Lior Rokach

Orcid: 0000-0002-6956-3341

Affiliations:
  • Ben-Gurion University, Beersheba, Israel


According to our database1, Lior Rokach authored at least 335 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Machine learning-based stock picking using value investing and quality features.
Neural Comput. Appl., July, 2024

Automated algorithm selection using meta-learning and pre-trained deep convolution neural networks.
Inf. Fusion, May, 2024

Improving severity classification of Hebrew PET-CT pathology reports using test-time augmentation.
J. Biomed. Informatics, January, 2024

Iterative Feature eXclusion (IFX): Mitigating feature starvation in gradient boosted decision trees.
Knowl. Based Syst., 2024

PnT: Born-again tree-based model via fused decision path encoding.
Inf. Fusion, 2024

A Novel Method for News Article Event-Based Embedding.
CoRR, 2024

The Branch Not Taken: Predicting Branching in Online Conversations.
CoRR, 2024

BagStacking: An Integrated Ensemble Learning Approach for Freezing of Gait Detection in Parkinson's Disease.
CoRR, 2024

FairUS - UpSampling Optimized Method for Boosting Fairness.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

TTTS: Tree Test Time Simulation for Enhancing Decision Tree Robustness against Adversarial Examples.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Context aware Markov chains models.
Knowl. Based Syst., December, 2023

Vulnerability of pangolin SARS-CoV-2 lineage assignment to adversarial attack.
Artif. Intell. Medicine, December, 2023

DeepCAN: Hybrid Method for Road Type Classification Using Vehicle Sensor Data for Smart Autonomous Mobility.
IEEE Trans. Intell. Transp. Syst., November, 2023

Enhancing social network hate detection using back translation and GPT-3 augmentations during training and test-time.
Inf. Fusion, November, 2023

Automatic Feature Engineering for Learning Compact Decision Trees.
Expert Syst. Appl., November, 2023

TLTD: Transfer Learning for Tabular Data.
Appl. Soft Comput., November, 2023

Dataset of GraphRNA scores for sRNA-mRNA interactions in E. coli.
Dataset, November, 2023

Shapley-based feature augmentation.
Inf. Fusion, August, 2023

Pretrained transformer models for predicting the withdrawal of drugs from the market.
Bioinform., August, 2023

Boosting anomaly detection using unsupervised diverse test-time augmentation.
Inf. Sci., May, 2023

TTANAD: Test-Time Augmentation for Network Anomaly Detection.
Entropy, 2023

AMFPMC - An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions.
CoRR, 2023

Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack.
CoRR, 2023

Promoting Tail Item Recommendations in E-Commerce.
Proceedings of the 31st ACM Conference on User Modeling, Adaptation and Personalization, 2023

GraphERT- Transformers-based Temporal Dynamic Graph Embedding.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Predicting drug characteristics using biomedical text embedding.
BMC Bioinform., December, 2022

Recommender Systems: Techniques, Applications, and Challenges.
Proceedings of the Recommender Systems Handbook, 2022

Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices.
Sensors, 2022

A universal adversarial policy for text classifiers.
Neural Networks, 2022

Contextual security awareness: A context-based approach for assessing the security awareness of users.
Knowl. Based Syst., 2022

Integrated prediction intervals and specific value predictions for regression problems using neural networks.
Knowl. Based Syst., 2022

Learning dataset representation for automatic machine learning algorithm selection.
Knowl. Inf. Syst., 2022

Deepchecks: A Library for Testing and Validating Machine Learning Models and Data.
J. Mach. Learn. Res., 2022

Enhancing real-world adversarial patches through 3D modeling of complex target scenes.
Neurocomputing, 2022

A deep learning framework for predicting burglaries based on multiple contextual factors.
Expert Syst. Appl., 2022

Evolving context-aware recommender systems with users in mind.
Expert Syst. Appl., 2022

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.
ACM Comput. Surv., 2022

Cross Version Defect Prediction with Class Dependency Embeddings.
CoRR, 2022

Predicting application usage based on latent contextual information.
Comput. Commun., 2022

Explainable machine learning for chronic lymphocytic leukemia treatment prediction using only inexpensive tests.
Comput. Biol. Medicine, 2022

Explainable multimodal machine learning model for classifying pregnancy drug safety.
Bioinform., 2022

