首页 > 最新文献

IEEE Networking Letters最新文献

英文 中文
FractionalLB: Controller Load Balancing Using Fractional Switch Migration in Software-Defined Networks FractionalLB:在软件定义网络中使用分数交换机迁移实现控制器负载平衡
Pub Date : 2024-01-22 DOI: 10.1109/LNET.2024.3357089
Upendra Prajapati;Bijoy Chand Chatterjee;Amit Banerjee
In the context of multi-controller software-defined networks (SDNs), the efficacy of load-balancing can be improved through fractional switch migration. This letter proposes a controller load balancing approach using fractional switch migration, named FractionalLB. FractionalLB aims to reduce the difference between the load of each controller and its corresponding predefined threshold, which is used to identify overloaded and underloaded controllers. The load balancing is achieved by redistributing the load fractionally from the heavily loaded controller to other controllers. We formulate FractionalLB as an optimization problem using a mixed-integer linear program (MILP). When MILP is not tractable, we introduce a heuristic approach based on MILP. Numerical results indicate that FractionalLB outperforms a conventional scheme that follows time-sharing switch migration in terms of synchronization cost and the min-max controller’s load ratio.
在多控制器软件定义网络(SDN)的背景下,可以通过部分交换机迁移来提高负载平衡的效率。本文提出了一种使用部分交换机迁移的控制器负载平衡方法,命名为 FractionalLB。FractionalLB 旨在减少每个控制器的负载与其对应的预定义阈值之间的差异,该阈值用于识别过载和欠载的控制器。负载平衡是通过将负载重的控制器的负载部分重新分配给其他控制器来实现的。我们使用混合整数线性规划 (MILP) 将 FractionalLB 表述为一个优化问题。当 MILP 不可行时,我们引入了基于 MILP 的启发式方法。数值结果表明,就同步成本和最小控制器负载率而言,FractionalLB 优于采用分时开关迁移的传统方案。
{"title":"FractionalLB: Controller Load Balancing Using Fractional Switch Migration in Software-Defined Networks","authors":"Upendra Prajapati;Bijoy Chand Chatterjee;Amit Banerjee","doi":"10.1109/LNET.2024.3357089","DOIUrl":"https://doi.org/10.1109/LNET.2024.3357089","url":null,"abstract":"In the context of multi-controller software-defined networks (SDNs), the efficacy of load-balancing can be improved through fractional switch migration. This letter proposes a controller load balancing approach using fractional switch migration, named FractionalLB. FractionalLB aims to reduce the difference between the load of each controller and its corresponding predefined threshold, which is used to identify overloaded and underloaded controllers. The load balancing is achieved by redistributing the load fractionally from the heavily loaded controller to other controllers. We formulate FractionalLB as an optimization problem using a mixed-integer linear program (MILP). When MILP is not tractable, we introduce a heuristic approach based on MILP. Numerical results indicate that FractionalLB outperforms a conventional scheme that follows time-sharing switch migration in terms of synchronization cost and the min-max controller’s load ratio.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"129-133"},"PeriodicalIF":0.0,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Network Layer for Communication Systems With Artificial Intelligence 人工智能通信系统的生成网络层
Pub Date : 2024-01-15 DOI: 10.1109/LNET.2024.3354114
Mathias Thorsager;Israel Leyva-Mayorga;Beatriz Soret;Petar Popovski
The traditional role of the network layer is the transfer of packet replicas from source to destination through intermediate network nodes. We present a generative network layer that uses Generative AI (GenAI) at intermediate or edge network nodes and analyze its impact on the required data rates in the network. We conduct a case study where the GenAI-aided nodes generate images from prompts that consist of substantially compressed latent representations. The results from network flow analyses under image quality constraints show that the generative network layer can achieve an improvement of more than 100% in terms of the required data rate.
