Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–13 of 13 results for author: Imine, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11421  [pdf, other

    cs.DB cs.CR

    Private Approximate Query over Horizontal Data Federation

    Authors: Ala Eddine Laouir, Abdessamad Imine

    Abstract: In many real-world scenarios, multiple data providers need to collaboratively perform analysis of their private data. The challenges of these applications, especially at the big data scale, are time and resource efficiency as well as end-to-end privacy with minimal loss of accuracy. Existing approaches rely primarily on cryptography, which improves privacy, but at the expense of query response tim… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: To appear in EDBT 2025

    ACM Class: H.2.8

  2. arXiv:2406.03079  [pdf, other

    cs.CL cs.AI

    Cryptocurrency Frauds for Dummies: How ChatGPT introduces us to fraud?

    Authors: Wail Zellagui, Abdessamad Imine, Yamina Tadjeddine

    Abstract: Recent advances in the field of large language models (LLMs), particularly the ChatGPT family, have given rise to a powerful and versatile machine interlocutor, packed with knowledge and challenging our understanding of learning. This interlocutor is a double-edged sword: it can be harnessed for a wide variety of beneficial tasks, but it can also be used to cause harm. This study explores the comp… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: To be published in ACM journal "Digital Government: Research and Practice"

  3. arXiv:2303.01822  [pdf, other

    cs.SE cs.HC cs.SI

    Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms

    Authors: Nicolás E. Díaz Ferreyra, Abdessamad Imine, Melina Vidoni, Riccardo Scandariato

    Abstract: Social Coding Platforms (SCPs) like GitHub have become central to modern software engineering thanks to their collaborative and version-control features. Like in mainstream Online Social Networks (OSNs) such as Facebook, users of SCPs are subjected to privacy attacks and threats given the high amounts of personal and project-related data available in their profiles and software repositories. Howev… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: Accepted at the 16th International Conference on Cooperative and Human Aspects of Software Engineering (CHASE 2023)

  4. arXiv:1609.01616  [pdf, ps, other

    cs.SI cs.CR

    Private Link Exchange over Social Graphs

    Authors: Hiep H. Nguyen, Abdessamad Imine, Michael Rusinowitch

    Abstract: Currently, most of the online social networks (OSN) keep their data secret and in centralized manner. Researchers are allowed to crawl the underlying social graphs (and data) but with limited rates, leading to only partial views of the true social graphs. To overcome this constraint, we may start from user perspective, the contributors of the OSNs. More precisely, if users cautiously collaborate w… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

  5. arXiv:1607.02060  [pdf, ps, other

    cs.SI

    Detecting Communities under Differential Privacy

    Authors: Hiep H. Nguyen, Abdessamad Imine, Michael Rusinowitch

    Abstract: Complex networks usually expose community structure with groups of nodes sharing many links with the other nodes in the same group and relatively few with the nodes of the rest. This feature captures valuable information about the organization and even the evolution of the network. Over the last decade, a great number of algorithms for community detection have been proposed to deal with the increa… ▽ More

    Submitted 7 July, 2016; originally announced July 2016.

  6. A Constraint-based Approach for Generating Transformation Patterns

    Authors: Asma Cherif, Abdessamad Imine

    Abstract: Undoing operations is an indispensable feature for many collaborative applications, mainly collaborative editors. It provides the ability to restore a correct state of shared data after erroneous operations. In particular, selective undo allows to undo any operation and is based on rearranging operations in the history thanks to the Operational Transformation (OT) approach. OT is an optimistic r… ▽ More

    Submitted 23 December, 2015; originally announced December 2015.

    Comments: In Proceedings FOCLASA 2015, arXiv:1512.06947

    Journal ref: EPTCS 201, 2015, pp. 48-62

  7. arXiv:1412.7653  [pdf, ps, other

    cs.DC cs.SI

    Efficient Polling Protocol for Decentralized Social Networks

    Authors: Bao-Thien Hoang, Abdessamad Imine

    Abstract: We address the polling problem in social networks where individuals collaborate to choose the most favorite choice amongst some options, without divulging their vote and publicly exposing their potentially malicious actions. Given this social interaction model, Guerraoui et al. recently proposed polling protocols that do not rely on any central authority or cryptography system, using a simple secr… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

  8. arXiv:1408.1209  [pdf, ps, other

    cs.SI

    Anonymizing Social Graphs via Uncertainty Semantics

    Authors: Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch

    Abstract: Rather than anonymizing social graphs by generalizing them to super nodes/edges or adding/removing nodes and edges to satisfy given privacy parameters, recent methods exploit the semantics of uncertain graphs to achieve privacy protection of participating entities and their relationship. These techniques anonymize a deterministic graph by converting it into an uncertain form. In this paper, we pro… ▽ More

    Submitted 6 August, 2014; originally announced August 2014.

  9. arXiv:1302.3292  [pdf, ps, other

    cs.DC eess.SY

    On Consistency of Operational Transformation Approach

    Authors: Aurel Randolph, Hanifa Boucheneb, Abdessamad Imine, Alejandro Quintero

    Abstract: The Operational Transformation (OT) approach, used in many collaborative editors, allows a group of users to concurrently update replicas of a shared object and exchange their updates in any order. The basic idea of this approach is to transform any received update operation before its execution on a replica of the object. This transformation aims to ensure the convergence of the different repl… ▽ More

    Submitted 13 February, 2013; originally announced February 2013.

    Comments: In Proceedings Infinity 2012, arXiv:1302.3105

    Journal ref: EPTCS 107, 2013, pp. 45-59

  10. arXiv:1202.0018  [pdf, other

    cs.CR cs.DB

    A General Approach for Securely Querying and Updating XML Data

    Authors: Houari Mahfoud, Abdessamad Imine

    Abstract: Over the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A few amount of works have studied the access rights for updates. In this paper, we present a general model for specifying access control on XML data in the presence of update operations of W3C XQuery Update Facility. Our approach for enforcing su… ▽ More

    Submitted 31 January, 2012; originally announced February 2012.

    Comments: No. RR-7870 (2012)

  11. arXiv:1112.2605  [pdf, other

    cs.CR cs.DB

    Secure Querying of Recursive XML Views: A Standard XPath-based Technique

    Authors: Houari Mahfoud, Abdessamad Imine

    Abstract: Most state-of-the art approaches for securing XML documents allow users to access data only through authorized views defined by annotating an XML grammar (e.g. DTD) with a collection of XPath expressions. To prevent improper disclosure of confidential information, user queries posed on these views need to be rewritten into equivalent queries on the underlying documents. This rewriting enables us t… ▽ More

    Submitted 12 December, 2011; originally announced December 2011.

    Comments: (2011)

  12. On Coordinating Collaborative Objects

    Authors: Abdessamad Imine

    Abstract: A collaborative object represents a data type (such as a text document) designed to be shared by a group of dispersed users. The Operational Transformation (OT) is a coordination approach used for supporting optimistic replication for these objects. It allows the users to concurrently update the shared data and exchange their updates in any order since the convergence of all replicas, i.e. th… ▽ More

    Submitted 28 July, 2010; originally announced July 2010.

    Comments: In Proceedings FOCLASA 2010, arXiv:1007.4993

    Journal ref: EPTCS 30, 2010, pp. 78-92

  13. arXiv:0804.3023  [pdf, ps, other

    cs.LO cs.SC

    Experiments in Model-Checking Optimistic Replication Algorithms

    Authors: Hanifa Boucheneb, Abdessamad Imine

    Abstract: This paper describes a series of model-checking experiments to verify optimistic replication algorithms based on Operational Transformation (OT) approach used for supporting collaborative edition. We formally define, using tool UPPAAL, the behavior and the main consistency requirement (i.e. convergence property) of the collaborative editing systems, as well as the abstract behavior of the enviro… ▽ More

    Submitted 21 April, 2008; v1 submitted 18 April, 2008; originally announced April 2008.

    Report number: RR-6510