no code implementations • 11 Oct 2024 • Zain Sarwar, Van Tran, Arjun Nitin Bhagoji, Nick Feamster, Ben Y. Zhao, Supriyo Chakraborty
Machine learning (ML) models often require large amounts of data to perform well.
no code implementations • 8 Oct 2024 • Siddhant Ray, Xi Jiang, Jack Luo, Nick Feamster, Junchen Jiang
Instead, SwiftQueue uses a custom Transformer, which is well-studied for its expressiveness on sequential patterns, to predict the next packet's latency based on the latencies of recently received ACKs.
no code implementations • 6 Feb 2024 • Shinan Liu, Ted Shaowang, Gerry Wan, Jeewon Chae, Jonatas Marques, Sanjay Krishnan, Nick Feamster
ServeFlow is able to make inferences on 76. 3% of flows in under 16ms, which is a speed-up of 40. 5x on the median end-to-end serving latency while increasing the service rate and maintaining similar accuracy.
no code implementations • 21 May 2023 • Yihua Cheng, Ziyi Zhang, Hanchen Li, Anton Arapin, Yue Zhang, Qizheng Zhang, YuHan Liu, Xu Zhang, Francis Y. Yan, Amrita Mazumdar, Nick Feamster, Junchen Jiang
In real-time video communication, retransmitting lost packets over high-latency networks is not viable due to strict latency requirements.
1 code implementation • 3 Feb 2023 • Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran
In this paper, we explore how machine learning (ML) models can (1) help streamline the detection process, (2) improve the potential of using large-scale datasets for censorship detection, and (3) discover new censorship instances and blocking signatures missed by existing heuristic methods.
no code implementations • 7 Sep 2021 • Shinan Liu, Francesco Bronzino, Paul Schmitt, Arjun Nitin Bhagoji, Nick Feamster, Hector Garcia Crespo, Timothy Coyle, Brian Ward
We then show that frequent model retraining with newly available data is not sufficient to mitigate concept drift, and can even degrade model accuracy further.
no code implementations • 22 Apr 2021 • Kun Yang, Samory Kpotufe, Nick Feamster
Insecure Internet of things (IoT) devices pose significant threats to critical infrastructure and the Internet at large; detecting anomalous behavior from these devices remains of critical importance, but fast, efficient, accurate anomaly detection (also called "novelty detection") for these classes of devices remains elusive.
no code implementations • 27 Oct 2020 • Francesco Bronzino, Paul Schmitt, Sara Ayoubi, Hyojoon Kim, Renata Teixeira, Nick Feamster
We demonstrate the benefit of exploring a range of representations of network traffic and present Traffic Refinery, a proof-of-concept implementation that both monitors network traffic at 10 Gbps and transforms traffic in real time to produce a variety of feature representations for machine learning.
no code implementations • 30 Jun 2020 • Kun Yang, Samory Kpotufe, Nick Feamster
To facilitate such exploration, we develop a systematic framework, open-source toolkit, and public Python library that makes it both possible and easy to extract and generate features from network traffic and perform and end-to-end evaluation of these representations across most prevalent modern novelty detection models.
1 code implementation • 22 Aug 2018 • Trisha Datta, Noah Apthorpe, Nick Feamster
The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy.
Cryptography and Security
no code implementations • 7 May 2018 • Daniel Hahn, Noah Apthorpe, Nick Feamster
Data encryption is the primary method of protecting the privacy of consumer device Internet communications from network observers.
no code implementations • 11 Apr 2018 • Rohan Doshi, Noah Apthorpe, Nick Feamster
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks.
no code implementations • 16 Aug 2017 • Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster
The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home.
Cryptography and Security
no code implementations • 18 May 2017 • Noah Apthorpe, Dillon Reisman, Nick Feamster
The growing market for smart home IoT devices promises new conveniences for consumers while presenting novel challenges for preserving privacy within the home.
Cryptography and Security