{"id":"https://openalex.org/W4390189633","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361471","title":"Traffic Matrix Prediction Based on Cross Aggregate GNN","display_name":"Traffic Matrix Prediction Based on Cross Aggregate GNN","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390189633","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361471"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361471","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101516220","display_name":"Jing Tao","orcid":"https://orcid.org/0009-0009-3911-4260"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Tao","raw_affiliation_strings":["Shenzhen Research Institute Xi&#x2019;an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Research Institute Xi&#x2019;an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060703498","display_name":"Ken Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ken Cao","raw_affiliation_strings":["Xi&#x2019; an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019; an,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019; an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019; an,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101384371","display_name":"Teng Liu","orcid":"https://orcid.org/0009-0004-3203-9804"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Teng Liu","raw_affiliation_strings":["Xi&#x2019; an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019; an,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019; an Jiaotong University,Ministry of Education Key Lab For Intelligent Networks and Network Security,Xi&#x2019; an,China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101516220"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.5231,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.73359339,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"0234","last_page":"0239"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7552229166030884},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.7011280655860901},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.6330301761627197},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5945020318031311},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5372422337532043},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5139879584312439},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48564302921295166},{"id":"https://openalex.org/keywords/network-traffic-simulation","display_name":"Network traffic simulation","score":0.4384247362613678},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3599358797073364},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2546238899230957},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.247467041015625},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.24544179439544678},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.10053890943527222},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0927932858467102}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7552229166030884},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.7011280655860901},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.6330301761627197},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5945020318031311},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5372422337532043},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5139879584312439},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48564302921295166},{"id":"https://openalex.org/C94168897","wikidata":"https://www.wikidata.org/wiki/Q574324","display_name":"Network traffic simulation","level":4,"score":0.4384247362613678},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3599358797073364},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2546238899230957},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.247467041015625},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.24544179439544678},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.10053890943527222},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0927932858467102},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361471","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1566674360","https://openalex.org/W1969542646","https://openalex.org/W1996256549","https://openalex.org/W2069354103","https://openalex.org/W2096655151","https://openalex.org/W2138169724","https://openalex.org/W2162609511","https://openalex.org/W2194775991","https://openalex.org/W2747329762","https://openalex.org/W2948978827","https://openalex.org/W2963432161","https://openalex.org/W3088067687","https://openalex.org/W3114450627","https://openalex.org/W3197902908","https://openalex.org/W4236369288","https://openalex.org/W4239560345","https://openalex.org/W6754929296","https://openalex.org/W6780226713","https://openalex.org/W6783441700"],"related_works":["https://openalex.org/W2374980776","https://openalex.org/W2382692540","https://openalex.org/W2385916660","https://openalex.org/W3195411348","https://openalex.org/W1963878606","https://openalex.org/W2378981629","https://openalex.org/W1993870076","https://openalex.org/W2392968384","https://openalex.org/W2386286405","https://openalex.org/W2384284367"],"abstract_inverted_index":{"Traffic":[0],"Matrix":[1],"(TM)":[2],"prediction":[3,56,112,129,148],"is":[4,22],"defined":[5],"as":[6],"the":[7,45,69,74,89,104,123,134],"problem":[8],"of":[9,48,71,100,133],"estimating":[10],"future":[11],"network":[12,18,26,31,75,125],"traffic":[13,19,46,101,120],"matrices":[14],"based":[15,58],"on":[16,59,118],"historical":[17],"data.":[20],"It":[21],"widely":[23],"applied":[24],"in":[25,88,103],"planning,":[27],"resource":[28],"management,":[29],"and":[30,52,78,85,126],"security.":[32],"In":[33],"this":[34,60],"paper,":[35],"we":[36],"propose":[37],"a":[38,54,107],"CAGNN":[39,66],"(Cross-aggregate":[40],"GNN)":[41],"model":[42,67,144],"for":[43,109],"predicting":[44],"size":[47],"OD":[49],"(Origin-Destination)":[50],"pairs,":[51],"develop":[53],"TM":[55,147],"framework":[57,117],"model.Unlike":[61],"traditional":[62,135],"GNN":[63],"models,":[64],"our":[65,116,128,143],"leverages":[68],"cross-aggregation":[70,92],"information":[72,102],"from":[73,122],"node":[76,83],"graph":[77,80],"edge":[79,86],"to":[81,96],"obtain":[82],"representations":[84,87],"network.":[90],"This":[91],"approach":[93],"allows":[94],"us":[95],"integrate":[97],"different":[98],"forms":[99],"network,":[105],"providing":[106],"foundation":[108],"training":[110],"downstream":[111],"models.":[113],"We":[114],"validate":[115],"real":[119],"data":[121],"Abilene":[124],"compare":[127],"performance":[130],"with":[131],"that":[132,142],"LSTM-RNN":[136],"framework.":[137],"The":[138],"experimental":[139],"results":[140],"demonstrate":[141],"achieves":[145],"superior":[146],"performance.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
