default search action
Erez Shmueli
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Dana Pessach, Tamir Tassa, Erez Shmueli:
Fairness-Driven Private Collaborative Machine Learning. ACM Trans. Intell. Syst. Technol. 15(2): 27:1-27:30 (2024) - 2023
- [j32]Dana Pessach, Erez Shmueli:
A Review on Fairness in Machine Learning. ACM Comput. Surv. 55(3): 51:1-51:44 (2023) - [j31]Florimond Houssiau, Piotr Sapiezynski, Laura Radaelli, Erez Shmueli, Yves-Alexandre de Montjoye:
Detrimental network effects in privacy: A graph-theoretic model for node-based intrusions. Patterns 4(1): 100662 (2023) - 2022
- [j30]Talia Kaufmann, Laura Radaelli, Luís M. A. Bettencourt, Erez Shmueli:
Scaling of urban amenities: generative statistics and implications for urban planning. EPJ Data Sci. 11(1): 50 (2022) - [j29]Shahar Somin, Yaniv Altshuler, Alex 'Sandy' Pentland, Erez Shmueli:
Remaining popular: power-law regularities in network dynamics. EPJ Data Sci. 11(1): 61 (2022) - [j28]Grace Guan, Merav Mofaz, Gary Qian, Tal Patalon, Erez Shmueli, Dan Yamin, Margaret L. Brandeau:
Higher sensitivity monitoring of reactions to COVID-19 vaccination using smartwatches. npj Digit. Medicine 5 (2022) - [j27]Tomer Lev, Irad Ben-Gal, Erez Shmueli:
Influence Maximization Through Scheduled Seeding in a Real-World Setting. IEEE Trans. Comput. Soc. Syst. 9(2): 494-507 (2022) - 2021
- [j26]Tomer Lev, Erez Shmueli:
State-based targeted vaccination. Appl. Netw. Sci. 6(1): 6 (2021) - [j25]Dana Pessach, Erez Shmueli:
Improving fairness of artificial intelligence algorithms in Privileged-Group Selection Bias data settings. Expert Syst. Appl. 185: 115667 (2021) - [i12]Marcelo Bacher, Irad Ben-Gal, Erez Shmueli:
A Non-Parametric Subspace Analysis Approach with Application to Anomaly Detection Ensembles. CoRR abs/2101.04932 (2021) - [i11]Dana Pessach, Tamir Tassa, Erez Shmueli:
Fairness-Driven Private Collaborative Machine Learning. CoRR abs/2109.14376 (2021) - [i10]Yonatan Hadar, Erez Shmueli:
Categorizing Items with Short and Noisy Descriptions using Ensembled Transferred Embeddings. CoRR abs/2110.11431 (2021) - 2020
- [j24]Lihi Dery, Erez Shmueli:
BoostLR: A Boosting-Based Learning Ensemble for Label Ranking Tasks. IEEE Access 8: 176023-176032 (2020) - [j23]Dana Pessach, Gonen Singer, Dan Avrahami, Hila Chalutz Ben-Gal, Erez Shmueli, Irad Ben-Gal:
Employees recruitment: A prescriptive analytics approach via machine learning and mathematical programming. Decis. Support Syst. 134: 113290 (2020) - [j22]Itzik Mazeh, Erez Shmueli:
A personal data store approach for recommender systems: enhancing privacy without sacrificing accuracy. Expert Syst. Appl. 139 (2020) - [j21]Tomer Yanay, Erez Shmueli:
Air-writing recognition using smart-bands. Pervasive Mob. Comput. 66: 101183 (2020) - [j20]Erez Shmueli, Tamir Tassa:
Mediated Secure Multi-Party Protocols for Collaborative Filtering. ACM Trans. Intell. Syst. Technol. 11(2): 15:1-15:25 (2020) - [i9]Lihi Dery, Erez Shmueli:
Improving Label Ranking Ensembles using Boosting Techniques. CoRR abs/2001.07744 (2020) - [i8]Dana Pessach, Erez Shmueli:
Algorithmic Fairness. CoRR abs/2001.09784 (2020) - [i7]Shahar Somin, Goren Gordon, Alex Pentland, Erez Shmueli, Yaniv Altshuler:
ERC20 Transactions over Ethereum Blockchain: Network Analysis and Predictions. CoRR abs/2004.08201 (2020)
2010 – 2019
- 2019
- [j19]Havi Werbin-Ofir, Lihi Dery, Erez Shmueli:
Beyond majority: Label ranking ensembles based on voting rules. Expert Syst. Appl. 136: 50-61 (2019) - 2018
- [j18]Eran Toch, Claudio Bettini, Erez Shmueli, Laura Radaelli, Andrea Lanzi, Daniele Riboni, Bruno Lepri:
The Privacy Implications of Cyber Security Systems: A Technological Survey. ACM Comput. Surv. 51(2): 36:1-36:27 (2018) - [j17]Xiaowen Dong, Joachim Meyer, Erez Shmueli, Burçin Bozkaya, Alex Pentland:
Methods for quantifying effects of social unrest using credit card transaction data. EPJ Data Sci. 7(1): 8 (2018) - [j16]Alon Sela, Dmitri Goldenberg, Irad Ben-Gal, Erez Shmueli:
Active viral marketing: Incorporating continuous active seeding efforts into the diffusion model. Expert Syst. Appl. 107: 45-60 (2018) - [j15]Alona Levy, Ben Nassi, Yuval Elovici, Erez Shmueli:
Handwritten Signature Verification Using Wrist-Worn Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 119:1-119:26 (2018) - [j14]Dmitri Goldenberg, Alon Sela, Erez Shmueli:
Timing Matters: Influence Maximization in Social Networks Through Scheduled Seeding. IEEE Trans. Comput. Soc. Syst. 5(3): 621-638 (2018) - [i6]Laura Radaelli, Piotr Sapiezynski, Florimond Houssiau, Erez Shmueli, Yves-Alexandre de Montjoye:
Quantifying Surveillance in the Networked Age: Node-based Intrusions and Group Privacy. CoRR abs/1803.09007 (2018) - 2017
- [j13]Yehoshua Shuki Cohen, Erez Shmueli:
Money Drives: Can Monetary Incentives based on Real-Time Monitoring Improve Driving Behavior? Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4): 131:1-131:22 (2017) - [j12]Amit K. Chopra, Erez Shmueli, Vivek K. Singh:
Introduction to the Special Issue on Advances in Social Computing. ACM Trans. Internet Techn. 17(2): 11:1-11:2 (2017) - [c17]Marcelo Bacher, Irad Ben-Gal, Erez Shmueli:
An Information Theory Subspace Analysis Approach with Application to Anomaly Detection Ensembles. KDIR 2017: 27-39 - [c16]Erez Shmueli, Tamir Tassa:
Secure Multi-Party Protocols for Item-Based Collaborative Filtering. RecSys 2017: 89-97 - [i5]Alon Sela, Dmitri Goldenberg, Irad Ben-Gal, Erez Shmueli:
Latent Viral Marketing, Concepts and Control Methods. CoRR abs/1704.01775 (2017) - 2016
- [j11]Abdullah Almaatouq, Erez Shmueli, Mariam Nouh, Ahmad Alabdulkareem, Vivek K. Singh, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex 'Sandy' Pentland:
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int. J. Inf. Sec. 15(5): 475-491 (2016) - [j10]Asaf Shabtai, Maya Bercovitch, Lior Rokach, Ya'akov (Kobi) Gal, Yuval Elovici, Erez Shmueli:
Behavioral Study of Users When Interacting with Active Honeytokens. ACM Trans. Inf. Syst. Secur. 18(3): 9:1-9:21 (2016) - [j9]Bruno Lepri, Jacopo Staiano, Erez Shmueli, Fabio Pianesi, Alex Pentland:
The role of personality in shaping social networks and mediating behavioral change. User Model. User Adapt. Interact. 26(2-3): 143-175 (2016) - [c15]Alon Sela, Dmitri Goldenberg, Erez Shmueli, Irad Ben-Gal:
Scheduled seeding for latent viral marketing. ASONAM 2016: 642-643 - [c14]Abdullah Almaatouq, Laura Radaelli, Alex Pentland, Erez Shmueli:
The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change. SBP-BRiMS 2016: 33-41 - [i4]Peter M. Krafft, Julia Zheng, Wei Pan, Nicolás Della Penna, Yaniv Altshuler, Erez Shmueli, Joshua B. Tenenbaum, Alex Pentland:
Human collective intelligence as distributed Bayesian inference. CoRR abs/1608.01987 (2016) - [i3]Abdullah Almaatouq, Laura Radaelli, Alex Pentland, Erez Shmueli:
The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change. CoRR abs/1610.03901 (2016) - [i2]Ben Nassi, Alona Levy, Yuval Elovici, Erez Shmueli:
Handwritten Signature Verification Using Hand-Worn Devices. CoRR abs/1612.06305 (2016) - 2015
- [j8]Erez Shmueli, Tamir Tassa:
Privacy by diversity in sequential releases of databases. Inf. Sci. 298: 344-372 (2015) - [c13]Alon Sela, Irad Ben-Gal, Alex Pentland, Erez Shmueli:
