Skip to main content

Showing 1–5 of 5 results for author: Shahla, R J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.06140  [pdf, other

    cs.LG cs.CV cs.NI

    Estimating the Number of HTTP/3 Responses in QUIC Using Deep Learning

    Authors: Barak Gahtan, Robert J. Shahla, Reuven Cohen, Alex M. Bronstein

    Abstract: QUIC, a new and increasingly used transport protocol, enhances TCP by offering improved security, performance, and stream multiplexing. These features, however, also impose challenges for network middle-boxes that need to monitor and analyze web traffic. This paper proposes a novel method to estimate the number of HTTP/3 responses in a given QUIC connection by an observer. This estimation reveals… ▽ More

    Submitted 28 April, 2025; v1 submitted 8 October, 2024; originally announced October 2024.

  2. arXiv:2410.03728  [pdf, other

    cs.NI cs.AI cs.CV cs.LG

    Exploring QUIC Dynamics: A Large-Scale Dataset for Encrypted Traffic Analysis

    Authors: Barak Gahtan, Robert J. Shahla, Alex M. Bronstein, Reuven Cohen

    Abstract: The increasing adoption of the QUIC transport protocol has transformed encrypted web traffic, necessitating new methodologies for network analysis. However, existing datasets lack the scope, metadata, and decryption capabilities required for robust benchmarking in encrypted traffic research. We introduce VisQUIC, a large-scale dataset of 100,000 labeled QUIC traces from over 44,000 websites, colle… ▽ More

    Submitted 24 May, 2025; v1 submitted 30 September, 2024; originally announced October 2024.

    Comments: The dataset and the supplementary material can be provided upon request

  3. arXiv:2401.05219  [pdf, other

    cs.CE cs.AI

    Distributed Monitoring for Data Distribution Shifts in Edge-ML Fraud Detection

    Authors: Nader Karayanni, Robert J. Shahla, Chieh-Lien Hsiao

    Abstract: The digital era has seen a marked increase in financial fraud. edge ML emerged as a promising solution for smartphone payment services fraud detection, enabling the deployment of ML models directly on edge devices. This approach enables a more personalized real-time fraud detection. However, a significant gap in current research is the lack of a robust system for monitoring data distribution shift… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  4. arXiv:1708.02787  [pdf, ps, other

    cs.LG

    Non-Adaptive Randomized Algorithm for Group Testing

    Authors: Nader H. Bshouty, Nuha Diab, Shada R. Kawar, Robert J. Shahla

    Abstract: We study the problem of group testing with a non-adaptive randomized algorithm in the random incidence design (RID) model where each entry in the test is chosen randomly independently from $\{0,1\}$ with a fixed probability $p$. The property that is sufficient and necessary for a unique decoding is the separability of the tests, but unfortunately no linear time algorithm is known for such tests.… ▽ More

    Submitted 9 August, 2017; originally announced August 2017.

  5. arXiv:1602.05032  [pdf, other

    cs.DM

    Enumerating all the Irreducible Polynomials over Finite Field

    Authors: Nader H. Bshouty, Nuha Diab, Shada R. Kawar, Robert J. Shahla

    Abstract: In this paper we give a detailed analysis of deterministic and randomized algorithms that enumerate any number of irreducible polynomials of degree $n$ over a finite field and their roots in the extension field in quasilinear where $N=n^2$ is the size of the output.} time cost per element. Our algorithm is based on an improved algorithm for enumerating all the Lyndon words of length $n$ in linea… ▽ More

    Submitted 11 August, 2016; v1 submitted 16 February, 2016; originally announced February 2016.