{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T06:22:06Z","timestamp":1770531726642,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3672198.3673803","type":"proceedings-article","created":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T12:24:10Z","timestamp":1721132650000},"page":"69-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Multi-task Aware Resource Efficient Traffic Classification via in-Network Inference"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9226-7639","authenticated-orcid":false,"given":"Seongyeon","family":"Yoon","sequence":"first","affiliation":[{"name":"School of Electrical Engineering, Korea University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0377-2044","authenticated-orcid":false,"given":"Heewon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Korea University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6320-7063","authenticated-orcid":false,"given":"Hyeonjae","family":"Jeong","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Korea University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1766-5699","authenticated-orcid":false,"given":"Chanbin","family":"Bae","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Korea University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2836-3160","authenticated-orcid":false,"given":"Haeun","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Korea University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1085-1568","authenticated-orcid":false,"given":"Sangheon","family":"Pack","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Korea University"}]}],"member":"320","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3094514"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109537"},{"key":"e_1_3_2_1_3_1","volume-title":"September","author":"Busse-Grawitz Coralie","year":"2019","unstructured":"Coralie Busse-Grawitz, Roland Meier, Alexander Dietm\u00fcller, Tobias B\u00fchler, and Laurent Vanbever, \"pForest: In-Network Inference with Random Forests,\" arXiv, September 2019."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. IEEE ICCCN 2021","author":"Kamath Radhakrishna","year":"2021","unstructured":"Radhakrishna Kamath and Krishna M Sivalingam, \"Machine Learning based Flow Classification in DCNs using P4 Switches,\" in Proc. IEEE ICCCN 2021, July 2021."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3198266"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3321299"},{"key":"e_1_3_2_1_7_1","volume-title":"NativeNI 2022","author":"Tanyi-Jong Akem Aristide","year":"2022","unstructured":"Aristide Tanyi-Jong Akem, Beyza B\u00fct\u00fcn, Michele Gucciardo, and Marco Fiore, \"Henna: Hierarchical Machine Learning Inference in Programmable Switches,\" in Proc. NativeNI 2022, December 2022."},{"key":"e_1_3_2_1_8_1","volume-title":"ACM ASPLOS 2022","author":"Swamy Tushar","year":"2022","unstructured":"Tushar Swamy, Alexander Rucker, Muhammad Shahbaz, Ishan Gaur, and Kunle Olukotun, \"Taurus: A Data Plane Architecture for Per-Packet ML,\" in Proc. ACM ASPLOS 2022, February 2022."},{"key":"e_1_3_2_1_9_1","volume-title":"IFIP Networking 2020","author":"Qin Qiaofeng","year":"2020","unstructured":"Qiaofeng Qin, Konstantinos Poularakis, Kin K. Leung, and Leandros Tassiulas, \"Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning,\" in Proc. IFIP Networking 2020, June 2020."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. ACM Workshop on HotNets 2019","author":"Xiong Zhaoqi","year":"2019","unstructured":"Zhaoqi Xiong and Noa Zilberman, \"Do Switches Dream of Machine Learning? Toward In-Network Classification,\" in Proc. ACM Workshop on HotNets 2019, November 2019."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE INFOCOM 2021","author":"Xavier Bruno Missi","year":"2021","unstructured":"Bruno Missi Xavier, Rafael Silva Guimar\u00e3es, Giovanni Comarela, and Magnos Martinello, \"Programmable Switches for in-Networking Classification,\" in Proc. IEEE INFOCOM 2021, May 2021."},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE ICC 2020","author":"Musumeci Francesco","year":"2020","unstructured":"Francesco Musumeci, Valentina Ionata, Francesco Paolucci, Filippo Cugini, and Massimo Tornatore, \"Machine-learning-assisted DDoS attack detection with P4 language,\" in Proc. IEEE ICC 2020, June 2020."},{"key":"e_1_3_2_1_14_1","volume-title":"Using Random Forests to Detect DDoS Attacks in Programmable Data Planes,\" in Proc. EuroP4","author":"Coelho Bruno","year":"2022","unstructured":"Bruno Coelho and Alberto Schaeffer-Filho, \"BACKORDERS: Using Random Forests to Detect DDoS Attacks in Programmable Data Planes,\" in Proc. EuroP4 2022, December 2022."},{"key":"e_1_3_2_1_15_1","article-title":"IIsy: Hybrid In-Network Classification Using Programmable Switches","author":"Zheng Changgang","unstructured":"Changgang Zheng, Zhaoqi Xiong, Thanh T. Bui, Siim Kaupmees, Riyad Bensoussane, Antoine Bernabeu, Shay Vargaftik, Yaniv Ben-Itzhak, and Noa Zilberman, \"IIsy: Hybrid In-Network Classification Using Programmable Switches,\" IEEE\/ACM Transactions on Networking, Early Access.","journal-title":"IEEE\/ACM Transactions on Networking, Early Access."},{"key":"e_1_3_2_1_16_1","volume-title":"ACM SIGCOMM Poster 2021","author":"Zheng Changgang","year":"2021","unstructured":"Changgang Zheng and Noa Zilberman, \"Planter: Seeding Trees Within Switches,\" in Proc. ACM SIGCOMM Poster 2021, August 2021."},{"key":"e_1_3_2_1_17_1","unstructured":"Changgang Zheng Mingyuan Zang Xinpeng Hong Riyad Bensoussane Shay Vargaftik Yaniv Ben-Itzhak and Noa Zilberman \"Automating In-Network Machine Learning \" arXiv May 2022."},{"key":"e_1_3_2_1_18_1","volume-title":"IEEE INFOCOM 2022","author":"Xie Guorui","year":"2022","unstructured":"Guorui Xie, Qing Li, Yutao Dong, Guanglin Duan, Yong Jiang, and Jingpu Duan, \"Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation,\" in Proc. IEEE INFOCOM 2022, May 2022."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3287091"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3198266"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Yoshua Bengio Nicholas L\u00e9onard and Aaron Courville \"Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation \" arXiv August 2013. https:\/\/doi.org\/10.1109\/TVT.2022.3198266","DOI":"10.1109\/TVT.2022.3198266"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_44"},{"key":"e_1_3_2_1_23_1","volume-title":"May 6","year":"2024","unstructured":"BMv2, Accessed: May 6, 2024. [Online]. Available: https:\/\/github.com\/p4lang\/behavioral-model."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_25_1","unstructured":"Mininet Accessed: May 6 2024. [Online]. Available: https:\/\/github.com\/mininet\/mininet."},{"key":"e_1_3_2_1_26_1","unstructured":"PyTorch Accessed: May 6 2024. [Online]. Available: https:\/\/github.com\/pytorch\/pytorch."},{"key":"e_1_3_2_1_27_1","volume-title":"May 22","year":"2024","unstructured":"ps-mem, Accessed: May 22, 2024. [Online]. Available: https:\/\/pypi.org\/project\/ps-mem\/."},{"key":"e_1_3_2_1_28_1","volume-title":"ICISSP 2016","author":"Draper-Gil Gerard","year":"2016","unstructured":"Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, and Ali A. Ghorbani, \"Characterization of Encrypted and VPN Traffic Using Time-related Features,\" in Proc. ICISSP 2016, February 2016."}],"event":{"name":"ACM SIGCOMM '24: ACM SIGCOMM 2024 Conference","location":"Sydney NSW Australia","acronym":"ACM SIGCOMM '24","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2024 SIGCOMM Workshop on Networks for AI Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672198.3673803","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672198.3673803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:15:25Z","timestamp":1755972925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672198.3673803"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":28,"alternative-id":["10.1145\/3672198.3673803","10.1145\/3672198"],"URL":"https:\/\/doi.org\/10.1145\/3672198.3673803","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}