{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T20:39:47Z","timestamp":1769200787110,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361471","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0234-0239","source":"Crossref","is-referenced-by-count":3,"title":["Traffic Matrix Prediction Based on Cross Aggregate GNN"],"prefix":"10.1109","author":[{"given":"Jing","family":"Tao","sequence":"first","affiliation":[{"name":"Shenzhen Research Institute Xi&#x2019;an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019;an,China"}]},{"given":"Ken","family":"Cao","sequence":"additional","affiliation":[{"name":"Xi&#x2019; an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019; an,China"}]},{"given":"Teng","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi&#x2019; an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019; an,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7166196"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832225"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.90"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064259"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/167954.166255"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406199"},{"key":"ref8","volume-title":"Deep Learning. MIT Press","author":"Goodfellow","year":"2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1312898"},{"key":"ref10","article-title":"Network traffic prediction based on ARFIMA model[J]","author":"Zhou","year":"2013","journal-title":"arXiv preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254860"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2005.1452059"},{"issue":"2","key":"ref13","first-page":"19","article-title":"A network traffic prediction method based on LSTM[J]","volume":"17","author":"Wang","year":"2019","journal-title":"ZTE Communications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP49889.2020.9299774"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1561\/2200000056"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN52240.2021.9522222"},{"key":"ref17","article-title":"Variational graph auto-encoders[J]","author":"Kipf","year":"2016","journal-title":"arXiv preprint"},{"key":"ref18","article-title":"Layer normalization","author":"Ba","year":"2016","journal-title":"arXiv pr-eprint"},{"key":"ref19","article-title":"Learning graph nor-mal-ization for graph neural networks","author":"Chen","year":"2020","journal-title":"CoRR, abs\/2009. 11746"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"},{"key":"ref21","article-title":"How powerful are graph neu-ral networks?","volume-title":"In 7th International Conference on Learning Representations, ICLR 2019","author":"Xu","year":"2019"},{"key":"ref22","volume-title":"Abilene network topology data and traffic traces","author":"Zhang"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2023,11,14]]},"end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361471.pdf?arnumber=10361471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:45:16Z","timestamp":1705092316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361471\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361471","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}