Erez Shmueli
Orcid: 0000-0003-3193-5768
According to our database1,
Erez Shmueli
authored at least 60 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
10
1
2
4
4
8
1
6
3
5
1
6
1
1
2
2
2
3
1
1
2
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Intell. Syst. Technol., April, 2024
2023
Detrimental network effects in privacy: A graph-theoretic model for node-based intrusions.
Patterns, January, 2023
2022
IEEE Trans. Comput. Soc. Syst., 2022
Higher sensitivity monitoring of reactions to COVID-19 vaccination using smartwatches.
npj Digit. Medicine, 2022
Scaling of urban amenities: generative statistics and implications for urban planning.
EPJ Data Sci., 2022
2021
Improving fairness of artificial intelligence algorithms in Privileged-Group Selection Bias data settings.
Expert Syst. Appl., 2021
Categorizing Items with Short and Noisy Descriptions using Ensembled Transferred Embeddings.
CoRR, 2021
A Non-Parametric Subspace Analysis Approach with Application to Anomaly Detection Ensembles.
CoRR, 2021
2020
ACM Trans. Intell. Syst. Technol., 2020
A personal data store approach for recommender systems: enhancing privacy without sacrificing accuracy.
Expert Syst. Appl., 2020
Employees recruitment: A prescriptive analytics approach via machine learning and mathematical programming.
Decis. Support Syst., 2020
CoRR, 2020
IEEE Access, 2020
2019
Expert Syst. Appl., 2019
2018
IEEE Trans. Comput. Soc. Syst., 2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Active viral marketing: Incorporating continuous active seeding efforts into the diffusion model.
Expert Syst. Appl., 2018
EPJ Data Sci., 2018
ACM Comput. Surv., 2018
Quantifying Surveillance in the Networked Age: Node-based Intrusions and Group Privacy.
CoRR, 2018
2017
ACM Trans. Internet Techn., 2017
Money Drives: Can Monetary Incentives based on Real-Time Monitoring Improve Driving Behavior?
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Proceedings of the Eleventh ACM Conference on Recommender Systems, 2017
An Information Theory Subspace Analysis Approach with Application to Anomaly Detection Ensembles.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017
2016
User Model. User Adapt. Interact., 2016
ACM Trans. Inf. Syst. Secur., 2016
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts.
Int. J. Inf. Sec., 2016
The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
2015
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
IEEE Trans. Comput. Soc. Syst., 2014
IEEE Trans. Comput. Soc. Syst., 2014
Inf. Sci., 2014
Comput. Secur., 2014
Proceedings of the ACM Web Science Conference, 2014
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
2012
Inf. Sci., 2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
2011
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
2010
Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach.
Proceedings of the Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, 2010
2009
Database encryption: an overview of contemporary challenges and design considerations.
SIGMOD Rec., 2009
Proceedings of the Workshop-Proceedings der Tagung Mensch & Computer 2009, 2009
2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004