Author of the publication

Unpack Local Model Interpretation for GBDT.

, , , and . DASFAA (2), volume 10828 of Lecture Notes in Computer Science, page 764-775. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A case for Passive Application Layer Multicast., and . Computer Networks, 51 (11): 3157-3171 (2007)A Hybrid Cross-Layer Routing Protocol for MANETs., and . ICCCN, page 1-6. IEEE, (2011)A fast and memory-efficient N-gram language model lookup method for large vocabulary continuous speech recognition., and . Computer Speech & Language, 21 (1): 1-25 (2007)ISIS: A multilingual spoken dialog system developed with CORBA and KQML agents., , , , , , , , , and 6 other author(s). INTERSPEECH, page 150-153. ISCA, (2000)Secure scheme during vertical handoff in integrated heterogeneous wireless systems., , and . WTS, page 1-5. IEEE, (2011)DCP-EW: Distributed Congestion-Control Protocol for Encrypted Wireless Networks., and . WCNC, page 1-6. IEEE, (2010)Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding., , , and . IEEE Trans. Information Forensics and Security, 10 (3): 653-664 (2015)A New SDCS-based Content-adaptive Steganography Using Iterative Noise-Level Estimation., , and . IIH-MSP, page 68-71. IEEE, (2015)Distributed Deep Forest and its Application to Automatic Detection of Cash-out Fraud., , , , , , , , , and 1 other author(s). CoRR, (2018)Time-sensitive Customer Churn Prediction based on PU Learning., , , and . CoRR, (2018)