default search action
Bechara al Bouna
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Héber Hwang Arcolezi, Jean-François Couchot, Bechara al Bouna, Xiaokui Xiao:
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates. Digit. Commun. Networks 10(2): 369-379 (2024) - [j14]Jimmy Tekli, Bechara al Bouna, Gilbert Tekli, Raphaël Couturier, Antoine Charbel:
Leveraging deep learning-assisted attacks against image obfuscation via federated learning. Neural Comput. Appl. 36(25): 15667-15684 (2024) - 2023
- [j13]Jimmy Tekli, Bechara al Bouna, Gilbert Tekli, Raphaël Couturier:
A framework for evaluating image obfuscation under deep learning-assisted privacy attacks. Multim. Tools Appl. 82(27): 42173-42205 (2023) - [j12]Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir:
Cloud-based differentially private image classification. Wirel. Networks 29(3): 997-1004 (2023) - 2022
- [j11]Héber Hwang Arcolezi, Jean-François Couchot, Denis Renaud, Bechara al Bouna, Xiaokui Xiao:
Differentially private multivariate time series forecasting of aggregated human mobility with deep learning: Input or gradient perturbation? Neural Comput. Appl. 34(16): 13355-13369 (2022) - [i6]Héber Hwang Arcolezi, Jean-François Couchot, Denis Renaud, Bechara al Bouna, Xiaokui Xiao:
Differentially Private Multivariate Time Series Forecasting of Aggregated Human Mobility With Deep Learning: Input or Gradient Perturbation? CoRR abs/2205.00436 (2022) - 2021
- [j10]Elie Chicha, Bechara al Bouna, Kay Wünsche, Richard Chbeir:
Exposing safe correlations in transactional datasets. Serv. Oriented Comput. Appl. 15(4): 289-307 (2021) - [j9]Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, Mansour Naser Alraja:
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy. ACM Trans. Internet Techn. 21(1): 20:1-20:25 (2021) - [c24]Héber Hwang Arcolezi, Jean-François Couchot, Bechara al Bouna, Xiaokui Xiao:
Random Sampling Plus Fake Data: Multidimensional Frequency Estimates With Local Differential Privacy. CIKM 2021: 47-57 - [i5]Héber Hwang Arcolezi, Jean-François Couchot, Bechara al Bouna, Xiaokui Xiao:
Random Sampling Plus Fake Data: Multidimensional Frequency Estimates With Local Differential Privacy. CoRR abs/2109.07269 (2021) - [i4]Héber Hwang Arcolezi, Jean-François Couchot, Bechara al Bouna, Xiaokui Xiao:
Improving the Utility of Locally Differentially Private Protocols for Longitudinal and Multidimensional Frequency Estimates. CoRR abs/2111.04636 (2021) - 2020
- [j8]Héber Hwang Arcolezi, Jean-François Couchot, Selene Cerna, Christophe Guyeux, Guillaume Royer, Bechara al Bouna, Xiaokui Xiao:
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data. Comput. Secur. 96: 101888 (2020) - [j7]Nancy Awad, Jean-François Couchot, Bechara al Bouna, Laurent Philippe:
Publishing Anonymized Set-Valued Data via Disassociation towards Analysis. Future Internet 12(4): 71 (2020) - [j6]Zahi Al Chami, Chady Abou Jaoude, Bechara al Bouna, Richard Chbeir:
A Weighted Feature-Based Image Quality Assessment Framework in Real-Time. Trans. Large Scale Data Knowl. Centered Syst. 45: 85-108 (2020) - [c23]Mohamed Nassar, Elie Chicha, Bechara al Bouna, Richard Chbeir:
VIP Blowfish Privacy in Communication Graphs. ICETE (2) 2020: 459-467 - [c22]Héber Hwang Arcolezi, Jean-François Couchot, Oumaya Baala, Jean-Michel Contet, Bechara al Bouna, Xiaokui Xiao:
Mobility modeling through mobile data: generating an optimized and open dataset respecting privacy. IWCMC 2020: 1689-1694 - [c21]Héber Hwang Arcolezi, Jean-François Couchot, Bechara al Bouna, Xiaokui Xiao:
Longitudinal Collection and Analysis of Mobile Phone Data with Local Differential Privacy. Privacy and Identity Management 2020: 40-57
2010 – 2019
- 2019
- [j5]Nancy Awad, Bechara al Bouna, Jean-François Couchot, Laurent Philippe:
Safe disassociation of set-valued datasets. J. Intell. Inf. Syst. 53(3): 547-562 (2019) - [c20]Nancy Awad, Jean-François Couchot, Bechara al Bouna, Laurent Philippe:
Ant-driven clustering for utility-aware disassociation of set-valued datasets. IDEAS 2019: 6:1-6:9 - [c19]Zahi Al Chami, Bechara al Bouna, Chady Abou Jaoude, Richard Chbeir:
A Real-Time Multimedia Data Quality Assessment Framework. MEDES 2019: 270-276 - [c18]Jimmy Tekli, Bechara al Bouna, Raphaël Couturier, Gilbert Tekli, Zeinab al Zein, Marc Kamradt:
