Dr. Sami Zhioua

Affiliate Professor of AI Ethics
Image
Dr. Sami Zhioua

Biography

Sami Zhioua is a researcher at INRIA Saclay Ile-de-France. His research focuses on the ethical aspects of artificial intelligence, primarily fairness and privacy-enhancing technologies. Previously, he worked on Java acceleration and security, as well as on several cybersecurity projects. He holds a Ph.D. in computer science from Laval University in Quebec City, Canada.

 

Education & Degrees

YearUniversityDegree/Position
2008    Laval University, Canada    Ph.D. in Computer Science
 
2003University of Tunis, Tunisia    Master of Science in Computer Science
 
2000Institut Supérieur de Gestion (ISG), Tunis, Tunisia    Joint FNEGE-ABS development program for Program Directors
 

Professional experience

YearFunction
2021 – present    Senior Researcher in Fairness in Machine Learning - INRIA, LIX, École Polytechnique, Paris-Saclay, France
 
2019–2021    Assistant Professor - Higher Colleges of Technology (HCT), Dubai
 
2009–2019    Assistant Professor - King Fahd University of Petroleum and Minerals (KFUPM), Saudi Arabia
 
2008–2009    Postdoctoral Researcher and Lecturer - McGill University, Canada
 
2002–2009    Lecturer and Teaching and Research Assistant - Laval University, Canada
 

Publications

BOOKS

  • Stochastic Systems Divergence through Reinforcement Learning. S. Zhioua. Paperback, First Edition, ISBN: 978-3-8473-3971-7, February 2012, LAP Publishing.
  • A Dynamic Compiler for an Embedded Java Virtual Machine. S. Zhioua. 96 pages, Paperback, First Edition, ISBN: 3639095065, October 2008, VDM Verlag.
  • Embedded Java Security: Security for Mobile Devices. M. Debbabi, M. Saleh, C. Talhi, S. Zhioua. 270 pages, 38 illustrations, hardcover, first edition, ISBN: 978-1-84628-590-5, November 2006, Springer Verlag.

JOURNAL ARTICLES

  • K. Makhlouf, S. Zhioua, and C. Palamidessi. Fairness Concepts in Machine Learning: Bridging the Gap with Real-World Applications. Information Processing & Management, Vol. 58, No. 5 (2021)
  • K. Makhlouf, S. Zhioua, and C. Palamidessi. “On the Applicability of ML Fairness Notions.” ACM SIGKDD Explorations Newsletter, vol. 23, no. 1, June 2021, pp. 14–23 (2021)
  • K. Makhlouf, S. Zhioua, and C. Palamidessi. Identifiability of Causal-based Fairness Notions: A State of the Art. Arxiv preprint arXiv:2203.05900 (2021)
  • A. Ghaleb, S. Zhioua, and A. Almulhem. “On PLC Network Security.” International Journal of Critical Infrastructure Protection (IJCIP), vol. 22 (2018), pp. 62–69.
  • T. Al-Shehari and S. Zhioua. An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks. Cluster Computing, Vol. 21, No. 4 (2018): pp. 1917–1931.
  • S. Zhioua. Analyzing anonymity attacks through noisy channels. *Information and Computation*, Vol. 244, pp. 76–112, Elsevier, October 2015.
  • S. Zhioua. “The Web Browser Factor in Traffic Analysis Attacks.” *Journal of Security and Communication Networks*, vol. 8, no. 18, pp. 4227–4241. John Wiley & Sons, September 2015.
  • J. Desharnais, F. Laviolette, and S. Zhioua. “Testing Probabilistic Equivalence through Reinforcement Learning.” *Information and Computation*, Vol. 227, pp. 21–57, Elsevier, June 2013.
  • S. Zhioua. Tor Traffic Analysis Using Hidden Markov Models. Journal of Security and Communication Networks, Volume 6, Issue 9, pp. 1075–1086, John Wiley & Sons, September 2013.
  • H. Yahyaoui, S. Zhioua. "Bootstrapping Trust in Web Services Based on Trust Patterns and Hidden Markov Models." *International Journal of Knowledge and Information Systems*, vol. 37, no. 2, pp. 389–416, Springer, 2013.
  • M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. “Security Evaluation of the J2ME CLDC Embedded Java Platform.” Journal of Object Technology, Vol. 5, No. 2, pp. 125–154, March–April 2006.
  • M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. Journal of Object Technology, Vol. 4, No. 1, pp. 83–108, January–February 2005.

CONFERENCE PAPERS

  • A. Qasem, S. Zhioua, and K. Makhlouf. Finding a Needle in a Haystack: The Traffic Analysis Version. Proceedings on Privacy Enhancing Technologies 2019.2 (2019)
  • A. Amro, S. Almuhammadi, and S. Zhioua. NetInfoMiner: High-level Information Extraction From Network Traffic, IEEE International Conference on Big Data and Smart Computing (IEEE BigComp 2017), Jeju, Korea (February 13–16, 2017).
  • A. Ghaleb, S. Zhioua, A. Almulhem. SCADA-SST: A SCADA Security Testbed. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12–14, 2016, London, UK.
  • H. Wardak, S. Zhioua, A. Almulhem. PLC Access Control: A Security Analysis. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12–14, 2016, London, UK.
  • S. Zhioua, A. Ben Jabeur, M. Langar, and W. Ilahi. "Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models." 10th International Conference on Security and Privacy in Communication Networks. Sept. 24–26, 2014, China.
  • S. Zhioua, M. Langar. Traffic Analysis of Web Browsers. Formal Methods in Security (FMS) @ Petri Nets 2014: 20–33.
  • S. Zhioua. The Middle East Under Malware Attack: Dissecting Cyber Weapons. IEEE ICDCS Workshop on Network Forensics, Security, and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.
  • M. Sulaiman, S. Zhioua. "Attacking Tor through Unpopular Ports." IEEE ICDCS Workshop on Network Forensics, Security, and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.
  • S. Zhioua. Anonymity Attacks on Mix Systems: A Formal Analysis. 13th Information Hiding Conference, Prague, Czech Republic. Lecture Notes in Computer Science 6958, pp. 133–147. 2011.

See also

blc-instructor-faculty-py-5-mt-3

See also