• Publications
  • Influence
Structural analysis of network traffic flows
TLDR
We present the first analysis of complete sets of OD flow time-series, taken from two different backbone networks (Abilene and Sprint-Europe). Expand
  • 526
  • 34
  • PDF
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records
Ridge regression is an algorithm that takes as input a large number of data points and finds the best-fit linear curve through these points. The algorithm is a building block for manyExpand
  • 306
  • 32
  • PDF
Traffic matrices: balancing measurements, inference and modeling
TLDR
We provide a taxonomy of the kinds of models that may make use of partial flow measurement, based on the nature of the measurements used and the spatial, temporal, or spatio-temporal correlation exploited. Expand
  • 215
  • 29
  • PDF
Privacy-preserving matrix factorization
TLDR
We design a system that performs matrix factorization, a popular method used in a variety of modern recommendation systems, through a cryptographic technique known as garbled circuits. Expand
  • 194
  • 26
  • PDF
Traffic matrix estimation: existing techniques and new directions
TLDR
We propose a new direction for POP-to-POP traffic matrices estimation based on using choice models to model POP fanouts, which can incorporate additional data and information about POPs. Expand
  • 369
  • 24
Combining filtering and statistical methods for anomaly detection
TLDR
We study and compare four different methods for analyzing residuals, two of which are new. Expand
  • 312
  • 23
  • PDF
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
TLDR
We evaluate poisoning techniques and develop a defense, in the context of a particular anomaly detector - namely the PCA-subspace method for detecting anomalies in backbone networks. Expand
  • 267
  • 18
  • PDF
The problem of synthetically generating IP traffic matrices: initial recommendations
TLDR
We introduce here the two basic problems that need to be addressed to construct realistic traffic matrices. Expand
  • 169
  • 16
  • PDF
Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems
TLDR
Networked end-systems such as desktops and set-top boxes are often left powered-on, but idle, leading to wasted energy consumption. Expand
  • 140
  • 16
  • PDF
GraphSC: Parallel Secure Computation Made Easy
TLDR
We propose introducing modern parallel programming paradigms to secure computation, enabling their secure execution on large datasets. Expand
  • 108
  • 16
  • PDF