{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:49:31Z","timestamp":1760028571166,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"United States - Israel Binational Science Foundation","award":["2023663"],"award-info":[{"award-number":["2023663"]}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1901523"],"award-info":[{"award-number":["CNS-1901523"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["3481\/24"],"award-info":[{"award-number":["3481\/24"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,18]]},"DOI":"10.1145\/3696348.3696875","type":"proceedings-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:20:52Z","timestamp":1731284452000},"page":"86-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["End-to-End Performance Analysis of Learning-enabled Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7704-5440","authenticated-orcid":false,"given":"Pooria","family":"Namyar","sequence":"first","affiliation":[{"name":"University of Southern California"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9336-8351","authenticated-orcid":false,"given":"Michael","family":"Schapira","sequence":"additional","affiliation":[{"name":"Hebrew University of Jerusalem"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8311-8853","authenticated-orcid":false,"given":"Ramesh","family":"Govindan","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8408-9633","authenticated-orcid":false,"given":"Santiago","family":"Segarra","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7844-2026","authenticated-orcid":false,"given":"Ryan","family":"Beckett","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2694-4685","authenticated-orcid":false,"given":"Siva Kesava Reddy","family":"Kakarla","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2234-3250","authenticated-orcid":false,"given":"Behnaz","family":"Arzani","sequence":"additional","affiliation":[{"name":"Microsoft"}]}],"member":"320","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Abuzaid Firas","year":"2021","unstructured":"Firas Abuzaid, Srikanth Kandula, Behnaz Arzani, Ishai Menache, Matei Zaharia, and Peter Bailis. 2021. Contracting Wide-area Network Topologies to Solve Flow Problems Quickly. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). USENIX Association, 175--200. https:\/\/www.usenix.org\/conference\/nsdi21\/presentation\/abuzaid"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3691825.3691878"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672237"},{"key":"e_1_3_2_1_4_1","volume-title":"Formal Methods for Network Performance Analysis. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Arashloo Mina Tahmasbi","year":"2023","unstructured":"Mina Tahmasbi Arashloo, Ryan Beckett, and Rachit Agarwal. 2023. Formal Methods for Network Performance Analysis. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). USENIX Association, Boston, MA, 645--661. https:\/\/www.usenix.org\/conference\/nsdi23\/presentation\/tahmasbi"},{"volume-title":"Proceedings of the 2021 ACM SIGCOMM 2021 Conference (SIGCOMM '21)","author":"Arun Venkat","key":"e_1_3_2_1_5_1","unstructured":"Venkat Arun, Mina Tahmasbi Arashloo, Ahmed Saeed, Mohammad Alizadeh, and Hari Balakrishnan. [n. d.]. Toward formally verifying congestion control behavior. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference (SIGCOMM '21)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/780542.780599"},{"volume-title":"Convex optimization","author":"Boyd Stephen","key":"e_1_3_2_1_7_1","unstructured":"Stephen Boyd and Lieven Vandenberghe. 2004. Convex optimization. Cambridge university press."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 4th International Conference on Genetic Algorithms, Richard K. Belew and Lashon B. Booker (Eds.).","author":"Davis Lawrence","year":"1991","unstructured":"Lawrence Davis. 1991. Bit-Climbing, Representational Bias, and Test Suite Design. In Proceedings of the 4th International Conference on Genetic Algorithms, Richard K. Belew and Lashon B. Booker (Eds.)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472936"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10601-018-9285-6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365862"},{"key":"e_1_3_2_1_13_1","unstructured":"Saksham Goel Benjamin Mikek Jehad Aly Venkat Arun Ahmed Saeed and Aditya Akella. 2023. A Performance Verification Methodology for Resource Allocation Heuristics. https:\/\/api.semanticscholar.org\/CorpusID:255595504"},{"volume-title":"Deep learning","author":"Goodfellow Ian","key":"e_1_3_2_1_14_1","unstructured":"Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT press."},{"key":"e_1_3_2_1_15_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_1_16_1","unstructured":"Gurobi Optimization LLC. 2023. Gurobi Optimizer Reference Manual. https:\/\/www.gurobi.com"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486012"},{"key":"e_1_3_2_1_18_1","volume-title":"Adversarial attacks on neural network policies. arXiv preprint arXiv:1702.02284","author":"Huang Sandy","year":"2017","unstructured":"Sandy Huang, Nicolas Papernot, Ian Goodfellow, Yan Duan, and Pieter Abbeel. 2017. Adversarial attacks on neural network policies. arXiv preprint arXiv:1702.02284 (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"e_1_3_2_1_20_1","volume-title":"Ryan Beckett, Santiago Segarra, Beibin Li, Pooria Namyar, and Behnaz Arzani.","author":"Karimi Pantea","year":"2024","unstructured":"Pantea Karimi, Solal Pirelli, Siva Kesava Reddy Kakarla, Ryan Beckett, Santiago Segarra, Beibin Li, Pooria Namyar, and Behnaz Arzani. 2024. Towards Safer Heuristics With XPlain. arXiv preprint arXiv:2410.15086. https:\/\/arxiv.org\/abs\/2410.15086"},{"key":"e_1_3_2_1_21_1","volume-title":"Kochenderfer","author":"Katz Guy","year":"2021","unstructured":"Guy Katz, Clark Barrett, David L. Dill, Kyle Julian, and Mykel J. Kochenderfer. 2021. Reluplex: a Calculus for Reasoning about Deep Neural Networks. Formal Methods in System Design (2021)."},{"volume-title":"The Marabou Framework for Verification and Analysis of Deep Neural Networks. In International Conference on Computer Aided Verification.","author":"Katz Guy","key":"e_1_3_2_1_22_1","unstructured":"Guy Katz, Derek A. Huang, Duligur Ibeling, Kyle D. Julian, Christopher Lazarus, Rachel Lim, Parth Shah, Shantanu Thakoor, Haoze Wu, Aleksandar Zelji\u0107, David L. Dill, Mykel J. Kochenderfer, and Clark W. Barrett. 2019. The Marabou Framework for Verification and Analysis of Deep Neural Networks. In International Conference on Computer Aided Verification."},{"key":"e_1_3_2_1_23_1","volume-title":"Vecchi","author":"Kirkpatrick Scott","year":"1983","unstructured":"Scott Kirkpatrick, D. Gelatt Jr., and Mario P. Vecchi. 1983. Optimization by Simulated Annealing. Science (1983)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCC.2019.8843680"},{"volume-title":"Artificial intelligence safety and security","author":"Kurakin Alexey","key":"e_1_3_2_1_25_1","unstructured":"Alexey Kurakin, Ian J Goodfellow, and Samy Bengio. 2018. Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall\/CRC, 99--112."},{"key":"e_1_3_2_1_26_1","volume-title":"FIGRET: Fine-Grained Robustness-Enhanced Traffic Engineering. ACM SIGCOMM","author":"Liu Ximeng","year":"2024","unstructured":"Ximeng Liu, Shizhen Zhao, and Yong Cui. 2024. FIGRET: Fine-Grained Robustness-Enhanced Traffic Engineering. ACM SIGCOMM (2024)."},{"key":"e_1_3_2_1_27_1","unstructured":"Alessio Lomuscio and Lalit Maganti. 2017. An approach to reachability analysis for feed-forward ReLU neural networks. (2017). http:\/\/arxiv.org\/abs\/1706.07351"},{"key":"e_1_3_2_1_28_1","volume-title":"Towards more practical adversarial attacks on graph neural networks. Advances in neural information processing systems 33","author":"Ma Jiaqi","year":"2020","unstructured":"Jiaqi Ma, Shuangrui Ding, and Qiaozhu Mei. 2020. Towards more practical adversarial attacks on graph neural networks. Advances in neural information processing systems 33 (2020), 4756--4766."},{"key":"e_1_3_2_1_29_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_1_30_1","volume-title":"Dynamic Graph Neural Network for Traffic Forecasting in Wide Area Networks. 2020 IEEE International Conference on Big Data (Big Data)","author":"Mallick Tanwi","year":"2020","unstructured":"Tanwi Mallick, Mariam Kiran, Bashir Mohammed, and Prasanna Balaprakash. 2020. Dynamic Graph Neural Network for Traffic Forecasting in Wide Area Networks. 2020 IEEE International Conference on Big Data (Big Data) (2020), 1--10."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365850"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564102"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/3691825.3691877"},{"key":"e_1_3_2_1_34_1","volume-title":"Solving Max-Min Fair Resource Allocations Quickly on Large Graphs. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Namyar Pooria","year":"2024","unstructured":"Pooria Namyar, Behnaz Arzani, Srikanth Kandula, Santiago Segarra, Daniel Crankshaw, Umesh Krishnaswamy, Ramesh Govindan, and Himanshu Raj. 2024. Solving Max-Min Fair Resource Allocations Quickly on Large Graphs. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). USENIX Association, Santa Clara, CA, 1937--1958. https:\/\/www.usenix.org\/conference\/nsdi24\/presentation\/namyar-solving"},{"key":"e_1_3_2_1_35_1","volume-title":"Solving a class of non-convex min-max games using iterative first order methods. Advances in Neural Information Processing Systems 32","author":"Nouiehed Maher","year":"2019","unstructured":"Maher Nouiehed, Maziar Sanjabi, Tianjian Huang, Jason D Lee, and Meisam Razaviyayn. 2019. Solving a class of non-convex min-max games using iterative first order methods. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_36_1","volume-title":"DOTE: Rethinking (Predictive) WAN Traffic Engineering. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Perry Yarin","year":"2023","unstructured":"Yarin Perry, Felipe Vieira Frujeri, Chaim Hoch, Srikanth Kandula, Ishai Menache, Michael Schapira, and Aviv Tamar. 2023. DOTE: Rethinking (Predictive) WAN Traffic Engineering. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). USENIX Association, Boston, MA, 1557--1581. https:\/\/www.usenix.org\/conference\/nsdi23\/presentation\/perry"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3327546.3327746"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207581"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmp.2018.03.001"},{"key":"e_1_3_2_1_40_1","unstructured":"Stanford University IT. 2015. Abilene Core Topology. https:\/\/uit.stanford.edu\/service\/network\/internet2\/abilene"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of Machine Learning and Systems.","author":"Tan Cheng","year":"2023","unstructured":"Cheng Tan, Changliu Liu, Zhihao Jia, and Tianhao Wei. 2023. Building Verified Neural Networks for Computer Systems with Ouroboros. In Proceedings of Machine Learning and Systems."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476886.3477508"},{"volume-title":"Evaluating Robustness of Neural Networks with Mixed Integer Programming. ICLR 2019 ([n.d.]).","author":"Tjeng Vincent","key":"e_1_3_2_1_43_1","unstructured":"Vincent Tjeng, Kai Xiao, and Russ Tedrake. [n. d.]. Evaluating Robustness of Neural Networks with Mixed Integer Programming. ICLR 2019 ([n.d.])."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152434.3152441"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544243"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604857"},{"key":"e_1_3_2_1_47_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Yan Francis Y.","year":"2020","unstructured":"Francis Y. Yan, Hudson Ayers, Chenzhi Zhu, Sadjad Fouladi, James Hong, Keyi Zhang, Philip Levis, and Keith Winstein. 2020. Learning in situ: a randomized experiment in video streaming. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 495--511. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/yan"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.17.11.712"}],"event":{"name":"HotNets '24: The 23rd ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Irvine CA USA","acronym":"HotNets '24"},"container-title":["Proceedings of the 23rd ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696348.3696875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:08:57Z","timestamp":1755878937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":48,"alternative-id":["10.1145\/3696348.3696875","10.1145\/3696348"],"URL":"https:\/\/doi.org\/10.1145\/3696348.3696875","relation":{},"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"2024-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}