Sami Zhioua

Orcid: 0000-0003-2029-175X

According to our database1, Sami Zhioua authored at least 42 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Gender and sex bias in COVID-19 epidemiological data through the lens of causality.
Inf. Process. Manag., May, 2023

On the Impact of Multi-dimensional Local Differential Privacy on Fairness.
CoRR, 2023

Dissecting Causal Biases.
CoRR, 2023

Shedding light on underrepresentation and Sampling Bias in machine learning.
CoRR, 2023

2022
Survey on Fairness Notions and Related Tensions.
CoRR, 2022

On the Need and Applicability of Causality for Fair Machine Learning.
CoRR, 2022

Identifiability of Causal-based Fairness Notions: A State of the Art.
CoRR, 2022

Causal Discovery for Fairness.
Proceedings of the Algorithmic Fairness through the Lens of Causality and Privacy Workshop, 2022

2021
On the Applicability of Machine Learning Fairness Notions.
SIGKDD Explor., 2021

Machine learning fairness notions: Bridging the gap with real-world applications.
Inf. Process. Manag., 2021

2020
Survey on Causal-based Machine Learning Fairness Notions.
CoRR, 2020

On the Applicability of ML Fairness Notions.
CoRR, 2020

2019
Finding a Needle in a Haystack: The Traffic Analysis Version.
Proc. Priv. Enhancing Technol., 2019

2018
On PLC network security.
Int. J. Crit. Infrastructure Prot., 2018

An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks.
Clust. Comput., 2018

2017
NetInfoMiner: High-level information extraction from network traffic.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

2016
PLC access control: a security analysis.
Proceedings of the 2016 World Congress on Industrial Control Systems Security, 2016

SCADA-SST: a SCADA security testbed.
Proceedings of the 2016 World Congress on Industrial Control Systems Security, 2016

2015
The web browser factor in traffic analysis attacks.
Secur. Commun. Networks, 2015

Analyzing anonymity attacks through noisy channels.
Inf. Comput., 2015

2014
Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Traffic Analysis of Web Browsers.
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014

2013
Tor traffic analysis using Hidden Markov Models.
Secur. Commun. Networks, 2013

Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models.
Knowl. Inf. Syst., 2013

Testing probabilistic equivalence through Reinforcement Learning.
Inf. Comput., 2013

The Middle East under Malware Attack Dissecting Cyber Weapons.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Attacking Tor through Unpopular Ports.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2011
Anonymity Attacks on Mix Systems: A Formal Analysis.
Proceedings of the Information Hiding - 13th International Conference, 2011

Bootstrapping Trust of Web Services through Behavior Observation.
Proceedings of the Web Engineering - 11th International Conference, 2011

2010
A New Information Leakage Measure for Anonymity Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2010

A geometric view of mutual information: Application to anonymity protocols.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
Learning the Difference between Partially Observable Dynamical Systems.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009

2006
Security Evaluation of J2ME CLDC Embedded Java Platform.
J. Object Technol., 2006

Common Criteria Approach to J2ME CLDC Security Requirements.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

Trace Equivalence Characterization Through Reinforcement Learning.
Proceedings of the Advances in Artificial Intelligence, 2006

2005
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines.
J. Object Technol., 2005

Security Analysis of Wireless Java.
Proceedings of the Third Annual Conference on Privacy, 2005

Security Analysis of Mobile Java.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Java for Mobile Devices: A Security Study.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004

A dynamic compiler for embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004

2003
Method Call Acceleration in Embedded Java Virtual Machines.
Proceedings of the Computational Science - ICCS 2003, 2003


  Loading...