首页 > 最新文献

IEEE Transactions on Machine Learning in Communications and Networking最新文献

英文 中文
Incremental Adversarial Learning for Polymorphic Attack Detection 多态攻击检测的增量对抗学习
Pub Date : 2024-06-24 DOI: 10.1109/TMLCN.2024.3418756
Ulya Sabeel;Shahram Shah Heydari;Khalil El-Khatib;Khalid Elgazzar
AI-based Network Intrusion Detection Systems (NIDS) provide effective mechanisms for cybersecurity analysts to gain insights and thwart several network attacks. Although current IDS can identify known/typical attacks with high accuracy, current research shows that such systems perform poorly when facing atypical and dynamically changing (polymorphic) attacks. In this paper, we focus on improving detection capability of the IDS for atypical and polymorphic network attacks. Our system generates adversarial polymorphic attacks against the IDS to examine its performance and incrementally retrains it to strengthen its detection of new attacks, specifically for minority attack samples in the input data. The employed attack quality analysis ensures that the adversarial atypical/polymorphic attacks generated through our system resemble original network attacks. We showcase the high performance of the IDS that we have proposed by training it using the CICIDS2017 and CICIoT2023 benchmark datasets and evaluating its performance against several atypical/polymorphic attack flows. The results indicate that the proposed technique, through adaptive training, learns the pattern of dynamically changing atypical/polymorphic attacks, identifies such attacks with approximately 90% balanced accuracy for most of the cases, and surpasses various state-of-the-art detection and class balancing techniques.
基于人工智能的网络入侵检测系统(NIDS)为网络安全分析人员提供了有效的机制,使他们能够深入了解并挫败多种网络攻击。尽管目前的 IDS 能够高精度地识别已知/典型攻击,但目前的研究表明,这类系统在面对非典型和动态变化(多态)攻击时表现不佳。在本文中,我们的重点是提高 IDS 对非典型和多态网络攻击的检测能力。我们的系统针对 IDS 生成对抗性多态攻击,以检验其性能,并对其进行增量再训练,以加强对新攻击的检测,特别是对输入数据中少数攻击样本的检测。所采用的攻击质量分析确保通过我们的系统生成的对抗性非典型/多态攻击与原始网络攻击相似。我们利用 CICIDS2017 和 CICIoT2023 基准数据集对 IDS 进行了训练,并针对若干非典型/多态攻击流对其性能进行了评估,从而展示了我们提出的 IDS 的高性能。结果表明,通过自适应训练,所提出的技术能够学习动态变化的非典型/多态攻击模式,在大多数情况下能以约 90% 的均衡准确率识别此类攻击,并超越了各种最先进的检测和类均衡技术。
{"title":"Incremental Adversarial Learning for Polymorphic Attack Detection","authors":"Ulya Sabeel;Shahram Shah Heydari;Khalil El-Khatib;Khalid Elgazzar","doi":"10.1109/TMLCN.2024.3418756","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3418756","url":null,"abstract":"AI-based Network Intrusion Detection Systems (NIDS) provide effective mechanisms for cybersecurity analysts to gain insights and thwart several network attacks. Although current IDS can identify known/typical attacks with high accuracy, current research shows that such systems perform poorly when facing atypical and dynamically changing (polymorphic) attacks. In this paper, we focus on improving detection capability of the IDS for atypical and polymorphic network attacks. Our system generates adversarial polymorphic attacks against the IDS to examine its performance and incrementally retrains it to strengthen its detection of new attacks, specifically for minority attack samples in the input data. The employed attack quality analysis ensures that the adversarial atypical/polymorphic attacks generated through our system resemble original network attacks. We showcase the high performance of the IDS that we have proposed by training it using the CICIDS2017 and CICIoT2023 benchmark datasets and evaluating its performance against several atypical/polymorphic attack flows. The results indicate that the proposed technique, through adaptive training, learns the pattern of dynamically changing atypical/polymorphic attacks, identifies such attacks with approximately 90% balanced accuracy for most of the cases, and surpasses various state-of-the-art detection and class balancing techniques.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"869-887"},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10570491","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141494827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Aided Reference-Tone-Based Phase Noise Correction Framework for Fiber-Wireless Systems 基于参考音的机器学习辅助光纤无线系统相位噪声校正框架
Pub Date : 2024-06-24 DOI: 10.1109/TMLCN.2024.3418748
Guo Hao Thng;Said Mikki
In recent years, the research involving the use of machine learning in the field of communication networks have shown promising results, in particular, improving receiver sensitivity against noise and link impairment. The proposal of analog radio-over-fiber fronthaul solutions simplifies the overall base station configuration by generating wireless signals at the desired transmission frequency, directly after photodiode heterodyne detection, without requiring additional frequency upconversion components. However, analog radio-over-fiber signals is more susceptible to nonlinear distortions originating from the optical transmission system. This paper explores the use of machine learning in an analog radio-over-fiber link, improving receiver sensitivity in the presence of phase noise. The machine learning algorithm is implemented at the receiver. To evaluate the feasibility of the proposed machine learning based phase noise correction approach, software simulations were conducted to collect data needed for machine leanring algorithm training. Initial findings suggests that the proposed machine-learning-based receiver’s can perform close to conventional heterodyned-based receivers in terms of detection accuracy, exhibiting great tolerance against phase-induced noise, with a symbol error rate improvement from $10^{-2}$ to $10^{-5}$ , using a relatively simple machine learning algorithm with only 3 hidden layers consisting of fully connected feedforward neural networks.
近年来,涉及在通信网络领域使用机器学习的研究取得了可喜的成果,特别是在提高接收器对噪声和链路损伤的灵敏度方面。光纤模拟无线电前传解决方案的提出,简化了整个基站的配置,在光电二极管外差检测后直接生成所需传输频率的无线信号,无需额外的频率上变频组件。然而,光纤模拟无线电信号更容易受到光传输系统非线性失真的影响。本文探讨了机器学习在模拟光纤无线电链路中的应用,以提高接收器在相位噪声情况下的灵敏度。机器学习算法在接收器上实现。为评估所提出的基于机器学习的相位噪声校正方法的可行性,进行了软件模拟,以收集机器学习算法训练所需的数据。初步研究结果表明,所提出的基于机器学习的接收器在检测精度方面的表现接近于传统的基于异调的接收器,对相位噪声的容忍度很高,符号错误率从 10^{-2}$ 提高到 10^{-5}$ ,使用的机器学习算法相对简单,只有 3 个由全连接前馈神经网络组成的隐藏层。
{"title":"A Machine Learning Aided Reference-Tone-Based Phase Noise Correction Framework for Fiber-Wireless Systems","authors":"Guo Hao Thng;Said Mikki","doi":"10.1109/TMLCN.2024.3418748","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3418748","url":null,"abstract":"In recent years, the research involving the use of machine learning in the field of communication networks have shown promising results, in particular, improving receiver sensitivity against noise and link impairment. The proposal of analog radio-over-fiber fronthaul solutions simplifies the overall base station configuration by generating wireless signals at the desired transmission frequency, directly after photodiode heterodyne detection, without requiring additional frequency upconversion components. However, analog radio-over-fiber signals is more susceptible to nonlinear distortions originating from the optical transmission system. This paper explores the use of machine learning in an analog radio-over-fiber link, improving receiver sensitivity in the presence of phase noise. The machine learning algorithm is implemented at the receiver. To evaluate the feasibility of the proposed machine learning based phase noise correction approach, software simulations were conducted to collect data needed for machine leanring algorithm training. Initial findings suggests that the proposed machine-learning-based receiver’s can perform close to conventional heterodyned-based receivers in terms of detection accuracy, exhibiting great tolerance against phase-induced noise, with a symbol error rate improvement from \u0000<inline-formula> <tex-math>$10^{-2}$ </tex-math></inline-formula>\u0000 to \u0000<inline-formula> <tex-math>$10^{-5}$ </tex-math></inline-formula>\u0000, using a relatively simple machine learning algorithm with only 3 hidden layers consisting of fully connected feedforward neural networks.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"888-903"},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10570478","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141494826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Spoof Detection and Authentication for IoT Devices Using Deep Learning Methods 利用深度学习方法进行物联网设备物理层欺骗检测和认证
Pub Date : 2024-06-21 DOI: 10.1109/TMLCN.2024.3417806
Da Huang;Akram Al-Hourani
The proliferation of the Internet of Things (IoT) has created significant opportunities for future telecommunications. A popular category of IoT devices is oriented toward low-cost and low-power applications. However, certain aspects of such category, including the authentication process, remain inadequately investigated against cyber vulnerabilities. This is caused by the inherent trade-off between device complexity and security rigor. In this work, we propose an authentication method based on radio frequency fingerprinting (RFF) using deep learning. This method can be implemented on the base station side without increasing the complexity of the IoT devices. Specifically, we propose four representation modalities based on continuous wavelet transform (CWT) to exploit tempo-spectral radio fingerprints. Accordingly, we utilize the generative adversarial network (GAN) and convolutional neural network (CNN) for spoof detection and authentication. For empirical validation, we consider the widely popular LoRa system with a focus on the preamble of the radio frame. The presented experimental test involves 20 off-the-shelf LoRa modules to demonstrate the feasibility of the proposed approach, showing reliable detection results of spoofing devices and high-level accuracy in authentication of 92.4%.
物联网(IoT)的普及为未来的电信业带来了巨大机遇。一类流行的物联网设备面向低成本和低功耗应用。然而,这类设备的某些方面,包括身份验证过程,仍未针对网络漏洞进行充分调查。造成这种情况的原因是设备的复杂性和安全性之间的固有权衡。在这项工作中,我们利用深度学习提出了一种基于射频指纹(RFF)的身份验证方法。这种方法可以在基站端实现,而不会增加物联网设备的复杂性。具体来说,我们提出了四种基于连续小波变换(CWT)的表示模式,以利用节奏-频谱无线电指纹。相应地,我们利用生成式对抗网络(GAN)和卷积神经网络(CNN)进行欺骗检测和验证。为了进行经验验证,我们考虑了广泛流行的 LoRa 系统,重点是无线电帧的前导码。所提交的实验测试涉及 20 个现成的 LoRa 模块,以证明所提方法的可行性,结果显示欺骗设备的检测结果可靠,认证准确率高达 92.4%。
{"title":"Physical Layer Spoof Detection and Authentication for IoT Devices Using Deep Learning Methods","authors":"Da Huang;Akram Al-Hourani","doi":"10.1109/TMLCN.2024.3417806","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3417806","url":null,"abstract":"The proliferation of the Internet of Things (IoT) has created significant opportunities for future telecommunications. A popular category of IoT devices is oriented toward low-cost and low-power applications. However, certain aspects of such category, including the authentication process, remain inadequately investigated against cyber vulnerabilities. This is caused by the inherent trade-off between device complexity and security rigor. In this work, we propose an authentication method based on radio frequency fingerprinting (RFF) using deep learning. This method can be implemented on the base station side without increasing the complexity of the IoT devices. Specifically, we propose four representation modalities based on continuous wavelet transform (CWT) to exploit tempo-spectral radio fingerprints. Accordingly, we utilize the generative adversarial network (GAN) and convolutional neural network (CNN) for spoof detection and authentication. For empirical validation, we consider the widely popular LoRa system with a focus on the preamble of the radio frame. The presented experimental test involves 20 off-the-shelf LoRa modules to demonstrate the feasibility of the proposed approach, showing reliable detection results of spoofing devices and high-level accuracy in authentication of 92.4%.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"841-854"},"PeriodicalIF":0.0,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10568158","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141474855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game Strategies for Data Transfer Infrastructures Against ML-Profile Exploits 数据传输基础设施与 ML-Profile漏洞的博弈策略
Pub Date : 2024-06-21 DOI: 10.1109/TMLCN.2024.3417889
Nageswara S. V. Rao;Chris Y. T. Ma;Fei He
Data transfer infrastructures composed of Data Transfer Nodes (DTN) are critical to meeting distributed computing and storage demands of clouds, data repositories, and complexes of supercomputers and instruments. The infrastructure’s throughput profile, estimated as a function of the connection round trip time using Machine Learning (ML) methods, is an indicator of its operational state, and has been utilized for monitoring, diagnosis and optimization purposes. We show that the inherent statistical variations and precision of throughput profiles estimated by ML methods can be exploited for unauthorized use of DTNs’ computing and network capacity. We present a game theoretic formulation that captures the cost-benefit trade-offs between an attacker that attempts to hide under the profile’s statistical variations and a provider that attempts to balance compromise detection with the cost of throughput measurements. The Nash equilibrium conditions adapted to this game provide qualitative insights and bounds for the success probabilities of the attacker and provider, by utilizing the generalization equation of ML-estimate. We present experimental results that illustrate this game wherein a significant portion of DTN computing capacity is compromised without being detected by an attacker that exploits the ML estimate properties.
由数据传输节点(DTN)组成的数据传输基础设施对于满足云、数据存储库以及超级计算机和仪器群的分布式计算和存储需求至关重要。使用机器学习(ML)方法估算的基础设施吞吐量曲线是连接往返时间的函数,是其运行状态的指标,已被用于监控、诊断和优化目的。我们的研究表明,可以利用 ML 方法估算的吞吐量曲线的固有统计变化和精度,在未经授权的情况下使用 DTN 的计算和网络容量。我们提出了一个博弈论公式,它捕捉到了试图隐藏在吞吐量曲线统计变化下的攻击者与试图平衡破坏检测与吞吐量测量成本的提供者之间的成本效益权衡。通过利用 ML-estimate 的广义方程,适应该博弈的纳什均衡条件为攻击者和提供者的成功概率提供了定性的见解和界限。我们展示的实验结果说明了这种博弈,在这种博弈中,利用 ML 估计特性的攻击者可以在不被检测到的情况下破坏大部分 DTN 计算能力。
{"title":"Game Strategies for Data Transfer Infrastructures Against ML-Profile Exploits","authors":"Nageswara S. V. Rao;Chris Y. T. Ma;Fei He","doi":"10.1109/TMLCN.2024.3417889","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3417889","url":null,"abstract":"Data transfer infrastructures composed of Data Transfer Nodes (DTN) are critical to meeting distributed computing and storage demands of clouds, data repositories, and complexes of supercomputers and instruments. The infrastructure’s throughput profile, estimated as a function of the connection round trip time using Machine Learning (ML) methods, is an indicator of its operational state, and has been utilized for monitoring, diagnosis and optimization purposes. We show that the inherent statistical variations and precision of throughput profiles estimated by ML methods can be exploited for unauthorized use of DTNs’ computing and network capacity. We present a game theoretic formulation that captures the cost-benefit trade-offs between an attacker that attempts to hide under the profile’s statistical variations and a provider that attempts to balance compromise detection with the cost of throughput measurements. The Nash equilibrium conditions adapted to this game provide qualitative insights and bounds for the success probabilities of the attacker and provider, by utilizing the generalization equation of ML-estimate. We present experimental results that illustrate this game wherein a significant portion of DTN computing capacity is compromised without being detected by an attacker that exploits the ML estimate properties.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"925-938"},"PeriodicalIF":0.0,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10568232","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141539198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reservoir Computing-Based Digital Self-Interference Cancellation for In-Band Full-Duplex Radios 基于储层计算的带内全双工无线电数字自干扰消除技术
Pub Date : 2024-06-13 DOI: 10.1109/TMLCN.2024.3414296
Zhikai Liu;Haifeng Luo;Tharmalingam Ratnarajah
Digital self-interference cancellation (DSIC) has become a pivotal strategy for implementing in-band full-duplex (IBFD) radios to overcome the hurdles posed by residual self-interference that persist after propagation and analog domain cancellation. This work proposes a novel reservoir computing-based DSIC (RC-DSIC) technique and compares it with traditional polynomial-based (PL-DSIC) and various existing neural network-based (NN-DSIC) approaches. We begin by delineating the structure of the RC and exploring its capability to address the DSIC task, highlighting its potential advantages over current methodologies. Subsequently, we examine the computational complexity of these approaches and undertake extensive simulations to compare the proposed RC-DSIC approach against PL-DSIC and existing NN-DSIC schemes. Our results reveal that the RC-DSIC scheme attains 99.84% of the performance offered by PL-based DSIC algorithms while requiring only 1.51% of the computational demand. Compared to many existing NN-DSIC schemes, the RC-DSIC method achieves at least 99.73% of its performance with no more than 36.61% of the computational demand. This performance justifies the viability of RC-DSIC as an effective and efficient solution for DSIC in IBFD, striking it is a better implementation method in terms of computational simplicity.
数字自干扰消除(DSIC)已成为实现带内全双工(IBFD)无线电的关键策略,以克服传播和模拟域消除后持续存在的残余自干扰所带来的障碍。这项研究提出了一种基于水库计算的新型 DSIC(RC-DSIC)技术,并将其与传统的多项式 DSIC(PL-DSIC)和现有的各种基于神经网络的 DSIC(NN-DSIC)方法进行了比较。我们首先描述了 RC 的结构,并探讨了它处理 DSIC 任务的能力,突出了它与现有方法相比的潜在优势。随后,我们研究了这些方法的计算复杂性,并进行了大量仿真,将所提出的 RC-DSIC 方法与 PL-DSIC 和现有的 NN-DSIC 方案进行了比较。我们的结果表明,RC-DSIC 方案的性能达到了基于 PL 的 DSIC 算法的 99.84%,而计算需求仅为 PL 的 1.51%。与许多现有的 NN-DSIC 方案相比,RC-DSIC 方法的性能至少达到了 99.73%,而计算需求却不超过 36.61%。这一性能证明了 RC-DSIC 作为 IBFD 中 DSIC 的有效解决方案的可行性,它在计算简便性方面是一种更好的实现方法。
{"title":"Reservoir Computing-Based Digital Self-Interference Cancellation for In-Band Full-Duplex Radios","authors":"Zhikai Liu;Haifeng Luo;Tharmalingam Ratnarajah","doi":"10.1109/TMLCN.2024.3414296","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3414296","url":null,"abstract":"Digital self-interference cancellation (DSIC) has become a pivotal strategy for implementing in-band full-duplex (IBFD) radios to overcome the hurdles posed by residual self-interference that persist after propagation and analog domain cancellation. This work proposes a novel reservoir computing-based DSIC (RC-DSIC) technique and compares it with traditional polynomial-based (PL-DSIC) and various existing neural network-based (NN-DSIC) approaches. We begin by delineating the structure of the RC and exploring its capability to address the DSIC task, highlighting its potential advantages over current methodologies. Subsequently, we examine the computational complexity of these approaches and undertake extensive simulations to compare the proposed RC-DSIC approach against PL-DSIC and existing NN-DSIC schemes. Our results reveal that the RC-DSIC scheme attains 99.84% of the performance offered by PL-based DSIC algorithms while requiring only 1.51% of the computational demand. Compared to many existing NN-DSIC schemes, the RC-DSIC method achieves at least 99.73% of its performance with no more than 36.61% of the computational demand. This performance justifies the viability of RC-DSIC as an effective and efficient solution for DSIC in IBFD, striking it is a better implementation method in terms of computational simplicity.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"855-868"},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10556632","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141474856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Conditional Generative Adversarial Networks for Efficient Channel Estimation in AmBC Systems 用于 AmBC 系统高效信道估计的深度条件生成对抗网络
Pub Date : 2024-06-12 DOI: 10.1109/TMLCN.2024.3413669
Shayan Zargari;Chintha Tellambura;Amine Maaref;Geoffrey Ye Li
In ambient backscatter communication (AmBC), battery-free devices (tags) harvest energy from ambient radio frequency (RF) signals and communicate with readers. Although reliable channel estimation (CE) is critical, classical pilot-based estimators tend to perform poorly. To address this challenge, we treat CE as a denoising problem using conditional generative adversarial networks (CGANs). A three-dimensional (3D) denoising block leverages spatial and temporal characteristics of pilot signals, considering both real and imaginary components of channel matrices. The proposed CGAN estimator is extensively evaluated against traditional estimators like minimum mean-squared error (MMSE), least squares (LS), convolutional neural network (CNN), CNN-based deep residual learning denoiser (CRLD), and blind estimation. Simulation results show 82% gain of the proposed estimator over CRLD and MMSE estimators at an SNR of 5 dB. Moreover, it has advanced learning capabilities and accurately replicates complex channel characteristics.
在环境反向散射通信(AmBC)中,无电池设备(标签)从环境射频(RF)信号中获取能量并与阅读器通信。尽管可靠的信道估计(CE)至关重要,但基于先导的经典估计器往往表现不佳。为了应对这一挑战,我们使用条件生成对抗网络(CGAN)将信道估计视为去噪问题。三维(3D)去噪块利用先导信号的空间和时间特性,同时考虑信道矩阵的实分量和虚分量。针对最小均方误差(MMSE)、最小二乘法(LS)、卷积神经网络(CNN)、基于 CNN 的深度残差学习去噪器(CRLD)和盲估计等传统估计器,对所提出的 CGAN 估计器进行了广泛评估。仿真结果表明,在信噪比为 5 dB 时,与 CRLD 和 MMSE 相比,所提出的估计器的增益达 82%。此外,它还具有先进的学习能力,能准确复制复杂的信道特性。
{"title":"Deep Conditional Generative Adversarial Networks for Efficient Channel Estimation in AmBC Systems","authors":"Shayan Zargari;Chintha Tellambura;Amine Maaref;Geoffrey Ye Li","doi":"10.1109/TMLCN.2024.3413669","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3413669","url":null,"abstract":"In ambient backscatter communication (AmBC), battery-free devices (tags) harvest energy from ambient radio frequency (RF) signals and communicate with readers. Although reliable channel estimation (CE) is critical, classical pilot-based estimators tend to perform poorly. To address this challenge, we treat CE as a denoising problem using conditional generative adversarial networks (CGANs). A three-dimensional (3D) denoising block leverages spatial and temporal characteristics of pilot signals, considering both real and imaginary components of channel matrices. The proposed CGAN estimator is extensively evaluated against traditional estimators like minimum mean-squared error (MMSE), least squares (LS), convolutional neural network (CNN), CNN-based deep residual learning denoiser (CRLD), and blind estimation. Simulation results show 82% gain of the proposed estimator over CRLD and MMSE estimators at an SNR of 5 dB. Moreover, it has advanced learning capabilities and accurately replicates complex channel characteristics.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"805-822"},"PeriodicalIF":0.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10555303","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141453439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint SNR and Rician K-Factor Estimation Using Multimodal Network Over Mobile Fading Channels 利用移动衰减信道上的多模态网络进行联合 SNR 和 Rician K 因子估计
Pub Date : 2024-06-11 DOI: 10.1109/TMLCN.2024.3412054
Kosuke Tamura;Shun Kojima;Phuc V. Trinh;Shinya Sugiura;Chang-Jun Ahn
This paper proposes a novel joint signal-to-noise ratio (SNR) and Rician K-factor estimation scheme based on supervised multimodal learning. In the case of using machine learning to estimate the communication environment, achieving high accuracy requires a sufficient amount of training data. To solve this problem, we introduce a multimodal convolutional neural network (CNN) structure using different waveform formats. The proposed scheme obtains “feature diversity” by increasing the modalities from the same received signal, such as sequence data and spectrogram image. Especially with a limited dataset, training convergence is accelerated since different features can be extracted from each modality. Simulations demonstrate that the presented scheme achieves superior performance compared to conventional estimation methods.
本文提出了一种基于有监督多模态学习的新型信噪比(SNR)和里克里亚 K 因子联合估计方案。在使用机器学习估计通信环境的情况下,要达到高精度需要足够多的训练数据。为了解决这个问题,我们引入了一种使用不同波形格式的多模态卷积神经网络(CNN)结构。所提出的方案通过增加同一接收信号的模式(如序列数据和频谱图图像)来获得 "特征多样性"。特别是在数据集有限的情况下,由于可以从每种模态中提取不同的特征,因此可以加快训练收敛速度。模拟结果表明,与传统的估计方法相比,所提出的方案性能更优。
{"title":"Joint SNR and Rician K-Factor Estimation Using Multimodal Network Over Mobile Fading Channels","authors":"Kosuke Tamura;Shun Kojima;Phuc V. Trinh;Shinya Sugiura;Chang-Jun Ahn","doi":"10.1109/TMLCN.2024.3412054","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3412054","url":null,"abstract":"This paper proposes a novel joint signal-to-noise ratio (SNR) and Rician K-factor estimation scheme based on supervised multimodal learning. In the case of using machine learning to estimate the communication environment, achieving high accuracy requires a sufficient amount of training data. To solve this problem, we introduce a multimodal convolutional neural network (CNN) structure using different waveform formats. The proposed scheme obtains “feature diversity” by increasing the modalities from the same received signal, such as sequence data and spectrogram image. Especially with a limited dataset, training convergence is accelerated since different features can be extracted from each modality. Simulations demonstrate that the presented scheme achieves superior performance compared to conventional estimation methods.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"766-779"},"PeriodicalIF":0.0,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10552814","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141430007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sybil Attack Detection Based on Signal Clustering in Vehicular Networks 基于车载网络信号聚类的仿冒攻击检测
Pub Date : 2024-06-05 DOI: 10.1109/TMLCN.2024.3410208
Halit Bugra Tulay;Can Emre Koksal
With the growing adoption of vehicular networks, ensuring the security of these networks is becoming increasingly crucial. However, the broadcast nature of communication in these networks creates numerous privacy and security concerns. In particular, the Sybil attack, where attackers can use multiple identities to disseminate false messages, cause service delays, or gain control of the network, poses a significant threat. To combat this attack, we propose a novel approach utilizing the channel state information (CSI) of vehicles. Our approach leverages the distinct spatio-temporal variations of CSI samples obtained in vehicular communication signals to detect these attacks. We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. Our results demonstrate a high detection rate of over 98% in the real-world experiments, showcasing the practicality and effectiveness of our method in realistic vehicular scenarios. Furthermore, we rigorously test our approach through advanced ray-tracing simulations in urban environments, which demonstrates high efficacy even in complex scenarios involving various vehicles. This makes our approach a valuable, hardware-independent solution for the V2X technologies at major intersections.
随着车载网络的日益普及,确保这些网络的安全变得越来越重要。然而,这些网络通信的广播性质造成了许多隐私和安全问题。尤其是Sybil攻击,攻击者可以利用多重身份传播虚假信息、造成服务延迟或获得网络控制权,这种攻击构成了重大威胁。为了应对这种攻击,我们提出了一种利用车辆信道状态信息(CSI)的新方法。我们的方法利用从车辆通信信号中获取的 CSI 样本的独特时空变化来检测这些攻击。我们利用车辆网络中专用短程通信(DSRC)收集的车对物(V2X)数据进行了大量实际实验。我们的结果表明,在真实世界的实验中,我们的方法具有 98% 以上的高检测率,展示了我们的方法在现实车辆场景中的实用性和有效性。此外,我们还在城市环境中通过先进的光线追踪模拟对我们的方法进行了严格测试,结果表明即使在涉及各种车辆的复杂场景中,我们的方法也能发挥很高的功效。这使得我们的方法成为主要交叉路口 V2X 技术的一种有价值的、独立于硬件的解决方案。
{"title":"Sybil Attack Detection Based on Signal Clustering in Vehicular Networks","authors":"Halit Bugra Tulay;Can Emre Koksal","doi":"10.1109/TMLCN.2024.3410208","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3410208","url":null,"abstract":"With the growing adoption of vehicular networks, ensuring the security of these networks is becoming increasingly crucial. However, the broadcast nature of communication in these networks creates numerous privacy and security concerns. In particular, the Sybil attack, where attackers can use multiple identities to disseminate false messages, cause service delays, or gain control of the network, poses a significant threat. To combat this attack, we propose a novel approach utilizing the channel state information (CSI) of vehicles. Our approach leverages the distinct spatio-temporal variations of CSI samples obtained in vehicular communication signals to detect these attacks. We conduct extensive real-world experiments using vehicle-to-everything (V2X) data, gathered from dedicated short-range communications (DSRC) in vehicular networks. Our results demonstrate a high detection rate of over 98% in the real-world experiments, showcasing the practicality and effectiveness of our method in realistic vehicular scenarios. Furthermore, we rigorously test our approach through advanced ray-tracing simulations in urban environments, which demonstrates high efficacy even in complex scenarios involving various vehicles. This makes our approach a valuable, hardware-independent solution for the V2X technologies at major intersections.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"753-765"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10550012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Aggregation for Energy-Efficient Federated Learning in mmWave Aerial-Terrestrial Integrated Networks 在毫米波空地一体化网络中进行分散聚合以实现高能效的联合学习
Pub Date : 2024-06-05 DOI: 10.1109/TMLCN.2024.3410211
Mohammed Saif;Md. Zoheb Hassan;Md. Jahangir Hossain
It is anticipated that aerial-terrestrial integrated networks incorporating unmanned aerial vehicles (UAVs) mounted relays will offer improved coverage and connectivity in the beyond 5G era. Meanwhile, federated learning (FL) is a promising distributed machine learning technique for building inference models over wireless networks due to its ability to maintain user privacy and reduce communication overhead. However, off-the-shelf FL models aggregate global parameters at a central parameter server (CPS), increasing energy consumption and latency, as well as inefficiently utilizing radio resource blocks (RRBs) for distributed user devices (UDs). This paper presents a resource-efficient and decentralized FL framework called FedMoD (federated learning with model dissemination), for millimeter-wave (mmWave) aerial-terrestrial integrated networks with the following two unique characteristics. Firstly, FedMoD incorporates a novel decentralized model dissemination scheme that uses UAVs as local model aggregators through UAV-to-UAV and device-to-device (D2D) communications. As a result, FedMoD 1) increases the number of participant UDs in developing the FL model; and 2) achieves global model aggregation without involving CPS. Secondly, FedMoD reduces FL’s energy consumption using radio resource management (RRM) under the constraints of over-the-air learning latency. To achieve this, by leveraging graph theory, FedMoD optimizes the scheduling of line-of-sight (LOS) UDs to suitable UAVs and RRBs over mmWave links and non-LOS UDs to available LOS UDs via overlay D2D communications. Extensive simulations reveal that FedMoD, despite being decentralized, offers the same convergence performance to the conventional centralized FL frameworks.
预计在 5G 时代之后,结合无人机(UAV)安装中继器的空地一体化网络将提供更好的覆盖和连接。同时,由于联合学习(FL)能够维护用户隐私并减少通信开销,因此是一种很有前途的分布式机器学习技术,可用于在无线网络上建立推理模型。然而,现成的联合学习模型在中央参数服务器(CPS)上汇集全局参数,增加了能耗和延迟,并且不能有效利用分布式用户设备(UD)的无线电资源块(RRB)。本文针对毫米波(mmWave)空地一体化网络提出了一种资源节约型分散式 FL 框架,称为 FedMoD(带模型传播的联合学习),具有以下两个独特之处。首先,FedMoD 采用了新颖的分散式模型传播方案,通过无人机对无人机和设备对设备(D2D)通信,将无人机用作本地模型聚合器。因此,FedMoD 1) 增加了参与开发 FL 模型的 UD 数量;2) 在不涉及 CPS 的情况下实现了全球模型聚合。其次,在空中学习延迟的限制下,FedMoD 利用无线电资源管理(RRM)降低了 FL 的能耗。为此,FedMoD 利用图论,通过毫米波链路将视距(LOS)UD 优化调度到合适的无人机和 RRB,并通过叠加 D2D 通信将非视距 UD 优化调度到可用的 LOS UD。大量模拟显示,尽管 FedMoD 是分散式的,但其收敛性能与传统的集中式 FL 框架相同。
{"title":"Decentralized Aggregation for Energy-Efficient Federated Learning in mmWave Aerial-Terrestrial Integrated Networks","authors":"Mohammed Saif;Md. Zoheb Hassan;Md. Jahangir Hossain","doi":"10.1109/TMLCN.2024.3410211","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3410211","url":null,"abstract":"It is anticipated that aerial-terrestrial integrated networks incorporating unmanned aerial vehicles (UAVs) mounted relays will offer improved coverage and connectivity in the beyond 5G era. Meanwhile, federated learning (FL) is a promising distributed machine learning technique for building inference models over wireless networks due to its ability to maintain user privacy and reduce communication overhead. However, off-the-shelf FL models aggregate global parameters at a central parameter server (CPS), increasing energy consumption and latency, as well as inefficiently utilizing radio resource blocks (RRBs) for distributed user devices (UDs). This paper presents a resource-efficient and decentralized FL framework called FedMoD (federated learning with model dissemination), for millimeter-wave (mmWave) aerial-terrestrial integrated networks with the following two unique characteristics. Firstly, FedMoD incorporates a novel decentralized model dissemination scheme that uses UAVs as local model aggregators through UAV-to-UAV and device-to-device (D2D) communications. As a result, FedMoD 1) increases the number of participant UDs in developing the FL model; and 2) achieves global model aggregation without involving CPS. Secondly, FedMoD reduces FL’s energy consumption using radio resource management (RRM) under the constraints of over-the-air learning latency. To achieve this, by leveraging graph theory, FedMoD optimizes the scheduling of line-of-sight (LOS) UDs to suitable UAVs and RRBs over mmWave links and non-LOS UDs to available LOS UDs via overlay D2D communications. Extensive simulations reveal that FedMoD, despite being decentralized, offers the same convergence performance to the conventional centralized FL frameworks.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"1283-1304"},"PeriodicalIF":0.0,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10550002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFL: Dynamic Federated Split Learning in Heterogeneous IoT DFL:异构物联网中的动态联合拆分学习
Pub Date : 2024-06-04 DOI: 10.1109/TMLCN.2024.3409205
Eric Samikwa;Antonio Di Maio;Torsten Braun
Federated Learning (FL) in edge Internet of Things (IoT) environments is challenging due to the heterogeneous nature of the learning environment, mainly embodied in two aspects. Firstly, the statistically heterogeneous data, usually non-independent identically distributed (non-IID), from geographically distributed clients can deteriorate the FL training accuracy. Secondly, the heterogeneous computing and communication resources in IoT devices often result in unstable training processes that slow down the training of a global model and affect energy consumption. Most existing solutions address only the unilateral side of the heterogeneity issue but neglect the joint problem of resources and data heterogeneity for the resource-constrained IoT. In this article, we propose Dynamic Federated split Learning (DFL) to address the joint problem of data and resource heterogeneity for distributed training in IoT. DFL enhances training efficiency in heterogeneous dynamic IoT through resource-aware split computing of deep neural networks and dynamic clustering of training participants based on the similarity of their sub-model layers. We evaluate DFL on a real testbed comprising heterogeneous IoT devices using two widely-adopted datasets, in various non-IID settings. Results show that DFL improves training performance in terms of training time by up to 48%, accuracy by up to 32%, and energy consumption by up to 62.8% compared to classic FL and Federated Split Learning in scenarios with both data and resource heterogeneity.
由于学习环境的异构性,边缘物联网(IoT)环境中的联合学习(FL)具有挑战性,主要体现在两个方面。首先,来自地理位置分散的客户端的统计异构数据(通常是非独立同分布(non-IID)数据)会降低集群学习的训练精度。其次,物联网设备中的异构计算和通信资源往往会导致训练过程不稳定,从而减慢全局模型的训练速度并影响能耗。现有的大多数解决方案只解决了异构问题的单方面,却忽视了资源受限的物联网的资源和数据异构的共同问题。在本文中,我们提出了动态联邦分裂学习(DFL)来解决物联网分布式训练中数据和资源异构的共同问题。DFL 通过对深度神经网络进行资源感知的拆分计算,并根据子模型层的相似性对训练参与者进行动态聚类,提高了异构动态物联网中的训练效率。我们在一个由异构物联网设备组成的真实测试平台上,使用两个广泛采用的数据集,在各种非 IID 设置下对 DFL 进行了评估。结果表明,在数据和资源异构的情况下,DFL 与传统的 FL 和联邦拆分学习相比,训练时间最多可缩短 48%,准确率最多可提高 32%,能耗最多可降低 62.8%。
{"title":"DFL: Dynamic Federated Split Learning in Heterogeneous IoT","authors":"Eric Samikwa;Antonio Di Maio;Torsten Braun","doi":"10.1109/TMLCN.2024.3409205","DOIUrl":"https://doi.org/10.1109/TMLCN.2024.3409205","url":null,"abstract":"Federated Learning (FL) in edge Internet of Things (IoT) environments is challenging due to the heterogeneous nature of the learning environment, mainly embodied in two aspects. Firstly, the statistically heterogeneous data, usually non-independent identically distributed (non-IID), from geographically distributed clients can deteriorate the FL training accuracy. Secondly, the heterogeneous computing and communication resources in IoT devices often result in unstable training processes that slow down the training of a global model and affect energy consumption. Most existing solutions address only the unilateral side of the heterogeneity issue but neglect the joint problem of resources and data heterogeneity for the resource-constrained IoT. In this article, we propose Dynamic Federated split Learning (DFL) to address the joint problem of data and resource heterogeneity for distributed training in IoT. DFL enhances training efficiency in heterogeneous dynamic IoT through resource-aware split computing of deep neural networks and dynamic clustering of training participants based on the similarity of their sub-model layers. We evaluate DFL on a real testbed comprising heterogeneous IoT devices using two widely-adopted datasets, in various non-IID settings. Results show that DFL improves training performance in terms of training time by up to 48%, accuracy by up to 32%, and energy consumption by up to 62.8% compared to classic FL and Federated Split Learning in scenarios with both data and resource heterogeneity.","PeriodicalId":100641,"journal":{"name":"IEEE Transactions on Machine Learning in Communications and Networking","volume":"2 ","pages":"733-752"},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10547401","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Machine Learning in Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1