{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:27:00Z","timestamp":1741325220473,"version":"3.38.0"},"reference-count":104,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055186","type":"journal-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T08:26:33Z","timestamp":1726820793000},"page":"53-78","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Internet Inter-Domain Path Inferring: Methods, Applications, and Future Directions"],"prefix":"10.32604","volume":"81","author":[{"given":"Xionglve","family":"Li","sequence":"first","affiliation":[]},{"given":"Chengyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Changsheng","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Bingnan","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/LNET.2023.3301008","article-title":"Efficiently measure the topologies of large-Scale networks under the guidance of neural network gradients","volume":"5","author":"Fei","year":"Dec. 2023","journal-title":"IEEE Netw. Lett."},{"key":"ref2","series-title":"Proc. Int. Conf. Netw. Serv. Manag.","first-page":"1","article-title":"Scalable and efficient link layer topology discovery for autonomic networks","author":"Seehofer","year":"Oct. 2023"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/3523230.3523232","article-title":"Zeph & Iris map the internet: A resilient reinforcement learning approach to distributed IP route tracing","volume":"52","author":"Gouel","year":"Jun. 2022","journal-title":"Comput. Commun. Rev."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2056","DOI":"10.1109\/TNET.2019.2940369","article-title":"On mapping the interconnections in today\u2019s Internet","volume":"27","author":"Motamedi","year":"Oct. 2019","journal-title":"Trans. Netw."},{"key":"ref5","first-page":"955","article-title":"Analyzing the structure and connectivity of continent-level Internet topology","volume":"59","author":"lve Li","year":"Jan. 2019","journal-title":"Comput. Mater. Contin."},{"key":"ref6","article-title":"PoiEvent: An approach to extract the persistent and destructive routing events","volume":"217","author":"Kuang","year":"Oct. 2022","journal-title":"Comput. Netw."},{"key":"ref7","series-title":"Proc. Int. Conf. Passive Active Meas","first-page":"230","article-title":"Inferring cloud interconnections: Validation, geolocation, and routing behavior","author":"Marder","year":"Mar. 2021"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TNET.2019.2911330","article-title":"Extracting routing events from traceroutes: A matter of empathy","volume":"27","author":"Bartolomeo","year":"Jul. 2019","journal-title":"Trans. Netw."},{"key":"ref9","unstructured":"R. A. Steenbergen, \u201cA practical guide to (correctly) troubleshooting with traceroute,\u201d presented at the 47th North Am. Netw. Oper. Group, Dearborn, MI, USA, Oct. 18\u201321, 2009."},{"key":"ref10","series-title":"Proc. Int. Conf. Cloud Netw.","first-page":"61","article-title":"Measuring cloud latency in Africa","author":"Babasanmi","year":"Nov. 07\u201310, 2022"},{"key":"ref11","series-title":"Proc. Web Conf.","first-page":"295","article-title":"Surrounded by the clouds: A comprehensive cloud reachability study","author":"Corneo","year":"Apr. 19\u201323, 2021"},{"key":"ref12","series-title":"Proc. Symp. Netw. Syst. Des. Implement.","first-page":"205","article-title":"Uncovering performance differences among backbone ISPs with Netdiff","author":"Mahajan","year":"Apr. 16\u201318, 2008"},{"key":"ref13","series-title":"Proc. Asia-Pac. Worksh. Netw.","first-page":"130","article-title":"Towards fine-grained, high-coverage Internet monitoring at scale","author":"Wu","year":"Jun. 29\u201330, 2023"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"3619","DOI":"10.1109\/TNSM.2021.3062151","article-title":"The art of detecting forwarding detours","volume":"18","author":"D. Fiore","year":"Feb. 2021","journal-title":"Trans. Netw. Serv. Manag."},{"key":"ref15","series-title":"Proc. Passive Act. Meas.","first-page":"373","article-title":"A global measurement of routing loops on the internet","author":"Alaraj","year":"Mar. 21\u201323, 2023"},{"key":"ref16","series-title":"Proc. Int. Worksh. Data Priv. Manag.","first-page":"203","article-title":"On the routing convergence delay in the lightning network","author":"G\u00f6gge","year":"Sep. 26, 2022"},{"key":"ref17","series-title":"Proc. Int. Conf. Emerg. Netw. Exp. Tech.","first-page":"466","article-title":"Detecting routing loops in the data plane","author":"Kucera","year":"Dec. 01\u201304, 2020"},{"key":"ref18","series-title":"Proc. IEEE Symp. Netw. Oper. Manag.","first-page":"1","article-title":"Analysis and emulation of BGP hijacking events","author":"Spadaccino","year":"May 08\u201312, 2023"},{"key":"ref19","series-title":"Proc. Symp. Netw. Syst. Des. Implement.","first-page":"1751","article-title":"A system to detect forged-origin BGP hijacks","author":"Holterbach","year":"Apr. 16\u201318, 2024"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1109\/TIFS.2019.2936975","article-title":"An ontological graph identification method for improving localization of IP prefix hijacking in network systems","volume":"15","author":"Al-Kadi","year":"2020","journal-title":"Trans Inf. Forensics Secur."},{"key":"ref21","series-title":"Proc. Int. Conf. Commun.","first-page":"5240","article-title":"RoLL: Real-time and accurate route leak location with AS triplet features","author":"Li","year":"May 28\u2013Jun. 1, 2023"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110257","article-title":"Matrix profile data mining for BGP anomaly detection","volume":"242","author":"Scott","year":"Feb. 2024","journal-title":"Comput. Netw."},{"key":"ref23","series-title":"Proc. Int. Conf. Trust, Sec. Priv. Comput. Commun.","first-page":"404","article-title":"Detecting BGP anomalies based on spatio-temporal feature representation model for autonomous systems","author":"Liu"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1109\/TNET.2015.2413838","article-title":"The BGP visibility toolkit: Detecting anomalous Internet routing behavior","volume":"24","author":"Lutu","year":"2016","journal-title":"Trans. Netw."},{"key":"ref25","series-title":"Proc. Internet Meas. Conf.","first-page":"492","article-title":"BGP beacons, network tomography, and bayesian computation to locate route flap damping","author":"Gray","year":"Oct. 27\u201329, 2020"},{"key":"ref26","series-title":"Proc. Res. Conf. Commun., Inform. Internet Policy","article-title":"A data-driven approach to understanding the state of Internet routing security","author":"Testart","year":"Dec. 16, 2020"},{"key":"ref27","series-title":"Proc. Spec. Interest Group Data Commun.","first-page":"104","article-title":"Zooming in on wide-area latencies to a global cloud provider","author":"Jin","year":"Aug. 19\u201323, 2019"},{"key":"ref28","series-title":"Proc. Spec. Interest Group Data Commun.","first-page":"465","article-title":"Providing authoritative answers to the world\u2019s queries","author":"Schomp","year":"Aug. 10\u201314, 2020"},{"key":"ref29","series-title":"Proc. Internet Meas. Conf.","first-page":"477","article-title":"Broad and load-aware Anycast mapping with verfploeter","author":"De Vries","year":"Nov. 01\u201303, 2017"},{"key":"ref30","series-title":"Proc. Internet Meas. Conf.","first-page":"255","article-title":"Anycast vs. DDOS: Evaluating the November 2015 root DNS event","author":"Moura","year":"Nov. 14\u201316, 2016"},{"key":"ref31","series-title":"Proc. Symp. Oper. Syst. Des. Implement.","first-page":"367","article-title":"iPlane: An information plane for distributed services","author":"Madhyastha","year":"Nov. 06\u201308, 2006"},{"key":"ref32","series-title":"Proc. Symp. Netw. Syst. Des. Implement.","first-page":"137","article-title":"iPlane nano: Path prediction for peer-to-peer applications","author":"Madhyastha","year":"Apr. 22\u201324, 2009"},{"key":"ref33","series-title":"Proc. IFIP Netw. Conf.","first-page":"1","article-title":"AS path inference: From complex network perspective","author":"Tao","year":"May 20\u201322, 2015"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1016\/j.comnet.2010.10.004","article-title":"Scalable and systematic internet-wide path and delay estimation from existing measurements","volume":"55","author":"Lee","year":"Feb. 2011","journal-title":"Comput. Netw."},{"key":"ref35","series-title":"Proc. Annual Netw. Distrib. Syst. Sec. Symp.","first-page":"21","article-title":"Measuring and mitigating AS-level adversaries against tor","author":"Nithyanand","year":"Feb. 21\u201324, 2016"},{"key":"ref36","unstructured":"R. Nithyanand, R. Singh, S. Cho, and P. Gill, \u201cHolding all the ASes: Identifying and circumventing the pitfalls of AS-aware tor client design,\u201d 2016, arXiv:1605.03596."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1109\/COMST.2014.2376520","article-title":"A survey of techniques for Internet topology discovery","volume":"17","author":"Motamedi","year":"2015","journal-title":"Commun. Surv. Tutorials"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-031-01755-1_4","author":"Jerger","year":"2017","journal-title":"Routing in On-Chip Networks"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s11276-021-02882-x","article-title":"DCBuf: A high-performance wireless network-on-chip architecture with distributed wireless interconnects and centralized buffer sharing","volume":"28","author":"Sun","year":"2022","journal-title":"Wirel Netw."},{"key":"ref40","doi-asserted-by":"crossref","first-page":"99249","DOI":"10.1109\/ACCESS.2021.3095146","article-title":"The static performance effect of hybrid-hierarchical interconnection by shifted completely connected network","volume":"9","author":"Ali","year":"2021","journal-title":"IEEE Access"},{"key":"ref41","series-title":"Proc. IEEE Ind. Electron. Soc.","first-page":"1","article-title":"Fault-Tolerant routing in networks-on-Chip using self-organizing routing algorithms","author":"Romanov","year":"Oct. 13\u201316, 2021"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1145\/572326.572328","article-title":"Self-similarity in the web","volume":"2","author":"Dill","year":"Aug. 2002","journal-title":"Trans. Internet Techn."},{"key":"ref43","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1038\/nature03248","article-title":"Self-similarity of complex networks","volume":"433","author":"Song","year":"Jan. 2005","journal-title":"Nature"},{"key":"ref44","series-title":"Proc. Symp. Netw. Syst. Des. Implement.","first-page":"325","article-title":"Sibyl: A practical Internet route oracle","author":"Cunha","year":"Mar. 16\u201318, 2016"},{"key":"ref45","series-title":"Proc. Int. Conf. Meas. Model. Comput.","first-page":"339","article-title":"On AS-level path inference","author":"Mao","year":"Jun. 06\u201310, 2005"},{"key":"ref46","series-title":"Proc. Global Telecomm. Conf.","first-page":"1","article-title":"AS path inference by exploiting known AS paths","author":"Qiu","year":"Nov. 27\u2013Dec. 07, 2006"},{"key":"ref47","series-title":"Proc. Int. Conf. Comput. Sci. Netw. Tech.","first-page":"196","article-title":"A novel algorithm for AS path inference based on BGP routing tables","author":"Mu","year":"Oct. 12\u201313, 2013"},{"key":"ref48","article-title":"Policy-preferred paths in AS-level Internet topology graphs","volume":"5","author":"Tozal","year":"Mar. 2018","journal-title":"Theory Appl. Graph."},{"key":"ref49","first-page":"23:1","article-title":"PredictRoute: A network path prediction toolkit","volume":"5","author":"Singh","year":"Jun. 2021","journal-title":"Meas. Anal. Comput. Syst."},{"key":"ref50","series-title":"Proc. Passive Act. Meas.","first-page":"216","article-title":"RouteInfer: Inferring interdomain paths by capturing ISP routing behavior diversity and generality","author":"Wu","year":"Mar. 28\u201330, 2022"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107377","article-title":"ProbInfer: Probability-based AS path inference from multigraph perspective","volume":"180","author":"Li","year":"2020","journal-title":"Comput. Netw."},{"key":"ref52","doi-asserted-by":"crossref","first-page":"3112","DOI":"10.1109\/TNET.2023.3270565","article-title":"Realizing fine-grained inference of AS path with a generative measurable process","volume":"31","author":"Li","year":"2023","journal-title":"Trans. Netw."},{"key":"ref53","unstructured":"V. Jacobson, \u201cTraceroute,\u201d 2006. Accessed: Aug. 21, 2024. [Online]. Available: https:\/\/wiki.geant.org\/display\/public\/EK\/VanJacobsonTraceroute#,"},{"key":"ref54","series-title":"Proc. Internet Meas. Conf.","first-page":"153","article-title":"Avoiding traceroute anomalies with paris traceroute","author":"Augustin","year":"Oct. 25\u201327, 2006"},{"key":"ref55","series-title":"Proc. Symp. Netw. Syst. Des. Implement.","first-page":"219","article-title":"Reverse traceroute","author":"Katz-Bassett","year":"Apr. 28\u201330, 2010"},{"key":"ref56","series-title":"Proc. Internet Meas. Conf.","first-page":"694","article-title":"Internet scale reverse traceroute","author":"Vermeulen","year":"Oct. 25\u201327, 2022"},{"key":"ref57","series-title":"Proc. Internet Meas. Conf.","first-page":"413","article-title":"Yarrp\u2019ing the internet: Randomized high-speed active topology discovery","author":"Beverly","year":"Nov. 14\u201316, 2016"},{"key":"ref58","series-title":"Proc. Symp. Netw. Syst. Des. Implement.","first-page":"479","article-title":"Diamond-miner: Comprehensive discovery of the Internet\u2019s topology diamonds","author":"Vermeulen","year":"Feb. 25\u201327, 2020"},{"key":"ref59","series-title":"Proc. Internet Netw. Conf","first-page":"1","article-title":"Interconnection, peering and settlements","author":"Huston","year":"Jun. 22\u201325, 1999"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/90.974527","article-title":"On inferring autonomous system relationships in the Internet","volume":"9","author":"Gao","year":"2001","journal-title":"Trans. Netw."},{"key":"ref61","series-title":"Proc. Internet Meas. Conf.","first-page":"23","article-title":"Inferring complex AS relationships","author":"Giotsas","year":"Nov. 05\u201307, 2014"},{"key":"ref62","series-title":"Proc. Int. Conf. Emerg. Netw. Exp. Tech.","first-page":"272","article-title":"UNARI: An uncertainty-aware approach to AS relationships inference","author":"Feng","year":"Dec. 09\u201312, 2019"},{"key":"ref63","series-title":"Proc. Symp. Netw. Syst. Des. Implement.","first-page":"581","article-title":"Stable and practical AS relationship inference with Prob-link","author":"Jin","year":"Feb. 26\u201328, 2019"},{"key":"ref64","series-title":"Proc. Internet Meas. Conf.","first-page":"266","article-title":"Toposcope: Recover as relationships from fragmentary observations","author":"Jin","year":"Oct. 27\u201329, 2020"},{"key":"ref65","doi-asserted-by":"crossref","unstructured":"S. Peng, X. Shu, Z. Ruan, Z. Huang, and Q. Xuan, \u201cInferring multiple relationships between ASes using graph convolutional network,\u201d May 2021, arXiv:2107.13504.","DOI":"10.1007\/s42524-022-0217-1"},{"key":"ref66","series-title":"Proc. Netw. Oper. Manag. Symp.","first-page":"1","article-title":"Unveiling the type of relationship between autonomous systems using deep learning","author":"Shapira","year":"Apr. 20\u201324, 2020"},{"key":"ref67","unstructured":"RIPE NCC, \u201cReseaux IP Europeens network coordination centre,\u201d Accessed: Aug. 21, 2024. 2024. [Online]. Available: https:\/\/www.ripe.net\/"},{"key":"ref68","unstructured":"CAIDA, \u201cCenter for applied internet data analysis,\u201d Accessed: Aug. 21, 2024. 2024. [Online]. Available: https:\/\/www.caida.org"},{"key":"ref69","unstructured":"University of Oregon, \u201cOregon route views project,\u201d 2024, Accessed: Aug. 21, 2024. [Online]. Available: http:\/\/www.routeviews.org"},{"key":"ref70","unstructured":"Princeton University, \u201cPlanetlab,\u201d 2024, Accessed: Aug. 21, 2024. [Online]. Available: https:\/\/planetlab.cs.princeton.edu"},{"key":"ref71","doi-asserted-by":"crossref","DOI":"10.3390\/electronics13091747","article-title":"AliasClassifier: A high-performance router alias classifier","volume":"13","author":"Xie","year":"2024","journal-title":"Electronics"},{"key":"ref72","series-title":"Proc. Internet Meas. Conf.","first-page":"584","article-title":"Pushing alias resolution to the limit","author":"Albakour","year":"Oct. 24\u201326"},{"key":"ref73","doi-asserted-by":"crossref","DOI":"10.1002\/dac.5610","article-title":"FBAR: An effective method for resolving large-scale IPv6 aliases","volume":"36","author":"Liu","year":"Sep. 2023","journal-title":"Int. J. Commun Syst."},{"key":"ref74","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1109\/TNET.2009.2014227","article-title":"Resolving IP aliases in building traceroute-based internet maps","volume":"17","author":"Gunes","year":"2009","journal-title":"Trans. Netw."},{"key":"ref75","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TNET.2012.2198887","article-title":"Internet-scale IPv4 alias resolution with midar","volume":"21","author":"Keys","year":"2013","journal-title":"Trans. Netw."},{"key":"ref76","series-title":"Proc. Int. Conf. Comput. Commun. Netw.","first-page":"1","article-title":"Refining IP-to-AS mappings for AS-level traceroute","author":"Zhang","year":"Jul. 30\u2013Aug. 02, 2013"},{"key":"ref77","series-title":"Proc. Internet Meas. Conf.","first-page":"381","article-title":"bdrmap: Inference of borders between IP networks","author":"Luckie","year":"Nov. 14\u201316, 2016"},{"key":"ref78","series-title":"Proc. Internet Meas. Conf.","first-page":"397","article-title":"MAP-IT: Multipass accurate passive inferences from traceroute","author":"Marder","year":"Nov. 14\u201316, 2016"},{"key":"ref79","series-title":"Proc. Internet Meas. Conf.","first-page":"1","article-title":"Replication: Towards a publicly available internet scale IP geolocation dataset","author":"Darwich","year":"Oct. 24\u201326, 2023"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/3402413.3402415","article-title":"RIPE IPmap active geolocation: Mechanism and performance evaluation","volume":"50","author":"Du","year":"May 2020","journal-title":"Comput. Commun. Rev."},{"key":"ref81","unstructured":"RIPE. NCC, \u201cRIPE atlas,\u201d 2024. Accessed: Aug. 21, 2024. [Online]. Available: https:\/\/atlas.ripe.net\/"},{"key":"ref82","unstructured":"RIPE NCC, \u201cRouting information service (RIS),\u201d 2024. Accessed: Aug. 21, 2024. [Online]. Available: http:\/\/www.ripe.net\/ris\/"},{"key":"ref83","unstructured":"CAIDA, \u201cArchipelago (ark) measurement infrastructure,\u201d 2024. Accessed: Aug. 21, 2024. [Online]. Available: https:\/\/www.caida.org\/projects\/ark\/"},{"key":"ref84","unstructured":"CAIDA, \u201cAS rank,\u201d 2024. Accessed: Aug. 21, 2024. [Online]. Available: http:\/\/as-rank.caida.org\/"},{"key":"ref85","series-title":"Proc. Internet Meas. Conf.","first-page":"770","article-title":"Measuring internet routing from the most valuable points","author":"Alfroy","year":"Oct. 25\u201327, 2022"},{"key":"ref86","series-title":"Proc. Netw. Traffic Meas. Anal. Conf.","first-page":"1","article-title":"Bias in Internet measurement platforms","author":"Sermpezis","year":"Jun. 26\u201329, 2023"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/2096149.2096155","article-title":"Modeling on quicksand: Dealing with the scarcity of ground truth in interdomain routing data","volume":"42","author":"Gill","year":"Jan. 2012","journal-title":"Comput. Commun. Rev."},{"key":"ref88","unstructured":"\u201cIsolario project,\u201d 2024, Accessed: Aug. 21, 2024. [Online]. Available: https:\/\/www.isolario.it\/"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/40.748796","article-title":"Detour: Informed Internet routing and transport","volume":"19","author":"Savage","year":"Feb. 1999","journal-title":"IEEE Micro"},{"key":"ref90","series-title":"Proc. Internet Meas. Conf.","first-page":"758","article-title":"Understanding the confounding factors of inter-domain routing modeling","author":"Kastanakis","year":"Oct. 25\u201327, 2022"},{"key":"ref91","series-title":"Proc. Internet Meas. Conf.","first-page":"612","article-title":"How biased is our validation (data) for AS relationships?","author":"Prehn","year":"Nov. 02\u201304, 2021"},{"key":"ref92","series-title":"Proc. Int. Conf. Passive Act. Meas.","first-page":"203","article-title":"Leveraging inter-domain stability for BGP dynamics analysis","author":"Green","year":"Mar. 26\u201327"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1109\/TNET.2016.2594188","article-title":"Accurate per-packet delay tomography in wireless ad hoc networks","volume":"25","author":"Gao","year":"Feb. 2017","journal-title":"Trans. Netw."},{"key":"ref94","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1109\/TNET.2020.3000115","article-title":"Bound inference in network performance tomography with additive metrics","volume":"28","author":"Feng","year":"Aug. 2020","journal-title":"Trans. Netw."},{"key":"ref95","series-title":"Proc. IEEE Conf. Comput. Commun.","first-page":"1588","article-title":"Bound-based network tomography for inferring interesting link metrics","author":"Li","year":"Jul. 06\u201309, 2020"},{"key":"ref96","series-title":"Proc. IEEE Conf. Comput. Commun.","first-page":"1","article-title":"Bound inference and reinforcement learning-based path construction in bandwidth tomography","author":"Feng","year":"May 10\u201313, 2021"},{"key":"ref97","unstructured":"L. Ma, Z. Zhang, and M. Srivatsa, \u201cNeural network tomography,\u201d 2020, arXiv:2001.02942."},{"key":"ref98","doi-asserted-by":"crossref","first-page":"2260","DOI":"10.1109\/JSAC.2020.3000405","article-title":"RouteNet: Leveraging graph neural networks for network modeling and optimization in SDN","volume":"38","author":"Rusek","year":"Aug. 2020","journal-title":"J. Sel. Areas Commun."},{"key":"ref99","series-title":"Proc. Spec. Interest Group Data Commun.","first-page":"287","article-title":"MimicNet: Fast performance estimates for data center networks with machine learning","author":"Zhang","year":"Aug. 23\u201327, 2021"},{"key":"ref100","series-title":"Proc. IEEE Conf. Comput. Commun.","first-page":"2028","article-title":"xNet: Improving expressiveness and granularity for network modeling with graph neural networks","author":"Wang","year":"May 02\u201305, 2022"},{"key":"ref101","series-title":"Proc. Spec. Interest Group Data Commun.","first-page":"441","article-title":"DeepqueueNet: Towards scalable and generalized network performance estimation with packet-level visibility","author":"Yang","year":"Aug. 22\u201326, 2022"},{"key":"ref102","series-title":"Symp. Netw. Syst. Des. Implement.","first-page":"685","article-title":"Scalable tail latency estimation for data center networks","author":"Zhao","year":"Apr. 17\u201319, 2023"},{"key":"ref103","series-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","first-page":"1877","article-title":"Language models are few-shot learners","author":"Brown","year":"Dec. 06\u201312, 2020"},{"key":"ref104","series-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","first-page":"27730","article-title":"Training language models to follow instructions with human feedback","author":"Ouyang","year":"Nov. 28\u2013Dec. 9, 2022"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_55186\/TSP_CMC_55186.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:38:36Z","timestamp":1741315116000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":104,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055186","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}