default search action
Ehud Aharoni
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Ehud Aharoni, Allon Adir, Moran Baruch, Nir Drucker, Gilad Ezov, Ariel Farkash, Lev Greenberg, Ramy Masalha, Guy Moshkowich, Dov Murik, Hayim Shaul, Omri Soceanu:
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data. Proc. Priv. Enhancing Technol. 2023(1): 325-342 (2023) - [c17]Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu:
Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption. CCS 2023: 3567-3569 - [c16]Ehud Aharoni, Nir Drucker, Hayim Shaul:
Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to ML. CCS 2023: 3669-3670 - [c15]Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Hayim Shaul:
Generating One-Hot Maps Under Encryption. CSCML 2023: 96-116 - [c14]Ehud Aharoni, Moran Baruch, Pradip Bose, Alper Buyuktosunoglu, Nir Drucker, Subhankar Pal, Tomer Pelleg, Kanthi K. Sarpatwar, Hayim Shaul, Omri Soceanu, Roman Vaculín:
Efficient Pruning for Machine Learning Under Homomorphic Encryption. ESORICS (4) 2023: 204-225 - [i5]Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Hayim Shaul:
Generating One-Hot Maps under Encryption. CoRR abs/2306.06739 (2023) - [i4]Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu:
E2E near-standard and practical authenticated transciphering. IACR Cryptol. ePrint Arch. 2023: 1040 (2023) - 2022
- [j5]Ehud Aharoni, Nir Drucker, Gilad Ezov, Hayim Shaul, Omri Soceanu:
Complex Encoded Tile Tensors: Accelerating Encrypted Analytics. IEEE Secur. Priv. 20(5): 35-43 (2022) - [c13]Allon Adir, Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Michael Mirkin, Omri Soceanu:
Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set Intersection. ACNS Workshops 2022: 398-424 - [i3]Allon Adir, Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Michael Mirkin, Omri Soceanu:
Privacy-preserving record linkage using local sensitive hash and private set intersection. CoRR abs/2203.14284 (2022) - [i2]Ehud Aharoni, Moran Baruch, Pradip Bose, Alper Buyuktosunoglu, Nir Drucker, Subhankar Pal, Tomer Pelleg, Kanthi K. Sarpatwar, Hayim Shaul, Omri Soceanu, Roman Vaculín:
HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion. CoRR abs/2207.03384 (2022) - 2020
- [c12]Omri Soceanu, Allon Adir, Ehud Aharoni, Lev Greenberg, Habtamu Abie:
A Cloud-Based Anomaly Detection for IoT Big Data. CPS4CIP 2020: 87-104 - [i1]Ehud Aharoni, Allon Adir, Moran Baruch, Gilad Ezov, Ariel Farkash, Lev Greenberg, Ramy Masalha, Dov Murik, Omri Soceanu:
Tile Tensors: A versatile data structure with descriptive shapes for homomorphic encryption. CoRR abs/2011.01805 (2020)
2010 – 2019
- 2017
- [c11]Hanna Mazzawi, Gal Dalal, David Rozenblat, Liat Ein-Dor, Matan Ninio, Ofer Lavi, Allon Adir, Ehud Aharoni, Einat Kermany:
Anomaly Detection in Large Databases Using Behavioral Patterning. ICDE 2017: 1140-1149 - [c10]Shelly Garion, Hillel Kolodner, Allon Adir, Ehud Aharoni, Lev Greenberg:
Big data analysis of cloud storage logs using spark. SYSTOR 2017: 30:1 - 2016
- [j4]Ehud Aharoni, Ron Peleg, Shmulik Regev, Tamer Salman:
Identifying malicious activities from system execution traces. IBM J. Res. Dev. 60(4): 5 (2016) - [c9]Haggai Roitman, Shay Hummel, Ella Rabinovich, Benjamin Sznajder, Noam Slonim, Ehud Aharoni:
On the Retrieval of Wikipedia Articles Containing Claims on Controversial Topics. WWW (Companion Volume) 2016: 991-996 - 2015
- [c8]Ruty Rinott, Lena Dankin, Carlos Alzate Perez, Mitesh M. Khapra, Ehud Aharoni, Noam Slonim:
Show Me Your Evidence - an Automatic Method for Context Dependent Evidence Detection. EMNLP 2015: 440-450 - 2014
- [c7]Ehud Aharoni, Anatoly Polnarov, Tamar Lavee, Daniel Hershcovich, Ran Levy, Ruty Rinott, Dan Gutfreund, Noam Slonim:
A Benchmark Dataset for Automatic Detection of Claims and Evidence in the Context of Controversial Topics. ArgMining@ACL 2014: 64-68 - [c6]Noam Slonim, Ehud Aharoni, Carlos Alzate, Roy Bar-Haim, Yonatan Bilu, Lena Dankin, Iris Eiron, Daniel Hershcovich, Shay Hummel, Mitesh M. Khapra, Tamar Lavee, Ran Levy, Paul Matchen, Anatoly Polnarov, Vikas C. Raykar, Ruty Rinott, Amrita Saha, Naama Zwerdling, David Konopnicki, Dan Gutfreund:
Claims on demand - an initial demonstration of a system for automatic detection and polarity identification of context dependent claims in massive corpora. COLING (Demos) 2014: 6-9 - [c5]Ran Levy, Yonatan Bilu, Daniel Hershcovich, Ehud Aharoni, Noam Slonim:
Context Dependent Claim Detection. COLING 2014: 1489-1500 - 2013
- [c4]Noam Slonim, Ehud Aharoni, Koby Crammer:
Hartigan's K-Means Versus Lloyd's K-Means - Is It Time for a Change? IJCAI 2013: 1677-1684 - 2011
- [j3]Ehud Aharoni, Shai Fine, Yaara Goldschmidt, Ofer Lavi, Oded Margalit, Michal Rosen-Zvi, Lavi Shpigelman:
Smarter log analysis. IBM J. Res. Dev. 55(5): 10 (2011) - [j2]Ehud Aharoni, Hani Neuvirth, Saharon Rosset:
The Quality Preserving Database: A Computational Framework for Encouraging Collaboration, Enhancing Power and Controlling False Discovery. IEEE ACM Trans. Comput. Biol. Bioinform. 8(5): 1431-1437 (2011)
2000 – 2009
- 2009
- [c3]Michal Rosen-Zvi, Ehud Aharoni, Joachim Selbig:
HIV-1 Drug Resistance Prediction and Therapy Optimization: A Case Study for the Application of Classification and Clustering Methods. Similarity-Based Clustering 2009: 185-201 - 2008
- [c2]Michal Rosen-Zvi, André Altmann, Mattia Prosperi, Ehud Aharoni, Hani Neuvirth, Anders Sönnerborg, Eugen Schülter, Daniel Struck, Yardena Peres, Francesca Incardona, Rolf Kaiser, Maurizio Zazzi, Thomas Lengauer:
Selecting anti-HIV therapies based on a variety of genomic and clinical factors. ISMB 2008: 399-406
1990 – 1999
- 1998
- [j1]Ehud Aharoni, Reuven Cohen:
Restricted dynamic Steiner trees for scalable multicast in datagram networks. IEEE/ACM Trans. Netw. 6(3): 286-297 (1998) - 1997
- [c1]Ehud Aharoni, Reuven Cohen:
Restricted Dynamic Steiner Trees for Scalable Multicast in Datagram Networks. INFOCOM 1997: 876-883
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint