Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 5Pages 5505–5520https://doi.org/10.1109/TNSM.2024.3427403In-band Network Telemetry (INT) has emerged as a promising network measurement technology. However, existing network telemetry systems lack the flexibility to meet diverse telemetry requirements and are also difficult to adapt to dynamic network ...
- research-articleJuly 2024
Reinforcement Learning-Based Online Scheduling of Multiple Workflows in Edge Environment
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 5Pages 5691–5706https://doi.org/10.1109/TNSM.2024.3428496In edge environment, many smart application instances are triggered randomly by resource-constrained Internet of Things (IoT) devices. These application instances usually consist of dependent computation components, which can be modeled as workflows in ...
- research-articleJuly 2024
Service Function Chain Scheduling Under the Multi-Cloud Collaborative Service of Information Networks Used for Cross-Domain Remote Surgery
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 4Pages 4598–4612https://doi.org/10.1109/TNSM.2024.3424297Remote surgery is an emerging medical business derived from information networking technology and plays an increasingly essential role in the medical system. In remote surgery, it is imperative to facilitate cross-regional information transmission and ...
- research-articleJune 2024
MEC Network Slicing: Stackelberg-Game-Based Slice Pricing and Resource Allocation With QoS Guarantee
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 4Pages 4494–4509https://doi.org/10.1109/TNSM.2024.3409277In multi-access edge computing (MEC) networks, network slicing enables the MEC network service provider (MEC-NSP) to provide customizable MEC services for user devices (UDs) with diverse QoS (Quality of Service) demands. In MEC network slicing, slice ...
- research-articleJune 2024
Cost and Latency Customized SFC Deployment in Hybrid VNF and PNF Environment
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 4Pages 4312–4331https://doi.org/10.1109/TNSM.2024.3415174The SFC deployment problem has proved to be NP-hard and has attracted great research interests. At present, most existing studies focus on deploying SFC through virtual network functions (VNFs) and few studies involve hybrid VNF and physical network ...
-
- research-articleMay 2024
A QoS Guaranteed Efficient Integration of UPF and LEO Satellite Networks
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 4Pages 3727–3739https://doi.org/10.1109/TNSM.2024.3400255Integrating the User Plane Function (UPF), which is responsible for forwarding user data in 5G, with the Low Earth Orbit (LEO) satellite networks can facilitate communication among users and take advantage of satellite edge computing. Satellite UPF (S-UPF)...
- research-articleApril 2024
Joint Bandwidth and Key on Demand (BKoD) Provisioning for Dynamic Service of Optical Transport Networks in F6G
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 3Pages 3080–3094https://doi.org/10.1109/TNSM.2024.3387758In the sixth-generation fixed network (F6G), network security becomes an important topic. Encryption is an effective method to prevent network attacks and realize network security. Quantum key distribution (QKD) is a promising technology to effectively ...
- research-articleApril 2024
A Lightweight Intrusion Detection System Using a Finite Dirichlet Mixture Model With Extended Stochastic Variational Inference
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 4Pages 4701–4712https://doi.org/10.1109/TNSM.2024.3391250With the rapid development of the Internet worldwide, network security issues are becoming increasingly prominent. Network intrusion detection systems (NIDSs) play a vital role in ensuring computer network security due to their ability to identify ...
- research-articleApril 2024
A Semantic Detection Method for Network Flows With Global and Generalized Nature
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 4Pages 4713–4730https://doi.org/10.1109/TNSM.2024.3390180Network threat detection and identification are essential tasks in the defense of cyberspace. However, current network threat detection methods have limitations such as narrow feature extraction, targeted feature effects, and limited generalization ...
- research-articleMarch 2024
Breaking the Inertial Thinking: Non-Blocking Multipath Congestion Control Based on the Single-Subflow Reinforcement Learning Model
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 3Pages 2876–2887https://doi.org/10.1109/TNSM.2024.3380049The Multipath TCP (MPTCP) protocol has received more attention due to the increasing number of terminals with multiple network interfaces. To meet the higher network performance demand of terminal services, many researches leverage reinforcement learning (...
- research-articleMarch 2024
MEC-Based Super-Resolution Enhanced Adaptive Video Streaming Optimization for Mobile Networks With Satellite Backhaul
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 3Pages 2977–2991https://doi.org/10.1109/TNSM.2024.3377693Using satellite communications as backhaul links facilitates extending network coverage to unconnected areas. However, providing high-quality video streaming service via satellite backhaul is not economical. This paper presents SatSR, a mobile edge ...
- research-articleJanuary 2024
KimeraPAD: A Novel Low-Overhead Real-Time Defense Against Website Fingerprinting Attacks Based on Deep Reinforcement Learning
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 3Pages 2944–2961https://doi.org/10.1109/TNSM.2024.3360082The onion router (Tor) is a network system for anonymous communication. However, website fingerprinting (WF) attacks have threatened the anonymity of Tor. WF attackers can passively monitor and collect traffic, classify the victims’ traffic based ...
- research-articleJanuary 2024
Reinforcement Learning Meets Network Intrusion Detection: A Transferable and Adaptable Framework for Anomaly Behavior Identification
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 2Pages 2477–2492https://doi.org/10.1109/TNSM.2024.3352586Anomaly detection plays an essential role in network security and traffic classification. Many studies have focused on anomaly detection to improve network security, including machine learning and deep learning methods. These methods often require ...
- research-articleJanuary 2024
Computation-Aware Link Repair for Large-Scale Damage in Distributed Cloud Networks
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 5Pages 4988–5000https://doi.org/10.1109/TNSM.2024.3351860Due to the distributed deployment and inter-network dependence, distributed cloud network (DCN) is vulnerable to large-scale damage, making emergent system recovery of vital importance. Given limited resources at an early stage of network recovery, we ...
- research-articleJanuary 2024
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 2Pages 2460–2476https://doi.org/10.1109/TNSM.2024.3350080Encrypted Traffic Classification (ETC) is crucial for network security management and Quality of Service (QoS) improvement. There have been many attempts to tackle various ETC tasks, however, which generally suffer from task dependency and limited ...
- research-articleNovember 2023
Multi-Source Log Parsing With Pre-Trained Domain Classifier
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 3Pages 2651–2663https://doi.org/10.1109/TNSM.2023.3329144Automated log analysis with AI technologies is commonly used in network, system, and service operation and maintenance to ensure reliability and quality assurance. Log parsing serves as an essential primary stage in log analysis, where unstructured logs ...
- research-articleOctober 2023
Latency-Sensitive Parallel Multi-Path Service Flow Routing With Segmented VNF Processing in NFV-Enabled Networks
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 2Pages 2211–2223https://doi.org/10.1109/TNSM.2023.3328644In the context of Software Defined Networking (SDN) scenarios, the deployment of multi-path routing has been trending as one of the practical approaches. It serves the two-fold objective of improving the reliability of Service Function Chains (SFCs) and ...
- research-articleSeptember 2023
A Stateless Design of Satellite–Terrestrial Integrated Core Network and Its Deployment Strategy
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 1Pages 953–966https://doi.org/10.1109/TNSM.2023.3318569Integrating terrestrial cellular network with Low Earth Orbit (LEO) satellite constellation has been a popular trend in beyond 5G and 6G eras, called Satellite-Terrestrial Integrated Core Network (STICN). Core Network (CN) is an essential component ...
- research-articleSeptember 2023
Task Offloading Control and Customized Workload Scheduling in Multi-Layer Cloud Networks
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 1Pages 714–728https://doi.org/10.1109/TNSM.2023.3317810Recent advances in Cloud Computing have shown great power in enhancing intelligent devices to support various applications. Nevertheless, conventional Cloud Computing fails to keep up with the ever-advancing requirements of efficient task execution, ...
- research-articleSeptember 2023
Multi-Visual-GRU-Based Survivable Computing Power Scheduling in Metro Optical Networks
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 1Pages 1302–1315https://doi.org/10.1109/TNSM.2023.3314272The computing power network (CPN) has emerged as a promising networking paradigm in recent times. Since the characteristics of high bandwidth, low delay and high reliable communication, optical networks have been identified as potential frameworks for ...