Follow
Sami Zhioua
Sami Zhioua
INRIA, LIX, École Polytechnique, Paris, France
Verified email at lix.polytechnique.fr - Homepage
Title
Cited by
Cited by
Year
On the applicability of machine learning fairness notions
K Makhlouf, S Zhioua, C Palamidessi
ACM SIGKDD Explorations Newsletter 23 (1), 14-23, 2021
191*2021
When Causality Meets Fairness: A Survey
K Makhlouf, S Zhioua, C Palamidessi
Journal of Logical and Algebraic Methods in Programming, 101000, 2024
107*2024
The middle east under malware attack dissecting cyber weapons
S Zhioua
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
852013
PLC access control: a security analysis
H Wardak, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
702016
On PLC network security
A Ghaleb, S Zhioua, A Almulhem
International Journal of Critical Infrastructure Protection 22, 62-69, 2018
662018
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, MM Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
382006
Scada-sst: a scada security testbed
A Ghaleb, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
322016
Survey on fairness notions and related tensions
G Alves, F Bernier, M Couceiro, K Makhlouf, C Palamidessi, S Zhioua
EURO journal on decision processes 11, 100033, 2023
312023
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
262005
Method call acceleration in virtual machines
M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui
US Patent App. 10/395,906, 2004
252004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
The Impact of illegal waste sites on the transmission of zoonotic cutaneous leishmaniasis in Central Tunisia
I Chelbi, O Mathlouthi, S Zhioua, W Fares, A Boujaama, S Cherni, ...
International Journal of Environmental Research and Public Health 18 (1), 66, 2021
202021
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models
H Yahyaoui, S Zhioua
Knowledge and information systems 37, 389-416, 2013
202013
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
172005
Embedded Java security: security for mobile devices
M Debbabi, M Saleh, C Talhi, S Zhioua
Springer Science & Business Media, 2007
162007
An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks
T Al-Shehari, S Zhioua
Cluster Computing 21 (4), 1917-1931, 2018
152018
Attacking tor through unpopular ports
MA Sulaiman, S Zhioua
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
152013
Finding a needle in a haystack: The traffic analysis version
A Qasem, S Zhioua, K Makhlouf
Proceedings on Privacy Enhancing Technologies, 2019
132019
Gender and sex bias in COVID-19 epidemiological data through the lens of causality
N Díaz-Rodríguez, R Binkytė, W Bakkali, S Bookseller, P Tubaro, ...
Information Processing & Management 60 (3), 103276, 2023
122023
Causal discovery for fairness
R Binkyte-Sadauskiene, K Makhlouf, C Pinzón, S Zhioua, C Palamidessi
arXiv preprint arXiv:2206.06685, 2022
112022
The system can't perform the operation now. Try again later.
Articles 1–20