


default search action
Udi Weinsberg
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Reshef Meir, Viet-An Nguyen, Xu Chen, Jagdish Ramakrishnan, Udi Weinsberg:
Efficient Online Crowdsourcing with Complex Annotations. AAAI 2024: 10119-10127 - [c32]Jerry Chee
, Shankar Kalyanaraman
, Sindhu Kiranmai Ernala
, Udi Weinsberg
, Sarah Dean
, Stratis Ioannidis
:
Harm Mitigation in Recommender Systems under User Preference Dynamics. KDD 2024: 255-265 - [c31]Ariel Evnine
, Stratis Ioannidis
, Dimitris Kalimeris
, Shankar Kalyanaraman
, Weiwei Li
, Israel Nir
, Wei Sun
, Udi Weinsberg
:
Achieving a Better Tradeoff in Multi-stage Recommender Systems through Personalization. KDD 2024: 4939-4950 - [i11]Reshef Meir, Viet-An Nguyen, Xu Chen, Jagdish Ramakrishnan, Udi Weinsberg:
Efficient Online Crowdsourcing with Complex Annotations. CoRR abs/2401.15116 (2024) - [i10]Jerry Chee, Shankar Kalyanaraman, Sindhu Kiranmai Ernala, Udi Weinsberg, Sarah Dean, Stratis Ioannidis:
Harm Mitigation in Recommender Systems under User Preference Dynamics. CoRR abs/2406.09882 (2024) - 2023
- [c30]Evan Yao
, Jagdish Ramakrishnan
, Xu Chen
, Viet-An Nguyen
, Udi Weinsberg
:
From Labels to Decisions: A Mapping-Aware Annotator Model. KDD 2023: 5404-5415 - [c29]Xi Leslie Chen
, Abhratanu Dutta
, Sindhu Kiranmai Ernala
, Stratis Ioannidis
, Shankar Kalyanaraman
, Israel Nir
, Udi Weinsberg
:
Gateway Entities in Problematic Trajectories. WWW 2023: 2840-2851 - 2022
- [c28]Viet-An Nguyen, Peibei Shi, Jagdish Ramakrishnan, Narjes Torabi, Nimar S. Arora, Udi Weinsberg, Michael Tingley:
Crowdsourcing with Contextual Uncertainty. KDD 2022: 3645-3655 - 2021
- [c27]Dimitris Kalimeris, Smriti Bhagat, Shankar Kalyanaraman, Udi Weinsberg:
Preference Amplification in Recommender Systems. KDD 2021: 805-815 - 2020
- [c26]Viet-An Nguyen, Peibei Shi, Jagdish Ramakrishnan, Udi Weinsberg, Henry C. Lin, Steve Metz, Neil Chandra, Jane Jing, Dimitris Kalimeris:
CLARA: Confidence of Labels and Raters. KDD 2020: 2542-2552 - [c25]Adam Breuer, Roee Eilat, Udi Weinsberg:
Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks. WWW 2020: 1287-1297 - [i9]Adam Breuer, Roee Eilat, Udi Weinsberg:
Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks. CoRR abs/2004.04834 (2020)
2010 – 2019
- 2018
- [c24]Dimitris Kalimeris, Yaron Singer, Karthik Subbian, Udi Weinsberg:
Learning Diffusion using Hyperparameters. ICML 2018: 2425-2433 - 2017
- [c23]Danai Koutra
, Abhilash Dighe, Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis
, Christos Faloutsos, Jean Bolot:
PNP: Fast Path Ensemble Method for Movie Design. KDD 2017: 1527-1536 - 2016
- [c22]Stefan Dernbach
, Nina Taft, Jim Kurose, Udi Weinsberg, Christophe Diot, Azin Ashkan:
Cache content-selection policies for streaming video services. INFOCOM 2016: 1-9 - [i8]Danai Koutra, Abhilash Dighe, Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, Christos Faloutsos, Jean Bolot:
PNP: Fast Path Ensemble Method for Movie Design. CoRR abs/1611.02388 (2016) - 2015
- [c21]Kartik Nayak, Xiao Shaun Wang
, Stratis Ioannidis
, Udi Weinsberg, Nina Taft, Elaine Shi:
GraphSC: Parallel Secure Computation Made Easy. IEEE Symposium on Security and Privacy 2015: 377-394 - [c20]Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci
, Wenke Lee:
Understanding Malvertising Through Ad-Injecting Browser Extensions. WWW 2015: 1286-1295 - 2014
- [j5]Irad Ben-Gal, Yuval Shavitt
, Ela Weinsberg, Udi Weinsberg:
Peer-to-peer information retrieval using shared-content clustering. Knowl. Inf. Syst. 39(2): 383-408 (2014) - [c19]Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee:
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising. CCS 2014: 129-140 - [c18]Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis
, Nina Taft:
Recommending with an agenda: active learning of private attributes using matrix factorization. RecSys 2014: 65-72 - [c17]Stratis Ioannidis
, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz
, Nina Taft:
Privacy tradeoffs in predictive analytics. SIGMETRICS 2014: 57-69 - [c16]Smriti Bhagat, Anthony Kim
, S. Muthukrishnan, Udi Weinsberg:
The Shapley Value in Knapsack Budgeted Games. WINE 2014: 106-119 - [p1]Markus Schedl, Mohamed Sordo, Noam Koenigstein, Udi Weinsberg:
Mining User Generated Data for Music Information Retrieval. Mining User Generated Content 2014: 67-96 - [i7]Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, Nina Taft:
Privacy Tradeoffs in Predictive Analytics. CoRR abs/1403.8084 (2014) - [i6]Smriti Bhagat, Anthony Kim, S. Muthukrishnan, Udi Weinsberg:
The Shapley Value in Knapsack Budgeted Games. CoRR abs/1409.5200 (2014) - 2013
- [c15]Valeria Nikolaenko, Stratis Ioannidis
, Udi Weinsberg, Marc Joye, Nina Taft, Dan Boneh:
Privacy-preserving matrix factorization. CCS 2013: 801-812 - [c14]Bin Liu, Anmol Sheth, Udi Weinsberg, Jaideep Chandrashekar, Ramesh Govindan:
AdReveal: improving transparency into online targeted advertising. HotNets 2013: 12:1-12:7 - [c13]Oded Argon, Yuval Shavitt
, Udi Weinsberg:
Inferring the periodicity in large-scale Internet measurements. INFOCOM 2013: 1672-1680 - [c12]Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis
, Marc Joye, Dan Boneh, Nina Taft:
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. IEEE Symposium on Security and Privacy 2013: 334-348 - [i5]Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, Nina Taft:
Recommending with an Agenda: Active Learning of Private Attributes using Matrix Factorization. CoRR abs/1311.6802 (2013) - 2012
- [j4]Noam Koenigstein
, Yuval Shavitt
, Ela Weinsberg, Udi Weinsberg:
Measuring the validity of peer-to-peer data for information retrieval applications. Comput. Networks 56(3): 1092-1102 (2012) - [c11]Udi Weinsberg, Qingxi Li, Nina Taft, Athula Balachandran, Vyas Sekar, Gianluca Iannaccone, Srinivasan Seshan
:
CARE: content aware redundancy elimination for challenged networks. HotNets 2012: 127-132 - [c10]Udi Weinsberg, Smriti Bhagat, Stratis Ioannidis
, Nina Taft:
BlurMe: inferring and obfuscating user gender based on ratings. RecSys 2012: 195-202 - [i4]Yuval Shavitt, Udi Weinsberg:
Topological Trends of Internet Content Providers. CoRR abs/1201.0834 (2012) - [i3]Udi Weinsberg, Athula Balachandran, Nina Taft, Gianluca Iannaccone, Vyas Sekar, Srinivasan Seshan:
CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks. CoRR abs/1206.1815 (2012) - 2011
- [j3]Yuval Shavitt
, Ela Weinsberg, Udi Weinsberg:
Mining Music from Large-Scale, Peer-to-Peer Networks. IEEE Multim. 18(1): 14-23 (2011) - [j2]Yuval Shavitt
, Udi Weinsberg:
Quantifying the Importance of Vantage Point Distribution in Internet Topology Mapping (Extended Version). IEEE J. Sel. Areas Commun. 29(9): 1837-1847 (2011) - [c9]Udi Weinsberg, Augustin Soule, Laurent Massoulié:
Inferring traffic shaping and policy parameters using end host measurements. INFOCOM 2011: 151-155 - 2010
- [c8]Yuval Shavitt
, Ela Weinsberg, Udi Weinsberg:
Building recommendation systems using peer-to-peer shared content. CIKM 2010: 1457-1460 - [c7]Noam Koenigstein
, Yuval Shavitt
, Tomer Tankel, Ela Weinsberg, Udi Weinsberg:
A framework for extracting musical similarities from peer-to-peer networks. ICME 2010: 1433-1438 - [c6]Yuval Shavitt, Ela Weinsberg, Udi Weinsberg:
Estimating peer similarity using distance of shared files. IPTPS 2010: 4 - [c5]Noam Koenigstein, Yuval Shavitt, Ela Weinsberg, Udi Weinsberg:
On the Applicability of Peer-to-peer Data in Music Information Retrieval Research. ISMIR 2010: 273-278 - [c4]Yaron Schwartz, Yuval Shavitt
, Udi Weinsberg:
A Measurement Study of the Origins of End-to-End Delay Variations. PAM 2010: 21-30 - [i2]Oded Argon, Anat Bremler-Barr, Osnat Mokryn, Dvir Schirman, Yuval Shavitt, Udi Weinsberg:
On the Dynamics of IP Address Allocation and Availability of End-Hosts. CoRR abs/1011.2324 (2010)
2000 – 2009
- 2009
- [c3]Yuval Shavitt
, Udi Weinsberg:
Quantifying the Importance of Vantage Points Distribution in Internet Topology Measurements. INFOCOM 2009: 792-800 - [c2]Yuval Shavitt
, Udi Weinsberg:
Song Clustering Using Peer-to-Peer Co-occurrences. ISM 2009: 471-476 - 2008
- [j1]Mira Gonen, Dana Ron
, Udi Weinsberg, Avishai Wool
:
Finding a dense-core in Jellyfish graphs. Comput. Networks 52(15): 2831-2841 (2008) - 2007
- [c1]Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool
:
Finding a Dense-Core in Jellyfish Graphs. WAW 2007: 29-40 - [i1]Yuval Shavitt, Eran Shir, Udi Weinsberg:
Near-Deterministic Inference of AS Relationships. CoRR abs/0711.4562 (2007)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint