{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T13:23:04Z","timestamp":1762435384248,"version":"build-2065373602"},"reference-count":125,"publisher":"Association for Computing Machinery (ACM)","issue":"4","funder":[{"name":"NSF","award":["#2226107"],"award-info":[{"award-number":["#2226107"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Syst."],"published-print":{"date-parts":[[2025,11,30]]},"abstract":"<jats:p>\n                    In recent years, content hyper-giants have increasingly deployed server infrastructure and services close to end-users within \u201ceyeball\u201d networks. Still, online streaming analytics has largely remained unaffected by this trend. This is despite the fact that most of the \u201cbig data\u201d is received in real-time and is most valuable at the time of arrival. The inability to process data at the network edge is caused by a common setting where user profiles, necessary for analytics, are stored deep in the data center backends. This setting also carries privacy concerns as such user profiles are individually identifiable, yet the users are almost blind to what data is associated with their identities and how the data is analyzed. In this article, we revise this arrangement, and plant encrypted\n                    <jats:italic toggle=\"yes\">semantic cookies<\/jats:italic>\n                    at the user end. By redesigning the cookie content without altering existing protocols, semantic cookies enable the capture and pre-processing of user data at edge ISPs or CDNs while preserving user anonymity. Additionally, lightweight cryptographic algorithms like partially homomorphic encryption can protect web providers\u2019 proprietary data from CDNs. We present\n                    <jats:italic toggle=\"yes\">Snatch<\/jats:italic>\n                    , a QUIC-based streaming analytics prototype that achieves up to 200x faster user analytics, with common-case improvements of 10-30x.\n                  <\/jats:p>","DOI":"10.1145\/3746130","type":"journal-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T05:36:57Z","timestamp":1750657017000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Anonymous Online Streaming Analytics at the Network Edge"],"prefix":"10.1145","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4913-4881","authenticated-orcid":false,"given":"Yunming","family":"Xiao","sequence":"first","affiliation":[{"name":"University of Michigan","place":["Ann Arbor, United States"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6577-2704","authenticated-orcid":false,"given":"Yanqi","family":"Gu","sequence":"additional","affiliation":[{"name":"University of California Irvine","place":["Irvine, United States"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0142-0045","authenticated-orcid":false,"given":"Yibo","family":"Zhao","sequence":"additional","affiliation":[{"name":"Boston University","place":["Boston, United States"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0146-167X","authenticated-orcid":false,"given":"Sen","family":"Lin","sequence":"additional","affiliation":[{"name":"Northwestern University","place":["Evanston, United States"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2622-6019","authenticated-orcid":false,"given":"Aleksandar","family":"Kuzmanovic","sequence":"additional","affiliation":[{"name":"Northwestern University","place":["Evanston, United States"]}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,11,6]]},"reference":[{"key":"e_1_3_4_2_2","unstructured":"Cloudflare. [n. d.]. Cloudflare Workersc. Retrieved July 15 2024 from https:\/\/workers.cloudflare.com\/"},{"key":"e_1_3_4_3_2","unstructured":"HTTP Archive. [n. d.]. Report: State of the Web. Retrieved July 15 2024 from https:\/\/httparchive.org\/reports\/state-of-the-web"},{"key":"e_1_3_4_4_2","unstructured":"Intel. [n. d.]. Intel Paillier Cryptosystem Library. Retrieved July 15 2024 from https:\/\/github.com\/intel\/pailliercryptolib"},{"key":"e_1_3_4_5_2","unstructured":"Intel. [n. d.]. Intel Paillier Cryptosystem Library: An ISO-compliant Implementation Accelerated with Intel AVX512\/IFMA. Retrieved July 15 2024 from https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/homomorphic-encryption\/iso-compliantpaillier-cryptosystem-library.html"},{"key":"e_1_3_4_6_2","unstructured":"Rodolfo Saldanha. [n. d.]."},{"key":"e_1_3_4_7_2","unstructured":"Amazon Web Services. [n. d.]. Multi-CDN considerations - Amazon CloudFront for Media. Retrieved July 15 2024 from https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/amazon-cloudfront-media\/multi-cdn-considerations.html"},{"key":"e_1_3_4_8_2","unstructured":"Alibaba. 2018. Alibaba Cloud MMO Gaming Solution Architecture. Retrieved July 15 2024 from https:\/\/www.alibabacloud.com\/blog\/alibaba-cloud-mmo-gaming-solution-architecture_593877"},{"key":"e_1_3_4_9_2","unstructured":"European Parliament and Council of the European Union. 2018. General Data Protection Regulation (GDPR). Retrieved July 15 2024 from https:\/\/gdpr-info.eu\/"},{"key":"e_1_3_4_10_2","unstructured":"Google. 2020. Chromium Blog: Building a more private web: A path towards making third party cookies obsolete. Retrieved July 15 2024 from https:\/\/blog.chromium.org\/2020\/01\/building-more-private-web-path-towards.html"},{"key":"e_1_3_4_11_2","unstructured":"WebKit. 2020. Full Third-Party Cookie Blocking and More. Retrieved July 15 2024 from https:\/\/webkit.org\/blog\/10218\/full-third-partycookie-blocking-and-more\/"},{"key":"e_1_3_4_12_2","unstructured":"Brave. 2020. How Do I Manage Cookies In Brave? Retrieved July 15 2024 from https:\/\/support.brave.com\/hc\/en-us\/articles\/360050634931-How-Do-I-Manage-Cookies-In-Brave-"},{"key":"e_1_3_4_13_2","unstructured":"quic go. 2021. A QUIC implementation in pure Go. Retrieved July 15 2024 from https:\/\/github.com\/lucas-clemente\/quic-go"},{"key":"e_1_3_4_14_2","unstructured":"Amazon Web Services. 2021. Amazon EC2. Retrieved July 15 2024 from https:\/\/aws.amazon.com\/ec2\/"},{"key":"e_1_3_4_15_2","unstructured":"Apache Software Foundation. [n. d.]. Apache Flink \u2013 Stateful Computations over Data Streams. Retrieved July 15 2024 from https:\/\/flink.apache.org\/"},{"key":"e_1_3_4_16_2","unstructured":"Apache Software Foundation. [n. d.]. Apache Flume. Retrieved July 15 2024 from https:\/\/flume.apache.org\/"},{"key":"e_1_3_4_17_2","unstructured":"Apache Software Foundation. 2021. Apache Kafka. Retrieved July 15 2024 from https:\/\/kafka.apache.org\/"},{"key":"e_1_3_4_18_2","unstructured":"Apache Software Foundation. [n. d.]. Apache Spark. Retrieved July 15 2024 from https:\/\/spark.apache.org\/"},{"key":"e_1_3_4_19_2","unstructured":"Cloudflare. 2021. Cloudflare: Connect protect and build everywhere. Retrieved July 15 2024 from https:\/\/www.cloudflare.com\/"},{"key":"e_1_3_4_20_2","unstructured":"Matt Adorjan. [n. d.]. Cloudping \u2013 AWS Latency Monitoring. Retrieved July 15 2024 from https:\/\/www.cloudping.co\/grid"},{"key":"e_1_3_4_21_2","unstructured":"Amazon Web Services. [n. d.]. Low-Latency Content Delivery Network (CDN) - Amazon CloudFront. Retrieved July 15 2024 from https:\/\/aws.amazon.com\/cloudfront\/"},{"key":"e_1_3_4_22_2","unstructured":"Google. [n. d.]. Google Cloud Dataflow. Retrieved July 15 2024 from https:\/\/cloud.google.com\/dataflow"},{"key":"e_1_3_4_23_2","unstructured":"Intel. 2021. Intel Tofino 2. Retrieved July 15 2024 from https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmableethernet-switch\/tofino-2-series.html"},{"key":"e_1_3_4_24_2","unstructured":"Arelion. 2021. IP SLA Network Performance. Retrieved July 15 2024 from https:\/\/www.arelion.com\/our-network\/ip-sla-networkperformance.html"},{"key":"e_1_3_4_25_2","unstructured":"Mysterium Network. 2021. Mysterium Network: Open Web Protocol. Retrieved July 15 2024 from https:\/\/www.mysterium.network\/"},{"key":"e_1_3_4_26_2","unstructured":"NTT Data. [n. d.]. Our Global IP Network SLA. Retrieved July 15 2024 from https:\/\/www.gin.ntt.net\/support-center\/service-levelagreements-slas\/our-global-ip-network\/"},{"key":"e_1_3_4_27_2","unstructured":"The P4.org Architecture Working Group. 2021. P416 Portable Switch Architecture (PSA) \u2013 Packet Digest. Retrieved July 15 2024 from https:\/\/p4.org\/p4-spec\/docs\/PSA.html#sec-packet-digest"},{"key":"e_1_3_4_28_2","unstructured":"Lu Zhang and Chukwudiuto Malife. 2022. Processing billions of events in real time at Twitter. Retrieved July 15 2024 from https:\/\/blog.twitter.com\/engineering\/en_us\/topics\/infrastructure\/2021\/processing-billions-of-events-in-real-time-at-twitter-"},{"key":"e_1_3_4_29_2","unstructured":"Apache Software Foundation. [n. d.]. pyspark.streaming.DStream \u2013 PySpark 3.2.0 Documentation. Retrieved July 15 2024 from https:\/\/spark.apache.org\/docs\/latest\/api\/python\/reference\/api\/pyspark.streaming.DStream.html"},{"key":"e_1_3_4_30_2","unstructured":"Broadcom. [n. d.]. RabbitMQ. Retrieved July 15 2024 from https:\/\/www.rabbitmq.com\/"},{"key":"e_1_3_4_31_2","unstructured":"Cogent Communications. [n. d.]. SLA Performance For Global IP. Retrieved July 15 2024 from https:\/\/www.cogentco.com\/en\/network\/performance-tools"},{"key":"e_1_3_4_32_2","unstructured":"Apache Software Foundation. [n. d.]. Spark Streaming Programming Guide. Retrieved July 15 2024 from https:\/\/spark.apache.org\/docs\/latest\/streaming-programming-guide.html"},{"key":"e_1_3_4_33_2","unstructured":"man7.org. [n. d.]. tc(8) \u2014 Linux manual page. Retrieved July 15 2024 from https:\/\/man7.org\/linux\/man-pages\/man8\/tc.8.html"},{"key":"e_1_3_4_34_2","unstructured":"Mira. 2020. Real-Time Crowd Analysis. Retrieved July 15 2024 from https:\/\/mira.co\/solutions\/real-time\/"},{"key":"e_1_3_4_35_2","unstructured":"2023. Firefox rolls out Total Cookie Protection by default to more users worldwide. (2023). Retrieved from https:\/\/blog.mozilla.org\/en\/mozilla\/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide\/"},{"key":"e_1_3_4_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050235"},{"key":"e_1_3_4_37_2","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536229"},{"key":"e_1_3_4_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379983"},{"key":"e_1_3_4_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3190664"},{"key":"e_1_3_4_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066160"},{"key":"e_1_3_4_41_2","first-page":"667","volume-title":"17th  \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\)  20)","author":"Barbette Tom","year":"2020","unstructured":"Tom Barbette, Chen Tang, Haoran Yao, Dejan Kosti\u0107, Gerald Q Maguire Jr, Panagiotis Papadimitratos, and Marco Chiesa. 2020. A high-speed load-balancer design with guaranteed per-connection-consistency. In 17th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\) 20). 667\u2013683."},{"key":"e_1_3_4_42_2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6265"},{"key":"e_1_3_4_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_4_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_4_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"e_1_3_4_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_17"},{"key":"e_1_3_4_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150415"},{"key":"e_1_3_4_48_2","volume-title":"19th USENIX Security Symposium (USENIX Security 10)","author":"Burkhart Martin","year":"2010","unstructured":"Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos. 2010. \\(\\lbrace\\) SEPIA \\(\\rbrace\\) : \\(\\lbrace\\) privacy-preserving \\(\\rbrace\\) aggregation of \\(\\lbrace\\) multi-domain \\(\\rbrace\\) network events and statistics. In 19th USENIX Security Symposium (USENIX Security 10)."},{"key":"e_1_3_4_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541715"},{"key":"e_1_3_4_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939171"},{"key":"e_1_3_4_51_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19163594"},{"key":"e_1_3_4_52_2","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/B978-155860869-6\/50027-5","volume-title":"VLDB\u201902: Proceedings of the 28th International Conference on Very Large Databases","author":"Carney Don","year":"2002","unstructured":"Don Carney, U\u011fur \u00c7etintemel, Mitch Cherniack, Christian Convey, Sangdon Lee, Greg Seidman, Nesime Tatbul, Stan Zdonik, and Michael Stonebraker. 2002. Monitoring streams\u2014a new class of data management applications. In VLDB\u201902: Proceedings of the 28th International Conference on Very Large Databases. Elsevier, 215\u2013226."},{"key":"e_1_3_4_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872857"},{"key":"e_1_3_4_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2904441"},{"key":"e_1_3_4_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405819"},{"key":"e_1_3_4_56_2","unstructured":"Xinyun Chen Chang Liu Bo Li Kimberly Lu and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_4_57_2","doi-asserted-by":"crossref","first-page":"1789","DOI":"10.1109\/IPDPSW.2016.138","volume-title":"2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)","author":"Chintapalli Sanket","year":"2016","unstructured":"Sanket Chintapalli, Derek Dagit, Bobby Evans, Reza Farivar, Thomas Graves, Mark Holderbaugh, Zhuo Liu, Kyle Nusbaum, Kishorkumar Patil, Boyang Jerry Peng, et\u00a0al. 2016. Benchmarking streaming computation engines: Storm, flink and spark streaming. In 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW). IEEE, 1789\u20131792."},{"key":"e_1_3_4_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_4_59_2","first-page":"259","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27-29, 2017","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, robust, and scalable computation of aggregate statistics. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27-29, 2017, Aditya Akella and Jon Howell (Eds.). USENIX Association, 259\u2013282. Retrieved from https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/corrigan-gibbs"},{"key":"e_1_3_4_60_2","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/SP.2015.27","volume-title":"2015 IEEE Symposium on Security and Privacy","author":"Corrigan-Gibbs Henry","year":"2015","unstructured":"Henry Corrigan-Gibbs, Dan Boneh, and David Mazi\u00e8res. 2015. Riposte: An anonymous messaging system handling millions of users. In 2015 IEEE Symposium on Security and Privacy. IEEE, 321\u2013338."},{"key":"e_1_3_4_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2833110"},{"key":"e_1_3_4_62_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2017.12.001","article-title":"Distributed data stream processing and edge computing: A survey on resource elasticity and future directions","volume":"103","author":"Assuncao Marcos Dias de","year":"2018","unstructured":"Marcos Dias de Assuncao, Alexandre da Silva Veith, and Rajkumar Buyya. 2018. Distributed data stream processing and edge computing: A survey on resource elasticity and future directions. Journal of Network and Computer Applications 103 (2018), 1\u201317. https:\/\/www.sciencedirect.com\/journal\/journal-of-network-and-computer-applications\/vol\/103\/suppl\/C","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_3_4_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_4_64_2","first-page":"3571","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA","author":"Ding Bolin","year":"2017","unstructured":"Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting telemetry data privately. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA. Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 3571\u20133580. Retrieved from https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/253614bbac999b38b5b60cae531c4969-Abstract.html"},{"key":"e_1_3_4_65_2","doi-asserted-by":"crossref","unstructured":"Constantine Dovrolis Krishna Gummadi Aleksandar Kuzmanovic and Sascha D. Meinrath. 2010. Measurement lab: Overview and an invitation to the research community. ACM SIGCOMM Computer Communication Review 40 3 (2010) 53\u201356.","DOI":"10.1145\/1823844.1823853"},{"key":"e_1_3_4_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_4_67_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"e_1_3_4_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_4_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179619"},{"key":"e_1_3_4_70_2","unstructured":"Yansong Gao Bao Gia Doan Zhi Zhang Siqi Ma Jiliang Zhang Anmin Fu Surya Nepal and Hyoungshick Kim. 2020. Backdoor attacks and countermeasures on deep learning: A comprehensive review. CoRR abs\/2007.10760 (2020). arXiv:2007.10760. https\/\/arxiv.org\/abs\/2007.10760"},{"key":"e_1_3_4_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_4_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2018.00023"},{"key":"e_1_3_4_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472928"},{"key":"e_1_3_4_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.720541"},{"key":"e_1_3_4_75_2","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1109\/SP.2014.31","volume-title":"2014 IEEE Symposium on Security and Privacy","author":"Hohenberger Susan","year":"2014","unstructured":"Susan Hohenberger, Steven Myers, Rafael Pass, et\u00a0al. 2014. ANONIZE: A large-scale anonymous survey system. In 2014 IEEE Symposium on Security and Privacy. IEEE, 375\u2013389."},{"key":"e_1_3_4_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230545"},{"key":"e_1_3_4_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2946800"},{"key":"e_1_3_4_78_2","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1145\/3359989.3365433","volume-title":"Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies","author":"Ivkin Nikita","year":"2019","unstructured":"Nikita Ivkin, Zhuolong Yu, Vladimir Braverman, and Xin Jin. 2019. Qpipe: Quantiles sketch fully in the data plane. In Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies. 285\u2013291."},{"key":"e_1_3_4_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"e_1_3_4_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3267842"},{"key":"e_1_3_4_81_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0210-7"},{"key":"e_1_3_4_82_2","doi-asserted-by":"publisher","unstructured":"Adam Barth. 2011. HTTP State Management Mechanism. RFC 6265 (2011) 1\u201337. DOI:10.17487\/RFC6265","DOI":"10.17487\/RFC6265"},{"key":"e_1_3_4_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3371411"},{"key":"e_1_3_4_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742788"},{"key":"e_1_3_4_85_2","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0008"},{"key":"e_1_3_4_86_2","first-page":"741","volume-title":"NSDI","author":"Lao ChonLam","year":"2021","unstructured":"ChonLam Lao, Yanfang Le, Kshiteej Mahajan, Yixi Chen, Wenfei Wu, Aditya Akella, and Michael M Swift. 2021. ATP: In-network aggregation for multi-tenant learning. In NSDI. 741\u2013761."},{"key":"e_1_3_4_87_2","first-page":"311","volume-title":"13th  \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\)  16)","author":"Li Yuliang","year":"2016","unstructured":"Yuliang Li, Rui Miao, Changhoon Kim, and Minlan Yu. 2016. Flowradar: A better netflow for data centers. In 13th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\) 16). 311\u2013324."},{"key":"e_1_3_4_88_2","volume-title":"22nd USENIX Symposium on Networked Systems Design and Implementation, NSDI 2025, Philadelphia, PA, April 28-30, 2025","author":"Lin Shihan","year":"2025","unstructured":"Shihan Lin, Suting Chen, Yunming Xiao, Yanqi Gu, Aleksandar Kuzmanovic, and Xiaowei Yang. 2025. PreAcher: Secure and practical password pre-authentication by content delivery networks. In 22nd USENIX Symposium on Networked Systems Design and Implementation, NSDI 2025, Philadelphia, PA, April 28-30, 2025. USENIX Association."},{"key":"e_1_3_4_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559336"},{"key":"e_1_3_4_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9198-0"},{"key":"e_1_3_4_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"e_1_3_4_92_2","volume-title":"30th  \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Security 21)","author":"Liu Zaoxing","year":"2021","unstructured":"Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, and Vyas Sekar. 2021. Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric ddos attacks with programmable switches. In 30th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security 21)."},{"key":"e_1_3_4_93_2","doi-asserted-by":"crossref","unstructured":"Weimin Lyu Xiao Lin Songzhu Zheng Lu Pang Haibin Ling Susmit Jha and Chao Chen. 2024. Task-agnostic detector for insertion-based backdoor attacks. In Findings of the Association for Computational Linguistics: NAACL 2024. 2808\u20132822.","DOI":"10.18653\/v1\/2024.findings-naacl.179"},{"key":"e_1_3_4_94_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.naacl-main.348"},{"key":"e_1_3_4_95_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.716"},{"key":"e_1_3_4_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"e_1_3_4_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"e_1_3_4_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"e_1_3_4_99_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_4_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046781"},{"key":"e_1_3_4_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3317550.3321439"},{"key":"e_1_3_4_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787505"},{"key":"e_1_3_4_103_2","unstructured":"Fanchao Qi Yangyi Chen Mukai Li Yuan Yao Zhiyuan Liu and Maosong Sun. 2021. ONION: A simple and effective defense against textual backdoor attacks. In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. 9558\u20139566."},{"key":"e_1_3_4_104_2","first-page":"275","volume-title":"11th  \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\)  14)","author":"Rabkin Ariel","year":"2014","unstructured":"Ariel Rabkin, Matvey Arye, Siddhartha Sen, Vivek S Pai, and Michael J Freedman. 2014. Aggregation and degradation in jetstream: Streaming analytics in the wide area. In 11th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\) 14). 275\u2013288."},{"key":"e_1_3_4_105_2","unstructured":"Ronald L. Rivest and Michael L. Dertouzos. 1978. ON DATA BANKS AND PRIVACY HOMOMORPHISMS. Retrieved from https:\/\/api.semanticscholar.org\/CorpusID:6905087"},{"key":"e_1_3_4_106_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483585"},{"key":"e_1_3_4_107_2","first-page":"487","volume-title":"10th  \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\)  13)","author":"S\u00e1nchez Mario A","year":"2013","unstructured":"Mario A S\u00e1nchez, John S Otto, Zachary S Bischof, David R Choffnes, Fabi\u00e1n E Bustamante, Balachander Krishnamurthy, and Walter Willinger. 2013. Dasu: Pushing experiments to the internet\u2019s edge. In 10th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\) 13). 487\u2013499."},{"key":"e_1_3_4_108_2","first-page":"785","volume-title":"18th  \\(\\lbrace\\) USENIX \\(\\rbrace\\)  Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\)  21)","author":"Sapio Amedeo","year":"2021","unstructured":"Amedeo Sapio, Marco Canini, Chen-Yu Ho, Jacob Nelson, Panos Kalnis, Changhoon Kim, Arvind Krishnamurthy, Masoud Moshref, Dan Ports, and Peter Richtarik. 2021. Scaling distributed machine learning with in-network aggregation. In 18th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\) 21). 785\u2013808."},{"key":"e_1_3_4_109_2","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"e_1_3_4_110_2","unstructured":"RIPE NCC Staff. 2015. Ripe atlas: A global internet measurement network. Internet Protocol Journal 18 3 (2015) 2\u201326."},{"key":"e_1_3_4_111_2","unstructured":"Apple\u2019s Differential Privacy Team. 2021. Learning Privacy at Scale. (2021). Retrieved from https:\/\/machinelearning.apple.com\/research\/learning-with-privacy-at-scale"},{"key":"e_1_3_4_112_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"e_1_3_4_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2595641"},{"key":"e_1_3_4_114_2","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2015.0956"},{"key":"e_1_3_4_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050234"},{"key":"e_1_3_4_116_2","first-page":"179","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Wolinsky David Isaac","year":"2012","unstructured":"David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012. Dissent in numbers: Making strong anonymity scale. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 179\u2013182."},{"key":"e_1_3_4_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486008"},{"key":"e_1_3_4_118_2","doi-asserted-by":"publisher","DOI":"10.1145\/3530899"},{"key":"e_1_3_4_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3629577"},{"key":"e_1_3_4_120_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28486-1_27"},{"key":"e_1_3_4_121_2","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365864"},{"key":"e_1_3_4_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2840974"},{"key":"e_1_3_4_123_2","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081909"},{"key":"e_1_3_4_124_2","first-page":"683","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2022, Renton, WA, USA, April 4-6, 2022","author":"Yuan Yifan","year":"2022","unstructured":"Yifan Yuan, Omar Alama, Jiawei Fei, Jacob Nelson, Dan R. K. Ports, Amedeo Sapio, Marco Canini, and Nam Sung Kim. 2022. Unlocking the power of inline floating-point operations on programmable switches. In 19th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2022, Renton, WA, USA, April 4-6, 2022, Amar Phanishayee and Vyas Sekar (Eds.). USENIX Association, 683\u2013700. Retrieved from https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/yuan"},{"key":"e_1_3_4_125_2","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522737"},{"key":"e_1_3_4_126_2","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230554"}],"container-title":["ACM Transactions on Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T13:19:13Z","timestamp":1762435153000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"references-count":125,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,11,30]]}},"alternative-id":["10.1145\/3746130"],"URL":"https:\/\/doi.org\/10.1145\/3746130","relation":{},"ISSN":["0734-2071","1557-7333"],"issn-type":[{"type":"print","value":"0734-2071"},{"type":"electronic","value":"1557-7333"}],"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"2024-08-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}