On the applicability of machine learning fairness notions K Makhlouf, S Zhioua, C Palamidessi ACM SIGKDD Explorations Newsletter 23 (1), 14-23, 2021 | 172* | 2021 |
When Causality Meets Fairness: A Survey K Makhlouf, S Zhioua, C Palamidessi Journal of Logical and Algebraic Methods in Programming, 101000, 2024 | 91* | 2024 |
The middle east under malware attack dissecting cyber weapons S Zhioua 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 82 | 2013 |
PLC access control: a security analysis H Wardak, S Zhioua, A Almulhem 2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016 | 68 | 2016 |
On PLC network security A Ghaleb, S Zhioua, A Almulhem International Journal of Critical Infrastructure Protection 22, 62-69, 2018 | 62 | 2018 |
Security evaluation of J2ME CLDC embedded Java platform. M Debbabi, MM Saleh, C Talhi, S Zhioua J. Object Technol. 5 (2), 125-154, 2006 | 38 | 2006 |
Scada-sst: a scada security testbed A Ghaleb, S Zhioua, A Almulhem 2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016 | 32 | 2016 |
Java for mobile devices: A security study M Debbabi, M Saleh, C Talhi, S Zhioua 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005 | 26 | 2005 |
Method call acceleration in virtual machines M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui US Patent App. 10/395,906, 2004 | 25 | 2004 |
A dynamic compiler for embedded java virtual machines M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua Trinity College Dublin, 2004 | 24 | 2004 |
Survey on fairness notions and related tensions G Alves, F Bernier, M Couceiro, K Makhlouf, C Palamidessi, S Zhioua EURO journal on decision processes 11, 100033, 2023 | 22 | 2023 |
The Impact of illegal waste sites on the transmission of zoonotic cutaneous leishmaniasis in Central Tunisia I Chelbi, O Mathlouthi, S Zhioua, W Fares, A Boujaama, S Cherni, ... International Journal of Environmental Research and Public Health 18 (1), 66, 2021 | 19 | 2021 |
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models H Yahyaoui, S Zhioua Knowledge and information systems 37, 389-416, 2013 | 19 | 2013 |
Security analysis of mobile Java M Debbabi, M Saleh, C Talhi, S Zhioua 16th International Workshop on Database and Expert Systems Applications …, 2005 | 17 | 2005 |
Embedded Java security: security for mobile devices M Debbabi, M Saleh, C Talhi, S Zhioua Springer Science & Business Media, 2007 | 16 | 2007 |
Attacking tor through unpopular ports MA Sulaiman, S Zhioua 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 15 | 2013 |
An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks T Al-Shehari, S Zhioua Cluster Computing 21 (4), 1917-1931, 2018 | 14 | 2018 |
Causal discovery for fairness R Binkyte-Sadauskiene, K Makhlouf, C Pinzón, S Zhioua, C Palamidessi arXiv preprint arXiv:2206.06685, 2022 | 11 | 2022 |
Finding a needle in a haystack: The traffic analysis version A Qasem, S Zhioua, K Makhlouf Proceedings on Privacy Enhancing Technologies, 2019 | 11 | 2019 |
Bootstrapping trust of web services through behavior observation H Yahyaoui, S Zhioua Web Engineering: 11th International Conference, ICWE 2011, Paphos, Cyprus …, 2011 | 11 | 2011 |