{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:18:31Z","timestamp":1774120711371,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2017YFB0801701"],"award-info":[{"award-number":["2017YFB0801701"]}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61625203, 61832013"],"award-info":[{"award-number":["61625203, 61832013"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,30]]},"DOI":"10.1145\/3387514.3405859","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T22:35:31Z","timestamp":1596148531000},"page":"154-171","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":89,"title":["Interpreting Deep Learning-Based Networking Systems"],"prefix":"10.1145","author":[{"given":"Zili","family":"Meng","sequence":"first","affiliation":[{"name":"Institute for Network Science and Cyberspace &amp; BNRist, Tsinghua University"}]},{"given":"Minhu","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Science and Cyberspace &amp; BNRist, Tsinghua University"}]},{"given":"Jiasong","family":"Bai","sequence":"additional","affiliation":[{"name":"Institute for Network Science and Cyberspace &amp; BNRist, Tsinghua University and Department of Computer Science and Technology, Tsinghua University"}]},{"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute for Network Science and Cyberspace &amp; BNRist, Tsinghua University and Department of Computer Science and Technology, Tsinghua University"}]},{"given":"Hongzi","family":"Mao","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Clemson University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/www.fcc.gov\/reports-research\/reports\/measuring-broadband-america\/raw-data-measuring-broadband-america-2016","author":"Raw","year":"2016","unstructured":"Raw data - measuring broadband america. https:\/\/www.fcc.gov\/reports-research\/reports\/measuring-broadband-america\/raw-data-measuring-broadband-america-2016 , 2016 . Raw data - measuring broadband america. https:\/\/www.fcc.gov\/reports-research\/reports\/measuring-broadband-america\/raw-data-measuring-broadband-america-2016, 2016."},{"key":"e_1_3_2_2_2_1","volume-title":"https:\/\/github.com\/Dash-Industry-Forum\/dash.js","year":"2018","unstructured":"Dash.js. https:\/\/github.com\/Dash-Industry-Forum\/dash.js , 2018 . Dash.js. https:\/\/github.com\/Dash-Industry-Forum\/dash.js, 2018."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486031"},{"key":"e_1_3_2_2_5_1","volume-title":"Proc. NIPS","author":"Ba Jimmy","year":"2014","unstructured":"Jimmy Ba and Rich Caruana . Do deep nets really need to be deep ? In Proc. NIPS , 2014 . Jimmy Ba and Rich Caruana. Do deep nets really need to be deep? In Proc. NIPS, 2014."},{"key":"e_1_3_2_2_6_1","volume-title":"Proc. USENIX NSDI","author":"Bai Wei","year":"2015","unstructured":"Wei Bai , Li Chen , Kai Chen , Dongsu Han , Chen Tian , and Hao Wang . Information-agnostic flow scheduling for commodity data centers . In Proc. USENIX NSDI , 2015 . Wei Bai, Li Chen, Kai Chen, Dongsu Han, Chen Tian, and Hao Wang. Information-agnostic flow scheduling for commodity data centers. In Proc. USENIX NSDI, 2015."},{"key":"e_1_3_2_2_7_1","volume-title":"Proc. NeurIPS","author":"Bastani Osbert","year":"2018","unstructured":"Osbert Bastani , Yewen Pu , and Armando Solar-Lezama . Verifiable reinforcement learning via policy extraction . In Proc. NeurIPS , 2018 . Osbert Bastani, Yewen Pu, and Armando Solar-Lezama. Verifiable reinforcement learning via policy extraction. In Proc. NeurIPS, 2018."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.354"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286062.3286082"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(98)00034-4"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_2_12_1","volume-title":"Language models are few-shot learners. arXiv preprint","author":"Brown Tom B.","year":"2005","unstructured":"Tom B. Brown , Benjamin Mann , Nick Ryder , Melanie Subbiah , Jared Kaplan , Prafulla Dhariwal , Arvind Neelakantan , Pranav Shyam , Girish Sastry , Amanda Askell , Sandhini Agarwal , Ariel Herbert-Voss , Gretchen Krueger , Tom Henighan , Rewon Child , Aditya Ramesh , Daniel M. Ziegler , Jeffrey Wu , Clemens Winter , Christopher Hesse , Mark Chen , Eric Sigler , Mateusz Litwin , Scott Gray , Benjamin Chess , Jack Clark , Christopher Berner , Sam McCandlish , Alec Radford , Ilya Sutskever , and Dario Amodei . Language models are few-shot learners. arXiv preprint 2005 .14165, 2020. Tom B. Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom Henighan, Rewon Child, Aditya Ramesh, Daniel M. Ziegler, Jeffrey Wu, Clemens Winter, Christopher Hesse, Mark Chen, Eric Sigler, Mateusz Litwin, Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam McCandlish, Alec Radford, Ilya Sutskever, and Dario Amodei. Language models are few-shot learners. arXiv preprint 2005.14165, 2020."},{"key":"e_1_3_2_2_13_1","volume-title":"pforest: In-network inference with random forests. arXiv preprint","author":"Busse-Grawitz Coralie","year":"1909","unstructured":"Coralie Busse-Grawitz , Roland Meier , Alexander Dietm\u00fcller , Tobias B\u00fchler , and Laurent Vanbever . pforest: In-network inference with random forests. arXiv preprint 1909 .05680, 2019. Coralie Busse-Grawitz, Roland Meier, Alexander Dietm\u00fcller, Tobias B\u00fchler, and Laurent Vanbever. pforest: In-network inference with random forests. arXiv preprint 1909.05680, 2019."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186070"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.507"},{"key":"e_1_3_2_2_16_1","volume-title":"Proc. ACM SIGCOMM","author":"Chen Li","year":"2018","unstructured":"Li Chen , Justinas Lingys , Kai Chen , and Feng Liu . Auto : Scaling deep reinforcement learning for datacenter-scale automatic traffic optimization . In Proc. ACM SIGCOMM , 2018 . Li Chen, Justinas Lingys, Kai Chen, and Feng Liu. Auto: Scaling deep reinforcement learning for datacenter-scale automatic traffic optimization. In Proc. ACM SIGCOMM, 2018."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330153"},{"key":"e_1_3_2_2_18_1","volume-title":"NIPS Workshop on Deep Learning","author":"Chung Junyoung","year":"2014","unstructured":"Junyoung Chung , Caglar Gulcehre , Kyunghyun Cho , and Yoshua Bengio . Empirical evaluation of gated recurrent neural networks on sequence modeling . In NIPS Workshop on Deep Learning , 2014 . Junyoung Chung, Caglar Gulcehre, Kyunghyun Cho, and Yoshua Bengio. Empirical evaluation of gated recurrent neural networks on sequence modeling. In NIPS Workshop on Deep Learning, 2014."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342210"},{"key":"e_1_3_2_2_21_1","first-page":"68","volume-title":"Commun. ACM","author":"Du Mengnan","year":"2020","unstructured":"Mengnan Du , Ninghao Liu , and Xia Hu . Techniques for interpretable machine learning . Commun. ACM , pages 68 -- 77 , 2020 . Mengnan Du, Ninghao Liu, and Xia Hu. Techniques for interpretable machine learning. Commun. ACM, pages 68--77, 2020."},{"key":"e_1_3_2_2_22_1","volume-title":"Cnn - do we need to go deeper? https:\/\/medium.com\/finc-engineering\/cnn-do-we-need-to-go-deeper-afe1041e263e","author":"Ecarlat Pierre","year":"2017","unstructured":"Pierre Ecarlat . Cnn - do we need to go deeper? https:\/\/medium.com\/finc-engineering\/cnn-do-we-need-to-go-deeper-afe1041e263e , 2017 . Pierre Ecarlat. Cnn - do we need to go deeper? https:\/\/medium.com\/finc-engineering\/cnn-do-we-need-to-go-deeper-afe1041e263e, 2017."},{"key":"e_1_3_2_2_23_1","volume-title":"Journal of Machine Learning Research","author":"Elsken Thomas","year":"2019","unstructured":"Thomas Elsken , Jan Hendrik Metzen , and Frank Hutter . Neural architecture search: A survey . Journal of Machine Learning Research , 2019 . Thomas Elsken, Jan Hendrik Metzen, and Frank Hutter. Neural architecture search: A survey. Journal of Machine Learning Research, 2019."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013558"},{"key":"e_1_3_2_2_25_1","volume-title":"Proc. ICLR","author":"Frankle Jonathan","year":"2019","unstructured":"Jonathan Frankle and Michael Carbin . The lottery ticket hypothesis: Finding sparse, trainable neural networks . In Proc. ICLR , 2019 . Jonathan Frankle and Michael Carbin. The lottery ticket hypothesis: Finding sparse, trainable neural networks. In Proc. ICLR, 2019."},{"key":"e_1_3_2_2_26_1","volume-title":"Wadsworth & Brooks","author":"Friedman Jerome H","year":"1984","unstructured":"Jerome H Friedman , Richard A Olshen , Charles J Stone , Classification and regression trees . Wadsworth & Brooks , 1984 . Jerome H Friedman, Richard A Olshen, Charles J Stone, et al. Classification and regression trees. Wadsworth & Brooks, 1984."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"e_1_3_2_2_28_1","volume-title":"ACM Computing Surveys (CSUR)","author":"Guidotti Riccardo","year":"2018","unstructured":"Riccardo Guidotti , Anna Monreale , Salvatore Ruggieri , Franco Turini , Fosca Giannotti , and Dino Pedreschi . A survey of methods for explaining black box models . ACM Computing Surveys (CSUR) , 2018 . Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, and Dino Pedreschi. A survey of methods for explaining black box models. ACM Computing Surveys (CSUR), 2018."},{"key":"e_1_3_2_2_29_1","volume-title":"Proc. ICML","author":"Guo Tian","year":"2019","unstructured":"Tian Guo , Tao Lin , and Nino Antulov-Fantulin . Exploring interpretable LSTM neural networks over multi-variable data . In Proc. ICML , 2019 . Tian Guo, Tao Lin, and Nino Antulov-Fantulin. Exploring interpretable LSTM neural networks over multi-variable data. In Proc. ICML, 2019."},{"key":"e_1_3_2_2_30_1","volume-title":"Proc. ACM CCS","author":"Guo Wenbo","year":"2018","unstructured":"Wenbo Guo , Dongliang Mu , Jun Xu , Purui Su , Gang Wang , and Xinyu Xing . Lemna : Explaining deep learning based security applications . In Proc. ACM CCS , 2018 . Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, and Xinyu Xing. Lemna: Explaining deep learning based security applications. In Proc. ACM CCS, 2018."},{"key":"e_1_3_2_2_31_1","volume-title":"Proc. ICML","author":"Hanin Boris","year":"2019","unstructured":"Boris Hanin and David Rolnick . Complexity of linear regions in deep networks . In Proc. ICML , 2019 . Boris Hanin and David Rolnick. Complexity of linear regions in deep networks. In Proc. ICML, 2019."},{"key":"e_1_3_2_2_32_1","volume-title":"Proc. NeurIPS","author":"Heo Juyeon","year":"2019","unstructured":"Juyeon Heo , Sunghwan Joo , and Taesup Moon . Fooling neural network interpretations via adversarial model manipulation . In Proc. NeurIPS , 2019 . Juyeon Heo, Sunghwan Joo, and Taesup Moon. Fooling neural network interpretations via adversarial model manipulation. In Proc. NeurIPS, 2019."},{"key":"e_1_3_2_2_33_1","volume-title":"Graphlime: Local interpretable model explanations for graph neural networks. arXiv Preprint","author":"Huang Qiang","year":"2001","unstructured":"Qiang Huang , Makoto Yamada , Yuan Tian , Dinesh Singh , Dawei Yin , and Yi Chang . Graphlime: Local interpretable model explanations for graph neural networks. arXiv Preprint 2001 .06216, 2020. Qiang Huang, Makoto Yamada, Yuan Tian, Dinesh Singh, Dawei Yin, and Yi Chang. Graphlime: Local interpretable model explanations for graph neural networks. arXiv Preprint 2001.06216, 2020."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626296"},{"key":"e_1_3_2_2_35_1","volume-title":"Proc. ACM MobiSys","author":"Huynh Loc N","year":"2017","unstructured":"Loc N Huynh , Youngki Lee , and Rajesh Krishna Balan . Deepmon : Mobile gpu-based deep learning framework for continuous vision applications . In Proc. ACM MobiSys , 2017 . Loc N Huynh, Youngki Lee, and Rajesh Krishna Balan. Deepmon: Mobile gpu-based deep learning framework for continuous vision applications. In Proc. ACM MobiSys, 2017."},{"key":"e_1_3_2_2_36_1","volume-title":"Proc. ICML","author":"Jay Nathan","year":"2019","unstructured":"Nathan Jay , Noga Rotman , Brighten Godfrey , Michael Schapira , and Aviv Tamar . A deep reinforcement learning perspective on internet congestion control . In Proc. ICML , 2019 . Nathan Jay, Noga Rotman, Brighten Godfrey, Michael Schapira, and Aviv Tamar. A deep reinforcement learning perspective on internet congestion control. In Proc. ICML, 2019."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413189"},{"key":"e_1_3_2_2_38_1","volume-title":"Ultra-dense networks: A survey","author":"Kamel Mahmoud","year":"2016","unstructured":"Mahmoud Kamel , Walaa Hamouda , and Amr Youssef . Ultra-dense networks: A survey . IEEE Communications Surveys & Tutorials , 2016 . Mahmoud Kamel, Walaa Hamouda, and Amr Youssef. Ultra-dense networks: A survey. IEEE Communications Surveys & Tutorials, 2016."},{"key":"e_1_3_2_2_39_1","volume-title":"Proc. ACM NetAI","author":"Kazak Yafim","year":"2019","unstructured":"Yafim Kazak , Clark Barrett , Guy Katz , and Michael Schapira . Verifying deep-rldriven systems . In Proc. ACM NetAI , 2019 . Yafim Kazak, Clark Barrett, Guy Katz, and Michael Schapira. Verifying deep-rldriven systems. In Proc. ACM NetAI, 2019."},{"key":"e_1_3_2_2_40_1","volume-title":"Proc. ICLR","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Max Welling . Auto-encoding variational bayes . In Proc. ICLR , 2014 . Diederik P Kingma and Max Welling. Auto-encoding variational bayes. In Proc. ICLR, 2014."},{"key":"e_1_3_2_2_41_1","volume-title":"Learning to optimize join queries with deep reinforcement learning. arXiv:1808.03196","author":"Krishnan Sanjay","year":"2018","unstructured":"Sanjay Krishnan , Zongheng Yang , Ken Goldberg , Joseph Hellerstein , and Ion Stoica . Learning to optimize join queries with deep reinforcement learning. arXiv:1808.03196 , 2018 . Sanjay Krishnan, Zongheng Yang, Ken Goldberg, Joseph Hellerstein, and Ion Stoica. Learning to optimize join queries with deep reinforcement learning. arXiv:1808.03196, 2018."