Friend or foe? Fake profile identification in online social networks M Fire, D Kagan, A Elyashar, Y Elovici Social Network Analysis and Mining 4 (1), 194, 2014 | 89 | 2014 |
Homing socialbots: intrusion on a specific organization's employee using socialbots A Elyashar, M Fire, D Kagan, Y Elovici Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 59 | 2013 |
Creation and management of social network honeypots for detecting targeted cyber attacks A Paradise, A Shabtai, R Puzis, A Elyashar, Y Elovici, M Roshandel, ... IEEE Transactions on Computational Social Systems 4 (3), 65-79, 2017 | 34 | 2017 |
Organizational intrusion: Organization mining using socialbots A Elishar, M Fire, D Kagan, Y Elovici 2012 International Conference on Social Informatics, 7-12, 2012 | 34 | 2012 |
Social privacy protector-protecting users’ privacy in social networks M Fire, D Kagan, A Elishar, Y Elovici Proc. of the Second International Conference on Social Eco-Informatics …, 2012 | 24 | 2012 |
Method for protecting user privacy in social networks F Michael, Y Elovici, A Elishar, D Kagan US Patent App. 13/688,276, 2014 | 17 | 2014 |
Guided socialbots: Infiltrating the social networks of specific organizations’ employees A Elyashar, M Fire, D Kagan, Y Elovici AI Communications 29 (1), 87-106, 2016 | 15 | 2016 |
Detecting Clickbait in Online Social Media: You Won't Believe How We Did It A Elyashar, J Bendahan, R Puzis arXiv preprint arXiv:1710.06699, 2017 | 9 | 2017 |
Is the online discussion manipulated? Quantifying the online discussion authenticity within online social media A Elyashar, J Bendahan, R Puzis arXiv preprint arXiv:1708.02763, 2017 | 7 | 2017 |
Friend or foe M Fire, D Kagan, A Elyashar, Y Elovici Fake Profile Identification in Online Social Networks, Telekom Innovation …, 2014 | 5 | 2014 |
Has the online discussion been manipulated? quantifying online discussion authenticity within online social media A Elyashar, J Bendahan, R Puzis arXiv preprint arXiv:1708.02763, 2017 | 2 | 2017 |
Measurement of online discussion authenticity within online social media A Elyashar, J Bendahan, R Puzis, MA Sanmateu 2017 IEEE/ACM International Conference on Advances in Social Networks …, 2017 | 2 | 2017 |
The Chameleon Attack: Manipulating Content Display in Online Social Media A Elyashar, S Uziel, A Paradise, R Puzis Proceedings of The Web Conference 2020, 848-859, 2020 | 1 | 2020 |
It Runs in the Family: Searching for Similar Names using Digitized Family Trees A Elyashar, R Puzis, M Fire arXiv preprint arXiv:1912.04003, 2019 | 1 | 2019 |
The Security of Organizations and Individuals in Online Social Networks A Elyashar arXiv preprint arXiv:1607.04775, 2016 | 1 | 2016 |
Facebook Applications' Installation and Removal: A Temporal Analysis D Kagan, M Fire, A Elyashar, Y Elovici arXiv preprint arXiv:1309.4067, 2013 | 1 | 2013 |
Homing Socialbots A Elishar, M Fire, D Kagan, Y Elovici | 1 | 2013 |
Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback A Elyashar, M Reuben, R Puzis arXiv preprint arXiv:2012.12498, 2020 | | 2020 |
Method and system for interactive keyword optimization for opaque search engines R Puzis, A Elyashar, M Reuben US Patent App. 16/840,538, 2020 | | 2020 |
How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning A Elyashar, R Puzis, M Fire arXiv preprint arXiv:2005.11838, 2020 | | 2020 |