Zum Hauptinhalt springen

Showing 1–33 of 33 results for author: Fire, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04039  [pdf, other

    cs.CV cs.AI cs.LG cs.SI

    Shaping History: Advanced Machine Learning Techniques for the Analysis and Dating of Cuneiform Tablets over Three Millennia

    Authors: Danielle Kapon, Michael Fire, Shai Gordin

    Abstract: Cuneiform tablets, emerging in ancient Mesopotamia around the late fourth millennium BCE, represent one of humanity's earliest writing systems. Characterized by wedge-shaped marks on clay tablets, these artifacts provided insight into Mesopotamian civilization across various domains. Traditionally, the analysis and dating of these tablets rely on subjective assessment of shape and writing style, l… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 24 pages, 18 figures

    ACM Class: I.4.10; I.2.10

  2. arXiv:2405.13071  [pdf, other

    cs.CL cs.AI cs.SI

    A Novel Method for News Article Event-Based Embedding

    Authors: Koren Ishlach, Itzhak Ben-David, Michael Fire, Lior Rokach

    Abstract: Embedding news articles is a crucial tool for multiple fields, such as media bias detection, identifying fake news, and making news recommendations. However, existing news embedding methods are not optimized to capture the latent context of news events. Most embedding methods rely on full-text information and neglect time-relevant embedding generation. In this paper, we propose a novel lightweight… ▽ More

    Submitted 2 August, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

  3. arXiv:2310.05978  [pdf, other

    cs.SI cs.LG

    Analyzing Key Users' behavior trends in Volunteer-Based Networks

    Authors: Nofar Piterman, Tamar Makov, Michael Fire

    Abstract: Online social networks usage has increased significantly in the last decade and continues to grow in popularity. Multiple social platforms use volunteers as a central component. The behavior of volunteers in volunteer-based networks has been studied extensively in recent years. Here, we explore the development of volunteer-based social networks, primarily focusing on their key users' behaviors and… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  4. arXiv:2308.12828  [pdf, other

    cs.AI cs.LG

    Short Run Transit Route Planning Decision Support System Using a Deep Learning-Based Weighted Graph

    Authors: Nadav Shalit, Michael Fire, Dima Kagan, Eran Ben-Elia

    Abstract: Public transport routing plays a crucial role in transit network design, ensuring a satisfactory level of service for passengers. However, current routing solutions rely on traditional operational research heuristics, which can be time-consuming to implement and lack the ability to provide quick solutions. Here, we propose a novel deep learning-based methodology for a decision support system that… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

  5. arXiv:2303.02052  [pdf, other

    cs.CV cs.SI

    Interruptions detection in video conferences

    Authors: Shmuel Horowitz, Dima Kagan, Galit Fuhrmann Alpert, Michael Fire

    Abstract: In recent years, video conferencing (VC) popularity has skyrocketed for a wide range of activities. As a result, the number of VC users surged sharply. The sharp increase in VC usage has been accompanied by various newly emerging privacy and security challenges. VC meetings became a target for various security attacks, such as Zoombombing. Other VC-related challenges also emerged. For example, dur… ▽ More

    Submitted 25 February, 2023; originally announced March 2023.

  6. arXiv:2210.00433  [pdf, other

    cs.SI

    Open Framework for Analyzing Public Parliaments Data

    Authors: Shai Berkovitz, Amit Mazuz, Michael Fire

    Abstract: Open information of government organizations is a subject that should interest all citizens who care about the functionality of their governments. Large-scale open governmental data open the door to new opportunities for citizens and researchers to monitor their government's activities and to improve its transparency. Over the years, various projects and systems have been processing and analyzing… ▽ More

    Submitted 21 May, 2023; v1 submitted 2 October, 2022; originally announced October 2022.

