Skip to main content

Showing 1–2 of 2 results for author: Pathak, P H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2108.03297  [pdf, other

    cs.LG cs.AI cs.NI

    Joint AP Probing and Scheduling: A Contextual Bandit Approach

    Authors: Tianyi Xu, Ding Zhang, Parth H. Pathak, Zizhan Zheng

    Abstract: We consider a set of APs with unknown data rates that cooperatively serve a mobile client. The data rate of each link is i.i.d. sampled from a distribution that is unknown a priori. In contrast to traditional link scheduling problems under uncertainty, we assume that in each time step, the device can probe a subset of links before deciding which one to use. We model this problem as a contextual ba… ▽ More

    Submitted 21 October, 2021; v1 submitted 6 August, 2021; originally announced August 2021.

  2. arXiv:1605.04025  [pdf, other

    cs.CR

    FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Map**

    Authors: Hao Fu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Pengfei Hu, Prasant Mohapatra

    Abstract: The exponential growth of mobile devices has raised concerns about sensitive data leakage. In this paper, we make the first attempt to identify suspicious location-related HTTP transmission flows from the user's perspective, by answering the question: Is the transmission user-intended? In contrast to previous network-level detection schemes that mainly rely on a given set of suspicious hostnames,… ▽ More

    Submitted 24 July, 2016; v1 submitted 12 May, 2016; originally announced May 2016.