNA sequencing experiments to annotate new experiments (2018) (5)
- Theoretical Categorization of Query Performance Predictors (2015) (5)
- A Taxonomy of Data Leakage Prevention Solutions (2012) (5)
- Chapter 1 Links Reconstruction Attack Using Link Prediction Algorithms to Compromise Social Networks Privacy (2013) (5)
- Contexto: lessons learned from mobile context inference (2014) (5)
- Advanced Decision Trees (2007) (5)
- Local-shapelets for fast classification of spectrographic measurements (2015) (5)
- Securing keystroke dynamics from replay attacks (2019) (5)
- Diversifying Database Activity Monitoring with Bandits (2019) (5)
- Applying the Publication Power Approach to Artificial Intelligence Journals (2012) (5)
- Sampling High Throughput Data for Anomaly Detection of Data-Base Activity (2017) (4)
- Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices (2018) (4)
- Eliciting domain expert misuseability conceptions (2011) (4)
- User Feedback Analysis for Mobile Malware Detection (2017) (4)
- Automatic Discovery of Regular Expression Patterns Representing Negated Findings in Medical Narrative Reports (2006) (4)
- Automatic selection of clustering algorithms using supervised graph embedding (2020) (4)
- Keystroke dynamics obfuscation using key grouping (2020) (4)
- Deepchecks: A Library for Testing and Validating Machine Learning Models and Data (2022) (4)
- Virtual Breathalyzer (2016) (4)
- Anytime AHP Method for Preferences Elicitation in Stereotype-Based Recommender System (2008) (4)
- Securing Your Transactions: Detecting Anomalous Patterns In XML Documents (2012) (4)
- Multi-Layered Model Based Diagnosis in Robots (2012) (4)
- The Importance of Pronouns to Sentiment Analysis: Online Cancer Survivor Network Case Study (2015) (4)
- A classifier to determine which Wikipedia biographies will be accepted (2015) (4)
- Using geospatial metadata to boost collaborative filtering (2013) (4)
- Probability-Based Algorithm for Bearing Diagnosis with Untrained Spall Sizes (2020) (4)
- Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis (2021) (4)
- Crime Linkage Based on Textual Hebrew Police Reports Utilizing Behavioral Patterns (2020) (4)
- Language Models with GloVe Word Embeddings (2016) (3)
- Recurrent Neural Network for Pre-distortion of Combined Nonlinear Optical Transmitter Impairments with Memory (2018) (3)
- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection (2018) (3)
- Cost-Sensitive Detection of Malicious Applications in Mobile Devices (2010) (3)
- Introducing diversity among the models of multi-label classification ensemble (2012) (3)
- Publishing Differentially Private Medical Events Data (2016) (3)
- Error Correcting Output Codes (2009) (3)
- k-Anonymized Reducts (2010) (3)
- Lessons Learned from Applying off-the-shelf BERT: There is no Silver Bullet (2020) (3)
- A Universal Adversarial Policy for Text Classifiers (2022) (3)
- Cascaded Data Mining Methods for Text Understanding, with medical case study (2006) (3)
- User Verification on Mobile Devices Using Sequences of Touch Gestures (2017) (3)
- A deep learning framework for predicting burglaries based on multiple contextual factors (2022) (3)
- MetaTPOT: Enhancing A Tree-based Pipeline Optimization Tool Using Meta-Learning (2020) (3)
- Machine learning and operation research based method for promotion optimization of products with no price elasticity history (2020) (3)
- Cellular Immune Responses to BNT162b2 mRNA COVID-19 Vaccine in Patients with Chronic Lymphocytic Leukemia (2021) (3)
- Explainable multimodal machine learning model for classifying pregnancy drug safety (2021) (3)
- Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate (2020) (3)
- Proactive data mining using decision trees (2012) (2)
- In-House Solution for the RecSys Challenge 2015 (2015) (2)
- Predicting Relevance Scores for Triples from Type-Like Relations using Neural Embedding - The Cabbage Triple Scorer at WSDM Cup 2017 (2017) (2)
- Using Wikipedia to Boost SVD Recommender Systems (2012) (2)
- Supporting unknown number of users in keystroke dynamics models (2021) (2)
- Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants (2021) (2)
- PrivGen: Preserving Privacy of Sequences Through Data Generation (2020) (2)
- Effectiveness of nirmatrelvir plus ritonavir treatment for patients with chronic lymphocytic leukemia during the Omicron surge (2023) (2)
- Diffusion Ensemble Classifiers (2012) (2)
- Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains (2015) (2)
- Transfer Learning for Time Series Classification Using Synthetic Data Generation (2022) (2)
- Explainable machine learning for chronic lymphocytic leukemia treatment prediction using only inexpensive tests (2022) (2)
- Decomposition methodology for classification tasks (2005) (2)
- Artificial Intelligence - Game Changer in the Teratology Information Service. (2020) (2)
