default search action
Faraz Ahmed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Ali Tariq, Lianjie Cao, Faraz Ahmed, Eric Rozner, Puneet Sharma:
Accelerating Containerized Machine Learning Workloads. NOMS 2024: 1-10 - 2023
- [c20]Zhen Lin, Lianjie Cao, Faraz Ahmed, Hui Lu, Puneet Sharma:
When Caching Systems Meet Emerging Storage Devices: A Case Study. HotStorage 2023: 37-43 - [c19]Amit Samanta, Faraz Ahmed, Lianjie Cao, Ryan Stutsman, Puneet Sharma:
Persistent Memory-Aware Scheduling for Serverless Workloads. IPDPS Workshops 2023: 615-621 - [c18]Umakant Kulkarni, Khaled Diab, Shivang Aggarwal, Lianjie Cao, Faraz Ahmed, Puneet Sharma, Sonia Fahmy:
Understanding the Impact of Wi-Fi Configuration on Volumetric Video Streaming Applications. EMS@SIGCOMM 2023: 41-47 - 2022
- [c17]Chinlin Chen, Uyen Chau, Anu Mercian, Faraz Ahmed, Puneet Sharma:
UnifiedNetManagement: Unified Network Management for Heterogeneous Edge Enterprise Network. IC2E 2022: 199-204 - 2021
- [c16]Lianjie Cao, Anu Mercian, Diman Zad Tootaghaj, Faraz Ahmed, Puneet Sharma, Vinay Saxena:
eCaaS: A Management Framework of Edge Container as a Service for Business Workload. EdgeSys@EuroSys 2021: 73-78 - [c15]Huazhe Wang, Puneet Sharma, Faraz Ahmed, Joon-Myung Kang, Chen Qian, Mihalis Yannakakis:
Epinoia: Intent Checker for Stateful Networks. ICCCN 2021: 1-9 - [c14]Anu Mercian, Faraz Ahmed, Puneet Sharma, Shaun Wackerly, Charles Clark:
Mind the Semantic Gap: Policy Intent Inference from Network Metadata. NetSoft 2021: 312-320 - 2020
- [j5]Faraz Ahmed, Alex X. Liu, Rong Jin:
Publishing Social Network Graph Eigenspectrum With Privacy Guarantees. IEEE Trans. Netw. Sci. Eng. 7(2): 892-906 (2020) - [c13]Diman Zad Tootaghaj, Faraz Ahmed, Puneet Sharma, Mihalis Yannakakis:
Homa: An Efficient Topology and Route Management Approach in SD-WAN Overlays. INFOCOM 2020: 2351-2360
2010 – 2019
- 2018
- [j4]Faraz Ahmed, M. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu:
Optimizing Internet Transit Routing for Content Delivery Networks. IEEE/ACM Trans. Netw. 26(1): 76-89 (2018) - [j3]Fu Xiao, Lei Chen, Chaoheng Sha, Lijuan Sun, Ruchuan Wang, Alex X. Liu, Faraz Ahmed:
Noise Tolerant Localization for Sensor Networks. IEEE/ACM Trans. Netw. 26(4): 1701-1714 (2018) - 2017
- [j2]Faraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan:
Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services Based on TCP Loss Ratio and Round Trip Time. IEEE/ACM Trans. Netw. 25(6): 3709-3722 (2017) - [c12]Faraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan:
Monitoring quality-of-experience for operational cellular networks using machine-to-machine traffic. INFOCOM 2017: 1-9 - 2016
- [c11]Faraz Ahmed, M. Zubair Shafiq, Alex X. Liu:
The Internet is for Porn: Measurement and Analysis of Online Adult Traffic. ICDCS 2016: 88-97 - [c10]Faraz Ahmed, Alex X. Liu, Rong Jin:
Social Graph Publishing with Privacy Guarantees. ICDCS 2016: 447-456 - [c9]Faraz Ahmed, M. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu:
Optimizing Internet transit routing for content delivery networks. ICNP 2016: 1-10 - [c8]Faraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan:
Detecting and localizing end-to-end performance degradation for cellular data services. INFOCOM 2016: 1-9 - 2015
- [c7]Faraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan:
Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services. SIGMETRICS 2015: 459-460 - 2013
- [j1]Faraz Ahmed, Muhammad Abulaish:
A generic statistical approach for spam detection in Online Social Networks. Comput. Commun. 36(10-11): 1120-1129 (2013) - [c6]Faraz Ahmed, Muhammad Abulaish:
Identification of Sybil Communities Generating Context-Aware Spam on Online Social Networks. APWeb 2013: 268-279 - [i1]Faraz Ahmed, Rong Jin, Alex X. Liu:
A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing. CoRR abs/1307.0475 (2013) - 2012
- [c5]Faraz Ahmed, Muhammad Abulaish:
An MCL-Based Approach for Spam Profile Detection in Online Social Networks. TrustCom 2012: 602-608 - 2011
- [c4]Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish:
A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks. ICISS 2011: 280-293 - 2010
- [c3]Bilal Mehdi, Faraz Ahmed, Syed Ali Khayam, Muddassar Farooq:
Towards a Theory of Generalizing System Call Representation for In-Execution Malware Detection. ICC 2010: 1-5 - [c2]Faraz Ahmed, Farrukh Shahzad, Muddassar Farooq:
Using Computational Intelligence to Identify Performance Bottlenecks in a Computer System. PPSN (1) 2010: 304-313
2000 – 2009
- 2009
- [c1]Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq:
Using spatio-temporal information in API calls with machine learning algorithms for malware detection. AISec 2009: 55-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint