iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3365609.3365850
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T06:35:00Z","timestamp":1723790100402},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3365609.3365850","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["(Self) Driving Under the Influence"],"prefix":"10.1145","author":[{"given":"Roland","family":"Meier","sequence":"first","affiliation":[{"name":"ETH Z\u00fcrich"}]},{"given":"Thomas","family":"Holterbach","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich"}]},{"given":"Stephan","family":"Keck","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich"}]},{"given":"Matthias","family":"St\u00e4hli","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich"}]},{"given":"Vincent","family":"Lenders","sequence":"additional","affiliation":[{"name":"armasuisse"}]},{"given":"Ankit","family":"Singla","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich"}]},{"given":"Laurent","family":"Vanbever","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Platform Lab. 2019. https:\/\/platformlab.Stanford.edu\/platform-self-programming-networks.php. Platform Lab. 2019. https:\/\/platformlab.Stanford.edu\/platform-self-programming-networks.php."},{"key":"e_1_3_2_2_2_1","volume-title":"On the Performance Benefits of Multihoming Route Control","author":"Akella Aditya","unstructured":"Aditya Akella , Bruce Maggs , Srinivasan Seshan , and Anees Shaikh . On the Performance Benefits of Multihoming Route Control . IEEE\/ACM ToN '18. Aditya Akella, Bruce Maggs, Srinivasan Seshan, and Anees Shaikh. On the Performance Benefits of Multihoming Route Control. IEEE\/ACM ToN'18."},{"key":"e_1_3_2_2_3_1","volume-title":"Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey","author":"Akhtar N.","unstructured":"N. Akhtar and A. Mian . Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey . IEEE Access' 18. N. Akhtar and A. Mian. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey. IEEE Access'18."},{"key":"e_1_3_2_2_4_1","volume-title":"USENIX NSDI'20","author":"Alcoz Albert Gran","unstructured":"Albert Gran Alcoz , Alexander Dietm\u00fcller , and Laurent Vanbever . SP-PIFO : Approximating Push-In First-Out Behaviors using Strict-Priority Queues . In USENIX NSDI'20 . Albert Gran Alcoz, Alexander Dietm\u00fcller, and Laurent Vanbever. SP-PIFO: Approximating Push-In First-Out Behaviors using Strict-Priority Queues. In USENIX NSDI'20."},{"key":"e_1_3_2_2_5_1","volume-title":"Robert Morris. Resilient Overlay Networks. In SOSP'01","author":"Andersen David","unstructured":"David Andersen , Hari Balakrishnan , Frans Kaashoek , and Robert Morris. Resilient Overlay Networks. In SOSP'01 . David Andersen, Hari Balakrishnan, Frans Kaashoek, and Robert Morris. Resilient Overlay Networks. In SOSP'01."},{"key":"e_1_3_2_2_6_1","volume-title":"ACM SIGCOMM CCR'14","author":"Bosshart Pat","unstructured":"Pat Bosshart , Dan Daly , Glen Gibb , Martin Izzard , Nick McKeown , Jennifer Rexford , Cole Schlesinger , Dan Talayco , Amin Vahdat , George Varghese , and David Walker . P4 : Programming protocol-independent packet processors . ACM SIGCOMM CCR'14 . Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, and David Walker. P4: Programming protocol-independent packet processors. ACM SIGCOMM CCR'14."},{"key":"e_1_3_2_2_7_1","volume-title":"Speed Matters for Google Web Search","author":"Brutlag Jake","year":"2009","unstructured":"Jake Brutlag . Speed Matters for Google Web Search . 2009 . https:\/\/services.google.com\/fh\/files\/blogs\/google_delayexp.pdf. Jake Brutlag. Speed Matters for Google Web Search. 2009. https:\/\/services.google.com\/fh\/files\/blogs\/google_delayexp.pdf."},{"key":"e_1_3_2_2_8_1","unstructured":"CAIDA. The CAIDA UCSD Anonymized 2013\/2014\/2015\/2016\/2018 Internet Traces. http:\/\/www.caida.org\/data\/passive\/passive_2013_dataset.xml. CAIDA. The CAIDA UCSD Anonymized 2013\/2014\/2015\/2016\/2018 Internet Traces. http:\/\/www.caida.org\/data\/passive\/passive_2013_dataset.xml."},{"key":"e_1_3_2_2_9_1","volume-title":"CAM Overflow - CCNP Security Secure 642--637 Quick Reference: Cisco Layer 2 Security","author":"CISCO.","year":"2011","unstructured":"CISCO. CAM Overflow - CCNP Security Secure 642--637 Quick Reference: Cisco Layer 2 Security . 2011 . http:\/\/www.ciscopress.com\/articles\/article.asp?p=1681033&seqNum=2. CISCO. CAM Overflow - CCNP Security Secure 642--637 Quick Reference: Cisco Layer 2 Security. 2011. http:\/\/www.ciscopress.com\/articles\/article.asp?p=1681033&seqNum=2."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863957"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.022"},{"key":"e_1_3_2_2_12_1","unstructured":"Scott A. Crosby and Dan S. Wallach. Denial of Service via Algorithmic Complexity Attacks. In USENIX Security'03. Scott A. Crosby and Dan S. Wallach. Denial of Service via Algorithmic Complexity Attacks. In USENIX Security'03."},{"key":"e_1_3_2_2_13_1","volume-title":"Michael Schapira. PCC: Re-architecting Congestion Control for Consistent High Performance. In USENIX NSDI'15","author":"Dong Mo","unstructured":"Mo Dong , Qingxi Li , Doron Zarchy , P Brighten Godfrey , and Michael Schapira. PCC: Re-architecting Congestion Control for Consistent High Performance. In USENIX NSDI'15 . Mo Dong, Qingxi Li, Doron Zarchy, P Brighten Godfrey, and Michael Schapira. PCC: Re-architecting Congestion Control for Consistent High Performance. In USENIX NSDI'15."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"e_1_3_2_2_15_1","volume-title":"arXiv","author":"Feamster Nick","year":"2017","unstructured":"Nick Feamster and Jennifer Rexford . Why (and how) networks should run themselves. arXiv , 2017 . Nick Feamster and Jennifer Rexford. Why (and how) networks should run themselves. arXiv, 2017."},{"key":"e_1_3_2_2_16_1","volume-title":"ACM SOSR '18","author":"Freire Lucas","unstructured":"Lucas Freire , Miguel Neves , Lucas Leal , Kirill Levchenko , Alberto Schaeffer-Filho , and Marinho Barcellos . Uncovering bugs in p4 programs with assertion-based verification . In ACM SOSR '18 . Lucas Freire, Miguel Neves, Lucas Leal, Kirill Levchenko, Alberto Schaeffer-Filho, and Marinho Barcellos. Uncovering bugs in p4 programs with assertion-based verification. In ACM SOSR '18."},{"key":"e_1_3_2_2_17_1","volume-title":"The Power of Evil Choices in Bloom Filters. In IEEE\/IFIP International Conference on Dependable Systems and Networks.","author":"Gerbet T.","year":"2015","unstructured":"T. Gerbet , A. Kumar , and C. Lauradoux . The Power of Evil Choices in Bloom Filters. In IEEE\/IFIP International Conference on Dependable Systems and Networks. 2015 . T. Gerbet, A. Kumar, and C. Lauradoux. The Power of Evil Choices in Bloom Filters. In IEEE\/IFIP International Conference on Dependable Systems and Networks. 2015."},{"key":"e_1_3_2_2_18_1","volume-title":"Jennifer Rexford. Dapper: Data Plane Performance Diagnosis of TCP. In ACM SOSR '17","author":"Ghasemi Mojgan","unstructured":"Mojgan Ghasemi , Theophilus Benson , and Jennifer Rexford. Dapper: Data Plane Performance Diagnosis of TCP. In ACM SOSR '17 . Mojgan Ghasemi, Theophilus Benson, and Jennifer Rexford. Dapper: Data Plane Performance Diagnosis of TCP. In ACM SOSR '17."},{"key":"e_1_3_2_2_19_1","volume-title":"ACM SIGCOMM CCR'11","author":"Goldberg Sharon","unstructured":"Sharon Goldberg , Michael Schapira , Peter Hummon , and Jennifer Rexford . How secure are secure interdomain routing protocols . ACM SIGCOMM CCR'11 . Sharon Goldberg, Michael Schapira, Peter Hummon, and Jennifer Rexford. How secure are secure interdomain routing protocols. ACM SIGCOMM CCR'11."},{"key":"e_1_3_2_2_20_1","volume-title":"RFC 5927 - ICMP Attacks against TCP","author":"Gont F.","year":"2010","unstructured":"F. Gont . RFC 5927 - ICMP Attacks against TCP . 2010 . https:\/\/tools.ietf.org\/html\/rfc5927. F. Gont. RFC 5927 - ICMP Attacks against TCP. 2010. https:\/\/tools.ietf.org\/html\/rfc5927."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"e_1_3_2_2_22_1","volume-title":"TCP\/IP security threats and attack methods. Computer Communications","author":"Harris B.","year":"1999","unstructured":"B. Harris and R. Hunt . TCP\/IP security threats and attack methods. Computer Communications . 1999 . B. Harris and R. Hunt. TCP\/IP security threats and attack methods. Computer Communications. 1999."},{"key":"e_1_3_2_2_23_1","volume-title":"USENIX NSDI'19","author":"Holterbach Thomas","unstructured":"Thomas Holterbach , Edgar Costa Molero , Maria Apostolaki , Alberto Dainotti , Stefano Vissicchio , and Laurent Vanbever . Blink : Fast connectivity recovery entirely in the data plane . In USENIX NSDI'19 . Thomas Holterbach, Edgar Costa Molero, Maria Apostolaki, Alberto Dainotti, Stefano Vissicchio, and Laurent Vanbever. Blink: Fast connectivity recovery entirely in the data plane. In USENIX NSDI'19."},{"key":"e_1_3_2_2_24_1","volume-title":"David Walker. Contra: A Programmable System for Performance-aware Routing. In USENIX NSDI'20","author":"Hsu Kuo-Feng","unstructured":"Kuo-Feng Hsu , Ryan Beckett , Ang Chen , Jennifer Rexford , Praveen Tammana , and David Walker. Contra: A Programmable System for Performance-aware Routing. In USENIX NSDI'20 . Kuo-Feng Hsu, Ryan Beckett, Ang Chen, Jennifer Rexford, Praveen Tammana, and David Walker. Contra: A Programmable System for Performance-aware Routing. In USENIX NSDI'20."},{"key":"e_1_3_2_2_25_1","volume-title":"Generating adversarial malware examples for black-box attacks based on GAN. arXiv","author":"Hu Weiwei","year":"2017","unstructured":"Weiwei Hu and Ying Tan . Generating adversarial malware examples for black-box attacks based on GAN. arXiv , 2017 . Weiwei Hu and Ying Tan. Generating adversarial malware examples for black-box attacks based on GAN. arXiv, 2017."},{"key":"e_1_3_2_2_26_1","volume-title":"Congestion Avoidance and Control. ACM SIGCOMM CCR'1988","author":"Jacobson V.","unstructured":"V. Jacobson . Congestion Avoidance and Control. ACM SIGCOMM CCR'1988 . V. Jacobson. Congestion Avoidance and Control. ACM SIGCOMM CCR'1988."},{"key":"e_1_3_2_2_27_1","volume-title":"Data-Driven Networking: Harnessing the \"Unreasonable Effectiveness of Data\" in Network Design","author":"Jiang Junchen","year":"2016","unstructured":"Junchen Jiang , Vyas Sekar , Ion Stoica , and Hui Zhang . Data-Driven Networking: Harnessing the \"Unreasonable Effectiveness of Data\" in Network Design . 2016 . Junchen Jiang, Vyas Sekar, Ion Stoica, and Hui Zhang. Data-Driven Networking: Harnessing the \"Unreasonable Effectiveness of Data\" in Network Design. 2016."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67235-9_9"},{"key":"e_1_3_2_2_29_1","volume-title":"USENIX NSDI'17","author":"Jiang Junchen","unstructured":"Junchen Jiang , Shijie Sun , Vyas Sekar , and Hui Zhang . Pytheas : Enabling data-driven quality of experience optimization using group-based exploration-exploitation . In USENIX NSDI'17 . Junchen Jiang, Shijie Sun, Vyas Sekar, and Hui Zhang. Pytheas: Enabling data-driven quality of experience optimization using group-based exploration-exploitation. In USENIX NSDI'17."},{"key":"e_1_3_2_2_30_1","volume-title":"fast and slow","author":"Kahneman Daniel","year":"2011","unstructured":"Daniel Kahneman . Thinking , fast and slow . 2011 . Macmillan . Daniel Kahneman. Thinking, fast and slow. 2011. Macmillan."},{"key":"e_1_3_2_2_31_1","volume-title":"USENIX Workshop on Cyber Security Experimentation and Test.","author":"Kang Qiao","year":"2019","unstructured":"Qiao Kang , Jiarong Xing , and Ang Chen . Automated attack discovery in data plane systems . In USENIX Workshop on Cyber Security Experimentation and Test. 2019 . Qiao Kang, Jiarong Xing, and Ang Chen. Automated attack discovery in data plane systems. In USENIX Workshop on Cyber Security Experimentation and Test. 2019."},{"key":"e_1_3_2_2_32_1","volume-title":"Owning the Routing Table New OSPF Attacks. BlackHat Briefings and Trainings USA+","author":"Kirshon Alex","year":"2011","unstructured":"Alex Kirshon , Dima Gonikman , and Gabi Nakibly . Owning the Routing Table New OSPF Attacks. BlackHat Briefings and Trainings USA+ . 2011 . Alex Kirshon, Dima Gonikman, and Gabi Nakibly. Owning the Routing Table New OSPF Attacks. BlackHat Briefings and Trainings USA+. 2011."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863966"},{"key":"e_1_3_2_2_34_1","unstructured":"Bob Lantz Brandon Heller and Nick McKeown. A Network in a Laptop: Rapid Prototyping for Software-defined Networks. In HotNets'10. Bob Lantz Brandon Heller and Nick McKeown. A Network in a Laptop: Rapid Prototyping for Software-defined Networks. In HotNets'10."},{"key":"e_1_3_2_2_35_1","unstructured":"Yuliang Li Rui Miao Changhoon Kim and Minlan Yu. LossRadar: Fast Detection of Lost Packets in Data Center Networks. In ACM CoNEXT'16. Yuliang Li Rui Miao Changhoon Kim and Minlan Yu. LossRadar: Fast Detection of Lost Packets in Data Center Networks. In ACM CoNEXT'16."},{"key":"e_1_3_2_2_36_1","volume-title":"Minlan Yu. FlowRadar: A Better NetFlow for Data Centers. In USENIX NSDI'16","author":"Li Yuliang","unstructured":"Yuliang Li , Rui Miao , Changhoon Kim , and Minlan Yu. FlowRadar: A Better NetFlow for Data Centers. In USENIX NSDI'16 . Yuliang Li, Rui Miao, Changhoon Kim, and Minlan Yu. FlowRadar: A Better NetFlow for Data Centers. In USENIX NSDI'16."},{"key":"e_1_3_2_2_37_1","volume-title":"ACM SIGCOMM'18","author":"Liu Jed","unstructured":"Jed Liu , William Hallahan , Cole Schlesinger , Milad Sharif , Jeongkeun Lee , Robert Soul\u00e9 , Han Wang , C\u0103lin Ca\u015fcaval , Nick McKeown , and Nate Foster . P4V : Practical Verification for Programmable Data Planes . In ACM SIGCOMM'18 . Jed Liu, William Hallahan, Cole Schlesinger, Milad Sharif, Jeongkeun Lee, Robert Soul\u00e9, Han Wang, C\u0103lin Ca\u015fcaval, Nick McKeown, and Nate Foster. P4V: Practical Verification for Programmable Data Planes. In ACM SIGCOMM'18."},{"key":"e_1_3_2_2_38_1","volume-title":"ACM SIGCOMM'13","author":"Lychev Robert","unstructured":"Robert Lychev , Sharon Goldberg , and Michael Schapira . BGP Security in Partial Deployment: Is the Juice Worth the Squeeze? . In ACM SIGCOMM'13 . Robert Lychev, Sharon Goldberg, and Michael Schapira. BGP Security in Partial Deployment: Is the Juice Worth the Squeeze?. In ACM SIGCOMM'13."},{"key":"e_1_3_2_2_39_1","volume-title":"ACM SIGCOMM'17","author":"Mao Hongzi","unstructured":"Hongzi Mao , Ravi Netravali , and Mohammad Alizadeh . Neural adaptive video streaming with pensieve . In ACM SIGCOMM'17 . Hongzi Mao, Ravi Netravali, and Mohammad Alizadeh. Neural adaptive video streaming with pensieve. In ACM SIGCOMM'17."},{"key":"e_1_3_2_2_40_1","unstructured":"Roland Meier Petar Tsankov Vincent Lenders Laurent Vanbever and Martin Vechev. NetHide: Secure and Practical Network Topology Obfuscation. In USENIX Security'18. Roland Meier Petar Tsankov Vincent Lenders Laurent Vanbever and Martin Vechev. NetHide: Secure and Practical Network Topology Obfuscation. In USENIX Security'18."},{"key":"e_1_3_2_2_41_1","volume-title":"ACM SIGCOMM CCR'17","author":"Mestres Albert","unstructured":"Albert Mestres , Alberto Rodriguez-Natal , Josep Carner , Pere Barlet-Ros , Eduard Alarc\u00f3n , Marc Sol\u00e9 , Victor Munt\u00e9s-Mulero , David Meyer , Sharon Barkai , Mike J Hibbett , Knowledge-defined networking . In ACM SIGCOMM CCR'17 . Albert Mestres, Alberto Rodriguez-Natal, Josep Carner, Pere Barlet-Ros, Eduard Alarc\u00f3n, Marc Sol\u00e9, Victor Munt\u00e9s-Mulero, David Meyer, Sharon Barkai, Mike J Hibbett, et al. Knowledge-defined networking. In ACM SIGCOMM CCR'17."},{"key":"e_1_3_2_2_42_1","volume-title":"ACM SIGCOMM'17","author":"Miao Rui","unstructured":"Rui Miao , Hongyi Zeng , Changhoon Kim , Jeongkeun Lee , and Minlan Yu. SilkRoad : Making Stateful Layer-4 Load Balancing Fast and Cheap Using Switching ASICs . In ACM SIGCOMM'17 . Rui Miao, Hongyi Zeng, Changhoon Kim, Jeongkeun Lee, and Minlan Yu. SilkRoad: Making Stateful Layer-4 Load Balancing Fast and Cheap Using Switching ASICs. In ACM SIGCOMM'17."},{"key":"e_1_3_2_2_43_1","unstructured":"Edgar Costa Molero Stefano Vissicchio and Laurent Vanbever. Hardware-accelerated network control planes. In HotNets'18. Edgar Costa Molero Stefano Vissicchio and Laurent Vanbever. Hardware-accelerated network control planes. In HotNets'18."},{"key":"e_1_3_2_2_44_1","volume-title":"ACM SOSR'18","author":"N\u00f6tzli Andres","unstructured":"Andres N\u00f6tzli , Jehandad Khan , Andy Fingerhut , Clark Barrett , and Peter Athanas . P4Pktgen : Automated Test Case Generation for P4 Programs . In ACM SOSR'18 . Andres N\u00f6tzli, Jehandad Khan, Andy Fingerhut, Clark Barrett, and Peter Athanas. P4Pktgen: Automated Test Case Generation for P4 Programs. In ACM SOSR'18."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Fabien A. P. Petitcolas. Kerckhoffs' Principle. Springer US. 2011. Fabien A. P. Petitcolas. Kerckhoffs' Principle. Springer US. 2011.","DOI":"10.1007\/978-1-4419-5906-5_487"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229591.3229594"},{"key":"e_1_3_2_2_47_1","unstructured":"Amedeo Sapio Ibrahim Abdelaziz Abdulla Aldilaijan Marco Canini and Panos Kalnis. In-Network Computation is a Dumb Idea Whose Time Has Come. In HotNets'17. Amedeo Sapio Ibrahim Abdelaziz Abdulla Aldilaijan Marco Canini and Panos Kalnis. In-Network Computation is a Dumb Idea Whose Time Has Come. In HotNets'17."},{"key":"e_1_3_2_2_48_1","volume-title":"ACM SIGCOMM CCR'99","author":"Savage Stefan","unstructured":"Stefan Savage , Neal Cardwell , David Wetherall , and Tom Anderson . TCP congestion control with a misbehaving receiver . ACM SIGCOMM CCR'99 . Stefan Savage, Neal Cardwell, David Wetherall, and Tom Anderson. TCP congestion control with a misbehaving receiver. ACM SIGCOMM CCR'99."},{"key":"e_1_3_2_2_49_1","volume-title":"ACM SIGCOMM'17","author":"Schlinker Brandon","unstructured":"Brandon Schlinker , Hyojeong Kim , Timothy Cui , Ethan Katz-Bassett , Harsha V. Madhyastha , Italo Cunha , James Quinn , Saif Hasan , Petr Lapukhov , and Hongyi Zeng . Engineering Egress with Edge Fabric: Steering Oceans of Content to the World . In ACM SIGCOMM'17 . Brandon Schlinker, Hyojeong Kim, Timothy Cui, Ethan Katz-Bassett, Harsha V. Madhyastha, Italo Cunha, James Quinn, Saif Hasan, Petr Lapukhov, and Hongyi Zeng. Engineering Egress with Edge Fabric: Steering Oceans of Content to the World. In ACM SIGCOMM'17."},{"key":"e_1_3_2_2_50_1","volume-title":"ACM CCS'16","author":"Sharif Mahmood","unstructured":"Mahmood Sharif , Sruti Bhagavatula , Lujo Bauer , and Michael K Reiter . Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition . In ACM CCS'16 . Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K Reiter. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In ACM CCS'16."},{"key":"e_1_3_2_2_51_1","volume-title":"In-network Neural Networks. arXiv","author":"Siracusano Giuseppe","year":"2018","unstructured":"Giuseppe Siracusano and Roberto Bifulco . In-network Neural Networks. arXiv , 2018 . Giuseppe Siracusano and Roberto Bifulco. In-network Neural Networks. arXiv, 2018."},{"key":"e_1_3_2_2_52_1","volume-title":"Programs with Vera. In ACM SIGCOMM'18","author":"Stoenescu Radu","unstructured":"Radu Stoenescu , Dragos Dumitrescu , Matei Popovici , Lorina Negreanu , and Costin Raiciu . Debugging P4 Programs with Vera. In ACM SIGCOMM'18 . Radu Stoenescu, Dragos Dumitrescu, Matei Popovici, Lorina Negreanu, and Costin Raiciu. Debugging P4 Programs with Vera. In ACM SIGCOMM'18."},{"key":"e_1_3_2_2_53_1","volume-title":"Ala Al-Fuqaha. Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward. In IEEE Conference on Local Computer Networks Workshops.","author":"Usama Muhammad","year":"2018","unstructured":"Muhammad Usama , Junaid Qadir , and Ala Al-Fuqaha. Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward. In IEEE Conference on Local Computer Networks Workshops. 2018 . Muhammad Usama, Junaid Qadir, and Ala Al-Fuqaha. Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward. In IEEE Conference on Local Computer Networks Workshops. 2018."},{"key":"e_1_3_2_2_54_1","unstructured":"Asaf Valadarsky Michael Schapira Dafna Shahaf and Aviv Tamar. Learning to Route. In HotNets'17. Asaf Valadarsky Michael Schapira Dafna Shahaf and Aviv Tamar. Learning to Route. In HotNets'17."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49674-9_51"},{"key":"e_1_3_2_2_56_1","volume-title":"ACM SIGCOMM'15","author":"Vissicchio Stefano","unstructured":"Stefano Vissicchio , Olivier Tilmans , Laurent Vanbever , and Jennifer Rexford . Central control over distributed routing . In ACM SIGCOMM'15 . Stefano Vissicchio, Olivier Tilmans, Laurent Vanbever, and Jennifer Rexford. Central control over distributed routing. In ACM SIGCOMM'15."},{"key":"e_1_3_2_2_57_1","volume-title":"NDSS'16","author":"Xu Weilin","unstructured":"Weilin Xu , Yanjun Qi , and David Evans . Automatically evading classifiers . In NDSS'16 . Weilin Xu, Yanjun Qi, and David Evans. Automatically evading classifiers. In NDSS'16."},{"key":"e_1_3_2_2_58_1","volume-title":"IEEE INFOCOM'18","author":"Xu Zhiyuan","unstructured":"Zhiyuan Xu , Jian Tang , Jingsong Meng , Weiyi Zhang , Yanzhi Wang , Chi Harold Liu , and Dejun Yang . Experience-driven networking : A deep reinforcement learning based approach . In IEEE INFOCOM'18 . Zhiyuan Xu, Jian Tang, Jingsong Meng, Weiyi Zhang, Yanzhi Wang, Chi Harold Liu, and Dejun Yang. Experience-driven networking: A deep reinforcement learning based approach. In IEEE INFOCOM'18."},{"key":"e_1_3_2_2_59_1","volume-title":"A Novel Framework of Data-Driven Networking","author":"Yao H.","unstructured":"H. Yao , C. Qiu , C. Fang , X. Chen , and F. R. Yu . A Novel Framework of Data-Driven Networking . IEEE Access' 16. H. Yao, C. Qiu, C. Fang, X. Chen, and F. R. Yu. A Novel Framework of Data-Driven Networking. IEEE Access'16."},{"key":"e_1_3_2_2_60_1","volume-title":"Reliability and Programmability for Global Internet Peering. In ACM SIGCOMM'17","author":"KK","unstructured":"KK Yap et al. Taking the Edge off with Espresso: Scale , Reliability and Programmability for Global Internet Peering. In ACM SIGCOMM'17 . KK Yap et al. Taking the Edge off with Espresso: Scale, Reliability and Programmability for Global Internet Peering. In ACM SIGCOMM'17."}],"event":{"name":"HotNets '19: The 18th ACM Workshop on Hot Topics in Networks","location":"Princeton NJ USA","acronym":"HotNets '19","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 18th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365609.3365850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T06:43:59Z","timestamp":1673419439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365609.3365850"}},"subtitle":["Intoxicating Adversarial Network Inputs"],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":60,"alternative-id":["10.1145\/3365609.3365850","10.1145\/3365609"],"URL":"http:\/\/dx.doi.org\/10.1145\/3365609.3365850","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}