首页 > 最新文献

信息工程最新文献

英文 中文
IF:
FAME: Federated authority management for attribute-based encryption scheme in blockchain-assisted data marketing FAME:区块链辅助数据营销中基于属性的加密方案的联邦权限管理
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-06-18 DOI: 10.1016/j.bcra.2025.100317
Pujie Jing , Xia Feng , Liangmin Wang , Xiangmei Song
Data marketing serves as a centralized third party, aggregating data owners and trading their data with buyers to promote data circulation. However, the security and privacy of marketing rely on a trusted central authority, single points of failure and rights abuse can easily cause untrusted marketing and data leakage. In this paper, we propose a federated authority management for an attribute-based encryption (ABE) scheme in blockchain-assisted data marketing. First, we design an authority blockchain with a threshold issuance protocol to replace the trusted authority in ABE, which achieves trusted authorization for marketing and eliminates the single points of failure. Second, we design an on/off-chain phased right revocation method, which efficiently revokes a buyer's access rights by invoking smart contracts to update the on-chain rights status, and without requiring off-chain re-authorization. Thus, this method prevents insecure marketing due to the abuse of rights. Theoretical analysis shows that our scheme could protect marketing security and data privacy. Experimental results confirm that it reduces the access and revocation cost to a constant level and decreases the storage overhead of marketing by n times compared to existing schemes.
数据营销作为一个集中的第三方,将数据所有者聚集起来,与买家进行数据交易,促进数据流通。然而,营销的安全性和隐私性依赖于可信的中央权威,单点故障和权利滥用很容易导致不可信的营销和数据泄露。在本文中,我们为区块链辅助数据营销中的基于属性的加密(ABE)方案提出了一种联邦权限管理。首先,我们设计了一个带阈值发布协议的授权区块链来替代ABE中的可信授权,实现了营销可信授权,消除了单点故障。其次,我们设计了一种链上/链下分阶段的权利撤销方法,该方法通过调用智能合约来更新链上权利状态,有效地撤销买方的访问权利,而不需要链下重新授权。因此,这种方法可以防止由于滥用权利而导致的不安全营销。理论分析表明,该方案能够有效保护营销安全和数据隐私。实验结果表明,与现有方案相比,该方案将访问和撤销成本降低到一个恒定的水平,并将营销存储开销降低了n倍。
{"title":"FAME: Federated authority management for attribute-based encryption scheme in blockchain-assisted data marketing","authors":"Pujie Jing ,&nbsp;Xia Feng ,&nbsp;Liangmin Wang ,&nbsp;Xiangmei Song","doi":"10.1016/j.bcra.2025.100317","DOIUrl":"10.1016/j.bcra.2025.100317","url":null,"abstract":"<div><div>Data marketing serves as a centralized third party, aggregating data owners and trading their data with buyers to promote data circulation. However, the security and privacy of marketing rely on a trusted central authority, single points of failure and rights abuse can easily cause untrusted marketing and data leakage. In this paper, we propose a federated authority management for an attribute-based encryption (ABE) scheme in blockchain-assisted data marketing. First, we design an authority blockchain with a threshold issuance protocol to replace the trusted authority in ABE, which achieves trusted authorization for marketing and eliminates the single points of failure. Second, we design an on/off-chain phased right revocation method, which efficiently revokes a buyer's access rights by invoking smart contracts to update the on-chain rights status, and without requiring off-chain re-authorization. Thus, this method prevents insecure marketing due to the abuse of rights. Theoretical analysis shows that our scheme could protect marketing security and data privacy. Experimental results confirm that it reduces the access and revocation cost to a constant level and decreases the storage overhead of marketing by <em>n</em> times compared to existing schemes.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100317"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146174012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced CT-CBCT image registration for orthopedic surgery: Integrating rigid-elastic motion models 用于骨科手术的增强CT-CBCT图像配准:整合刚弹性运动模型
Q1 Computer Science Pub Date : 2026-02-01 Epub Date: 2026-03-14 DOI: 10.1016/j.vrih.2026.01.001
Zhiqi HUANG , Deqiang XIAO , Hongxun LIU , Long SHAO , Danni AI , Jingfan FAN , Tianyu FU , Yucong LIN , Hong SONG , Jian YANG

Background

Computed tomography (CT) and cone-beam computed tomography (CBCT) image registration play pivotal roles in computer-assisted navigation for orthopedic surgery. Traditional methods often apply uniform deformation models, neglecting the biomechanical differences between rigid structures and soft tissues, which compromises registration accuracy, especially during significant bone displacements.

Method

To address this issue, we introduce RE-Reg, a rigid-elastic CT-CBCT image registration framework that jointly learns rigid bone motion and soft tissue deformation. RE-Reg incorporates a rigid alignment (RA) module to estimate global bone motion and an elastic deformation (ED) module to model soft tissue deformation, preserving bony structures through bone shape preservation (BSP) loss.

Result

Our comprehensive evaluation on publicly available datasets demonstrates that RE-Reg significantly outperforms existing methods in terms of registration accuracy and rigid bone structure preservation, achieving a 1.3% improvement in Dice similarity coefficient (DSC) and a 23% reduction in rigid bone deformation (%Δvol) compared with the best baseline.

Conclusion

This framework not only enhances anatomical fidelity but also ensures biomechanical plausibility and provides a valuable tool for image-guided orthopedic surgery. This code is available at https://github.com/Zq-Huang/RE-Reg.
背景:计算机断层扫描(CT)和锥形束计算机断层扫描(CBCT)图像配准在计算机辅助骨科手术导航中起着关键作用。传统方法通常采用均匀变形模型,忽略了刚性结构和软组织之间的生物力学差异,从而影响了配准精度,特别是在重大骨移位时。方法为了解决这一问题,我们引入了RE-Reg,这是一种刚性-弹性CT-CBCT图像配准框架,它可以共同学习刚性骨骼运动和软组织变形。RE-Reg结合了一个刚性对齐(RA)模块来估计整体骨运动,一个弹性变形(ED)模块来模拟软组织变形,通过骨形状保存(BSP)损失来保存骨结构。结果对公开数据集的综合评估表明,RE-Reg在配准精度和刚性骨结构保存方面明显优于现有方法,与最佳基线相比,Dice相似系数(DSC)提高1.3%,刚性骨变形(%Δvol)减少23%。结论该框架既提高了解剖保真度,又保证了生物力学的合理性,为图像引导骨科手术提供了有价值的工具。此代码可从https://github.com/Zq-Huang/RE-Reg获得。
{"title":"Enhanced CT-CBCT image registration for orthopedic surgery: Integrating rigid-elastic motion models","authors":"Zhiqi HUANG ,&nbsp;Deqiang XIAO ,&nbsp;Hongxun LIU ,&nbsp;Long SHAO ,&nbsp;Danni AI ,&nbsp;Jingfan FAN ,&nbsp;Tianyu FU ,&nbsp;Yucong LIN ,&nbsp;Hong SONG ,&nbsp;Jian YANG","doi":"10.1016/j.vrih.2026.01.001","DOIUrl":"10.1016/j.vrih.2026.01.001","url":null,"abstract":"<div><h3>Background</h3><div>Computed tomography (CT) and cone-beam computed tomography (CBCT) image registration play pivotal roles in computer-assisted navigation for orthopedic surgery. Traditional methods often apply uniform deformation models, neglecting the biomechanical differences between rigid structures and soft tissues, which compromises registration accuracy, especially during significant bone displacements.</div></div><div><h3>Method</h3><div>To address this issue, we introduce RE-Reg, a rigid-elastic CT-CBCT image registration framework that jointly learns rigid bone motion and soft tissue deformation. RE-Reg incorporates a rigid alignment (RA) module to estimate global bone motion and an elastic deformation (ED) module to model soft tissue deformation, preserving bony structures through bone shape preservation (BSP) loss.</div></div><div><h3>Result</h3><div>Our comprehensive evaluation on publicly available datasets demonstrates that RE-Reg significantly outperforms existing methods in terms of registration accuracy and rigid bone structure preservation, achieving a 1.3% improvement in Dice similarity coefficient (DSC) and a 23% reduction in rigid bone deformation (<span><math><mrow><mo>%</mo><mo>Δ</mo><mtext>vol</mtext></mrow></math></span>) compared with the best baseline.</div></div><div><h3>Conclusion</h3><div>This framework not only enhances anatomical fidelity but also ensures biomechanical plausibility and provides a valuable tool for image-guided orthopedic surgery. This code is available at https://github.com/Zq-Huang/RE-Reg.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"8 1","pages":"Pages 87-100"},"PeriodicalIF":0.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147454028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation study of cost-effective verification for Pietrzak's VDF in Ethereum smart contract 以太坊智能合约中Pietrzak VDF的成本效益验证实现研究
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-06-04 DOI: 10.1016/j.bcra.2025.100313
Suhyeon Lee , Euisin Gee , Junghee Lee
Verifiable delay function (VDF) is a cryptographic concept that ensures a minimum delay before output through sequential processing, which is resistant to parallel computing. One of the significant VDF protocols academically reviewed is the VDF protocol proposed by Pietrzak. However, for the blockchain environment, the Pietrzak VDF has drawbacks, including a large proof size and recursive protocol computation. In this paper, we present an implementation study of Pietrzak's VDF verification on the Ethereum virtual machine (EVM). We found that the discussion in Pietrzak's original paper can help with a clear optimization in EVM, where the costs of computation are predefined as specific amounts of gas. In our results, the cost of VDF verification can be reduced from 4 M to 2 M gas, and the proof size can be generated under 8 KB with a 2048-bit RSA key length, which is much smaller than the previous expectation.
可验证延迟函数(VDF)是一种密码学概念,它通过顺序处理确保输出前的最小延迟,从而抵抗并行计算。学术上评述的重要VDF协议之一是由Pietrzak提出的VDF协议。然而,对于区块链环境,Pietrzak VDF有缺点,包括大的证明大小和递归协议计算。在本文中,我们提出了Pietrzak的VDF验证在以太坊虚拟机(EVM)上的实现研究。我们发现,Pietrzak原始论文中的讨论有助于EVM的明确优化,其中计算成本被预定义为特定数量的气体。在我们的结果中,VDF验证的成本可以从4 M gas减少到2 M gas,并且证明大小可以在8 KB以下生成,RSA密钥长度为2048位,这比之前的预期要小得多。
{"title":"Implementation study of cost-effective verification for Pietrzak's VDF in Ethereum smart contract","authors":"Suhyeon Lee ,&nbsp;Euisin Gee ,&nbsp;Junghee Lee","doi":"10.1016/j.bcra.2025.100313","DOIUrl":"10.1016/j.bcra.2025.100313","url":null,"abstract":"<div><div>Verifiable delay function (VDF) is a cryptographic concept that ensures a minimum delay before output through sequential processing, which is resistant to parallel computing. One of the significant VDF protocols academically reviewed is the VDF protocol proposed by Pietrzak. However, for the blockchain environment, the Pietrzak VDF has drawbacks, including a large proof size and recursive protocol computation. In this paper, we present an implementation study of Pietrzak's VDF verification on the Ethereum virtual machine (EVM). We found that the discussion in Pietrzak's original paper can help with a clear optimization in EVM, where the costs of computation are predefined as specific amounts of gas. In our results, the cost of VDF verification can be reduced from 4 M to 2 M gas, and the proof size can be generated under 8 KB with a 2048-bit RSA key length, which is much smaller than the previous expectation.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100313"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147398036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of digital twin technology in physiotherapy and rehabilitation practice 数字孪生技术在物理治疗和康复实践中的作用
Q1 Computer Science Pub Date : 2026-02-01 Epub Date: 2026-03-14 DOI: 10.1016/j.vrih.2026.01.002
David Bamidele OLAWADE , Ezenwa Robinson MODUM , Olabanke Florence OLAWUYI , Omobolaji Rosemary OLASILOLA , Babajide David MAKANJUOLA , John Oluwatosin ALABI
Digital twin technology, that creates virtual replicas of physical entities using real-time data and simulation models, has emerged as a transformative innovation across multiple healthcare domains. Its application in physiotherapy and rehabilitation represents a paradigm shift from traditional therapeutic approaches to personalized data-driven interventions that optimize patient outcomes. This narrative review examines the current applications, benefits, challenges, and future prospects of digital twin technology in physiotherapy and rehabilitation, providing a comprehensive analysis of the manner in which this technology is reshaping clinical practice and patient care. A narrative review approach was employed, systematically searching PubMed, IEEE Xplore, Scopus, and Web of Science databases. Studies describing digital twin applications, development methodologies, clinical implementations, and theoretical frameworks in physiotherapy and rehabilitation contexts were included. Digital twin technology demonstrates significant potential in personalizing rehabilitation programs, enabling real-time monitoring of patient progress, predicting treatment outcomes, and facilitating remote therapeutic interventions. Current applications span musculoskeletal rehabilitation, neurological recovery, post-surgical care, and sports injury management. Key benefits include enhanced treatment precision, improved patient engagement, reduced healthcare costs, and accelerated recovery times. However, implementation faces challenges including technological complexity, data privacy concerns, interoperability issues, and the need for substantial infrastructure investment. Digital twin technology represents a promising frontier in physiotherapy and rehabilitation, offering unprecedented opportunities for personalized, efficient, and effective patient care. Successful integration requires addressing the current limitations while fostering interdisciplinary collaboration between clinicians, engineers, and data scientists.
数字孪生技术使用实时数据和仿真模型创建物理实体的虚拟副本,已成为跨多个医疗保健领域的变革性创新。它在物理治疗和康复中的应用代表了从传统治疗方法到个性化数据驱动干预的范式转变,从而优化患者的结果。本文综述了数字孪生技术在物理治疗和康复中的应用、益处、挑战和未来前景,并对该技术重塑临床实践和患者护理的方式进行了全面分析。采用叙述性综述方法,系统地检索PubMed、IEEE explore、Scopus和Web of Science数据库。研究描述了数字双胞胎在物理治疗和康复环境中的应用、开发方法、临床实施和理论框架。数字孪生技术在个性化康复计划、实时监测患者进展、预测治疗结果和促进远程治疗干预方面显示出巨大的潜力。目前的应用范围包括肌肉骨骼康复、神经恢复、术后护理和运动损伤管理。主要优点包括提高治疗精度、提高患者参与度、降低医疗成本和加快恢复时间。然而,实施面临着包括技术复杂性、数据隐私问题、互操作性问题和大量基础设施投资需求在内的挑战。数字孪生技术代表了物理治疗和康复的一个有前途的前沿,为个性化,高效和有效的患者护理提供了前所未有的机会。成功的整合需要解决当前的局限性,同时促进临床医生、工程师和数据科学家之间的跨学科合作。
{"title":"The role of digital twin technology in physiotherapy and rehabilitation practice","authors":"David Bamidele OLAWADE ,&nbsp;Ezenwa Robinson MODUM ,&nbsp;Olabanke Florence OLAWUYI ,&nbsp;Omobolaji Rosemary OLASILOLA ,&nbsp;Babajide David MAKANJUOLA ,&nbsp;John Oluwatosin ALABI","doi":"10.1016/j.vrih.2026.01.002","DOIUrl":"10.1016/j.vrih.2026.01.002","url":null,"abstract":"<div><div>Digital twin technology, that creates virtual replicas of physical entities using real-time data and simulation models, has emerged as a transformative innovation across multiple healthcare domains. Its application in physiotherapy and rehabilitation represents a paradigm shift from traditional therapeutic approaches to personalized data-driven interventions that optimize patient outcomes. This narrative review examines the current applications, benefits, challenges, and future prospects of digital twin technology in physiotherapy and rehabilitation, providing a comprehensive analysis of the manner in which this technology is reshaping clinical practice and patient care. A narrative review approach was employed, systematically searching PubMed, IEEE Xplore, Scopus, and Web of Science databases. Studies describing digital twin applications, development methodologies, clinical implementations, and theoretical frameworks in physiotherapy and rehabilitation contexts were included. Digital twin technology demonstrates significant potential in personalizing rehabilitation programs, enabling real-time monitoring of patient progress, predicting treatment outcomes, and facilitating remote therapeutic interventions. Current applications span musculoskeletal rehabilitation, neurological recovery, post-surgical care, and sports injury management. Key benefits include enhanced treatment precision, improved patient engagement, reduced healthcare costs, and accelerated recovery times. However, implementation faces challenges including technological complexity, data privacy concerns, interoperability issues, and the need for substantial infrastructure investment. Digital twin technology represents a promising frontier in physiotherapy and rehabilitation, offering unprecedented opportunities for personalized, efficient, and effective patient care. Successful integration requires addressing the current limitations while fostering interdisciplinary collaboration between clinicians, engineers, and data scientists.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"8 1","pages":"Pages 71-86"},"PeriodicalIF":0.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147454102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Botanical tree reconstruction from a single image via 3D GAN-based skeletonization 通过基于三维氮化镓的骨架化从单个图像重建植物树
Q1 Computer Science Pub Date : 2026-02-01 Epub Date: 2026-03-14 DOI: 10.1016/j.vrih.2023.08.009
Chi Weng MA , Ruien SHEN , Deli DONG , Shuangjiu XIAO

Background

3D botanical tree reconstruction from a single image plays a vital role in the field of computer graphics. However, accurately capturing the intricate branching patterns and detailed morphologies of trees remains a challenge.

Methods

In this study, we proposed a novel approach for single-image tree reconstruction using a conditional generative adversarial network to infer the 3D skeleton of a tree in the form of a 2D skeleton depth map. Based on the 2D skeleton depth map, a corresponding branching structure (3D skeleton) that inherits the tree shape in the input image and leaves can be generated using a procedural modeling technique.

Result

Experimental results show that the proposed method accurately reconstructs diverse tree structures across species. Both quantitative and qualitative evaluations demonstrate improved skeleton completeness, branching accuracy, and visual realism over baseline methods, while requiring no user input.

Conclusions

Our proposed approach for generating lifelike 3D tree models from a single image with no user input shows its proficiency in achieving efficient and reliable reconstruction. These results showcase the capability of the proposed model to recreate complex tree architectures while capturing their visual authenticity.
从单幅图像重建三维植物树在计算机图形学领域起着至关重要的作用。然而,准确地捕捉复杂的分支模式和树木的详细形态仍然是一个挑战。方法在本研究中,我们提出了一种新的单图像树重建方法,使用条件生成对抗网络以2D骨架深度图的形式推断树的3D骨架。基于二维骨架深度图,可以使用程序建模技术生成继承输入图像中树木形状和树叶的相应分支结构(3D骨架)。结果实验结果表明,该方法可以准确地重建不同物种的树结构。在不需要用户输入的情况下,定量和定性评估都证明了比基线方法更好的骨架完整性、分支准确性和视觉真实感。结论本文提出的方法可以在不需要用户输入的情况下,从单幅图像生成逼真的三维树木模型,能够实现高效、可靠的重建。这些结果展示了所提出的模型在捕获其视觉真实性的同时重建复杂树架构的能力。
{"title":"Botanical tree reconstruction from a single image via 3D GAN-based skeletonization","authors":"Chi Weng MA ,&nbsp;Ruien SHEN ,&nbsp;Deli DONG ,&nbsp;Shuangjiu XIAO","doi":"10.1016/j.vrih.2023.08.009","DOIUrl":"10.1016/j.vrih.2023.08.009","url":null,"abstract":"<div><h3>Background</h3><div>3D botanical tree reconstruction from a single image plays a vital role in the field of computer graphics. However, accurately capturing the intricate branching patterns and detailed morphologies of trees remains a challenge.</div></div><div><h3>Methods</h3><div>In this study, we proposed a novel approach for single-image tree reconstruction using a conditional generative adversarial network to infer the 3D skeleton of a tree in the form of a 2D skeleton depth map. Based on the 2D skeleton depth map, a corresponding branching structure (3D skeleton) that inherits the tree shape in the input image and leaves can be generated using a procedural modeling technique.</div></div><div><h3>Result</h3><div>Experimental results show that the proposed method accurately reconstructs diverse tree structures across species. Both quantitative and qualitative evaluations demonstrate improved skeleton completeness, branching accuracy, and visual realism over baseline methods, while requiring no user input.</div></div><div><h3>Conclusions</h3><div>Our proposed approach for generating lifelike 3D tree models from a single image with no user input shows its proficiency in achieving efficient and reliable reconstruction. These results showcase the capability of the proposed model to recreate complex tree architectures while capturing their visual authenticity.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"8 1","pages":"Pages 101-114"},"PeriodicalIF":0.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147454103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero trust-driven access control delegation using blockchain 零信任驱动访问控制委托使用区块链
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-06-20 DOI: 10.1016/j.bcra.2025.100319
Rahma Mukta , Shantanu Pal , Kowshik Chowdhury , Michael Hitchens , Hye-young Paik , Salil S. Kanhere
As digital ecosystems become more complex with decentralized technologies like the Internet of Things (IoT) and blockchain, traditional access control models fail to meet the security needs of dynamic, high-risk environments. The need for dynamic, fine-grained access control mechanisms has become critical, particularly in environments where trust must be continuously evaluated, and access decisions must adapt to real-time conditions. Traditional models often rely on static identity management and centralized trust assumptions, which are inadequate for modern, decentralized, and highly dynamic environments such as IoT ecosystems. Consequently, existing solutions lack fine-grained identity management, flexible delegation, and continuous trust evaluation, highlighting the need for a more robust, adaptive, and decentralized access control architecture. To address these gaps, this paper presents a novel access control architecture that integrates self-sovereign identity (SSI) and decentralized identifier (DID)-based access control with zero trust principles, enhanced by a flexible capability-based access control (CapBAC) approach. Leveraging SSI and DID allows entities to manage their identities without relying on a central authority, aligning with zero-trust principles. The integration of CapBAC ensures flexible, context-aware, and attribute-based access control, where access rights are dynamically granted based on the requester's capabilities. This enables fine-grained delegation of access rights, allowing trusted entities to delegate specific privileges to others without compromising overall security. Continuous trust evaluation is employed to assess the authenticity of access requests, mitigating the risks posed by compromised devices or users. The proposed architecture also incorporates blockchain technology to ensure transparent, immutable, and secure management of access logs, providing traceability and accountability for all access events. We demonstrate the feasibility and effectiveness of this solution through performance evaluations and comparisons with existing access control schemes, showing its superior security, scalability, and adaptability in real-world scenarios. Our work demonstrates a comprehensive, decentralized, and scalable solution for secure access control delegation using zero trust-driven principles.
随着物联网(IoT)和区块链等分散技术的发展,数字生态系统变得更加复杂,传统的访问控制模型已无法满足动态、高风险环境的安全需求。对动态、细粒度访问控制机制的需求已经变得至关重要,特别是在必须持续评估信任和访问决策必须适应实时条件的环境中。传统模型通常依赖于静态身份管理和集中式信任假设,这对于现代、分散和高度动态的环境(如物联网生态系统)是不够的。因此,现有的解决方案缺乏细粒度的身份管理、灵活的委托和持续的信任评估,这突出了对更健壮、自适应和分散的访问控制体系结构的需求。为了解决这些差距,本文提出了一种新的访问控制体系结构,该体系结构集成了基于零信任原则的自主身份(SSI)和基于分散标识符(DID)的访问控制,并通过灵活的基于能力的访问控制(CapBAC)方法进行了增强。利用SSI和DID允许实体在不依赖中央权威的情况下管理其身份,符合零信任原则。CapBAC的集成确保了灵活、上下文感知和基于属性的访问控制,其中访问权限是根据请求者的能力动态授予的。这支持细粒度的访问权限委托,允许受信任实体将特定特权委托给其他实体,而不会损害整体安全性。通过持续信任评估来评估访问请求的真实性,降低设备或用户被入侵带来的风险。所建议的体系结构还集成了区块链技术,以确保访问日志的透明、不可变和安全管理,为所有访问事件提供可跟踪性和责任。我们通过性能评估和与现有访问控制方案的比较,证明了该解决方案的可行性和有效性,展示了其在现实场景中优越的安全性、可扩展性和适应性。我们的工作展示了一个全面的、分散的、可扩展的解决方案,用于使用零信任驱动原则的安全访问控制委托。
{"title":"Zero trust-driven access control delegation using blockchain","authors":"Rahma Mukta ,&nbsp;Shantanu Pal ,&nbsp;Kowshik Chowdhury ,&nbsp;Michael Hitchens ,&nbsp;Hye-young Paik ,&nbsp;Salil S. Kanhere","doi":"10.1016/j.bcra.2025.100319","DOIUrl":"10.1016/j.bcra.2025.100319","url":null,"abstract":"<div><div>As digital ecosystems become more complex with decentralized technologies like the Internet of Things (IoT) and blockchain, traditional access control models fail to meet the security needs of dynamic, high-risk environments. The need for dynamic, fine-grained access control mechanisms has become critical, particularly in environments where trust must be continuously evaluated, and access decisions must adapt to real-time conditions. Traditional models often rely on static identity management and centralized trust assumptions, which are inadequate for modern, decentralized, and highly dynamic environments such as IoT ecosystems. Consequently, existing solutions lack fine-grained identity management, flexible delegation, and continuous trust evaluation, highlighting the need for a more robust, adaptive, and decentralized access control architecture. To address these gaps, this paper presents a novel access control architecture that integrates self-sovereign identity (SSI) and decentralized identifier (DID)-based access control with zero trust principles, enhanced by a flexible capability-based access control (CapBAC) approach. Leveraging SSI and DID allows entities to manage their identities without relying on a central authority, aligning with zero-trust principles. The integration of CapBAC ensures flexible, context-aware, and attribute-based access control, where access rights are dynamically granted based on the requester's capabilities. This enables fine-grained delegation of access rights, allowing trusted entities to delegate specific privileges to others without compromising overall security. Continuous trust evaluation is employed to assess the authenticity of access requests, mitigating the risks posed by compromised devices or users. The proposed architecture also incorporates blockchain technology to ensure transparent, immutable, and secure management of access logs, providing traceability and accountability for all access events. We demonstrate the feasibility and effectiveness of this solution through performance evaluations and comparisons with existing access control schemes, showing its superior security, scalability, and adaptability in real-world scenarios. Our work demonstrates a comprehensive, decentralized, and scalable solution for secure access control delegation using zero trust-driven principles.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100319"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146024719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: cross-chain bridging architectural design flaws and mitigations SoK:跨链桥接架构设计缺陷和缓解措施
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-06-09 DOI: 10.1016/j.bcra.2025.100315
Jakob Svennevik Notland , Jingyue Li , Mariusz Nowostawski , Peter Halland Haro
Cross-chain bridges are solutions that enable interoperability between heterogeneous blockchains. In contrast to the underlying blockchains, the bridges often provide inferior security guarantees and have been targets of hacks, causing damage in the range of 1.5 to 2 billion USD in 2022. The current state of bridge architectures is that they are ambiguous, and the relation between overarching architectures, underlying components, and exploits is shallow. We address this gap through a multivocal literature review covering 64 different bridges, including 31 exploits and four known bugs over three years (2021–2023). Our analysis identifies 13 architectural components of blockchain bridges. We link the components to eight types of vulnerabilities, also called design flaws. Furthermore, we identified prevention measures and proposed 11 impact reduction measures based on existing and possible countermeasures to address the imminent exploitation of design flaws. The results present an overview of the state of the art in bridge security, future research directions, and guidelines for designing and implementing secure cross-chain bridge architectures.
跨链桥是实现异构区块链之间互操作性的解决方案。与底层区块链相比,桥梁通常提供较差的安全保障,并成为黑客攻击的目标,在2022年造成15亿至20亿美元的损失。桥接体系结构的当前状态是它们是模糊的,总体体系结构、底层组件和漏洞之间的关系是肤浅的。我们通过对64个不同桥梁的多语种文献综述来解决这一差距,其中包括三年内(2021-2023)的31个漏洞和4个已知漏洞。我们的分析确定了区块链桥梁的13个建筑组成部分。我们将这些组件与八种类型的漏洞联系起来,这些漏洞也被称为设计缺陷。此外,我们确定了预防措施,并根据现有和可能的对策提出了11项减少影响的措施,以解决即将出现的设计缺陷。研究结果概述了桥梁安全技术的现状,未来的研究方向,以及设计和实现安全跨链桥梁体系结构的指导方针。
{"title":"SoK: cross-chain bridging architectural design flaws and mitigations","authors":"Jakob Svennevik Notland ,&nbsp;Jingyue Li ,&nbsp;Mariusz Nowostawski ,&nbsp;Peter Halland Haro","doi":"10.1016/j.bcra.2025.100315","DOIUrl":"10.1016/j.bcra.2025.100315","url":null,"abstract":"<div><div>Cross-chain bridges are solutions that enable interoperability between heterogeneous blockchains. In contrast to the underlying blockchains, the bridges often provide inferior security guarantees and have been targets of hacks, causing damage in the range of 1.5 to 2 billion USD in 2022. The current state of bridge architectures is that they are ambiguous, and the relation between overarching architectures, underlying components, and exploits is shallow. We address this gap through a multivocal literature review covering 64 different bridges, including 31 exploits and four known bugs over three years (2021–2023). Our analysis identifies 13 architectural components of blockchain bridges. We link the components to eight types of vulnerabilities, also called design flaws. Furthermore, we identified prevention measures and proposed 11 impact reduction measures based on existing and possible countermeasures to address the imminent exploitation of design flaws. The results present an overview of the state of the art in bridge security, future research directions, and guidelines for designing and implementing secure cross-chain bridge architectures.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100315"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147398032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of extrinsic parameter calibration of LiDAR and camera 激光雷达和相机外部参数标定技术综述
Q1 Computer Science Pub Date : 2026-02-01 Epub Date: 2026-03-14 DOI: 10.1016/j.vrih.2025.12.004
Shuo WANG , Pengju ZHANG , Yihong WU
LiDAR and camera are two of the most common sensors used in the fields of robot perception, autonomous driving, augmented reality, and virtual reality, where these sensors are widely used to perform various tasks such as odometry estimation and 3D reconstruction. Fusing the information from these two sensors can significantly increase the robustness and accuracy of these perception tasks. The extrinsic calibration between cameras and LiDAR is a fundamental prerequisite for multimodal systems. Recently, extensive studies have been conducted on the calibration of extrinsic parameters. Although several calibration methods facilitate sensor fusion, a comprehensive summary for researchers and, especially, non-expert users is lacking. Thus, we present an overview of extrinsic calibration and discuss diverse calibration methods from the perspective of calibration system design. Based on the calibration information sources, this study classifies these methods as target-based or targetless. For each type of calibration method, further classification was performed according to the diverse types of features or constraints used in the calibration process, and their detailed implementations and key characteristics were introduced. Thereafter, calibration-accuracy evaluation methods are presented. Finally, we comprehensively compare the advantages and disadvantages of each calibration method and suggest directions for practical applications and future research.
激光雷达和摄像头是机器人感知、自动驾驶、增强现实和虚拟现实领域最常用的两种传感器,这些传感器被广泛用于执行各种任务,如里程估计和3D重建。融合这两个传感器的信息可以显著提高感知任务的鲁棒性和准确性。相机和激光雷达之间的外部校准是多模态系统的基本前提。近年来,外界参数的标定得到了广泛的研究。虽然有几种校准方法可以促进传感器融合,但缺乏对研究人员,特别是非专业用户的全面总结。因此,我们概述了外部校准,并从校准系统设计的角度讨论了各种校准方法。根据标定信息源的不同,本文将标定方法分为基于目标和无目标两类。针对每种校准方法,根据校准过程中使用的不同类型的特征或约束进行了进一步分类,并介绍了每种校准方法的详细实现和关键特征。在此基础上,提出了标定精度评价方法。最后,综合比较了各种校准方法的优缺点,并提出了实际应用和未来研究的方向。
{"title":"Review of extrinsic parameter calibration of LiDAR and camera","authors":"Shuo WANG ,&nbsp;Pengju ZHANG ,&nbsp;Yihong WU","doi":"10.1016/j.vrih.2025.12.004","DOIUrl":"10.1016/j.vrih.2025.12.004","url":null,"abstract":"<div><div>LiDAR and camera are two of the most common sensors used in the fields of robot perception, autonomous driving, augmented reality, and virtual reality, where these sensors are widely used to perform various tasks such as odometry estimation and 3D reconstruction. Fusing the information from these two sensors can significantly increase the robustness and accuracy of these perception tasks. The extrinsic calibration between cameras and LiDAR is a fundamental prerequisite for multimodal systems. Recently, extensive studies have been conducted on the calibration of extrinsic parameters. Although several calibration methods facilitate sensor fusion, a comprehensive summary for researchers and, especially, non-expert users is lacking. Thus, we present an overview of extrinsic calibration and discuss diverse calibration methods from the perspective of calibration system design. Based on the calibration information sources, this study classifies these methods as target-based or targetless. For each type of calibration method, further classification was performed according to the diverse types of features or constraints used in the calibration process, and their detailed implementations and key characteristics were introduced. Thereafter, calibration-accuracy evaluation methods are presented. Finally, we comprehensively compare the advantages and disadvantages of each calibration method and suggest directions for practical applications and future research.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"8 1","pages":"Pages 28-70"},"PeriodicalIF":0.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147454100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A global trust-based blockchain lightweight consensus mechanism 基于全局信任的区块链轻量级共识机制
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-07-01 DOI: 10.1016/j.bcra.2025.100322
Jinwen Xi , Guosheng Xu , Shihong Zou , Yinliang Yue , Binsi Cai , Guoqiang Li
Blockchain technology, renowned for its decentralized and secure nature, has gained substantial attention. Central to its functionality are consensus mechanisms, which are essential for validating transactions and upholding the integrity of the distributed ledger. However, the efficiency and scalability of blockchain are currently impeded by the resource limitations and excessive communication demands of existing consensus mechanisms. To address these challenges, we propose GT-BFT, a streamlined and lightweight blockchain consensus mechanism grounded in a global trust model. This model capitalizes on node behavior to form consensus groups and facilitate consensus achievement. GT-BFT integrates a novel approach of selective broadcasting along with a Byzantine threshold determination algorithm, significantly boosting both the efficiency and security of the network. Our extensive analysis and performance evaluation reveal that GT-BFT surpasses existing mechanisms in key areas such as security, system throughput, and transaction confirmation speed, marking a significant advancement in blockchain consensus technology.
区块链技术以其去中心化和安全性而闻名,已经获得了大量的关注。其功能的核心是共识机制,这对于验证交易和维护分布式账本的完整性至关重要。然而,区块链的效率和可扩展性目前受到现有共识机制的资源限制和过多的通信需求的阻碍。为了应对这些挑战,我们提出了GT-BFT,这是一种基于全球信任模型的精简轻量级区块链共识机制。该模型利用节点行为来形成共识组并促进共识的实现。GT-BFT集成了一种新的选择性广播方法以及拜占庭阈值确定算法,显着提高了网络的效率和安全性。我们广泛的分析和性能评估表明,GT-BFT在安全性、系统吞吐量和交易确认速度等关键领域超越了现有机制,标志着区块链共识技术的重大进步。
{"title":"A global trust-based blockchain lightweight consensus mechanism","authors":"Jinwen Xi ,&nbsp;Guosheng Xu ,&nbsp;Shihong Zou ,&nbsp;Yinliang Yue ,&nbsp;Binsi Cai ,&nbsp;Guoqiang Li","doi":"10.1016/j.bcra.2025.100322","DOIUrl":"10.1016/j.bcra.2025.100322","url":null,"abstract":"<div><div>Blockchain technology, renowned for its decentralized and secure nature, has gained substantial attention. Central to its functionality are consensus mechanisms, which are essential for validating transactions and upholding the integrity of the distributed ledger. However, the efficiency and scalability of blockchain are currently impeded by the resource limitations and excessive communication demands of existing consensus mechanisms. To address these challenges, we propose GT-BFT, a streamlined and lightweight blockchain consensus mechanism grounded in a global trust model. This model capitalizes on node behavior to form consensus groups and facilitate consensus achievement. GT-BFT integrates a novel approach of selective broadcasting along with a Byzantine threshold determination algorithm, significantly boosting both the efficiency and security of the network. Our extensive analysis and performance evaluation reveal that GT-BFT surpasses existing mechanisms in key areas such as security, system throughput, and transaction confirmation speed, marking a significant advancement in blockchain consensus technology.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100322"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147398035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic interoperability on blockchain by generating smart contracts based on knowledge graphs 区块链上基于知识图生成智能合约的语义互操作性
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-07-01 DOI: 10.1016/j.bcra.2025.100320
W. Van Woensel , O. Seneviratne
Health 3.0 enables decision-making to be based on longitudinal data from multiple institutions spanning the patient’s healthcare journey. Blockchain smart contracts can act as neutral and trustworthy intermediaries to implement such decision-making. In this distributed healthcare setting, transmitted data are structured using standards, such as Health Level Seven Fast Healthcare Interoperability Resources (HL7 FHIR), for semantic interoperability. Hence, the smart contract will require interoperability with the domain standard. However, it will also have to implement a complex communication setup to work in a distributed environment (e.g., using oracles), and be developed using special-purpose blockchain languages (e.g., Solidity). To support these requirements, we propose the encoding of smart contract logic using a high-level semantic Knowledge Graph (KG), which uses concepts and relations from a domain standard and additionally lists distributed data requirements. We subsequently deploy this semantic KG on blockchain via a hybrid on-/off-chain code-generation approach. We applied our approach to generate smart contracts for three health insurance cases from Medicare. We evaluated the generated contracts in terms of correctness and execution cost (i.e., gas) on blockchain. Finally, we discuss the suitability of blockchain—and by extension, our approach—for a number of healthcare use cases.
Health 3.0使决策能够基于跨越患者医疗保健旅程的多个机构的纵向数据。区块链智能合约可以作为中立和可信的中介来实现这种决策。在这种分布式医疗保健设置中,传输的数据使用诸如健康级别7快速医疗保健互操作性资源(HL7 FHIR)等标准进行结构化,以实现语义互操作性。因此,智能合约将需要与领域标准的互操作性。然而,它还必须实现一个复杂的通信设置,以便在分布式环境中工作(例如,使用oracle),并使用特殊用途的区块链语言(例如,Solidity)进行开发。为了支持这些需求,我们提出使用高级语义知识图(KG)对智能合约逻辑进行编码,该知识图使用领域标准中的概念和关系,并额外列出分布式数据需求。随后,我们通过混合链上/链下代码生成方法在区块链上部署这个语义KG。我们应用我们的方法为医疗保险中的三个健康保险案例生成智能合约。我们根据区块链上的正确性和执行成本(即gas)来评估生成的合同。最后,我们讨论了区块链的适用性,并扩展了我们的方法,用于许多医疗保健用例。
{"title":"Semantic interoperability on blockchain by generating smart contracts based on knowledge graphs","authors":"W. Van Woensel ,&nbsp;O. Seneviratne","doi":"10.1016/j.bcra.2025.100320","DOIUrl":"10.1016/j.bcra.2025.100320","url":null,"abstract":"<div><div>Health 3.0 enables decision-making to be based on longitudinal data from multiple institutions spanning the patient’s healthcare journey. Blockchain smart contracts can act as neutral and trustworthy intermediaries to implement such decision-making. In this distributed healthcare setting, transmitted data are structured using standards, such as Health Level Seven Fast Healthcare Interoperability Resources (HL7 FHIR), for semantic interoperability. Hence, the smart contract will require interoperability with the domain standard. However, it will also have to implement a complex communication setup to work in a distributed environment (e.g., using oracles), and be developed using special-purpose blockchain languages (e.g., Solidity). To support these requirements, we propose the encoding of smart contract logic using a high-level semantic Knowledge Graph (KG), which uses concepts and relations from a domain standard and additionally lists distributed data requirements. We subsequently deploy this semantic KG on blockchain via a hybrid on-/off-chain code-generation approach. We applied our approach to generate smart contracts for three health insurance cases from Medicare. We evaluated the generated contracts in terms of correctness and execution cost (i.e., gas) on blockchain. Finally, we discuss the suitability of blockchain—and by extension, our approach—for a number of healthcare use cases.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100320"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146174011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 南京邮电大学学报(自然科学版) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art 清华大学学报(自然科学版) 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1