Sami Zhioua
Professeur affilié en Ethique de l’IA
Domaine(s) d'expertise
Aspects éthique de l'intelligence artificielle, Privacy enhancing technologies, Cybersécurité
Sami Zhioua est un chercheur à l'INRIA Saclay Ile-de-France. Il s'intéresse dans ses recherches aux aspects éthiques de l'intelligence artificielle, principalement, l'équité (Fairness) et la protection des informations privés (Privacy enhancing technologies). Auparavant il a travaillé sur l'accélération et la sécurité de Java ainsi que sur plusieurs projets en cybersécurité. Il détient un Doctorat en informatique de l'Université Laval, Québec, Canada.
Année | Université | Diplôme/Poste |
---|---|---|
2008 | Université Laval, Canada | Ph.D. in Computer Science |
2003 | Université de Tunis, Tunisie | M.Sc. in Computer Science |
2000 | Institut Supérieur de Gestion (ISG), Tunis, Tunisie | Joint FNEGE-ABS development programme for Programme Directors |
Année | Fonction |
---|---|
2021 – aujourd’hui | Chercheur avancé en équité dans l’apprentissage automatique - INRIA, LIX, Ecole Polytechnique, Paris-Saclay, France |
2019 - 2021 | Professeur assistant - Higher Colleges of Technology (HCT), Dubaï |
2009 - 2019 | Professeur assistant - Université King Fahd du pétrole et des minéraux (KFUPM), KSA |
2008 -2009 | Chercheur et enseignant postdoctoral - Université McGill, Canada |
2002 - 2009 | Chargé de cours et assistant d'enseignement et de recherche - Université Laval, Canada |
BOOKS
- Stochastic Systems Divergence through Reinforcement Learning. S. Zhioua. Paperback, First Edition, ISBN: 978-3-8473-3971-7, February 2012, LAP Publishing.
- A Dynamic Compiler for an Embedded Java Virtual Machine. S. Zhioua. 96 pages, Paperback, First Edition, ISBN: 3639095065, October 2008, VDM Verlag.
- Embedded Java Security: Security for Mobile Devices. M. Debbabi, M. Saleh, C. Talhi, S. Zhioua. 270 pages, 38 illus., Hardcover, First Edition, ISBN: 978-1-84628-590-5, November 2006, Springer Verlag.
JOURNAL PAPERS
- K. Makhlouf, S. Zhioua, and C. Palamidessi. Machine learning fairness notions: Bridging the gap with real-world applications. Information Processing & Management Volume 58 Issue 5 (2021)
- K. Makhlouf, S. Zhioua, and C. Palamidessi. On the Applicability of ML Fairness Notions. ACM SIGKDD Explorations Newsletter Volume 23 Issue 1 June 2021 pp 14–23 (2021)
- K. Makhlouf, S. Zhioua, and C. Palamidessi. Identifiability of Causal-based Fairness Notions: A State of the Art. Arxiv arXiv preprint arXiv:2203.05900 (2021)
- A. Ghaleb, S. Zhioua, and A. Almulhem. On PLC network security. International Journal of Criticial Infrastructure Protection (IJCIP) Volume 22 (2018): Pages 62-69.
- T. Al-Shehari and S. Zhioua. An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks. Cluster Computing Volume 21 Issue 4 (2018): pages 1917-1931.
- S. Zhioua. Analyzing anonymity attacks through noisy channels. Information and Computation Journal, Volume 244, Pages 76-112, Elsevier, October 2015.
- S. Zhioua. The web browser factor in traffic analysis attacks. Journal of Security and Communication Networks. Volume 8, Issue 18, Pages 4227-4241. John Wiley & Sons, September 2015.
- J. Desharnais, F. Laviolette, and S. Zhioua. Testing Probabilistic Equivalence through Reinforcement Learning. Information and Computation Journal, Volume 227, Pages 21-57, Elsevier, June 2013.
- S. Zhioua. Tor Traffic Analysis using Hidden Markov Models. Journal of Security and Communication Networks, Volume 6, Issue 9, pages 1075-1086, John Wiley & Sons, September 2013.
- H. Yahyaoui, S. Zhioua. Boostrapping Trust of Web Services based on Trust Patterns and Hidden Markov Models. International Journal of Knowledge and Information Systems. Volume 37, Issue 2, Page 389-416, Springer, 2013.
- M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technology, Vol 5, Nb 2, P 125-154, March-April 2006.
- M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. Journal of Object Technology, Vol 4, Nb 1, P 83-108, January-February 2005.
CONFERENCE PAPERS
- A. Qasem, S. Zhioua, and K. Makhlouf. Finding a Needle in a Haystack: The Traffic Analysis Version. Proceedings on Privacy Enhancing Technologies 2019.2 (2019)
- A. Amro, S. Almuhammadi, and S. Zhioua. NetInfoMiner: High-level Information Extraction From Network Traffic, IEEE International Conference on Big Data and Smart Computing (IEEE BigComp 2017) Jeju, Korea (February 13-16, 2017).
- A. Ghaleb, S. Zhioua, A. Almulhem. SCADA-SST: A SCADA Security Testbed. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK.
- H. Wardak, S. Zhioua, A. Almulhem. PLC Access Control: A Security Analysis. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK.
- S. Zhioua, A. Ben Jabeur, M. Langar and W. Ilahi. Detecting Malicious Sessions through Traffic Fingerprinting using Hidden Markov Models. 10th International Conference on Security and Privacy in Communication Networks. Sept 24-26, 2014, China.
- S. Zhioua, M. Langar. Traffic Analysis of Web Browsers. Formal Methods in Security (FMS) @ Petri Nets 2014: 20-33.
- S. Zhioua. The Middle East under Malware Attack: Dissecting Cyber Weapons. IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.
- M. Sulaiman, S. Zhioua. Attacking Tor through Unpopular Ports. IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.
- S. Zhioua. Anonymity Attacks on Mix Systems: A Formal Analysis. 13th Information Hiding Conference, Prague, Czech Republic. Lecture Notes in Computer Science 6958, Pages 133-147. 2011.