Publications
2025
- NSDICATO: End-to-end Optimization of ML Traffic Analysis PipelinesUSENIX Symposium on Networked Systems Design and Implementation, 2025
- SIGMETRICS
- LANMANThe Cost of Packet Loss on ML-Based Traffic AnalysisIn IEEE International Symposium on Local and Metropolitan Area Networks, 2025
2024
- SIGMETRICSNetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic GenerationProceedings of the ACM on Measurement and Analysis of Computing Systems, 2024
- NetAIComputeFeasibility of State Space Models for Network Traffic GenerationIn ACM SIGCOMM Workshop on Networks for AI Computing, 2024
2023
- CoNEXT
- IMC
- HotNetsGenerative, High-Fidelity Network TracesIn ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets), 2023
- CoNEXT-SW
2021
- SIGMETRICSTraffic Refinery: Cost-Aware Data Representation for Machine Learning on Network TrafficProceedings of the ACM on Measurement and Analysis of Computing Systems, 2021
- PAMCharacterizing Service Provider Response to the COVID-19 Pandemic in the United StatesIn Passive and Active Measurement Conference (PAM), 2021
- TPRCMapping the Digital Divide: Before, During, and After COVID-19In Conference on Communications, Information, and Internet Policy (TPRC), 2021
2020
- arXivFeature Extraction for Novelty Detection in Network TrafficarXiv preprint arXiv:2006.16993, 2020
2019
- SIGMETRICSInferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment ExperienceProceedings of the ACM on Measurement and Analysis of Computing Systems, 2019
- USENIX SecurityEvaluating the Contextual Integrity of Privacy Regulation: Parents’ IoT Toy Privacy Norms Versus COPPAIn USENIX Security Symposium, Aug 2019
2018
- TPRCEnhancing Transparency: Internet Video Quality Inference from Network TrafficIn Research Conference on Communications, Information and Internet Policy (TPRC), Aug 2018
- SIGCOMMA Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic ObfuscationIn ACM SIGCOMM Workshop on Internet of Things Security and Privacy, Aug 2018
- DLSMachine Learning DDoS Detection for Consumer Internet of Things DevicesIn IEEE Security and Privacy Deep Learning and Security Workshop (DLS), May 2018
2017
- ConProClosing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network ObserversIn IEEE Workshop on Technology and Consumer Protection (ConPro), May 2017
2016
- DATA Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT TrafficIn Workshop on Data and Algorithmic Transparency (DAT), Nov 2016
2015
- SIGCOMMASwatch: An AS Reputation System to Expose Bulletproof Hosting ASesIn ACM SIGCOMM, Aug 2015
2013
- SIGCOMMUnderstanding the Domain Registration Behavior of SpammersIn ACM SIGCOMM Internet Measurement Conference (IMC), Oct 2013
- ToNAnswering "What-If" Deployment and Configuration Questions with WISE: Techniques and Deployment ExperienceIEEE/ACM Transactions on Networking, Jan 2013
2012
- SIGCOMMObserving Common Spam in Twitter and EmailIn ACM SIGCOMM Internet Measurement Conference, Nov 2012
2011
- CEASSpam or Ham? Characterizing and Detecting Fraudulent "Not Spam" Reports in Web Mail SystemsIn 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2011), Sep 2011
- NSDIBehavioral Clustering of HTTP-Based MalwareIn USENIX Symposium on Networked Systems Design and Implementation (NSDI), Sep 2011
2010
- Fishing for Phishing in the Network StreamMar 2010
- USENIX SecurityBuilding a Dynamic Reputation System for DNSIn USENIX Security Symposium, Aug 2010
2009
- USENIX SecurityDetecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation EngineIn USENIX Security Symposium, Aug 2009
2008
- SIGCOMMAnswering What-If Deployment and Configuration Questions with WISEIn ACM SIGCOMM, Aug 2008
2007
- NIPSPredicting Bad BehaviorIn NIPS Workshop on Machine Learning in Adversarial Environments for Computer Security, Dec 2007
- CCSFiltering Spam with Behavioral BlacklistingIn Proc. 14th ACM Conference on Computer and Communications Security (CCS), Oct 2007
2006
- SIGCOMMUnderstanding the Network-Level Behavior of SpammersIn ACM SIGCOMM, Aug 2006
- CEASCan DNSBLs Keep Up with Bots?In 3rd Conference on Email and Anti-Spam (CEAS), Jul 2006
- SRUTIRevealing Botnet Membership with DNSBL Counter-IntelligenceIn 2nd USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), Jul 2006