1 code implementation • 31 Oct 2023 • Haoyu Liu, Alec F. Diallo, Paul Patras
Specifically, we cast the problem of finding adversarial flows that will be misclassified as a sequence generation task, which we solve with Amoeba, a novel reinforcement learning algorithm that we design.
no code implementations • 20 Feb 2022 • Haoyu Liu, Paul Patras
Machine Learning (ML) techniques are increasingly adopted to tackle ever-evolving high-profile network attacks, including DDoS, botnet, and ransomware, due to their unique ability to extract complex patterns hidden in data streams.
no code implementations • 29 Jul 2019 • Chaoyun Zhang, Marco Fiore, Iain Murray, Paul Patras
This paper introduces CloudLSTM, a new branch of recurrent neural models tailored to forecasting over data streams generated by geospatial point-cloud sources.
no code implementations • 23 May 2019 • Chaoyun Zhang, Marco Fiore, Paul Patras
Network slicing is increasingly used to partition network infrastructure between different mobile services.
no code implementations • 22 Nov 2018 • Chaoyun Zhang, Rui Li, Woojin Kim, Daesub Yoon, Paul Patras
Experiments conducted with a dataset that we collect in a mock-up car environment demonstrate that the proposed InterCNN with MobileNet convolutional blocks can classify 9 different behaviors with 73. 97% accuracy, and 5 'aggregated' behaviors with 81. 66% accuracy.
no code implementations • 12 Mar 2018 • Chaoyun Zhang, Paul Patras, Hamed Haddadi
One potential solution is to resort to advanced machine learning techniques to help managing the rise in data volumes and algorithm-driven applications.
Ranked #1 on Link Prediction on SINS
no code implementations • 7 Nov 2017 • Chaoyun Zhang, Xi Ouyang, Paul Patras
Large-scale mobile traffic analytics is becoming essential to digital infrastructure provisioning, public transportation, events planning, and other domains.
1 code implementation • 28 Jun 2017 • Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
In this paper, we provide an in-depth security analysis of the operation of fitness trackers commercialized by Fitbit, the wearables market leader.
Cryptography and Security