Follow
Faraz Ahmed
Faraz Ahmed
Hewlett Packard Labs (HPE)
Verified email at hpe.com - Homepage
Title
Cited by
Cited by
Year
A generic statistical approach for spam detection in online social networks
F Ahmed, M Abulaish
Computer Communications 36 (10-11), 1120-1129, 2013
2372013
Using spatio-temporal information in API calls with machine learning algorithms for malware detection
F Ahmed, H Hameed, MZ Shafiq, M Farooq
Proceedings of the 2nd ACM workshop on Security and artificial intelligence …, 2009
2282009
An mcl-based approach for spam profile detection in online social networks
F Ahmed, M Abulaish
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
952012
Homa: An Efficient Topology and Route Management Approach in SD-WAN Overlays
DZ Tootaghaj, F Ahmed, P Sharma, M Yannakakis
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2351-2360, 2020
672020
Towards a theory of generalizing system call representation for in-execution malware detection
B Mehdi, F Ahmed, SA Khayyam, M Farooq
2010 IEEE international conference on communications, 1-5, 2010
402010
A random matrix approach to differential privacy and structure preserved social network graph publishing
F Ahmed, R Jin, AX Liu
arXiv preprint arXiv:1307.0475, 2013
392013
Publishing social network graph eigenspectrum with privacy guarantees
F Ahmed, AX Liu, R Jin
IEEE Transactions on Network Science and Engineering 7 (2), 892-906, 2019
342019
Noise tolerant localization for sensor networks
F Xiao, L Chen, C Sha, L Sun, R Wang, AX Liu, F Ahmed
IEEE/ACM Transactions on Networking 26 (4), 1701-1714, 2018
332018
The Internet is for Porn: Measurement and Analysis of Online Adult Traffic
F. Ahmed and M. Z. Shafiq and A. X. Liu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
282016
Detecting and localizing end-to-end performance degradation for cellular data services based on TCP loss ratio and round trip time
F Ahmed, J Erman, Z Ge, AX Liu, J Wang, H Yan
IEEE/ACM Transactions on Networking 25 (6), 3709-3722, 2017
252017
Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services
F Ahmed, J Erman, Z Ge, A Liu, J Wang, H Yan
SIGMETRICS International Conference on Measurement and Modeling of Computer …, 2015
222015
Social Graph Publishing with Privacy Guarantees
Faraz Ahmed, Alex X. Liu, Rong Jin
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
15*2016
Optimizing Internet Transit Routing for Content Delivery Networks
F Ahmed, Z Shafiq, A Khakpour, A Liu
IEEE/ACM Transactions on Networking 26 (1), 76 - 89, 2018
142018
Optimizing Internet transit routing for content delivery networks
F Ahmed, Z Shafiq, A Khakpour, AX Liu
2016 IEEE 24th International Conference on Network Protocols (ICNP), 1-10, 2016
142016
Identification of Sybil Communities Generating Context-Aware Spam on Online Social Networks
F Ahmed, M Abulaish
Asia-Pacific Web Conference, 268-279, 2013
62013
A data mining framework for securing 3g core network from GTP fuzzing attacks
F Ahmed, MZ Rafique, M Abulaish
International Conference on Information Systems Security, 280-293, 2011
62011
Mind the Semantic Gap: Policy Intent Inference from Network Metadata
A Mercian, F Ahmed, P Sharma, S Wackerly, C Clark
2021 IEEE 7th International Conference on Network Softwarization (NetSoft …, 2021
52021
eCaaS: A Management Framework of Edge Container as a Service for Business Workload
L Cao, A Merican, DZ Tootaghaj, F Ahmed, P Sharma, V Saxena
Proceedings of the 4th International Workshop on Edge Systems, Analytics and …, 2021
52021
Epinoia: Intent Checker for Stateful Networks
H Wang, P Sharma, F Ahmed, JM Kang, C Qian, M Yannakakis
2021 International Conference on Computer Communications and Networks (ICCCN …, 2021
42021
Monitoring quality-of-experience for operational cellular networks using machine-to-machine traffic
F Ahmed, J Erman, Z Ge, AX Liu, J Wang, H Yan
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20