Follow
Sami Zhioua
Sami Zhioua
INRIA, LIX, École Polytechnique, Paris, France
Verified email at lix.polytechnique.fr - Homepage
Title
Cited by
Cited by
Year
On the applicability of machine learning fairness notions
K Makhlouf, S Zhioua, C Palamidessi
ACM SIGKDD Explorations Newsletter 23 (1), 14-23, 2021
141*2021
Survey on causal-based machine learning fairness notions
K Makhlouf, S Zhioua, C Palamidessi
arXiv preprint arXiv:2010.09553, 2020
762020
The middle east under malware attack dissecting cyber weapons
S Zhioua
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
732013
On PLC network security
A Ghaleb, S Zhioua, A Almulhem
International Journal of Critical Infrastructure Protection 22, 62-69, 2018
602018
PLC access control: a security analysis
H Wardak, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
592016
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, MM Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
382006
SCADA-SST: a SCADA security testbed
A Ghaleb, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
312016
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
262005
Method call acceleration in virtual machines
M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui
US Patent App. 10/395,906, 2004
252004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models
H Yahyaoui, S Zhioua
Knowledge and information systems 37, 389-416, 2013
192013
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
162005
Embedded Java security: security for mobile devices
M Debbabi, M Saleh, C Talhi, S Zhioua
Springer Science & Business Media, 2007
152007
The Impact of illegal waste sites on the transmission of zoonotic cutaneous leishmaniasis in Central Tunisia
I Chelbi, O Mathlouthi, S Zhioua, W Fares, A Boujaama, S Cherni, ...
International Journal of Environmental Research and Public Health 18 (1), 66, 2021
142021
Attacking tor through unpopular ports
MA Sulaiman, S Zhioua
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
142013
An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks
T Al-Shehari, S Zhioua
Cluster Computing 21 (4), 1917-1931, 2018
132018
Survey on fairness notions and related tensions
G Alves, F Bernier, M Couceiro, K Makhlouf, C Palamidessi, S Zhioua
EURO Journal on Decision Processes, 100033, 2023
122023
Enhanced attraction of sand fly vectors of Leishmania infantum to dogs infected with zoonotic visceral leishmaniasis
I Chelbi, K Maghraoui, S Zhioua, S Cherni, I Labidi, A Satoskar, ...
PLoS Neglected Tropical Diseases 15 (7), e0009647, 2021
112021
Finding a needle in a haystack: The traffic analysis version
A Qasem, S Zhioua, K Makhlouf
Proceedings on Privacy Enhancing Technologies, 2019
112019
The system can't perform the operation now. Try again later.
Articles 1–20