Chen Hajaj
Cited by
Cited by
Strategy-Proof and Efficient Kidney Exchange Using a Credit Mechanism
C Hajaj, JP Dickerson, A Hassidim, T Sandholm, D Sarne
In proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
Improving robustness of {ML} classifiers against realizable evasion attacks using conserved features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th {USENIX} Security Symposium ({USENIX} Security 19), 285-302, 2019
Using CSF biomarkers to replicate genetic associations in Alzheimer's disease
JM Schott, ADNI Investigators
Neurobiology of Aging 33 (7), 1486. e9-1486. e15, 2012
Search More, Disclose Less.
C Hajaj, N Hazon, D Sarne, A Elmalech
In proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
Improving comparison shopping agents’ competence through selective price disclosure
C Hajaj, N Hazon, D Sarne
Electronic Commerce Research and Applications 14 (6), 563–581, 2015
A crowdsourcing framework for medical data sets
C Ye, J Coco, A Epishova, C Hajaj, H Bogardus, L Novak, J Denny, ...
AMIA Summits on Translational Science Proceedings 2018, 273, 2018
Enhancing comparison shopping agents through ordering and gradual information disclosure
C Hajaj, N Hazon, D Sarne
Autonomous Agents and Multi-Agent Systems 31 (3), 696–714, 2017
Strategic information platforms: selective disclosure and the price of free
C Hajaj, D Sarne
Proceedings of the Fifteenth ACM conference on Economics and Computation …, 2014
Ordering Effects and Belief Adjustment in the Use of Comparison Shopping Agents
C Hajaj, N Hazon, D Sarne
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence …, 2014
Extending workers' attention span through dummy events
A Elmalech, D Sarne, E David, C Hajaj
Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 4 (1), 2016
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets
S Ceppi, E David, C Hajaj, V Robu, IA Vetsikas
Springer, 2017
Selective opportunity disclosure at the service of strategic information platforms
C Hajaj, D Sarne
Autonomous Agents and Multi-Agent Systems 31 (5), 1133-1164, 2017
Adversarial coordination on social networks
C Hajaj, S Yu, Z Joveski, Y Vorobeychik
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
Robust Malicious Domain Detection
N Hason, A Dvir, C Hajaj
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
Adversarial task assignment
C Hajaj, Y Vorobeychik
International Joint Conference on Artificial Intelligence, 3783-3789, 2018
Analyzing HTTPS Traffic for a Robust Identification of Operating System, Browser and Application
J Muehlstein, Y Zion, M Bahumi, I Kirshenboim, R Dubin, A Dvir, O Pele
arXiv, arXiv: 1603.04865, 2016
Encrypted video traffic clustering demystified
A Dvir, AK Marnerides, R Dubin, N Golan, C Hajaj
Computers & Security 96, 101917, 2020
Evasion Is Not Enough: A Case Study of Android Malware
H Berger, C Hajaj, A Dvir
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
Less is More: Robust and Novel Features for Malicious Domain Detection
C Hajaj, N Hason, N Harel, A Dvir
arXiv preprint arXiv:2006.01449, 2020
A Thousand Words are Worth More Than One Recording: NLP Based Speaker Change Point Detection
OH Anidjar, C Hajaj, A Dvir, I Gilad
arXiv preprint arXiv:2006.01206, 2020
The system can't perform the operation now. Try again later.
Articles 1–20