default search action
Sami Zhioua
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Karima Makhlouf, Héber Hwang Arcolezi, Sami Zhioua, Ghassen Ben Brahim, Catuscia Palamidessi:
On the impact of multi-dimensional local differential privacy on fairness. Data Min. Knowl. Discov. 38(4): 2252-2275 (2024) - [j14]Karima Makhlouf, Sami Zhioua, Catuscia Palamidessi:
When causality meets fairness: A survey. J. Log. Algebraic Methods Program. 141: 101000 (2024) - 2023
- [j13]Natalia Díaz Rodríguez, Ruta Binkyte, Wafae Bakkali, Sannidhi Bookseller, Paola Tubaro, Andrius Bacevicius, Sami Zhioua, Raja Chatila:
Gender and sex bias in COVID-19 epidemiological data through the lens of causality. Inf. Process. Manag. 60(3): 103276 (2023) - [i9]Sami Zhioua, Ruta Binkyte:
Shedding light on underrepresentation and Sampling Bias in machine learning. CoRR abs/2306.05068 (2023) - [i8]Ruta Binkyte, Sami Zhioua, Yassine Turki:
Dissecting Causal Biases. CoRR abs/2310.13364 (2023) - [i7]Karima Makhlouf, Héber Hwang Arcolezi, Sami Zhioua, Ghassen Ben Brahim, Catuscia Palamidessi:
On the Impact of Multi-dimensional Local Differential Privacy on Fairness. CoRR abs/2312.04404 (2023) - 2022
- [c22]Ruta Binkyte, Karima Makhlouf, Carlos Pinzón, Sami Zhioua, Catuscia Palamidessi:
Causal Discovery for Fairness. AFCP 2022: 7-22 - [i6]Karima Makhlouf, Sami Zhioua, Catuscia Palamidessi:
Identifiability of Causal-based Fairness Notions: A State of the Art. CoRR abs/2203.05900 (2022) - [i5]Ruta Binkyte-Sadauskiene, Karima Makhlouf, Carlos Pinzón, Sami Zhioua, Catuscia Palamidessi:
Causal Discovery for Fairness. CoRR abs/2206.06685 (2022) - [i4]Ruta Binkyte, Sami Zhioua:
On the Need and Applicability of Causality for Fair Machine Learning. CoRR abs/2207.04053 (2022) - [i3]Guilherme Alves, Fabien Bernier, Miguel Couceiro, Karima Makhlouf, Catuscia Palamidessi, Sami Zhioua:
Survey on Fairness Notions and Related Tensions. CoRR abs/2209.13012 (2022) - 2021
- [j12]Karima Makhlouf, Sami Zhioua, Catuscia Palamidessi:
Machine learning fairness notions: Bridging the gap with real-world applications. Inf. Process. Manag. 58(5): 102642 (2021) - [j11]Karima Makhlouf, Sami Zhioua, Catuscia Palamidessi:
On the Applicability of Machine Learning Fairness Notions. SIGKDD Explor. 23(1): 14-23 (2021) - 2020
- [i2]Karima Makhlouf, Sami Zhioua, Catuscia Palamidessi:
On the Applicability of ML Fairness Notions. CoRR abs/2006.16745 (2020) - [i1]Karima Makhlouf, Sami Zhioua, Catuscia Palamidessi:
Survey on Causal-based Machine Learning Fairness Notions. CoRR abs/2010.09553 (2020)
2010 – 2019
- 2019
- [j10]Abdullah Qasem, Sami Zhioua, Karima Makhlouf:
Finding a Needle in a Haystack: The Traffic Analysis Version. Proc. Priv. Enhancing Technol. 2019(2): 270-290 (2019) - 2018
- [j9]Taher Al-Shehari, Sami Zhioua:
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks. Clust. Comput. 21(4): 1917-1931 (2018) - [j8]Asem Ghaleb, Sami Zhioua, Ahmad Almulhem:
On PLC network security. Int. J. Crit. Infrastructure Prot. 22: 62-69 (2018) - 2017
- [c21]Ahmad Amro, Sultan Almuhammadi, Sami Zhioua:
NetInfoMiner: High-level information extraction from network traffic. BigComp 2017: 143-150 - 2016
- [c20]Asem Ghaleb, Sami Zhioua, Ahmad Almulhem:
SCADA-SST: a SCADA security testbed. WCICSS 2016: 34-39 - [c19]Haroon Wardak, Sami Zhioua, Ahmad Almulhem:
PLC access control: a security analysis. WCICSS 2016: 56-61 - 2015
