Bracha Shapira

According to our database1, Bracha Shapira authored at least 150 papers between 1995 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Analyzing movement predictability using human attributes and behavioral patterns.
Comput. Environ. Urban Syst., 2021

The next best question: a lazy, anytime framework for adaptive feature acquisition.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
Evolving Context-Aware Recommender Systems With Users in Mind.
CoRR, 2020

A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach.
CoRR, 2020

Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate.
CoRR, 2020

Automatic Machine Learning Derived from Scholarly Big Data.
CoRR, 2020

Sequence Preserving Network Traffic Generation.
CoRR, 2020

Product Bundle Identification using Semi-Supervised Learning.
Proceedings of the 43rd International ACM SIGIR conference on research and development in Information Retrieval, 2020

Post-hoc Explanations for Complex Model Recommendations using Simple Methods.
Proceedings of the 7th Joint Workshop on Interfaces and Human Decision Making for Recommender Systems co-located with 14th ACM Conference on Recommender Systems (RecSys 2020), 2020

Using Bandits for Effective Database Activity Monitoring.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Crime Linkage Based on Textual Hebrew Police Reports Utilizing Behavioral Patterns.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

2019
Clustering Wi-Fi fingerprints for indoor-outdoor detection.
Wirel. Networks, 2019

Implicit dimension identification in user-generated text with LSTM networks.
Inf. Process. Manag., 2019

A difficulty ranking approach to personalization in E-learning.
Int. J. Hum. Comput. Stud., 2019

Choosing the right word: Using bidirectional LSTM tagger for writing support systems.
Eng. Appl. Artif. Intell., 2019

Diversifying Database Activity Monitoring with Bandits.
CoRR, 2019

Deep Context-Aware Recommender System Utilizing Sequential Latent Context.
CoRR, 2019

Assessing the Quality of Scientific Papers.
CoRR, 2019

New Item Consumption Prediction Using Deep Learning.
CoRR, 2019

Online Budgeted Learning for Classifier Induction.
CoRR, 2019

Personal Dynamic Cost-Aware Sensing for Latent Context Detection.
CoRR, 2019

Detecting drug-drug interactions using artificial neural networks and classic graph similarity measures.
CoRR, 2019

Explaining Anomalies Detected by Autoencoders Using SHAP.
CoRR, 2019

Are All Rejected Recommendations Equally Bad?: Towards Analysing Rejected Recommendations.
Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization, 2019

NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

AutoGRD: Model Recommendation Through Graphical Dataset Representation.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Social Search.
Proceedings of the Social Information Access - Systems and Technologies, 2018

The Dagstuhl Perspectives Workshop on Performance Modeling and Prediction.
SIGIR Forum, 2018

Inferring contextual preferences using deep encoder-decoder learners.
New Rev. Hypermedia Multim., 2018

From Evaluating to Forecasting Performance: How to Turn Information Retrieval, Natural Language Processing and Recommender Systems into Predictive Sciences (Dagstuhl Perspectives Workshop 17442).
Dagstuhl Manifestos, 2018

Wikibook-Bot - Automatic Generation of a Wikipedia Book.
CoRR, 2018

Identifying Informational vs. Conversational Questions on Community Question Answering Archives.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

Predict Demographic Information Using Word2vec on Spatial Trajectories.
Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization, 2018

From Royals to Vegans: Characterizing Question Trolling on a Community Question Answering Website.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018

DLRS 2018: third workshop on deep learning for recommender systems.
Proceedings of the 12th ACM Conference on Recommender Systems, 2018

Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Analysis of Attack Graph Representations for Ranking Vulnerability Fixes.
Proceedings of the GCAI-2018, 2018

Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

A Hybrid Approach for Automatic Model Recommendation.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Evaluation of a Design Method for Graph Database.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2018

2017
Anomaly detection for smartphone data streams.
Pervasive Mob. Comput., 2017

Modeling Graph Database Schema.
IT Prof., 2017

Predicting Relevance Scores for Triples from Type-Like Relations using Neural Embedding - The Cabbage Triple Scorer at WSDM Cup 2017.
CoRR, 2017

Sampling High Throughput Data for Anomaly Detection of Data-Base Activity.
CoRR, 2017

Inferring Contextual Preferences Using Deep Auto-Encoding.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017

User Verification on Mobile Devices Using Sequences of Touch Gestures.
Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 2017

DLRS 2017: Second Workshop on Deep Learning for Recommender Systems.
Proceedings of the Eleventh ACM Conference on Recommender Systems, 2017

Attack Graph Obfuscation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Scalable Attack Path Finding for Increased Security.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Anytime Algorithms for Recommendation Service Providers.
ACM Trans. Intell. Syst. Technol., 2016

