Picture for Tomo Lazovich

Tomo Lazovich

TwERC: High Performance Ensembled Candidate Generation for Ads Recommendation at Twitter

Add code
Feb 27, 2023
Viaarxiv icon

Random Isn't Always Fair: Candidate Set Imbalance and Exposure Inequality in Recommender Systems

Add code
Sep 12, 2022
Figure 1 for Random Isn't Always Fair: Candidate Set Imbalance and Exposure Inequality in Recommender Systems
Figure 2 for Random Isn't Always Fair: Candidate Set Imbalance and Exposure Inequality in Recommender Systems
Figure 3 for Random Isn't Always Fair: Candidate Set Imbalance and Exposure Inequality in Recommender Systems
Figure 4 for Random Isn't Always Fair: Candidate Set Imbalance and Exposure Inequality in Recommender Systems
Viaarxiv icon

Measuring Disparate Outcomes of Content Recommendation Algorithms with Distributional Inequality Metrics

Add code
Feb 03, 2022
Figure 1 for Measuring Disparate Outcomes of Content Recommendation Algorithms with Distributional Inequality Metrics
Figure 2 for Measuring Disparate Outcomes of Content Recommendation Algorithms with Distributional Inequality Metrics
Figure 3 for Measuring Disparate Outcomes of Content Recommendation Algorithms with Distributional Inequality Metrics
Figure 4 for Measuring Disparate Outcomes of Content Recommendation Algorithms with Distributional Inequality Metrics
Viaarxiv icon

Learning to Repair Software Vulnerabilities with Generative Adversarial Networks

Add code
Oct 28, 2018
Figure 1 for Learning to Repair Software Vulnerabilities with Generative Adversarial Networks
Figure 2 for Learning to Repair Software Vulnerabilities with Generative Adversarial Networks
Figure 3 for Learning to Repair Software Vulnerabilities with Generative Adversarial Networks
Viaarxiv icon

Automated software vulnerability detection with machine learning

Add code
Aug 02, 2018
Figure 1 for Automated software vulnerability detection with machine learning
Figure 2 for Automated software vulnerability detection with machine learning
Figure 3 for Automated software vulnerability detection with machine learning
Figure 4 for Automated software vulnerability detection with machine learning
Viaarxiv icon

Automated Vulnerability Detection in Source Code Using Deep Representation Learning

Add code
Jul 11, 2018
Figure 1 for Automated Vulnerability Detection in Source Code Using Deep Representation Learning
Figure 2 for Automated Vulnerability Detection in Source Code Using Deep Representation Learning
Figure 3 for Automated Vulnerability Detection in Source Code Using Deep Representation Learning
Figure 4 for Automated Vulnerability Detection in Source Code Using Deep Representation Learning
Viaarxiv icon