Skip to main content

Showing 1–31 of 31 results for author: Schmitt, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.22663  [pdf, other

    cs.NI

    NetSSM: Multi-Flow and State-Aware Network Trace Generation using State-Space Models

    Authors: Andrew Chu, Xi Jiang, Shinan Liu, Arjun Bhagoji, Francesco Bronzino, Paul Schmitt, Nick Feamster

    Abstract: Access to raw network traffic data is essential for many computer networking tasks, from traffic modeling to performance evaluation. Unfortunately, this data is scarce due to high collection costs and governance rules. Previous efforts explore this challenge by generating synthetic network data, but fail to reliably handle multi-flow sessions, struggle to reason about stateful communication in mod… ▽ More

    Submitted 28 March, 2025; originally announced March 2025.

  2. arXiv:2412.15146  [pdf, other

    cs.NI

    Cruise Control: Dynamic Model Selection for ML-Based Network Traffic Analysis

    Authors: Johann Hugon, Paul Schmitt, Anthony Busson, Francesco Bronzino

    Abstract: Modern networks increasingly rely on machine learning models for real-time insights, including traffic classification, application quality of experience inference, and intrusion detection. However, existing approaches prioritize prediction accuracy without considering deployment constraints or the dynamism of network traffic, leading to potentially suboptimal performance. Because of this, deployin… ▽ More

    Submitted 19 December, 2024; originally announced December 2024.

  3. Micro and macro facial expressions by driven animations in realistic Virtual Humans

    Authors: Rubens Halbig Montanha, Giovana Nascimento Raupp, Ana Carolina Policarpo Schmitt, Victor Flávio de Andrade Araujo, Soraia Raupp Musse

    Abstract: Computer Graphics (CG) advancements have allowed the creation of more realistic Virtual Humans (VH) through modern techniques for animating the VH body and face, thereby affecting perception. From traditional methods, including blend shapes, to driven animations using facial and body tracking, these advancements can potentially enhance the perception of comfort and realism in relation to VHs. Prev… ▽ More

    Submitted 28 August, 2024; originally announced August 2024.

    Journal ref: Entertainment Computing, Volume 52, January 2025

  4. arXiv:2406.02784  [pdf, other

    cs.NI

    Feasibility of State Space Models for Network Traffic Generation

    Authors: Andrew Chu, Xi Jiang, Shinan Liu, Arjun Bhagoji, Francesco Bronzino, Paul Schmitt, Nick Feamster

    Abstract: Many problems in computer networking rely on parsing collections of network traces (e.g., traffic prioritization, intrusion detection). Unfortunately, the availability and utility of these collections is limited due to privacy concerns, data staleness, and low representativeness. While methods for generating data to augment collections exist, they often fall short in replicating the quality of rea… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: 7 pages, 3 figures, 4 tables

  5. arXiv:2405.11138  [pdf, other

    cs.NI cs.CY

    Beyond Data Points: Regionalizing Crowdsourced Latency Measurements

    Authors: Taveesh Sharma, Paul Schmitt, Francesco Bronzino, Nick Feamster, Nicole Marwell

    Abstract: Despite significant investments in access network infrastructure, universal access to high-quality Internet connectivity remains a challenge. Policymakers often rely on large-scale, crowdsourced measurement datasets to assess the distribution of access network performance across geographic areas. These decisions typically rest on the assumption that Internet performance is uniformly distributed wi… ▽ More

    Submitted 26 October, 2024; v1 submitted 17 May, 2024; originally announced May 2024.

