Erez Shmueli
Erez Shmueli
Associate Professor, Tel-Aviv University
Подтвержден адрес электронной почты в домене tau.ac.il - Главная страница
A review on fairness in machine learning
D Pessach, E Shmueli
ACM Computing Surveys (CSUR) 55 (3), 1-44, 2022
openpds: Protecting the privacy of metadata through safeanswers
YA De Montjoye, E Shmueli, SS Wang, AS Pentland
PloS one 9 (7), e98790, 2014
Employees recruitment: A prescriptive analytics approach via machine learning and mathematical programming
D Pessach, G Singer, D Avrahami, HC Ben-Gal, E Shmueli, I Ben-Gal
Decision Support Systems 134, 113290, 2020
Algorithmic fairness
D Pessach, E Shmueli
Machine Learning for Data Science Handbook: Data Mining and Knowledge …, 2023
Structure preserving database encryption method and system
Y Elovici, R Waisenberg, E Shmueli
US Patent 8,639,947, 2014
The strength of the strongest ties in collaborative problem solving
YA De Montjoye, A Stopczynski, E Shmueli, A Pentland, S Lehmann
Scientific reports 4 (1), 5277, 2014
Care to comment? Recommendations for commenting on news stories
E Shmueli, A Kagian, Y Koren, R Lempel
Proceedings of the 21st international conference on World Wide Web, 429-438, 2012
Database encryption: an overview of contemporary challenges and design considerations
E Shmueli, R Vaisenberg, Y Elovici, C Glezer
ACM SIGMOD Record 38 (3), 29-34, 2010
Sensing, understanding, and shaping social behavior
E Shmueli, VK Singh, B Lepri, A Pentland
IEEE Transactions on Computational Social Systems 1 (1), 22-34, 2014
Are you your friends’ friend? Poor perception of friendship ties limits the ability to promote behavioral change
A Almaatouq, L Radaelli, A Pentland, E Shmueli
PloS one 11 (3), e0151588, 2016
The privacy implications of cyber security systems: A technological survey
E Toch, C Bettini, E Shmueli, L Radaelli, A Lanzi, D Riboni, B Lepri
ACM Computing Surveys (CSUR) 51 (2), 1-27, 2018
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15, 475-491, 2016
Designing secure indexes for encrypted databases
E Shmueli, R Waisenberg, Y Elovici, E Gudes
Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working …, 2005
A structure preserving database encryption scheme
Y Elovici, R Waisenberg, E Shmueli, E Gudes
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada …, 2004
The role of personality in shaping social networks and mediating behavioral change
B Lepri, J Staiano, E Shmueli, F Pianesi, A Pentland
User Modeling and User-Adapted Interaction 26, 143-175, 2016
Limiting disclosure of sensitive data in sequential releases of databases
E Shmueli, T Tassa, R Wasserstein, B Shapira, L Rokach
Information Sciences 191, 98-127, 2012
Structural entropy: monitoring correlation-based networks over time with application to financial markets
A Almog, E Shmueli
Scientific reports 9 (1), 10832, 2019
Twitter: who gets caught? observed trends in social micro-blogging spam
A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ...
Proceedings of the 2014 ACM conference on Web science, 33-41, 2014
Implementing a database encryption solution, design and implementation issues
E Shmueli, R Vaisenberg, E Gudes, Y Elovici
Computers & security 44, 33-50, 2014
Air-writing recognition using smart-bands
T Yanay, E Shmueli
Pervasive and Mobile Computing 66, 101183, 2020
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20