Active-learning-based reconstruction of circuit model.
Appl. Intell., 2022

Transfer Learning for Time Series Classification Using Synthetic Data Generation.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

Q-Ball: Modeling Basketball Games Using Deep Reinforcement Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Analyzing movement predictability using human attributes and behavioral patterns.
Comput. Environ. Urban Syst., 2021

A Machine-Learning Model for Automatic Detection of Movement Compensations in Stroke Patients.
IEEE Trans. Emerg. Top. Comput., 2021

Supporting unknown number of users in keystroke dynamics models.
Knowl. Based Syst., 2021

Approximating XGBoost with an interpretable decision tree.
Inf. Sci., 2021

Isolation forests and landmarking-based representations for clustering algorithm recommendation using meta-learning.
Inf. Sci., 2021

Automatic selection of clustering algorithms using supervised graph embedding.
Inf. Sci., 2021

F-PENN - Forest path encoding for neural networks.
Inf. Fusion, 2021

Explaining anomalies detected by autoencoders using Shapley Additive Explanations.
Expert Syst. Appl., 2021

Enhancing Real-World Adversarial Patches with 3D Modeling Techniques.
CoRR, 2021

minMLST: machine learning for optimization of bacterial strain typing.
Bioinform., 2021

ICU Survival Prediction Incorporating Test-Time Augmentation to Improve the Accuracy of Ensemble-Based Models.
IEEE Access, 2021

Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants.
Proceedings of the International Joint Conference on Neural Networks, 2021

Approximating Aggregated SQL Queries with LSTM Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021

TRIO: Task-agnostic dataset representation optimized for automatic algorithm selection.
Proceedings of the IEEE International Conference on Data Mining, 2021

BNN: Boosting Neural Network Framework Utilizing Limited Amount of Data.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Probability-Based Algorithm for Bearing Diagnosis with Untrained Spall Sizes.
Sensors, 2020

Explainable decision forest: Transforming a decision forest into an interpretable tree.
Inf. Fusion, 2020

A practical tutorial on bagging and boosting based ensembles for machine learning: Algorithms, software tools, performance study, practical perspectives and opportunities.
Inf. Fusion, 2020

The Age of Testifying Wearable Devices: The Case of Intoxication Detection.
IACR Cryptol. ePrint Arch., 2020

Comparison of state-of-the-art deep learning APIs for image multi-label classification using semantic metrics.
Expert Syst. Appl., 2020

Keystroke dynamics obfuscation using key grouping.
Expert Syst. Appl., 2020

Machine learning and operation research based method for promotion optimization of products with no price elasticity history.
Electron. Commer. Res. Appl., 2020

Lessons Learned from Applying off-the-shelf BERT: There is no Silver Bullet.
CoRR, 2020

A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach.
CoRR, 2020

Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate.
CoRR, 2020

Adversarial Learning in the Cyber Security Domain.
CoRR, 2020

PIVEN: A Deep Neural Network for Prediction Intervals with Specific Value Prediction.
CoRR, 2020

Automatic Machine Learning Derived from Scholarly Big Data.
CoRR, 2020

PrivGen: Preserving Privacy of Sequences Through Data Generation.
CoRR, 2020

Sequence Preserving Network Traffic Generation.
CoRR, 2020

Source Model Selection for Deep Learning in the Time Series Domain.
IEEE Access, 2020

Product Bundle Identification using Semi-Supervised Learning.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020

Using Bandits for Effective Database Activity Monitoring.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

DeepLine: AutoML Tool for Pipelines Generation using Deep Reinforcement Learning and Hierarchical Actions Filtering.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Crime Linkage Based on Textual Hebrew Police Reports Utilizing Behavioral Patterns.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

MetaTPOT: Enhancing A Tree-based Pipeline Optimization Tool Using Meta-Learning.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

tdGraphEmbed: Temporal Dynamic Graph-Level Embedding.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Adversarial Vulnerability of Deep Learning Models in Analyzing Next Generation Sequencing Data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Clustering Wi-Fi fingerprints for indoor-outdoor detection.
Wirel. Networks, 2019

Implicit dimension identification in user-generated text with LSTM networks.
Inf. Process. Manag., 2019

Constraint learning based gradient boosting trees.
Expert Syst. Appl., 2019

Choosing the right word: Using bidirectional LSTM tagger for writing support systems.
Eng. Appl. Artif. Intell., 2019

