Almost optimal exploration in multi-armed bandits Z Karnin, T Koren, O Somekh International Conference on Machine Learning, 1238-1246, 2013 | 385 | 2013 |

Reducing dueling bandits to cardinal bandits N Ailon, Z Karnin, T Joachims International Conference on Machine Learning, 856-864, 2014 | 101 | 2014 |

Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in ZS Karnin, A Shpilka 2008 23rd Annual IEEE Conference on Computational Complexity, 280-291, 2008 | 101 | 2008 |

Distributed exploration in multi-armed bandits E Hillel, ZS Karnin, T Koren, R Lempel, O Somekh Advances in Neural Information Processing Systems 26, 2013 | 86 | 2013 |

Copeland dueling bandits M Zoghi, ZS Karnin, S Whiteson, M De Rijke Advances in neural information processing systems 28, 2015 | 83 | 2015 |

Online principal components analysis C Boutsidis, D Garber, Z Karnin, E Liberty Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete …, 2014 | 75 | 2014 |

Elastic machine learning algorithms in amazon sagemaker E Liberty, Z Karnin, B Xiang, L Rouesnel, B Coskun, R Nallapati, ... Proceedings of the 2020 ACM SIGMOD International Conference on Management of …, 2020 | 73 | 2020 |

How many folders do you really need? classifying email into a handful of categories M Grbovic, G Halawi, Z Karnin, Y Maarek Proceedings of the 23rd ACM International Conference on Conference on …, 2014 | 71 | 2014 |

Optimal quantile approximation in streams Z Karnin, K Lang, E Liberty 2016 ieee 57th annual symposium on foundations of computer science (focs), 71-78, 2016 | 69 | 2016 |

Tabtransformer: Tabular data modeling using contextual embeddings X Huang, A Khetan, M Cvitkovic, Z Karnin arXiv preprint arXiv:2012.06678, 2020 | 66 | 2020 |

Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in ZS Karnin, P Mukhopadhyay, A Shpilka, I Volkovich Proceedings of the forty-second ACM symposium on Theory of computing, 649-658, 2010 | 60 | 2010 |

You've got mail, and here is what you could do with it! analyzing and predicting actions on email messages D Di Castro, Z Karnin, L Lewin-Eytan, Y Maarek Proceedings of the ninth acm international conference on web search and data …, 2016 | 55 | 2016 |

Reconstruction of generalized depth-3 arithmetic circuits with bounded top fan-in ZS Karnin, A Shpilka 2009 24th Annual IEEE Conference on Computational Complexity, 274-285, 2009 | 50 | 2009 |

Optimal dynamic distributed MIS K Censor-Hillel, E Haramaty, Z Karnin Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing …, 2016 | 47 | 2016 |

Threading machine generated email N Ailon, ZS Karnin, E Liberty, Y Maarek Proceedings of the sixth ACM international conference on Web search and data …, 2013 | 47 | 2013 |

Amazon SageMaker Autopilot: a white box AutoML solution at scale P Das, N Ivkin, T Bansal, L Rouesnel, P Gautier, Z Karnin, L Dirac, ... Proceedings of the fourth international workshop on data management for end …, 2020 | 42 | 2020 |

Multi-armed bandits: Competing with optimal sequences ZS Karnin, O Anava Advances in Neural Information Processing Systems 29, 2016 | 42 | 2016 |

Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in ZS Karnin, A Shpilka Combinatorica 31 (3), 333-364, 2011 | 41 | 2011 |

Near-optimal entrywise sampling for data matrices D Achlioptas, ZS Karnin, E Liberty Advances in Neural Information Processing Systems 26, 2013 | 40 | 2013 |

An empirical process approach to the union bound: Practical algorithms for combinatorial and linear bandits J Katz-Samuels, L Jain, KG Jamieson Advances in Neural Information Processing Systems 33, 10371-10382, 2020 | 37 | 2020 |