Остановите войну!
for scientists:
default search action
Mohamed Ali Kâafar
- > Home > Persons > Mohamed Ali Kâafar
Publications
- 2023
- [j43]Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko:
DDoD: Dual Denial of Decision Attacks on Human-AI Teams. IEEE Pervasive Comput. 22(1): 77-84 (2023) - 2022
- [p2]Rahat Masood, Shlomo Berkovsky, Mohamed Ali Kâafar:
Tracking and Personalization. Modern Socio-Technical Perspectives on Privacy 2022: 171-202 - [i69]Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko:
DDoD: Dual Denial of Decision Attacks on Human-AI Teams. CoRR abs/2212.03980 (2022) - 2021
- [j35]Gioacchino Tangari, Muhammad Ikram, I Wayan Budi Sentana, Kiran Ijaz, Mohamed Ali Kâafar, Shlomo Berkovsky:
Analyzing security issues of android mobile health and medical applications. J. Am. Medical Informatics Assoc. 28(10): 2074-2084 (2021) - [c102]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play. SECRYPT 2021: 665-673 - [i62]I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kâafar, Shlomo Berkovsky:
Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play. CoRR abs/2107.13754 (2021) - 2017
- [i31]Amit Tiroshi, Tsvi Kuflik, Shlomo Berkovsky, Mohamed Ali Kâafar:
Graph Based Recommendations: From Data Representation to Feature Extraction and Application. CoRR abs/1707.01250 (2017) - 2016
- [j9]Arik Friedman, Shlomo Berkovsky, Mohamed Ali Kâafar:
A differential privacy framework for matrix factorization recommender systems. User Model. User Adapt. Interact. 26(5): 425-458 (2016) - 2015
- [c67]David Vallet, Shlomo Berkovsky, Sebastien Ardon, Anirban Mahanti, Mohamed Ali Kâafar:
Characterizing and Predicting Viral-and-Popular Video Content. CIKM 2015: 1591-1600 - [c64]Arnaud Berlioz, Arik Friedman, Mohamed Ali Kâafar, Roksana Boreli, Shlomo Berkovsky:
Applying Differential Privacy to Matrix Factorization. RecSys 2015: 107-114 - 2014
- [c50]Amit Tiroshi, Shlomo Berkovsky, Mohamed Ali Kâafar, David Vallet, Terence Chen, Tsvi Kuflik:
Improving business rating predictions using graph based features. IUI 2014: 17-26 - [c46]Amit Tiroshi, Shlomo Berkovsky, Mohamed Ali Kâafar, David Vallet, Tsvi Kuflik:
Graph-Based Recommendations: Make the Most Out of Social Data. UMAP 2014: 447-458 - 2013
- [j4]Mohamed Ali Kâafar, Shlomo Berkovsky, Benoit Donnet:
On the potential of recommendation technologies for efficient content delivery networks. Comput. Commun. Rev. 43(3): 74-77 (2013) - [c35]Amit Tiroshi, Shlomo Berkovsky, Mohamed Ali Kâafar, Terence Chen, Tsvi Kuflik:
Cross social networks interests predictions based ongraph features. RecSys 2013: 319-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint