Aviad Elyashar

Orcid: 0000-0002-0918-0146

According to our database1, Aviad Elyashar authored at least 26 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Automated photo filtering for tourism domain using deep and active learning: the case of Israeli and worldwide cities on instagram.
J. Inf. Technol. Tour., September, 2024

Assessment and manipulation of latent constructs in pre-trained language models using psychometric scales.
CoRR, 2024

Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring.
CoRR, 2024

Enhancing Energy Sector Resilience: Integrating Security by Design Principles.
CoRR, 2024

OSSIntegrity: Collaborative open-source code integrity verification.
Comput. Secur., 2024

Secure Crowdsource-Based Open-Source Code Verification (SC)^2V.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

SMART: Serverless Module Analysis and Recognition Technique for Managed Applications.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees.
IEEE Trans. Knowl. Data Eng., 2023

Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Iterative query selection for opaque search engines with pseudo relevance feedback.
Expert Syst. Appl., 2022

Detecting Clickbait in Online Social Media: You Won't Believe How We Did It.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
How does that name sound? Name representation learning using accent-specific speech generation.
Knowl. Based Syst., 2021

Learning Centrality by Learning to Route.
Proceedings of the Complex Networks & Their Applications X - Volume 1, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021

2020
Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback.
CoRR, 2020

How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning.
CoRR, 2020

The Chameleon Attack: Manipulating Content Display in Online Social Media.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

2019
It Runs in the Family: Searching for Similar Names using Digitized Family Trees.
CoRR, 2019

2017
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.
IEEE Trans. Comput. Soc. Syst., 2017

Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media.
CoRR, 2017

Measurement of Online Discussion Authenticity within Online Social Media.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
The Security of Organizations and Individuals in Online Social Networks.
CoRR, 2016

Guided socialbots: Infiltrating the social networks of specific organizations' employees.
AI Commun., 2016

2014
Friend or foe? Fake profile identification in online social networks.
Soc. Netw. Anal. Min., 2014

2013
Facebook Applications' Installation and Removal: A Temporal Analysis.
CoRR, 2013

Homing socialbots: intrusion on a specific organization's employee using Socialbots.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Organizational Intrusion: Organization Mining Using Socialbots.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012


  Loading...