首页 > 最新文献

IEEE Transactions on Signal Processing最新文献

英文 中文
A Comprehensive Guide to Multiset Canonical Correlation Analysis and Its Application to Joint Blind Source Separation 多集典型相关分析及其在联合盲源分离中的应用综述
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-24 DOI: 10.1109/TSP.2025.3623874
Isabell Lehmann;Ben Gabrielson;Tanuj Hasija;Tülay Adali
Multiset Canonical Correlation Analysis (mCCA), also called Generalized Canonical Correlation Analysis (GCCA), is a technique to identify correlated variables across multiple datasets, which can be used for feature extraction in fields like neuroscience, cross-language information retrieval, and recommendation systems, among others. Besides its wide use, there is still a lack of comprehensive understanding of its theory and implementation with different objective functions all under one umbrella. In this paper, we review the five main mCCA methods: sumcor, maxvar, minvar, genvar, and ssqcor. We provide a concise overview of their optimization problems along with their solutions and pseudocodes. After this, we discuss the application of mCCA for estimating underlying latent components in the Joint Blind Source Separation (JBSS) problem and propose the source identification conditions of the different mCCA methods, i.e., the conditions under which they are able to achieve JBSS. We substantiate the proposed theoretical conditions with numerical results and test the statistical efficiency of the methods for finite samples. We observe in our experiments that genvar appears to have the least restrictive source identification conditions and to be more statistically efficient than the other methods. This suggests that genvar is generally the best-performing mCCA method for JBSS except for special cases, which is an important finding, as the most commonly used mCCA methods are maxvar and sumcor.
多集典型相关分析(mCCA),也称为广义典型相关分析(GCCA),是一种识别多个数据集相关变量的技术,可用于神经科学、跨语言信息检索和推荐系统等领域的特征提取。在其广泛应用的同时,还缺乏对其理论和实现的全面认识。在本文中,我们回顾了五种主要的mCCA方法:sumcor, maxvar, minvar, genvar和ssqcor。我们简要概述了它们的优化问题以及它们的解决方案和伪代码。在此基础上,讨论了mCCA在联合盲源分离(JBSS)问题中潜在分量估计的应用,并提出了不同mCCA方法的源识别条件,即它们能够实现JBSS的条件。我们用数值结果证实了提出的理论条件,并测试了有限样本下方法的统计效率。我们在实验中观察到,genvar似乎具有最少的限制性来源识别条件,并且比其他方法具有更高的统计效率。这表明除了特殊情况外,genvar通常是JBSS中性能最好的mCCA方法,这是一个重要的发现,因为最常用的mCCA方法是maxvar和sumcor。
{"title":"A Comprehensive Guide to Multiset Canonical Correlation Analysis and Its Application to Joint Blind Source Separation","authors":"Isabell Lehmann;Ben Gabrielson;Tanuj Hasija;Tülay Adali","doi":"10.1109/TSP.2025.3623874","DOIUrl":"10.1109/TSP.2025.3623874","url":null,"abstract":"Multiset Canonical Correlation Analysis (mCCA), also called Generalized Canonical Correlation Analysis (GCCA), is a technique to identify correlated variables across multiple datasets, which can be used for feature extraction in fields like neuroscience, cross-language information retrieval, and recommendation systems, among others. Besides its wide use, there is still a lack of comprehensive understanding of its theory and implementation with different objective functions all under one umbrella. In this paper, we review the five main mCCA methods: <monospace>sumcor</monospace>, <monospace>maxvar</monospace>, <monospace>minvar</monospace>, <monospace>genvar</monospace>, and <monospace>ssqcor</monospace>. We provide a concise overview of their optimization problems along with their solutions and pseudocodes. After this, we discuss the application of mCCA for estimating underlying latent components in the Joint Blind Source Separation (JBSS) problem and propose the <italic>source identification conditions</i> of the different mCCA methods, i.e., the conditions under which they are able to achieve JBSS. We substantiate the proposed theoretical conditions with numerical results and test the statistical efficiency of the methods for finite samples. We observe in our experiments that <monospace>genvar</monospace> appears to have the least restrictive source identification conditions and to be more statistically efficient than the other methods. This suggests that <monospace>genvar</monospace> is generally the best-performing mCCA method for JBSS except for special cases, which is an important finding, as the most commonly used mCCA methods are <monospace>maxvar</monospace> and <monospace>sumcor</monospace>.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"74 ","pages":"43-60"},"PeriodicalIF":5.8,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11217411","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145381411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provable Active Multi-Task Representation Learning 可证明的主动多任务表示学习
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-24 DOI: 10.1109/TSP.2025.3623098
Jiabin Lin;Shana Moothedath;Tuan Anh Le
Multi-task representation learning is an emerging machine learning paradigm that integrates data from multiple sources, harnessing task similarities to enhance overall model performance. The application of multi-task learning to real-world settings is hindered due to data scarcity, along with challenges related to scalability and computational resources. To address these challenges, we develop a fast and sample-efficient approach for multi-task active learning with linear representation when the amount of data from source tasks and target tasks is limited. By leveraging the techniques from active learning, we propose an adaptive sampling-based alternating projected gradient descent (GD) and minimization algorithm that iteratively estimates the relevance of each source task to the target task and samples from each source task based on the estimated relevance. We present the convergence guarantees and the sample and time complexities of our algorithm. We evaluated the effectiveness of our algorithm using experiments and compared it with four benchmark algorithms using synthetic and real-world MNIST-C and MovieLens-100K datasets.
多任务表示学习是一种新兴的机器学习范式,它集成了来自多个来源的数据,利用任务相似性来增强整体模型性能。由于数据稀缺,以及与可扩展性和计算资源相关的挑战,多任务学习在现实环境中的应用受到阻碍。为了解决这些挑战,我们开发了一种快速、样本高效的方法,用于在源任务和目标任务的数据量有限的情况下,使用线性表示进行多任务主动学习。通过利用主动学习技术,我们提出了一种基于自适应采样的交替投影梯度下降(GD)和最小化算法,该算法迭代估计每个源任务与目标任务的相关性,并根据估计的相关性从每个源任务中抽取样本。给出了算法的收敛性保证以及样本复杂度和时间复杂度。我们通过实验评估了算法的有效性,并将其与使用合成和真实MNIST-C和MovieLens-100K数据集的四种基准算法进行了比较。
{"title":"Provable Active Multi-Task Representation Learning","authors":"Jiabin Lin;Shana Moothedath;Tuan Anh Le","doi":"10.1109/TSP.2025.3623098","DOIUrl":"10.1109/TSP.2025.3623098","url":null,"abstract":"Multi-task representation learning is an emerging machine learning paradigm that integrates data from multiple sources, harnessing task similarities to enhance overall model performance. The application of multi-task learning to real-world settings is hindered due to data scarcity, along with challenges related to scalability and computational resources. To address these challenges, we develop a fast and sample-efficient approach for multi-task active learning with linear representation when the amount of data from source tasks and target tasks is limited. By leveraging the techniques from active learning, we propose an adaptive sampling-based alternating projected gradient descent (GD) and minimization algorithm that iteratively estimates the relevance of each source task to the target task and samples from each source task based on the estimated relevance. We present the convergence guarantees and the sample and time complexities of our algorithm. We evaluated the effectiveness of our algorithm using experiments and compared it with four benchmark algorithms using synthetic and real-world MNIST-C and MovieLens-100K datasets.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"5060-5075"},"PeriodicalIF":5.8,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145381412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Universal MIMO Jammer Mitigation via Subspace Hiding 基于子空间隐藏的通用MIMO干扰抑制
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-23 DOI: 10.1109/TSP.2025.3624986
Gian Marti;Christoph Studer
Multi-antenna processing enables jammer mitigation through spatial filtering, provided that the receiver knows the spatial characteristics of the jammer interference. Estimating these characteristics is easy for barrage jammers that transmit continuously and with static characteristics, but difficult for more sophisticated jammers. Smart jammers may deliberately suspend transmission when the receiver tries to estimate their spatial characteristics, or they may use time-varying beamforming to continuously change their spatial characteristics. To deal with such smart jammers, we propose MASH (short for MitigAtion via Subspace Hiding), the first method that indiscriminately mitigates all types of jammers. Assume that the transmitter and receiver share a common secret. Based on this secret, the transmitter embeds (with a time-domain transform) its signal in a secret subspace of a higher-dimensional space. The receiver applies a reciprocal transform to the receive signal, which (i) raises the legitimate transmit signal from its secret subspace and (ii) provably transforms any jammer into a barrage jammer, making estimation and mitigation via multi-antenna processing straightforward. Focusing on the massive multi-user MIMO uplink, we present three MASH-based data detectors and show their jammer-resilience via extensive simulations. We also introduce strategies for multi-user communication without a global secret as well as methods that use computationally efficient embedding and raising transforms.
只要接收机知道干扰器干扰的空间特性,多天线处理就可以通过空间滤波来缓解干扰。对于连续发射且具有静态特性的弹幕干扰机来说,估计这些特性很容易,但对于更复杂的干扰机来说却很困难。当接收机试图估计其空间特性时,智能干扰机可能会故意暂停传输,或者他们可能会使用时变波束成形来连续改变其空间特性。为了应对这种智能干扰器,我们提出了MASH(通过子空间隐藏缓解的缩写),这是第一种不加区分地缓解所有类型干扰器的方法。假设发送者和接收者共享一个共同的秘密。基于这个秘密,发射机将其信号(通过时域变换)嵌入到高维空间的秘密子空间中。接收器对接收信号进行互反变换,这(i)从其秘密子空间中提升合法发射信号,(ii)可证明地将任何干扰机转换为弹幕干扰机,通过多天线处理进行估计和缓解。针对大规模多用户MIMO上行链路,我们提出了三种基于mash的数据检测器,并通过广泛的仿真展示了它们的抗干扰能力。我们还介绍了没有全局秘密的多用户通信策略,以及使用计算效率高的嵌入和提升变换的方法。
{"title":"Universal MIMO Jammer Mitigation via Subspace Hiding","authors":"Gian Marti;Christoph Studer","doi":"10.1109/TSP.2025.3624986","DOIUrl":"https://doi.org/10.1109/TSP.2025.3624986","url":null,"abstract":"Multi-antenna processing enables jammer mitigation through spatial filtering, provided that the receiver knows the spatial characteristics of the jammer interference. Estimating these characteristics is easy for barrage jammers that transmit continuously and with static characteristics, but difficult for more sophisticated jammers. Smart jammers may deliberately suspend transmission when the receiver tries to estimate their spatial characteristics, or they may use time-varying beamforming to continuously change their spatial characteristics. To deal with such smart jammers, we propose MASH (short for MitigAtion via Subspace Hiding), the first method that indiscriminately mitigates <italic>all</i> types of jammers. Assume that the transmitter and receiver share a common secret. Based on this secret, the transmitter <italic>embeds</i> (with a time-domain transform) its signal in a secret subspace of a higher-dimensional space. The receiver applies a reciprocal transform to the receive signal, which (i) <italic>raises</i> the legitimate transmit signal from its secret subspace and (ii) provably transforms <italic>any</i> jammer into a barrage jammer, making estimation and mitigation via multi-antenna processing straightforward. Focusing on the massive multi-user MIMO uplink, we present three MASH-based data detectors and show their jammer-resilience via extensive simulations. We also introduce strategies for multi-user communication without a global secret as well as methods that use computationally efficient embedding and raising transforms.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"5152-5167"},"PeriodicalIF":5.8,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145886683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provable Performance Bounds for Digital Twin-Driven Reinforcement Learning in Wireless Networks: A Novel Digital-Twin Bisimulation Metric 无线网络中数字孪生驱动强化学习的可证明性能界限:一种新的数字孪生双仿真度量
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-23 DOI: 10.1109/TSP.2025.3624833
Zhenyu Tao;Wei Xu;Xiaohu You
Abstract Digital twin (DT)-driven reinforcement learning (RL) has emerged as a promising paradigm for wireless network optimization, offering safe and efficient training environment for policy exploration. However, in theory existing methods cannot always guarantee real-world performance of DT-trained policies before actual deployment, due to the absence of a universal metric for assessing DT’s ability to support reliable RL training. In this paper, we propose the DT bisimulation metric (DT-BSM), a novel metric based on the Wasserstein distance, to quantify the discrepancy between Markov decision processes (MDPs) in both the DT and the corresponding real-world wireless network environment. We prove that for any DT-trained policy, the sub-optimality of its performance (regret) in the real-world deployment is bounded by a weighted sum of the DT-BSM and its sub-optimality within the MDP in the DT. Then, a modified DT-BSM based on the total variation distance is also introduced to avoid the prohibitive calculation complexity of Wasserstein distance for large-scale wireless network scenarios. Further, to tackle the challenge of obtaining accurate transition probabilities of the MDP in real world for the DT-BSM calculation, we propose an empirical DT-BSM method based on statistical sampling. We prove that the empirical DT-BSM always converges to the desired theoretical one, and quantitatively establish the relationship between the required sample size and the target level of approximation accuracy. Numerical experiments validate this first theoretical finding on the provable and calculable performance bounds for DT-driven RL.
数字孪生(DT)驱动的强化学习(RL)已成为无线网络优化的一个有前途的范例,为政策探索提供了安全高效的训练环境。然而,从理论上讲,由于缺乏一个通用的指标来评估DT支持可靠RL训练的能力,现有的方法在实际部署之前并不能总是保证DT训练策略的真实性能。在本文中,我们提出了DT双仿真度量(DT- bsm),这是一种基于Wasserstein距离的新度量,用于量化DT和相应的实际无线网络环境中的马尔可夫决策过程(mdp)之间的差异。我们证明,对于任何DT训练的策略,其性能的次优性(遗憾)在实际部署中由DT- bsm及其在DT中MDP内的次优性的加权和限定。然后,引入了一种基于总变异距离的改进DT-BSM,避免了大规模无线网络场景下Wasserstein距离的计算复杂度过高。此外,为了解决在现实世界中获得准确的MDP转移概率用于DT-BSM计算的挑战,我们提出了一种基于统计抽样的经验DT-BSM方法。我们证明了经验DT-BSM总是收敛于期望的理论,并定量地建立了所需样本量与逼近精度目标水平之间的关系。数值实验验证了这一关于dt驱动RL可证明和可计算性能界限的第一个理论发现。
{"title":"Provable Performance Bounds for Digital Twin-Driven Reinforcement Learning in Wireless Networks: A Novel Digital-Twin Bisimulation Metric","authors":"Zhenyu Tao;Wei Xu;Xiaohu You","doi":"10.1109/TSP.2025.3624833","DOIUrl":"https://doi.org/10.1109/TSP.2025.3624833","url":null,"abstract":"Abstract Digital twin (DT)-driven reinforcement learning (RL) has emerged as a promising paradigm for wireless network optimization, offering safe and efficient training environment for policy exploration. However, in theory existing methods cannot always guarantee real-world performance of DT-trained policies before actual deployment, due to the absence of a universal metric for assessing DT’s ability to support reliable RL training. In this paper, we propose the DT bisimulation metric (DT-BSM), a novel metric based on the Wasserstein distance, to quantify the discrepancy between Markov decision processes (MDPs) in both the DT and the corresponding real-world wireless network environment. We prove that for any DT-trained policy, the sub-optimality of its performance (regret) in the real-world deployment is bounded by a weighted sum of the DT-BSM and its sub-optimality within the MDP in the DT. Then, a modified DT-BSM based on the total variation distance is also introduced to avoid the prohibitive calculation complexity of Wasserstein distance for large-scale wireless network scenarios. Further, to tackle the challenge of obtaining accurate transition probabilities of the MDP in real world for the DT-BSM calculation, we propose an empirical DT-BSM method based on statistical sampling. We prove that the empirical DT-BSM always converges to the desired theoretical one, and quantitatively establish the relationship between the required sample size and the target level of approximation accuracy. Numerical experiments validate this first theoretical finding on the provable and calculable performance bounds for DT-driven RL.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"4430-4445"},"PeriodicalIF":5.8,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Regularized Top-$ k $: A Bayesian Framework for Gradient Sparsification 正则化Top-$ k $:梯度稀疏化的贝叶斯框架
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-23 DOI: 10.1109/TSP.2025.3624791
Ali Bereyhi;Ben Liang;Gary Boudreau;Ali Afana
Error accumulation is effective for gradient sparsification in distributed settings: initially-unselected gradient entries are eventually selected as their accumulated error exceeds a certain level. The accumulation essentially behaves as a scaling of the learning rate for the selected entries. Although this property prevents the slow-down of lateral movements in distributed gradient descent, it can deteriorate convergence in some settings. This work proposes a novel sparsification scheme that controls the learning rate scaling of error accumulation. The development of this scheme follows two major steps: first, gradient sparsification is formulated as an inverse probability (inference) problem, and the Bayesian optimal sparsification mask is derived as a maximum-a-posteriori estimator. Using the prior distribution inherited from Top-$ k $, we derive a new sparsification algorithm which can be interpreted as a regularized form of Top-$ k $. We call this algorithm regularized Top-$ k $ (RegTop-$ k $). It utilizes past aggregated gradients to evaluate posterior statistics of the next aggregation. It then prioritizes the local accumulated gradient entries based on these posterior statistics. We validate our derivation through various numerical experiments. In distributed linear regression, it is observed that while Top-$ k $ remains at a fixed distance from the global optimum, RegTop-$ k $ converges to the global optimum at significantly higher compression ratios. We further demonstrate the generalization of this observation by employing RegTop-$ k $ in distributed training of ResNet-18 on CIFAR-10, as well as fine-tuning of multiple computer vision models on the ImageNette dataset. Our numerical results confirm that as the compression ratio increases, RegTop-$ k $ sparsification noticeably outperforms Top-$ k $.
在分布式设置下,误差积累对于梯度稀疏化是有效的:初始未选择的梯度项最终被选择,因为它们的累积误差超过了一定的水平。累积本质上表现为所选条目的学习率的缩放。虽然这种特性可以防止在分布式梯度下降中横向运动的减速,但在某些情况下它会降低收敛性。本工作提出了一种新的稀疏化方案,该方案控制了错误积累的学习率缩放。该方案的发展遵循两个主要步骤:首先,将梯度稀疏化表述为一个反概率(推理)问题,并推导出贝叶斯最优稀疏化掩模作为最大后验估计量。利用继承自Top-$ k $的先验分布,导出了一种新的稀疏化算法,该算法可以解释为Top-$ k $的正则化形式。我们称这种算法为正则化Top-$ k $ (RegTop-$ k $)。它利用过去的聚合梯度来评估下一个聚合的后验统计。然后,它根据这些后验统计对局部累积梯度条目进行优先级排序。我们通过各种数值实验验证了我们的推导。在分布线性回归中,可以观察到Top-$ k $与全局最优保持固定距离,而RegTop-$ k $在显著更高的压缩比下收敛到全局最优。通过在CIFAR-10上使用RegTop-$ k $对ResNet-18进行分布式训练,以及在ImageNette数据集上对多个计算机视觉模型进行微调,我们进一步证明了这一观察结果的泛化。我们的数值结果证实,随着压缩比的增加,RegTop-$ k $的稀疏性明显优于Top-$ k $。
{"title":"Regularized Top-$ k $: A Bayesian Framework for Gradient Sparsification","authors":"Ali Bereyhi;Ben Liang;Gary Boudreau;Ali Afana","doi":"10.1109/TSP.2025.3624791","DOIUrl":"https://doi.org/10.1109/TSP.2025.3624791","url":null,"abstract":"Error accumulation is effective for gradient sparsification in distributed settings: initially-unselected gradient entries are eventually selected as their accumulated error exceeds a certain level. The accumulation essentially behaves as a scaling of the learning rate for the selected entries. Although this property prevents the slow-down of lateral movements in distributed gradient descent, it can deteriorate convergence in some settings. This work proposes a novel sparsification scheme that controls the learning rate scaling of error accumulation. The development of this scheme follows two major steps: first, gradient sparsification is formulated as an inverse probability (inference) problem, and the Bayesian optimal sparsification mask is derived as a maximum-a-posteriori estimator. Using the prior distribution inherited from <sc>Top</small>-<inline-formula><tex-math>$ k $</tex-math></inline-formula>, we derive a new sparsification algorithm which can be interpreted as a regularized form of <sc>Top</small>-<inline-formula><tex-math>$ k $</tex-math></inline-formula>. We call this algorithm <italic>regularized</i> <sc>Top</small>-<inline-formula><tex-math>$ k $</tex-math></inline-formula> (<sc>RegTop-</small><inline-formula><tex-math>$ k $</tex-math></inline-formula>). It utilizes past aggregated gradients to evaluate posterior statistics of the next aggregation. It then prioritizes the local accumulated gradient entries based on these posterior statistics. We validate our derivation through various numerical experiments. In distributed linear regression, it is observed that while <sc>Top</small>-<inline-formula><tex-math>$ k $</tex-math></inline-formula> remains at a fixed distance from the global optimum, <sc>RegTop</small>-<inline-formula><tex-math>$ k $</tex-math></inline-formula> converges to the global optimum at significantly higher compression ratios. We further demonstrate the generalization of this observation by employing <sc>RegTop</small>-<inline-formula><tex-math>$ k $</tex-math></inline-formula> in distributed training of ResNet-18 on CIFAR-10, as well as fine-tuning of multiple computer vision models on the ImageNette dataset. Our numerical results confirm that as the compression ratio increases, <sc>RegTop</small>-<inline-formula><tex-math>$ k $</tex-math></inline-formula> sparsification noticeably outperforms <sc>Top</small>-<inline-formula><tex-math>$ k $</tex-math></inline-formula>.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"4463-4478"},"PeriodicalIF":5.8,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145674855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRESS: Diffusion Model-Based Reward Shaping Scheme for Intelligent Networks 基于扩散模型的智能网络奖励形成方案
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-20 DOI: 10.1109/TSP.2025.3623239
Feiran You;Hongyang Du;Xiangwang Hou;Yong Ren;Kaibin Huang
Network optimization remains fundamental in wireless communications, with Artificial Intelligence (AI)-based solutions gaining widespread adoption. As Sixth-Generation (6G) communication networks pursue full-scenario coverage, optimization in complex extreme environments presents unprecedented challenges. The dynamic nature of these environments, combined with physical constraints, makes it difficult for AI solutions such as Deep Reinforcement Learning (DRL) to obtain effective reward feedback for the training process. However, many existing DRL-based network optimization studies overlook this challenge through idealized environment settings. Inspired by the powerful capabilities of Generative AI (GenAI), especially diffusion models, in capturing complex latent distributions, we introduce a novel Diffusion Model-based Reward Shaping Scheme (DRESS) to achieve robust network optimization. By conditioning on observed environmental states and executed actions, DRESS leverages diffusion models’ multi-step denoising process to refine latent representations progressively, generating meaningful auxiliary reward signals that capture patterns of network systems. Moreover, DRESS is designed for seamless integration with any DRL framework, allowing DRESS-aided DRL (DRESSed-DRL) to enable stable and efficient DRL training even under extreme network environments. Experimental results demonstrate that DRESSed-DRL achieves about $1.5{rm{x}}$ times faster convergence than its original version in sparse-reward wireless environments and significant performance improvements in multiple general DRL benchmark environments compared to baseline methods. The code of DRESS is available at https://github.com/NICE-HKU/DRESS.
随着基于人工智能(AI)的解决方案得到广泛采用,网络优化仍然是无线通信的基础。随着第六代(6G)通信网络追求全场景覆盖,复杂极端环境下的优化提出了前所未有的挑战。这些环境的动态特性,加上物理约束,使得深度强化学习(DRL)等人工智能解决方案难以获得有效的训练过程奖励反馈。然而,许多现有的基于drl的网络优化研究通过理想化的环境设置忽略了这一挑战。受生成式人工智能(GenAI),特别是扩散模型在捕获复杂潜在分布方面的强大功能的启发,我们引入了一种新的基于扩散模型的奖励塑造方案(DRESS)来实现鲁棒网络优化。通过对观察到的环境状态和执行的行为进行调节,DRESS利用扩散模型的多步去噪过程逐步细化潜在表征,生成捕获网络系统模式的有意义的辅助奖励信号。此外,DRESS设计用于与任何DRL框架无缝集成,允许DRESS辅助DRL (dresed -DRL)即使在极端网络环境下也能实现稳定高效的DRL训练。实验结果表明,在稀疏奖励无线环境中,dress -DRL的收敛速度比原始版本快1.5倍,在多个通用DRL基准环境中,与基线方法相比,性能有了显著提高。DRESS的代码可在https://github.com/NICE-HKU/DRESS找到。
{"title":"DRESS: Diffusion Model-Based Reward Shaping Scheme for Intelligent Networks","authors":"Feiran You;Hongyang Du;Xiangwang Hou;Yong Ren;Kaibin Huang","doi":"10.1109/TSP.2025.3623239","DOIUrl":"https://doi.org/10.1109/TSP.2025.3623239","url":null,"abstract":"Network optimization remains fundamental in wireless communications, with Artificial Intelligence (AI)-based solutions gaining widespread adoption. As Sixth-Generation (6G) communication networks pursue full-scenario coverage, optimization in complex extreme environments presents unprecedented challenges. The dynamic nature of these environments, combined with physical constraints, makes it difficult for AI solutions such as Deep Reinforcement Learning (DRL) to obtain effective reward feedback for the training process. However, many existing DRL-based network optimization studies overlook this challenge through idealized environment settings. Inspired by the powerful capabilities of Generative AI (GenAI), especially diffusion models, in capturing complex latent distributions, we introduce a novel <underline>D</u>iffusion Model-based <underline>Re</u>ward <underline>S</u>haping <underline>S</u>cheme (DRESS) to achieve robust network optimization. By conditioning on observed environmental states and executed actions, DRESS leverages diffusion models’ multi-step denoising process to refine latent representations progressively, generating meaningful auxiliary reward signals that capture patterns of network systems. Moreover, DRESS is designed for seamless integration with any DRL framework, allowing DRESS-aided DRL (DRESSed-DRL) to enable stable and efficient DRL training even under extreme network environments. Experimental results demonstrate that DRESSed-DRL achieves about <inline-formula><tex-math>$1.5{rm{x}}$</tex-math></inline-formula> times faster convergence than its original version in sparse-reward wireless environments and significant performance improvements in multiple general DRL benchmark environments compared to baseline methods. The code of DRESS is available at <uri>https://github.com/NICE-HKU/DRESS</uri>.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"4285-4300"},"PeriodicalIF":5.8,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145560686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poisson Multi-Bernoulli Mixture Filter for Trajectory Measurements 用于弹道测量的泊松-伯努利混合滤波
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-20 DOI: 10.1109/TSP.2025.3623496
Marco Fontana;Ángel F. García-Fernández;Simon Maskell
This paper presents a Poisson multi-Bernoulli mixture (PMBM) filter for multi-target filtering based on sensor measurements that are sets of trajectories in the last two-time step window. The proposed filter, the trajectory measurement PMBM (TM-PMBM) filter, propagates a PMBM density on the set of target states. In prediction, the filter obtains the PMBM density on the set of trajectories over the last two time steps. This density is then updated with the set of trajectory measurements. After the update step, the PMBM posterior on the set of two-step trajectories is marginalised to obtain a PMBM density on the set of target states. The filter provides a closed-form solution for multi-target filtering based on sets of trajectory measurements, estimating the set of target states at the end of each time window. Additionally, the paper proposes computationally lighter alternatives to the TM-PMBM filter by deriving a Poisson multi-Bernoulli (PMB) density through Kullback-Leibler divergence minimisation in an augmented space with auxiliary variables. The performance of the proposed filters are evaluated in a simulation study.
本文提出了一种泊松-多伯努利混合滤波器,用于基于传感器测量值的多目标滤波,这些测量值是最后两个时间步长窗口的轨迹集。所提出的弹道测量PMBM (TM-PMBM)滤波器在目标状态集上传播PMBM密度。在预测中,滤波器在最后两个时间步长上获得轨迹集上的PMBM密度。然后用轨迹测量集更新这个密度。在更新步骤之后,对两步轨迹集上的PMBM后验进行边缘处理,得到目标状态集上的PMBM密度。该滤波器为基于轨迹测量集的多目标滤波提供了一种封闭的解决方案,在每个时间窗口结束时估计目标状态集。此外,本文提出了计算更轻的TM-PMBM滤波器的替代方案,通过在具有辅助变量的增广空间中通过kullbackleibler散度最小化来推导泊松多伯努利(PMB)密度。在仿真研究中对所提滤波器的性能进行了评价。
{"title":"Poisson Multi-Bernoulli Mixture Filter for Trajectory Measurements","authors":"Marco Fontana;Ángel F. García-Fernández;Simon Maskell","doi":"10.1109/TSP.2025.3623496","DOIUrl":"https://doi.org/10.1109/TSP.2025.3623496","url":null,"abstract":"This paper presents a Poisson multi-Bernoulli mixture (PMBM) filter for multi-target filtering based on sensor measurements that are sets of trajectories in the last two-time step window. The proposed filter, the trajectory measurement PMBM (TM-PMBM) filter, propagates a PMBM density on the set of target states. In prediction, the filter obtains the PMBM density on the set of trajectories over the last two time steps. This density is then updated with the set of trajectory measurements. After the update step, the PMBM posterior on the set of two-step trajectories is marginalised to obtain a PMBM density on the set of target states. The filter provides a closed-form solution for multi-target filtering based on sets of trajectory measurements, estimating the set of target states at the end of each time window. Additionally, the paper proposes computationally lighter alternatives to the TM-PMBM filter by deriving a Poisson multi-Bernoulli (PMB) density through Kullback-Leibler divergence minimisation in an augmented space with auxiliary variables. The performance of the proposed filters are evaluated in a simulation study.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"4301-4314"},"PeriodicalIF":5.8,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145560687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Iterative Solution for Independent Vector Analysis With Convergence Guarantees 具有收敛保证的独立向量分析的有效迭代解
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-20 DOI: 10.1109/TSP.2025.3620539
Clément Cosserat;Ben Gabrielson;Emilie Chouzenoux;Jean-Christophe Pesquet;Tülay Adali
Independent vector analysis (IVA) is an attractive solution to address the problem of joint blind source separation (JBSS), that is, the simultaneous extraction of latent sources from several datasets implicitly sharing some information. Among IVA approaches, we focus here on the celebrated IVA-G model, that describes observed data through the mixing of independent Gaussian source vectors across the datasets. IVA-G algorithms usually seek the values of demixing matrices that maximize the joint likelihood of the datasets, estimating the sources using these demixing matrices. Instead, we write the likelihood of the data with respect to both the demixing matrices and the precision matrices of the source estimates. This allows us to formulate a cost function whose mathematical properties enable the use of a proximal alternating algorithm based on closed form operators with provable convergence to a critical point. After establishing the convergence properties of the new algorithm, we illustrate its desirable performance in separating sources with covariance structures that represent varying degrees of difficulty for JBSS.
独立向量分析(IVA)是解决联合盲源分离(JBSS)问题的一种有吸引力的解决方案,即同时从隐含共享某些信息的多个数据集中提取潜在源。在IVA方法中,我们在这里重点介绍著名的IVA- g模型,该模型通过混合数据集上的独立高斯源向量来描述观测数据。IVA-G算法通常寻求使数据集的联合似然最大化的解混矩阵的值,使用这些解混矩阵估计源。相反,我们写数据的似然与分离矩阵和源估计的精度矩阵有关。这允许我们制定一个成本函数,其数学性质允许使用基于闭形式算子的近端交替算法,该算法具有可证明的收敛到临界点。在建立了新算法的收敛性之后,我们说明了它在分离具有不同难度的协方差结构的JBSS源方面的良好性能。
{"title":"An Effective Iterative Solution for Independent Vector Analysis With Convergence Guarantees","authors":"Clément Cosserat;Ben Gabrielson;Emilie Chouzenoux;Jean-Christophe Pesquet;Tülay Adali","doi":"10.1109/TSP.2025.3620539","DOIUrl":"https://doi.org/10.1109/TSP.2025.3620539","url":null,"abstract":"Independent vector analysis (IVA) is an attractive solution to address the problem of joint blind source separation (JBSS), that is, the simultaneous extraction of latent sources from several datasets implicitly sharing some information. Among IVA approaches, we focus here on the celebrated IVA-G model, that describes observed data through the mixing of independent Gaussian source vectors across the datasets. IVA-G algorithms usually seek the values of demixing matrices that maximize the joint likelihood of the datasets, estimating the sources using these demixing matrices. Instead, we write the likelihood of the data with respect to both the demixing matrices and the precision matrices of the source estimates. This allows us to formulate a cost function whose mathematical properties enable the use of a proximal alternating algorithm based on closed form operators with provable convergence to a critical point. After establishing the convergence properties of the new algorithm, we illustrate its desirable performance in separating sources with covariance structures that represent varying degrees of difficulty for JBSS.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"4718-4733"},"PeriodicalIF":5.8,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145778116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Truncated Power Functions To Orthogonal Wavelet-Like Basis: Principle, Implementation and Applications 从截断幂函数到正交类小波基:原理、实现与应用
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-20 DOI: 10.1109/TSP.2025.3623455
Wei Chen;Qingfeng Xia;Jiahui Sun;Zhanchuan Cai
Conventional wavelet systems often face intrinsic limitations in simultaneously achieving orthogonality, vanishing moments, regularity and boundary control. This paper proposes a novel complete orthogonal basis system $text{OTP-}k$ (Orthogonal Truncated Power functions of degree $k$) on $L^{2}[0,1]$. The truncated power (TP) functions attain superior flexibility by incorporating nodes while retaining the essential characteristics of conventional power functions. We reveal a critical feature of TP functions: their capacity to explicitly decompose signals into dominant and residual components. Building upon this theoretical insight, we integrate the multi-resolution analysis (MRA) framework into the TP functions paradigm, thereby constructing an orthogonal wavelet-like basis. Notably, the $text{OTP-}k$ basis supports parametrically adjustable vanishing moments through degree modification of $k$, ensures mathematically verifiable smoothness continuity, and demonstrates superior time-frequency localization characteristics. This work rigorously establishes the theoretical foundations, construction methodology, and computational implementation strategies for $text{OTP-}k$. Through systematic evaluations of Electroencephalogram (EEG) and gravitational wave (GW) signal reconstruction and denoising, benchmarked against traditional wavelet bases, we validate the significant potential of the $text{OTP-}k$ basis in signal processing.
传统的小波系统在同时实现正交性、消失矩、正则性和边界控制方面往往面临固有的局限性。本文在$L^{2}[0,1]$上提出了一种新颖的完全正交基系统$text{OTP-}k$(次$k$的正交截断幂函数)。截断幂函数在保留传统幂函数的基本特征的同时,通过结合节点实现了优越的灵活性。我们揭示了TP函数的一个关键特征:它们能够明确地将信号分解为主导分量和剩余分量。基于这一理论见解,我们将多分辨率分析(MRA)框架整合到TP函数范式中,从而构建了一个正交小波基。值得注意的是,$text{OTP-}k$基通过$k$的度修改支持参数可调的消失矩,保证了数学上可验证的平滑连续性,并表现出优越的时频局部化特性。这项工作严格地建立了$text{OTP-}k$的理论基础、构造方法和计算实现策略。通过对脑电图(EEG)和引力波(GW)信号重构和去噪的系统评价,以传统小波基为基准,验证了$text{OTP-}k$基在信号处理中的显著潜力。
{"title":"From Truncated Power Functions To Orthogonal Wavelet-Like Basis: Principle, Implementation and Applications","authors":"Wei Chen;Qingfeng Xia;Jiahui Sun;Zhanchuan Cai","doi":"10.1109/TSP.2025.3623455","DOIUrl":"https://doi.org/10.1109/TSP.2025.3623455","url":null,"abstract":"Conventional wavelet systems often face intrinsic limitations in simultaneously achieving orthogonality, vanishing moments, regularity and boundary control. This paper proposes a novel complete orthogonal basis system <inline-formula><tex-math>$text{OTP-}k$</tex-math></inline-formula> (Orthogonal Truncated Power functions of degree <inline-formula><tex-math>$k$</tex-math></inline-formula>) on <inline-formula><tex-math>$L^{2}[0,1]$</tex-math></inline-formula>. The truncated power (TP) functions attain superior flexibility by incorporating nodes while retaining the essential characteristics of conventional power functions. We reveal a critical feature of TP functions: their capacity to explicitly decompose signals into dominant and residual components. Building upon this theoretical insight, we integrate the multi-resolution analysis (MRA) framework into the TP functions paradigm, thereby constructing an orthogonal wavelet-like basis. Notably, the <inline-formula><tex-math>$text{OTP-}k$</tex-math></inline-formula> basis supports parametrically adjustable vanishing moments through degree modification of <inline-formula><tex-math>$k$</tex-math></inline-formula>, ensures mathematically verifiable smoothness continuity, and demonstrates superior time-frequency localization characteristics. This work rigorously establishes the theoretical foundations, construction methodology, and computational implementation strategies for <inline-formula><tex-math>$text{OTP-}k$</tex-math></inline-formula>. Through systematic evaluations of Electroencephalogram (EEG) and gravitational wave (GW) signal reconstruction and denoising, benchmarked against traditional wavelet bases, we validate the significant potential of the <inline-formula><tex-math>$text{OTP-}k$</tex-math></inline-formula> basis in signal processing.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"4226-4239"},"PeriodicalIF":5.8,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145560685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rate-Optimal Power Allocation for MIMO Channels Under Joint Total and Per-Group Power Constraints 联合总功率和组功率约束下MIMO信道的速率最优功率分配
IF 5.8 2区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-10-17 DOI: 10.1109/TSP.2025.3602387
Mahdi Khojastehnia;Ioannis Lambadaris;Ramy H. Gohary;Sergey Loyka
We consider a multiple-input multiple-output (MIMO) channel, in which the transmit antennas are partitioned into groups, each with a per-group power constraint (PGPC) and a total power constraint (TPC). We considered two cases: (i) right unitary-invariant, including Rayleigh, fading MIMO channels with perfect channel state information at the receiver (CSI-R), and (ii) massive MIMO channels with perfect CSI at the transmitter and the receiver (CSI-TR). For both cases, we show that the rate-optimal input covariance matrix is diagonal, implying reduced design complexity and independent signaling on each antenna. We derive closed-form expressions for the diagonal entries, i.e., the powers allocated to each antenna. For CSI-R channels, we derive a criterion to identify groups with active PGPCs. Majorization theory and Schur-concavity are used to obtain the optimal power allocations. For CSI-TR channels, we use the Karush-Kuhn-Tucker conditions to show that the PGPCs result in a ceiling profile, causing the rate-optimal power allocations to deviate from standard water-filling. Compared to numerical algorithms, our closed-form expressions are significantly more efficient to compute and guarantee globally optimality. Our analytical findings are validated via numerical experiments.
我们考虑了一个多输入多输出(MIMO)信道,其中发射天线被划分成组,每个组都有每组功率约束(PGPC)和总功率约束(TPC)。我们考虑了两种情况:(i)右酉不变的,包括瑞利衰落的MIMO信道,在接收端具有完美的信道状态信息(CSI- r),以及(ii)在发送端和接收端具有完美CSI的大规模MIMO信道(CSI- tr)。对于这两种情况,我们表明速率最优输入协方差矩阵是对角的,这意味着降低了设计复杂性和每个天线上的独立信号。我们导出对角线项的封闭表达式,即分配给每个天线的功率。对于CSI-R通道,我们导出了一个标准来识别具有活动pgpc的组。利用多数化理论和schur -凹凸性来获得最优的功率分配。对于CSI-TR通道,我们使用Karush-Kuhn-Tucker条件来显示PGPCs导致天花板剖面,导致速率最优功率分配偏离标准充水。与数值算法相比,我们的封闭表达式的计算效率显著提高,并保证了全局最优性。我们的分析结果通过数值实验得到了验证。
{"title":"Rate-Optimal Power Allocation for MIMO Channels Under Joint Total and Per-Group Power Constraints","authors":"Mahdi Khojastehnia;Ioannis Lambadaris;Ramy H. Gohary;Sergey Loyka","doi":"10.1109/TSP.2025.3602387","DOIUrl":"10.1109/TSP.2025.3602387","url":null,"abstract":"We consider a multiple-input multiple-output (MIMO) channel, in which the transmit antennas are partitioned into groups, each with a per-group power constraint (PGPC) and a total power constraint (TPC). We considered two cases: (i) right unitary-invariant, including Rayleigh, fading MIMO channels with perfect channel state information at the receiver (CSI-R), and (ii) massive MIMO channels with perfect CSI at the transmitter and the receiver (CSI-TR). For both cases, we show that the rate-optimal input covariance matrix is diagonal, implying reduced design complexity and independent signaling on each antenna. We derive closed-form expressions for the diagonal entries, i.e., the powers allocated to each antenna. For CSI-R channels, we derive a criterion to identify groups with active PGPCs. Majorization theory and Schur-concavity are used to obtain the optimal power allocations. For CSI-TR channels, we use the Karush-Kuhn-Tucker conditions to show that the PGPCs result in a ceiling profile, causing the rate-optimal power allocations to deviate from standard water-filling. Compared to numerical algorithms, our closed-form expressions are significantly more efficient to compute and guarantee globally optimality. Our analytical findings are validated via numerical experiments.","PeriodicalId":13330,"journal":{"name":"IEEE Transactions on Signal Processing","volume":"73 ","pages":"4315-4330"},"PeriodicalIF":5.8,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145310867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1