Bechara al Bouna

Orcid: 0000-0002-7741-9905

According to our database1, Bechara al Bouna authored at least 41 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A framework for evaluating image obfuscation under deep learning-assisted privacy attacks.
Multim. Tools Appl., November, 2023

Cloud-based differentially private image classification.
Wirel. Networks, April, 2023

2022
Differentially private multivariate time series forecasting of aggregated human mobility with deep learning: Input or gradient perturbation?
Neural Comput. Appl., 2022

2021
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy.
ACM Trans. Internet Techn., 2021

Exposing safe correlations in transactional datasets.
Serv. Oriented Comput. Appl., 2021

Improving the Utility of Locally Differentially Private Protocols for Longitudinal and Multidimensional Frequency Estimates.
CoRR, 2021

Random Sampling Plus Fake Data: Multidimensional Frequency Estimates With Local Differential Privacy.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
A Weighted Feature-Based Image Quality Assessment Framework in Real-Time.
Trans. Large Scale Data Knowl. Centered Syst., 2020

Publishing Anonymized Set-Valued Data via Disassociation towards Analysis.
Future Internet, 2020

Forecasting the number of firefighter interventions per region with local-differential-privacy-based data.
Comput. Secur., 2020

Longitudinal Collection and Analysis of Mobile Phone Data with Local Differential Privacy.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

Mobility modeling through mobile data: generating an optimized and open dataset respecting privacy.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

VIP Blowfish Privacy in Communication Graphs.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Safe disassociation of set-valued datasets.
J. Intell. Inf. Syst., 2019

A Framework for Evaluating Image Obfuscation under Deep Learning-Assisted Privacy Attacks.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

A Real-Time Multimedia Data Quality Assessment Framework.
Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019

Ant-driven clustering for utility-aware disassociation of set-valued datasets.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

2018
(k, l)-Clustering for Transactional Data Streams Anonymization.
Proceedings of the Information Security Practice and Experience, 2018

2016
Anonymizing multimedia documents.
World Wide Web, 2016

Preventing sensitive relationships disclosure for better social media preservation.
Int. J. Inf. Sec., 2016

The dynamics of the CBC Mode of Operation.
CoRR, 2016

On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

2015
Anonymizing transactional datasets.
J. Comput. Secur., 2015

Efficient Sanitization of Unsafe Data Correlations.
Proceedings of the Workshops of the EDBT/ICDT 2015 Joint Conference (EDBT/ICDT), 2015

An SQL-like query tool for data anonymization and outsourcing.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

2014
MOP: A Privacy Preserving Model for Multimedia Objects.
Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, 2014

2013
A Flexible Image-Based Access Control Model for Social Networks.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

<i>de</i>-linkability: a privacy-preserving constraint for safely outsourcing multimedia documents.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

Using Safety Constraint for Transactional Dataset Anonymization.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Secure Outsourcing of Network Flow Data Analysis.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
A Fine-Grained Image Access Control Model.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

2011
The Image Protector - A Flexible Security Rule Specification Toolkit .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Privacy preserving via tree augmented naïve Bayesian classifier in multimedia database.
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011

2009
Enforcing role based access control model with multimedia signatures.
J. Syst. Archit., 2009

Detecting Inference Channels in Private Multimedia Data via Social Networks.
Proceedings of the Data and Applications Security XXIII, 2009

Bridging Sensing and Decision Making in Ambient Intelligence Environments.
Proceedings of the Multimedia Techniques for Device and Ambient Intelligence, 2009

2008
MC<sup>SE</sup>: a multimedia context-based security engine.
Proceedings of the EDBT 2008, 2008

2007
A multimedia access control language for virtual and ambient intelligence environments.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

MCA2CM: Multimedia Context-Aware Access Control Model.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

2006
Multimedia-based authorization and access control policy specification.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006


  Loading...