Privacy-preserving ridge regression on hundreds of millions of records V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, D Boneh, N Taft 2013 IEEE symposium on security and privacy, 334-348, 2013 | 608 | 2013 |
Privacy-preserving matrix factorization V Nikolaenko, S Ioannidis, U Weinsberg, M Joye, N Taft, D Boneh Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 357 | 2013 |
BlurMe: Inferring and obfuscating user gender based on ratings U Weinsberg, S Bhagat, S Ioannidis, N Taft Proceedings of the sixth ACM conference on Recommender systems, 195-202, 2012 | 221 | 2012 |
Graphsc: Parallel secure computation made easy K Nayak, XS Wang, S Ioannidis, U Weinsberg, N Taft, E Shi 2015 IEEE symposium on security and privacy, 377-394, 2015 | 190 | 2015 |
Understanding malvertising through ad-injecting browser extensions X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee Proceedings of the 24th international conference on world wide web, 1286-1295, 2015 | 127 | 2015 |
Adreveal: Improving transparency into online targeted advertising B Liu, A Sheth, U Weinsberg, J Chandrashekar, R Govindan Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 1-7, 2013 | 115 | 2013 |
Friend or faux: Graph-based early detection of fake accounts on social networks A Breuer, R Eilat, U Weinsberg Proceedings of The Web Conference 2020, 1287-1297, 2020 | 88 | 2020 |
Quantifying the importance of vantage points distribution in internet topology measurements Y Shavitt, U Weinsberg IEEE INFOCOM 2009, 792-800, 2009 | 83 | 2009 |
Cache content-selection policies for streaming video services S Dernbach, N Taft, J Kurose, U Weinsberg, C Diot, A Ashkan IEEE INFOCOM 2016-The 35th annual IEEE international conference on computer …, 2016 | 65 | 2016 |
Recommending with an agenda: Active learning of private attributes using matrix factorization S Bhagat, U Weinsberg, S Ioannidis, N Taft Proceedings of the 8th ACM conference on recommender systems, 65-72, 2014 | 47 | 2014 |
On the diversity, stability and symmetry of end-to-end Internet routes Y Schwartz, Y Shavitt, U Weinsberg 2010 INFOCOM IEEE Conference on Computer Communications Workshops, 1-6, 2010 | 46 | 2010 |
CARE: Content aware redundancy elimination for challenged networks U Weinsberg, Q Li, N Taft, A Balachandran, V Sekar, G Iannaccone, ... Proceedings of the 11th ACM workshop on hot topics in networks, 127-132, 2012 | 44 | 2012 |
Inferring traffic shaping and policy parameters using end host measurements U Weinsberg, A Soule, L Massoulie 2011 Proceedings IEEE INFOCOM, 151-155, 2011 | 44 | 2011 |
Preference amplification in recommender systems D Kalimeris, S Bhagat, S Kalyanaraman, U Weinsberg Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data …, 2021 | 43 | 2021 |
Your online interests: Pwned! a pollution attack against targeted advertising W Meng, X Xing, A Sheth, U Weinsberg, W Lee Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 41 | 2014 |
Song clustering using peer-to-peer co-occurrences Y Shavitt, U Weinsberg 2009 11th IEEE International Symposium on Multimedia, 471-476, 2009 | 36 | 2009 |
Moving cellular communication system operative in an emergency mode A Schwartz, Y Shoshan, I Sherman, U Weinsberg US Patent 9,220,048, 2015 | 35 | 2015 |
A measurement study of the origins of end-to-end delay variations Y Schwartz, Y Shavitt, U Weinsberg Passive and Active Measurement: 11th International Conference, PAM 2010 …, 2010 | 30 | 2010 |
Learning diffusion using hyperparameters D Kalimeris, Y Singer, K Subbian, U Weinsberg International Conference on Machine Learning, 2420-2428, 2018 | 29 | 2018 |
Topological trends of Internet content providers Y Shavitt, U Weinsberg Proceedings of the Fourth Annual Workshop on Simplifying Complex Networks …, 2012 | 26 | 2012 |