Sami Zhioua

Sami Zhioua

Sami Zhioua

Affiliated Professor in AI Ethics
Field(s) of expertise
Ethical aspects of artificial intelligence, Privacy enhancing technologies, Cybersecurity

Sami Zhioua is a researcher at INRIA Saclay Ile-de-France. His research interests include the ethical aspects of artificial intelligence, mainly fairness and privacy enhancing technologies. Previously he worked on Java acceleration and security as well as on several cybersecurity projects. He holds a Ph.D. in Computer Science from Laval University, Quebec, Canada.

2008Université Laval, CanadaPh.D. in Computer Science
2003Université de Tunis, TunisieM.Sc. in Computer Science
2000Institut Supérieur de Gestion (ISG), Tunis, TunisieJoint FNEGE-ABS development programme for Programme Directors
2021 – presentAdvanced Researcher in Fairness in ML - INRIA, LIX, Ecole Polytechnique, Paris-Saclay, France
2019 - 2021Assistant Professor - Higher Colleges of Technology (HCT), Dubai
2009 - 2019Assistant Professor - King Fahd University of Petroleum and Minerals (KFUPM), KSA
2008 -2009Postdoctoral research and teaching fellow - McGill University, Canada
2002 - 2009Course Lecturer and Teaching and Research Assistant - Université Laval, Canada


  • Stochastic Systems Divergence through Reinforcement Learning. S. Zhioua. Paperback, First Edition, ISBN: 978-3-8473-3971-7, February 2012, LAP Publishing.
  • A Dynamic Compiler for an Embedded Java Virtual Machine. S. Zhioua. 96 pages, Paperback, First Edition, ISBN: 3639095065, October 2008, VDM Verlag.
  • Embedded Java Security: Security for Mobile Devices. M. Debbabi, M. Saleh, C. Talhi, S. Zhioua. 270 pages, 38 illus., Hardcover, First Edition, ISBN: 978-1-84628-590-5, November 2006, Springer Verlag.



  • K. Makhlouf, S. Zhioua, and C. Palamidessi. Machine learning fairness notions: Bridging the gap with real-world applications. Information Processing & Management Volume 58 Issue 5 (2021)
  • K. Makhlouf, S. Zhioua, and C. Palamidessi. On the Applicability of ML Fairness Notions. ACM SIGKDD Explorations Newsletter Volume 23 Issue 1 June 2021 pp 14–23 (2021)
  • K. Makhlouf, S. Zhioua, and C. Palamidessi. Identifiability of Causal-based Fairness Notions: A State of the Art. Arxiv arXiv preprint arXiv:2203.05900 (2021)
  • A. Ghaleb, S. Zhioua, and A. Almulhem. On PLC network security. International Journal of Criticial Infrastructure Protection (IJCIP) Volume 22 (2018): Pages 62-69.
  • T. Al-Shehari and S. Zhioua. An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks. Cluster Computing Volume 21 Issue 4 (2018): pages 1917-1931.
  • S. Zhioua. Analyzing anonymity attacks through noisy channels. Information and Computation Journal, Volume 244, Pages 76-112, Elsevier, October 2015.
  • S. Zhioua. The web browser factor in traffic analysis attacks. Journal of Security and Communication Networks. Volume 8, Issue 18, Pages 4227-4241. John Wiley & Sons, September 2015.
  • J. Desharnais, F. Laviolette, and S. Zhioua. Testing Probabilistic Equivalence through Reinforcement Learning. Information and Computation Journal, Volume 227, Pages 21-57, Elsevier, June 2013.
  • S. Zhioua. Tor Traffic Analysis using Hidden Markov Models. Journal of Security and Communication Networks, Volume 6, Issue 9, pages 1075-1086, John Wiley & Sons, September 2013.
  • H. Yahyaoui, S. Zhioua. Boostrapping Trust of Web Services based on Trust Patterns and Hidden Markov Models. International Journal of Knowledge and Information Systems. Volume 37, Issue 2, Page 389-416, Springer, 2013.
  • M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technology, Vol 5, Nb 2, P 125-154, March-April 2006.
  • M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. Journal of Object Technology, Vol 4, Nb 1, P 83-108, January-February 2005.



  • A. Qasem, S. Zhioua, and K. Makhlouf. Finding a Needle in a Haystack: The Traffic Analysis Version. Proceedings on Privacy Enhancing Technologies 2019.2 (2019)
  • A. Amro, S. Almuhammadi, and S. Zhioua. NetInfoMiner: High-level Information Extraction From Network Traffic, IEEE International Conference on Big Data and Smart Computing (IEEE BigComp 2017) Jeju, Korea (February 13-16, 2017).
  • A. Ghaleb, S. Zhioua, A. Almulhem. SCADA-SST: A SCADA Security Testbed. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK.
  • H. Wardak, S. Zhioua, A. Almulhem. PLC Access Control: A Security Analysis. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK.
  • S. Zhioua, A. Ben Jabeur, M. Langar and W. Ilahi. Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models. 10th International Conference on Security and Privacy in Communication Networks. Sept 24-26, 2014, China.
  • S. Zhioua, M. Langar. Traffic Analysis of Web Browsers. Formal Methods in Security (FMS) @ Petri Nets 2014: 20-33.
  • S. Zhioua. The Middle East under Malware Attack: Dissecting Cyber Weapons. IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.
  • M. Sulaiman, S. Zhioua. Attacking Tor through Unpopular Ports. IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.
  • S. Zhioua. Anonymity Attacks on Mix Systems: A Formal Analysis. 13th Information Hiding Conference, Prague, Czech Republic. Lecture Notes in Computer Science 6958, Pages 133-147. 2011.