Saman Feghhi

Orcid: 0000-0003-1988-9615

According to our database1, Saman Feghhi authored at least 13 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Remote Electrical Tilt Optimization via Safe Reinforcement Learning.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

A Safe Reinforcement Learning Architecture for Antenna Tilt Optimisation.
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021

2020
Safe Reinforcement Learning for Antenna Tilt Optimisation using Shielding and Multiple Baselines.
CoRR, 2020

Interpretable Unsupervised Anomaly Detection For RAN Cell Trace Analysis.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
An Efficient Web Traffic Defence Against Timing-Analysis Attacks.
IEEE Trans. Inf. Forensics Secur., 2019

Large-scale Experimentation with Network Abstraction for Network Configuration Management.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

2017
Time and place: robustness of a traffic analysis attack against web traffic.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
A Web Traffic Analysis Attack Using Only Timing Information.
IEEE Trans. Inf. Forensics Secur., 2016

On Making Encrypted Web Traffic Resistant to Timing-Analysis Attacks.
CoRR, 2016

Diagnosing channel issues using GTP protocol messages in LTE core networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Proportional fair rate allocation for private shared networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

A first-hop traffic analysis attack against a femtocell.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2014
A Successful Web Traffic Analysis Attack Using Only Timing Information.
CoRR, 2014


  Loading...