Social fMRI: Investigating and shaping social mechanisms in the real world N Aharony, W Pan, C Ip, I Khayal, A Pentland Pervasive and mobile computing 7 (6), 643-659, 2011 | 597 | 2011 |
Friends don't lie: inferring personality traits from social network structure J Staiano, B Lepri, N Aharony, F Pianesi, N Sebe, A Pentland Proceedings of the 2012 ACM conference on ubiquitous computing, 321-330, 2012 | 261 | 2012 |
Composite social network for predicting mobile apps installation W Pan, N Aharony, A Pentland Proceedings of the AAAI Conference on Artificial Intelligence 25 (1), 821-827, 2011 | 164 | 2011 |
Using social sensing to understand the links between sleep, mood, and sociability ST Moturu, I Khayal, N Aharony, W Pan, A Pentland 2011 IEEE third international conference on privacy, security, risk and …, 2011 | 100 | 2011 |
Methods and apparatus for sensing organic tissue N Aharony, M Siegel US Patent 8,866,663, 2014 | 96 | 2014 |
How many makes a crowd? On the correlation between groups’ size and the accuracy of modeling Y Altshuler, M Fire, N Aharony, Y Elovici, A Pentland Proceedings of the international conference on social computing, behavioral …, 2012 | 80* | 2012 |
Incremental learning with accuracy prediction of social and individual properties from mobile-phone data Y Altshuler, N Aharony, M Fire, Y Elovici, A Pentland 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 76 | 2012 |
The social fMRI: measuring, understanding, and designing social mechanisms in the real world N Aharony, W Pan, C Ip, I Khayal, A Pentland Proceedings of the 13th international conference on Ubiquitous computing …, 2011 | 70 | 2011 |
Trade-offs in social and behavioral modeling in mobile networks Y Altshuler, M Fire, N Aharony, Z Volkovich, Y Elovici, A Pentland Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013 | 53 | 2013 |
Stealing reality: when criminals become data scientists (or vice versa) Y Altshuler, N Aharony, Y Elovici, A Pentland, M Cebrian Security and Privacy in Social Networks, 133-151, 2011 | 53 | 2011 |
Security and privacy in social networks Y Altshuler, Y Elovici, AB Cremers, N Aharony, A Pentland Springer Science & Business Media, 2012 | 46 | 2012 |
Retrieving contact information based on image recognition searches CR Wren, N Aharony US Patent 8,818,049, 2014 | 45 | 2014 |
Tools for micro-communities C Wren, N Aharony US Patent 8,694,593, 2014 | 43 | 2014 |
Sleep, mood and sociability in a healthy population ST Moturu, I Khayal, N Aharony, W Pan, A Pentland 2011 annual international conference of the IEEE engineering in medicine and …, 2011 | 43 | 2011 |
Summarizing social interactions between users N Aharony, AL Gardner III, GC Sumter US Patent 9,672,291, 2017 | 31 | 2017 |
Adaptive route and motion planning based on learned external and internal vehicle environment A Singhal, N Aharony, AT Liang, G Muralidhar US Patent 10,234,302, 2019 | 30 | 2019 |
Security and privacy in social networks F Reid, M Harrigan, Y Altshuler, Y Elovici, A Cremers, N Aharony, ... An analysis of anonymity in the bitcoin system, 197-223, 2013 | 30 | 2013 |
Fortune monitor or fortune teller: Understanding the connection between interaction patterns and financial status W Pan, N Aharony, A Pentland 2011 IEEE third international conference on privacy, security, risk and …, 2011 | 24 | 2011 |
Methods and apparatus for prediction and modification of behavior in networks W Pan, Y Altshuler, AP Pentland, N Aharony US Patent 9,098,798, 2015 | 21 | 2015 |
Event stream architecture for syncing events GC Sumter, AL Gardner III, N Aharony US Patent 10,162,896, 2018 | 18 | 2018 |