default search action
Aviad Elyashar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Mor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran, Oleg Brodt, Aviad Elyashar, Yuval Elovici, Asaf Shabtai:
OSSIntegrity: Collaborative open-source code integrity verification. Comput. Secur. 144: 103977 (2024) - [j7]Abigail Paradise-Vit, Aviad Elyashar, Yarden Aronson:
Automated photo filtering for tourism domain using deep and active learning: the case of Israeli and worldwide cities on instagram. J. Inf. Technol. Tour. 26(3): 553-582 (2024) - [c9]Adi Ashkenazi, Edita Grolman, Aviad Elyashar, Dudu Mimran, Oleg Brodt, Yuval Elovici, Asaf Shabtai:
SMART: Serverless Module Analysis and Recognition Technique for Managed Applications. CCGrid 2024: 442-452 - [c8]Mor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran, Oleg Brodt, Aviad Elyashar, Yuval Elovici, Asaf Shabtai:
Secure Crowdsource-Based Open-Source Code Verification (SC)^2V. SAC 2024: 1536-1538 - [i12]Dov Shirtz, Inna Koberman, Aviad Elyashar, Rami Puzis, Yuval Elovici:
Enhancing Energy Sector Resilience: Integrating Security by Design Principles. CoRR abs/2402.11543 (2024) - [i11]Lavi Ben-Shimol, Edita Grolman, Aviad Elyashar, Inbar Maimon, Dudu Mimran, Oleg Brodt, Martin Strassmann, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring. CoRR abs/2405.07172 (2024) - [i10]Maor Reuben, Ortal Slobodin, Aviad Elyashar, Idan-Chaim Cohen, Orna Braun-Lewensohn, Odeya Cohen, Rami Puzis:
Assessment and manipulation of latent constructs in pre-trained language models using psychometric scales. CoRR abs/2409.19655 (2024) - 2023
- [j6]Aviad Elyashar, Rami Puzis, Michael Fire:
It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees. IEEE Trans. Knowl. Data Eng. 35(2): 1651-1666 (2023) - [c7]Nir Daniel, Florian Klaus Kaiser, Anton Dzega, Aviad Elyashar, Rami Puzis:
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT. ESORICS Workshops (2) 2023: 76-91 - 2022
- [j5]Maor Reuben, Aviad Elyashar, Rami Puzis:
Iterative query selection for opaque search engines with pseudo relevance feedback. Expert Syst. Appl. 201: 117027 (2022) - [c6]Aviad Elyashar, Jorge Bendahan, Rami Puzis:
Detecting Clickbait in Online Social Media: You Won't Believe How We Did It. CSCML 2022: 377-387 - 2021
- [j4]Aviad Elyashar, Rami Puzis, Michael Fire:
How does that name sound? Name representation learning using accent-specific speech generation. Knowl. Based Syst. 227: 107229 (2021) - [c5]Liav Bachar, Aviad Elyashar, Rami Puzis:
Learning Centrality by Learning to Route. COMPLEX NETWORKS 2021: 247-259 - 2020
- [c4]Aviad Elyashar, Sagi Uziel, Abigail Paradise, Rami Puzis:
The Chameleon Attack: Manipulating Content Display in Online Social Media. WWW 2020: 848-859 - [i9]Aviad Elyashar, Sagi Uziel, Abigail Paradise, Rami Puzis:
The Chameleon Attack: Manipulating Content Display in Online Social Media. CoRR abs/2001.05668 (2020) - [i8]Aviad Elyashar, Rami Puzis, Michael Fire:
How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning. CoRR abs/2005.11838 (2020) - [i7]Aviad Elyashar, Maor Reuben, Rami Puzis:
Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback. CoRR abs/2012.12498 (2020)
2010 – 2019
- 2019
- [i6]Aviad Elyashar, Rami Puzis, Michael Fire:
It Runs in the Family: Searching for Similar Names using Digitized Family Trees. CoRR abs/1912.04003 (2019) - 2017
- [j3]Abigail Paradise, Asaf Shabtai, Rami Puzis, Aviad Elyashar, Yuval Elovici, Mehran Roshandel, Christoph Peylo:
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks. IEEE Trans. Comput. Soc. Syst. 4(3): 65-79 (2017) - [c3]Aviad Elyashar, Jorge Bendahan, Rami Puzis, Maria-Amparo Sanmateu:
Measurement of Online Discussion Authenticity within Online Social Media. ASONAM 2017: 627-629 - [i5]Aviad Elyashar, Jorge Bendahan, Rami Puzis:
Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media. CoRR abs/1708.02763 (2017) - [i4]Aviad Elyashar, Jorge Bendahan, Rami Puzis:
Detecting Clickbait in Online Social Media: You Won't Believe How We Did It. CoRR abs/1710.06699 (2017) - 2016
- [j2]Aviad Elyashar, Michael Fire, Dima Kagan, Yuval Elovici:
Guided socialbots: Infiltrating the social networks of specific organizations' employees. AI Commun. 29(1): 87-106 (2016) - [i3]Aviad Elyashar:
The Security of Organizations and Individuals in Online Social Networks. CoRR abs/1607.04775 (2016) - 2014
- [j1]Michael Fire, Dima Kagan, Aviad Elyashar, Yuval Elovici:
Friend or foe? Fake profile identification in online social networks. Soc. Netw. Anal. Min. 4(1): 194 (2014) - 2013
- [c2]Aviad Elyashar, Michael Fire, Dima Kagan, Yuval Elovici:
Homing socialbots: intrusion on a specific organization's employee using Socialbots. ASONAM 2013: 1358-1365 - [i2]Michael Fire, Dima Kagan, Aviad Elyashar, Yuval Elovici:
Friend or Foe? Fake Profile Identification in Online Social Networks. CoRR abs/1303.3751 (2013) - [i1]Dima Kagan, Michael Fire, Aviad Elyashar, Yuval Elovici:
Facebook Applications' Installation and Removal: A Temporal Analysis. CoRR abs/1309.4067 (2013) - 2012
- [c1]Aviad Elyashar, Michael Fire, Dima Kagan, Yuval Elovici:
Organizational Intrusion: Organization Mining Using Socialbots. SocialInformatics 2012: 7-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint