Sami Zhioua's Web Page

  

Sami Zhioua,
Assistant Professor in Ethical AI (École Polytechnique, Palaiseau, France)
Advanced Researcher (INRIA, Saclay Ile-de-France)
Mailing address:
1 Rue Honoré d'Estienne d'Orves, Bâtiment Alan Turing
Campus de l'École Polytechnique, Palaiseau, 91940, France

email: zhioua@lix.polytechnique.fr

Welcome to my webpage. I am assistant professor in Ethical AI at École Polytechnique
and advanced researcher at INRIA (Comete research team).
My research interests include Fairness and Privacy in Machine Learning and AI in general.
Previously, I worked on Privacy Enhancing Technologies, Reinforcement Learning,
and security and optimisation of Java virtual machine.

                              
Research
Interests
      Publications       Teaching       Links       Personal       Resume
(CV)

Research Interests      

- Fairness in ML: Bias discovery in automated decision systems, Causal-based fairness notions, Fairness-Privacy trade-off.
- Computer Security and Privacy: Privacy enhancing technologies, Anonymity Protocols, Traffic Analysis, Software Exploitation, SCADA Security
- Java: Acceleration and Security of Java Virtual Machines.

Conferences and Journals in focus (Updated February 2014)

Ph.D. Thesis : Stochastic systems divergence through Reinforcement Learning.

Defense : January 31st, 2008.

Chair : Mario Marchand, Ph.D. (UniversitÉ Laval)
Comity : Josée Desharnais, Ph.D., supervisor (Université Laval)
  François Laviolette, Ph.D., co-supervisor (Université Laval)
  Marta Kwiatkowska, Ph.D. (Oxford University)
  Doina Precup, Ph.D. (McGill University)
  Danny Dubé, Ph.D. (Université Laval)

Publications     

Journal Papers

K. Makhlouf, S. Zhioua, and C. Palamidessi. A survey on causal-based machine learning fairness notions. Arxiv (2022)

K. Makhlouf, S. Zhioua, and C. Palamidessi. Machine learning fairness notions: Bridging the gap with real-world applications. Information Processing and Management, Volume 58, Issue 5 (2021)

K. Makhlouf, S. Zhioua, and C. Palamidessi. On the Applicability of ML Fairness Notions. ACM SIGKDD Explorations Newsletter, Volume 23, Issue 1, June 2021, pp 14–23 (2021).

A. Ghaleb, S. Zhioua, and A. Almulhem. On PLC network security. International Journal of Criticial Infrastructure Protection (IJCIP), Volume 22, (2018): Pages 62-69.

T. Al-Shehari and S. Zhioua. An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks. Cluster Computing, Volume 21, Issue 4, pages 1917-1931 (2018).

S. Zhioua. Analyzing anonymity attacks through noisy channels, Information and Computation Journal, Volume 244, October 2015, Pages 76–112, Elsevier.

S. Zhioua. The web browser factor in traffic analysis attacks. Security and Communication Networks. Volume 8, Issue 18, Pages 4227-4241, John Wiley and Sons, 2015.

J. Desharnais, F. Laviolette, and S. Zhioua. Testing Probabilistic Equivalence through Reinforcement Learning. Information and Computation, Volume 227, Pages 21-57, Elsevier, June 2013.

S. Zhioua. Tor Traffic Analysis using Hidden Markov Models. Security and Communication Networks Journal, John Wiley and Sons, October 2012.

H. Yahyaoui, S. Zhioua. Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models. Journal of Knowledge and Information Systems. Springer. September 2012.

M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Security Evaluation of J2ME CLDC Embedded Java Platform. Journal of Object Technology, Vol 5, Nb 2, Pages 125-154, March-April 2006.

M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. Journal of Object Technology, Vol 4, Nb 1, Pages 83-108, January-February 2005.


Conference Papers

A. Qasem, S. Zhioua, and K. Makhlouf. Finding a Needle in a Haystack: The Traffic Analysis Version. Proceedings on Privacy Enhancing Technologies, Issue 2.

A. Amro, S. Almuhammadi, and S. Zhioua. NetInfoMiner: High-level Information Extraction From Network Traffic, IEEE International Conference on Big Data and Smart Computing (IEEE BigComp 2017) Jeju, Korea (February 13-16, 2017).

A. Ghaleb, S. Zhioua, A. Almulhem. SCADA-SST: A SCADA Security Testbed. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK.

H. Wardak, S. Zhioua, A. Almulhem. PLC Access Control: A Security Analysis. World Congress on Industrial Control Systems Security (WCICSS-2016). December 12-14, 2016, London, UK.

Zhioua, S., Jabeur, A. B., Langar, M., Ilahi, W. Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models. In Proceedings of SecureComm 2014. Volume 152 pp 623-631.

