首页 > 最新文献

IEEE Transactions on Cloud Computing最新文献

英文 中文
Bidirectional Identity-Based Inner-Product Functional Re-Encryption in Vaccine Data Sharing 基于双向身份的疫苗数据共享内产品功能再加密
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-19 DOI: 10.1109/TCC.2025.3552740
Jing Wang;Yanwei Zhou;Yasi Zhu;Zhiquan Liu;Bo Yang;Mingwu Zhang
With the development of cloud computing, more and more data is stored in cloud servers, which leads to an increasing degree of privacy of data stored in cloud servers. For example, in the critical domain of medical vaccine trials, where public health outcomes hinge on the analysis of sensitive patient data, the imperative to safeguard privacy has never been more pronounced. Traditional encryption methods, though effective at protecting data, often expose vulnerabilities during decryption and lack the ability to support granular data access and computation. One-way re-encryption schemes further impede the agility of data sharing, which is indispensable for the collaborative efforts of research institutions. To address these limitations, we propose a novel bidirectional re-encryption scheme for inner-product functional encryption (IPFE). Our scheme secures data while allowing computation and sharing in an encrypted state, preserving patient privacy without hindering research. By harnessing inner-product functional encryption, our approach allows authorized researchers to extract valuable insights from encrypted data, significantly enhancing privacy protections. Our scheme’s security is predicated on the $l$-ABDHE (augmented bilinear Diffie-Hellman exponent) assumption, ensuring robustness against chosen plaintext attacks within the standard model. This foundation not only secures the data but also yields compact ciphertext length, minimizing storage demands. We introduce a protocol specifically designed for medical vaccine trials, which leverages our bidirectional IB-IPFRE (Identity-Based Inner-Product Functional Re-Encryption) scheme. This protocol enhances data security, supports collaborative research, and maintains patient privacy. Its application in vaccine trials demonstrates the scheme’s effectiveness in protecting sensitive information while enabling critical research insights.
随着云计算的发展,越来越多的数据存储在云服务器上,这导致存储在云服务器上的数据的隐私程度越来越高。例如,在医疗疫苗试验这一关键领域,公共卫生结果取决于对患者敏感数据的分析,因此,保护隐私的必要性从未如此明显。传统的加密方法虽然可以有效地保护数据,但在解密过程中经常暴露漏洞,并且缺乏支持粒度数据访问和计算的能力。单向再加密方案进一步阻碍了数据共享的敏捷性,而这对于研究机构的协作工作是必不可少的。为了解决这些限制,我们提出了一种新的双向再加密方案用于内积功能加密(IPFE)。我们的方案保护数据,同时允许在加密状态下进行计算和共享,在不妨碍研究的情况下保护患者隐私。通过利用产品内部功能加密,我们的方法允许授权研究人员从加密数据中提取有价值的见解,大大增强了隐私保护。我们的方案的安全性基于$l$-ABDHE(增广双线性Diffie-Hellman指数)假设,确保对标准模型中选择的明文攻击的鲁棒性。这个基础不仅可以保护数据,还可以产生紧凑的密文长度,最大限度地减少存储需求。我们引入了一种专门为医学疫苗试验设计的协议,该协议利用了我们的双向IB-IPFRE(基于身份的产品内部功能再加密)方案。该协议增强了数据安全性,支持合作研究,并维护了患者隐私。它在疫苗试验中的应用证明了该方案在保护敏感信息的同时能够提供关键的研究见解方面的有效性。
{"title":"Bidirectional Identity-Based Inner-Product Functional Re-Encryption in Vaccine Data Sharing","authors":"Jing Wang;Yanwei Zhou;Yasi Zhu;Zhiquan Liu;Bo Yang;Mingwu Zhang","doi":"10.1109/TCC.2025.3552740","DOIUrl":"https://doi.org/10.1109/TCC.2025.3552740","url":null,"abstract":"With the development of cloud computing, more and more data is stored in cloud servers, which leads to an increasing degree of privacy of data stored in cloud servers. For example, in the critical domain of medical vaccine trials, where public health outcomes hinge on the analysis of sensitive patient data, the imperative to safeguard privacy has never been more pronounced. Traditional encryption methods, though effective at protecting data, often expose vulnerabilities during decryption and lack the ability to support granular data access and computation. One-way re-encryption schemes further impede the agility of data sharing, which is indispensable for the collaborative efforts of research institutions. To address these limitations, we propose a novel bidirectional re-encryption scheme for inner-product functional encryption (IPFE). Our scheme secures data while allowing computation and sharing in an encrypted state, preserving patient privacy without hindering research. By harnessing inner-product functional encryption, our approach allows authorized researchers to extract valuable insights from encrypted data, significantly enhancing privacy protections. Our scheme’s security is predicated on the <inline-formula><tex-math>$l$</tex-math></inline-formula>-ABDHE (augmented bilinear Diffie-Hellman exponent) assumption, ensuring robustness against chosen plaintext attacks within the standard model. This foundation not only secures the data but also yields compact ciphertext length, minimizing storage demands. We introduce a protocol specifically designed for medical vaccine trials, which leverages our bidirectional IB-IPFRE (Identity-Based Inner-Product Functional Re-Encryption) scheme. This protocol enhances data security, supports collaborative research, and maintains patient privacy. Its application in vaccine trials demonstrates the scheme’s effectiveness in protecting sensitive information while enabling critical research insights.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 2","pages":"617-628"},"PeriodicalIF":5.3,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144230527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic QoS-Driven Framework for Co-Scheduling of Distributed Long-Running Applications on Shared Clusters 共享集群上分布式长时间运行应用协同调度的动态qos驱动框架
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-16 DOI: 10.1109/TCC.2025.3571098
Jianyong Zhu;Hongtao Wang;Pan Su;Yang Wang;Weihua Pan
Cloud service providers typically co-locate various workloads within the same production cluster to improve resource utilization and reduce operational costs. These workloads primarily consist of batch analysis jobs composed of multiple parallel short-running tasks and long-running applications (LRAs) that continuously reside in the system. The adoption of microservice architecture has led to the emergence of distributed LRAs (DLRAs), which enhance deployment flexibility but pose challenges in detecting and investigating QoS violations due to workload variability and performance propagation across microservices. State-of-the-art resource managers are only responsible for resource allocation among applications/jobs and do not prioritize runtime QoS aspects, such as application-level latency. To address this, we introduce Prank, a QoS-driven resource management framework for co-located workloads. Prank incorporates a non-intrusive performance anomaly detection mechanism for DLRAs and proposes a root cause localization algorithm based on PageRank-weighted analysis of performance anomalies. Moreover, it dynamically balances resource allocation between DLRAs and co-located batch jobs on nodes hosting critical microservices, optimizing for both DLRA performance and overall cluster efficiency. Experimental results demonstrate that Prank outperforms state-of-the-art baselines, reducing DLRA tail latency by over 38% while increasing batch job completion time by no more than 21% on average.
云服务提供商通常在相同的生产集群中共同定位各种工作负载,以提高资源利用率并降低运营成本。这些工作负载主要由批处理分析作业组成,这些作业由多个并行的短时间运行任务和长期运行的应用程序(lra)组成,这些应用程序持续驻留在系统中。微服务架构的采用导致了分布式lra (dlra)的出现,它增强了部署的灵活性,但在检测和调查由于工作负载可变性和跨微服务的性能传播而导致的QoS违反方面提出了挑战。最先进的资源管理器只负责应用程序/作业之间的资源分配,而不优先考虑运行时QoS方面,例如应用程序级延迟。为了解决这个问题,我们引入了一个qos驱动的资源管理框架,用于共同定位的工作负载。该文为dlra引入了一种非侵入式性能异常检测机制,并提出了一种基于pagerank加权性能异常分析的根本原因定位算法。此外,它还动态平衡了DLRA和托管关键微服务节点上的批处理作业之间的资源分配,优化了DLRA的性能和整体集群效率。实验结果表明,恶作剧优于最先进的基线,将DLRA尾部延迟减少了38%以上,而将批处理作业完成时间平均增加了不超过21%。
{"title":"Dynamic QoS-Driven Framework for Co-Scheduling of Distributed Long-Running Applications on Shared Clusters","authors":"Jianyong Zhu;Hongtao Wang;Pan Su;Yang Wang;Weihua Pan","doi":"10.1109/TCC.2025.3571098","DOIUrl":"https://doi.org/10.1109/TCC.2025.3571098","url":null,"abstract":"Cloud service providers typically co-locate various workloads within the same production cluster to improve resource utilization and reduce operational costs. These workloads primarily consist of batch analysis jobs composed of multiple parallel short-running tasks and long-running applications (LRAs) that continuously reside in the system. The adoption of microservice architecture has led to the emergence of distributed LRAs (DLRAs), which enhance deployment flexibility but pose challenges in detecting and investigating QoS violations due to workload variability and performance propagation across microservices. State-of-the-art resource managers are only responsible for resource allocation among applications/jobs and do not prioritize runtime QoS aspects, such as application-level latency. To address this, we introduce Prank, a QoS-driven resource management framework for co-located workloads. Prank incorporates a non-intrusive performance anomaly detection mechanism for DLRAs and proposes a root cause localization algorithm based on PageRank-weighted analysis of performance anomalies. Moreover, it dynamically balances resource allocation between DLRAs and co-located batch jobs on nodes hosting critical microservices, optimizing for both DLRA performance and overall cluster efficiency. Experimental results demonstrate that Prank outperforms state-of-the-art baselines, reducing DLRA tail latency by over 38% while increasing batch job completion time by no more than 21% on average.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 3","pages":"837-853"},"PeriodicalIF":5.0,"publicationDate":"2025-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Cloud Gaming: Multi-Objective Optimization for Resource Utilization and Video Encoding 个性化云游戏:资源利用和视频编码的多目标优化
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-16 DOI: 10.1109/TCC.2025.3571095
Jingjing Zhang;Xiaoheng Deng;Jinsong Gui;Xuechen Chen;Shaohua Wan;Geyong Min
Cloud gaming represents a major part of contemporary gaming. To boost the Quality-of-Experience (QoE) of cloud gaming, the integration of Dynamic Adaptive Video Encoding (DAVE) with Multi-access Edge Computing (MEC) has become the natural candidate owing to its flexibility and reliable transmission support for real-time interactions. However, as multiple gamers compete for limited resources to achieve personalized QoE, such as ultra-high video quality and ultra-low latency, how to support efficient edge resource optimization is a fundamental and important problem. Furthermore, determining the optimal game video encoding configuration in real-time poses significant challenges, especially when lacking the information on future video and edge network resources. To address these key issues, we jointly optimize the video encoding as well as computing and communication resource allocation by active mutual adaptation of video coding configurations and physical resources in a Software Defined Networking (SDN)-assisted edge network. This eliminates the performance bottleneck caused by decoupling optimization of coding parameter configuration and physical resource allocation. The SDN-assisted edge network architecture supports efficient on-demand resource management, provides global network information, and meets the stringent time-varying game requests. Due to the significant time scale difference between video chunk and physical resource block, we propose a novel Asynchronous Decision-Making Multi Agent Proximal Policy Optimization algorithm (AD-MAPPO), which can address the credit assignment problem with a single agent. It can also adapt to the highly dynamic cloud gaming environment without prior knowledge and a deterministic environmental model. Extensive experimentation based on real cloud gaming datasets convincingly demonstrates that our approach can significantly enhance the overall QoE of gamers.
云游戏是当代游戏的重要组成部分。为了提高云游戏的体验质量(QoE),动态自适应视频编码(DAVE)与多接入边缘计算(MEC)的集成由于其灵活性和对实时交互的可靠传输支持而成为自然的候选者。然而,随着多个玩家争夺有限的资源来实现个性化的QoE,如超高视频质量和超低延迟,如何支持高效的边缘资源优化是一个基本而重要的问题。此外,在缺乏未来视频和边缘网络资源信息的情况下,实时确定最佳游戏视频编码配置提出了重大挑战。为了解决这些关键问题,我们在软件定义网络(SDN)辅助的边缘网络中,通过主动相互适应视频编码配置和物理资源,共同优化视频编码以及计算和通信资源分配。这消除了编码参数配置和物理资源分配的解耦优化带来的性能瓶颈。sdn辅助的边缘网络架构支持高效的按需资源管理,提供全局网络信息,满足严格的时变游戏需求。针对视频块与物理资源块时间尺度的显著差异,提出了一种新的异步决策多智能体近端策略优化算法(AD-MAPPO),该算法可以解决单智能体的信用分配问题。它还可以适应高度动态的云游戏环境,而无需先验知识和确定性环境模型。基于真实云游戏数据集的大量实验令人信服地证明,我们的方法可以显著提高玩家的整体QoE。
{"title":"Personalized Cloud Gaming: Multi-Objective Optimization for Resource Utilization and Video Encoding","authors":"Jingjing Zhang;Xiaoheng Deng;Jinsong Gui;Xuechen Chen;Shaohua Wan;Geyong Min","doi":"10.1109/TCC.2025.3571095","DOIUrl":"https://doi.org/10.1109/TCC.2025.3571095","url":null,"abstract":"Cloud gaming represents a major part of contemporary gaming. To boost the Quality-of-Experience (QoE) of cloud gaming, the integration of Dynamic Adaptive Video Encoding (DAVE) with Multi-access Edge Computing (MEC) has become the natural candidate owing to its flexibility and reliable transmission support for real-time interactions. However, as multiple gamers compete for limited resources to achieve personalized QoE, such as ultra-high video quality and ultra-low latency, how to support efficient edge resource optimization is a fundamental and important problem. Furthermore, determining the optimal game video encoding configuration in real-time poses significant challenges, especially when lacking the information on future video and edge network resources. To address these key issues, we jointly optimize the video encoding as well as computing and communication resource allocation by active mutual adaptation of video coding configurations and physical resources in a Software Defined Networking (SDN)-assisted edge network. This eliminates the performance bottleneck caused by decoupling optimization of coding parameter configuration and physical resource allocation. The SDN-assisted edge network architecture supports efficient on-demand resource management, provides global network information, and meets the stringent time-varying game requests. Due to the significant time scale difference between video chunk and physical resource block, we propose a novel Asynchronous Decision-Making Multi Agent Proximal Policy Optimization algorithm (AD-MAPPO), which can address the credit assignment problem with a single agent. It can also adapt to the highly dynamic cloud gaming environment without prior knowledge and a deterministic environmental model. Extensive experimentation based on real cloud gaming datasets convincingly demonstrates that our approach can significantly enhance the overall QoE of gamers.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 3","pages":"854-866"},"PeriodicalIF":5.0,"publicationDate":"2025-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-Based Revocable IBEET Scheme for Mobile Cloud Computing 基于栅格的移动云计算可撤销IBEET方案
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-14 DOI: 10.1109/TCC.2025.3570332
Hongwei Wang;Yongjian Liao;Zhishuo Zhang;Yingjie Dong;Shijie Zhou
Identity-based encryption with equality test (IBEET) is a special form of searchable encryption that has broad applications in cloud computing. It enables users to perform equality tests on encrypted data without decryption, thereby achieving secure data search while ensuring data privacy and confidentiality. However, in the context of mobile cloud computing, the susceptibility of mobile devices to loss significantly increases the risk of private key exposure. Existing IBEET schemes struggle to address this issue effectively, limiting their practical applicability. Moreover, with the rapid advancement of quantum computing, the security of traditional cryptographic hardness assumptions faces potential threats. To address these challenges and enhance system efficiency, we proposes the first lattice-based revocable IBEET (RIBEET) scheme, which supports user key revocation. We prove that our scheme satisfies adaptive CCA security under the assumption of DLWE hard problem. Additionally, performance evaluations comparing our scheme with existing ones demonstrate that our scheme offers significant efficiency advantages. Furthermore, we apply the proposed scheme to mobile health services, showcasing its practicality and reliability in mobile cloud computing environments.
基于身份的等式检验加密(IBEET)是一种特殊的可搜索加密形式,在云计算中有着广泛的应用。用户无需解密即可对加密数据进行相等性测试,从而在保证数据隐私性和保密性的同时实现数据的安全搜索。然而,在移动云计算的背景下,移动设备对丢失的敏感性大大增加了私钥暴露的风险。现有的IBEET方案很难有效地解决这个问题,限制了它们的实际适用性。此外,随着量子计算的快速发展,传统的密码硬度假设的安全性面临着潜在的威胁。为了解决这些挑战并提高系统效率,我们提出了第一个基于格子的可撤销IBEET (RIBEET)方案,该方案支持用户密钥撤销。在DLWE难题的假设下,证明了该方案满足自适应CCA安全性。此外,将我们的方案与现有方案进行性能评估,结果表明我们的方案具有显著的效率优势。此外,我们将该方案应用于移动医疗服务,展示了其在移动云计算环境下的实用性和可靠性。
{"title":"Lattice-Based Revocable IBEET Scheme for Mobile Cloud Computing","authors":"Hongwei Wang;Yongjian Liao;Zhishuo Zhang;Yingjie Dong;Shijie Zhou","doi":"10.1109/TCC.2025.3570332","DOIUrl":"https://doi.org/10.1109/TCC.2025.3570332","url":null,"abstract":"Identity-based encryption with equality test (IBEET) is a special form of searchable encryption that has broad applications in cloud computing. It enables users to perform equality tests on encrypted data without decryption, thereby achieving secure data search while ensuring data privacy and confidentiality. However, in the context of mobile cloud computing, the susceptibility of mobile devices to loss significantly increases the risk of private key exposure. Existing IBEET schemes struggle to address this issue effectively, limiting their practical applicability. Moreover, with the rapid advancement of quantum computing, the security of traditional cryptographic hardness assumptions faces potential threats. To address these challenges and enhance system efficiency, we proposes the first lattice-based revocable IBEET (RIBEET) scheme, which supports user key revocation. We prove that our scheme satisfies adaptive CCA security under the assumption of DLWE hard problem. Additionally, performance evaluations comparing our scheme with existing ones demonstrate that our scheme offers significant efficiency advantages. Furthermore, we apply the proposed scheme to mobile health services, showcasing its practicality and reliability in mobile cloud computing environments.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 3","pages":"807-820"},"PeriodicalIF":5.0,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Related Parameter Selection for Training Deep Learning Models Predicting Application Performance Degradation in Clouds 预测云环境下应用程序性能下降的深度学习模型的数据相关参数选择
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-14 DOI: 10.1109/TCC.2025.3570093
Behshid Shayesteh;Chunyan Fu;Amin Ebrahimzadeh;Roch H. Glitho
Applications deployed in clouds are susceptible to performance degradation due to diverse underlying causes such as infrastructure faults. To maintain the expected availability of these applications, Machine Learning (ML) models can be used to predict the impending application performance degradations to take preventive measures. However, the prediction accuracy of these ML models, which is a key indicator of their performance, is influenced by several factors, including training data size, data sampling intervals, input window and prediction horizon. To optimize these data-related parameters, in this article, we propose a surrogate-assisted multi-objective optimization algorithm with the objective to maximize prediction model accuracy while minimizing the resources consumed for data collection and storage. We evaluated the proposed algorithm through two use cases focusing on the prediction of Key Performance Indicators (KPIs) for a 5G core network and a web application deployed in two Kubernetes-based cloud testbeds. It is demonstrated that the proposed algorithm can achieve a normalized hypervolume of 99.5% relative to the optimal Pareto front and reduce search time for the optimal solution by 0.6 hours compared to other surrogates and by 3.58 hours compared to using no surrogates.
由于基础设施故障等各种潜在原因,部署在云中的应用程序容易受到性能下降的影响。为了维持这些应用程序的预期可用性,可以使用机器学习(ML)模型来预测即将发生的应用程序性能下降,以采取预防措施。然而,这些机器学习模型的预测精度是其性能的一个关键指标,它受到几个因素的影响,包括训练数据大小、数据采样间隔、输入窗口和预测范围。为了优化这些与数据相关的参数,在本文中,我们提出了一种代理辅助多目标优化算法,其目标是最大化预测模型的准确性,同时最小化数据收集和存储消耗的资源。我们通过两个用例评估了所提出的算法,重点是预测5G核心网和部署在两个基于kubernetes的云测试平台上的web应用程序的关键性能指标(kpi)。结果表明,该算法相对于最优Pareto前沿可实现99.5%的归一化超体积,与其他替代算法相比,可将最优解的搜索时间缩短0.6小时,与不使用替代算法相比,可将搜索时间缩短3.58小时。
{"title":"Data-Related Parameter Selection for Training Deep Learning Models Predicting Application Performance Degradation in Clouds","authors":"Behshid Shayesteh;Chunyan Fu;Amin Ebrahimzadeh;Roch H. Glitho","doi":"10.1109/TCC.2025.3570093","DOIUrl":"https://doi.org/10.1109/TCC.2025.3570093","url":null,"abstract":"Applications deployed in clouds are susceptible to performance degradation due to diverse underlying causes such as infrastructure faults. To maintain the expected availability of these applications, Machine Learning (ML) models can be used to predict the impending application performance degradations to take preventive measures. However, the prediction accuracy of these ML models, which is a key indicator of their performance, is influenced by several factors, including training data size, data sampling intervals, input window and prediction horizon. To optimize these data-related parameters, in this article, we propose a surrogate-assisted multi-objective optimization algorithm with the objective to maximize prediction model accuracy while minimizing the resources consumed for data collection and storage. We evaluated the proposed algorithm through two use cases focusing on the prediction of Key Performance Indicators (KPIs) for a 5G core network and a web application deployed in two Kubernetes-based cloud testbeds. It is demonstrated that the proposed algorithm can achieve a normalized hypervolume of 99.5% relative to the optimal Pareto front and reduce search time for the optimal solution by 0.6 hours compared to other surrogates and by 3.58 hours compared to using no surrogates.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 3","pages":"794-806"},"PeriodicalIF":5.0,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem 基于中国剩余定理的加密图像可逆数据隐藏
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-14 DOI: 10.1109/TCC.2025.3570327
Jiani Chen;Dawen Xu
To deal with the development of the distributed server, this article proposes a new method for reversible data hiding in encrypted images based on the Chinese Remainder Theorem (CRT), encrypting and sharing one image to multiple data hiders through $(k,n)$-threshold secret sharing. First, an original image is divided into the most significant bit (MSB) compression area and the least significant bit (LSB) area by utilizing the spatial correlation. The $l$-MSB layers are predicted to obtain prediction errors, and these prediction errors are compressed by Huffman coding. Then according to the value of $k$, CRT and secret sharing scheme are performed on the $(8-l)$-LSB layers to generate the shared bitstream. Finally, $n$ encrypted images for sharing consist of MSB compression bitstreams and shared bitstreams, whose size is adjusted based on $k$ value. Each data hider can independently embed secret data after having one of the encrypted images, while the receiver can recover the original image only after receiving $k$ or more encrypted images. Experimental results show that the proposed algorithm not only provides a large embedding space for secret data, but is also able to complete the inverse operation of data hiding and realize the lossless recovery of the original image with $(k,n)$-threshold secret sharing.
针对分布式服务器的发展,本文提出了一种基于中国剩余定理(CRT)的加密图像中可逆数据隐藏的新方法,通过$(k,n)$-阈值秘密共享,对一张图像进行加密并共享给多个数据隐藏者。首先,利用空间相关性将原始图像划分为最高有效位(MSB)压缩区和最低有效位(LSB)压缩区;对$l$-MSB层进行预测,得到预测误差,并对预测误差进行霍夫曼编码压缩。然后根据$k$的值,在$(8- 1)$-LSB层执行CRT和秘密共享方案,生成共享的比特流。最后,用于共享的$n$加密图像由MSB压缩比特流和共享比特流组成,其大小根据$k$值进行调整。每个数据隐藏者在拥有一张加密图像后可以独立嵌入秘密数据,而接收方只有在接收到$k$或更多加密图像后才能恢复原始图像。实验结果表明,该算法不仅为秘密数据提供了较大的嵌入空间,而且能够完成数据隐藏的逆操作,实现$(k,n)$-阈值秘密共享对原始图像的无损恢复。
{"title":"Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem","authors":"Jiani Chen;Dawen Xu","doi":"10.1109/TCC.2025.3570327","DOIUrl":"https://doi.org/10.1109/TCC.2025.3570327","url":null,"abstract":"To deal with the development of the distributed server, this article proposes a new method for reversible data hiding in encrypted images based on the Chinese Remainder Theorem (CRT), encrypting and sharing one image to multiple data hiders through <inline-formula><tex-math>$(k,n)$</tex-math></inline-formula>-threshold secret sharing. First, an original image is divided into the most significant bit (MSB) compression area and the least significant bit (LSB) area by utilizing the spatial correlation. The <inline-formula><tex-math>$l$</tex-math></inline-formula>-MSB layers are predicted to obtain prediction errors, and these prediction errors are compressed by Huffman coding. Then according to the value of <inline-formula><tex-math>$k$</tex-math></inline-formula>, CRT and secret sharing scheme are performed on the <inline-formula><tex-math>$(8-l)$</tex-math></inline-formula>-LSB layers to generate the shared bitstream. Finally, <inline-formula><tex-math>$n$</tex-math></inline-formula> encrypted images for sharing consist of MSB compression bitstreams and shared bitstreams, whose size is adjusted based on <inline-formula><tex-math>$k$</tex-math></inline-formula> value. Each data hider can independently embed secret data after having one of the encrypted images, while the receiver can recover the original image only after receiving <inline-formula><tex-math>$k$</tex-math></inline-formula> or more encrypted images. Experimental results show that the proposed algorithm not only provides a large embedding space for secret data, but is also able to complete the inverse operation of data hiding and realize the lossless recovery of the original image with <inline-formula><tex-math>$(k,n)$</tex-math></inline-formula>-threshold secret sharing.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 3","pages":"821-836"},"PeriodicalIF":5.0,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consortium Blockchain-Based Federated Sensor-Cloud for IoT Services 联盟基于区块链的物联网服务联邦传感器云
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-10 DOI: 10.1109/TCC.2025.3543627
Sudip Misra;Aishwariya Chakraborty;Ayan Mondal;Dhanush Kamath
This work addresses the problem of ensuring service availability, trust, and profitability in sensor-cloud architecture designed to Sensors-as-a-Service (Se-aaS) using IoT generated data. Due to the requirement of geographically distributed wireless sensor networks for Se-aaS, it is not always possible for a single Sensor-cloud Service Provider (SCSP) to meet the end-users requirements. To address this problem, we propose a federated sensor-cloud architecture involving multiple SCSPs for provisioning high-quality Se-aaS. Moreover, for ensuring trust in such a distributed architecture, we propose the use of consortium blockchain to keep track of the activities of each SCSP and to automate several functionalities through Smart Contracts. Additionally, to ensure profitability and end-user satisfaction, we propose a composite scheme, named BRAIN, comprising of two parts. First, we define miner's score to select an optimal subset of SCSPs as miners periodically. Second, we propose a modified multiple-leaders-multiple-followers Stackelberg game-theoretic approach to decide the association of an optimal subset of SCSPs to each service. Thereafter, we evaluate the performance of BRAIN by comparing with three existing benchmark schemes through simulations. Simulation results depict that BRAIN outperforms existing schemes in terms of profits and resource consumption of SCSPs, and price charged from end-users.
这项工作解决了使用物联网生成的数据确保传感器即服务(Se-aaS)传感器云架构中服务可用性、信任和盈利能力的问题。由于Se-aaS需要地理分布的无线传感器网络,单个传感器云服务提供商(SCSP)并不总是能够满足最终用户的需求。为了解决这个问题,我们提出了一个包含多个scsp的联合传感器云架构,用于提供高质量的Se-aaS。此外,为了确保对这种分布式架构的信任,我们建议使用财团区块链来跟踪每个SCSP的活动,并通过智能合约自动化一些功能。此外,为了确保盈利能力和最终用户满意度,我们提出了一个名为BRAIN的复合方案,由两部分组成。首先,我们定义了矿工的得分,以周期性地选择一个最优的scsp子集作为矿工。其次,我们提出了一种改进的多领导者-多追随者Stackelberg博弈论方法来确定每个服务的最优scsp子集的关联。然后,我们通过仿真比较了三种现有的基准方案,对BRAIN的性能进行了评估。模拟结果表明,从利润和scsp的资源消耗以及向最终用户收取的价格来看,BRAIN方案优于现有方案。
{"title":"Consortium Blockchain-Based Federated Sensor-Cloud for IoT Services","authors":"Sudip Misra;Aishwariya Chakraborty;Ayan Mondal;Dhanush Kamath","doi":"10.1109/TCC.2025.3543627","DOIUrl":"https://doi.org/10.1109/TCC.2025.3543627","url":null,"abstract":"This work addresses the problem of ensuring service availability, trust, and profitability in sensor-cloud architecture designed to <italic>Sensors-as-a-Service</i> (Se-aaS) using IoT generated data. Due to the requirement of geographically distributed wireless sensor networks for Se-aaS, it is not always possible for a single Sensor-cloud Service Provider (SCSP) to meet the end-users requirements. To address this problem, we propose a federated sensor-cloud architecture involving multiple SCSPs for provisioning high-quality Se-aaS. Moreover, for ensuring trust in such a distributed architecture, we propose the use of <italic>consortium blockchain</i> to keep track of the activities of each SCSP and to automate several functionalities through <italic>Smart Contracts</i>. Additionally, to ensure profitability and end-user satisfaction, we propose a composite scheme, named BRAIN, comprising of two parts. First, we define <italic>miner's score</i> to select an optimal subset of SCSPs as <italic>miners</i> periodically. Second, we propose a modified <italic>multiple-leaders-multiple-followers Stackelberg game</i>-theoretic approach to decide the association of an optimal subset of SCSPs to each service. Thereafter, we evaluate the performance of BRAIN by comparing with three existing benchmark schemes through simulations. Simulation results depict that BRAIN outperforms existing schemes in terms of profits and resource consumption of SCSPs, and price charged from end-users.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 2","pages":"605-616"},"PeriodicalIF":5.3,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144232039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demand-Aware Distributed Scheduling With Adaptive Buffer Control in Reconfigurable Data Center Networks 基于自适应缓冲控制的可重构数据中心网络需求感知分布式调度
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-09 DOI: 10.1109/TCC.2025.3568369
Subin Han;Eunsok Lee;Hyunkyung Yoo;Namseok Ko;Sangheon Pack
Reconfigurable data center networks (RDCNs), integrating the electrical packet switch (EPS) with the optical circuit switch (OCS), improve network adaptability by enabling high-throughput connections between top-of-rack (ToR) pairs. However, existing RDCN scheduling schemes face challenges in responsiveness, particularly during traffic bursts. In this article, we propose a novel demand-aware distributed scheduling framework called P4-DADS, utilizing P4-based programmable ToR switches (P4ToR). To prevent conflicts arising from simultaneous OCS port allocations, P4-DADS employs a token-ring-based distributed reservation algorithm, enhanced with an adaptive buffer control (ABC) mechanism. By formulating a Markov decision process (MDP) problem, the optimal ABC policy is obtained through a value iteration algorithm, ensuring that packets are immediately ready for transmission during sudden demand surges. P4-DADS improves network responsiveness and scalability, as evidenced by a 145.95% increase in throughput and a 87.31% reduction in flow completion time. These improvements demonstrate the potential of P4-DADS as a scalable and efficient solution for resource management in RDCN.
可重构数据中心网络(RDCNs)将EPS (electrical packet switch)和光电路交换机OCS (optical circuit switch)集成在一起,通过实现ToR (tops -of-rack)对之间的高吞吐量连接,提高了网络的适应性。然而,现有的RDCN调度方案在响应性方面面临挑战,特别是在流量突发时。在本文中,我们提出了一种新的需求感知分布式调度框架,称为P4-DADS,利用基于p4的可编程ToR交换机(P4ToR)。为了防止同时OCS端口分配引起的冲突,P4-DADS采用了基于令牌环的分布式保留算法,并通过自适应缓冲控制(ABC)机制进行了增强。通过制定马尔可夫决策过程(MDP)问题,通过值迭代算法获得最优ABC策略,确保在需求激增时数据包立即准备好传输。P4-DADS提高了网络响应性和可扩展性,吞吐量提高了145.95%,流完成时间减少了87.31%。这些改进证明了P4-DADS作为RDCN中资源管理的可扩展和高效解决方案的潜力。
{"title":"Demand-Aware Distributed Scheduling With Adaptive Buffer Control in Reconfigurable Data Center Networks","authors":"Subin Han;Eunsok Lee;Hyunkyung Yoo;Namseok Ko;Sangheon Pack","doi":"10.1109/TCC.2025.3568369","DOIUrl":"https://doi.org/10.1109/TCC.2025.3568369","url":null,"abstract":"Reconfigurable data center networks (RDCNs), integrating the electrical packet switch (EPS) with the optical circuit switch (OCS), improve network adaptability by enabling high-throughput connections between top-of-rack (ToR) pairs. However, existing RDCN scheduling schemes face challenges in responsiveness, particularly during traffic bursts. In this article, we propose a novel demand-aware distributed scheduling framework called P4-DADS, utilizing P4-based programmable ToR switches (P4ToR). To prevent conflicts arising from simultaneous OCS port allocations, P4-DADS employs a token-ring-based distributed reservation algorithm, enhanced with an adaptive buffer control (ABC) mechanism. By formulating a Markov decision process (MDP) problem, the optimal ABC policy is obtained through a value iteration algorithm, ensuring that packets are immediately ready for transmission during sudden demand surges. P4-DADS improves network responsiveness and scalability, as evidenced by a 145.95% increase in throughput and a 87.31% reduction in flow completion time. These improvements demonstrate the potential of P4-DADS as a scalable and efficient solution for resource management in RDCN.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 3","pages":"783-793"},"PeriodicalIF":5.0,"publicationDate":"2025-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Enhanced Bi-Linear Attention Network for Teaching Manner Analysis Over Edge Cloud-Assisted AIoT: Voice-Body Coordination Perspective 在边缘云辅助AIoT上实现教学方式分析的增强双线性注意网络:声音-身体协调视角
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-08 DOI: 10.1109/TCC.2025.3568394
Yu Zhou;Sai Zou;Bochun Wu;Wei Ni;Xiaojiang Du
Edge computing, an advanced extension of cloud computing, provides superior computational capabilities and low-latency processing at the network edge, facilitating its availability for real-time data analysis in resource-limited settings. When applied to the analysis of teaching methodologies, edge computing enables the seamless integration of vocal and physical cues, facilitating collaborative, dynamic, and real-time evaluations of teaching quality. However, the inherent complexity of human perception and multimodal interactions impose great challenges to the analysis of these aspects in Artificial Intelligence of Things (AIoT). This paper introduces an innovative mathematical model and a measurement index specifically designed to assess changes in voice-body coordination over time. To achieve this, we propose a cloud-enabled enhanced Bi-Linear Attention Network incorporating entropy and Fourier transforms (BAN-E-FT), which leverages both temporal and frequency-domain features. Specifically, by harnessing the computational and storage capabilities of edge computing, BAN-E-FT facilitates distributed training, expedites large-scale data processing, and enhances model scalability, where entropy measures and Fourier transforms capture modality dynamics, enhancing BAN's fusion capabilities. Moreover, a conditional domain adversarial network is embedded to address regional teaching variations, improving model generalizability. We also verify the robustness of BAN-E-FT with accuracy and convergence through convex optimization analysis. Experiments on the eNTERFACE’05 dataset demonstrate 81% accuracy in assessing teaching adaptability, while real-world test at Guizhou University confirms 78% accuracy when using BAN-E-FT, matching human expert assessments.
边缘计算是云计算的高级扩展,在网络边缘提供卓越的计算能力和低延迟处理,有助于在资源有限的情况下进行实时数据分析。当应用于教学方法分析时,边缘计算可以实现声音和物理线索的无缝集成,促进教学质量的协作、动态和实时评估。然而,人类感知和多模态交互的固有复杂性给物联网(AIoT)中这些方面的分析带来了巨大的挑战。本文介绍了一个创新的数学模型和一个专门设计的测量指标,以评估随着时间的推移,声音身体协调的变化。为了实现这一目标,我们提出了一个云支持的增强双线性注意力网络,结合熵和傅里叶变换(BAN-E-FT),它利用了时域和频域特征。具体来说,通过利用边缘计算的计算和存储能力,BAN- e- ft促进了分布式训练,加快了大规模数据处理,并增强了模型的可扩展性,其中熵测度和傅立叶变换捕获了模态动态,增强了BAN的融合能力。此外,还嵌入了一个条件域对抗网络来解决区域教学差异,提高了模型的可泛化性。通过凸优化分析验证了BAN-E-FT的鲁棒性,具有精度和收敛性。在eNTERFACE ' 05数据集上的实验表明,评估教学适应性的准确率为81%,而在贵州大学的实际测试中,使用BAN-E-FT的准确率为78%,与人类专家的评估相匹配。
{"title":"Achieving Enhanced Bi-Linear Attention Network for Teaching Manner Analysis Over Edge Cloud-Assisted AIoT: Voice-Body Coordination Perspective","authors":"Yu Zhou;Sai Zou;Bochun Wu;Wei Ni;Xiaojiang Du","doi":"10.1109/TCC.2025.3568394","DOIUrl":"https://doi.org/10.1109/TCC.2025.3568394","url":null,"abstract":"Edge computing, an advanced extension of cloud computing, provides superior computational capabilities and low-latency processing at the network edge, facilitating its availability for real-time data analysis in resource-limited settings. When applied to the analysis of teaching methodologies, edge computing enables the seamless integration of vocal and physical cues, facilitating collaborative, dynamic, and real-time evaluations of teaching quality. However, the inherent complexity of human perception and multimodal interactions impose great challenges to the analysis of these aspects in Artificial Intelligence of Things (AIoT). This paper introduces an innovative mathematical model and a measurement index specifically designed to assess changes in voice-body coordination over time. To achieve this, we propose a cloud-enabled enhanced Bi-Linear Attention Network incorporating entropy and Fourier transforms (BAN-E-FT), which leverages both temporal and frequency-domain features. Specifically, by harnessing the computational and storage capabilities of edge computing, BAN-E-FT facilitates distributed training, expedites large-scale data processing, and enhances model scalability, where entropy measures and Fourier transforms capture modality dynamics, enhancing BAN's fusion capabilities. Moreover, a conditional domain adversarial network is embedded to address regional teaching variations, improving model generalizability. We also verify the robustness of BAN-E-FT with accuracy and convergence through convex optimization analysis. Experiments on the eNTERFACE’05 dataset demonstrate 81% accuracy in assessing teaching adaptability, while real-world test at Guizhou University confirms 78% accuracy when using BAN-E-FT, matching human expert assessments.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 3","pages":"769-782"},"PeriodicalIF":5.0,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Reviewers List* 2024审稿人名单*
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-07 DOI: 10.1109/TCC.2025.3528086
{"title":"2024 Reviewers List*","authors":"","doi":"10.1109/TCC.2025.3528086","DOIUrl":"https://doi.org/10.1109/TCC.2025.3528086","url":null,"abstract":"","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"13 1","pages":"455-458"},"PeriodicalIF":5.3,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10917066","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143580873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1