- [j7]Sami Zhioua:
Analyzing anonymity attacks through noisy channels. Inf. Comput. 244: 76-112 (2015) - [j6]Sami Zhioua:
The web browser factor in traffic analysis attacks. Secur. Commun. Networks 8(18): 4227-4241 (2015) - 2014
- [c18]Sami Zhioua, Mahjoub Langar:
Traffic Analysis of Web Browsers. FMS @ Petri Nets 2014: 20-33 - [c17]Sami Zhioua, Adnene Ben Jabeur, Mahjoub Langar, Wael Ilahi:
Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models. SecureComm (1) 2014: 623-631 - 2013
- [j5]Josée Desharnais, François Laviolette, Sami Zhioua:
Testing probabilistic equivalence through Reinforcement Learning. Inf. Comput. 227: 21-57 (2013) - [j4]Hamdi Yahyaoui, Sami Zhioua:
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models. Knowl. Inf. Syst. 37(2): 389-416 (2013) - [j3]Sami Zhioua:
Tor traffic analysis using Hidden Markov Models. Secur. Commun. Networks 6(9): 1075-1086 (2013) - [c16]Sami Zhioua:
The Middle East under Malware Attack Dissecting Cyber Weapons. ICDCS Workshops 2013: 11-16 - [c15]Muhammad Aliyu Sulaiman, Sami Zhioua:
Attacking Tor through Unpopular Ports. ICDCS Workshops 2013: 33-38 - 2011
- [c14]Hamdi Yahyaoui, Sami Zhioua:
Bootstrapping Trust of Web Services through Behavior Observation. ICWE 2011: 319-330 - [c13]Sami Zhioua:
Anonymity Attacks on Mix Systems: A Formal Analysis. Information Hiding 2011: 133-147 - 2010
- [c12]Sami Zhioua:
A geometric view of mutual information: Application to anonymity protocols. ISITA 2010: 60-65 - [c11]Sami Zhioua:
A New Information Leakage Measure for Anonymity Protocols. SecureComm 2010: 398-414
2000 – 2009
- 2009
- [c10]Sami Zhioua, Doina Precup, François Laviolette, Josée Desharnais:
Learning the Difference between Partially Observable Dynamical Systems. ECML/PKDD (2) 2009: 664-677 - 2006
- [j2]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Evaluation of J2ME CLDC Embedded Java Platform. J. Object Technol. 5(2): 125-154 (2006) - [c9]Josée Desharnais, François Laviolette, Krishna Priya Darsini Moturu, Sami Zhioua:
Trace Equivalence Characterization Through Reinforcement Learning. Canadian AI 2006: 371-382 - [c8]Josée Desharnais, François Laviolette, Sami Zhioua:
Testing Probabilistic Equivalence Through Reinforcement Learning. FSTTCS 2006: 236-247 - [c7]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Common Criteria Approach to J2ME CLDC Security Requirements. SoMeT 2006: 177-194 - 2005
- [j1]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi:
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. J. Object Technol. 4(1): 83-108 (2005) - [c6]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Java for Mobile Devices: A Security Study. ACSAC 2005: 235-244 - [c5]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Analysis of Mobile Java. DEXA Workshops 2005: 231-235 - [c4]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Analysis of Wireless Java. PST 2005 - 2004
- [c3]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
A dynamic compiler for embedded Java virtual machines. PPPJ 2004: 100-106 - [c2]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua:
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. PPPJ 2004: 107-113 - 2003
- [c1]Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
Method Call Acceleration in Embedded Java Virtual Machines. International Conference on Computational Science 2003: 750-759
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint