Today's article comes from the PeerJ journal of Computer Science. The authors are Alturayeif et al., from the King Fahd University of Petroleum and Minerals, in Saudi Arabia. In this paper they walk us through strategies we can use to detect a very tricky bug in ML models: data leakage.
You must be an active Journal Club member to access this content. If you're already a member, click the blue button to login. If you're not a member yet, click the sign-up button to get started.
Login to My Account
Sign Up