  7. arXiv:2209.07957  [pdf, other

    cs.CR cs.LG

    Malicious Source Code Detection Using Transformer

    Authors: Chen Tsfaty, Michael Fire

    Abstract: Open source code is considered a common practice in modern software development. However, reusing other code allows bad actors to access a wide developers' community, hence the products that rely on it. Those attacks are categorized as supply chain attacks. Recent years saw a growing number of supply chain attacks that leverage open source during software development, relaying the download and ins… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

  8. arXiv:2207.08169  [pdf, other

    cs.CY

    Ethnic Representation Analysis of Commercial Movie Posters

    Authors: Dima Kagan, Mor Levy, Michael Fire, Galit Fuhrmann Alpert

    Abstract: In the last decades, global awareness towards the importance of diverse representation has been increasing. Lack of diversity and discrimination toward minorities did not skip the film industry. Here, we examine ethnic bias in the film industry through commercial posters, the industry's primary advertisement medium for decades. Movie posters are designed to establish the viewer's initial impressio… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

  9. arXiv:2204.02057  [pdf, other

    cs.SI

    Large-Scale Shill Bidder Detection in E-commerce

    Authors: Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici

    Abstract: User feedback is one of the most effective methods to build and maintain trust in electronic commerce platforms. Unfortunately, dishonest sellers often bend over backward to manipulate users' feedback or place phony bids in order to increase their own sales and harm competitors. The black market of user feedback, supported by a plethora of shill bidders, prospers on top of legitimate electronic co… ▽ More

    Submitted 21 April, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

  10. Co-Membership-based Generic Anomalous Communities Detection

    Authors: Shay Lapid, Dima Kagan, Michael Fire

    Abstract: Nowadays, detecting anomalous communities in networks is an essential task in research, as it helps discover insights into community-structured networks. Most of the existing methods leverage either information regarding attributes of vertices or the topological structure of communities. In this study, we introduce the Co-Membership-based Generic Anomalous Communities Detection Algorithm (referred… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

    Comments: 27 pages, 6 Figures, 6 Tables

  11. arXiv:2201.04687  [pdf, other

    cs.SI cs.DB cs.IR

    CompanyName2Vec: Company Entity Matching Based on Job Ads

    Authors: Ran Ziv, Ilan Gronau, Michael Fire

    Abstract: Entity Matching is an essential part of all real-world systems that take in structured and unstructured data coming from different sources. Typically no common key is available for connecting records. Massive data cleaning and integration processes require completion before any data analytics, or further processing can be performed. Although record linkage is frequently regarded as a somewhat tedi… ▽ More

    Submitted 12 January, 2022; originally announced January 2022.

  12. Automatic Large Scale Detection of Red Palm Weevil Infestation using Aerial and Street View Images

    Authors: Dima Kagan, Galit Fuhrmann Alpert, Michael Fire

    Abstract: The spread of the Red Palm Weevil has dramatically affected date growers, homeowners and governments, forcing them to deal with a constant threat to their palm trees. Early detection of palm tree infestation has been proven to be critical in order to allow treatment that may save trees from irreversible damage, and is most commonly performed by local physical access for individual tree monitoring.… ▽ More

    Submitted 9 April, 2021; v1 submitted 6 April, 2021; originally announced April 2021.

  13. arXiv:2007.08630  [pdf, other

    cs.CY

    Using Data Mining for Infrastructure and Safety Violations Discovery in Cities

    Authors: Doron Laadan, Eyal Arviv, Michael Fire

    Abstract: In city planning and maintenance, the abilty to quickly identify infrastructure violations - such as missing or misplaced fire hydrants - can be crucial for maintaining a safe city; it can even save lives. In this work, we aim to provide an analysis of such violations, and to demonstrate the potential of data-driven approaches for quickly locating and addressing them. We conduct an analytical stud… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 7 pages, 9 figures

  14. Zooming Into Video Conferencing Privacy and Security Threats

    Authors: Dima Kagan, Galit Fuhrmann Alpert, Michael Fire

    Abstract: The COVID-19 pandemic outbreak, with its related social distancing and shelter-in-place measures, has dramatically affected ways in which people communicate with each other, forcing people to find new ways to collaborate, study, celebrate special occasions, and meet with family and friends. One of the most popular solutions that have emerged is the use of video conferencing applications to replace… ▽ More

    Submitted 2 July, 2020; originally announced July 2020.

  15. arXiv:2005.11838  [pdf, other

    cs.CL

    How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning

    Authors: Aviad Elyashar, Rami Puzis, Michael Fire

    Abstract: Searching for information about a specific person is an online activity frequently performed by many users. In most cases, users are aided by queries containing a name and sending back to the web search engines for finding their will. Typically, Web search engines provide just a few accurate results associated with a name-containing query. Currently, most solutions for suggesting synonyms in onlin… ▽ More

    Submitted 21 July, 2020; v1 submitted 24 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: text overlap with arXiv:1912.04003

  16. arXiv:2003.05285  [pdf, other

    cs.LG stat.ML

    A Supervised Machine Learning Model For Imputing Missing Boarding Stops In Smart Card Data

    Authors: Nadav Shalit, Michael Fire, Eran Ben-Elia

    Abstract: Public transport has become an essential part of urban existence with increased population densities and environmental awareness. Large quantities of data are currently generated, allowing for more robust methods to understand travel behavior by harvesting smart card usage. However, public transport datasets suffer from data integrity problems; boarding stop information may be missing due to imper… ▽ More

    Submitted 9 September, 2021; v1 submitted 10 March, 2020; originally announced March 2020.

  17. arXiv:1912.04003  [pdf, other

    cs.IR

    It Runs in the Family: Searching for Synonyms Using Digitized Family Trees

    Authors: Aviad Elyashar, Rami Puzis, Michael Fire

    Abstract: Searching for a person's name is a common online activity. However, Web search engines provide few accurate results to queries containing names. In contrast to a general word which has only one correct spelling, there are several legitimate spellings of a given name. Today, most techniques used to suggest synonyms in online search are based on pattern matching and phonetic encoding, however they o… ▽ More

    Submitted 29 January, 2021; v1 submitted 9 December, 2019; originally announced December 2019.

    Comments: 20 pages

  18. arXiv:1903.06469  [pdf, other

    cs.SI cs.CY physics.data-an

    Using Data Science to Understand the Film Industry's Gender Gap

    Authors: Dima Kagan, Thomas Chesney, Michael Fire

    Abstract: Data science can offer answers to a wide range of social science questions. Here we turn attention to the portrayal of women in movies, an industry that has a significant influence on society, impacting such aspects of life as self-esteem and career choice. To this end, we fused data from the online movie database IMDb with a dataset of movie dialogue subtitles to create the largest available corp… ▽ More

    Submitted 6 August, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

    Journal ref: Palgrave Commun 6, 92 (2020)

  19. arXiv:1809.07841  [pdf, other

    cs.SI cs.CY physics.soc-ph

    Over-Optimization of Academic Publishing Metrics: Observing Goodhart's Law in Action

    Authors: Michael Fire, Carlos Guestrin

    Abstract: The academic publishing world is changing significantly, with ever-growing numbers of publications each year and shifting publishing patterns. However, the metrics used to measure academic success, such as the number of publications, citation number, and impact factor, have not changed for decades. Moreover, recent studies indicate that these metrics have become targets and follow Goodhart's Law,… ▽ More

    Submitted 20 September, 2018; originally announced September 2018.

  20. arXiv:1706.06690  [pdf, other

    cs.SI cs.CY physics.data-an physics.soc-ph

    The Rise and Fall of Network Stars: Analyzing 2.5 million graphs to reveal how high-degree vertices emerge over time

    Authors: Michael Fire, Carlos Guestrin

    Abstract: Trends change rapidly in today's world, prompting this key question: What is the mechanism behind the emergence of new trends? By representing real-world dynamic systems as complex networks, the emergence of new trends can be symbolized by vertices that "shine." That is, at a specific time interval in a network's life, certain vertices become increasingly connected to other vertices. This process… ▽ More

    Submitted 13 October, 2018; v1 submitted 20 June, 2017; originally announced June 2017.

