Sami Zhioua

Sami Zhioua

Professeur affilié en Ethique de l’IA
Domaine(s) d'expertise
Aspects éthique de l'intelligence artificielle, Privacy enhancing technologies, Cybersécurité

Sami Zhioua est un chercheur à l'INRIA Saclay Ile-de-France. Il s'intéresse dans ses recherches aux aspects éthiques de l'intelligence artificielle, principalement, l'équité (Fairness) et la protection des informations privés (Privacy enhancing technologies). Auparavant il a travaillé sur l'accélération et la sécurité de Java ainsi que sur plusieurs projets en cybersécurité. Il détient un Doctorat en informatique de l'Université Laval, Québec, Canada.

AnnéeUniversitéDiplôme/Poste
2008Université Laval, CanadaPh.D. in Computer Science
2003Université de Tunis, TunisieM.Sc. in Computer Science
2000Institut Supérieur de Gestion (ISG), Tunis, TunisieJoint FNEGE-ABS development programme for Programme Directors
AnnéeFonction
2021 – aujourd’huiChercheur avancé en équité dans l’apprentissage automatique - INRIA, LIX, Ecole Polytechnique, Paris-Saclay, France
2019 - 2021Professeur assistant - Higher Colleges of Technology (HCT), Dubaï
2009 - 2019Professeur assistant - Université King Fahd du pétrole et des minéraux (KFUPM), KSA
2008 -2009Chercheur et enseignant postdoctoral - Université McGill, Canada
2002 - 2009Chargé de cours et assistant d'enseignement et de recherche - Université Laval, Canada

BOOKS

  • Stochastic Systems Divergence through Reinforcement Learning. S. Zhioua. Paperback, First Edition, ISBN: 978-3-8473-3971-7, February 2012, LAP Publishing.
  • A Dynamic Compiler for an Embedded Java Virtual Machine. S. Zhioua. 96 pages, Paperback, First Edition, ISBN: 3639095065, October 2008, VDM Verlag.
  • Embedded Java Security: Security for Mobile Devices. M. Debbabi, M. Saleh, C. Talhi, S. Zhioua. 270 pages, 38 illus., Hardcover, First Edition, ISBN: 978-1-84628-590-5, November 2006, Springer Verlag.

 

JOURNAL PAPERS

  • K. Makhlouf, S. Zhioua, and C. Palamidessi. Machine learning fairness notions: Bridging the gap with real-world applications. Information Processing & Management Volume 58 Issue 5 (2021)
  • K. Makhlouf, S. Zhioua, and C. Palamidessi. On the Applicability of ML Fairness Notions. ACM SIGKDD Explorations Newsletter Volume 23 Issue 1 June 2021 pp 14–23 (2021)
  • K. Makhlouf, S. Zhioua, and C. Palamidessi. Identifiability of Causal-based Fairness Notions: A State of the Art. Arxiv arXiv preprint arXiv:2203.05900 (2021)
  • A. Ghaleb, S. Zhioua, and A. Almulhem. On PLC network security. International Journal of Criticial Infrastructure Protection (IJCIP) Volume 22 (2018): Pages 62-69.
  • T. Al-Shehari and S. Zhioua. An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks. Cluster Computing Volume 21 Issue 4 (2018): pages 1917-1931.
  • S. Zhioua. Analyzing anonymity attacks through noisy channels. Information and Computation Journal, Volume 244, Pages 76-112, Elsevier, October 2015.
  • S. Zhioua. The web browser factor in traffic analysis attacks. Journal of Security and Communication Networks. Volume 8, Issue 18, Pages 4227-4241. John Wiley & Sons, September 2015.
  • J. Desharnais, F. Laviolette, and S. Zhioua. Testing Probabilistic Equivalence through Reinforcement Learning. Information and Computation Journal, Volume 227, Pages 21-57, Elsevier, June 2013.
  • S. Zhioua. Tor Traffic Analysis using Hidden Markov Models. Journal of Security and Communication Networks, Volume 6, Issue 9, pages 1075-1086, John Wiley & Sons, September 2013.
  • H. Yahyaoui, S. Zhioua. Boostrapping Trust of Web Services based on Trust Patterns and Hidden Markov Models. International Journal of Knowledge and Information Systems. Volume 37, Issue 2, Page 389-416, Springer, 2013.
  • M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technology, Vol 5, Nb 2, P 125-154, March-April 2006.
  • M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. Journal of Object Technology, Vol 4, Nb 1, P 83-108, January-February 2005.

 

CONFERENCE PAPERS

  • A. Qasem, S. Zhioua, and K. Makhlouf. Finding a Needle in a Haystack: The Traffic Analysis Version. Proceedings on Privacy Enhancing Technologies 2019.2 (2019)
  • A. Amro, S. Almuhammadi, and S. Zhioua. NetInfoMiner: High-level Information Extraction From Network Traffic, IEEE International Conference on Big Data and Smart Computing (IEEE BigComp 2017) Jeju, Korea (February 13-16, 2017).
  • A. Ghaleb, S. Zhioua, A. Almulhem. SCADA-SST: A SCADA Security Testbed. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK.
  • H. Wardak, S. Zhioua, A. Almulhem. PLC Access Control: A Security Analysis. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK.
  • S. Zhioua, A. Ben Jabeur, M. Langar and W. Ilahi. Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models. 10th International Conference on Security and Privacy in Communication Networks. Sept 24-26, 2014, China.
  • S. Zhioua, M. Langar. Traffic Analysis of Web Browsers. Formal Methods in Security (FMS) @ Petri Nets 2014: 20-33.
  • S. Zhioua. The Middle East under Malware Attack: Dissecting Cyber Weapons. IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.
  • M. Sulaiman, S. Zhioua. Attacking Tor through Unpopular Ports. IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.
  • S. Zhioua. Anonymity Attacks on Mix Systems: A Formal Analysis. 13th Information Hiding Conference, Prague, Czech Republic. Lecture Notes in Computer Science 6958, Pages 133-147. 2011.