Follow
Sami Zhioua
Sami Zhioua
INRIA, LIX, École Polytechnique, Paris, France
Verified email at lix.polytechnique.fr - Homepage
Title
Cited by
Cited by
Year
On the applicability of machine learning fairness notions
K Makhlouf, S Zhioua, C Palamidessi
ACM SIGKDD Explorations Newsletter 23 (1), 14-23, 2021
147*2021
Survey on causal-based machine learning fairness notions
K Makhlouf, S Zhioua, C Palamidessi
arXiv preprint arXiv:2010.09553, 2020
792020
The middle east under malware attack dissecting cyber weapons
S Zhioua
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
772013
PLC access control: a security analysis
H Wardak, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
602016
On PLC network security
A Ghaleb, S Zhioua, A Almulhem
International Journal of Critical Infrastructure Protection 22, 62-69, 2018
582018
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, MM Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
382006
Scada-sst: a scada security testbed
A Ghaleb, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
312016
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
262005
Method call acceleration in virtual machines
M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui
US Patent App. 10/395,906, 2004
252004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models
H Yahyaoui, S Zhioua
Knowledge and information systems 37, 389-416, 2013
192013
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
172005
The Impact of illegal waste sites on the transmission of zoonotic cutaneous leishmaniasis in Central Tunisia
I Chelbi, O Mathlouthi, S Zhioua, W Fares, A Boujaama, S Cherni, ...
International Journal of Environmental Research and Public Health 18 (1), 66, 2021
152021
Embedded Java security: security for mobile devices
M Debbabi, M Saleh, C Talhi, S Zhioua
Springer Science & Business Media, 2007
152007
Attacking tor through unpopular ports
MA Sulaiman, S Zhioua
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
142013
Survey on fairness notions and related tensions
G Alves, F Bernier, M Couceiro, K Makhlouf, C Palamidessi, S Zhioua
EURO journal on decision processes, 100033, 2023
122023
An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks
T Al-Shehari, S Zhioua
Cluster Computing 21 (4), 1917-1931, 2018
122018
Finding a needle in a haystack: The traffic analysis version
A Qasem, S Zhioua, K Makhlouf
Proceedings on Privacy Enhancing Technologies, 2019
112019
Bootstrapping trust of web services through behavior observation
H Yahyaoui, S Zhioua
Web Engineering: 11th International Conference, ICWE 2011, Paphos, Cyprus …, 2011
112011
The system can't perform the operation now. Try again later.
Articles 1–20