{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:57:58Z","timestamp":1760785078787,"version":"3.37.3"},"reference-count":169,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tnsm.2022.3169988","type":"journal-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T20:45:24Z","timestamp":1650919524000},"page":"3670-3684","source":"Crossref","is-referenced-by-count":9,"title":["Landing AI on Networks: An Equipment Vendor Viewpoint on Autonomous Driving Networks"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3936-8876","authenticated-orcid":false,"given":"Dario","family":"Rossi","sequence":"first","affiliation":[{"name":"Paris Research Center, Huawei Technologies Company Ltd., Boulogne-Billancourt, France"}]},{"given":"Liang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing Research and Development Center, Huawei Technologies Company Ltd., Nanjing, Jiangsu, China"}]}],"member":"263","reference":[{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810906"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211861"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3475167"},{"year":"2022","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_32"},{"key":"ref32","article-title":"Binarized neural networks","volume":"29","author":"hubara","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3282307"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3467017"},{"year":"2022","key":"ref37"},{"year":"2022","key":"ref36"},{"year":"2022","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/VLSICircuits52068.2021.9492385"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3241036"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.12.002"},{"key":"ref20","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Advances in neural information processing systems"},{"year":"2022","key":"ref22"},{"key":"ref21","article-title":"Language models are few-shot learners","author":"brown","year":"2020","journal-title":"Advances in neural information processing systems"},{"year":"2022","key":"ref24"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref23"},{"key":"ref101","article-title":"Running neural networks on the NIC","author":"siracusano","year":"2020","journal-title":"arXiv 2009 02353"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref100","article-title":"Taurus: A data plane architecture for per-packet ML","author":"swamy","year":"2020","journal-title":"arXiv 2002 08987"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"year":"2022","key":"ref50"},{"key":"ref51","first-page":"1","article-title":"TensorFlow lite micro: Embedded machine learning for TinyML systems","volume":"3","author":"david","year":"2021","journal-title":"Proc MLSys"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405859"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"article-title":"Four principles of explainable artificial intelligence","year":"8312","author":"phillips","key":"ref156"},{"key":"ref155","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref150","first-page":"1096","article-title":"Unmasking clever Hans predictors and assessing what machines really learn","volume":"10","author":"lapuschkin","year":"2019","journal-title":"Nature"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2016.7451741"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2013.24"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484756"},{"key":"ref147","article-title":"Towards probabilistic verification of machine unlearning","author":"sommer","year":"2022","journal-title":"arXiv 2003 04247"},{"year":"2022","key":"ref148"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/3457607"},{"year":"2022","key":"ref59"},{"year":"2022","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3448247"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03819-2"},{"year":"2022","key":"ref55"},{"year":"2022","key":"ref54"},{"year":"2022","key":"ref53"},{"year":"2022","key":"ref52"},{"year":"2022","key":"ref40"},{"key":"ref167","first-page":"122","article-title":"ShuffleNet V2: Practical guidelines for efficient CNN architecture design","author":"ma","year":"2018","journal-title":"Proc ECCV"},{"key":"ref166","first-page":"1","article-title":"Inverted residuals and linear bottlenecks: Mobile networks for classification, detection and segmentation","author":"howard","year":"2018","journal-title":"Proc IEEE CVPR"},{"year":"2022","key":"ref165"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796677"},{"year":"2022","key":"ref163"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0219-9"},{"year":"2022","key":"ref161"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3381831"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.136"},{"year":"2022","key":"ref3"},{"journal-title":"Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning","year":"2021","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3076293"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.113010.00106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3127543"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2896848"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref157","article-title":"Towards robust interpretability with self-explaining neural networks","author":"alvarez-melis","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2909076"},{"year":"2022","key":"ref46"},{"year":"2022","key":"ref45"},{"year":"2022","key":"ref48"},{"year":"2022","key":"ref47"},{"year":"2022","key":"ref42"},{"year":"2022","key":"ref41"},{"year":"2022","key":"ref44"},{"year":"2022","key":"ref43"},{"year":"2022","key":"ref127"},{"year":"2022","key":"ref126"},{"key":"ref125","first-page":"1","article-title":"Heterogeneous data-aware federated learning","author":"yang","year":"2020","journal-title":"Proc IJCAI Workshop Federated Learn"},{"key":"ref124","first-page":"1","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?n?","year":"2016","journal-title":"Proc NeurIPS Workshop Private Multi-Party Mach Learn"},{"year":"2022","key":"ref73"},{"year":"2022","key":"ref72"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3239542"},{"year":"2022","key":"ref71"},{"year":"2022","key":"ref128"},{"year":"2022","key":"ref70"},{"key":"ref76","first-page":"741","article-title":"ATP: In-network aggregation for multi-tenant learning","author":"lao","year":"2021","journal-title":"Proc USENIX NSDI"},{"year":"2022","key":"ref130"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472904"},{"year":"2022","key":"ref74"},{"year":"2022","key":"ref75"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.226"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.07.008"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021564703268"},{"year":"2022","key":"ref78"},{"key":"ref132","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"year":"2022","key":"ref79"},{"year":"2022","key":"ref136"},{"year":"2022","key":"ref135"},{"year":"2022","key":"ref138"},{"year":"2022","key":"ref137"},{"year":"2022","key":"ref60"},{"key":"ref139","first-page":"1323","article-title":"Measuring HTTPS adoption on the Web","author":"felt","year":"2017","journal-title":"Proc Usenix Security Symp"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3386252"},{"year":"2022","key":"ref61"},{"article-title":"Active learning literature survey","year":"2009","author":"settles","key":"ref63"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472927"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494863"},{"year":"2022","key":"ref65"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2014.6927719"},{"year":"2022","key":"ref66"},{"key":"ref142","first-page":"1","article-title":"A hybrid approach to privacy-preserving federated learning","author":"truex","year":"2019","journal-title":"Proc ACM Workshop AI Security"},{"year":"2022","key":"ref67"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"year":"2022","key":"ref68"},{"key":"ref144","first-page":"1","article-title":"Machine unlearning for random forests","author":"brophy","year":"2021","journal-title":"Proc ICML"},{"year":"2022","key":"ref2"},{"year":"2022","key":"ref69"},{"key":"ref145","first-page":"931","article-title":"Descent-to-delete: Gradient-based methods for machine unlearning","author":"neel","year":"2021","journal-title":"Mach Learn Res"},{"key":"ref1","article-title":"Why (and how) networks should run themselves","author":"feamster","year":"2017","journal-title":"arXiv 1710 11583"},{"key":"ref109","article-title":"HURRA! Human readable router anomaly detection","author":"navarro","year":"2020","journal-title":"arXiv 2107 11078"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098022"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3122940"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506558"},{"key":"ref106","first-page":"1","article-title":"LSTM-based encoder-decoder for multi-sensor anomaly detection","author":"malhotra","year":"2016","journal-title":"Proc ICML"},{"year":"2022","key":"ref92"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3037019"},{"year":"2022","key":"ref91"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00154"},{"year":"2022","key":"ref90"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3405837.3411398"},{"key":"ref102","first-page":"202","article-title":"FENXI: Deep-learning traffic analytics at the edge","author":"gallo","year":"2021","journal-title":"Proc ACM\/IEEE Symp Edge Comput (SEC)"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"ref110","article-title":"Human readable network troubleshooting based on anomaly detection and feature scoring","author":"navarro","year":"2021","journal-title":"arXiv 2108 11807"},{"key":"ref98","first-page":"25","article-title":"Do switches dream of machine learning? Toward in-network classification","author":"xiong","year":"2019","journal-title":"Proc ACM HotNets XVIII"},{"key":"ref99","article-title":"pForest: In-network inference with random forests","author":"busse-grawitz","year":"2019","journal-title":"arXiv 1909 05680"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2019.8888137"},{"year":"2022","key":"ref97"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3003065"},{"article-title":"The perceptron&#x2014;A perceiving and recognizing automation","year":"1957","author":"rosenblatt","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1147\/rd.33.0210"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1977.4309623"},{"key":"ref14","article-title":"ImageNet classification with deep convolutional neural networks","volume":"25","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"year":"0","key":"ref15"},{"key":"ref118","first-page":"1","article-title":"Neural combinatorial optimization beyond the TSP: Existing architectures under-represent graph structure","author":"boffam","year":"2022","journal-title":"Proc AAAI GLCR workshop"},{"key":"ref16","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref82","first-page":"1997","article-title":"Neural architecture search: A survey","volume":"20","author":"elsken","year":"2019","journal-title":"J Mach Learn Res"},{"key":"ref117","first-page":"1","article-title":"Real-time channel management in WLANs: DRL versus heuristics","author":"iacoboaiea","year":"2021","journal-title":"Proc IFIP Netw"},{"year":"2022","key":"ref17"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2100227"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/nature24270"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314357"},{"key":"ref119","first-page":"393","article-title":"Pytheas: Enabling data-driven quality of experience optimization using group-based exploration-exploitation","author":"jiang","year":"2017","journal-title":"Proc USENIX NDSI"},{"year":"2022","key":"ref19"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3229543.3229549"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155292"},{"key":"ref116","first-page":"1","article-title":"A first look at class incremental learning in deep learning mobile traffic","author":"bovenzi","year":"2021","journal-title":"Proc IFIP TMA"},{"year":"2022","key":"ref80"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162704"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162916"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"3181","DOI":"10.1007\/s11042-020-09144-6","article-title":"NDNetGaming&#x2014;Development of a no-reference deep CNN for gaming video quality prediction","volume":"81","author":"zadtootaghaj","year":"2022","journal-title":"Multimedia Tools Appl"},{"key":"ref121","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01581-6","article-title":"Lifelong machine learning","volume":"12","author":"chen","year":"2018","journal-title":"Synthesis Lectures on Artificial Intelligence and Machine Learning"},{"key":"ref122","first-page":"409","article-title":"Incremental and decremental support vector machine learning","author":"cauwenberghs","year":"2001","journal-title":"Proc NeurIPS"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0114-6"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2978685"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073672"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2790347"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506519"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9917435\/09762358.pdf?arnumber=9762358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T18:04:13Z","timestamp":1665770653000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9762358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":169,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3169988","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}