Towards latent context-aware recommendation systems.
Knowl. Based Syst., 2016

Utilizing transfer learning for in-domain collaborative filtering.
Knowl. Based Syst., 2016

Recommender systems for product bundling.
Knowl. Based Syst., 2016

Reducing preference elicitation in group decision making.
Expert Syst. Appl., 2016

An ensemble method for top-N recommendations from the SVD.
Expert Syst. Appl., 2016

Language Models with GloVe Word Embeddings.
CoRR, 2016

Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis.
Proceedings of the 2016 IEEE International Conference on Software Science, 2016

Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories.
Proceedings of the Poster Track of the 10th ACM Conference on Recommender Systems (RecSys 2016), 2016

RecSys'16 Workshop on Deep Learning for Recommender Systems (DLRS).
Proceedings of the 10th ACM Conference on Recommender Systems, 2016

CyberRank: Knowledge Elicitation for Risk Assessment of Database Security.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

Scalable attack propagation model and algorithms for honeypot systems.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

2015
Recommender Systems: Introduction and Challenges.
Proceedings of the Recommender Systems Handbook, 2015

ConSent: Context-based sentiment analysis.
Knowl. Based Syst., 2015

Enabling Complex Wikipedia Queries - Technical Report.
CoRR, 2015

JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains.
Proceedings of the Eighth Annual Symposium on Combinatorial Search, 2015

Exploiting Wikipedia for Information Retrieval Tasks.
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015

In-House Solution for the RecSys Challenge 2015.
Proceedings of the 2015 International ACM Recommender Systems Challenge, 2015

"Please, Not Now!": A Model for Timing Recommendations.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

RecSys Challenge 2015 and the YOOCHOOSE Dataset.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

Sentiment Analysis in Transcribed Utterances.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Theoretical Categorization of Query Performance Predictors.
Proceedings of the 2015 International Conference on The Theory of Information Retrieval, 2015

Fast Item-Based Collaborative Filtering.
Proceedings of the ICAART 2015, 2015

Unknown malware detection using network traffic classification.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Leak Sinks: The Threat of Targeted Social Eavesdropping.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
CoBAn: A context based model for data leakage prevention.
Inf. Sci., 2014

Reaching a joint decision with minimal elicitation of voter preferences.
Inf. Sci., 2014

Mobile malware detection through analysis of deviations in application network behavior.
Comput. Secur., 2014

Wikipedia-based query performance prediction.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

Preference elicitation for narrowing the recommended list for groups.
Proceedings of the Eighth ACM Conference on Recommender Systems, 2014

Contexto: lessons learned from mobile context inference.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

EduRank: A Collaborative Filtering Approach to Personalization in E-learning.
Proceedings of the 7th International Conference on Educational Data Mining, 2014

2013
Facebook single and cross domain data for recommendation systems.
User Model. User Adapt. Interact., 2013

Exploiting label dependencies for improved sample complexity.
Mach. Learn., 2013

Investigating confidence displays for top-<i>N</i> recommendations.
J. Assoc. Inf. Sci. Technol., 2013

Content-based data leakage detection using extended fingerprinting
CoRR, 2013

Highlighting items as means of adaptive assistance.
Behav. Inf. Technol., 2013

Recommending insurance riders.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Using geospatial metadata to boost collaborative filtering.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Ensemble of Feature Chains for Anomaly Detection.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013

Improving Simple Collaborative Filtering Models Using Ensemble Methods.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013

Nesto - Network selection and traffic offloading system for android mobile devices.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

MATE: a mobile analysis tool for usability experts.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Attribute-Driven Hidden Markov Model Trees for Intention Prediction.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Limiting disclosure of sensitive data in sequential releases of databases.
Inf. Sci., 2012

Social Network Based Search for Experts
CoRR, 2012

Using Wikipedia to Boost SVD Recommender Systems
CoRR, 2012

Boosting Simple Collaborative Filtering Models Using Ensemble Methods
CoRR, 2012

Detection of Deviations in Mobile Applications Network Behavior
CoRR, 2012

Introducing diversity among the models of multi-label classification ensemble.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012

TALMUD: transfer learning for multiple domains.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Predicting Student Exam's Scores by Analyzing Social Network Data.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2011
Introduction to Recommender Systems Handbook.
Proceedings of the Recommender Systems Handbook, 2011

Personalized search: Integrating collaboration and social networks.
J. Assoc. Inf. Sci. Technol., 2011

Using Wikipedia to boost collaborative filtering techniques.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011

Recommenders benchmark framework.
Proceedings of the 2011 ACM Conference on Recommender Systems, 2011

Meta-learning for Selecting a Multi-label Classification Algorithm.
Proceedings of the Data Mining Workshops (ICDMW), 2011

2010
Efficient Multidimensional Suppression for K-Anonymity.
IEEE Trans. Knowl. Data Eng., 2010

Ontological content-based filtering for personalised newspapers: A method and its evaluation.
Online Inf. Rev., 2010

Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS).
J. Assoc. Inf. Sci. Technol., 2010

A Theory-Driven Design Framework for Social Recommender Systems.
J. Assoc. Inf. Syst., 2010

Iterative voting under uncertainty for group recommender systems.
Proceedings of the 2010 ACM Conference on Recommender Systems, 2010

Personalized Knowledge Service Based on Smart Cell-Phone Usage: A Conceptual Framework.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
A decision theoretic approach to combining information filtering.
Online Inf. Rev., 2009

<i>ePaper</i>: A personalized mobile newspaper.
J. Assoc. Inf. Sci. Technol., 2009

Improving Social Recommender Systems.
IT Prof., 2009

2008
Evaluation of an ontology-content based filtering method for a personalized newspaper.
Proceedings of the 2008 ACM Conference on Recommender Systems, 2008

kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity.
Proceedings of the Protecting Persons While Protecting the People, 2008

All the news that's fit to e-ink.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
MarCol: A Market-Based Recommender System.
IEEE Intell. Syst., 2007

2006
Cluster-analysis attack against a PRivAte Web solution (PRAW).
Online Inf. Rev., 2006

Study of Effectiveness of Implicit Indicators and Their Optimal Combination for Accurate Inference of Users Interests.
J. Digit. Inf. Manag., 2006

A decision theoretic approach to combining information filters: An analytical and empirical evaluation.
J. Assoc. Inf. Sci. Technol., 2006

Study of the usefulness of known and new implicit indicators and their optimal combination for accurate inference of users interests.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

2005
A Content-Based Model for Web-Monitoring.
Proceedings of the Fighting Terror in Cyberspace, 2005

Subjective and objective evaluation of interactive and automatic query expansion.
Online Inf. Rev., 2005

PRAW - A PRivAcy model for the Web.
J. Assoc. Inf. Sci. Technol., 2005

Enhancing customer privacy while searching for products and services on the world wide web.
Internet Res., 2005

Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).
Proceedings of the Intelligence and Security Informatics, 2005

2004
Evaluation of the real and perceived value of automatic and interactive query expansion.
Proceedings of the SIGIR 2004: Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2004

Terrorist Detection System.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

2003
Stereotype-based Versus Personal-based Filtering Rules in Information Filtering Systems.
J. Assoc. Inf. Sci. Technol., 2003

Using the Information Structure Model to Compare Profile-Based Information Filtering Systems.
Inf. Retr., 2003

Privacy Preservation Improvement by Learning Optimal Profile Generation Rate.
Proceedings of the User Modeling 2003, 2003

Content-Based Methodology for Anomaly Detection on the Web.
Proceedings of the Web Intelligence, 2003

2002
A new privacy model for hiding group interests while accessing the Web.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

A New Privacy Model for Web Surfing.
Proceedings of the Next Generation Information Technologies and Systems, 2002

2001
Information Filtering: Overview of Issues, Research and Systems.
User Model. User Adapt. Interact., 2001

The effect of extrinsic motivation on user behavior in a collaborative information finding system.
J. Assoc. Inf. Sci. Technol., 2001

Automatic keyword identification by artificial neural networks compared to manual identification by users of filtering systems.
Inf. Process. Manag., 2001

2000
Enabling technologies: capturing human intelligence in the Net.
Commun. ACM, 2000

Information Filtering and Automatic Keyword Identification by Artificial Neural Networks.
Proceedings of the 8th European Conference on Information Systems, 2000

1999
Experimentation with an information filtering system that combines cognitive and sociological filtering integrated with user stereotypes.
Decis. Support Syst., 1999

Strategies for Filtering E-mail Messages Combining Content-Based and Sociological Filtering with User-Stereotypes.
Proceedings of the Next Generation Information Technologies and Systems, 1999

1997
Information Filtering: A New Two-Phase Model Using Stereotypic User Profiling.
J. Intell. Inf. Syst., 1997

Stereotypes in Information Filtering Systems.
Inf. Process. Manag., 1997

1995
Hypertext Browsing: A New Model Based on Hypergraph's Dynamic Construction and Data Analysis Methods.
Proceedings of the Next Generation Information Technologies and Systems (NGITS '95), 1995


  Loading...