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80131-5"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342221"},{"key":"e_1_3_2_2_46_1","volume-title":"Proceedings of Berkeley symposium on mathematical statistics and probability","author":"James","year":"1967","unstructured":"James MacQueen et al. Some methods for classification and analysis of multivariate observations . In Proceedings of Berkeley symposium on mathematical statistics and probability , 1967 . James MacQueen et al. Some methods for classification and analysis of multivariate observations. In Proceedings of Berkeley symposium on mathematical statistics and probability, 1967."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220005"},{"key":"e_1_3_2_2_48_1","volume-title":"ICML Reinforcement Learning for Real Life Workshop","author":"Mao Hongzi","year":"2019","unstructured":"Hongzi Mao , Shannon Chen , Drew Dimmery , Shaun Singh , Drew Blaisdell , Yuandong Tian , Mohammad Alizadeh , and Eytan Bakshy . Real-world video adaptation with reinforcement learning . In ICML Reinforcement Learning for Real Life Workshop , 2019 . Hongzi Mao, Shannon Chen, Drew Dimmery, Shaun Singh, Drew Blaisdell, Yuandong Tian, Mohammad Alizadeh, and Eytan Bakshy. Real-world video adaptation with reinforcement learning. In ICML Reinforcement Learning for Real Life Workshop, 2019."},{"key":"e_1_3_2_2_49_1","volume-title":"Proc. NeurIPS","author":"Mao Hongzi","year":"2019","unstructured":"Hongzi Mao , Parimarjan Negi , Akshay Narayan , Hanrui Wang , Jiacheng Yang , Haonan Wang , Ryan Marcus , ravichandra addanki, Mehrdad Khani Shirkoohi , Songtao He , Vikram Nathan , Frank Cangialosi , Shaileshh Venkatakrishnan , Wei-Hung Weng , Song Han , Tim Kraska , and Mohammad Alizadeh . Park : An open platform for learning augmented computer systems . In Proc. NeurIPS , 2019 . Hongzi Mao, Parimarjan Negi, Akshay Narayan, Hanrui Wang, Jiacheng Yang, Haonan Wang, Ryan Marcus, ravichandra addanki, Mehrdad Khani Shirkoohi, Songtao He, Vikram Nathan, Frank Cangialosi, Shaileshh Venkatakrishnan, Wei-Hung Weng, Song Han, Tim Kraska, and Mohammad Alizadeh. Park: An open platform for learning augmented computer systems. In Proc. NeurIPS, 2019."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098843"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342080"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422641"},{"key":"e_1_3_2_2_53_1","volume-title":"Proc. ACM MM","author":"Meng Zili","year":"2019","unstructured":"Zili Meng , Jing Chen , Yaning Guo , Chen Sun , Hongxin Hu , and Mingwei Xu. Pitree : Practical implementation of abr algorithms using decision trees . In Proc. ACM MM , 2019 . Zili Meng, Jing Chen, Yaning Guo, Chen Sun, Hongxin Hu, and Mingwei Xu. Pitree: Practical implementation of abr algorithms using decision trees. In Proc. ACM MM, 2019."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1023\/a:1022604100933"},{"key":"e_1_3_2_2_55_1","volume-title":"NIPS Deep Learning Workshop","author":"Mnih Volodymyr","year":"2013","unstructured":"Volodymyr Mnih , Koray Kavukcuoglu , David Silver , Alex Graves , Ioannis Antonoglou , Daan Wierstra , and Martin Riedmiller . Playing atari with deep reinforcement learning . In NIPS Deep Learning Workshop , 2013 . Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Alex Graves, Ioannis Antonoglou, Daan Wierstra, and Martin Riedmiller. Playing atari with deep reinforcement learning. In NIPS Deep Learning Workshop, 2013."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_2_57_1","first-page":"42","volume-title":"A survey of intrusion detection techniques in cloud","author":"Modi Chirag","year":"2013","unstructured":"Chirag Modi , Dhiren Patel , Bhavesh Borisaniya , Hiren Patel , Avi Patel , and Muttukrishnan Rajarajan . A survey of intrusion detection techniques in cloud . Elsevier Journal of network and computer applications, pages 42 -- 57 , 2013 . Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Muttukrishnan Rajarajan. A survey of intrusion detection techniques in cloud. Elsevier Journal of network and computer applications, pages 42--57, 2013."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/189"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892851"},{"key":"e_1_3_2_2_60_1","volume-title":"Wihte paper: Nfp-4000 theory of operation. https:\/\/www.netronome.com\/media\/documents\/WP_NFP4000_TOO.pdf","year":"2016","unstructured":"Netronome. Wihte paper: Nfp-4000 theory of operation. https:\/\/www.netronome.com\/media\/documents\/WP_NFP4000_TOO.pdf , 2016 . Netronome. Wihte paper: Nfp-4000 theory of operation. https:\/\/www.netronome.com\/media\/documents\/WP_NFP4000_TOO.pdf, 2016."},{"key":"e_1_3_2_2_61_1","volume-title":"Proc. ICLR","author":"Novak Roman","year":"2018","unstructured":"Roman Novak , Yasaman Bahri , Daniel A Abolafia , Jeffrey Pennington , and Jascha Sohl-Dickstein . Sensitivity and generalization in neural networks: an empirical study . In Proc. ICLR , 2018 . Roman Novak, Yasaman Bahri, Daniel A Abolafia, Jeffrey Pennington, and Jascha Sohl-Dickstein. Sensitivity and generalization in neural networks: an empirical study. In Proc. ICLR, 2018."},{"key":"e_1_3_2_2_62_1","volume-title":"Journal of Machine Learning Research","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa , Ga\u00ebl Varoquaux , Alexandre Gramfort , Vincent Michel , Bertrand Thirion , Olivier Grisel , Mathieu Blondel , Peter Prettenhofer , Ron Weiss , Vincent Dubourg , Jake Vanderplas , Alexandre Passos , David Cournapeau , Matthieu Brucher , Matthieu Perrot , and \u00c9douard Duchesnay . Scikit-learn : Machine learning in Python . Journal of Machine Learning Research , 2011 . Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and \u00c9douard Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 2011."},{"key":"e_1_3_2_2_63_1","volume-title":"Proc. ACM KDD","author":"Ribeiro Marco Tulio","year":"2016","unstructured":"Marco Tulio Ribeiro , Sameer Singh , and Carlos Guestrin . Why should i trust you? : Explaining the predictions of any classifier . In Proc. ACM KDD , 2016 . Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. Why should i trust you?: Explaining the predictions of any classifier. In Proc. ACM KDD, 2016."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1079"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483977.2483991"},{"key":"e_1_3_2_2_66_1","volume-title":"Proc. AISTATS","author":"Ross St\u00e9phane","year":"2011","unstructured":"St\u00e9phane Ross , Geoffrey Gordon , and Drew Bagnell . A reduction of imitation learning and structured prediction to no-regret online learning . In Proc. AISTATS , 2011 . St\u00e9phane Ross, Geoffrey Gordon, and Drew Bagnell. A reduction of imitation learning and structured prediction to no-regret online learning. In Proc. AISTATS, 2011."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314357"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_2_2_69_1","volume-title":"Proc. SysML","author":"Smilkov Daniel","year":"2019","unstructured":"Daniel Smilkov , Nikhil Thorat , Yannick Assogba , Ann Yuan , Nick Kreeger , Ping Yu , Kangyi Zhang , Shanqing Cai , Eric Nielsen , David Soergel , Stan Bileschi , Michael Terry , Charles Nicholson , Sandeep N. Gupta , Sarah Sirajuddin , D. Sculley , Rajat Monga , Greg Corrado , Fernanda B. Vi\u00e9gas , and Martin Wattenberg . Tensorflow. js : Machine learning for the web and beyond . In Proc. SysML , 2019 . Daniel Smilkov, Nikhil Thorat, Yannick Assogba, Ann Yuan, Nick Kreeger, Ping Yu, Kangyi Zhang, Shanqing Cai, Eric Nielsen, David Soergel, Stan Bileschi, Michael Terry, Charles Nicholson, Sandeep N. Gupta, Sarah Sirajuddin, D. Sculley, Rajat Monga, Greg Corrado, Fernanda B. Vi\u00e9gas, and Martin Wattenberg. Tensorflow. js: Machine learning for the web and beyond. In Proc. SysML, 2019."