Erez Shmueli
TitleCited byYear
openpds: Protecting the privacy of metadata through safeanswers
YA De Montjoye, E Shmueli, SS Wang, AS Pentland
PloS one 9 (7), e98790, 2014
2162014
Structure preserving database encryption method and system
Y Elovici, R Waisenberg, E Shmueli
US Patent 8,639,947, 2014
1072014
Care to comment?: recommendations for commenting on news stories
E Shmueli, A Kagian, Y Koren, R Lempel
Proceedings of the 21st international conference on World Wide Web, 429-438, 2012
882012
The strength of the strongest ties in collaborative problem solving
YA de Montjoye, A Stopczynski, E Shmueli, A Pentland, S Lehmann
Scientific reports 4, 5277, 2014
832014
Database encryption: an overview of contemporary challenges and design considerations
E Shmueli, R Vaisenberg, Y Elovici, C Glezer
ACM SIGMOD Record 38 (3), 29-34, 2010
762010
Sensing, understanding, and shaping social behavior
E Shmueli, VK Singh, B Lepri, A Pentland
IEEE Transactions on Computational Social Systems 1 (1), 22-34, 2014
672014
Designing secure indexes for encrypted databases
E Shmueli, R Waisenberg, Y Elovici, E Gudes
IFIP Annual Conference on Data and Applications Security and Privacy, 54-68, 2005
652005
A structure preserving database encryption scheme
Y Elovici, R Waisenberg, E Shmueli, E Gudes
Workshop on Secure Data Management, 28-40, 2004
522004
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15 (5), 475-491, 2016
472016
Are you your friends’ friend? Poor perception of friendship ties limits the ability to promote behavioral change
A Almaatouq, L Radaelli, A Pentland, E Shmueli
PloS one 11 (3), e0151588, 2016
472016
Limiting disclosure of sensitive data in sequential releases of databases
E Shmueli, T Tassa, R Wasserstein, B Shapira, L Rokach
Information Sciences 191, 98-127, 2012
382012
Twitter: who gets caught? observed trends in social micro-blogging spam
A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ...
Proceedings of the 2014 ACM conference on Web science, 33-41, 2014
352014
Implementing a database encryption solution, design and implementation issues
E Shmueli, R Vaisenberg, E Gudes, Y Elovici
Computers & security 44, 33-50, 2014
262014
Social information leakage: Effects of awareness and peer pressure on user behavior
M Nouh, A Almaatouq, A Alabdulkareem, VK Singh, E Shmueli, M Alsaleh, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
242014
Improving accuracy of classification models induced from anonymized datasets
M Last, T Tassa, A Zhmudyak, E Shmueli
Information Sciences 256, 138-161, 2014
242014
Privacy by diversity in sequential releases of databases
E Shmueli, T Tassa
Information Sciences 298, 344-372, 2015
232015
The role of personality in shaping social networks and mediating behavioral change
B Lepri, J Staiano, E Shmueli, F Pianesi, A Pentland
User Modeling and User-Adapted Interaction 26 (2-3), 143-175, 2016
222016
The social amplifier—reaction of human communities to emergencies
Y Altshuler, M Fire, E Shmueli, Y Elovici, A Bruckstein, AS Pentland, ...
Journal of Statistical Physics 152 (3), 399-418, 2013
212013
The privacy implications of cyber security systems: A technological survey
E Toch, C Bettini, E Shmueli, L Radaelli, A Lanzi, D Riboni, B Lepri
ACM Computing Surveys (CSUR) 51 (2), 36, 2018
172018
Detecting anomalous behaviors using structural properties of social networks
Y Altshuler, M Fire, E Shmueli, Y Elovici, A Bruckstein, AS Pentland, ...
International Conference on Social Computing, Behavioral-Cultural Modeling …, 2013
172013
The system can't perform the operation now. Try again later.
Articles 1–20