- Unsupervised Fine-Grained Sentiment Analysis System Using Lexicons and Concepts (2014) (2)
- ALDROID: efficient update of Android anti-virus software using designated active learning methods (2016) (2)
- Reaction to New Security Threat Class (2014) (2)
- Learning dataset representation for automatic machine learning algorithm selection (2022) (2)
- Preference Elicitation for Group Decisions (2014) (2)
- Sequence Classification Using Decision Trees (2007) (2)
- AutoGRD (2019) (2)
- Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories (2016) (2)
- Incremental Learning of Decision Trees (2007) (2)
- Developing Analytical GIS Applications with GEO-SPADE: Three Success Case Studies (2010) (2)
- Evaluation of a Design Method for Graph Database (2018) (2)
- Boosting Anomaly Detection Using Unsupervised Diverse Test-Time Augmentation (2021) (2)
- Semantic Comparison of State-of-the-Art Deep Learning Methods for Image Multi-Label Classification (2019) (1)
- CDCDB: A large and continuously updated drug combination database (2022) (1)
- TRIO: Task-agnostic dataset representation optimized for automatic algorithm selection (2021) (1)
- Social Network Based Search for Experts (2012) (1)
- Popular Decision Trees Induction Algorithms (2014) (1)
- Proactive Data Mining: A General Approach and Algorithmic Framework (2014) (1)
- Semantic Comparison of State-of-the-Art Deep Learning APIs for Image Multi-Label Classification (2019) (1)
- Automatic Identification of Negated Concepts in Narrative Clinical Reports (2006) (1)
- Training Decision Trees (2014) (1)
- minMLST: machine learning for optimization of bacterial strain typing (2020) (1)
- Data Mining for Improving Manufacturing Processes (2009) (1)
- Space decomposition in data mining - a clustering approach (2002) (1)
- Enhancing Real-World Adversarial Patches with 3D Modeling Techniques (2021) (1)
- Incorporating Fuzzy Logic in Data Mining Tasks (2009) (1)
- CDCDB: A large and continuously updated drug combination database (2022) (1)
- The Role of Fuzzy Sets in Data Mining (2008) (1)
- Cyber Security Meets Machine Learning (2021) (1)
- Predicting application usage based on latent contextual information (2022) (1)
- Enhancing real-world adversarial patches through 3D modeling of complex target scenes (2021) (1)
- Privacy, Data Anonymization, and Secure Data Publishing (2012) (1)
- Using multiplicative hybrid hedonic pricing model for improving revenue management in hotel business (2010) (1)
- Parsimonious citer-based measures: The artificial intelligence domain as a case study (2013) (1)
- MindDesktop: a general purpose brain computer interface (2017) (1)
- Decomposition Methodology in Data Mining (2005) (1)
- Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis (2016) (1)
- Q-Ball: Modeling Basketball Games Using Deep Reinforcement Learning (2022) (1)
- Active learning using pessimistic expectation estimators (2009) (1)
- Personal Dynamic Cost-Aware Sensing for Latent Context Detection (2019) (1)
- Fuzzy Decision Trees (2007) (1)
- Cost-sensitive Active and Proactive Learning of Decision Trees (2014) (1)
- Improving Sentiment Analysis in an Online Cancer (2013) (1)
- Using Fuzzy Logic in Data Mining (2010) (1)
- Inferring Demographic Characteristics of Mobile Subscribers from Cell Tower Interactions (2022) (0)
- Correction to: Preference Elicitation for Group Decisions Using the Borda Voting Rule (2020) (0)
- Reply: Predicting sperm extraction in non-obstructive azoospermia patients: a machine-learning perspective. (2020) (0)
- Search Problems in the Domain of Multiplication : Case Study on Robust Anomaly Detection Using Markov Chains (2015) (0)
- Rebound of COVID-19 infection in patients with chronic lymphocytic leukemia treated for SARS-CoV-2 with Nirmatrelvir/Ritonavir or Molnupiravir. (2023) (0)
- A tissue-aware machine learning framework enhances the mechanistic understanding and genetic diagnosis of Mendelian and rare diseases (2021) (0)
- Earth-based Framework for Analyzing and Exploring Spatio-temporal Data (2010) (0)
- Assessing the Quality of Scientific Papers (2019) (0)
- Wikiometrics: a Wikipedia based ranking system (2017) (0)
- Session details: Volume I: Artificial intelligence & agents, distributed systems, and information systems: recommender systems: theory and applications track (2013) (0)
- K-anonymised Reducts (2012) (0)
- Evaluation of Classification Trees (2007) (0)
- Free‐text information retrieval system for a rapid enrollment of patients into clinical trials (2005) (0)
- Tltd: Transfer Learning for Tabular Data (2023) (0)
- A Decision Tree Framework for Semi-Automatic Extraction of Product Attributes from the Web (2006) (0)
- Discount Sensitivity – Are We All Equal ? (2016) (0)
- Clustering Wi-Fi fingerprints for indoor–outdoor detection (2018) (0)
- Detecting unknown computer worm activity via support vector machines and active learning (2012) (0)
- Guest editorial: Special issue on data mining for information security (2013) (0)
- Correction to: Preference Elicitation for Group Decisions Using the Borda Voting Rule (2020) (0)
- Growing Decision Trees (2007) (0)
- Predicting drug characteristics using biomedical text embedding (2022) (0)
- 2013 international workshop on computational scientometrics: theory and applications (2013) (0)
- Beyond Classification Tasks (2014) (0)
- Evaluating Ensembles of Classifiers (2009) (0)
- Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices (2022) (0)
- Integrated prediction intervals and specific value predictions for regression problems using neural networks (2022) (0)
- Online Budgeted Learning for Classifier Induction (2019) (0)
- Computational Scientometrics: Theory and applications (2013) (0)
- Facebook single and cross domain data for recommendation systems (2012) (0)
- Automatic discovery of the root causes for quality drift in high dimensionality manufacturing processes (2011) (0)
- Shapley-based feature augmentation (2023) (0)
- Sniffing Bacteria with a Carbon-Dot Artificial Nose (2021) (0)
- Active-learning-based reconstruction of circuit model (2021) (0)
- Decision Trees and Recommender Systems (2014) (0)
- Supervised Learning (2010) (0)
- Production Data Mining for Improving Manufacturing Processes (2019) (0)
- MetaTPOT (2020) (0)
- Data Leakage/Misuse Scenarios (2012) (0)
- BNN: Boosting Neural Network Framework Utilizing Limited Amount of Data (2021) (0)
- Lechuzo : Weakly-Supervised System for Fine-Grained Sentiment Analysis (2014) (0)
- A logistic regression method for cost sensetive active learning (2008) (0)
- Preference Elicitation for Group Decisions Using the Borda Voting Rule (2015) (0)
- A Walk-through-guide for Using Decision Trees Software (2014) (0)
- Machine-learning model for the prediction of preeclampsia – a step toward personalized risk assessment (2022) (0)
- Mining Manufacturing Databases to Discover the Effect of Operation Sequence and Operation Setting on the Product Quality (2009) (0)
- Proactive Data Mining in the Real World: Case Studies (2014) (0)
- Hybridization of Decision Trees with other Techniques (2007) (0)
- Personalized Knowledge Service for Smart Cell-Phone Based on Usage: Conceptual Model and Intention Prediction Algorithm (2014) (0)
- Budgeted Learning for Classifier Induction (2019) (0)
- Chapter 1 Recommender Systems : Introduction and Challenges (2015) (0)
- Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack (2023) (0)
- Introduction to Ensemble Learning (2009) (0)
- Sensitivity Analysis of Proactive Data Mining (2014) (0)
- Introduction to Pattern Classification (2009) (0)
- Approximating Aggregated SQL Queries with LSTM Networks (2020) (0)
- MultiCamp — Cost sensitive active learning algorithm for multiple parallel campaigns (2010) (0)
- Adversarial Vulnerability of Deep Learning Models in Analyzing Next Generation Sequencing Data (2020) (0)
- ConfDTree: A Statistical Method for Improving Decision Trees (2014) (0)
- Proceedings of the 2015 International ACM Recommender Systems Challenge (2015) (0)
- Cross Version Defect Prediction with Class Dependency Embeddings (2022) (0)
- AMFPMC - An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions (2023) (0)
- The Age of Testifying Wearable Devices: The Case of Intoxication Detection (2020) (0)
- Future Trends in Data Leakage (2012) (0)
- FSCOAL—Parallel simultaneous fuzzy co‐clustering and learning (2018) (0)
- A Generic Algorithm for Top-Down Induction of Decision Trees (2014) (0)
- Proceedings of the 2013 workshop on Computational scientometrics: theory & applications, CompSci@CIKM 2013, San Francisco, California, USA, October 28, 2013 (2013) (0)
- INTERACTIVE AUDIENCE SELECTION TOOL FOR DISTRIBUTING A MOBILE CAMPAIGN (2010) (0)
- IP2User -- Identifying the Username of an IP Address in Network-Related Events (2013) (0)
- Introduction to Proactive Data Mining (2014) (0)
- RECOMMENDER SYSTEMS FOR CALL CENTERS (2013) (0)
- Automatic Machine Learning Derived from Scholarly Big Data (2020) (0)
- Model-Based Diagnosis with Multi-Label Classi cation (2011) (0)
- Detection of Data Leakage using Misuseability Weight Measure (2013) (0)
- A Hybrid Approach for Fault Detection and Diagnosis in Autonamous Systems (0)
- Wikibook-Bot - Automatic Generation of a Wikipedia Book (2018) (0)
- Enhancement to MindDesktop: Improvement to a General Purpose Brain Computer Interface (0)
- BNN (2021) (0)
- Automatic Feature Engineering for Learning Compact Decision Trees (2022) (0)
- A Decision-Tree Framework for Instance-space Decomposition (2006) (0)
- Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools (2011) (0)
- Sequence Preserving Network Traffic Generation (2020) (0)
- F-PENN - Forest path encoding for neural networks (2021) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Lior Rokach?
Lior Rokach is affiliated with the following schools: