{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:40:45Z","timestamp":1773974445370,"version":"3.50.1"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T00:00:00Z","timestamp":1668384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2018YFE0206800"],"award-info":[{"award-number":["2018YFE0206800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61936001, 61971084, 62001073, 62025105, and 62171378"],"award-info":[{"award-number":["61936001, 61971084, 62001073, 62025105, and 62171378"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of Chongqing","doi-asserted-by":"crossref","award":["cstc2019jcyj-cxttX0002, cstc2021ycjh-bgzxm0013, cstc2021ycjh-bgzxm0039 and cstc2021jcyj-msxmX0031"],"award-info":[{"award-number":["cstc2019jcyj-cxttX0002, cstc2021ycjh-bgzxm0013, cstc2021ycjh-bgzxm0039 and cstc2021jcyj-msxmX0031"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Support Program for Overseas Students to Return to China for Entrepreneurship and Innovation","award":["cx2021003 and cx2021053"],"award-info":[{"award-number":["cx2021003 and cx2021053"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>Internet of Vehicles (IoV), as a special application of Internet of Things (IoT), has been widely used for Intelligent Transportation System (ITS), which leads to complex and heterogeneous IoV backbone networks. Network traffic prediction techniques are crucial for efficient and secure network management, such as routing algorithm, network planning, and anomaly and intrusion detection. This article studies the problem of end-to-end network traffic prediction in IoV backbone networks, and proposes a deep learning-based method. The constructed system considers the spatio-temporal feature of network traffic, and can capture the long-range dependence of network traffic. Furthermore, a threshold-based update mechanism is put forward to improve the real-time performance of the designed method by using Q-learning. The effectiveness of the proposed method is evaluated by a real network traffic dataset.<\/jats:p>\n          <jats:p\/>\n          <jats:p\/>","DOI":"10.1145\/3433548","type":"journal-article","created":{"date-parts":[[2022,2,3]],"date-time":"2022-02-03T19:05:56Z","timestamp":1643915156000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles"],"prefix":"10.1145","volume":"22","author":[{"given":"Xiaojie","family":"Wang","sequence":"first","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Laisen","family":"Nie","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University, Xi\u2019an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7870-5524","authenticated-orcid":false,"given":"Zhaolong","family":"Ning","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Lei","family":"Guo","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Guoyin","family":"Wang","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Xinbo","family":"Gao","sequence":"additional","affiliation":[{"name":"Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Thapar Institute of Engineering and Technology Patiala, India"}]}],"member":"320","published-online":{"date-parts":[[2022,11,14]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501843"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3406280"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2008.929453"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690902"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3382756"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2019.02.056"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2481383"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2953201"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894816"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2789217"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952413"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2954350"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3396850"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2016.2612821"},{"key":"e_1_3_1_16_2","first-page":"1","article-title":"Data-driven intrusion detection for intelligent Internet of Vehicles: A deep convolutional neural network-based method","author":"Nie L.","year":"2020","unstructured":"L. Nie, Z. Ning, X. Wang, X. Hu, Y. Li, and J. Cheng. 2020. Data-driven intrusion detection for intelligent Internet of Vehicles: A deep convolutional neural network-based method. IEEE Transactions on Network Science and Engineering (2020), 1\u20131.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"e_1_3_1_17_2","first-page":"1","article-title":"Intelligent edge computing in Internet of Vehicles: A joint computation offloading and caching solution","author":"Ning Z.","year":"2020","unstructured":"Z. Ning, K. Zhang, X. Wang, L. Guo, X. Hu, J. Huang, B. Hu, and R. Y. K. Kwok. 2020. Intelligent edge computing in Internet of Vehicles: A joint computation offloading and caching solution. IEEE Transactions on Intelligent Transportation Systems (2020), 1\u201314.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_1_18_2","first-page":"1","article-title":"Joint computing and caching in 5G-Envisioned internet of vehicles: A deep reinforcement learning-based traffic control system","author":"Ning Z.","year":"2020","unstructured":"Z. Ning, K. Zhang, X. Wang, M. S. Obaidat, L. Guo, X. Hu, B. Hu, Y. Guo, B. Sadoun, and R. Y. K. Kwok. 2020. Joint computing and caching in 5G-Envisioned internet of vehicles: A deep reinforcement learning-based traffic control system. IEEE Transactions on Intelligent Transportation Systems (2020), 1\u201312.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_1_19_2","first-page":"1","volume-title":"2011 IEEE 7th International Symposium on Intelligent Signal Processing","author":"Omidvar A.","year":"2011","unstructured":"A. Omidvar and H. S. Shahhoseini. 2011. Intelligent IP traffic matrix estimation by neural network and genetic algorithm. In 2011 IEEE 7th International Symposium on Intelligent Signal Processing. IEEE, 1\u20136."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3301443"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2795605"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2169424"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.10.000D12"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.852877"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064259"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3001195"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2878253"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057090"},{"key":"e_1_3_1_29_2","first-page":"1","article-title":"Imitation learning enabled task scheduling for online vehicular edge computing","author":"Wang X.","year":"2020","unstructured":"X. Wang, Z. Ning, S. Guo, and L. Wang. 2020. Imitation learning enabled task scheduling for online vehicular edge computing. IEEE Transactions on Mobile Computing (2020), 1\u20131.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2880238"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952917"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2899125"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2841832"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2907993"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2016.0208"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433548","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:10Z","timestamp":1750195690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,14]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3433548"],"URL":"https:\/\/doi.org\/10.1145\/3433548","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,14]]},"assertion":[{"value":"2020-09-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}