319 results on '"Rokach, Lior"'
Search Results
2. Recommender Systems: Techniques, Applications, and Challenges
3. Transfer Learning for Time Series Classification Using Synthetic Data Generation
4. Using Bandits for Effective Database Activity Monitoring
5. Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection
6. Evaluation of a Design Method for Graph Database
7. Application Marketplace Malware Detection by User Feedback Analysis
8. Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices
9. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
10. Recommender Systems: Introduction and Challenges
11. Introduction to Proactive Data Mining
12. Proactive Data Mining Using Decision Trees
13. Proactive Data Mining in the Real World: Case Studies
14. Sensitivity Analysis of Proactive Data Mining
15. Proactive Data Mining: A General Approach and Algorithmic Framework
16. Publishing Differentially Private Medical Events Data
17. pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts
18. A Taxonomy of Data Leakage Prevention Solutions
19. Privacy, Data Anonymization, and Secure Data Publishing
20. Data Leakage/Misuse Scenarios
21. Case studies
22. Data Leakage
23. Introduction to Information Security
24. Data Leakage Detection/Prevention Solutions
25. Introduction to Recommender Systems Handbook
26. Ensemble Methods in Supervised Learning
27. Data Mining using Decomposition Methods
28. Using Fuzzy Logic in Data Mining
29. Classification Trees
30. Supervised Learning
31. A survey of Clustering Algorithms
32. Introduction to Knowledge Discovery and Data Mining
33. Preference Elicitation for Group Decisions
34. Dependency Tree-Based Rules for Concept-Level Aspect-Based Sentiment Analysis
35. Unsupervised Fine-Grained Sentiment Analysis System Using Lexicons and Concepts
36. Adapted Features and Instance Selection for Improving Co-training
37. Methodology for Connecting Nouns to Their Modifying Adjectives
38. The Role of Fuzzy Sets in Data Mining
39. Introduction to Soft Computing for Knowledge Discovery and Data Mining
40. Ensemble Methods for Classifiers
41. Decomposition Methodology for Knowledge Discovery and Data Mining
42. Clustering Methods
43. Decision Trees
44. Introduction to Supervised Methods
45. Introduction to Knowledge Discovery in Databases
46. Transfer Learning for Content-Based Recommender Systems Using Tree Matching
47. Ensemble of Feature Chains for Anomaly Detection
48. Improving Simple Collaborative Filtering Models Using Ensemble Methods
49. Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks
50. Links Reconstruction Attack : Using Link Prediction Algorithms to Compromise Social Networks Privacy
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.