A Framework for Evaluating Image Obfuscation under Deep Learning-Assisted Privacy Attacks. PST 2019: 1-10 - [i3]Nancy Awad, Bechara al Bouna, Jean-François Couchot, Laurent Philippe:
Safe Disassociation of Set-Valued Datasets. CoRR abs/1904.03112 (2019) - 2018
- [c17]Jimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty:
(k, l)-Clustering for Transactional Data Streams Anonymization. ISPEC 2018: 544-556 - 2016
- [j4]Elie Raad, Bechara al Bouna, Richard Chbeir:
Preventing sensitive relationships disclosure for better social media preservation. Int. J. Inf. Sec. 15(2): 173-194 (2016) - [j3]Bechara al Bouna, Eliana J. Raad, Richard Chbeir, Charbel Elia, Ramzi A. Haraty:
Anonymizing multimedia documents. World Wide Web 19(1): 135-155 (2016) - [c16]Mohamed Nassar, Nathalie Wehbe, Bechara al Bouna:
K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset. CSE/EUC/DCABES 2016: 546-552 - [c15]Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux:
On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. SECRYPT 2016: 318-326 - [i2]Abdessalem Abidi, Christophe Guyeux, Bechara al Bouna, Belgacem Bouallegue, Mohsen Machhout:
The dynamics of the CBC Mode of Operation. CoRR abs/1605.02950 (2016) - [i1]Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux:
On the Evaluation of the Privacy Breach in Disassociated Set-Valued Datasets. CoRR abs/1611.08417 (2016) - 2015
- [j2]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Anonymizing transactional datasets. J. Comput. Secur. 23(1): 89-106 (2015) - [c14]Mohamed Nassar, Adel Al-Rahal Orabi, Marwan Doha, Bechara al Bouna:
An SQL-like query tool for data anonymization and outsourcing. CyberSA 2015: 1-3 - [c13]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Efficient Sanitization of Unsafe Data Correlations. EDBT/ICDT Workshops 2015: 278-285 - 2014
- [c12]Ramzi A. Haraty, Mohammad A. Taha, Bechara al Bouna:
MOP: A Privacy Preserving Model for Multimedia Objects. MEDES 2014: 213-219 - 2013
- [c11]Mohamed Nassar, Bechara al Bouna, Qutaibah M. Malluhi:
Secure Outsourcing of Network Flow Data Analysis. BigData Congress 2013: 431-432 - [c10]Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi:
Using Safety Constraint for Transactional Dataset Anonymization. DBSec 2013: 164-178 - [c9]Bechara al Bouna, Eliana J. Raad, Charbel Elia, Richard Chbeir, Ramzi A. Haraty:
de-linkability: a privacy-preserving constraint for safely outsourcing multimedia documents. MEDES 2013: 68-75 - [p2]Bechara al Bouna, Richard Chbeir, Alban Gabillon, Patrick Capolsini:
A Flexible Image-Based Access Control Model for Social Networks. Security and Privacy Preserving in Social Networks 2013: 337-364 - [e1]Richard Chbeir, Bechara al Bouna:
Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks, Springer 2013, ISBN 978-3-7091-0893-2 [contents] - 2012
- [c8]Bechara al Bouna, Richard Chbeir, Alban Gabillon, Patrick Capolsini:
A Fine-Grained Image Access Control Model. SITIS 2012: 603-612 - 2011
- [c7]Samir Saad, Bechara al Bouna, Richard Chbeir:
Privacy preserving via tree augmented naïve Bayesian classifier in multimedia database. MEDES 2011: 297-304 - [c6]Bechara al Bouna, Richard Chbeir, Alban Gabillon:
The Image Protector - A Flexible Security Rule Specification Toolkit . SECRYPT 2011: 345-350
2000 – 2009
- 2009
- [j1]Bechara al Bouna, Richard Chbeir, Stefania Marrara:
Enforcing role based access control model with multimedia signatures. J. Syst. Archit. 55(4): 264-274 (2009) - [c5]Bechara al Bouna, Richard Chbeir:
Detecting Inference Channels in Private Multimedia Data via Social Networks. DBSec 2009: 208-224 - [p1]Elie Raad, Bechara al Bouna, Richard Chbeir:
Bridging Sensing and Decision Making in Ambient Intelligence Environments. Multimedia Techniques for Device and Ambient Intelligence 2009: 135-164 - 2008
- [c4]Bechara al Bouna, Richard Chbeir:
MCSE: a multimedia context-based security engine. EDBT 2008: 705-709 - 2007
- [c3]Bechara al Bouna, Richard Chbeir, Johel Mitéran:
MCA2CM: Multimedia Context-Aware Access Control Model. ISI 2007: 115-123 - [c2]Bechara al Bouna, Richard Chbeir, Stefania Marrara:
A multimedia access control language for virtual and ambient intelligence environments. SWS 2007: 111-120 - 2006
- [c1]Bechara al Bouna, Richard Chbeir:
Multimedia-based authorization and access control policy specification. SWS 2006: 61-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint