Match!
Ofir Pele
Ariel University
The InternetEncryptionPattern recognitionMathematicsComputer science
20Publications
8H-index
924Citations
What is this?
Publications 21
Newest
#1Lee-Ad Gottlieb (Ariel University)H-Index: 12
#2Eran KaufmanH-Index: 1
Last. Ofir PeleH-Index: 8
view all 5 authors...
We propose a new embedding method which is particularly well-suited for settings where the sample size greatly exceeds the ambient dimension. Our technique consists of partitioning the space into simplices and then embedding the data points into features corresponding to the simplices' barycentric coordinates. We then train a linear classifier in the rich feature space obtained from the simplices. The decision boundary may be highly non-linear, though it is linear within each simplex (and hence ...
#1Ran Dubin (BGU: Ben-Gurion University of the Negev)H-Index: 5
#2Raffael Shalala (BGU: Ben-Gurion University of the Negev)H-Index: 1
Last. Ofer Hadar (BGU: Ben-Gurion University of the Negev)H-Index: 16
view all 5 authors...
The increasing popularity of online video content and adaptive video streaming services, especially those based on HTTP Adaptive Streaming (HAS) highlights the need for streaming optimization solutions. From a server perspective, the main drawback of HAS is that the user selects the quality of the next video segment without taking the server constraints into account. These constraints include the number of users simultaneously being served and the server’s congestion. Here, we present the Fair S...
1 CitationsSource
#1Uzi Ben Shalom (Ariel University)H-Index: 1
#2Amit Dvir (Ariel University)H-Index: 8
Last. Ofir Pele (Ariel University)H-Index: 8
view all 7 authors...
This study explored the relevancy of internet discourse among football fans and real-life stadium violence. Our hypothesis implies that there are positive correlations between violent utterances in...
2 CitationsSource
The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in shaping their encrypted video traffic via DPI. This highlights the need for new traffic classification methods for encrypted HTTP adaptive...
2 Citations
#1Ran Dubin (BGU: Ben-Gurion University of the Negev)H-Index: 5
#2Amit Dvir (Ariel University)H-Index: 8
Last. Ori Mashiach (BGU: Ben-Gurion University of the Negev)H-Index: 1
view all 6 authors...
The increasing demand for video streaming services with a high Quality of Experience (QoE) has prompted considerable research on client-side adaptation logic approaches. However, most algorithms use the client’s previous download experience and do not use a crowd knowledge database generated by users of a professional service. We propose a new crowd algorithm that maximizes the QoE. We evaluate our algorithm against state-of-the-art algorithms on large, real-life, crowdsourcing datasets. There a...
7 CitationsSource
#1Ran Dubin (BGU: Ben-Gurion University of the Negev)H-Index: 5
#2Amit Dvir (Ariel University)H-Index: 8
Last. Ofer Hadar (Ariel University)H-Index: 16
view all 4 authors...
Desktops can be exploited to violate privacy. There are two main types of attack scenarios: active and passive. We consider the passive scenario where the adversary does not interact actively with the device, but is able to eavesdrop on the network traffic of the device from the network side. In the near future, most Internet traffic will be encrypted and thus passive attacks are challenging. Previous research has shown that information can be extracted from encrypted multimedia streams. This in...
9 CitationsSource
Jan 1, 2017 in CCNC (Consumer Communications and Networking Conference)
#1Jonathan Muehlstein (Ariel University)H-Index: 2
#2Yehonatan Zion (Ariel University)H-Index: 2
Last. Ofir Pele (Ariel University)H-Index: 8
view all 7 authors...
Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the internet traffic is encrypted and thus passive attacks are challenging. In this paper, we show that an external attacker can identify the operating syst...
8 CitationsSource
We propose a new embedding method for a single vector and for a pair of vectors. This embedding method enables: a) efficient classification and regression of functions of single vectors; b) efficient approximation of distance functions; and c) non-Euclidean, semimetric learning. To the best of our knowledge, this is the first work that enables learning any general, non-Euclidean, semimetrics. That is, our method is a universal semimetric learning and approximation method that can approximate any...
#1Ran Dubin (BGU: Ben-Gurion University of the Negev)H-Index: 5
#2Ofer Hadar (BGU: Ben-Gurion University of the Negev)H-Index: 16
Last. Ofir Pele (Ariel University)H-Index: 8
view all 6 authors...
The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet Inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in shaping their encrypted video traffic via DPI. This highlights the need for new traffic classification methods for encrypted HTTP adaptive...
5 CitationsSource
#2Yehonatan ZionH-Index: 2
Last. Ofir PeleH-Index: 8
view all 7 authors...
Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the internet traffic is encrypted and thus passive attacks are challenging. In this paper, we show that an external attacker can identify the operating syst...
2 Citations
123