2022
DOI: 10.48550/arxiv.2202.05940
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Automatic Curriculum Generation for Learning Adaptation in Networking

Abstract: As deep reinforcement learning (RL) showcases its strengths in networking and systems, its pitfalls also come to the public's attention-when trained to handle a wide range of network workloads and previously unseen deployment environments, RL policies often manifest suboptimal performance and poor generalizability.To tackle these problems, we present Genet, a new training framework for learning better RL-based network adaptation algorithms. Genet is built on the concept of curriculum learning, which has proved… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 21 publications
(44 reference statements)
0
1
0
Order By: Relevance
“…Secondly, we assume that the malicious client has knowledge of the environmental dynamics of the target client, denoted as D. This is necessary to identify the specific environment to target. Similar to Genet (Xia et al 2022), we use three metrics to represent D: maximum bandwidth (BW max ), minimum bandwidth (BW min ), and bandwidth changing interval (L). Using a synthetic trace generator, we create a virtual network environment based on the target environment D. Mathematically, our FL-based ABR attacking problem can be formulated as:…”
Section: Key Ideasmentioning
confidence: 99%
“…Secondly, we assume that the malicious client has knowledge of the environmental dynamics of the target client, denoted as D. This is necessary to identify the specific environment to target. Similar to Genet (Xia et al 2022), we use three metrics to represent D: maximum bandwidth (BW max ), minimum bandwidth (BW min ), and bandwidth changing interval (L). Using a synthetic trace generator, we create a virtual network environment based on the target environment D. Mathematically, our FL-based ABR attacking problem can be formulated as:…”
Section: Key Ideasmentioning
confidence: 99%