    Comments: 24 pages

  6. arXiv:2311.06698  [pdf, other

    cs.HC cs.NI

    VidPlat: A Tool for Fast Crowdsourcing of Quality-of-Experience Measurements

    Authors: Xu Zhang, Hanchen Li, Paul Schmitt, Marshini Chetty, Nick Feamster, Junchen Jiang

    Abstract: For video or web services, it is crucial to measure user-perceived quality of experience (QoE) at scale under various video quality or page loading delays. However, fast QoE measurements remain challenging as they must elicit subjective assessment from human users. Previous work either (1) automates QoE measurements by letting crowdsourcing raters watch and rate QoE test videos or (2) dynamically… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

  7. arXiv:2310.08543  [pdf, other

    cs.NI

    NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation

    Authors: Xi Jiang, Shinan Liu, Aaron Gember-Jacobson, Arjun Nitin Bhagoji, Paul Schmitt, Francesco Bronzino, Nick Feamster

    Abstract: Datasets of labeled network traces are essential for a multitude of machine learning (ML) tasks in networking, yet their availability is hindered by privacy and maintenance concerns, such as data staleness. To overcome this limitation, synthetic network traces can often augment existing datasets. Unfortunately, current synthetic trace generation methods, which typically produce only aggregated flo… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  8. arXiv:2308.02202  [pdf, other

    cs.CR cs.CY

    SoK: The Ghost Trilemma

    Authors: Sulagna Mukherjee, Srivatsan Ravi, Paul Schmitt, Barath Raghavan

    Abstract: Trolls, bots, and sybils distort online discourse and compromise the security of networked platforms. User identity is central to the vectors of attack and manipulation employed in these contexts. However it has long seemed that, try as it might, the security community has been unable to stem the rising tide of such problems. We posit the Ghost Trilemma, that there are three key properties of iden… ▽ More

    Submitted 19 January, 2024; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: 22 pages with 1 figure and 8 tables

    ACM Class: D.4.6; H.5; K.4

  9. arXiv:2307.04009  [pdf, other

    cs.NI

    Internet Localization of Multi-Party Relay Users: Inherent Friction Between Internet Services and User Privacy

    Authors: Sean Flynn, Francesco Bronzino, Paul Schmitt

    Abstract: Internet privacy is increasingly important on the modern Internet. Users are looking to control the trail of data that they leave behind on the systems that they interact with. Multi-Party Relay (MPR) architectures lower the traditional barriers to adoption of privacy enhancing technologies on the Internet. MPRs are unique from legacy architectures in that they are able to offer privacy guarantees… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

  10. arXiv:2302.11718  [pdf, other

    cs.NI

    AC-DC: Adaptive Ensemble Classification for Network Traffic Identification

    Authors: Xi Jiang, Shinan Liu, Saloua Naama, Francesco Bronzino, Paul Schmitt, Nick Feamster

    Abstract: Accurate and efficient network traffic classification is important for many network management tasks, from traffic prioritization to anomaly detection. Although classifiers using pre-computed flow statistics (e.g., packet sizes, inter-arrival times) can be efficient, they may experience lower accuracy than techniques based on raw traffic, including packet captures. Past work on representation lear… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: 13 pages body, 16 pages total, 7 figures body, 11 figures total

  11. arXiv:2211.15959  [pdf, other

    cs.NI

    Enabling Personalized Video Quality Optimization with VidHoc

    Authors: Xu Zhang, Paul Schmitt, Marshini Chetty, Nick Feamster, Junchen Jiang

    Abstract: The emerging video applications greatly increase the demand in network bandwidth that is not easy to scale. To provide higher quality of experience (QoE) under limited bandwidth, a recent trend is to leverage the heterogeneity of quality preferences across individual users. Although these efforts have suggested the great potential benefits, service providers still have not deployed them to realize… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

  12. arXiv:2208.09219  [pdf, other

    cs.RO

    Constraint-based Task Specification and Trajectory Optimization for Sequential Manipulation

    Authors: Mun Seng Phoon, Philipp S. Schmitt, Georg v. Wichert

    Abstract: To economically deploy robotic manipulators the programming and execution of robot motions must be swift. To this end, we propose a novel, constraint-based method to intuitively specify sequential manipulation tasks and to compute time-optimal robot motions for such a task specification. Our approach follows the ideas of constraint-based task specification by aiming for a minimal and object-centri… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

    Comments: Accepted for publication at the 2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2022)

  13. arXiv:2203.12410  [pdf, other

    cs.NI cs.CR

    Towards Reproducible Network Traffic Analysis

    Authors: Jordan Holland, Paul Schmitt, Prateek Mittal, Nick Feamster

    Abstract: Analysis techniques are critical for gaining insight into network traffic given both the higher proportion of encrypted traffic and increasing data rates. Unfortunately, the domain of network traffic analysis suffers from a lack of standardization, leading to incomparable results and barriers to reproducibility. Unlike other disciplines, no standard dataset format exists, forcing researchers and p… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: 14 Pages, 7 Table, 3 Figures, 7 Listings

  14. arXiv:2201.04742  [pdf, other

    cs.RO

    nuReality: A VR environment for research of pedestrian and autonomous vehicle interactions

    Authors: Paul Schmitt, Nicholas Britten, JiHyun Jeong, Amelia Coffey, Kevin Clark, Shweta Sunil Kothawade, Elena Corina Grigore, Adam Khaw, Christopher Konopka, Linh Pham, Kim Ryan, Christopher Schmitt, Aryaman Pandya, Emilio Frazzoli

    Abstract: We present nuReality, a virtual reality 'VR' environment designed to test the efficacy of vehicular behaviors to communicate intent during interactions between autonomous vehicles 'AVs' and pedestrians at urban intersections. In this project we focus on expressive behaviors as a means for pedestrians to readily recognize the underlying intent of the AV's movements. VR is an ideal tool to use to te… ▽ More

    Submitted 12 January, 2022; originally announced January 2022.

  15. arXiv:2109.03011  [pdf, other

    cs.NI cs.LG cs.PF

    LEAF: Navigating Concept Drift in Cellular Networks

    Authors: Shinan Liu, Francesco Bronzino, Paul Schmitt, Arjun Nitin Bhagoji, Nick Feamster, Hector Garcia Crespo, Timothy Coyle, Brian Ward

    Abstract: Operational networks commonly rely on machine learning models for many tasks, including detecting anomalies, inferring application performance, and forecasting demand. Yet, model accuracy can degrade due to concept drift, whereby the relationship between the features and the target to be predicted changes. Mitigating concept drift is an essential part of operationalizing machine learning models in… ▽ More

    Submitted 2 February, 2023; v1 submitted 7 September, 2021; originally announced September 2021.

    Journal ref: Proc. ACM Netw., Vol. 1, No. CoNEXT2, Article 7. Publication date: September 2023

  16. arXiv:2108.12573  [pdf, other

    cs.NI

    A Pluralist Approach to Democratizing Online Discourse

    Authors: Jay Chen, Barath Raghavan, Paul Schmitt, Tai Liu

    Abstract: Online discourse takes place in corporate-controlled spaces thought by users to be public realms. These platforms in name enable free speech but in practice implement varying degrees of censorship either by government edict or by uneven and unseen corporate policy. This kind of censorship has no countervailing accountability mechanism, and as such platform owners, moderators, and algorithms shape… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

  17. Characterizing Service Provider Response to the COVID-19 Pandemic in the United States

    Authors: Shinan Liu, Paul Schmitt, Francesco Bronzino, Nick Feamster

    Abstract: The COVID-19 pandemic has resulted in dramatic changes to the daily habits of billions of people. Users increasingly have to rely on home broadband Internet access for work, education, and other activities. These changes have resulted in corresponding changes to Internet traffic patterns. This paper aims to characterize the effects of these changes with respect to Internet service providers in the… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

    Journal ref: International Conference on Passive and Active Network Measurement (PAM 2021)

  18. arXiv:2010.14605  [pdf, other

    cs.NI cs.LG

    Traffic Refinery: Cost-Aware Data Representation for Machine Learning on Network Traffic

    Authors: Francesco Bronzino, Paul Schmitt, Sara Ayoubi, Hyojoon Kim, Renata Teixeira, Nick Feamster

    Abstract: Network management often relies on machine learning to make predictions about performance and security from network traffic. Often, the representation of the traffic is as important as the choice of the model. The features that the model relies on, and the representation of those features, ultimately determine model accuracy, as well as where and whether the model can be deployed in practice. Thus… ▽ More

    Submitted 7 June, 2021; v1 submitted 27 October, 2020; originally announced October 2020.

