Picture for Parvez Ahammad

Parvez Ahammad

Epsilon*: Privacy Metric for Machine Learning Models

Add code
Jul 21, 2023
Viaarxiv icon

Sales Channel Optimization via Simulations Based on Observational Data with Delayed Rewards: A Case Study at LinkedIn

Add code
Sep 16, 2022
Figure 1 for Sales Channel Optimization via Simulations Based on Observational Data with Delayed Rewards: A Case Study at LinkedIn
Figure 2 for Sales Channel Optimization via Simulations Based on Observational Data with Delayed Rewards: A Case Study at LinkedIn
Figure 3 for Sales Channel Optimization via Simulations Based on Observational Data with Delayed Rewards: A Case Study at LinkedIn
Viaarxiv icon

Greykite: Deploying Flexible Forecasting at Scale at LinkedIn

Add code
Jul 15, 2022
Figure 1 for Greykite: Deploying Flexible Forecasting at Scale at LinkedIn
Figure 2 for Greykite: Deploying Flexible Forecasting at Scale at LinkedIn
Figure 3 for Greykite: Deploying Flexible Forecasting at Scale at LinkedIn
Figure 4 for Greykite: Deploying Flexible Forecasting at Scale at LinkedIn
Viaarxiv icon

Intellige: A User-Facing Model Explainer for Narrative Explanations

Add code
May 27, 2021
Figure 1 for Intellige: A User-Facing Model Explainer for Narrative Explanations
Figure 2 for Intellige: A User-Facing Model Explainer for Narrative Explanations
Figure 3 for Intellige: A User-Facing Model Explainer for Narrative Explanations
Figure 4 for Intellige: A User-Facing Model Explainer for Narrative Explanations
Viaarxiv icon

MCA-based Rule Mining Enables Interpretable Inference in Clinical Psychiatry

Add code
Oct 26, 2018
Figure 1 for MCA-based Rule Mining Enables Interpretable Inference in Clinical Psychiatry
Figure 2 for MCA-based Rule Mining Enables Interpretable Inference in Clinical Psychiatry
Figure 3 for MCA-based Rule Mining Enables Interpretable Inference in Clinical Psychiatry
Figure 4 for MCA-based Rule Mining Enables Interpretable Inference in Clinical Psychiatry
Viaarxiv icon

SoK: Applying Machine Learning in Security - A Survey

Add code
Nov 10, 2016
Figure 1 for SoK: Applying Machine Learning in Security - A Survey
Figure 2 for SoK: Applying Machine Learning in Security - A Survey
Figure 3 for SoK: Applying Machine Learning in Security - A Survey
Figure 4 for SoK: Applying Machine Learning in Security - A Survey
Viaarxiv icon