Dynamic Malware Analysis in the Modern Era - A State of the Art Survey.
ACM Comput. Surv., 2019

RankML: a Meta Learning-Based Approach for Pre-Ranking Machine Learning Pipelines.
CoRR, 2019

Diversifying Database Activity Monitoring with Bandits.
CoRR, 2019

Deep Context-Aware Recommender System Utilizing Sequential Latent Context.
CoRR, 2019

Assessing the Quality of Scientific Papers.
CoRR, 2019

New Item Consumption Prediction Using Deep Learning.
CoRR, 2019

Semantic Comparison of State-of-the-Art Deep Learning Methods for Image Multi-Label Classification.
CoRR, 2019

Online Budgeted Learning for Classifier Induction.
CoRR, 2019

Personal Dynamic Cost-Aware Sensing for Latent Context Detection.
CoRR, 2019

Detecting drug-drug interactions using artificial neural networks and classic graph similarity measures.
CoRR, 2019

Explaining Anomalies Detected by Autoencoders Using SHAP.
CoRR, 2019

Defense Methods Against Adversarial Examples for Recurrent Neural Networks.
CoRR, 2019

Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud.
Comput. Secur., 2019

Securing keystroke dynamics from replay attacks.
Appl. Soft Comput., 2019

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework.
IEEE Access, 2019

AugBoost: Gradient Boosting Enhanced with Step-Wise Feature Augmentation.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

AutoGRD: Model Recommendation Through Graphical Dataset Representation.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Ensemble Learning - Pattern Classification Using Ensemble Methods, 2<sup>nd</sup> Edition
Series in Machine Perception and Artificial Intelligence 85, WorldScientific, ISBN: 9789811201974, 2019

2018
Ensemble learning: A survey.
WIREs Data Mining Knowl. Discov., 2018

Inferring contextual preferences using deep encoder-decoder learners.
New Rev. Hypermedia Multim., 2018

Personal price aware multi-seller recommender system: Evidence from eBay.
Knowl. Based Syst., 2018

FSCOAL - Parallel simultaneous fuzzy co-clustering and learning.
Int. J. Intell. Syst., 2018

Wikibook-Bot - Automatic Generation of a Wikipedia Book.
CoRR, 2018

Low Resource Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
CoRR, 2018

Taxonomy of mobile users' security awareness.
Comput. Secur., 2018

Identifying Informational vs. Conversational Questions on Community Question Answering Archives.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

Predict Demographic Information Using Word2vec on Spatial Trajectories.
Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization, 2018

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

A Hybrid Approach for Automatic Model Recommendation.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Evaluation of a Design Method for Graph Database.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2018

2017
Wikiometrics: a Wikipedia based ranking system.
World Wide Web, 2017

Anomaly detection for smartphone data streams.
Pervasive Mob. Comput., 2017

Personal-discount sensitivity prediction for mobile coupon conversion optimization.
J. Assoc. Inf. Sci. Technol., 2017

Modeling Graph Database Schema.
IT Prof., 2017

Fast-CBUS: A fast clustering-based undersampling method for addressing the class imbalance problem.
Neurocomputing, 2017

Ensembles of classifiers based on dimensionality reduction.
Intell. Data Anal., 2017

A hybrid approach for improving unsupervised fault detection for robotic systems.
Expert Syst. Appl., 2017

Predicting Relevance Scores for Triples from Type-Like Relations using Neural Embedding - The Cabbage Triple Scorer at WSDM Cup 2017.
CoRR, 2017

Sampling High Throughput Data for Anomaly Detection of Data-Base Activity.
CoRR, 2017

Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers.
CoRR, 2017

MindDesktop: a general purpose brain computer interface.
CoRR, 2017

Inferring Contextual Preferences Using Deep Auto-Encoding.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017

User Verification on Mobile Devices Using Sequences of Touch Gestures.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017

Scholarly Digital Libraries as a Platform for Malware Distribution.
Proceedings of the A Systems Approach to Cyber Security, 2017

Session-Based Recommendations Using Item Embedding.
Proceedings of the 22nd International Conference on Intelligent User Interfaces, 2017

User Feedback Analysis for Mobile Malware Detection.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Application Marketplace Malware Detection by User Feedback Analysis.
Proceedings of the Information Systems Security and Privacy, 2017

