{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T19:10:02Z","timestamp":1755976202456,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korea government (MSIT)","award":["No. 2020R1A2C3006786","IITP 2022-0-00531 Development of In-Network Computing Technique"],"award-info":[{"award-number":["No. 2020R1A2C3006786","IITP 2022-0-00531 Development of In-Network Computing Technique"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,8]]},"DOI":"10.1145\/3630047.3630189","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T14:34:28Z","timestamp":1701873268000},"page":"61-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Poster: Adaptive In-Network Inference using Early-Exits"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0377-2044","authenticated-orcid":false,"given":"Heewon","family":"Kim","sequence":"first","affiliation":[{"name":"Korea University, Seongbuk-gu, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9226-7639","authenticated-orcid":false,"given":"Seongyeon","family":"Yoon","sequence":"additional","affiliation":[{"name":"Korea University, Seongbuk-gu, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1085-1568","authenticated-orcid":false,"given":"Sangheon","family":"Pack","sequence":"additional","affiliation":[{"name":"Korea University, Seongbuk-gu, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565009.3569520"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE international conference on embedded and ubiquitous computing (EUC)","author":"Chang Yaping","year":"2017","unstructured":"Yaping Chang, Wei Li, and Zhongming Yang, ''Network intrusion detection based on random forest and support vector machine,'' in Proc. IEEE international conference on embedded and ubiquitous computing (EUC), Guangzhou, China, July 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"International Workshop on P4 in Europe (EuroP4)","author":"Coelho Bruno","year":"2022","unstructured":"Bruno Coelho and Alberto Schaeffer-Filho, ''BACKORDERS: using random forests to detect DDoS attacks in programmable data planes,'' in Proc. International Workshop on P4 in Europe (EuroP4), Rome, Italy, December 2022."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3198266"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469116.3470012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109537"},{"key":"e_1_3_2_1_8_1","volume-title":"IFIP Networking Conference, Virtual conference","author":"Qin Qiaofeng","year":"2020","unstructured":"Qiaofeng Qin, Konstantinos Poularakis, Kin K. Leung, and Leandros Tassiulas, ''Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning,'' in Proc. IFIP Networking Conference, Virtual conference, June 2020."},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE International Conference on Machine Learning and Applications (ICMLA)","author":"Ramakrishnan Nipun","year":"2018","unstructured":"Nipun Ramakrishnan and Soni Tarun, ''Network traffic prediction using recurrent neural networks,'' in Proc. IEEE International Conference on Machine Learning and Applications (ICMLA), Orlando, USA, December 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565475.3569079"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507726"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900006"},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE Conference on Computer Communications (INFOCOM), Virtual conference","author":"Xie Guorui","year":"2022","unstructured":"Guorui Xie, Qing Li, Yutao Dong, Guanglin Duan, Yong Jiang, and Jingpu Duan, ''Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation,'' in Proc. IEEE Conference on Computer Communications (INFOCOM), Virtual conference, May 2022."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473938.3474508"},{"key":"e_1_3_2_1_15_1","volume-title":"Virtual conference","author":"Zhou Wangchunshu","year":"2020","unstructured":"Wangchunshu Zhou, Canwen Xu, Tao Ge, Julian McAuley, Ke Xu, and Furu Wei, ''BERT Loses Patience: Fast and Robust Inference with Early Exit,'' in Proc. Neural Information Processing Systems (NeurIPS), Virtual conference, December 2020."},{"key":"e_1_3_2_1_16_1","unstructured":"AMD Advanced Micro Devices ''Software Optimization Guide for AMD Athlon\u2122 64 and Opteron\u2122 Processors '' [Online] Available: http:\/\/www.amd.com\/usen\/assets\/contenttype\/whitepapersandtechdocs\/25112.pdf."},{"key":"e_1_3_2_1_17_1","unstructured":"Mininet Accessed: August 27 2023. [Online]. Available: https:\/\/github.com\/mininet\/mininet."},{"volume-title":"August 27","year":"2023","key":"e_1_3_2_1_18_1","unstructured":"BMv2, Accessed: August 27, 2023. [Online]. Available: https:\/\/github.com\/p4lang\/behavioral-model."},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE Conference on Communications and Network Security, CA, USA","author":"Beigi Elaheh Biglar","year":"2014","unstructured":"Elaheh Biglar Beigi, Hossein Hadian Jazi, Natalia Stakhanova, and Ali A. Ghorbani, ''Towards effective feature selection in machine learning-based botnet detection approaches,'' in Proc. IEEE Conference on Communications and Network Security, CA, USA, October 2014."},{"key":"e_1_3_2_1_20_1","volume-title":"IFIP Networking Conference (IFIP Networking), Espoo and Helsinki","author":"Harkous Hasanin","year":"2021","unstructured":"Hasanin Harkous, Mu He, Michael Jarschel, Rastin Pries, Ehab Mansour, and Wolfgang Kellerer, ''Performance Study of P4 Programmable Devices: Flow Scalability and Rule Update Responsiveness,'' in Proc. IFIP Networking Conference (IFIP Networking), Espoo and Helsinki, Finland, June 2021."}],"event":{"name":"CoNEXT 2023: The 19th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Paris France","acronym":"CoNEXT 2023"},"container-title":["Proceedings of the 6th on European P4 Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630047.3630189","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3630047.3630189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:35:56Z","timestamp":1755974156000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630047.3630189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":20,"alternative-id":["10.1145\/3630047.3630189","10.1145\/3630047"],"URL":"https:\/\/doi.org\/10.1145\/3630047.3630189","relation":{},"subject":[],"published":{"date-parts":[[2023,12,6]]},"assertion":[{"value":"2023-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}