    Comments: Keywords: Complex Systems; Dynamic Systems; Network Science; Big Data; Complex Network Evolution; Network Datasets;Social Networks

    MSC Class: 91D30; 05C82; 90B10

  21. arXiv:1610.07525  [pdf, other

    cs.SI physics.soc-ph

    Generic Anomalous Vertices Detection Utilizing a Link Prediction Algorithm

    Authors: Dima Kagan, Yuval Elovici, Michael Fire

    Abstract: In the past decade, network structures have penetrated nearly every aspect of our lives. The detection of anomalous vertices in these networks has become increasingly important, such as in exposing computer network intruders or identifying fake online reviews. In this study, we present a novel unsupervised two-layered meta-classifier that can detect irregular vertices in complex networks solely by… ▽ More

    Submitted 6 June, 2017; v1 submitted 24 October, 2016; originally announced October 2016.

  22. arXiv:1603.07445  [pdf, other

    cs.SI physics.soc-ph

    Time Is of the Essence: Analyzing the Effect of Vertex-Joining Time on Complex Network Evolution

    Authors: Michael Fire, Carlos Guestrin

    Abstract: Complex networks have non-trivial characteristics and appear in many real-world systems. Such networks are vitally important, but their full underlying dynamics are not completely understood. Utilizing new data sources, however, can unveil the evolution process of these networks. This study uses the recently published Reddit dataset, containing over 1.65 billion comments, to construct the larges… ▽ More

    Submitted 25 August, 2016; v1 submitted 24 March, 2016; originally announced March 2016.

  23. arXiv:1509.00568  [pdf, other

    cs.CV

    Exploring Online Ad Images Using a Deep Convolutional Neural Network Approach

    Authors: Michael Fire, Jonathan Schler

    Abstract: Online advertising is a huge, rapidly growing advertising market in today's world. One common form of online advertising is using image ads. A decision is made (often in real time) every time a user sees an ad, and the advertiser is eager to determine the best ad to display. Consequently, many algorithms have been developed that calculate the optimal ad to show to the current user at the present t… ▽ More

    Submitted 2 September, 2015; originally announced September 2015.

  24. arXiv:1410.6717  [pdf, other

    cs.SI

    Matching Entities Across Online Social Networks

    Authors: Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici

    Abstract: Online Social Networks (OSNs), such as Facebook and Twitter, have become an integral part of our daily lives. There are hundreds of OSNs, each with its own focus in that each offers particular services and functionalities. Recent studies show that many OSN users create several accounts on multiple OSNs using the same or different personal information. Collecting all the available data of an indivi… ▽ More

    Submitted 4 November, 2014; v1 submitted 24 October, 2014; originally announced October 2014.

  25. arXiv:1408.5571  [pdf, other

    cs.SI physics.soc-ph

    Quantitative Analysis of Genealogy Using Digitised Family Trees

    Authors: Michael Fire, Thomas Chesney, Yuval Elovici

    Abstract: Driven by the popularity of television shows such as Who Do You Think You Are? many millions of users have uploaded their family tree to web projects such as WikiTree. Analysis of this corpus enables us to investigate genealogy computationally. The study of heritage in the social sciences has led to an increased understanding of ancestry and descent but such efforts are hampered by difficult to ac… ▽ More

    Submitted 30 August, 2014; v1 submitted 24 August, 2014; originally announced August 2014.

  26. arXiv:1311.4276  [pdf, other

    cs.SI q-bio.PE stat.AP

    Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population

    Authors: Michael Fire, Yuval Elovici

    Abstract: Online genealogy datasets contain extensive information about millions of people and their past and present family connections. This vast amount of data can assist in identifying various patterns in human population. In this study, we present methods and algorithms which can assist in identifying variations in lifespan distributions of human population in the past centuries, in detecting social an… ▽ More

    Submitted 5 January, 2014; v1 submitted 18 November, 2013; originally announced November 2013.

  27. arXiv:1310.1651  [pdf, other

    cs.CY cs.CR

    Ethical Considerations when Employing Fake Identities in OSN for Research

    Authors: Yuval Elovici, Michael Fire, Amir Herzberg, Haya Shulman

    Abstract: Online Social Networks (OSNs) have rapidly become a prominent and widely used service, offering a wealth of personal and sensitive information with significant security and privacy implications. Hence, OSNs are also an important - and popular - subject for research. To perform research based on real-life evidence, however, researchers may need to access OSN data, such as texts and files uploaded b… ▽ More

    Submitted 6 October, 2013; originally announced October 2013.

  28. arXiv:1309.4067  [pdf, other

    cs.SI physics.soc-ph

    Facebook Applications' Installation and Removal: A Temporal Analysis

    Authors: Dima Kagan, Michael Fire, Aviad Elyashar, Yuval Elovici

    Abstract: Facebook applications are one of the reasons for Facebook attractiveness. Unfortunately, numerous users are not aware of the fact that many malicious Facebook applications exist. To educate users, to raise users' awareness and to improve Facebook users' security and privacy, we developed a Firefox add-on that alerts users to the number of installed applications on their Facebook profiles. In this… ▽ More

    Submitted 16 September, 2013; originally announced September 2013.

  29. arXiv:1303.3764  [pdf, other

    cs.SI cs.CY physics.soc-ph

    Online Social Networks: Threats and Solutions

    Authors: Michael Fire, Roy Goldschmidt, Yuval Elovici

    Abstract: Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN users readily expose personal and private details about themselves, such as relationship status, date of birth, school name, email address, phone number, and even hom… ▽ More

    Submitted 23 July, 2014; v1 submitted 15 March, 2013; originally announced March 2013.

    Comments: Draft Version

  30. arXiv:1303.3751  [pdf, other

    cs.SI physics.soc-ph

    Friend or Foe? Fake Profile Identification in Online Social Networks

    Authors: Michael Fire, Dima Kagan, Aviad Elyashar, Yuval Elovici

    Abstract: The amount of personal information unwillingly exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are infested with tens of millions of fake users profiles, which may jeopardize the users' security and privacy. To identify fake users in such networks and to improve users' security and privacy, we developed th… ▽ More

    Submitted 15 March, 2013; originally announced March 2013.

    Comments: Draft Version

  31. arXiv:1303.3741  [pdf, other

    cs.SI physics.soc-ph

    Organization Mining Using Online Social Networks

    Authors: Michael Fire, Rami Puzis, Yuval Elovici

    Abstract: Mature social networking services are one of the greatest assets of today's organizations. This valuable asset, however, can also be a threat to an organization's confidentiality. Members of social networking websites expose not only their personal information, but also details about the organizations for which they work. In this paper we analyze several commercial organizations by mining data whi… ▽ More

    Submitted 2 September, 2013; v1 submitted 15 March, 2013; originally announced March 2013.

    Comments: Draft Version

  32. arXiv:1212.3540  [pdf

    cs.SI cs.HC cs.IR physics.soc-ph

    Social Network Based Search for Experts

    Authors: Yehonatan Bitton, Michael Fire, Dima Kagan, Bracha Shapira, Lior Rokach, Judit Bar-Ilan

    Abstract: Our system illustrates how information retrieved from social networks can be used for suggesting experts for specific tasks. The system is designed to facilitate the task of finding the appropriate person(s) for a job, as a conference committee member, an advisor, etc. This short description will demonstrate how the system works in the context of the HCIR2012 published tasks.

    Submitted 14 December, 2012; originally announced December 2012.

    Comments: Participated in HCIR 2012

  33. arXiv:1111.4645  [pdf

    cs.SI

    Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data

    Authors: Yaniv Altshuler, Nadav Aharony, Michael Fire, Yuval Elovici, Alex Pentland

    Abstract: Mobile phones are quickly becoming the primary source for social, behavioral, and environmental sensing and data collection. Today's smartphones are equipped with increasingly more sensors and accessible data types that enable the collection of literally dozens of signals related to the phone, its user, and its environment. A great deal of research effort in academia and industry is put into minin… ▽ More

    Submitted 20 November, 2011; originally announced November 2011.

    Comments: 10 pages