Digital twin network: Opportunities and challenges

P Almasan, M Ferriol-Galmés, J Paillisse… - arxiv preprint arxiv …, 2022 - arxiv.org
The proliferation of emergent network applications (eg, AR/VR, telesurgery, real-time
communications) is increasing the difficulty of managing modern communication networks …

Advanced deep learning models for 6G: overview, opportunities and challenges

L Jiao, Y Shao, L Sun, F Liu, S Yang, W Ma, L Li… - IEEE …, 2024 - ieeexplore.ieee.org
The advent of the sixth generation of mobile communications (6G) ushers in an era of
heightened demand for advanced network intelligence to tackle the challenges of an …

XAI meets mobile traffic classification: Understanding and improving multimodal deep learning architectures

A Nascita, A Montieri, G Aceto… - … on Network and …, 2021 - ieeexplore.ieee.org
The increasing diffusion of mobile devices has dramatically changed the network traffic
landscape, with Traffic Classification (TC) surging into a fundamental role while facing new …

Netllm: Adapting large language models for networking

D Wu, X Wang, Y Qiao, Z Wang, J Jiang, S Cui… - Proceedings of the …, 2024 - dl.acm.org
Many networking tasks now employ deep learning (DL) to solve complex prediction and
optimization problems. However, current design philosophy of DL-based algorithms entails …

Network planning with deep reinforcement learning

H Zhu, V Gupta, SS Ahuja, Y Tian, Y Zhang… - Proceedings of the 2021 …, 2021 - dl.acm.org
Network planning is critical to the performance, reliability and cost of web services. This
problem is typically formulated as an Integer Linear Programming (ILP) problem. Today's …

AI/ML for network security: The emperor has no clothes

AS Jacobs, R Beltiukov, W Willinger… - Proceedings of the …, 2022 - dl.acm.org
Several recent research efforts have proposed Machine Learning (ML)-based solutions that
can detect complex patterns in network traffic for a wide range of network security problems …

Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications

D Han, Z Wang, W Chen, Y Zhong, S Wang… - Proceedings of the …, 2021 - dl.acm.org
Unsupervised Deep Learning (DL) techniques have been widely used in various security-
related anomaly detection applications, owing to the great promise of being able to detect …

Mousika: Enable general in-network intelligence in programmable switches by knowledge distillation

G **e, Q Li, Y Dong, G Duan, Y Jiang… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Given the power efficiency and Tbps throughput of packet processing, several works are
proposed to offload the decision tree (DT) to programmable switches, ie, in-network …

Learning tailored adaptive bitrate algorithms to heterogeneous network conditions: A domain-specific priors and meta-reinforcement learning approach

T Huang, C Zhou, RX Zhang, C Wu… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Internet adaptive video streaming is a typical form of video delivery that leverages adaptive
bitrate (ABR) algorithms to provide video services with high quality of experience (QoE) for …

Unveiling the potential of graph neural networks for robust intrusion detection

D Pujol-Perich, J Suárez-Varela… - ACM SIGMETRICS …, 2022 - dl.acm.org
The last few years have seen an increasing wave of attacks with serious economic and
privacy damages, which evinces the need for accurate Network Intrusion Detection Systems …