Skip to main content

Showing 1–13 of 13 results for author: Kagan, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.17579  [pdf, other

    cs.SD cs.LG eess.AS

    VANPY: Voice Analysis Framework

    Authors: Gregory Koushnir, Michael Fire, Galit Fuhrmann Alpert, Dima Kagan

    Abstract: Voice data is increasingly being used in modern digital communications, yet there is still a lack of comprehensive tools for automated voice analysis and characterization. To this end, we developed the VANPY (Voice Analysis in Python) framework for automated pre-processing, feature extraction, and classification of voice data. The VANPY is an open-source end-to-end comprehensive framework that was… ▽ More

    Submitted 4 May, 2025; v1 submitted 17 February, 2025; originally announced February 2025.

  2. arXiv:2308.12828  [pdf, other

    cs.AI cs.LG

    Short Run Transit Route Planning Decision Support System Using a Deep Learning-Based Weighted Graph

    Authors: Nadav Shalit, Michael Fire, Dima Kagan, Eran Ben-Elia

    Abstract: Public transport routing plays a crucial role in transit network design, ensuring a satisfactory level of service for passengers. However, current routing solutions rely on traditional operational research heuristics, which can be time-consuming to implement and lack the ability to provide quick solutions. Here, we propose a novel deep learning-based methodology for a decision support system that… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

  3. arXiv:2303.02052  [pdf, other

    cs.CV cs.SI

    Interruptions detection in video conferences

    Authors: Shmuel Horowitz, Dima Kagan, Galit Fuhrmann Alpert, Michael Fire

    Abstract: In recent years, video conferencing (VC) popularity has skyrocketed for a wide range of activities. As a result, the number of VC users surged sharply. The sharp increase in VC usage has been accompanied by various newly emerging privacy and security challenges. VC meetings became a target for various security attacks, such as Zoombombing. Other VC-related challenges also emerged. For example, dur… ▽ More

    Submitted 25 February, 2023; originally announced March 2023.

  4. arXiv:2207.08169  [pdf, other

    cs.CY

    Ethnic Representation Analysis of Commercial Movie Posters

    Authors: Dima Kagan, Mor Levy, Michael Fire, Galit Fuhrmann Alpert

    Abstract: In the last decades, global awareness towards the importance of diverse representation has been increasing. Lack of diversity and discrimination toward minorities did not skip the film industry. Here, we examine ethnic bias in the film industry through commercial posters, the industry's primary advertisement medium for decades. Movie posters are designed to establish the viewer's initial impressio… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

  5. arXiv:2204.02057  [pdf, other

    cs.SI

    Large-Scale Shill Bidder Detection in E-commerce

    Authors: Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici

    Abstract: User feedback is one of the most effective methods to build and maintain trust in electronic commerce platforms. Unfortunately, dishonest sellers often bend over backward to manipulate users' feedback or place phony bids in order to increase their own sales and harm competitors. The black market of user feedback, supported by a plethora of shill bidders, prospers on top of legitimate electronic co… ▽ More

    Submitted 21 April, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

  6. Co-Membership-based Generic Anomalous Communities Detection

    Authors: Shay Lapid, Dima Kagan, Michael Fire

    Abstract: Nowadays, detecting anomalous communities in networks is an essential task in research, as it helps discover insights into community-structured networks. Most of the existing methods leverage either information regarding attributes of vertices or the topological structure of communities. In this study, we introduce the Co-Membership-based Generic Anomalous Communities Detection Algorithm (referred… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

    Comments: 27 pages, 6 Figures, 6 Tables

  7. Automatic Large Scale Detection of Red Palm Weevil Infestation using Aerial and Street View Images

    Authors: Dima Kagan, Galit Fuhrmann Alpert, Michael Fire

    Abstract: The spread of the Red Palm Weevil has dramatically affected date growers, homeowners and governments, forcing them to deal with a constant threat to their palm trees. Early detection of palm tree infestation has been proven to be critical in order to allow treatment that may save trees from irreversible damage, and is most commonly performed by local physical access for individual tree monitoring.… ▽ More

    Submitted 9 April, 2021; v1 submitted 6 April, 2021; originally announced April 2021.

