{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:48:38Z","timestamp":1769842118897,"version":"3.49.0"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032013"],"award-info":[{"award-number":["62032013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92267206"],"award-info":[{"award-number":["92267206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2005"],"award-info":[{"award-number":["U22B2005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072091"],"award-info":[{"award-number":["62072091"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tnet.2024.3456124","type":"journal-article","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T18:27:54Z","timestamp":1726511274000},"page":"5097-5111","source":"Crossref","is-referenced-by-count":1,"title":["XNV: Explainable Network Verification"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9782-0053","authenticated-orcid":false,"given":"Fuliang","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Minglong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9632-8101","authenticated-orcid":false,"given":"Yunhang","family":"Pu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Yuxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2856-4716","authenticated-orcid":false,"given":"Xingwei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-2529","authenticated-orcid":false,"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"More Details About the October 4 Outage","author":"Janardhan","year":"2021"},{"key":"ref2","volume-title":"Routing Error Caused Network Outage","year":"2024"},{"key":"ref3","volume-title":"Google Accidentally Broke the Internet Throughout Japan","author":"Locklear","year":"2024"},{"key":"ref4","volume-title":"Widespread Impact Casused by Level 3 BGP Route Leak","author":"Madory","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934874"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63390-9_14"},{"key":"ref7","first-page":"579","article-title":"NetComplete: Practical network-wide configuration synthesis with autocompletion","volume-title":"Proc. 15th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"El-Hassany"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"ref9","first-page":"469","article-title":"A general approach to network configuration analysis","volume-title":"Proc. USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Fogel"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"ref12","first-page":"201","article-title":"Tiramisu: Fast multilayer network verification","volume-title":"Proc. 17th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Abhashkumar"},{"key":"ref13","first-page":"217","article-title":"Efficient network reachability analysis using a succinct control plane representation","volume-title":"USENIX Symp. Oper. Syst. Design Implement. (OSDI)","author":"Fayaz"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406217"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3371110"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3630202.3630237"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3229584.3229585"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132753"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431304"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342088"},{"key":"ref21","first-page":"3319","article-title":"Axiomatic attribution for deep networks","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"70","author":"Sundararajan"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aay7120"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90403-0_2"},{"key":"ref24","first-page":"99","article-title":"Metha: Network verifiers need to be correct too!","volume-title":"Proc. USENIX NSDI","author":"Birkner"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2015.03.001"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4271","volume-title":"A Border Gateway Protocol 4 (BGP-4)","author":"Rekhter","year":"2006"},{"key":"ref27","first-page":"601","article-title":"Differential network analysis","volume-title":"Proc. 19th USENIX Symp. Netw. Syst. Design Implement.","author":"Zhang"},{"key":"ref28","first-page":"4","article-title":"Differential datalog","volume":"2","author":"Ryzhyk","year":"2019","journal-title":"Datalog"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.01.058"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92673-3_3"},{"key":"ref31","first-page":"70","article-title":"Owl web ontology language overview","volume":"69","author":"Van Harmelen","year":"2004","journal-title":"World Wide Web Consortium (W3C) Recommendation"},{"key":"ref32","volume-title":"Protege","year":"2024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/5326.661100"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"issue":"79","key":"ref35","first-page":"1","article-title":"SWRL: A semantic web rule language combining OWL and RuleML","volume":"21","author":"Horrocks","year":"2004","journal-title":"W3C Member Submission"},{"key":"ref36","volume":"88","author":"Vesely","year":"1981","journal-title":"Fault Tree Handbook"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/24.285125"},{"key":"ref38","volume-title":"SPARQL 1.1 Query Language","year":"2024"},{"key":"ref39","volume-title":"Dinic\u2019s Algorithm","year":"2024"},{"key":"ref40","first-page":"999","article-title":"Finding network misconfigurations by automatic template inference","volume-title":"Proc. USENIX NSDI","author":"Kakarla"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925631"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25010-6_1"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3233\/SW-2011-0025"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/90\/10807683\/10679779.pdf?arnumber=10679779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T20:31:26Z","timestamp":1736973086000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":44,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3456124","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}