Erez Shmueli

Orcid: 0000-0003-3193-5768

According to our database1, Erez Shmueli authored at least 60 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Detrimental network effects in privacy: A graph-theoretic model for node-based intrusions.
Patterns, January, 2023

A Review on Fairness in Machine Learning.
ACM Comput. Surv., 2023

2022
Influence Maximization Through Scheduled Seeding in a Real-World Setting.
IEEE Trans. Comput. Soc. Syst., 2022

Higher sensitivity monitoring of reactions to COVID-19 vaccination using smartwatches.
npj Digit. Medicine, 2022

Remaining popular: power-law regularities in network dynamics.
EPJ Data Sci., 2022

Scaling of urban amenities: generative statistics and implications for urban planning.
EPJ Data Sci., 2022

2021
Improving fairness of artificial intelligence algorithms in Privileged-Group Selection Bias data settings.
Expert Syst. Appl., 2021

Categorizing Items with Short and Noisy Descriptions using Ensembled Transferred Embeddings.
CoRR, 2021

Fairness-Driven Private Collaborative Machine Learning.
CoRR, 2021

A Non-Parametric Subspace Analysis Approach with Application to Anomaly Detection Ensembles.
CoRR, 2021

State-based targeted vaccination.
Appl. Netw. Sci., 2021

2020
Mediated Secure Multi-Party Protocols for Collaborative Filtering.
ACM Trans. Intell. Syst. Technol., 2020

Air-writing recognition using smart-bands.
Pervasive Mob. Comput., 2020

A personal data store approach for recommender systems: enhancing privacy without sacrificing accuracy.
Expert Syst. Appl., 2020

Employees recruitment: A prescriptive analytics approach via machine learning and mathematical programming.
Decis. Support Syst., 2020

ERC20 Transactions over Ethereum Blockchain: Network Analysis and Predictions.
CoRR, 2020

Algorithmic Fairness.
CoRR, 2020

Improving Label Ranking Ensembles using Boosting Techniques.
CoRR, 2020

BoostLR: A Boosting-Based Learning Ensemble for Label Ranking Tasks.
IEEE Access, 2020

2019
Beyond majority: Label ranking ensembles based on voting rules.
Expert Syst. Appl., 2019

2018
Timing Matters: Influence Maximization in Social Networks Through Scheduled Seeding.
IEEE Trans. Comput. Soc. Syst., 2018

Handwritten Signature Verification Using Wrist-Worn Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Active viral marketing: Incorporating continuous active seeding efforts into the diffusion model.
Expert Syst. Appl., 2018

Methods for quantifying effects of social unrest using credit card transaction data.
EPJ Data Sci., 2018

The Privacy Implications of Cyber Security Systems: A Technological Survey.
ACM Comput. Surv., 2018

Quantifying Surveillance in the Networked Age: Node-based Intrusions and Group Privacy.
CoRR, 2018

2017
Introduction to the Special Issue on Advances in Social Computing.
ACM Trans. Internet Techn., 2017

Money Drives: Can Monetary Incentives based on Real-Time Monitoring Improve Driving Behavior?
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Latent Viral Marketing, Concepts and Control Methods.
CoRR, 2017

Secure Multi-Party Protocols for Item-Based Collaborative Filtering.
Proceedings of the Eleventh ACM Conference on Recommender Systems, 2017

An Information Theory Subspace Analysis Approach with Application to Anomaly Detection Ensembles.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017

2016
The role of personality in shaping social networks and mediating behavioral change.
User Model. User Adapt. Interact., 2016

Behavioral Study of Users When Interacting with Active Honeytokens.
ACM Trans. Inf. Syst. Secur., 2016

If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts.
Int. J. Inf. Sec., 2016

Handwritten Signature Verification Using Hand-Worn Devices.
CoRR, 2016

Human collective intelligence as distributed Bayesian inference.
CoRR, 2016

The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Scheduled seeding for latent viral marketing.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Privacy by diversity in sequential releases of databases.
Inf. Sci., 2015

Ride Sharing: A Network Perspective.
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015

Improving Information Spread through a Scheduled Seeding Approach.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Sensing, Understanding, and Shaping Social Behavior.
IEEE Trans. Comput. Soc. Syst., 2014

Campaign Optimization Through Behavioral Modeling and Mobile Network Analysis.
IEEE Trans. Comput. Soc. Syst., 2014

Constrained obfuscation of relational databases.
Inf. Sci., 2014

Improving accuracy of classification models induced from anonymized datasets.
Inf. Sci., 2014

Popularity and Performance: A Large-Scale Study.
CoRR, 2014

Implementing a database encryption solution, design and implementation issues.
Comput. Secur., 2014

Twitter: who gets caught? observed trends in social micro-blogging spam.
Proceedings of the ACM Web Science Conference, 2014

Temporal Dynamics of Scale-Free Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014

Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Detecting Anomalous Behaviors Using Structural Properties of Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

2012
Limiting disclosure of sensitive data in sequential releases of databases.
Inf. Sci., 2012

Care to comment?: recommendations for commenting on news stories.
Proceedings of the 21st World Wide Web Conference 2012, 2012

2011
Mining Roles from Web Application Usage Patterns.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

Tracking end-users in web databases.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010

2009
Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Rec., 2009

An Attentive Digital Signage System.
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009

2005
Designing Secure Indexes for Encrypted Databases.
Proceedings of the Data and Applications Security XIX, 2005

2004
A Structure Preserving Database Encryption Scheme.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004


  Loading...