S. Zhioua, M. Langar: Traffic Analysis of Web Browsers. FMS @ Petri Nets 2014: 20-33

S. Zhioua. The Middle East under Malware Attack: Dissecting Cyber Weapons. IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.

M. Sulaiman, S. Zhioua. Attacking Tor through Unpopular Ports. IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP 2013). Philadelphia, USA, July 8, 2013.

S. Zhioua. Anonymity Attacks on Mix Systems: A Formal Analysis. Lecture Notes in Computer Science. 13th Information Hiding Conference, Prague, Czech Republic. 2011.

H. Yahyaoui and S. Zhioua. Bootstrapping Trust of Web Services through Behavior Observation. In Proceedings of the 11th International Conference on Web Engineering (ICWE 2011), LNCS 6757, Pages 319-330, Paphos, Cyprus, June 2011.

S. Zhioua. A New Information Leakage Measure for Anonymity Protocols. Security and Privacy in Communication Networks, Part 8, pages 398-414. Springer, 2010.

S. Zhioua. A Geometric View of Mutual Information: Application to Anonymity Protocols. In proceedings of the International Symposium on Information Theory and its Applications (ISITA). Pages 60-65. October, 2010.

S. Zhioua, J. Desharnais, F. Laviolette, and D. Precup. Learning the Difference between Partially Observable Dynamical Systems. In ECML-PKDD, 2009.

F. Laviolette, S. Zhioua. Testing Stochastic Processes through Reinforcement Learning. In NIPS'06 Workshop on Testing of Deployable Learning and Decision Systems, Kiri Wagstaff, Chris Drummond and Dragos Margineantu (Eds), 8 pages, 2006.

J. Desharnais, F. Laviolette, and S. Zhioua. Testing Probabilistic Equivalence through Reinforcement Learning. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science), Vol 4337, Pages 236-247, 2006.

J. Desharnais, F. Laviolette, K. Darsini Moturu, and S. Zhioua. Trace Equivalence Characterization through Reinforcement Learning. In Proceedings of the 19th Canadian Conference on Artificial Intelligence, Vol 4013, Pages 371-382, Springer, 2006.

M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Security Analysis of Mobile Java. In DEXA 2005, Pages 231-235, IEEE Computer Society, 2005.

M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Java for Mobile Devices: A Security Study. In ACSAC 2005, Pages 235-244, IEEE Computer Society, 2005.

M. Debbabi, A Gherbi, L. Ketari, C. Talhi, H. Yahyaoui, and S. Zhioua. A Synergy between Efficient Interpretation and Fast Selective Dynamic Compilation for the Acceleration of Embedded Java Virtual Machines. In ACM PPPJ'04, Pages 100-107, ACM Press, 2004.

M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua. E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. In ACM PPPJ'04, Pages 108-115, ACM Press, 2004.

M. Debbabi, M. Erhioui, L. Ketari, N. Tawbi, H. Yahyaoui, and S. Zhioua. Method Call Acceleration in Java Virtual Machines. In Proceedings of the International Conference on Computational Science 2003), Vol 2659, Pages 750-759, Springer, 2003.


Patent

M. Debbabi, N. Tawbi, S. Zhioua, M. Erhioui, L. Ketari, H. Yahyaoui. Method Call Acceleration in Java Virtual Machines.
Patent disclosure filed at:
- US Patent Office: US20020405266P 20020822.
- European Patent Office: EP1394675.
- Japan Patent Office: JP2004086869.
- Chinese Patent Office: CN1251076.

Books

S. Zhioua Stochastic Systems Divergence through Reinforcement Learning: How to use artificial intelligence to validate stochastic systems, 164 pages, Paperback, First Edition, ISBN: 3847339710 , February 2012, LAP Lambert.

S. Zhioua A Dynamic Compiler for an Embedded Java Virtual Machine, 96 pages, Paperback, First Edition, ISBN: 3639095065 , October 2008, VDM Verlag.

M. Debbabi, M. Saleh, C. Talhi, S. Zhioua. Embedded Java Security: Security for Mobile Devices, 270 pages, 38 illus., Hardcover, First Edition, ISBN: 978-1-84628-590-5 , November 2006, Springer Verlag.

Teaching      

Undegraduate courses

Graduate courses

Specialized Trainings (Short Courses)

Links      
A research paper generator !
PHD Comics (a must see web site for any Ph.D. candidate)
Javier Sotomayor (by sami zhioua)

Personal      

Citizenship : Tunisia, Canada
Residence : Paris, France
Hobbies : Sport (mostly jogging), Reading, Coding, Hacking with electronics and robotics.
My goodreads (books) profile
Tribute (Hommage) by my Ph.D. professors : Josée Desharnais and François Laviolette.

 

Videos      

     

                                
The first 5 minutes of the defense       Thesis Acknowledgement       In the Lab-oratoire public (Science Education Event) 2006

 


Last updated November, 2021