关注
Nadav Aharony
Nadav Aharony
在 media.mit.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Social fMRI: Investigating and shaping social mechanisms in the real world
N Aharony, W Pan, C Ip, I Khayal, A Pentland
Pervasive and mobile computing 7 (6), 643-659, 2011
5972011
Friends don't lie: inferring personality traits from social network structure
J Staiano, B Lepri, N Aharony, F Pianesi, N Sebe, A Pentland
Proceedings of the 2012 ACM conference on ubiquitous computing, 321-330, 2012
2612012
Composite social network for predicting mobile apps installation
W Pan, N Aharony, A Pentland
Proceedings of the AAAI Conference on Artificial Intelligence 25 (1), 821-827, 2011
1642011
Using social sensing to understand the links between sleep, mood, and sociability
ST Moturu, I Khayal, N Aharony, W Pan, A Pentland
2011 IEEE third international conference on privacy, security, risk and …, 2011
1002011
Methods and apparatus for sensing organic tissue
N Aharony, M Siegel
US Patent 8,866,663, 2014
962014
How many makes a crowd? On the correlation between groups’ size and the accuracy of modeling
Y Altshuler, M Fire, N Aharony, Y Elovici, A Pentland
Proceedings of the international conference on social computing, behavioral …, 2012
80*2012
Incremental learning with accuracy prediction of social and individual properties from mobile-phone data
Y Altshuler, N Aharony, M Fire, Y Elovici, A Pentland
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
762012
The social fMRI: measuring, understanding, and designing social mechanisms in the real world
N Aharony, W Pan, C Ip, I Khayal, A Pentland
Proceedings of the 13th international conference on Ubiquitous computing …, 2011
702011
Trade-offs in social and behavioral modeling in mobile networks
Y Altshuler, M Fire, N Aharony, Z Volkovich, Y Elovici, A Pentland
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013
532013
Stealing reality: when criminals become data scientists (or vice versa)
Y Altshuler, N Aharony, Y Elovici, A Pentland, M Cebrian
Security and Privacy in Social Networks, 133-151, 2011
532011
Security and privacy in social networks
Y Altshuler, Y Elovici, AB Cremers, N Aharony, A Pentland
Springer Science & Business Media, 2012
462012
Retrieving contact information based on image recognition searches
CR Wren, N Aharony
US Patent 8,818,049, 2014
452014
Tools for micro-communities
C Wren, N Aharony
US Patent 8,694,593, 2014
432014
Sleep, mood and sociability in a healthy population
ST Moturu, I Khayal, N Aharony, W Pan, A Pentland
2011 annual international conference of the IEEE engineering in medicine and …, 2011
432011
Summarizing social interactions between users
N Aharony, AL Gardner III, GC Sumter
US Patent 9,672,291, 2017
312017
Adaptive route and motion planning based on learned external and internal vehicle environment
A Singhal, N Aharony, AT Liang, G Muralidhar
US Patent 10,234,302, 2019
302019
Security and privacy in social networks
F Reid, M Harrigan, Y Altshuler, Y Elovici, A Cremers, N Aharony, ...
An analysis of anonymity in the bitcoin system, 197-223, 2013
302013
Fortune monitor or fortune teller: Understanding the connection between interaction patterns and financial status
W Pan, N Aharony, A Pentland
2011 IEEE third international conference on privacy, security, risk and …, 2011
242011
Methods and apparatus for prediction and modification of behavior in networks
W Pan, Y Altshuler, AP Pentland, N Aharony
US Patent 9,098,798, 2015
212015
Event stream architecture for syncing events
GC Sumter, AL Gardner III, N Aharony
US Patent 10,162,896, 2018
182018
系统目前无法执行此操作,请稍后再试。
文章 1–20