  19. arXiv:2009.09035  [pdf, other

    cs.NI

    Pretty Good Phone Privacy

    Authors: Paul Schmitt, Barath Raghavan

    Abstract: To receive service in today's cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators now sell and leak identity and location data of hundreds of millions of mobile users. In this paper, we take an end-to-end perspective on the cellular architecture and find key points of decoupling that enable us t… ▽ More

    Submitted 28 December, 2020; v1 submitted 18 September, 2020; originally announced September 2020.

    Journal ref: Proceedings of the 30th USENIX Security Symposium, August 2021

  20. New Directions in Automated Traffic Analysis

    Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal

    Abstract: Despite the use of machine learning for many network traffic analysis tasks in security, from application identification to intrusion detection, the aspects of the machine learning pipeline that ultimately determine the performance of the model -- feature selection and representation, model selection, and parameter tuning -- remain manual and painstaking. This paper presents a method to automate m… ▽ More

    Submitted 19 October, 2021; v1 submitted 6 August, 2020; originally announced August 2020.

  21. Can Encrypted DNS Be Fast?

    Authors: Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster

    Abstract: In this paper, we study the performance of encrypted DNS protocols and conventional DNS from thousands of home networks in the United States, over one month in 2020. We perform these measurements from the homes of 2,693 participating panelists in the Federal Communications Commission's (FCC) Measuring Broadband America program. We found that clients do not have to trade DNS performance for privacy… ▽ More

    Submitted 27 July, 2021; v1 submitted 14 July, 2020; originally announced July 2020.

    Comments: Presented at the Passive and Active Measurement Conference 2021. The final authenticated publication is available online at https://doi.org/10.1007/978-3-030-72582-2_26

  22. arXiv:2006.13086  [pdf, other

    cs.NI cs.CR

    Classifying Network Vendors at Internet Scale

    Authors: Jordan Holland, Ross Teixeira, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, Jonathan Mayer

    Abstract: In this paper, we develop a method to create a large, labeled dataset of visible network device vendors across the Internet by mapping network-visible IP addresses to device vendors. We use Internet-wide scanning, banner grabs of network-visible devices across the IPv4 address space, and clustering techniques to assign labels to more than 160,000 devices. We subsequently probe these devices and us… ▽ More

    Submitted 24 June, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: 11 Pages, 2 figures, 7 tables

  23. arXiv:2002.12473  [pdf, ps, other

    cs.NI

    Beyond the Trees: Resilient Multipath for Last-mile WISP Networks

    Authors: Bilal Saleem, Paul Schmitt, Jay Chen, Barath Raghavan

    Abstract: Expanding the reach of the Internet is a topic of widespread interest today. Google and Facebook, among others, have begun investing substantial research efforts toward expanding Internet access at the edge. Compared to data center networks, which are relatively over-engineered, last-mile networks are highly constrained and end up being ultimately responsible for the performance issues that impact… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

  24. Encryption without Centralization: Distributing DNS Queries Across Recursive Resolvers

    Authors: Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster

    Abstract: Emerging protocols such as DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) improve the privacy of DNS queries and responses. While this trend towards encryption is positive, deployment of these protocols has in some cases resulted in further centralization of the DNS, which introduces new challenges. In particular, centralization has consequences for performance, privacy, and availability; a potential… ▽ More

    Submitted 21 September, 2021; v1 submitted 20 February, 2020; originally announced February 2020.

    Comments: Presented at the ACM/IRTF Applied Networking Research Workshop 2021 (ANRW '21)

  25. Comparing the Effects of DNS, DoT, and DoH on Web Performance

    Authors: Austin Hounsel, Kevin Borgolte, Paul Schmitt, Jordan Holland, Nick Feamster

    Abstract: Nearly every service on the Internet relies on the Domain Name System (DNS), which translates a human-readable name to an IP address before two endpoints can communicate. Today, DNS traffic is unencrypted, leaving users vulnerable to eavesdropping and tampering. Past work has demonstrated that DNS queries can reveal a user's browsing history and even what smart devices they are using at home. In r… ▽ More

