Michael Fire

Orcid: 0000-0002-6075-2568

According to our database1, Michael Fire authored at least 53 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Zooming Into Video Conferencing Privacy.
IEEE Trans. Comput. Soc. Syst., February, 2024

2023
Open framework for analyzing public parliaments data.
J. Big Data, December, 2023

Co-Membership-based Generic Anomalous Communities Detection.
Neural Process. Lett., October, 2023

Malicious source code detection using a translation model.
Patterns, July, 2023

A supervised machine learning model for imputing missing boarding stops in smart card data.
Public Transp., June, 2023

It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees.
IEEE Trans. Knowl. Data Eng., 2023

Analyzing Key Users' behavior trends in Volunteer-Based Networks.
CoRR, 2023

Short Run Transit Route Planning Decision Support System Using a Deep Learning-Based Weighted Graph.
CoRR, 2023

Interruptions detection in video conferences.
CoRR, 2023

Large-Scale Shill Bidder Detection in E-commerce.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023

Zooming into Abnormal Events in Video Conferencing.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Malicious Source Code Detection Using Transformer.
CoRR, 2022

Ethnic Representation Analysis of Commercial Movie Posters.
CoRR, 2022

Trends in computer science research within European countries.
Commun. ACM, 2022

CompanyName2Vec: Company Entity Matching based on Job Ads.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

2021
How does that name sound? Name representation learning using accent-specific speech generation.
Knowl. Based Syst., 2021

Automatic Large Scale Detection of Red Palm Weevil Infestation using Aerial and Street View Images.
CoRR, 2021

2020
The rise and fall of network stars: Analyzing 2.5 million graphs to reveal how high-degree vertices emerge over time.
Inf. Process. Manag., 2020

Zooming Into Video Conferencing Privacy and Security Threats.
CoRR, 2020

How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning.
CoRR, 2020

Imputing Missing Boarding Stations With Machine Learning Methods.
CoRR, 2020

Using Data Mining for Infrastructure and Safety Violations Discovery in Cities.
Proceedings of the IEEE International Smart Cities Conference, 2020

Imputation of Missing Boarding Stop Information in Smart Card Data with Machine Learning Methods.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2020, 2020

2019
It Runs in the Family: Searching for Similar Names using Digitized Family Trees.
CoRR, 2019

Using Data Science to Understand the Film Industry's Gender Gap.
CoRR, 2019

2018
Generic anomalous vertices detection utilizing a link prediction algorithm.
Soc. Netw. Anal. Min., 2018

Over-Optimization of Academic Publishing Metrics: Observing Goodhart's Law in Action.
CoRR, 2018

2017
The Rise and Fall of Network Stars.
CoRR, 2017

Exploring Online Ad Images Using a Deep Convolutional Neural Network Approach.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

2016
Matching entities across online social networks.
Neurocomputing, 2016

Unsupervised Anomalous Vertices Detection Utilizing Link Prediction Algorithms.
CoRR, 2016

Analyzing Complex Network User Arrival Patterns and Their Effect on Network Topologies.
CoRR, 2016

Guided socialbots: Infiltrating the social networks of specific organizations' employees.
AI Commun., 2016

2015
Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population.
ACM Trans. Intell. Syst. Technol., 2015

2014
Friend or foe? Fake profile identification in online social networks.
Soc. Netw. Anal. Min., 2014

Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Sci. Eng. Ethics, 2014

Quantitative Analysis of Genealogy Using Digitised Family Trees.
CoRR, 2014

Online Social Networks: Threats and Solutions.
IEEE Commun. Surv. Tutorials, 2014

2013
Computationally efficient link prediction in a variety of social networks.
ACM Trans. Intell. Syst. Technol., 2013

Online Social Networks: Threats and Solutions Survey
CoRR, 2013

Organization Mining Using Online Social Networks
CoRR, 2013

Facebook Applications' Installation and Removal: A Temporal Analysis.
CoRR, 2013

Ethical Considerations when Employing Fake Identities in OSN for Research.
CoRR, 2013

Entity Matching in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Detecting Anomalous Behaviors Using Structural Properties of Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Trade-Offs in Social and Behavioral Modeling in Mobile Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Homing socialbots: intrusion on a specific organization's employee using Socialbots.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Social Network Based Search for Experts
CoRR, 2012

Organizational Intrusion: Organization Mining Using Socialbots.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data.
Proceedings of the 2012 International Conference on Privacy, 2012

How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage.
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012

Predicting Student Exam's Scores by Analyzing Social Network Data.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2011
Link Prediction in Social Networks Using Computationally Efficient Topological Features.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011


  Loading...