首页 > 最新文献

IEEE Transactions on Cognitive Communications and Networking最新文献

英文 中文
Joint Communication Topology Reconstruction and Parameter Filtering for Heterogeneous Decentralized Federated Learning 异构分散联邦学习联合通信拓扑重构与参数过滤
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-09 DOI: 10.1109/TCCN.2026.3662666
Mingjun Duan;Xiaoning Zhang;Lang Fan;Yijing Liu;Jiayi Jiang;Haijun Zhang
Federated learning (FL) has been strongly promoted in wireless edge networks because it facilitates collaborative training of machine learning models while ensuring the privacy and security of individual user data. Among different FL frameworks, Decentralized Federated Learning (DFL) framework offers greater flexibility and broader applicability compared to traditional Centralized Federated Learning (CFL) framework. However, existing DFL framework fails to accommodate the heterogeneity of multi-dimensional resources (e.g., communication and computing resources), and further suffer from high communication overhead. These limitations result in reduced training efficiency. To address these issues, this paper proposes SoloDFL, a framework integrating heterogeneity-aware communication topology reconstruction and parameter filtering. In SoloDFL, each client communicates with only one neighboring client, constructing a one-on-one communication topology, and exchanges only filtered local model parameters during communication. By doing so, SoloDFL copes with the synchronization barriers caused by system heterogeneity and further reduces communication overhead. The convergence of SoloDFL is proved theoretically. Extensive experiments show that SoloDFL achieves up to a $3.9times $ acceleration and reduces communication costs by an average of 20.5% compared to the benchmark algorithms.
联邦学习(FL)在无线边缘网络中得到了大力推广,因为它促进了机器学习模型的协作训练,同时确保了个人用户数据的隐私和安全。在不同的FL框架中,与传统的集中式联邦学习(CFL)框架相比,分散式联邦学习(DFL)框架提供了更大的灵活性和更广泛的适用性。然而,现有的DFL框架不能适应多维资源(如通信和计算资源)的异构性,并且存在较高的通信开销。这些限制导致培训效率降低。为了解决这些问题,本文提出了一种集成异构感知通信拓扑重构和参数滤波的框架SoloDFL。在SoloDFL中,每个客户端只与一个相邻客户端通信,构成一对一的通信拓扑,通信时只交换过滤后的本地模型参数。通过这样做,SoloDFL处理了由系统异构性引起的同步障碍,并进一步降低了通信开销。从理论上证明了SoloDFL的收敛性。大量实验表明,与基准算法相比,SoloDFL实现了高达3.9倍的加速,平均降低了20.5%的通信成本。
{"title":"Joint Communication Topology Reconstruction and Parameter Filtering for Heterogeneous Decentralized Federated Learning","authors":"Mingjun Duan;Xiaoning Zhang;Lang Fan;Yijing Liu;Jiayi Jiang;Haijun Zhang","doi":"10.1109/TCCN.2026.3662666","DOIUrl":"https://doi.org/10.1109/TCCN.2026.3662666","url":null,"abstract":"Federated learning (FL) has been strongly promoted in wireless edge networks because it facilitates collaborative training of machine learning models while ensuring the privacy and security of individual user data. Among different FL frameworks, Decentralized Federated Learning (DFL) framework offers greater flexibility and broader applicability compared to traditional Centralized Federated Learning (CFL) framework. However, existing DFL framework fails to accommodate the heterogeneity of multi-dimensional resources (e.g., communication and computing resources), and further suffer from high communication overhead. These limitations result in reduced training efficiency. To address these issues, this paper proposes SoloDFL, a framework integrating heterogeneity-aware communication topology reconstruction and parameter filtering. In SoloDFL, each client communicates with only one neighboring client, constructing a one-on-one communication topology, and exchanges only filtered local model parameters during communication. By doing so, SoloDFL copes with the synchronization barriers caused by system heterogeneity and further reduces communication overhead. The convergence of SoloDFL is proved theoretically. Extensive experiments show that SoloDFL achieves up to a <inline-formula> <tex-math>$3.9times $ </tex-math></inline-formula> acceleration and reduces communication costs by an average of 20.5% compared to the benchmark algorithms.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"6293-6308"},"PeriodicalIF":7.0,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147299515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Local to Global: Semantic Communication-Driven Remote 3D Scene Reconstruction Using Low-Altitude Platforms 从局部到全局:语义通信驱动的低空平台远程三维场景重建
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-09 DOI: 10.1109/TCCN.2026.3662333
Tianle Mai;Haipeng Yao;Gepeng Zhu;Chenlang Jin;Xiangjun Xin
Recently, Neural Radiance Fields (NeRF) have demonstrated excellent fidelity performance in 3D scene reconstruction. However, their significant data demands pose challenges for low-altitude platforms, particularly due to stringent bandwidth constraints. Semantic communication (SC) offers a solution by transmitting only the most task-relevant information, which would significantly reduce the required data throughput. Besides, the recent emergence of large AI models (LAMs) further strengthens SC by providing powerful, pre-trained semantic encoders that can extract and compress high-value features. Therefore, in this paper, we propose an end-to-end framework, LAM-SC-3DR, which integrates LAM-driven semantic extraction, semantic communication, and NeRF-based 3D reconstruction to optimize remote 3D scene recovery for low-altitude platforms. The framework is consists of three main modules: the Semantic Feature Extraction (SFE) module, which utilizes a pre-trained LAM to extract multi-level semantics (including object, appearance, and geometry) from 2D images; the Joint Semantic–Channel Coding (SCC) module, which integrates semantic compression with channel coding for reliable transmission over the noisy wireless links; and the 3D Scene Reconstruction (3DSR) module, which combines the received semantics to create photorealistic, semantically consistent volumetric renderings. Extensive evaluations demonstrate that LAM-SC-3DR can reduce transmission load by up to 96%, while maintaining 3D semantic reconstruction quality.
近年来,神经辐射场(Neural Radiance Fields, NeRF)在三维场景重建中表现出了优异的保真性能。然而,它们巨大的数据需求给低空平台带来了挑战,特别是由于严格的带宽限制。语义通信(SC)提供了一种解决方案,它只传输与任务最相关的信息,这将显著降低所需的数据吞吐量。此外,最近出现的大型人工智能模型(lam)通过提供强大的,预训练的语义编码器,可以提取和压缩高价值特征,进一步加强了SC。因此,在本文中,我们提出了一个端到端框架LAM-SC-3DR,该框架集成了lam驱动的语义提取、语义通信和基于nerf的3D重建,以优化低空平台的远程3D场景恢复。该框架由三个主要模块组成:语义特征提取(SFE)模块,它利用预训练的LAM从2D图像中提取多层次语义(包括物体、外观和几何形状);联合语义信道编码(Joint semantic - channel Coding, SCC)模块,将语义压缩与信道编码相结合,在有噪声的无线链路上实现可靠传输;以及3D场景重建(3DSR)模块,该模块结合接收到的语义来创建逼真的,语义一致的体效效图。广泛的评估表明,LAM-SC-3DR可以在保持3D语义重建质量的同时,将传输负载降低96%。
{"title":"From Local to Global: Semantic Communication-Driven Remote 3D Scene Reconstruction Using Low-Altitude Platforms","authors":"Tianle Mai;Haipeng Yao;Gepeng Zhu;Chenlang Jin;Xiangjun Xin","doi":"10.1109/TCCN.2026.3662333","DOIUrl":"10.1109/TCCN.2026.3662333","url":null,"abstract":"Recently, Neural Radiance Fields (NeRF) have demonstrated excellent fidelity performance in 3D scene reconstruction. However, their significant data demands pose challenges for low-altitude platforms, particularly due to stringent bandwidth constraints. Semantic communication (SC) offers a solution by transmitting only the most task-relevant information, which would significantly reduce the required data throughput. Besides, the recent emergence of large AI models (LAMs) further strengthens SC by providing powerful, pre-trained semantic encoders that can extract and compress high-value features. Therefore, in this paper, we propose an end-to-end framework, LAM-SC-3DR, which integrates LAM-driven semantic extraction, semantic communication, and NeRF-based 3D reconstruction to optimize remote 3D scene recovery for low-altitude platforms. The framework is consists of three main modules: the Semantic Feature Extraction (SFE) module, which utilizes a pre-trained LAM to extract multi-level semantics (including object, appearance, and geometry) from 2D images; the Joint Semantic–Channel Coding (SCC) module, which integrates semantic compression with channel coding for reliable transmission over the noisy wireless links; and the 3D Scene Reconstruction (3DSR) module, which combines the received semantics to create photorealistic, semantically consistent volumetric renderings. Extensive evaluations demonstrate that LAM-SC-3DR can reduce transmission load by up to 96%, while maintaining 3D semantic reconstruction quality.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"6207-6220"},"PeriodicalIF":7.0,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146146084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PreConfig: A Unified Language Model Framework for Network Configuration Automation PreConfig:用于网络配置自动化的统一语言模型框架
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-09 DOI: 10.1109/TCCN.2026.3662678
Fuliang Li;Bocheng Liang;Haozhi Lang;Jiajie Zhang;Jiaxing Shen;Chengxi Gao;Xingwei Wang
Manual network configuration tools are constrained by their reliance on extensive domain expertise and rigid, single-purpose designs, limiting their adaptability to diverse scenarios and complex applications. This paper introduces PreConfig, a novel language model-based framework for automating network configuration tasks. By framing tasks such as configuration generation, translation, analysis, and completion as text-to-text transformations, PreConfig unifies these processes under a single versatile model. Leveraging advancements in natural language processing, PreConfig eliminates the need for extensive manual re-engineering by automatically learning domain-specific patterns through continued training on a specialized network configuration corpus. To address the lack of domain knowledge in general language models, we construct a comprehensive dataset from vendor manuals and community forums and fine-tune a programming language model for robust performance across various tasks. Additionally, we propose ConfigBLEU, a novel evaluation metric that incorporates syntax-aware features to assess the accuracy of generated configurations. Experimental results demonstrate that PreConfig significantly outperforms existing tools and general-purpose language models in both syntactic accuracy and semantic correctness across diverse network configuration tasks. This work establishes a unified and adaptable approach for advancing network configuration automation.
手动网络配置工具受限于它们依赖广泛的领域专业知识和严格的单一用途设计,限制了它们对各种场景和复杂应用程序的适应性。本文介绍了一种新的基于语言模型的网络配置自动化框架PreConfig。通过将配置生成、转换、分析和完成等任务作为文本到文本的转换,PreConfig将这些过程统一在一个通用模型下。利用自然语言处理的进步,PreConfig通过在专门的网络配置语料库上进行持续训练,自动学习特定于领域的模式,从而消除了大量手动重新设计的需要。为了解决通用语言模型中缺乏领域知识的问题,我们从供应商手册和社区论坛中构建了一个全面的数据集,并对编程语言模型进行了微调,以实现跨各种任务的健壮性能。此外,我们提出了ConfigBLEU,这是一种新的评估度量,它结合了语法感知特性来评估生成配置的准确性。实验结果表明,在不同的网络配置任务中,PreConfig在语法准确性和语义正确性方面都明显优于现有的工具和通用语言模型。这项工作为推进网络配置自动化建立了一种统一的、适应性强的方法。
{"title":"PreConfig: A Unified Language Model Framework for Network Configuration Automation","authors":"Fuliang Li;Bocheng Liang;Haozhi Lang;Jiajie Zhang;Jiaxing Shen;Chengxi Gao;Xingwei Wang","doi":"10.1109/TCCN.2026.3662678","DOIUrl":"https://doi.org/10.1109/TCCN.2026.3662678","url":null,"abstract":"Manual network configuration tools are constrained by their reliance on extensive domain expertise and rigid, single-purpose designs, limiting their adaptability to diverse scenarios and complex applications. This paper introduces PreConfig, a novel language model-based framework for automating network configuration tasks. By framing tasks such as configuration generation, translation, analysis, and completion as text-to-text transformations, PreConfig unifies these processes under a single versatile model. Leveraging advancements in natural language processing, PreConfig eliminates the need for extensive manual re-engineering by automatically learning domain-specific patterns through continued training on a specialized network configuration corpus. To address the lack of domain knowledge in general language models, we construct a comprehensive dataset from vendor manuals and community forums and fine-tune a programming language model for robust performance across various tasks. Additionally, we propose ConfigBLEU, a novel evaluation metric that incorporates syntax-aware features to assess the accuracy of generated configurations. Experimental results demonstrate that PreConfig significantly outperforms existing tools and general-purpose language models in both syntactic accuracy and semantic correctness across diverse network configuration tasks. This work establishes a unified and adaptable approach for advancing network configuration automation.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"6320-6330"},"PeriodicalIF":7.0,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147299512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NOMA and Hybrid Beamforming Aided Secure Computation Offloading for mmWave VEC Networks With Multi-Agent DRL 基于多agent DRL的毫米波VEC网络的NOMA和混合波束形成辅助安全计算卸载
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-09 DOI: 10.1109/TCCN.2026.3662303
Ying Ju;Zhiwei Cao;Mingdong Li;Lei Liu;Qingqi Pei;Mianxiong Dong;Shahid Mumtaz;Mohsen Guizani
Mobile edge computing (MEC) meets the requirements of various delay-sensitive applications by providing high-speed computing services to a large number of user vehicles simultaneously. Nevertheless, the inherent open feature of wireless channels and the constraints of limited spectrum resources present significant challenges to achieving both secure offloading and high offloading rate simultaneously. Millimeter wave (mmWave) can provide user vehicles with abundant spectrum resources, but its short wavelength causes high path loss. In this paper, we utilize hybrid beamforming and non-orthogonal multiple access (NOMA) technologies to improve the offloading rate of user vehicles and to interfere with eavesdroppers, thus improving the security of the offloading process in mmWave vehicular edge computing (VEC) networks. We first use the K-means algorithm to cluster user vehicles. Then, we minimize the system delay by jointly optimizing the analog beamforming matrix, the user vehicle transmit power and the allocation ratio of the MEC server computation resource while ensuring the security of the offloading process. The above optimization problem is formulated as a Markov decision process (MDP) and a twin Delayed Deep Deterministic Policy Gradient (TD3)-Dueling Double Deep Q Network (D3QN) based multi-agent secure computation offloading scheme is proposed to solve the MDP problem. Simulation results demonstrate that the TD3-D3QN based multi-agent scheme is able to adapt to highly dynamic VEC networks when guaranteeing the security of the offloading process and low system delay.
移动边缘计算(MEC)通过同时向大量用户车辆提供高速计算服务,满足各种延迟敏感应用的需求。然而,无线信道固有的开放性和有限频谱资源的限制对同时实现安全卸载和高卸载率提出了重大挑战。毫米波(mmWave)可以为用户车辆提供丰富的频谱资源,但其波长较短,导致路径损耗大。在本文中,我们利用混合波束形成和非正交多址(NOMA)技术来提高用户车辆的卸载率和干扰窃听者,从而提高毫米波车辆边缘计算(VEC)网络中卸载过程的安全性。我们首先使用K-means算法对用户车辆进行聚类。然后,在保证卸载过程安全的前提下,通过联合优化模拟波束形成矩阵、用户车辆发射功率和MEC服务器计算资源分配比例,使系统延迟最小化。将上述优化问题表述为马尔可夫决策过程(MDP),并提出了一种基于双延迟深度确定性策略梯度(TD3)-Dueling双深度Q网络(D3QN)的多智能体安全计算卸载方案来解决MDP问题。仿真结果表明,基于TD3-D3QN的多智能体方案在保证卸载过程安全性和系统低延迟的前提下,能够适应高度动态的VEC网络。
{"title":"NOMA and Hybrid Beamforming Aided Secure Computation Offloading for mmWave VEC Networks With Multi-Agent DRL","authors":"Ying Ju;Zhiwei Cao;Mingdong Li;Lei Liu;Qingqi Pei;Mianxiong Dong;Shahid Mumtaz;Mohsen Guizani","doi":"10.1109/TCCN.2026.3662303","DOIUrl":"10.1109/TCCN.2026.3662303","url":null,"abstract":"Mobile edge computing (MEC) meets the requirements of various delay-sensitive applications by providing high-speed computing services to a large number of user vehicles simultaneously. Nevertheless, the inherent open feature of wireless channels and the constraints of limited spectrum resources present significant challenges to achieving both secure offloading and high offloading rate simultaneously. Millimeter wave (mmWave) can provide user vehicles with abundant spectrum resources, but its short wavelength causes high path loss. In this paper, we utilize hybrid beamforming and non-orthogonal multiple access (NOMA) technologies to improve the offloading rate of user vehicles and to interfere with eavesdroppers, thus improving the security of the offloading process in mmWave vehicular edge computing (VEC) networks. We first use the K-means algorithm to cluster user vehicles. Then, we minimize the system delay by jointly optimizing the analog beamforming matrix, the user vehicle transmit power and the allocation ratio of the MEC server computation resource while ensuring the security of the offloading process. The above optimization problem is formulated as a Markov decision process (MDP) and a twin Delayed Deep Deterministic Policy Gradient (TD3)-Dueling Double Deep Q Network (D3QN) based multi-agent secure computation offloading scheme is proposed to solve the MDP problem. Simulation results demonstrate that the TD3-D3QN based multi-agent scheme is able to adapt to highly dynamic VEC networks when guaranteeing the security of the offloading process and low system delay.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"6089-6103"},"PeriodicalIF":7.0,"publicationDate":"2026-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146146086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Freshness Performance Analysis and Optimization in Timely and Secure Low Altitude Economics 及时安全低空经济下数据新鲜度性能分析与优化
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-06 DOI: 10.1109/TCCN.2026.3661502
Yaoqi Yang;Ming He;Wei Han;Xin Lu;Chenping Hou
Low altitude economy (LAE) can significantly promote the air-to-ground communication development by providing various data collection, transmission and computing services. However, due to the openness trait of wireless channel, LAE also faces timeliness and security concerns on sensing data’s stale and leakage at ground base station (BS) end. This can result in delayed information delivery, compromised data integrity, and increased vulnerability to malicious attacks. In this regard, to address the above concerns, this paper first establishes the blockchain-based UAV-enabled mobile crowdsensing (MCS) model. Then, after determining the impact of the blockchain on data timeliness, the mathematical expressions of the data freshness metric are derived in closed form. On this basis, a data freshness minimization problem with security premise is formulated, where the UAV’s transmission power, computing rate, and BS’s power allocation ratio are jointly optimized. Furthermore, one deep reinforcement learning-aided multi-objective optimization (MOP) algorithm is proposed to solve the formulated problem. At last, under various parameter settings, numerical results have evaluated the effectiveness of the proposals.
低空经济(LAE)通过提供各种数据采集、传输和计算服务,可以显著促进空对地通信的发展。然而,由于无线信道的开放性,LAE还面临着地面基站端感知数据陈旧和泄漏的时效性和安全性问题。这可能导致信息传递延迟、数据完整性受损,并增加遭受恶意攻击的脆弱性。为此,为了解决上述问题,本文首先建立了基于区块链的无人机移动众测(MCS)模型。然后,在确定区块链对数据时效性的影响后,导出数据新鲜度度量的封闭数学表达式。在此基础上,提出了在安全前提下的数据新鲜度最小化问题,联合优化无人机的发射功率、计算速率和BS的功率分配比例。在此基础上,提出了一种深度强化学习辅助多目标优化(MOP)算法。最后,在不同的参数设置下,数值结果对所提方案的有效性进行了评价。
{"title":"Data Freshness Performance Analysis and Optimization in Timely and Secure Low Altitude Economics","authors":"Yaoqi Yang;Ming He;Wei Han;Xin Lu;Chenping Hou","doi":"10.1109/TCCN.2026.3661502","DOIUrl":"10.1109/TCCN.2026.3661502","url":null,"abstract":"Low altitude economy (LAE) can significantly promote the air-to-ground communication development by providing various data collection, transmission and computing services. However, due to the openness trait of wireless channel, LAE also faces timeliness and security concerns on sensing data’s stale and leakage at ground base station (BS) end. This can result in delayed information delivery, compromised data integrity, and increased vulnerability to malicious attacks. In this regard, to address the above concerns, this paper first establishes the blockchain-based UAV-enabled mobile crowdsensing (MCS) model. Then, after determining the impact of the blockchain on data timeliness, the mathematical expressions of the data freshness metric are derived in closed form. On this basis, a data freshness minimization problem with security premise is formulated, where the UAV’s transmission power, computing rate, and BS’s power allocation ratio are jointly optimized. Furthermore, one deep reinforcement learning-aided multi-objective optimization (MOP) algorithm is proposed to solve the formulated problem. At last, under various parameter settings, numerical results have evaluated the effectiveness of the proposals.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"6016-6030"},"PeriodicalIF":7.0,"publicationDate":"2026-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146134232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Oriented Open Set Adversarial Attacks to Automatic Modulation Classification 面向多方向开集对抗性攻击的自动调制分类
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-06 DOI: 10.1109/TCCN.2026.3661500
Yandie Yang;Sicheng Zhang;Kuixian Li;Yun Lin
Automatic Modulation Classification (AMC) plays a crucial role in spectrum monitoring and communication security. Open Set Recognition (OSR) methods have been widely applied to AMC tasks to address the challenge of recognizing known modulation types and identifying unknown modulation signals in open-world scenarios. However, existing research primarily emphasize the accuracy of open set recognition while overlooking potential security threats posed by adversarial attacks. To address this gap, we investigate the security vulnerabilities of AMC methods under adversarial attacks in open electromagnetic environments from the perspective of artificial intelligence security. We propose two types of multi-oriented open set adversarial attacks, including Label-oriented Open Set Adversarial Attacks (OSLoA) and Feature-oriented Open Set Adversarial Attack (OSFoA). Based on the discrimination mechanism of the OSR model, we propose the OSLoA method. This method increases the confidence of misclassification for unknown signals, which causes them to be recognized as known classes. Additionally, we introduce the innovative OSFoA method. It reduces the distance between the class activation features of signals from unknown classes and those of the known classes into which unknown signals are most likely to be misclassified. As a result, the unknown classes are pushed closer to the known classes in the feature space, further enhancing the attack effectiveness. Notably, during the computation of class activation features, only those features that make positive contributions to the prediction output are retained. Comprehensive experiments were conducted on both public and real-world datasets. The results demonstrate that the proposed OSLoA and OSFoA methods achieve excellent performance and further reveal the vulnerability of AMC methods to open adversarial security threats.
自动调制分类(AMC)在频谱监控和通信安全中起着至关重要的作用。开放集识别(OSR)方法已广泛应用于AMC任务中,以解决在开放世界场景中识别已知调制类型和识别未知调制信号的挑战。然而,现有的研究主要强调开放集识别的准确性,而忽略了对抗性攻击带来的潜在安全威胁。为了解决这一问题,我们从人工智能安全的角度研究了开放电磁环境下AMC方法在对抗性攻击下的安全漏洞。我们提出了两种多面向开放集对抗攻击,即面向标签的开放集对抗攻击(Label-oriented open set adversarial Attack, OSLoA)和面向特征的开放集对抗攻击(Feature-oriented open set adversarial Attack, OSFoA)。基于OSR模型的判别机制,提出了OSLoA方法。该方法提高了对未知信号误分类的置信度,使其被识别为已知类。此外,我们还介绍了创新的OSFoA方法。它减小了未知类信号的类激活特征与已知类信号的类激活特征之间的距离,而已知类信号最有可能被错误分类。从而使未知类在特征空间中向已知类靠拢,进一步提高了攻击的有效性。值得注意的是,在计算类激活特征时,只保留那些对预测输出有积极贡献的特征。在公共和现实世界的数据集上进行了全面的实验。结果表明,提出的OSLoA和OSFoA方法取得了优异的性能,并进一步揭示了AMC方法在打开对抗性安全威胁时的脆弱性。
{"title":"Multi-Oriented Open Set Adversarial Attacks to Automatic Modulation Classification","authors":"Yandie Yang;Sicheng Zhang;Kuixian Li;Yun Lin","doi":"10.1109/TCCN.2026.3661500","DOIUrl":"10.1109/TCCN.2026.3661500","url":null,"abstract":"Automatic Modulation Classification (AMC) plays a crucial role in spectrum monitoring and communication security. Open Set Recognition (OSR) methods have been widely applied to AMC tasks to address the challenge of recognizing known modulation types and identifying unknown modulation signals in open-world scenarios. However, existing research primarily emphasize the accuracy of open set recognition while overlooking potential security threats posed by adversarial attacks. To address this gap, we investigate the security vulnerabilities of AMC methods under adversarial attacks in open electromagnetic environments from the perspective of artificial intelligence security. We propose two types of multi-oriented open set adversarial attacks, including Label-oriented Open Set Adversarial Attacks (OSLoA) and Feature-oriented Open Set Adversarial Attack (OSFoA). Based on the discrimination mechanism of the OSR model, we propose the OSLoA method. This method increases the confidence of misclassification for unknown signals, which causes them to be recognized as known classes. Additionally, we introduce the innovative OSFoA method. It reduces the distance between the class activation features of signals from unknown classes and those of the known classes into which unknown signals are most likely to be misclassified. As a result, the unknown classes are pushed closer to the known classes in the feature space, further enhancing the attack effectiveness. Notably, during the computation of class activation features, only those features that make positive contributions to the prediction output are retained. Comprehensive experiments were conducted on both public and real-world datasets. The results demonstrate that the proposed OSLoA and OSFoA methods achieve excellent performance and further reveal the vulnerability of AMC methods to open adversarial security threats.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"6281-6292"},"PeriodicalIF":7.0,"publicationDate":"2026-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146134237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory Optimization for Data Collection in Hybrid UAV and UGV Low-Altitude Economy Network 无人机与UGV混合低空经济网络数据采集轨迹优化
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-06 DOI: 10.1109/TCCN.2026.3661515
Tao Huang;Gengyuan Lu;Mingan Luan;Zheng Chang;Ying-Chang Liang
The rapid evolution of unmanned aerial vehicle (UAV) technology has given rise to the new concept of the “low-altitude economy (LAE)” and promoted innovation in various application fields. However, the efficiency of low-altitude services is still significantly constrained by the energy consumption and payload limitations of UAVs. Accordingly, in this paper, we propose a hybrid UAV and unmanned ground vehicle (UGV) LAE framework to address the limitation in UAV-based LAE networks. Specifically, in virtue of the advantages of UGVs in advanced communication, large batteries, and computation modules, the hybrid mode can provide an additional degree of freedom for environmental information collection in LAE networks. Nevertheless, for the considered hybrid framework, which involves the collaborative optimization of numerous agents across multiple dimensions, traditional methods are inefficient and difficult to implement effectively. Hence, we present a machine learning (ML)-based method to handle this issue. More in detail, we first design an iterative self-organizing data analysis techniques strategy to form sensing nodes (SNs) clusters, where the cluster heads (CHs) collect data from SNs in advance in order to reduce the transmission delay. Then, a multi-UGV Hamiltonian trajectory planning algorithm is involved to design the trajectory of the UGVs. After the data has been transmitted from the CHs to UGVs, the UAVs are used to collect data from the UGVs and transmit the data to the remote base station. Correspondingly, we propose a multi-agent deep reinforcement learning algorithm using multi-agent deep deterministic policy gradient to design the trajectory of the UAVs. The simulation results demonstrate the effectiveness and advantages of our proposed hybrid UAV-UGV strategy and the ML-based algorithm.
无人机技术的快速发展催生了“低空经济”的新概念,推动了各个应用领域的创新。然而,低空服务的效率仍然受到无人机的能量消耗和有效载荷限制的显著制约。因此,本文提出了一种无人机和无人地面车辆(UGV)混合LAE框架,以解决基于无人机的LAE网络的局限性。具体而言,由于ugv在通信先进、电池容量大、计算模块等方面的优势,混合模式可以为LAE网络环境信息采集提供额外的自由度。然而,对于所考虑的混合框架,涉及多个agent跨多个维度的协同优化,传统方法效率低下且难以有效实现。因此,我们提出了一个基于机器学习(ML)的方法来处理这个问题。更详细地说,我们首先设计了一种迭代自组织数据分析技术策略,以形成感知节点(SNs)集群,其中簇头(CHs)提前从SNs收集数据以减少传输延迟。然后,采用多ugv哈密顿轨迹规划算法对ugv进行轨迹设计。从CHs向ugv传输数据后,使用无人机从ugv收集数据并将数据传输到远程基站。相应地,我们提出了一种基于多智能体深度确定性策略梯度的多智能体深度强化学习算法来设计无人机的飞行轨迹。仿真结果验证了所提出的UAV-UGV混合策略和基于ml的算法的有效性和优越性。
{"title":"Trajectory Optimization for Data Collection in Hybrid UAV and UGV Low-Altitude Economy Network","authors":"Tao Huang;Gengyuan Lu;Mingan Luan;Zheng Chang;Ying-Chang Liang","doi":"10.1109/TCCN.2026.3661515","DOIUrl":"10.1109/TCCN.2026.3661515","url":null,"abstract":"The rapid evolution of unmanned aerial vehicle (UAV) technology has given rise to the new concept of the “low-altitude economy (LAE)” and promoted innovation in various application fields. However, the efficiency of low-altitude services is still significantly constrained by the energy consumption and payload limitations of UAVs. Accordingly, in this paper, we propose a hybrid UAV and unmanned ground vehicle (UGV) LAE framework to address the limitation in UAV-based LAE networks. Specifically, in virtue of the advantages of UGVs in advanced communication, large batteries, and computation modules, the hybrid mode can provide an additional degree of freedom for environmental information collection in LAE networks. Nevertheless, for the considered hybrid framework, which involves the collaborative optimization of numerous agents across multiple dimensions, traditional methods are inefficient and difficult to implement effectively. Hence, we present a machine learning (ML)-based method to handle this issue. More in detail, we first design an iterative self-organizing data analysis techniques strategy to form sensing nodes (SNs) clusters, where the cluster heads (CHs) collect data from SNs in advance in order to reduce the transmission delay. Then, a multi-UGV Hamiltonian trajectory planning algorithm is involved to design the trajectory of the UGVs. After the data has been transmitted from the CHs to UGVs, the UAVs are used to collect data from the UGVs and transmit the data to the remote base station. Correspondingly, we propose a multi-agent deep reinforcement learning algorithm using multi-agent deep deterministic policy gradient to design the trajectory of the UAVs. The simulation results demonstrate the effectiveness and advantages of our proposed hybrid UAV-UGV strategy and the ML-based algorithm.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"6031-6044"},"PeriodicalIF":7.0,"publicationDate":"2026-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146134236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TACM-MR: Topographically-Augmented Channel Model Multi-Receiver Dataset 地形增强信道模型多接收机数据集
IF 8.6 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-06 DOI: 10.1109/tccn.2026.3661494
Kenneth L Witham, Nishanth Marer Prabhu, Marius Necsoiu, Chad Spooner, Gunar Schirner
{"title":"TACM-MR: Topographically-Augmented Channel Model Multi-Receiver Dataset","authors":"Kenneth L Witham, Nishanth Marer Prabhu, Marius Necsoiu, Chad Spooner, Gunar Schirner","doi":"10.1109/tccn.2026.3661494","DOIUrl":"https://doi.org/10.1109/tccn.2026.3661494","url":null,"abstract":"","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"91 1","pages":""},"PeriodicalIF":8.6,"publicationDate":"2026-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146134235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agentic AI-Driven Federated Feature Distillation for Adaptive Resource–Performance Tradeoffs in Wireless Edge Networks 基于代理ai驱动的无线边缘网络自适应资源性能权衡的联邦特征提取
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-06 DOI: 10.1109/TCCN.2026.3661503
Pengchao Han;Zhenshuai Yin;Chang Liu;Yi Fang
Federated learning (FL) has emerged as a key enabler of collaborative intelligence in wireless edge networks by allowing distributed clients to train models without sharing raw data. However, FL faces significant challenges, including high communication costs, a rigid framework, and privacy concerns, as it shares local model parameters with a homogeneous architecture across clients. Federated knowledge distillation (FedKD) addresses these issues by allowing collaboration among clients with black-box heterogeneous model architectures. However, FedKD often suffers from limited model performance due to the restricted scope of shared knowledge, i.e., model outputs. In this paper, we propose a novel Federated feature distillation (FFD) framework with a guaranteed convergence bound to enhance FedKD by enabling knowledge distillation among clients’ intermediate features. However, transmitting intermediate features and performing feature distillation introduce additional communication and computation overheads, which is difficult to optimize due to the dynamic and stochastic characteristics of model training. To address this, we embrace agentic artificial intelligence (AI) paradigm and propose an actor-critic reinforcement learning algorithm that adaptively selects and weights features for distillation. Extensive experiments across various datasets demonstrate that our proposed algorithm achieves superior model accuracy while significantly reducing resource costs compared to baseline approaches, highlighting the potential of integrating agentic AI with FL to enable efficient and intelligent collaboration in wireless edge networks.
通过允许分布式客户端在不共享原始数据的情况下训练模型,联邦学习(FL)已成为无线边缘网络中协作智能的关键推动者。然而,FL面临着巨大的挑战,包括高昂的通信成本、严格的框架和隐私问题,因为它与跨客户端的同构架构共享本地模型参数。联邦知识蒸馏(FedKD)通过允许具有黑箱异构模型体系结构的客户机之间的协作来解决这些问题。然而,由于共享知识(即模型输出)的范围有限,FedKD经常受到模型性能的限制。在本文中,我们提出了一种新的具有保证收敛界的联邦特征蒸馏(FFD)框架,通过在客户端中间特征之间进行知识蒸馏来增强联邦特征蒸馏。然而,传输中间特征和执行特征蒸馏会引入额外的通信和计算开销,并且由于模型训练的动态和随机特性,难以优化。为了解决这个问题,我们采用了代理人工智能(AI)范式,并提出了一种演员-评论家强化学习算法,该算法可以自适应地选择和加权特征以进行蒸馏。跨各种数据集的广泛实验表明,与基线方法相比,我们提出的算法实现了卓越的模型准确性,同时显着降低了资源成本,突出了将代理AI与FL集成在一起的潜力,以实现无线边缘网络中高效和智能的协作。
{"title":"Agentic AI-Driven Federated Feature Distillation for Adaptive Resource–Performance Tradeoffs in Wireless Edge Networks","authors":"Pengchao Han;Zhenshuai Yin;Chang Liu;Yi Fang","doi":"10.1109/TCCN.2026.3661503","DOIUrl":"10.1109/TCCN.2026.3661503","url":null,"abstract":"Federated learning (FL) has emerged as a key enabler of collaborative intelligence in wireless edge networks by allowing distributed clients to train models without sharing raw data. However, FL faces significant challenges, including high communication costs, a rigid framework, and privacy concerns, as it shares local model parameters with a homogeneous architecture across clients. Federated knowledge distillation (FedKD) addresses these issues by allowing collaboration among clients with black-box heterogeneous model architectures. However, FedKD often suffers from limited model performance due to the restricted scope of shared knowledge, i.e., model outputs. In this paper, we propose a novel Federated feature distillation (FFD) framework with a guaranteed convergence bound to enhance FedKD by enabling knowledge distillation among clients’ intermediate features. However, transmitting intermediate features and performing feature distillation introduce additional communication and computation overheads, which is difficult to optimize due to the dynamic and stochastic characteristics of model training. To address this, we embrace agentic artificial intelligence (AI) paradigm and propose an actor-critic reinforcement learning algorithm that adaptively selects and weights features for distillation. Extensive experiments across various datasets demonstrate that our proposed algorithm achieves superior model accuracy while significantly reducing resource costs compared to baseline approaches, highlighting the potential of integrating agentic AI with FL to enable efficient and intelligent collaboration in wireless edge networks.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"6076-6088"},"PeriodicalIF":7.0,"publicationDate":"2026-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146134230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPFL: A Cluster-Based Parallel Blockchain Scheme for Secure and Efficient Federated Learning in Intelligent Connected Vehicles CPFL:一种基于集群的智能网联汽车安全高效联邦学习并行区块链方案
IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-02-06 DOI: 10.1109/TCCN.2026.3661499
Qi Qi;Yan Lei;Yixin Li;Hongyi Li;Qi Zhou
The rapid evolution of Intelligent Connected Vehicles (ICVs) has transformed automobiles into data-rich edge nodes, enabled by progress in artificial intelligence (AI), federated learning (FL), and 5G-enabled communication. While FL facilitates privacy-preserving model training by retaining data locally, its practical deployment in ICVs faces two key challenges: vulnerability to malicious parameter updates and degraded convergence under non-independent and identically distributed (non-IID) data. To address these issues, this paper proposes a secure and efficient cluster-based blockchain scheme for Byzantine resilience and model synchronization of FL. The scheme introduces a mainchain for periodic global model aggregation and multiple subchains that coordinate localized training. These subchains dynamically group vehicles into clusters based on the similarity of their model parameters, which is quantified using the Wasserstein distance. This clustering approach effectively handles non-IID data by ensuring that similar nodes train together. Each subchain employs a hybrid consensus protocol, combining stake-weighted validator election with the Byzantine fault-tolerant HotStuff BFT consensus, to robustly validate local models. Malicious updates are filtered using a combination of distance-based aggregation and gradient thresholding. Furthermore, a dynamic reputation mechanism incentivizes reliable participation through token staking and behavior-based rewards. Extensive experiments on MNIST and CIFAR-10 datasets demonstrate our scheme’s superiority over traditional FL methods, particularly in mitigating the impacts of non-IID data and Byzantine attacks.
由于人工智能(AI)、联邦学习(FL)和5g通信的进步,智能网联汽车(icv)的快速发展已将汽车转变为数据丰富的边缘节点。虽然FL通过在本地保留数据来促进隐私保护模型的训练,但其在icv中的实际部署面临两个关键挑战:容易受到恶意参数更新的攻击,以及在非独立和同分布(non-IID)数据下收敛性下降。为了解决这些问题,本文提出了一种安全高效的基于集群的区块链方案,用于FL的拜占庭弹性和模型同步。该方案引入了一个用于周期性全局模型聚合的主链和多个用于协调局部训练的子链。这些子链根据模型参数的相似性动态地将车辆分组为簇,并使用Wasserstein距离对其进行量化。这种聚类方法通过确保相似的节点一起训练,有效地处理非iid数据。每个子链采用混合共识协议,将加权验证器选举与拜占庭容错的HotStuff BFT共识相结合,以鲁棒验证本地模型。恶意更新使用基于距离的聚合和梯度阈值的组合过滤。此外,动态声誉机制通过代币押注和基于行为的奖励来激励可靠的参与。在MNIST和CIFAR-10数据集上的大量实验表明,我们的方案优于传统的FL方法,特别是在减轻非iid数据和拜占庭攻击的影响方面。
{"title":"CPFL: A Cluster-Based Parallel Blockchain Scheme for Secure and Efficient Federated Learning in Intelligent Connected Vehicles","authors":"Qi Qi;Yan Lei;Yixin Li;Hongyi Li;Qi Zhou","doi":"10.1109/TCCN.2026.3661499","DOIUrl":"10.1109/TCCN.2026.3661499","url":null,"abstract":"The rapid evolution of Intelligent Connected Vehicles (ICVs) has transformed automobiles into data-rich edge nodes, enabled by progress in artificial intelligence (AI), federated learning (FL), and 5G-enabled communication. While FL facilitates privacy-preserving model training by retaining data locally, its practical deployment in ICVs faces two key challenges: vulnerability to malicious parameter updates and degraded convergence under non-independent and identically distributed (non-IID) data. To address these issues, this paper proposes a secure and efficient cluster-based blockchain scheme for Byzantine resilience and model synchronization of FL. The scheme introduces a mainchain for periodic global model aggregation and multiple subchains that coordinate localized training. These subchains dynamically group vehicles into clusters based on the similarity of their model parameters, which is quantified using the Wasserstein distance. This clustering approach effectively handles non-IID data by ensuring that similar nodes train together. Each subchain employs a hybrid consensus protocol, combining stake-weighted validator election with the Byzantine fault-tolerant HotStuff BFT consensus, to robustly validate local models. Malicious updates are filtered using a combination of distance-based aggregation and gradient thresholding. Furthermore, a dynamic reputation mechanism incentivizes reliable participation through token staking and behavior-based rewards. Extensive experiments on MNIST and CIFAR-10 datasets demonstrate our scheme’s superiority over traditional FL methods, particularly in mitigating the impacts of non-IID data and Byzantine attacks.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"12 ","pages":"5966-5982"},"PeriodicalIF":7.0,"publicationDate":"2026-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146134234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Cognitive Communications and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1