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204949.3204953"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524428"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/3312046"},{"key":"e_1_3_2_2_73_1","volume-title":"Proc. NeurIPS","author":"Toneva Mariya","year":"2019","unstructured":"Mariya Toneva and Leila Wehbe . Interpreting and improving natural-language processing (in machines) with natural language-processing (in the brain) . In Proc. NeurIPS , 2019 . Mariya Toneva and Leila Wehbe. Interpreting and improving natural-language processing (in machines) with natural language-processing (in the brain). In Proc. NeurIPS, 2019."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21706-2_9"},{"key":"e_1_3_2_2_75_1","volume-title":"Proc. ICML","author":"Verma Abhinav","year":"2018","unstructured":"Abhinav Verma , Vijayaraghavan Murali , Rishabh Singh , Pushmeet Kohli , and Swarat Chaudhuri . Programmatically interpretable reinforcement learning . In Proc. ICML , 2018 . Abhinav Verma, Vijayaraghavan Murali, Rishabh Singh, Pushmeet Kohli, and Swarat Chaudhuri. Programmatically interpretable reinforcement learning. In Proc. ICML, 2018."},{"key":"e_1_3_2_2_76_1","volume-title":"Facebook says video is huge - 100-million-hours-per-day huge. https:\/\/www.vox.com\/2016\/1\/27\/11589140\/","author":"Wagner Kurt","year":"2016","unstructured":"Kurt Wagner . Facebook says video is huge - 100-million-hours-per-day huge. https:\/\/www.vox.com\/2016\/1\/27\/11589140\/ , 2016 . Kurt Wagner. Facebook says video is huge - 100-million-hours-per-day huge. https:\/\/www.vox.com\/2016\/1\/27\/11589140\/, 2016."},{"key":"e_1_3_2_2_77_1","volume-title":"Proc. AAAI","author":"Wu Mike","year":"2018","unstructured":"Mike Wu , Michael C Hughes , Sonali Parbhoo , Maurizio Zazzi , Volker Roth , and Finale Doshi-Velez . Beyond sparsity : Tree regularization of deep models for interpretability . In Proc. AAAI , 2018 . Mike Wu, Michael C Hughes, Sonali Parbhoo, Maurizio Zazzi, Volker Roth, and Finale Doshi-Velez. Beyond sparsity: Tree regularization of deep models for interpretability. In Proc. AAAI, 2018."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329056"},{"key":"e_1_3_2_2_79_1","volume-title":"Proc. NeurIPS","author":"Yadati Naganand","year":"2019","unstructured":"Naganand Yadati , Madhav Nimishakavi , Prateek Yadav , Vikram Nitin , Anand Louis , and Partha Talukdar . Hypergcn : A new method for training graph convolutional networks on hypergraphs . In Proc. NeurIPS , 2019 . Naganand Yadati, Madhav Nimishakavi, Prateek Yadav, Vikram Nitin, Anand Louis, and Partha Talukdar. Hypergcn: A new method for training graph convolutional networks on hypergraphs. In Proc. NeurIPS, 2019."},{"key":"e_1_3_2_2_80_1","volume-title":"Proc. USENIX OSDI","author":"Yeo Hyunho","year":"2018","unstructured":"Hyunho Yeo , Youngmok Jung , Jaehong Kim , Jinwoo Shin , and Dongsu Han . Neural adaptive content-aware internet video delivery . In Proc. USENIX OSDI , 2018 . Hyunho Yeo, Youngmok Jung, Jaehong Kim, Jinwoo Shin, and Dongsu Han. Neural adaptive content-aware internet video delivery. In Proc. USENIX OSDI, 2018."