Erez Shmueli
Cited by
Cited by
openpds: Protecting the privacy of metadata through safeanswers
YA De Montjoye, E Shmueli, SS Wang, AS Pentland
PloS one 9 (7), e98790, 2014
Structure preserving database encryption method and system
Y Elovici, R Waisenberg, E Shmueli
US Patent 8,639,947, 2014
The strength of the strongest ties in collaborative problem solving
YA De Montjoye, A Stopczynski, E Shmueli, A Pentland, S Lehmann
Scientific reports 4 (1), 1-6, 2014
Care to comment? Recommendations for commenting on news stories
E Shmueli, A Kagian, Y Koren, R Lempel
Proceedings of the 21st international conference on World Wide Web, 429-438, 2012
Database encryption: an overview of contemporary challenges and design considerations
E Shmueli, R Vaisenberg, Y Elovici, C Glezer
ACM SIGMOD Record 38 (3), 29-34, 2010
Sensing, understanding, and shaping social behavior
E Shmueli, VK Singh, B Lepri, A Pentland
IEEE Transactions on Computational Social Systems 1 (1), 22-34, 2014
Algorithmic fairness
D Pessach, E Shmueli
arXiv preprint arXiv:2001.09784, 2020
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15 (5), 475-491, 2016
Are you your friends’ friend? Poor perception of friendship ties limits the ability to promote behavioral change
A Almaatouq, L Radaelli, A Pentland, E Shmueli
PloS one 11 (3), e0151588, 2016
Employees recruitment: A prescriptive analytics approach via machine learning and mathematical programming
D Pessach, G Singer, D Avrahami, HC Ben-Gal, E Shmueli, I Ben-Gal
Decision Support Systems 134, 113290, 2020
Designing secure indexes for encrypted databases
E Shmueli, R Waisenberg, Y Elovici, E Gudes
IFIP Annual Conference on Data and Applications Security and Privacy, 54-68, 2005
A structure preserving database encryption scheme
Y Elovici, R Waisenberg, E Shmueli, E Gudes
Workshop on Secure Data Management, 28-40, 2004
The privacy implications of cyber security systems: A technological survey
E Toch, C Bettini, E Shmueli, L Radaelli, A Lanzi, D Riboni, B Lepri
ACM Computing Surveys (CSUR) 51 (2), 1-27, 2018
Limiting disclosure of sensitive data in sequential releases of databases
E Shmueli, T Tassa, R Wasserstein, B Shapira, L Rokach
Information Sciences 191, 98-127, 2012
The role of personality in shaping social networks and mediating behavioral change
B Lepri, J Staiano, E Shmueli, F Pianesi, A Pentland
User Modeling and User-Adapted Interaction 26 (2), 143-175, 2016
Twitter: who gets caught? observed trends in social micro-blogging spam
A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ...
Proceedings of the 2014 ACM conference on Web science, 33-41, 2014
Implementing a database encryption solution, design and implementation issues
E Shmueli, R Vaisenberg, E Gudes, Y Elovici
Computers & security 44, 33-50, 2014
Privacy by diversity in sequential releases of databases
E Shmueli, T Tassa
Information Sciences 298, 344-372, 2015
Improving accuracy of classification models induced from anonymized datasets
M Last, T Tassa, A Zhmudyak, E Shmueli
Information Sciences 256, 138-161, 2014
Secure multi-party protocols for item-based collaborative filtering
E Shmueli, T Tassa
Proceedings of the eleventh ACM conference on recommender systems, 89-97, 2017
The system can't perform the operation now. Try again later.
Articles 1–20