Random sampling plus fake data: Multidimensional frequency estimates with local differential privacy HH Arcolezi, JF Couchot, B Al Bouna, X Xiao Proceedings of the 30th ACM International Conference on Information …, 2021 | 32 | 2021 |
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates HH Arcolezi, JF Couchot, B Al Bouna, X Xiao Digital Communications and Networks, 2022 | 27 | 2022 |
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data HH Arcolezi, JF Couchot, S Cerna, C Guyeux, G Royer, B Al Bouna, ... Computers & Security 96, 101888, 2020 | 27 | 2020 |
Security and privacy preserving in social networks R Chbeir, B Al Bouna Springer, 2013 | 24 | 2013 |
Secure outsourcing of network flow data analysis M Nassar, B al Bouna, Q Malluhi 2013 IEEE International Congress on Big Data, 431-432, 2013 | 23 | 2013 |
A user-centric mechanism for sequentially releasing graph datasets under blowfish privacy E Chicha, BA Bouna, M Nassar, R Chbeir, RA Haraty, M Oussalah, ... ACM Transactions on Internet Technology (TOIT) 21 (1), 1-25, 2021 | 21 | 2021 |
Efficient sanitization of unsafe data correlations BA Bouna, C Clifton, Q Malluhi Proceedings of the workshops of the EDBT/ICDT 2015 joint conference (EDBT …, 2015 | 20 | 2015 |
A framework for evaluating image obfuscation under deep learning-assisted privacy attacks J Tekli, B Al Bouna, R Couturier, G Tekli, Z Al Zein, M Kamradt 2019 17th International Conference on Privacy, Security and Trust (PST), 1-10, 2019 | 18 | 2019 |
The image protector-a flexible security rule specification toolkit B Al Bouna, R Chbeir, A Gabillon Proceedings of the International Conference on Security and Cryptography …, 2011 | 16 | 2011 |
Enforcing role based access control model with multimedia signatures B Al Bouna, R Chbeir, S Marrara Journal of Systems Architecture 55 (4), 264-274, 2009 | 16 | 2009 |
(k, l)-Clustering for Transactional Data Streams Anonymization J Tekli, B Al Bouna, Y Bou Issa, M Kamradt, R Haraty Information Security Practice and Experience: 14th International Conference …, 2018 | 14 | 2018 |
Longitudinal collection and analysis of mobile phone data with local differential privacy HH Arcolezi, JF Couchot, BA Bouna, X Xiao IFIP International Summer School on Privacy and Identity Management, 40-57, 2020 | 12 | 2020 |
Preventing sensitive relationships disclosure for better social media preservation E Raad, B Al Bouna, R Chbeir International Journal of Information Security 15, 173-194, 2016 | 12 | 2016 |
Multimedia-based authorization and access control policy specification B Al Bouna, R Chbeir Proceedings of the 3rd ACM workshop on Secure Web Services, 61-68, 2006 | 12 | 2006 |
On the evaluation of the privacy breach in disassociated set-valued datasets S Barakat, BA Bouna, M Nassar, C Guyeux arXiv preprint arXiv:1611.08417, 2016 | 11 | 2016 |
Using safety constraint for transactional dataset anonymization B Al Bouna, C Clifton, Q Malluhi Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013 | 11 | 2013 |
A multimedia access control language for virtual and ambient intelligence environments B Al Bouna, R Chbeir, S Marrara Proceedings of the 2007 ACM workshop on Secure web services, 111-120, 2007 | 11 | 2007 |
An SQL-like query tool for data anonymization and outsourcing M Nassar, AAR Orabi, M Doha, B Al Bouna 2015 International Conference on Cyber Situational Awareness, Data Analytics …, 2015 | 10 | 2015 |
Anonymizing transactional datasets B al Bouna, C Clifton, Q Malluhi Journal of Computer Security 23 (1), 89-106, 2015 | 10 | 2015 |
K-nn classification under homomorphic encryption: application on a labeled eigen faces dataset M Nassar, N Wehbe, B Al Bouna 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and …, 2016 | 9 | 2016 |