  8. Zooming Into Video Conferencing Privacy and Security Threats

    Authors: Dima Kagan, Galit Fuhrmann Alpert, Michael Fire

    Abstract: The COVID-19 pandemic outbreak, with its related social distancing and shelter-in-place measures, has dramatically affected ways in which people communicate with each other, forcing people to find new ways to collaborate, study, celebrate special occasions, and meet with family and friends. One of the most popular solutions that have emerged is the use of video conferencing applications to replace… ▽ More

    Submitted 2 July, 2020; originally announced July 2020.

  9. arXiv:1903.06469  [pdf, other

    cs.SI cs.CY physics.data-an

    Using Data Science to Understand the Film Industry's Gender Gap

    Authors: Dima Kagan, Thomas Chesney, Michael Fire

    Abstract: Data science can offer answers to a wide range of social science questions. Here we turn attention to the portrayal of women in movies, an industry that has a significant influence on society, impacting such aspects of life as self-esteem and career choice. To this end, we fused data from the online movie database IMDb with a dataset of movie dialogue subtitles to create the largest available corp… ▽ More

    Submitted 6 August, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

    Journal ref: Palgrave Commun 6, 92 (2020)

  10. arXiv:1610.07525  [pdf, other

    cs.SI physics.soc-ph

    Generic Anomalous Vertices Detection Utilizing a Link Prediction Algorithm

    Authors: Dima Kagan, Yuval Elovici, Michael Fire

    Abstract: In the past decade, network structures have penetrated nearly every aspect of our lives. The detection of anomalous vertices in these networks has become increasingly important, such as in exposing computer network intruders or identifying fake online reviews. In this study, we present a novel unsupervised two-layered meta-classifier that can detect irregular vertices in complex networks solely by… ▽ More

    Submitted 6 June, 2017; v1 submitted 24 October, 2016; originally announced October 2016.

  11. arXiv:1309.4067  [pdf, other

    cs.SI physics.soc-ph

    Facebook Applications' Installation and Removal: A Temporal Analysis

    Authors: Dima Kagan, Michael Fire, Aviad Elyashar, Yuval Elovici

    Abstract: Facebook applications are one of the reasons for Facebook attractiveness. Unfortunately, numerous users are not aware of the fact that many malicious Facebook applications exist. To educate users, to raise users' awareness and to improve Facebook users' security and privacy, we developed a Firefox add-on that alerts users to the number of installed applications on their Facebook profiles. In this… ▽ More

    Submitted 16 September, 2013; originally announced September 2013.

  12. arXiv:1303.3751  [pdf, other

    cs.SI physics.soc-ph

    Friend or Foe? Fake Profile Identification in Online Social Networks

    Authors: Michael Fire, Dima Kagan, Aviad Elyashar, Yuval Elovici

    Abstract: The amount of personal information unwillingly exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are infested with tens of millions of fake users profiles, which may jeopardize the users' security and privacy. To identify fake users in such networks and to improve users' security and privacy, we developed th… ▽ More

    Submitted 15 March, 2013; originally announced March 2013.

    Comments: Draft Version

  13. arXiv:1212.3540  [pdf

    cs.SI cs.HC cs.IR physics.soc-ph

    Social Network Based Search for Experts

    Authors: Yehonatan Bitton, Michael Fire, Dima Kagan, Bracha Shapira, Lior Rokach, Judit Bar-Ilan

    Abstract: Our system illustrates how information retrieved from social networks can be used for suggesting experts for specific tasks. The system is designed to facilitate the task of finding the appropriate person(s) for a job, as a conference committee member, an advisor, etc. This short description will demonstrate how the system works in the context of the HCIR2012 published tasks.

    Submitted 14 December, 2012; originally announced December 2012.

    Comments: Participated in HCIR 2012