B. Shapira
#157,325
Most Influential Person Now
B. Shapira's AcademicInfluence.com Rankings
B. Shapiracomputer-science Degrees
Computer Science
#8735
World Rank
#9185
Historical Rank
Machine Learning
#3655
World Rank
#3701
Historical Rank
Artificial Intelligence
#3966
World Rank
#4024
Historical Rank
Database
#5736
World Rank
#5952
Historical Rank

Download Badge
Computer Science
B. Shapira's Degrees
- PhD Computer Science Tel Aviv University
- Masters Computer Science Tel Aviv University
- Bachelors Computer Science Tel Aviv University
Similar Degrees You Can Earn
Why Is B. Shapira Influential?
(Suggest an Edit or Addition)B. Shapira's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Recommender Systems Handbook (2010) (2775)
- Introduction to Recommender Systems Handbook (2011) (2334)
- Recommender Systems: Introduction and Challenges (2015) (708)
- Information Filtering: Overview of Issues, Research and Systems (2001) (451)
- Mobile malware detection through analysis of deviations in application network behavior (2014) (165)
- Facebook single and cross domain data for recommendation systems (2013) (146)
- A Theory-Driven Design Framework for Social Recommender Systems (2010) (133)
- Efficient Multidimensional Suppression for K-Anonymity (2010) (126)
- Survey on Collaborative Filtering, Content-based Filtering and Hybrid Recommendation System (2015) (121)
- Improving Social Recommender Systems (2009) (107)
- Unknown malware detection using network traffic classification (2015) (101)
- RecSys Challenge 2015 and the YOOCHOOSE Dataset (2015) (96)
- Towards latent context-aware recommendation systems (2016) (96)
- TALMUD: transfer learning for multiple domains (2012) (85)
- ConSent: Context-based sentiment analysis (2015) (65)
- Explaining Anomalies Detected by Autoencoders Using SHAP (2019) (64)
- CoBAn: A context based model for data leakage prevention (2014) (62)
- Evaluation of an ontology-content based filtering method for a personalized newspaper (2008) (61)
- The effectiveness of a training method using self-modeling webcam photos for reducing musculoskeletal risk among office workers using computers. (2012) (61)
- Improving Simple Collaborative Filtering Models Using Ensemble Methods (2013) (59)
- Predicting Student Exam's Scores by Analyzing Social Network Data (2012) (58)
- SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research (2016) (57)
- Stereotypes in Information Filtering Systems (1997) (56)
- Capturing human intelligence in the net (2000) (53)
- AN ONTOLOGY-CONTENT-BASED FILTERING METHOD (2008) (52)
- Study of the usefulness of known and new implicit indicators and their optimal combination for accurate inference of users interests (2006) (50)
- Recommender Systems for Product Bundling (2016) (49)
- EduRank: A Collaborative Filtering Approach to Personalization in E-learning (2014) (49)
- Limiting disclosure of sensitive data in sequential releases of databases (2012) (47)
- Explaining anomalies detected by autoencoders using Shapley Additive Explanations (2021) (47)
- Detecting drug-drug interactions using artificial neural networks and classic graph similarity measures (2019) (44)
- PRAW - A PRivAcy model for the Web (2005) (36)
- Experimentation with an information filtering system that combines cognitive and sociological filtering integrated with user stereotypes (1999) (35)
- A new privacy model for hiding group interests while accessing the Web (2002) (35)
- ONTOLOGY-BASED CLASSIFICATION OF NEWS IN AN ELECTRONIC NEWSPAPER (2008) (34)
- Using Data Mining Techniques for Detecting Terror-Related Activities on the Web (2004) (34)
- Using Wikipedia to boost collaborative filtering techniques (2011) (33)
- Automatic keyword identification by artificial neural networks compared to manual identification by users of filtering systems (2001) (33)
- Reaching a joint decision with minimal elicitation of voter preferences (2014) (32)
- The effect of extrinsic motivation on user behavior in a collaborative information finding system (2001) (32)
- Exploiting label dependencies for improved sample complexity (2013) (32)
- Content-based data leakage detection using extended fingerprinting (2013) (30)
- ePaper: A personalized mobile newspaper (2009) (28)
- Choosing the Right Word: Using Bidirectional LSTM Tagger for Writing Support Systems (2019) (27)
- Best Usage Context Prediction for Music Tracks (2010) (27)
- Information Filtering: A New Two-Phase Model Using Stereotypic User Profiling (1997) (27)
- Detecting application update attack on mobile devices through network featur (2013) (26)
- Modeling Graph Database Schema (2017) (26)
- A difficulty ranking approach to personalization in E-learning (2019) (25)
- Content-Based Methodology for Anomaly Detection on the Web (2003) (25)
- JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface (2015) (24)
- Stereotype-based Versus Personal-based Filtering Rules in Information Filtering Systems (2003) (24)
- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS) (2005) (24)
- Privacy Preservation Improvement by Learning Optimal Profile Generation Rate (2003) (23)
- Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis (2016) (23)
- Attribute-Driven Hidden Markov Model Trees for Intention Prediction (2012) (22)
- Personalized search: Integrating collaboration and social networks (2011) (22)
- Predict Demographic Information Using Word2vec on Spatial Trajectories (2018) (22)
- Meta-learning for Selecting a Multi-label Classification Algorithm (2011) (22)
- Anomaly detection for smartphone data streams (2017) (21)
- Enhancing customer privacy while searching for products and services on the world wide web (2005) (21)
- Wikipedia-based query performance prediction (2014) (19)
- A Hybrid Approach for Automatic Model Recommendation (2018) (19)
- Clustering Wi-Fi fingerprints for indoor–outdoor detection (2019) (19)
- Inferring Contextual Preferences Using Deep Auto-Encoding (2017) (19)
- RecSys'16 Workshop on Deep Learning for Recommender Systems (DLRS) (2016) (19)
- Evaluation of the real and perceived value of automatic and interactive query expansion (2004) (19)
- "Please, Not Now!": A Model for Timing Recommendations (2015) (18)
- pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts (2015) (18)
- AutoGRD: Model Recommendation Through Graphical Dataset Representation (2019) (17)
- MarCol: A Market-Based Recommender System (2007) (17)
- Ontological content-based filtering for personalised newspapers: A method and its evaluation (2010) (17)
- kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity (2009) (17)
- Utilizing transfer learning for in-domain collaborative filtering (2016) (16)
- Cluster-analysis attack against a PRivAte Web solution (PRAW) (2006) (16)
- The Dagstuhl Perspectives Workshop on Performance Modeling and Prediction (2018) (16)
- Ensemble of Feature Chains for Anomaly Detection (2013) (15)
- Using Machine Learning to Predict Rehabilitation Outcomes in Post-acute Hip Fracture Patients. (2020) (14)
- A New Privacy Model for Web Surfing (2002) (14)
- Detection of Deviations in Mobile Applications Network Behavior (2012) (13)
- Reducing preference elicitation in group decision making (2016) (13)
- MATE: a mobile analysis tool for usability experts (2013) (13)
- Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS) (2010) (13)
- An ensemble method for top-N recommendations from the SVD (2016) (12)
- Opinion Leadership: Non-Work-Related Advice in a Work Setting (2008) (12)
- Identifying Informational vs. Conversational Questions on Community Question Answering Archives (2018) (12)
- From Royals to Vegans: Characterizing Question Trolling on a Community Question Answering Website (2018) (12)
- A fuzzy-based algorithm for Web document clustering (2004) (11)
- Implicit Dimension Identification in User-Generated Text with LSTM Networks (2019) (11)
- Using the Information Structure Model to Compare Profile-Based Information Filtering Systems (2004) (11)
- From Evaluating to Forecasting Performance: How to Turn Information Retrieval, Natural Language Processing and Recommender Systems into Predictive Sciences (Dagstuhl Perspectives Workshop 17442) (2018) (11)
- Analyzing movement predictability using human attributes and behavioral patterns (2021) (11)
- CyberRank: Knowledge Elicitation for Risk Assessment of Database Security (2016) (11)
- Preference elicitation for narrowing the recommended list for groups (2014) (11)
- Social Search (2018) (11)
- Analysis of Attack Graph Representations for Ranking Vulnerability Fixes (2018) (11)
- Recommending insurance riders (2013) (11)
- LOGIC BASED PATTERN RECOGNITION - ONTOLOGY CONTENT (2) 1 (2008) (10)
- Sentiment Analysis in Transcribed Utterances (2015) (10)
- DLRS 2017: Second Workshop on Deep Learning for Recommender Systems (2017) (9)
- Proceedings of the 3rd Workshop on Deep Learning for Recommender Systems (2016) (9)
- PRAW—A PRivAcy model for the Web: Research Articles (2005) (9)
- Investigating confidence displays for top-N recommendations (2013) (9)
- NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports (2019) (9)
- Chapter 1 Introduction to Recommender Systems Handbook (2010) (9)
- Deep Context-Aware Recommender System Utilizing Sequential Latent Context (2019) (9)
- Exploiting Wikipedia for Information Retrieval Tasks (2015) (9)
- Highlighting items as means of adaptive assistance (2013) (9)
- Boosting Simple Collaborative Filtering Models Using Ensemble Methods (2012) (8)
- Anytime Algorithms for Recommendation Service Providers (2016) (8)
- Information Filtering and Automatic Keyword Identification by Artificial Neural Networks (2000) (8)
- Language Models with Pre-Trained (GloVe) Word Embeddings (2016) (8)
- Product Bundle Identification using Semi-Supervised Learning (2020) (8)
- Isolation forests and landmarking-based representations for clustering algorithm recommendation using meta-learning (2021) (8)
- Nesto - Network selection and traffic offloading system for android mobile devices (2013) (7)
- Subjective and objective evaluation of interactive and automatic query expansion (2005) (7)
- Contextual security awareness: A context-based approach for assessing the security awareness of users (2022) (7)
- A framework for optimizing COVID-19 testing policy using a Multi Armed Bandit approach (2020) (7)
- Inferring contextual preferences using deep encoder-decoder learners (2018) (7)
- Recommender Systems: Techniques, Applications, and Challenges (2022) (7)
- Manifesto from Dagstuhl Perspectives Workshop 17442 - From Evaluating to Forecasting Performance: How to Turn Information Retrieval, Natural Language Processing and Recommender Systems into Predictive Sciences (2018) (7)
- Fast Item-Based Collaborative Filtering (2015) (6)
- Scalable attack propagation model and algorithms for honeypot systems (2016) (6)
- A decision theoretic approach to combining information filters: An analytical and empirical evaluation (2006) (6)
- New Item Consumption Prediction Using Deep Learning (2019) (6)
- Attack Graph Obfuscation (2017) (6)
- Task Modeling Infrastructure for Analyzing Smart Phone Usage (2010) (6)
- Evolving Context-Aware Recommender Systems With Users in Mind (2020) (5)
- Diversifying Database Activity Monitoring with Bandits (2019) (5)
- Contexto: lessons learned from mobile context inference (2014) (5)
- Theoretical Categorization of Query Performance Predictors (2015) (5)
- Using Bandits for Effective Database Activity Monitoring (2020) (5)
- Using geospatial metadata to boost collaborative filtering (2013) (4)
- Crime Linkage Based on Textual Hebrew Police Reports Utilizing Behavioral Patterns (2020) (4)
- Leak sinks: The threat of targeted social eavesdropping (2015) (4)
- Utilizing Sequences of Touch Gestures for User Verification on Mobile Devices (2018) (4)
- HYPERTEXT BROWSING: A NEW MODEL FOR INFORMATION FILTERING BASED ON USER PROFILES AND DATA CLUSTERING (1996) (4)
- Scalable Attack Path Finding for Increased Security (2017) (4)
- Sampling High Throughput Data for Anomaly Detection of Data-Base Activity (2017) (4)
- User Verification on Mobile Devices Using Sequences of Touch Gestures (2017) (3)
- Introducing diversity among the models of multi-label classification ensemble (2012) (3)
- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection (2018) (3)
- A deep learning framework for predicting burglaries based on multiple contextual factors (2022) (3)
- CoBAn : A Context Based Approach for Text Classification (2014) (3)
- Language Models with GloVe Word Embeddings (2016) (3)
- Are All Rejected Recommendations Equally Bad?: Towards Analysing Rejected Recommendations (2019) (3)
- Iterative Boosting Deep Neural Networks for Predicting Click-Through Rate (2020) (3)
- All the news that's fit to e-ink (2008) (3)
- Explainable multimodal machine learning model for classifying pregnancy drug safety (2021) (3)
- Predicting Relevance Scores for Triples from Type-Like Relations using Neural Embedding - The Cabbage Triple Scorer at WSDM Cup 2017 (2017) (2)
- In-House Solution for the RecSys Challenge 2015 (2015) (2)
- Using Wikipedia to Boost SVD Recommender Systems (2012) (2)
- Ranking Vulnerability Fixes Using Planning Graph Analysis (2017) (2)
- Artificial Intelligence - Game Changer in the Teratology Information Service. (2020) (2)
- Study of Effectiveness of Implicit Indicators and Their Optimal Combination for Accurate Inference of Users Interests (2006) (2)
- Search Problems in the Domain of Multiplication: Case Study on Anomaly Detection Using Markov Chains (2015) (2)
