Follow
Bechara Al Bouna
Bechara Al Bouna
Antonine University - Lebanon
Verified email at ua.edu.lb - Homepage
Title
Cited by
Cited by
Year
Random sampling plus fake data: Multidimensional frequency estimates with local differential privacy
HH Arcolezi, JF Couchot, B Al Bouna, X Xiao
Proceedings of the 30th ACM International Conference on Information …, 2021
282021
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data
HH Arcolezi, JF Couchot, S Cerna, C Guyeux, G Royer, B Al Bouna, ...
Computers & Security 96, 101888, 2020
252020
Security and privacy preserving in social networks
R Chbeir, B Al Bouna
Springer, 2013
242013
Efficient sanitization of unsafe data correlations
BA Bouna, C Clifton, Q Malluhi
Proceedings of the workshops of the EDBT/ICDT 2015 joint conference (EDBT …, 2015
222015
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates
HH Arcolezi, JF Couchot, B Al Bouna, X Xiao
Digital Communications and Networks, 2022
212022
Secure outsourcing of network flow data analysis
M Nassar, B al Bouna, Q Malluhi
2013 IEEE International Congress on Big Data, 431-432, 2013
212013
A user-centric mechanism for sequentially releasing graph datasets under blowfish privacy
E Chicha, BA Bouna, M Nassar, R Chbeir, RA Haraty, M Oussalah, ...
ACM Transactions on Internet Technology (TOIT) 21 (1), 1-25, 2021
192021
The image protector-a flexible security rule specification toolkit
B Al Bouna, R Chbeir, A Gabillon
Proceedings of the International Conference on Security and Cryptography …, 2011
162011
Enforcing role based access control model with multimedia signatures
B Al Bouna, R Chbeir, S Marrara
Journal of Systems Architecture 55 (4), 264-274, 2009
162009
A framework for evaluating image obfuscation under deep learning-assisted privacy attacks
J Tekli, B Al Bouna, R Couturier, G Tekli, Z Al Zein, M Kamradt
2019 17th International Conference on Privacy, Security and Trust (PST), 1-10, 2019
132019
Using safety constraint for transactional dataset anonymization
B Al Bouna, C Clifton, Q Malluhi
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
132013
(k, l)-Clustering for Transactional Data Streams Anonymization
J Tekli, B Al Bouna, Y Bou Issa, M Kamradt, R Haraty
Information Security Practice and Experience: 14th International Conference …, 2018
122018
Anonymizing transactional datasets
B al Bouna, C Clifton, Q Malluhi
Journal of Computer Security 23 (1), 89-106, 2015
122015
On the evaluation of the privacy breach in disassociated set-valued datasets
S Barakat, BA Bouna, M Nassar, C Guyeux
arXiv preprint arXiv:1611.08417, 2016
112016
K-nn classification under homomorphic encryption: application on a labeled eigen faces dataset
M Nassar, N Wehbe, B Al Bouna
2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and …, 2016
112016
A multimedia access control language for virtual and ambient intelligence environments
B Al Bouna, R Chbeir, S Marrara
Proceedings of the 2007 ACM workshop on Secure web services, 111-120, 2007
112007
Multimedia-based authorization and access control policy specification
B Al Bouna, R Chbeir
Proceedings of the 3rd ACM workshop on Secure Web Services, 61-68, 2006
112006
Preventing sensitive relationships disclosure for better social media preservation
E Raad, B Al Bouna, R Chbeir
International Journal of Information Security 15, 173-194, 2016
102016
Longitudinal collection and analysis of mobile phone data with local differential privacy
HH Arcolezi, JF Couchot, BA Bouna, X Xiao
IFIP International Summer School on Privacy and Identity Management, 40-57, 2020
92020
Mobility modeling through mobile data: generating an optimized and open dataset respecting privacy
HH Arcolezi, JF Couchot, O Baala, JM Contet, B Al Bouna, X Xiao
2020 International Wireless Communications and Mobile Computing (IWCMC …, 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20