网络层的传统角色是通过中间网络节点将数据包副本从源传输到目的地。我们提出了一种在中间或边缘网络节点使用生成式人工智能(GenAI)的生成式网络层,并分析了它对网络所需数据速率的影响。我们进行了一项案例研究,GenAI 辅助节点根据提示生成图像,这些提示由大量压缩的潜在表征组成。在图像质量限制条件下进行的网络流量分析结果表明,生成网络层可将所需数据传输率提高 100%以上。
{"title":"Generative Network Layer for Communication Systems With Artificial Intelligence","authors":"Mathias Thorsager;Israel Leyva-Mayorga;Beatriz Soret;Petar Popovski","doi":"10.1109/LNET.2024.3354114","DOIUrl":"https://doi.org/10.1109/LNET.2024.3354114","url":null,"abstract":"The traditional role of the network layer is the transfer of packet replicas from source to destination through intermediate network nodes. We present a generative network layer that uses Generative AI (GenAI) at intermediate or edge network nodes and analyze its impact on the required data rates in the network. We conduct a case study where the GenAI-aided nodes generate images from prompts that consist of substantially compressed latent representations. The results from network flow analyses under image quality constraints show that the generative network layer can achieve an improvement of more than 100% in terms of the required data rate.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"82-86"},"PeriodicalIF":0.0,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared Spectrum Cooperative Networks: A Linear Programming-Based Approach 共享频谱合作网络:基于线性规划的方法
Pub Date : 2024-01-05 DOI: 10.1109/LNET.2024.3350434
Z. Mohammadi;M. Soleimanpour Moghadam;S. Talebi;H. Ahmadi
This letter investigates a desirable power allocation scheme for shared spectrum networks and formulate it as a constrained optimization model that falls into the nonlinear class fractional programming problems. The investigation focuses on different solutions for the problem under consideration. The first investigated approach utilizes the convex optimization problem (COP) equivalent from of the problem by employing the Charnes-Cooper transformation. This approach finds the optimal solution and thus is the most appropriate from a viewpoint of optimality. The second approach employs the approximate linear programming (LP). From the complexity point of view, the LP problem can be cast as the benchmark. Our proposed linear model has lower complexity with an acceptable accuracy leading to decreasing the time delay to make the final decision on the availability. Simulation results indicate a higher coherence between the two latter approaches and the superior performance than the state-of-the-art literature in different system parameter.
这封信研究了共享频谱网络的理想功率分配方案,并将其表述为一个约束优化模型,属于非线性类分数编程问题。研究重点是所考虑问题的不同解决方案。第一种研究方法通过采用 Charnes-Cooper 变换,利用问题的凸优化问题(COP)等价。这种方法能找到最优解,因此从最优性的角度来看是最合适的。第二种方法采用近似线性规划(LP)。从复杂性的角度来看,LP 问题可以作为基准。我们提出的线性模型具有较低的复杂性和可接受的准确性,从而减少了做出可用性最终决策的时间延迟。仿真结果表明,后两种方法具有更高的一致性,在不同系统参数下的性能优于最先进的文献。
{"title":"Shared Spectrum Cooperative Networks: A Linear Programming-Based Approach","authors":"Z. Mohammadi;M. Soleimanpour Moghadam;S. Talebi;H. Ahmadi","doi":"10.1109/LNET.2024.3350434","DOIUrl":"https://doi.org/10.1109/LNET.2024.3350434","url":null,"abstract":"This letter investigates a desirable power allocation scheme for shared spectrum networks and formulate it as a constrained optimization model that falls into the nonlinear class fractional programming problems. The investigation focuses on different solutions for the problem under consideration. The first investigated approach utilizes the convex optimization problem (COP) equivalent from of the problem by employing the Charnes-Cooper transformation. This approach finds the optimal solution and thus is the most appropriate from a viewpoint of optimality. The second approach employs the approximate linear programming (LP). From the complexity point of view, the LP problem can be cast as the benchmark. Our proposed linear model has lower complexity with an acceptable accuracy leading to decreasing the time delay to make the final decision on the availability. Simulation results indicate a higher coherence between the two latter approaches and the superior performance than the state-of-the-art literature in different system parameter.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"77-81"},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious Traffic Detection With Noise Labels Based on Cross-Modal Consistency 基于跨模态一致性的噪声标签恶意流量检测
Pub Date : 2024-01-02 DOI: 10.1109/LNET.2023.3349301
Qingjun Yuan;Weina Niu;Yongjuan Wang;Gaopeng Gou;Bin Lu
To train robust malicious traffic identification models under noisy labeled datasets, a number of learning with noise labels approaches have been introduced, among which parallel training methods have been proved to be effective. Parallel training methods tend to select samples with disagreement to mitigate the risk of self-control degradation. However, it also introduces noisy knowledge into training. In this letter, we try to avoid introducing noisy knowledge by enhancing the consistency of the representations of parallel networks. Meanwhile, the two networks are heterogeneous and introduce information from different modalities, thus mitigating the risk of self-control degradation from multiple perspectives.
为了在有噪声标签的数据集下训练稳健的恶意流量识别模型,人们引入了许多有噪声标签的学习方法,其中并行训练方法被证明是有效的。并行训练方法倾向于选择有分歧的样本,以降低自控能力下降的风险。不过,这种方法也会在训练中引入噪声知识。在这封信中,我们试图通过增强并行网络表征的一致性来避免引入噪声知识。同时,两个网络是异构的,引入了来自不同模态的信息,从而从多个角度降低了自控能力下降的风险。
{"title":"Malicious Traffic Detection With Noise Labels Based on Cross-Modal Consistency","authors":"Qingjun Yuan;Weina Niu;Yongjuan Wang;Gaopeng Gou;Bin Lu","doi":"10.1109/LNET.2023.3349301","DOIUrl":"https://doi.org/10.1109/LNET.2023.3349301","url":null,"abstract":"To train robust malicious traffic identification models under noisy labeled datasets, a number of learning with noise labels approaches have been introduced, among which parallel training methods have been proved to be effective. Parallel training methods tend to select samples with disagreement to mitigate the risk of self-control degradation. However, it also introduces noisy knowledge into training. In this letter, we try to avoid introducing noisy knowledge by enhancing the consistency of the representations of parallel networks. Meanwhile, the two networks are heterogeneous and introduce information from different modalities, thus mitigating the risk of self-control degradation from multiple perspectives.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 2","pages":"148-151"},"PeriodicalIF":0.0,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network Model to Study the Underlying Characteristics of Phishing Sites 研究钓鱼网站基本特征的网络模型
Pub Date : 2023-12-28 DOI: 10.1109/LNET.2023.3347724
Avijit Gayen;Sukriti Santra;Ayush Dey;Angshuman Jana
In the rapidly evolving landscape of cyber threats, phishing continues to be a prominent vector for cyberattacks, posing significant risks to individuals, organizations and information systems. This letter delves into a comprehensive analysis of phishing sites, focusing on their distinctive characteristics through the lens of network perspectives. In this letter, we study the underlying characteristics of phishing sites from the hyperlinked connectivity perspectives. In this letter, we have used a phishing site dataset available at Mendeley data. As the dataset does not contain any hyperlinked information, We further collect the hyperlinks in each site and store that information in a JSON file. We further analyze the hyperlinks and the various features of those sites. The initial study reveals that though the Phishing sites mimic the original legitimate sites to trap people in their sites, it has distinct differences from the perspective of structural connectivity as well as the content of sites.
在快速演变的网络威胁环境中,网络钓鱼仍然是网络攻击的一个突出载体,对个人、组织和信息系统构成重大风险。本信对网络钓鱼网站进行了全面分析,通过网络视角的视角重点关注其显著特点。在这封信中,我们从超链接连接的角度研究了钓鱼网站的基本特征。在这封信中,我们使用了 Mendeley 数据库中的钓鱼网站数据集。由于该数据集不包含任何超链接信息,我们进一步收集了每个网站的超链接,并将这些信息存储在一个 JSON 文件中。我们将进一步分析这些网站的超链接和各种特征。初步研究表明,虽然网络钓鱼网站模仿原始合法网站以诱骗人们进入其网站,但从结构连接性和网站内容的角度来看,它们有着明显的不同。
{"title":"A Network Model to Study the Underlying Characteristics of Phishing Sites","authors":"Avijit Gayen;Sukriti Santra;Ayush Dey;Angshuman Jana","doi":"10.1109/LNET.2023.3347724","DOIUrl":"https://doi.org/10.1109/LNET.2023.3347724","url":null,"abstract":"In the rapidly evolving landscape of cyber threats, phishing continues to be a prominent vector for cyberattacks, posing significant risks to individuals, organizations and information systems. This letter delves into a comprehensive analysis of phishing sites, focusing on their distinctive characteristics through the lens of network perspectives. In this letter, we study the underlying characteristics of phishing sites from the hyperlinked connectivity perspectives. In this letter, we have used a phishing site dataset available at Mendeley data. As the dataset does not contain any hyperlinked information, We further collect the hyperlinks in each site and store that information in a JSON file. We further analyze the hyperlinks and the various features of those sites. The initial study reveals that though the Phishing sites mimic the original legitimate sites to trap people in their sites, it has distinct differences from the perspective of structural connectivity as well as the content of sites.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 1","pages":"46-49"},"PeriodicalIF":0.0,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Scheduling in Wireless Networks for Deterministic Service: An Efficient Genetic Algorithm Method 无线网络中确定性服务的用户调度:一种高效的遗传算法方法
Pub Date : 2023-12-13 DOI: 10.1109/LNET.2023.3342424
You Zhao;Yuchao Zhu;Shaowei Wang
To meet the stringent latency and reliability requirements of deterministic service in 5G and beyond networks, we investigate the user selection scheme jointly considering multiple transmission time intervals in a radio access network system with multiple access technology. The objective is to maximize the number of users that satisfy both data volume and latency requirements. Due to the NP-hardness of the formulated optimization task, we propose an efficient genetic algorithm to find promising user subsets at low complexity. Numerical results demonstrate that our proposal outperforms the compared greedy algorithm and round-robin algorithm, which can provide a guideline for the design of systems with deterministic requirements in practice.
为了满足 5G 及以后网络对确定性服务的延迟和可靠性的严格要求,我们研究了在采用多重接入技术的无线接入网络系统中,共同考虑多个传输时间间隔的用户选择方案。目标是在满足数据量和时延要求的前提下,最大限度地增加用户数量。由于所提出的优化任务具有 NP 难度,我们提出了一种高效的遗传算法,以较低的复杂度找到有希望的用户子集。数值结果表明,我们的建议优于相比之下的贪婪算法和轮循算法,可为实际中具有确定性要求的系统设计提供指导。
{"title":"User Scheduling in Wireless Networks for Deterministic Service: An Efficient Genetic Algorithm Method","authors":"You Zhao;Yuchao Zhu;Shaowei Wang","doi":"10.1109/LNET.2023.3342424","DOIUrl":"https://doi.org/10.1109/LNET.2023.3342424","url":null,"abstract":"To meet the stringent latency and reliability requirements of deterministic service in 5G and beyond networks, we investigate the user selection scheme jointly considering multiple transmission time intervals in a radio access network system with multiple access technology. The objective is to maximize the number of users that satisfy both data volume and latency requirements. Due to the NP-hardness of the formulated optimization task, we propose an efficient genetic algorithm to find promising user subsets at low complexity. Numerical results demonstrate that our proposal outperforms the compared greedy algorithm and round-robin algorithm, which can provide a guideline for the design of systems with deterministic requirements in practice.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Networking Letters Author Guidelines IEEE Networking Letters 作者指南
Pub Date : 2023-12-01 DOI: 10.1109/LNET.2023.3333134
{"title":"IEEE Networking Letters Author Guidelines","authors":"","doi":"10.1109/LNET.2023.3333134","DOIUrl":"https://doi.org/10.1109/LNET.2023.3333134","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"309-310"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10385206","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139406612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2023 Index IEEE Networking Letters Vol. 5 2023 Index IEEE Networking Letters Vol.
Pub Date : 2023-12-01 DOI: 10.1109/LNET.2024.3358115
{"title":"2023 Index IEEE Networking Letters Vol. 5","authors":"","doi":"10.1109/LNET.2024.3358115","DOIUrl":"https://doi.org/10.1109/LNET.2024.3358115","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"311-323"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10414365","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139572837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE COMMUNICATIONS SOCIETY IEEE 通信学会
Pub Date : 2023-12-01 DOI: 10.1109/LNET.2023.3333138
{"title":"IEEE COMMUNICATIONS SOCIETY","authors":"","doi":"10.1109/LNET.2023.3333138","DOIUrl":"https://doi.org/10.1109/LNET.2023.3333138","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10385203","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139406609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organic 6G Continuum Architecture: A Uniform Control Plane Across Devices, Radio, and Core 有机 6G 连续架构:跨越设备、无线电和核心的统一控制平面
Pub Date : 2023-12-01 DOI: 10.1109/LNET.2023.3338363
Marius Corici;Fabian Eichhorn;Thomas Magedanz
6G visionaries propose uniform control plane operations across connected devices, radio, and core networks. We introduce an advanced, organic 6G continuum concept and architecture, extending the core network’s control plane to encompass near-real-time radio control and user equipment via a novel Web-based services functionality split. This design, when compared with the 5G Service Based Architecture, showcases a reduction in complexity and an increase in flexibility.
6G 愿景者提出了跨连接设备、无线电和核心网络的统一控制平面操作。我们引入了先进、有机的 6G 连续性概念和架构,通过新颖的基于网络的服务功能分拆,将核心网络的控制平面扩展到包括近实时无线电控制和用户设备。与 5G 基于服务的架构相比,这种设计降低了复杂性,提高了灵活性。
{"title":"Organic 6G Continuum Architecture: A Uniform Control Plane Across Devices, Radio, and Core","authors":"Marius Corici;Fabian Eichhorn;Thomas Magedanz","doi":"10.1109/LNET.2023.3338363","DOIUrl":"https://doi.org/10.1109/LNET.2023.3338363","url":null,"abstract":"6G visionaries propose uniform control plane operations across connected devices, radio, and core networks. We introduce an advanced, organic 6G continuum concept and architecture, extending the core network’s control plane to encompass near-real-time radio control and user equipment via a novel Web-based services functionality split. This design, when compared with the 5G Service Based Architecture, showcases a reduction in complexity and an increase in flexibility.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 1","pages":"11-15"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10336892","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Networking Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1