iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/TNET.2024.3364757
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:09:33Z","timestamp":1725080973679},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016682","name":"VMware","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016682","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006041","name":"Innovate U.K.","doi-asserted-by":"publisher","award":["10056403"],"id":[{"id":"10.13039\/501100006041","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SmartEdge European Union (EU) Project","award":["101092908"]},{"DOI":"10.13039\/501100000275","name":"Leverhulme Trust","doi-asserted-by":"publisher","award":["ECF-2016-289"],"id":[{"id":"10.13039\/501100000275","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004815","name":"Isaac Newton Trust","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004815","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"Intel","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tnet.2024.3364757","type":"journal-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T19:12:33Z","timestamp":1708110753000},"page":"2555-2570","source":"Crossref","is-referenced-by-count":4,"title":["IIsy: Hybrid In-Network Classification Using Programmable Switches"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1894-722X","authenticated-orcid":false,"given":"Changgang","family":"Zheng","sequence":"first","affiliation":[{"name":"Department of Engineering Science, University of Oxford, Oxford, U.K."}]},{"given":"Zhaoqi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, University of Cambridge, Cambridge, U.K."}]},{"given":"Thanh T.","family":"Bui","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, University of Cambridge, Cambridge, U.K."}]},{"given":"Siim","family":"Kaupmees","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, University of Cambridge, Cambridge, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0009-0005-0264-7830","authenticated-orcid":false,"given":"Riyad","family":"Bensoussane","sequence":"additional","affiliation":[{"name":"Department of Engineering Science, University of Oxford, Oxford, U.K."}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7912-5161","authenticated-orcid":false,"given":"Antoine","family":"Bernabeu","sequence":"additional","affiliation":[{"name":"Nantes Université, ècole Centrale Nantes, LS2N, CNRS, UMR 6004, Nantes, France"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0982-7894","authenticated-orcid":false,"given":"Shay","family":"Vargaftik","sequence":"additional","affiliation":[{"name":"VMware Research Group (by Broadcom), Tel Aviv, Israel"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3844-5940","authenticated-orcid":false,"given":"Yaniv","family":"Ben-Itzhak","sequence":"additional","affiliation":[{"name":"VMware Research Group (by Broadcom), Tel Aviv, Israel"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3655-2873","authenticated-orcid":false,"given":"Noa","family":"Zilberman","sequence":"additional","affiliation":[{"name":"Department of Engineering Science, University of Oxford, Oxford, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00059"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2019.8701189"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3173177"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3146347.3146356"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3242897"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2992106"},{"key":"ref9","first-page":"1","article-title":"In-band network telemetry via programmable dataplanes","volume-title":"Proc. ACM SIGCOMM","author":"Kim"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303979"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref12","first-page":"785","article-title":"Scaling distributed machine learning with in-network aggregation","volume-title":"Proc. NSDI","author":"Sapio"},{"key":"ref13","first-page":"741","article-title":"ATP: In-network aggregation for multi-tenant learning","volume-title":"Proc. NSDI","author":"Lao"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507726"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3473938.3474508"},{"key":"ref17","first-page":"513","article-title":"Re-architecting traffic analysis with neural network interface cards","volume-title":"Proc. NSDI","author":"Siracusano"},{"key":"ref18","first-page":"352","article-title":"Line-speed and scalable intrusion detection at the network edge via federated learning","volume-title":"Proc. IFIP Netw. Conf. (Networking)","author":"Qin"},{"key":"ref19","first-page":"279","article-title":"Accelerating distributed reinforcement learning with in-switch computing","volume-title":"Proc. ACM\/IEEE 46th Annu. Int. Symp. Comput. Archit. (ISCA)","author":"Li"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05440-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488840"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3229591.3229594"},{"key":"ref23","article-title":"PForest: In-network inference with random forests","author":"Busse-Grawitz","year":"2019","journal-title":"arXiv:1909.05680"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483356"},{"key":"ref25","volume-title":"P4_16 Tofino Native Architecture Application Note\u2014Public Version","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_15"},{"key":"ref28","first-page":"995","article-title":"In-network velocity control of industrial robot arms","volume-title":"Proc. NSDI","author":"Laki"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600435CM"},{"key":"ref30","volume-title":"New\u2014TLS Termination for Network Load Balancers","year":"2019"},{"key":"ref31","volume-title":"InsidePacket Extends SONiC Use Cases, Enabling New Edge-Cloud Network Services","year":"2020"},{"key":"ref32","first-page":"45","article-title":"Extending the range of P4 programmability","volume-title":"Proc. Keynote EuroP4","author":"Brebner"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365864"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775151"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3517207.3526970"},{"key":"ref36","first-page":"37","article-title":"Feature selection for classification: A review","volume-title":"Data Classification: Algorithms and Applications","author":"Tang","year":"2014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946704"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486011"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2014.61"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1201\/b12207"},{"key":"ref42","article-title":"Random forests","volume-title":"Machine Learning","author":"Breiman","year":"2001"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1108\/03684921311295547"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/321075.321084"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-5823.2001.tb00465.x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref47","article-title":"Automating in-network machine learning","author":"Zheng","year":"2022","journal-title":"arXiv:2205.08824"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637222"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3359993.3366646"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3289602.3293924"},{"key":"ref52","article-title":"IIsy: Practical in-network classification","author":"Zheng","year":"2022","journal-title":"arXiv:2205.08243"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref54","volume-title":"Jane Street Market Prediction","year":"2020"},{"key":"ref55","first-page":"1083","article-title":"Achieving 100 Gbps intrusion prevention on a single server","volume-title":"Proc. OSDI","author":"Zhao"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1017\/S0022109018001096"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061609"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821515"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"ref62","first-page":"6203","article-title":"An efficient design of intelligent network data plane","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Zhou"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982418"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3323771"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref66","first-page":"565","article-title":"Is advance knowledge of flow sizes a plausible assumption?","volume-title":"Proc. NSDI","author":"Duki\u0107"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904348"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2020.3005467"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking57963.2023.10186438"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN60470.2024.10494459"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3629136"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582022"},{"key":"ref73","first-page":"3829","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Liu"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2023.3344351"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081663"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1201\/9780429183942-11"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431315"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3546037.3546057"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR57248.2023.10147958"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10559910\/10439067.pdf?arnumber=10439067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T21:46:06Z","timestamp":1719351966000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10439067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":79,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3364757","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}