Picture for Lior Rokach

Lior Rokach

Forget What You Know about LLMs Evaluations - LLMs are Like a Chameleon

Add code
Feb 11, 2025
Viaarxiv icon

DFPE: A Diverse Fingerprint Ensemble for Enhancing LLM Performance

Add code
Jan 29, 2025
Viaarxiv icon

FairTTTS: A Tree Test Time Simulation Method for Fairness-Aware Classification

Add code
Jan 14, 2025
Viaarxiv icon

BiasGuard: Guardrailing Fairness in Machine Learning Production Systems

Add code
Jan 07, 2025
Viaarxiv icon

A Novel Method for News Article Event-Based Embedding

Add code
May 20, 2024
Viaarxiv icon

The Branch Not Taken: Predicting Branching in Online Conversations

Add code
Apr 21, 2024
Figure 1 for The Branch Not Taken: Predicting Branching in Online Conversations
Figure 2 for The Branch Not Taken: Predicting Branching in Online Conversations
Figure 3 for The Branch Not Taken: Predicting Branching in Online Conversations
Figure 4 for The Branch Not Taken: Predicting Branching in Online Conversations
Viaarxiv icon

BagStacking: An Integrated Ensemble Learning Approach for Freezing of Gait Detection in Parkinson's Disease

Add code
Feb 24, 2024
Viaarxiv icon

AMFPMC -- An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions

Add code
Feb 07, 2023
Figure 1 for AMFPMC -- An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions
Figure 2 for AMFPMC -- An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions
Figure 3 for AMFPMC -- An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions
Figure 4 for AMFPMC -- An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions
Viaarxiv icon

Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack

Add code
Jan 05, 2023
Figure 1 for Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack
Figure 2 for Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack
Figure 3 for Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack
Figure 4 for Silent Killer: Optimizing Backdoor Trigger Yields a Stealthy and Powerful Data Poisoning Attack
Viaarxiv icon

Cross Version Defect Prediction with Class Dependency Embeddings

Add code
Dec 29, 2022
Viaarxiv icon