Skip to main content

Showing 1–3 of 3 results for author: Fanitabasi, F

Searching in archive cs. Search in all archives.
.
  1. A Self-Integration Testbed for Decentralized Socio-technical Systems

    Authors: Farzam Fanitabasi, Edward Gaere, Evangelos Pournaras

    Abstract: The Internet of Things comes along with new challenges for experimenting, testing, and operating decentralized socio-technical systems at large-scale. In such systems, autonomous agents interact locally with their users, and remotely with other agents to make intelligent collective choices. Via these interactions they self-regulate the consumption and production of distributed resources. While suc… ▽ More

    Submitted 22 July, 2020; v1 submitted 6 February, 2020; originally announced February 2020.

  2. arXiv:1907.03470  [pdf, other

    eess.SY cs.MA

    Appliance-level Flexible Scheduling for Socio-technical Smart Grid Optimisation

    Authors: Farzam Fanitabasi, Evangelos Pournaras

    Abstract: Participation in residential energy demand response programs requires an active role by the consumers. They contribute flexibility in how they use their appliances as the means to adjust energy consumption, and reduce demand peaks, possibly at the expense of their own comfort (e.g., thermal). Understanding the collective potential of appliance-level flexibility for reducing demand peaks is challen… ▽ More

    Submitted 28 April, 2020; v1 submitted 8 July, 2019; originally announced July 2019.

  3. arXiv:1904.05738  [pdf, other

    cs.CR cs.LG stat.ML

    TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering

    Authors: Farzam Fanitabasi

    Abstract: Common privacy enhancing technologies fail to effectively hide certain statistical aspects of encrypted traffic, namely individual packets length, packets direction and, packets timing. Recent researches have shown that using such attributes, an adversary is able to extract various information from the encrypted traffic such as the visited website and used protocol. Such attacks are called traffic… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.