Saman Feghhi

ORCID: 0000-0003-1988-9615
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Wireless Networks and Protocols
  • Advanced MIMO Systems Optimization
  • Network Traffic and Congestion Control
  • Reinforcement Learning in Robotics
  • Energy Harvesting in Wireless Networks
  • Privacy-Preserving Technologies in Data
  • Security and Verification in Computing
  • Evolutionary Algorithms and Applications
  • Privacy, Security, and Data Protection
  • Manufacturing Process and Optimization
  • Additive Manufacturing and 3D Printing Technologies
  • Anomaly Detection Techniques and Applications
  • Image Processing and 3D Reconstruction
  • Mobile Agent-Based Network Management
  • Software System Performance and Reliability
  • Service-Oriented Architecture and Web Services
  • Cryptography and Data Security
  • Flexible and Reconfigurable Manufacturing Systems
  • ICT Impact and Policies
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Parallel Computing and Optimization Techniques
  • Design Education and Practice

Ericsson (Ireland)
2019-2021

Trinity College Dublin
2014-2018

Trinity College
2016-2017

Purdue University West Lafayette
2002

Knowledge Based Systems (United States)
1990

We introduce an attack against encrypted Web traffic that makes use only of packet timing information on the uplink. This is therefore impervious to existing padding defenses. In addition, unlike approaches, this timing-only does not require knowledge start/end web fetches and so effective streams. demonstrate effectiveness both wired wireless traffic, achieving mean success rates in excess 90%. addition being interest its own right, serves highlight deficiencies defenses areas where it...

10.1109/tifs.2016.2551203 article EN IEEE Transactions on Information Forensics and Security 2016-04-06

Remote Electrical Tilt (RET) optimization is an efficient method for adjusting the vertical tilt angle of Base Stations (BSs) antennas in order to optimize Key Performance Indicators (KPIs) network. Reinforcement Learning (RL) provides a powerful framework RET because its self-learning capabilities and adaptivity environmental changes. However, RL agent may execute unsafe actions during course interaction, i.e., resulting undesired network performance degradation. Since reliability services...

10.1109/wcnc49053.2021.9417363 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2021-03-29

Safe interaction with the environment is one of most challenging aspects Reinforcement Learning (RL) when applied to real-world problems. This particularly important unsafe actions have a high or irreversible negative impact on environment. In context network management operations, Remote Electrical Tilt (RET) optimisation safety-critical application in which exploratory modifications antenna tilt angles base stations can cause significant performance degradation network. this paper, we...

10.1109/pimrc50174.2021.9569387 article EN 2021-09-13

We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The opportunistically reduces the number dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. find packet typically less than 20% on lightly loaded links and falls zero as load increases, i.e., capacity achieving. additional latency incurred 100 ms. build an experimental prototype carry out extensive performance...

10.1109/tifs.2018.2855655 article EN IEEE Transactions on Information Forensics and Security 2018-07-12

A method and the components of an implemented system (IDP-Integrated Design Planning) for integrating design manufacturing processes are presented. AI techniques like cooperative reasoning combining geometric evidence used in a graph-based hypothesis. This generate-eliminate approach automatically extracts shape primitives designed part determines relationships between these from boundary representation CAD data, thus producing higher-level semantic information necessary to manufacture part....

10.1109/caia.1990.89182 article EN 2002-12-04

The high complexity of modern communication networks requires an increasing degree automation for performance and fault management tasks. A key task is the classification identification anomalous operation modes (and faults). This important to separate them from normal conditions. In addition, these diagnoses should be interpretable by domain experts (a) gain acceptance (b) support effective root cause analysis localisation. this paper, we investigate multivariant network data in order...

10.23919/cnsm50824.2020.9269108 article EN 2020-11-02

Configuration management of large scale networks is a complicated business. This especially the case for Converged Network Operators (CNOPs). Here, are mix fixed and wireless access, MAN backbone networks, as well interchanges with other operators.The Recursive InterNetworking Architecture (RINA) offers number abstractions claims that their application will simplify not only network operations but also management. In H2020 project ARCFIRE we have taken these abstraction, built Distributed...

10.1109/icin.2019.8685922 article EN 2019-02-01

We consider a timing-only based attack against encrypted and padded web traffic. The attacker can collect training data, but only over different connection from that which the is directed. This significantly easier to perform than one depends on data collected victim link. demonstrate an infer correct page >87% of time when at distance up 25 km victim, provided type link similar e.g. if uses cable modem then should be measured also investigate impact in between performed.

10.1109/ccnc.2017.8067722 article EN 2017-01-01

We introduce an attack against encrypted web traffic passing over the first hop - between a femtocell device and mobile core network. The makes use only of packet timing information on uplink so is impervious to padding defences. demonstrate effectiveness at identifying sites being visited by broadband user whose goes through device, achieving mean success rates 92%. As well as interest in its own right, this timing-only serves highlight deficiencies existing defences areas where it would be...

10.1109/ccnc.2016.7444937 article EN 2016-01-01

For some time now the volume of data traffic in Mobile Telecommunications Networks has far outweighed voice and most users are more concerned about quality their connection than calls. Adequate service requires analysis flows to identify network issues affecting users' services. This can be achieved by placing analytics probes throughout network, but it would better have a small number at just key locations Core Network. We show how use core which user owns base station hosts each flow,...

10.1109/noms.2016.7502928 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2016-04-01

In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of joint trade-off between privacy, throughput and delay such as utility fairness problem derive proportional rate allocation for networks flows constraints deadlines.

10.1109/iscc.2016.7543868 article EN 2016-06-01

Remote Electrical Tilt (RET) optimization is an efficient method for adjusting the vertical tilt angle of Base Stations (BSs) antennas in order to optimize Key Performance Indicators (KPIs) network. Reinforcement Learning (RL) provides a powerful framework RET because its self-learning capabilities and adaptivity environmental changes. However, RL agent may execute unsafe actions during course interaction, i.e., resulting undesired network performance degradation. Since reliability services...

10.48550/arxiv.2010.05842 preprint EN cc-by arXiv (Cornell University) 2020-01-01

An object-oriented kernel that integrates design and process planning in the domain of mechanical parts is presented. The has identified separated integral elements its from are associated with a particular design/manufacturing environment. Consequently, it can be customized to wide range environments used as rapid prototyping tool. A prototype been developed implemented Smalltalk-80.

10.1145/123186.123330 article EN 1990-01-01

We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The opportunistically reduces the number dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. find packet typically less than 20% on lightly loaded links and falls zero as load increases i.e. capacity-achieving. additional latency incurred 100ms. build an experimental prototype carry out extensive performance evaluation...

10.48550/arxiv.1610.07141 preprint EN other-oa arXiv (Cornell University) 2016-01-01

In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of joint trade-off between privacy, throughput and delay such as utility fairness problem derive proportional rate allocation for networks flows constraints deadlines.

10.48550/arxiv.1603.01392 preprint EN other-oa arXiv (Cornell University) 2016-01-01

We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This is therefore impervious to existing padding defences. In addition, unlike approaches this timing-only does not require knowledge start/end fetches and so effective streams. demonstrate effectiveness both wired wireless traffic, achieving mean success rates in excess 90%. addition being interest its own right, serves highlight deficiencies defences areas where it would be...

10.48550/arxiv.1410.2087 preprint EN other-oa arXiv (Cornell University) 2014-01-01
Coming Soon ...