


Остановите войну!
for scientists:
Michael Fire
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]Dima Kagan, Michael Fire, Galit Fuhrmann Alpert:
Trends in computer science research within European countries. Commun. ACM 65(4): 36-37 (2022) - [i25]Ran Ziv, Ilan Gronau, Michael Fire:
CompanyName2Vec: Company Entity Matching Based on Job Ads. CoRR abs/2201.04687 (2022) - [i24]Shay Lapid, Dima Kagan, Michael Fire:
Co-Membership-based Generic Anomalous Communities Detection. CoRR abs/2203.16246 (2022) - [i23]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. CoRR abs/2204.02057 (2022) - 2021
- [j10]Aviad Elyashar, Rami Puzis
, Michael Fire:
How does that name sound? Name representation learning using accent-specific speech generation. Knowl. Based Syst. 227: 107229 (2021) - [i22]Dima Kagan, Galit Fuhrmann Alpert, Michael Fire:
Automatic Large Scale Detection of Red Palm Weevil Infestation using Aerial and Street View Images. CoRR abs/2104.02598 (2021) - 2020
- [j9]Michael Fire
, Carlos Guestrin:
The rise and fall of network stars: Analyzing 2.5 million graphs to reveal how high-degree vertices emerge over time. Inf. Process. Manag. 57(2): 102041 (2020) - [c12]Nadav Shalit, Michael Fire, Eran Ben-Elia:
Imputation of Missing Boarding Stop Information in Smart Card Data with Machine Learning Methods. IDEAL (1) 2020: 17-27 - [c11]Doron Laadan, Eyal Arviv, Michael Fire:
Using Data Mining for Infrastructure and Safety Violations Discovery in Cities. ISC2 2020: 1-4 - [i21]Nadav Shalit, Michael Fire, Eran Ben-Elia:
Imputing Missing Boarding Stations With Machine Learning Methods. CoRR abs/2003.05285 (2020) - [i20]Aviad Elyashar, Rami Puzis, Michael Fire:
How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning. CoRR abs/2005.11838 (2020) - [i19]Dima Kagan, Galit Fuhrmann Alpert, Michael Fire:
Zooming Into Video Conferencing Privacy and Security Threats. CoRR abs/2007.01059 (2020) - [i18]Doron Laadan, Eyal Arviv, Michael Fire:
Using Data Mining for Infrastructure and Safety Violations Discovery in Cities. CoRR abs/2007.08630 (2020)
2010 – 2019
- 2019
- [i17]Dima Kagan, Thomas Chesney, Michael Fire:
Using Data Science to Understand the Film Industry's Gender Gap. CoRR abs/1903.06469 (2019) - [i16]Aviad Elyashar, Rami Puzis, Michael Fire:
It Runs in the Family: Searching for Similar Names using Digitized Family Trees. CoRR abs/1912.04003 (2019) - 2018
- [j8]Dima Kagan
, Yuval Elovici, Michael Fire:
Generic anomalous vertices detection utilizing a link prediction algorithm. Soc. Netw. Anal. Min. 8(1): 27 (2018) - [i15]Michael Fire, Carlos Guestrin:
Over-Optimization of Academic Publishing Metrics: Observing Goodhart's Law in Action. CoRR abs/1809.07841 (2018) - 2017
- [c10]Michael Fire, Jonathan Schler:
Exploring Online Ad Images Using a Deep Convolutional Neural Network Approach. iThings/GreenCom/CPSCom/SmartData 2017: 1053-1060 - [i14]Michael Fire, Carlos Guestrin:
The Rise and Fall of Network Stars. CoRR abs/1706.06690 (2017) - 2016
- [j7]Aviad Elyashar, Michael Fire, Dima Kagan
, Yuval Elovici:
Guided socialbots: Infiltrating the social networks of specific organizations' employees. AI Commun. 29(1): 87-106 (2016) - [j6]Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:
Matching entities across online social networks. Neurocomputing 210: 91-106 (2016) - [i13]Michael Fire, Carlos Guestrin:
Analyzing Complex Network User Arrival Patterns and Their Effect on Network Topologies. CoRR abs/1603.07445 (2016) - [i12]Dima Kagan, Michael Fire, Yuval Elovici:
Unsupervised Anomalous Vertices Detection Utilizing Link Prediction Algorithms. CoRR abs/1610.07525 (2016) - 2015
- [j5]Michael Fire, Yuval Elovici:
Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population. ACM Trans. Intell. Syst. Technol. 6(2): 28:1-28:22 (2015) - [i11]Michael Fire, Jonathan Schler:
Exploring Online Ad Images Using a Deep Convolutional Neural Network Approach. CoRR abs/1509.00568 (2015) - 2014
