Almost optimal exploration in multi-armed bandits Z Karnin, T Koren, O Somekh International conference on machine learning, 1238-1246, 2013 | 522 | 2013 |

Tabtransformer: Tabular data modeling using contextual embeddings X Huang, A Khetan, M Cvitkovic, Z Karnin arXiv preprint arXiv:2012.06678, 2020 | 253 | 2020 |

Elastic machine learning algorithms in amazon sagemaker E Liberty, Z Karnin, B Xiang, L Rouesnel, B Coskun, R Nallapati, ... Proceedings of the 2020 ACM SIGMOD International Conference on Management of …, 2020 | 123 | 2020 |

Reducing dueling bandits to cardinal bandits N Ailon, Z Karnin, T Joachims International Conference on Machine Learning, 856-864, 2014 | 122 | 2014 |

Distributed exploration in multi-armed bandits E Hillel, ZS Karnin, T Koren, R Lempel, O Somekh Advances in Neural Information Processing Systems 26, 2013 | 112 | 2013 |

Optimal quantile approximation in streams Z Karnin, K Lang, E Liberty 2016 ieee 57th annual symposium on foundations of computer science (focs), 71-78, 2016 | 107 | 2016 |

Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in ZS Karnin, A Shpilka 2008 23rd Annual IEEE Conference on Computational Complexity, 280-291, 2008 | 102 | 2008 |

Copeland dueling bandits M Zoghi, ZS Karnin, S Whiteson, M De Rijke Advances in neural information processing systems 28, 2015 | 97 | 2015 |

Online principal components analysis C Boutsidis, D Garber, Z Karnin, E Liberty Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete …, 2014 | 85 | 2014 |

Amazon SageMaker Autopilot: a white box AutoML solution at scale P Das, N Ivkin, T Bansal, L Rouesnel, P Gautier, Z Karnin, L Dirac, ... Proceedings of the fourth international workshop on data management for end …, 2020 | 74 | 2020 |

How many folders do you really need? classifying email into a handful of categories M Grbovic, G Halawi, Z Karnin, Y Maarek Proceedings of the 23rd ACM International Conference on Conference on …, 2014 | 74 | 2014 |

You've got mail, and here is what you could do with it! analyzing and predicting actions on email messages D Di Castro, Z Karnin, L Lewin-Eytan, Y Maarek Proceedings of the ninth acm international conference on web search and data …, 2016 | 61 | 2016 |

Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in ZS Karnin, P Mukhopadhyay, A Shpilka, I Volkovich Proceedings of the forty-second ACM symposium on Theory of computing, 649-658, 2010 | 61 | 2010 |

Multi-armed bandits: Competing with optimal sequences ZS Karnin, O Anava Advances in Neural Information Processing Systems 29, 2016 | 57 | 2016 |

Optimal dynamic distributed MIS K Censor-Hillel, E Haramaty, Z Karnin Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing …, 2016 | 56 | 2016 |

Reconstruction of generalized depth-3 arithmetic circuits with bounded top fan-in ZS Karnin, A Shpilka 2009 24th Annual IEEE Conference on Computational Complexity, 274-285, 2009 | 54 | 2009 |

An empirical process approach to the union bound: Practical algorithms for combinatorial and linear bandits J Katz-Samuels, L Jain, KG Jamieson Advances in Neural Information Processing Systems 33, 10371-10382, 2020 | 52 | 2020 |

Near-optimal entrywise sampling for data matrices D Achlioptas, ZS Karnin, E Liberty Advances in Neural Information Processing Systems 26, 2013 | 50 | 2013 |

Discrepancy, coresets, and sketches in machine learning Z Karnin, E Liberty Conference on Learning Theory, 1975-1993, 2019 | 48 | 2019 |

Threading machine generated email N Ailon, ZS Karnin, E Liberty, Y Maarek Proceedings of the sixth ACM international conference on Web search and data …, 2013 | 48 | 2013 |