Improving Information Spread through a Scheduled Seeding Approach. ASONAM 2015: 629-632 - [c12]Erez Shmueli, Itzik Mazeh, Laura Radaelli, Alex Pentland, Yaniv Altshuler:
Ride Sharing: A Network Perspective. SBP 2015: 434-439 - 2014
- [j7]Erez Shmueli, Ronen Vaisenberg, Ehud Gudes, Yuval Elovici:
Implementing a database encryption solution, design and implementation issues. Comput. Secur. 44: 33-50 (2014) - [j6]Mark Last, Tamir Tassa, Alexandra Zhmudyak, Erez Shmueli:
Improving accuracy of classification models induced from anonymized datasets. Inf. Sci. 256: 138-161 (2014) - [j5]Erez Shmueli, Tomer Zrihen, Ran Yahalom, Tamir Tassa:
Constrained obfuscation of relational databases. Inf. Sci. 286: 35-62 (2014) - [j4]Erez Shmueli, Vivek K. Singh, Bruno Lepri, Alex Pentland:
Sensing, Understanding, and Shaping Social Behavior. IEEE Trans. Comput. Soc. Syst. 1(1): 22-34 (2014) - [j3]Yaniv Altshuler, Erez Shmueli, Guy Zyskind, Oren Lederman, Nuria Oliver, Alex Pentland:
Campaign Optimization Through Behavioral Modeling and Mobile Network Analysis. IEEE Trans. Comput. Soc. Syst. 1(2): 121-134 (2014) - [c11]Mariam Nouh, Abdullah Almaatouq, Ahmad Alabdulkareem, Vivek K. Singh, Erez Shmueli, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland:
Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior. HCI (24) 2014: 352-360 - [c10]Erez Shmueli, Yaniv Altshuler, Alex Pentland:
Temporal Dynamics of Scale-Free Networks. SBP 2014: 359-366 - [c9]Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K. Singh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland:
Twitter: who gets caught? observed trends in social micro-blogging spam. WebSci 2014: 33-41 - [i1]Peter M. Krafft, Julia Zheng, Erez Shmueli, Nicolás Della Penna, Joshua B. Tenenbaum, Sandy Pentland:
Popularity and Performance: A Large-Scale Study. CoRR abs/1406.7729 (2014) - 2013
- [c8]Yaniv Altshuler, Michael Fire, Erez Shmueli, Yuval Elovici, Alfred M. Bruckstein, Alex Pentland, David Lazer:
Detecting Anomalous Behaviors Using Structural Properties of Social Networks. SBP 2013: 433-440 - 2012
- [j2]Erez Shmueli, Tamir Tassa, Raz Wasserstein, Bracha Shapira, Lior Rokach:
Limiting disclosure of sensitive data in sequential releases of databases. Inf. Sci. 191: 98-127 (2012) - [c7]Erez Shmueli, Amit Kagian, Yehuda Koren, Ronny Lempel:
Care to comment?: recommendations for commenting on news stories. WWW 2012: 429-438 - 2011
- [c6]Boris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli:
Tracking end-users in web databases. NSS 2011: 105-112 - [c5]Nurit Gal-Oz, Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli:
Mining Roles from Web Application Usage Patterns. TrustBus 2011: 125-137 - 2010
- [c4]Ran Yahalom, Erez Shmueli, Tomer Zrihen:
Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach. Secure Data Management 2010: 41-53
2000 – 2009
- 2009
- [j1]Erez Shmueli, Ronen Vaisenberg, Yuval Elovici, Chanan Glezer:
Database encryption: an overview of contemporary challenges and design considerations. SIGMOD Rec. 38(3): 29-34 (2009) - [c3]Erez Shmueli, Alexander Kruglov, Rami Puzis, Yuval Elovici, Roman Englert, Chanan Glezer:
An Attentive Digital Signage System. MuC (Workshopband) 2009: 10-15 - 2005
- [c2]Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes:
Designing Secure Indexes for Encrypted Databases. DBSec 2005: 54-68 - 2004
- [c1]Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes:
A Structure Preserving Database Encryption Scheme. Secure Data Management 2004: 28-40
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint