Skip to main content

Showing 1–6 of 6 results for author: Akker, B v d

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.20097  [pdf, other

    stat.ME cs.LG stat.ML

    Qini curve estimation under clustered network interference

    Authors: Rickard K. A. Karlsson, Bram van den Akker, Felipe Moraes, Hugo M. Proença, Jesse H. Krijthe

    Abstract: Qini curves are a widely used tool for assessing treatment policies under allocation constraints as they visualize the incremental gain of a new treatment policy versus the cost of its implementation. Standard Qini curve estimation assumes no interference between units: that is, that treating one unit does not influence the outcome of any other unit. In many real-life applications such as public p… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

  2. arXiv:2408.14319  [pdf, other

    cs.LG stat.ML

    Rethinking Knowledge Transfer in Learning Using Privileged Information

    Authors: Danil Provodin, Bram van den Akker, Christina Katsimerou, Maurits Kaptein, Mykola Pechenizkiy

    Abstract: In supervised machine learning, privileged information (PI) is information that is unavailable at inference, but is accessible during training time. Research on learning using privileged information (LUPI) aims to transfer the knowledge captured in PI onto a model that can perform inference without PI. It seems that this extra bit of information ought to make the resulting model better. However, f… ▽ More

    Submitted 26 August, 2024; originally announced August 2024.

  3. arXiv:2302.01223  [pdf, ps, other

    cs.LG cs.IR

    Practical Bandits: An Industry Perspective

    Authors: Bram van den Akker, Olivier Jeunen, Ying Li, Ben London, Zahra Nazari, Devesh Parekh

    Abstract: The bandit paradigm provides a unified modeling framework for problems that require decision-making under uncertainty. Because many business metrics can be viewed as rewards (a.k.a. utilities) that result from actions, bandit algorithms have seen a large and growing interest from industrial applications, such as search, recommendation and advertising. Indeed, with the bandit lens comes the promise… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

    Comments: Tutorial held at The Web Conference 2023 (formerly known as WWW) in Austin, Texas (USA), on April 30 - May 4, 2023

  4. arXiv:2209.04147  [pdf, other

    cs.LG cs.IR

    Extending Open Bandit Pipeline to Simulate Industry Challenges

    Authors: Bram van den Akker, Niklas Weber, Felipe Moraes, Dmitri Goldenberg

    Abstract: Bandit algorithms are often used in the e-commerce industry to train Machine Learning (ML) systems when pre-labeled data is unavailable. However, the industry setting poses various challenges that make implementing bandit algorithms in practice non-trivial. In this paper, we elaborate on the challenges of off-policy optimisation, delayed reward, concept drift, reward design, and business rules con… ▽ More

    Submitted 9 September, 2022; originally announced September 2022.

    Comments: Published at the CONSEQUENCES+REVEAL '22 workshop @ Recsys 2022, Seattle, WA, USA, Sept. 22nd-23rd 2022

    ACM Class: I.2.6; I.6.8

  5. arXiv:2107.01979  [pdf, other

    cs.LG cs.CR stat.AP

    Machine Learning for Fraud Detection in E-Commerce: A Research Agenda

    Authors: Niek Tax, Kees Jan de Vries, Mathijs de Jong, Nikoleta Dosoula, Bram van den Akker, Jon Smith, Olivier Thuong, Lucas Bernardi

    Abstract: Fraud detection and prevention play an important part in ensuring the sustained operation of any e-commerce business. Machine learning (ML) often plays an important role in these anti-fraud operations, but the organizational context in which these ML models operate cannot be ignored. In this paper, we take an organization-centric view on the topic of fraud detection by formulating an operational m… ▽ More

    Submitted 5 July, 2021; originally announced July 2021.

    Comments: Accepted and to appear in the proceedings of the KDD 2021 co-located workshop: the 2nd International Workshop on Deployable Machine Learning for Security Defense (MLHat)

  6. ViTOR: Learning to Rank Webpages Based on Visual Features

    Authors: Bram van den Akker, Ilya Markov, Maarten de Rijke

    Abstract: The visual appearance of a webpage carries valuable information about its quality and can be used to improve the performance of learning to rank (LTR). We introduce the Visual learning TO Rank (ViTOR) model that integrates state-of-the-art visual features extraction methods by (i) transfer learning from a pre-trained image classification model, and (ii) synthetic saliency heat maps generated from… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    Comments: In Proceedings of the 2019 World Wide Web Conference (WWW 2019), May 2019, San Francisco

    ACM Class: H.3.3; I.2