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787486"},{"key":"e_1_3_2_2_83_1","volume-title":"Proc. NeurIPS","author":"Ying Zhitao","year":"2019","unstructured":"Zhitao Ying , Dylan Bourgeois , Jiaxuan You , Marinka Zitnik , and Jure Leskovec . Gnn explainer : A tool for post-hoc explanation of graph neural networks . In Proc. NeurIPS , 2019 . Zhitao Ying, Dylan Bourgeois, Jiaxuan You, Marinka Zitnik, and Jure Leskovec. Gnn explainer: A tool for post-hoc explanation of graph neural networks. In Proc. NeurIPS, 2019."},{"key":"e_1_3_2_2_84_1","volume-title":"Proc. ICLR","author":"Yu Haonan","year":"2020","unstructured":"Haonan Yu , Sergey Edunov , Yuandong Tian , and Ari S Morcos . Playing the lottery with rewards and multiple languages: lottery tickets in rl and nlp . In Proc. ICLR , 2020 . Haonan Yu, Sergey Edunov, Yuandong Tian, and Ari S Morcos. Playing the lottery with rewards and multiple languages: lottery tickets in rl and nlp. In Proc. ICLR, 2020."},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"e_1_3_2_2_86_1","volume-title":"Proc. IEEE INFOCOM","author":"Zhang Chun","year":"2005","unstructured":"Chun Zhang , Yong Liu , Weibo Gong , Jim Kurose , Robert Moll , and Don Towsley . On optimal routing with multiple traffic matrices . In Proc. IEEE INFOCOM , 2005 . Chun Zhang, Yong Liu, Weibo Gong, Jim Kurose, Robert Moll, and Don Towsley. On optimal routing with multiple traffic matrices. In Proc. IEEE INFOCOM, 2005."},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700400"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888133"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00920"},{"key":"e_1_3_2_2_90_1","volume-title":"Proc. ICLR","author":"Zhang Ruochi","year":"2020","unstructured":"Ruochi Zhang , Yuesong Zou , and Jian Ma. Hyper-sagnn : a self-attention based graph neural network for hypergraphs . In Proc. ICLR , 2020 . Ruochi Zhang, Yuesong Zou, and Jian Ma. Hyper-sagnn: a self-attention based graph neural network for hypergraphs. In Proc. ICLR, 2020."},{"key":"e_1_3_2_2_91_1","volume-title":"Proc. USENIX Security","author":"Zhang Xinyang","year":"2020","unstructured":"Xinyang Zhang , Ningfei Wang , Shouling Ji , Hua Shen , and Ting Wang . Interpretable deep learning under fire . In Proc. USENIX Security , 2020 . Xinyang Zhang, Ningfei Wang, Shouling Ji, Hua Shen, and Ting Wang. Interpretable deep learning under fire. In Proc. USENIX Security, 2020."},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3232565.3232569"},{"key":"e_1_3_2_2_93_1","volume-title":"Proc. NIPS","author":"Zhou Dengyong","year":"2007","unstructured":"Dengyong Zhou , Jiayuan Huang , and Bernhard Sch\u00f6lkopf . Learning with hyper-graphs: Clustering, classification, and embedding . In Proc. NIPS , 2007 . Dengyong Zhou, Jiayuan Huang, and Bernhard Sch\u00f6lkopf. Learning with hyper-graphs: Clustering, classification, and embedding. In Proc. NIPS, 2007."},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314638"}],"event":{"name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","location":"Virtual Event USA","acronym":"SIGCOMM '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:18Z","timestamp":1750206378000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":94,"alternative-id":["10.1145\/3387514.3405859","10.1145\/3387514"],"URL":"https:\/\/doi.org\/10.1145\/3387514.3405859","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"2020-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}