- [j4]Michael Fire, Roy Goldschmidt, Yuval Elovici:
Online Social Networks: Threats and Solutions. IEEE Commun. Surv. Tutorials 16(4): 2019-2036 (2014) - [j3]Yuval Elovici, Michael Fire, Amir Herzberg
, Haya Shulman:
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research. Sci. Eng. Ethics 20(4): 1027-1043 (2014) - [j2]Michael Fire, Dima Kagan
, Aviad Elyashar
, Yuval Elovici:
Friend or foe? Fake profile identification in online social networks. Soc. Netw. Anal. Min. 4(1): 194 (2014) - [i10]Michael Fire, Thomas Chesney, Yuval Elovici:
Quantitative Analysis of Genealogy Using Digitised Family Trees. CoRR abs/1408.5571 (2014) - [i9]Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:
Matching Entities Across Online Social Networks. CoRR abs/1410.6717 (2014) - 2013
- [j1]Michael Fire, Lena Tenenboim-Chekina, Rami Puzis
, Ofrit Lesser, Lior Rokach, Yuval Elovici:
Computationally efficient link prediction in a variety of social networks. ACM Trans. Intell. Syst. Technol. 5(1): 10:1-10:25 (2013) - [c9]Aviad Elyashar, Michael Fire, Dima Kagan
, Yuval Elovici:
Homing socialbots: intrusion on a specific organization's employee using Socialbots. ASONAM 2013: 1358-1365 - [c8]Yaniv Altshuler, Michael Fire, Nadav Aharony, Zeev Volkovich
, Yuval Elovici, Alex Pentland:
Trade-Offs in Social and Behavioral Modeling in Mobile Networks. SBP 2013: 412-423 - [c7]Yaniv Altshuler, Michael Fire, Erez Shmueli, Yuval Elovici, Alfred M. Bruckstein
, Alex Pentland, David Lazer:
Detecting Anomalous Behaviors Using Structural Properties of Social Networks. SBP 2013: 433-440 - [c6]Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:
Entity Matching in Online Social Networks. SocialCom 2013: 339-344 - [i8]Michael Fire, Rami Puzis, Yuval Elovici:
Organization Mining Using Online Social Networks. CoRR abs/1303.3741 (2013) - [i7]Michael Fire, Dima Kagan, Aviad Elyashar, Yuval Elovici:
Friend or Foe? Fake Profile Identification in Online Social Networks. CoRR abs/1303.3751 (2013) - [i6]Michael Fire, Roy Goldschmidt, Yuval Elovici:
Online Social Networks: Threats and Solutions Survey. CoRR abs/1303.3764 (2013) - [i5]Dima Kagan, Michael Fire, Aviad Elyashar, Yuval Elovici:
Facebook Applications' Installation and Removal: A Temporal Analysis. CoRR abs/1309.4067 (2013) - [i4]Yuval Elovici, Michael Fire, Amir Herzberg, Haya Shulman:
Ethical Considerations when Employing Fake Identities in OSN for Research. CoRR abs/1310.1651 (2013) - [i3]Michael Fire, Yuval Elovici:
Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population. CoRR abs/1311.4276 (2013) - 2012
- [c5]Michael Fire, Gilad Katz
, Yuval Elovici, Bracha Shapira, Lior Rokach:
Predicting Student Exam's Scores by Analyzing Social Network Data. AMT 2012: 584-595 - [c4]Yaniv Altshuler, Michael Fire, Nadav Aharony, Yuval Elovici, Alex Pentland:
How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage. SBP 2012: 43-52 - [c3]Yaniv Altshuler, Nadav Aharony, Michael Fire, Yuval Elovici, Alex Pentland:
Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data. SocialCom/PASSAT 2012: 969-974 - [c2]Aviad Elyashar, Michael Fire, Dima Kagan
, Yuval Elovici:
Organizational Intrusion: Organization Mining Using Socialbots. SocialInformatics 2012: 7-12 - [i2]Yehonatan Bitton, Michael Fire, Dima Kagan, Bracha Shapira, Lior Rokach, Judit Bar-Ilan:
Social Network Based Search for Experts. CoRR abs/1212.3540 (2012) - 2011
- [c1]Michael Fire, Lena Tenenboim, Ofrit Lesser, Rami Puzis
, Lior Rokach, Yuval Elovici:
Link Prediction in Social Networks Using Computationally Efficient Topological Features. SocialCom/PASSAT 2011: 73-80 - [i1]Yaniv Altshuler, Nadav Aharony, Michael Fire, Yuval Elovici, Alex Pentland:
Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data. CoRR abs/1111.4645 (2011)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-28 00:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint