Erez Shmueli
Cited by
Cited by
openpds: Protecting the privacy of metadata through safeanswers
YA De Montjoye, E Shmueli, SS Wang, AS Pentland
PloS one 9 (7), e98790, 2014
Structure preserving database encryption method and system
Y Elovici, R Waisenberg, E Shmueli
US Patent 8,639,947, 2014
The strength of the strongest ties in collaborative problem solving
YA De Montjoye, A Stopczynski, E Shmueli, A Pentland, S Lehmann
Scientific reports 4 (1), 5277, 2014
Algorithmic fairness
D Pessach, E Shmueli
arXiv preprint arXiv:2001.09784, 2020
Employees recruitment: A prescriptive analytics approach via machine learning and mathematical programming
D Pessach, G Singer, D Avrahami, HC Ben-Gal, E Shmueli, I Ben-Gal
Decision Support Systems 134, 113290, 2020
Care to comment? Recommendations for commenting on news stories
E Shmueli, A Kagian, Y Koren, R Lempel
Proceedings of the 21st international conference on World Wide Web, 429-438, 2012
Sensing, understanding, and shaping social behavior
E Shmueli, VK Singh, B Lepri, A Pentland
IEEE Transactions on Computational Social Systems 1 (1), 22-34, 2014
Database encryption: an overview of contemporary challenges and design considerations
E Shmueli, R Vaisenberg, Y Elovici, C Glezer
ACM SIGMOD Record 38 (3), 29-34, 2010
A review on fairness in machine learning
D Pessach, E Shmueli
ACM Computing Surveys (CSUR) 55 (3), 1-44, 2022
Are you your friends’ friend? Poor perception of friendship ties limits the ability to promote behavioral change
A Almaatouq, L Radaelli, A Pentland, E Shmueli
PloS one 11 (3), e0151588, 2016
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15, 475-491, 2016
The privacy implications of cyber security systems: A technological survey
E Toch, C Bettini, E Shmueli, L Radaelli, A Lanzi, D Riboni, B Lepri
ACM Computing Surveys (CSUR) 51 (2), 1-27, 2018
Designing secure indexes for encrypted databases
E Shmueli, R Waisenberg, Y Elovici, E Gudes
Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working …, 2005
A structure preserving database encryption scheme
Y Elovici, R Waisenberg, E Shmueli, E Gudes
Secure Data Management 3178, 28-40, 2004
The role of personality in shaping social networks and mediating behavioral change
B Lepri, J Staiano, E Shmueli, F Pianesi, A Pentland
User Modeling and User-Adapted Interaction 26, 143-175, 2016
Limiting disclosure of sensitive data in sequential releases of databases
E Shmueli, T Tassa, R Wasserstein, B Shapira, L Rokach
Information Sciences 191, 98-127, 2012
Twitter: who gets caught? observed trends in social micro-blogging spam
A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ...
Proceedings of the 2014 ACM conference on Web science, 33-41, 2014
Implementing a database encryption solution, design and implementation issues
E Shmueli, R Vaisenberg, E Gudes, Y Elovici
Computers & security 44, 33-50, 2014
Privacy by diversity in sequential releases of databases
E Shmueli, T Tassa
Information Sciences 298, 344-372, 2015
Secure multi-party protocols for item-based collaborative filtering
E Shmueli, T Tassa
Proceedings of the eleventh ACM conference on recommender systems, 89-97, 2017
The system can't perform the operation now. Try again later.
Articles 1–20