2016
Anytime Algorithms for Recommendation Service Providers.
ACM Trans. Intell. Syst. Technol., 2016

Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016

Mobile security and privacy: Advances, challenges and future research directions.
Pervasive Mob. Comput., 2016

Towards latent context-aware recommendation systems.
Knowl. Based Syst., 2016

Utilizing transfer learning for in-domain collaborative filtering.
Knowl. Based Syst., 2016

Recommender systems for product bundling.
Knowl. Based Syst., 2016

ALDROID: efficient update of Android anti-virus software using designated active learning methods.
Knowl. Inf. Syst., 2016

Leveraging metadata to recommend keywords for academic papers.
J. Assoc. Inf. Sci. Technol., 2016

XML-AD: Detecting anomalous patterns in XML documents.
Inf. Sci., 2016

Decision forest: Twenty years of research.
Inf. Fusion, 2016

Matching entities across online social networks.
Neurocomputing, 2016

Reducing preference elicitation in group decision making.
Expert Syst. Appl., 2016

SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods.
Expert Syst. Appl., 2016

An ensemble method for top-N recommendations from the SVD.
Expert Syst. Appl., 2016

Virtual Breathalyzer.
CoRR, 2016

Language Models with GloVe Word Embeddings.
CoRR, 2016

Unsupervised Commonsense Knowledge Enrichment for Domain-Specific Sentiment Analysis.
Cogn. Comput., 2016

Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories.
Proceedings of the Poster Track of the 10th ACM Conference on Recommender Systems (RecSys 2016), 2016

RecSys'16 Workshop on Deep Learning for Recommender Systems (DLRS).
Proceedings of the 10th ACM Conference on Recommender Systems, 2016

CyberRank: Knowledge Elicitation for Risk Assessment of Database Security.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

Scalable attack propagation model and algorithms for honeypot systems.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Publishing Differentially Private Medical Events Data.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Recommender Systems: Introduction and Challenges.
Proceedings of the Recommender Systems Handbook, 2015

A classifier to determine which Wikipedia biographies will be accepted.
J. Assoc. Inf. Sci. Technol., 2015

Fast and space-efficient shapelets-based time-series classification.
Intell. Data Anal., 2015

Local-shapelets for fast classification of spectrographic measurements.
Expert Syst. Appl., 2015

The Importance of Pronouns to Sentiment Analysis: Online Cancer Survivor Network Case Study.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

In-House Solution for the RecSys Challenge 2015.
Proceedings of the 2015 International ACM Recommender Systems Challenge, 2015

"Please, Not Now!": A Model for Timing Recommendations.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

RecSys Challenge 2015 and the YOOCHOOSE Dataset.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Theoretical Categorization of Query Performance Predictors.
Proceedings of the 2015 International Conference on The Theory of Information Retrieval, 2015

Fast Item-Based Collaborative Filtering.
Proceedings of the ICAART 2015, 2015

Unknown malware detection using network traffic classification.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Data Mining with Decision Trees - Theory and Applications. 2<sup>nd</sup> Edition
Series in Machine Perception and Artificial Intelligence 81, WorldScientific, ISBN: 978-981-4590-09-9, 2014

Proactive Data Mining with Decision Trees
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-1-4939-0539-3, 2014

Adapted Features and Instance Selection for Improving Co-training.
Proceedings of the Interactive Knowledge Discovery and Data Mining in Biomedical Informatics, 2014

Survival Analysis of Automobile Components Using Mutually Exclusive Forests.
IEEE Trans. Syst. Man Cybern. Syst., 2014

OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage.
IEEE Trans. Knowl. Data Eng., 2014

ConfDTree: A Statistical Method for Improving Decision Trees.
J. Comput. Sci. Technol., 2014

Reaching a joint decision with minimal elicitation of voter preferences.
Inf. Sci., 2014

Ensemble methods for multi-label classification.
Expert Syst. Appl., 2014

Novel active learning methods for enhanced PC malware detection in windows OS.
Expert Syst. Appl., 2014

Reaction to New Security Threat Class.
CoRR, 2014

Mobile malware detection through analysis of deviations in application network behavior.
Comput. Secur., 2014

Wikipedia-based query performance prediction.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

Preference elicitation for narrowing the recommended list for groups.
Proceedings of the Eighth ACM Conference on Recommender Systems, 2014

Contexto: lessons learned from mobile context inference.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Preference Elicitation for Group Decisions.
Proceedings of the Group Decision and Negotiation. A Process-Oriented View, 2014

Dependency Tree-Based Rules for Concept-Level Aspect-Based Sentiment Analysis.
Proceedings of the Semantic Web Evaluation Challenge, 2014

Unsupervised Fine-Grained Sentiment Analysis System Using Lexicons and Concepts.
Proceedings of the Semantic Web Evaluation Challenge, 2014

Methodology for Connecting Nouns to Their Modifying Adjectives.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2014

A hybrid approach for fault detection in autonomous physical agents.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
Facebook single and cross domain data for recommendation systems.
User Model. User Adapt. Interact., 2013

Optimizing Data Misuse Detection.
ACM Trans. Knowl. Discov. Data, 2013

Computationally efficient link prediction in a variety of social networks.
ACM Trans. Intell. Syst. Technol., 2013

Exploiting label dependencies for improved sample complexity.
Mach. Learn., 2013

Investigating confidence displays for top-<i>N</i> recommendations.
J. Assoc. Inf. Sci. Technol., 2013

Parsimonious citer-based measures: The artificial intelligence domain as a case study.
J. Assoc. Inf. Sci. Technol., 2013

The CASH algorithm-cost-sensitive attribute selection using histograms.
Inf. Sci., 2013

Guest editorial: Special issue on data mining for information security.
Inf. Sci., 2013

A GIS-based decision support system for hotel room rate estimation and temporal price prediction: The hotel brokers' context.
Decis. Support Syst., 2013

Highlighting items as means of adaptive assistance.
Behav. Inf. Technol., 2013

Improving Sentiment Analysis in an Online Cancer Survivor Community Using Dynamic Sentiment Lexicon.
Proceedings of the 2013 International Conference on Social Intelligence and Technology, 2013

Entity Matching in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Recommending insurance riders.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Using geospatial metadata to boost collaborative filtering.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Leveraging the citation graph to recommend keywords.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Ensemble of Feature Chains for Anomaly Detection.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013

Improving Simple Collaborative Filtering Models Using Ensemble Methods.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013

A figure search engine architecture for a chemistry digital library.
Proceedings of the 13th ACM/IEEE-CS Joint Conference on Digital Libraries, 2013

Machine-Learning-Based Circuit Synthesis.
Proceedings of the IJCAI 2013, 2013

Linking Motif Sequences with Tale Types by Machine Learning.
Proceedings of the 2013 Workshop on Computational Models of Narrative, 2013

Combining one-class classifiers via meta learning.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2013 international workshop on computational scientometrics: theory and applications.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

A fast and scalable method for threat detection in large-scale DNS logs.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

IP2User - Identifying the Username of an IP Address in Network-Related Events.
Proceedings of the IEEE International Congress on Big Data, 2013

Sensor fault detection and diagnosis for autonomous systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Transfer Learning for Content-Based Recommender Systems Using Tree Matching.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

2012
A Survey of Data Leakage Detection and Prevention Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-2053-8, 2012

User Authentication Based on Representative Users.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Initial Profile Generation in Recommender Systems Using Pairwise Comparison.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Attribute-Driven Hidden Markov Model Trees for Intention Prediction.
IEEE Trans. Syst. Man Cybern. Part C, 2012

M-Score: A Misuseability Weight Measure.
IEEE Trans. Dependable Secur. Comput., 2012

Detecting unknown computer worm activity via support vector machines and active learning.
Pattern Anal. Appl., 2012

Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features.
J. Mach. Learn. Res., 2012

Automatic discovery of the root causes for quality drift in high dimensionality manufacturing processes.
J. Intell. Manuf., 2012

Applying the Publication Power Approach to Artificial Intelligence Journals.
J. Assoc. Inf. Sci. Technol., 2012

Limiting disclosure of sensitive data in sequential releases of databases.
Inf. Sci., 2012

User identity verification via mouse dynamics.
Inf. Sci., 2012

k-anonymised reducts.
Int. J. Granul. Comput. Rough Sets Intell. Syst., 2012

Social Network Based Search for Experts
CoRR, 2012

Using Wikipedia to Boost SVD Recommender Systems
CoRR, 2012

Boosting Simple Collaborative Filtering Models Using Ensemble Methods
CoRR, 2012

Fast Randomized Model Generation for Shapelet-Based Time Series Classification
CoRR, 2012

Securing Your Transactions: Detecting Anomalous Patterns In XML Documents
CoRR, 2012

Detection of Deviations in Mobile Applications Network Behavior
CoRR, 2012

Diffusion Ensemble Classifiers.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012

ConfDTree: Improving Decision Trees Using Confidence Intervals.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

An Exploration of Research Directions in Machine Ensemble Theory and Applications.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012

Introducing diversity among the models of multi-label classification ensemble.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012

TALMUD: transfer learning for multiple domains.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Recommending citations: translating papers into references.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Predicting Student Exam's Scores by Analyzing Social Network Data.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2011
Introduction to Recommender Systems Handbook.
Proceedings of the Recommender Systems Handbook, 2011

Who is going to win the next Association for the Advancement of Artificial Intelligence Fellowship Award? Evaluating researchers by mining bibliographic data.
J. Assoc. Inf. Sci. Technol., 2011

Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Using Wikipedia to boost collaborative filtering techniques.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011

Recommenders benchmark framework.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011

Eliciting domain expert misuseability conceptions.
Proceedings of the 6th International Conference on Knowledge Capture (K-CAP 2011), 2011

Dynamic Sensitivity-Based Access Control.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

HoneyGen: An automated honeytokens generator.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Recommenders Benchmark Framework.
Proceedings of the 11th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS 2011), 2011

MindDesktop - Computer Accessibility for Severely Handicapped.
Proceedings of the ICEIS 2011, 2011

Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools.
Proceedings of the ICEIS 2011, 2011

Meta-learning for Selecting a Multi-label Classification Algorithm.
Proceedings of the Data Mining Workshops (ICDMW), 2011

Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Data Mining using Decomposition Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Classification Trees.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Supervised Learning.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Ensemble Methods in Supervised Learning.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Using Fuzzy Logic in Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

A survey of Clustering Algorithms.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Introduction to Knowledge Discovery and Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Auto-Sign: an automatic signature generator for high-speed malware filtering devices.
J. Comput. Virol., 2010

Efficient Multidimensional Suppression for K-Anonymity.
IEEE Trans. Knowl. Data Eng., 2010

Privacy-preserving data mining: A feature set partitioning approach.
Inf. Sci., 2010

Ensemble-based classifiers.
Artif. Intell. Rev., 2010

Analyzing Group Communication for Preventing Accidental Data Leakage via Email.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

Iterative voting under uncertainty for group recommender systems.
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010

Cost-Sensitive Detection of Malicious Applications in Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010

A Decision Tree Based Recommender System.
Proceedings of the 10th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS), 2010

GEO-SPADE - A Generic Google Earth-based Framework for Analyzing and Exploring Spatio-temporal Data.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 5, HCI, Funchal, Madeira, Portugal, June 8, 2010

Developing Analytical GIS Applications with GEO-SPADE: Three Success Case Studies.
Proceedings of the Enterprise Information Systems - 12th International Conference, 2010

k-Anonymized Reducts.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Continuous Verification Using Keystroke Dynamics.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

M-score: estimating the potential damage of data leakage incident by assigning misuseability weight.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

Detecting data misuse by applying context-based data linkage.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

A Novel Approach to Mining Travel Sequences Using Collections of Geotagged Photos.
Proceedings of the Geospatial Thinking, 2010

2009
Pattern Classification Using Ensemble Methods
Series in Machine Perception and Artificial Intelligence 75, WorldScientific, ISBN: 978-981-4468-31-2, 2009

Data Mining for Improving Manufacturing Processes.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

A Survey of Feature Selection Techniques.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Incorporating Fuzzy Logic in Data Mining Tasks.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Troika - An improved stacking schema for classification tasks.
Inf. Sci., 2009

Taxonomy for characterizing ensemble methods in classification tasks: A review and annotated bibliography.
Comput. Stat. Data Anal., 2009

Collective-agreement-based pruning of ensembles.
Comput. Stat. Data Anal., 2009

Improving malware detection by applying multi-inducer ensemble.
Comput. Stat. Data Anal., 2009

Active learning using pessimistic expectation estimators.
Control. Cybern., 2009

Ensemble methods for improving the performance of neighborhood-based collaborative filtering.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

Identity theft, computers and behavioral biometrics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Random Projection Ensemble Classifiers.
Proceedings of the Enterprise Information Systems, 11th International Conference, 2009

An Overview of IDS Using Anomaly Detection.
Proceedings of the Database Technologies: Concepts, 2009

2008
The Role of Fuzzy Sets in Data Mining.
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008

Introduction to Soft Computing for Knowledge Discovery and Data Mining.
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008

Genetic algorithm-based feature set partitioning for classification problems.
Pattern Recognit., 2008

Mining manufacturing databases to discover the effect of operation sequence on the product quality.
J. Intell. Manuf., 2008

Negation recognition in medical narrative reports.
Inf. Retr., 2008

Mining manufacturing data using genetic algorithm-based feature set decomposition.
Int. J. Intell. Syst. Technol. Appl., 2008

An evolutionary algorithm for constructing a decision forest: Combining the classification of disjoints decision trees.
Int. J. Intell. Syst., 2008

Pessimistic cost-sensitive active learning of decision trees for profit maximizing targeting campaigns.
Data Min. Knowl. Discov., 2008

Detection of unknown computer worms based on behavioral classification of the host.
Comput. Stat. Data Anal., 2008

kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity.
Proceedings of the Protecting Persons While Protecting the People, 2008

Anytime AHP Method for Preferences Elicitation in Stereotype-Based Recommender System.
Proceedings of the ICEIS 2008, 2008

2007
Data Mining with Decision Trees - Theory and Applications
Series in Machine Perception and Artificial Intelligence 69, WorldScientific, ISBN: 978-981-4474-18-4, 2007

Decision-tree instance-space decomposition with grouped gain-ratio.
Inf. Sci., 2007

A Methodology for Improving the Performance of Non-Ranker Feature Selection Filters.
Int. J. Pattern Recognit. Artif. Intell., 2007

Establishing User Profiles in the MediaScout Recommender System.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

Recommender System from Personal Social Networks.
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007

2006
A Decision Tree Framework for Semi-Automatic Extraction of Product Attributes from the Web.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006

Feature Selection by Combining Multiple Methods.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006

A Decision-Tree Framework for Instance-space Decomposition.
Proceedings of the Advances in Web Intelligence and Data Mining, 2006

Classifier evaluation under limited resources.
Pattern Recognit. Lett., 2006

Decomposition methodology for classification tasks: a meta decomposer framework.
Pattern Anal. Appl., 2006

Data Mining for Improving the Quality of Manufacturing: A Feature Set Decomposition Approach.
J. Intell. Manuf., 2006

Selective Voting - Getting More for Less in Sensor Fusion.
Int. J. Pattern Recognit. Artif. Intell., 2006

Automatic Discovery of Regular Expression Patterns Representing Negated Findings in Medical Narrative Reports.
Proceedings of the Next Generation Information Technologies and Systems, 2006

Automatic Identification of Negated Concepts in Narrative Clinical Reports.
Proceedings of the ICEIS 2006, 2006

Cascaded Data Mining Methods for Text Understanding, with medical case study.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2005
Decomposition Methodology for Knowledge Discovery and Data Mining - Theory and Applications
Series in Machine Perception and Artificial Intelligence 61, WorldScientific, ISBN: 978-981-256-079-7, 2005

Top-down induction of decision trees classifiers - a survey.
IEEE Trans. Syst. Man Cybern. Part C, 2005

Improving Supervised Learning by Sample Decomposition.
Int. J. Comput. Intell. Appl., 2005

Feature set decomposition for decision trees.
Intell. Data Anal., 2005

Decomposition methodology for classification tasks.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

Clustering Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Decision Trees.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Ensemble Methods for Classifiers.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Decomposition Methodology for Knowledge Discovery and Data Mining.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Introduction to Supervised Methods.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

Introduction to Knowledge Discovery in Databases.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

2004
Context-Sensitive Medical Information Retrieval.
Proceedings of the MEDINFO 2004, 2004

Information Retrieval System for Medical Narrative Reports.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

2003
Space Decomposition in Data Mining: A Clustering Approach.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

2002
Improving Supervised Learning by Feature Decomposition.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

2001
Theory and Applications of Attribute Decomposition.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001


  Loading...