A review on fairness in machine learning D Pessach, E Shmueli ACM Computing Surveys (CSUR) 55 (3), 1-44, 2022 | 373 | 2022 |
openpds: Protecting the privacy of metadata through safeanswers YA De Montjoye, E Shmueli, SS Wang, AS Pentland PloS one 9 (7), e98790, 2014 | 370 | 2014 |
Employees recruitment: A prescriptive analytics approach via machine learning and mathematical programming D Pessach, G Singer, D Avrahami, HC Ben-Gal, E Shmueli, I Ben-Gal Decision Support Systems 134, 113290, 2020 | 232 | 2020 |
Algorithmic fairness D Pessach, E Shmueli Machine Learning for Data Science Handbook: Data Mining and Knowledge …, 2023 | 220 | 2023 |
Structure preserving database encryption method and system Y Elovici, R Waisenberg, E Shmueli US Patent 8,639,947, 2014 | 172 | 2014 |
The strength of the strongest ties in collaborative problem solving YA De Montjoye, A Stopczynski, E Shmueli, A Pentland, S Lehmann Scientific reports 4 (1), 5277, 2014 | 155 | 2014 |
Care to comment? Recommendations for commenting on news stories E Shmueli, A Kagian, Y Koren, R Lempel Proceedings of the 21st international conference on World Wide Web, 429-438, 2012 | 112 | 2012 |
Database encryption: an overview of contemporary challenges and design considerations E Shmueli, R Vaisenberg, Y Elovici, C Glezer ACM SIGMOD Record 38 (3), 29-34, 2010 | 106 | 2010 |
Sensing, understanding, and shaping social behavior E Shmueli, VK Singh, B Lepri, A Pentland IEEE Transactions on Computational Social Systems 1 (1), 22-34, 2014 | 104 | 2014 |
Are you your friends’ friend? Poor perception of friendship ties limits the ability to promote behavioral change A Almaatouq, L Radaelli, A Pentland, E Shmueli PloS one 11 (3), e0151588, 2016 | 100 | 2016 |
The privacy implications of cyber security systems: A technological survey E Toch, C Bettini, E Shmueli, L Radaelli, A Lanzi, D Riboni, B Lepri ACM Computing Surveys (CSUR) 51 (2), 1-27, 2018 | 96 | 2018 |
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ... International Journal of Information Security 15, 475-491, 2016 | 88 | 2016 |
Designing secure indexes for encrypted databases E Shmueli, R Waisenberg, Y Elovici, E Gudes Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working …, 2005 | 76 | 2005 |
A structure preserving database encryption scheme Y Elovici, R Waisenberg, E Shmueli, E Gudes Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada …, 2004 | 66 | 2004 |
The role of personality in shaping social networks and mediating behavioral change B Lepri, J Staiano, E Shmueli, F Pianesi, A Pentland User Modeling and User-Adapted Interaction 26, 143-175, 2016 | 63 | 2016 |
Limiting disclosure of sensitive data in sequential releases of databases E Shmueli, T Tassa, R Wasserstein, B Shapira, L Rokach Information Sciences 191, 98-127, 2012 | 61 | 2012 |
Structural entropy: monitoring correlation-based networks over time with application to financial markets A Almog, E Shmueli Scientific reports 9 (1), 10832, 2019 | 53 | 2019 |
Twitter: who gets caught? observed trends in social micro-blogging spam A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ... Proceedings of the 2014 ACM conference on Web science, 33-41, 2014 | 51 | 2014 |
Implementing a database encryption solution, design and implementation issues E Shmueli, R Vaisenberg, E Gudes, Y Elovici Computers & security 44, 33-50, 2014 | 49 | 2014 |
Air-writing recognition using smart-bands T Yanay, E Shmueli Pervasive and Mobile Computing 66, 101183, 2020 | 44 | 2020 |