    Submitted 23 February, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: The Web Conference 2020 (WWW '20)

  26. arXiv:1901.05800  [pdf, other

    cs.NI

    Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience

    Authors: Paul Schmitt, Francesco Bronzino, Sara Ayoubi, Guilherme Martins, Renata Teixeira, Nick Feamster

    Abstract: Inferring the quality of streaming video applications is important for Internet service providers, but the fact that most video streams are encrypted makes it difficult to do so. We develop models that infer quality metrics (\ie, startup delay and resolution) for encrypted streaming video services. Our paper builds on previous work, but extends it in several ways. First, the model works in deploym… ▽ More

    Submitted 14 August, 2019; v1 submitted 17 January, 2019; originally announced January 2019.

  27. arXiv:1811.03904  [pdf, other

    cs.RO

    Robust, Compliant Assembly via Optimal Belief Space Planning

    Authors: Florian Wirnshofer, Philipp S. Schmitt, Wendelin Feiten, Georg v. Wichert, Wolfram Burgard

    Abstract: In automated manufacturing, robots must reliably assemble parts of various geometries and low tolerances. Ideally, they plan the required motions autonomously. This poses a substantial challenge due to high-dimensional state spaces and non-linear contact-dynamics. Furthermore, object poses and model parameters, such as friction, are not exactly known and a source of uncertainty. The method propose… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

    Comments: 8 pages

  28. Oblivious DNS: Practical Privacy for DNS Queries

    Authors: Paul Schmitt, Anne Edmundson, Nick Feamster

    Abstract: Virtually every Internet communication typically involves a Domain Name System (DNS) lookup for the destination server that the client wants to communicate with. Operators of DNS recursive resolvers---the machines that receive a client's query for a domain name and resolve it to a corresponding IP address---can learn significant information about client activity. Past work, for example, indicates… ▽ More

    Submitted 11 December, 2018; v1 submitted 1 June, 2018; originally announced June 2018.

  29. arXiv:1711.08477  [pdf, other

    cs.LG

    Benchmarking Relief-Based Feature Selection Methods for Bioinformatics Data Mining

    Authors: Ryan J. Urbanowicz, Randal S. Olson, Peter Schmitt, Melissa Meeker, Jason H. Moore

    Abstract: Modern biomedical data mining requires feature selection methods that can (1) be applied to large scale feature spaces (e.g. `omics' data), (2) function in noisy problems, (3) detect complex patterns of association (e.g. gene-gene interactions), (4) be flexibly adapted to various problem domains and data types (e.g. genetic variants, gene expression, and clinical data) and (5) are computationally… ▽ More

    Submitted 2 April, 2018; v1 submitted 22 November, 2017; originally announced November 2017.

    Comments: Revised submission to JBI

  30. arXiv:1711.01478  [pdf, other

    cs.NI

    OCDN: Oblivious Content Distribution Networks

    Authors: Anne Edmundson, Paul Schmitt, Nick Feamster, Jennifer Rexford

    Abstract: As publishers increasingly use Content Distribution Networks (CDNs) to distribute content across geographically diverse networks, CDNs themselves are becoming unwitting targets of requests for both access to user data and content takedown. From copyright infringement to moderation of online speech, CDNs have found themselves at the forefront of many recent legal quandaries. At the heart of the ten… ▽ More

    Submitted 4 November, 2017; originally announced November 2017.

  31. arXiv:1612.03371  [pdf, other

    cs.NI cs.CR

    Rangzen: Anonymously Getting the Word Out in a Blackout

    Authors: Adam Lerner, Giulia Fanti, Yahel Ben-David, Jesus Garcia, Paul Schmitt, Barath Raghavan

    Abstract: In recent years governments have shown themselves willing to impose blackouts to shut off key communication infrastructure during times of civil strife, and to surveil citizen communications whenever possible. However, it is exactly during such strife that citizens need reliable and anonymous communications the most. In this paper, we present Rangzen, a system for anonymous broadcast messaging dur… ▽ More

    Submitted 10 December, 2016; originally announced December 2016.