- Post-hoc Explanations for Complex Model Recommendations using Simple Methods (2020) (2)
- Transfer Learning for Time Series Classification Using Synthetic Data Generation (2022) (2)
- Evaluation of a Design Method for Graph Database (2018) (2)
- Deep Auto-Encoding for Context-Aware Inference of Preferred Items' Categories (2016) (2)
- A Content-Based Model for Web-Monitoring (2005) (2)
- Terrorist Detection System (2004) (2)
- AutoGRD (2019) (2)
- Boosting Anomaly Detection Using Unsupervised Diverse Test-Time Augmentation (2021) (2)
- Detecting Android Kernel Rootkits via JTAG Memory Introspection (2017) (1)
- Social Network Based Search for Experts (2012) (1)
- Personal Dynamic Cost-Aware Sensing for Latent Context Detection (2019) (1)
- A decision theoretic approach to combining information filtering (2009) (1)
- Enabling Complex Wikipedia Queries - Technical Report (2015) (1)
- CDCDB: A large and continuously updated drug combination database (2022) (1)
- BRUCE: Bundle Recommendation Using Contextualized item Embeddings (2022) (1)
- Q-Ball: Modeling Basketball Games Using Deep Reinforcement Learning (2022) (1)
- Predicting application usage based on latent contextual information (2022) (1)
- The next best question: a lazy, anytime framework for adaptive feature acquisition (2021) (1)
- CDCDB: A large and continuously updated drug combination database (2022) (1)
- Prioritizing vulnerability patches in large networks (2022) (1)
- Exploiting simultaneous usage of different wireless interfaces for security and mobility (2013) (1)
- Investigating the Value of Subtitles for Improved Movie Recommendations (2022) (1)
- DLRS 2018: third workshop on deep learning for recommender systems (2018) (0)
- Chapter 1 Recommender Systems : Introduction and Challenges (2015) (0)
- Personalized Knowledge Service Based on Smart Cell-Phone Usage: A Conceptual Framework (2010) (0)
- Search Problems in the Domain of Multiplication : Case Study on Robust Anomaly Detection Using Markov Chains (2015) (0)
- Improving Social Recommender (2009) (0)
- Data Mining for Business Intelligence (DMBI 2015) 3rd Annual International Conference (2015) (0)
- Shapley-based feature augmentation (2023) (0)
- INTELLIGENT TECHNOLOGY FOR CONTENT MONITORING ON THE WEB (2004) (0)
- Predicting drug characteristics using biomedical text embedding (2022) (0)
- Hidden-Web Privacy Preservation Surfing (Hi-Wepps) Model (2006) (0)
- Assessing the Quality of Scientific Papers (2019) (0)
- Online Budgeted Learning for Classifier Induction (2019) (0)
- Procédé et système de modelage de taches d'applications de téléphones mobiles (2010) (0)
- Clustering Wi-Fi fingerprints for indoor–outdoor detection (2018) (0)
- Facebook single and cross domain data for recommendation systems (2012) (0)
- Strategies for Filtering E-mail Messages Combining Content-Based and Sociological Filtering with User-Stereotypes (1999) (0)
- BNN: Boosting Neural Network Framework Utilizing Limited Amount of Data (2021) (0)
- Comparing Information Filtering Systems Using the Information Structure Model (2002) (0)
- Wikibook-Bot - Automatic Generation of a Wikipedia Book (2018) (0)
- Proceedings of the 2015 International ACM Recommender Systems Challenge (2015) (0)
- MultiCamp — Cost sensitive active learning algorithm for multiple parallel campaigns (2010) (0)
- RECOMMENDER SYSTEMS FOR CALL CENTERS (2013) (0)
- Automatic Machine Learning Derived from Scholarly Big Data (2020) (0)
- Budgeted Learning for Classifier Induction (2019) (0)
- AMFPMC - An improved method of detecting multiple types of drug-drug interactions using only known drug-drug interactions (2023) (0)
- 7 Social Search (2018) (0)
- INTERACTIVE AUDIENCE SELECTION TOOL FOR DISTRIBUTING A MOBILE CAMPAIGN (2010) (0)
- Verfahren und System zur Aufgabenmodellierung für Mobiltelefonanwendungen (2010) (0)
- Hypertext Browsing: A New Model Based on Hypergraph's Dynamic Construction and Data Analysis Methods (1995) (0)
- Sequence Preserving Network Traffic Generation (2020) (0)
- Inferring Demographic Characteristics of Mobile Subscribers from Cell Tower Interactions (2022) (0)
- BNN (2021) (0)
- Session details: Volume I: Artificial intelligence & agents, distributed systems, and information systems: recommender systems: theory and applications track (2013) (0)
- Personalized Knowledge Service for Smart Cell-Phone Based on Usage: Conceptual Model and Intention Prediction Algorithm (2014) (0)
- Enabling technologies: capturing human intelligence in the Net (2000) (0)
This paper list is powered by the following services: