{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:10:24Z","timestamp":1767262224247,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,10]]},"DOI":"10.1109\/icnp59255.2023.10355598","type":"proceedings-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T14:18:50Z","timestamp":1703081930000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Network Specification Mining with High Fidelity and Scalability"],"prefix":"10.1109","author":[{"given":"Ning","family":"Kang","sequence":"first","affiliation":[{"name":"Xi&#x0027;an Jiaotong University"}]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi&#x0027;an Jiaotong University"}]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[{"name":"Xi&#x0027;an Jiaotong University"}]},{"given":"Sisi","family":"Wen","sequence":"additional","affiliation":[{"name":"Xi&#x0027;an Jiaotong University"}]},{"given":"Chaoyang","family":"Ji","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies Co., Ltd."}]},{"given":"Yongqiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies Co., Ltd."}]}],"member":"263","reference":[{"key":"ref1","first-page":"201","article-title":"Tiramisu: Fast multilayer network verification","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Abhashkumar","year":"2020"},{"key":"ref2","first-page":"953","article-title":"Plankton: Scalable network configuration verification through model checking","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Prabhu","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405900"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544264"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406217"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63390-9_14"},{"key":"ref10","first-page":"579","article-title":"Netcomplete: Practical network-wide configuration synthesis with autocompletion","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"El-Hassany","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3179425"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3179425"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431304"},{"key":"ref15","first-page":"469","article-title":"A general approach to network configuration analysis","volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)","author":"Fogel","year":"2015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132759"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3371110"},{"key":"ref18","article-title":"Differential network analysis","author":"Zhang","year":"2022","journal-title":"USENIX NSDI"},{"key":"ref19","first-page":"241","article-title":"Apkeep: Realtime verification for real networks","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Zhang","year":"2020"},{"key":"ref20","first-page":"735","article-title":"Delta-net: Realtime network verification using atoms","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Horn","year":"2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2398197"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"ref23","first-page":"969","article-title":"Con-fig2spec: Mining network specifications from network configurations","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Birkner","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380831"},{"issue":"6","key":"ref25","first-page":"1820","article-title":"Segmentation of ischemic stroke lesion based on long-distance dependency encoding and deep residual u-net","volume":"41","author":"HUANG","year":"2021","journal-title":"Journal of Computer Applications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535862"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674989"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787506"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2922"},{"volume-title":"Tiramisu source code","year":"2020","author":"Abhashkumar","key":"ref31"},{"volume-title":"Con-fig2spec source code","year":"2020","author":"Birkner","key":"ref32"}],"event":{"name":"2023 IEEE 31st International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2023,10,10]]},"location":"Reykjavik, Iceland","end":{"date-parts":[[2023,10,13]]}},"container-title":["2023 IEEE 31st International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10355566\/10355569\/10355598.pdf?arnumber=10355598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T17:52:58Z","timestamp":1705081978000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10355598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icnp59255.2023.10355598","relation":{},"subject":[],"published":{"date-parts":[[2023,10,10]]}}}