{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:06:38Z","timestamp":1755219998115,"version":"3.43.0"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Comcast Innovation Fund, NSF","award":["2201536","2133407"],"award-info":[{"award-number":["2201536","2133407"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tnsm.2025.3567654","type":"journal-article","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T13:33:08Z","timestamp":1747315988000},"page":"3617-3631","source":"Crossref","is-referenced-by-count":0,"title":["ClearNET: Enhancing Transparency in Opaque Network Models Using Explainable AI (XAI) for Efficient Traffic Engineering"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6609-1749","authenticated-orcid":false,"given":"Cristian","family":"Zilli","sequence":"first","affiliation":[{"name":"DAUIN, Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2835-5455","authenticated-orcid":false,"given":"Alessio","family":"Sacco","sequence":"additional","affiliation":[{"name":"DAUIN, Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7798-4584","authenticated-orcid":false,"given":"Flavio","family":"Esposito","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Saint Louis University, Saint Louis, MO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3588-9367","authenticated-orcid":false,"given":"Guido","family":"Marchetto","sequence":"additional","affiliation":[{"name":"DAUIN, Politecnico di Torino, Turin, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS59830.2024.10575173"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2980899"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3371384"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.11.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.04.036"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604857"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000371"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3099092"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3152434.3152441"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON59386.2023.10207178"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2018.8430788"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3366849"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3359992.3366639"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599762"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3246794"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(89)80095-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1368-0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6029\/smartcr.2014.03.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/bjs.10895"},{"key":"ref23","article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","author":"Simonyan","year":"2014","journal-title":"arXiv:1312.6034"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00097"},{"key":"ref27","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. 31st Adv. Neural Inf. Process. Syst. (NIPS)","author":"Lundberg"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700417"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024560"},{"key":"ref30","first-page":"261","article-title":"Deep convolutional LSTM network-based traffic matrix prediction with partial information","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manage. (IM)","author":"Le"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904347"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2895553"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref36","article-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2015","journal-title":"arXiv:1509.02971"},{"key":"ref37","first-page":"387","article-title":"Deterministic policy gradient algorithms","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Silver"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2417809"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330147"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3270166"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060329"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2024.3516472"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787471"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s12532-012-0044-1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3640"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969631"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1511.08458"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2347031"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.12.027"},{"issue":"2","key":"ref50","first-page":"37","article-title":"What can you do with a web in your pocket?","volume":"21","author":"Brin","year":"1998","journal-title":"IEEE Data Eng. Bull."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2005.09.008"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"key":"ref54","first-page":"1399","article-title":"Ranking a random feature for variable and feature selection","volume":"3","author":"Stoppiglia","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00428-4"},{"key":"ref56","article-title":"Adversarial autoencoders","author":"Makhzani","year":"2016","journal-title":"arXiv:1511.05644"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8828745"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330146"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111341"},{"key":"ref60","first-page":"263","article-title":"Traffic data repository at the WIDE project","volume-title":"Proc. USENIX Annu. Tech. Conf. (ATC)","author":"Cho"},{"volume-title":"CodeCarbon: Estimate and track carbon emissions from machine learning computing","year":"2021","author":"Schmidt et al","key":"ref61"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342210"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3232565.3232569"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3098157"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4707909"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838766"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322496"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405859"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3136625"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9878-1_4"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2012.6252640"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11118327\/11005412.pdf?arnumber=11005412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T17:44:43Z","timestamp":1754588683000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11005412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":71,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3567654","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}