首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
Strategy-Proof Cost-Sharing Mechanism for Dynamic Adaptability Service in Vehicle Computing 车辆计算中动态适应性服务的无策略成本分担机制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-22 DOI: 10.1109/TNSM.2025.3646778
Xi Liu;Jun Liu;Weidong Li
Vehicle computing has emerged as a promising paradigm for delivering time-sensitive computing services to Internet of Things applications. Intelligent vehicles (IVs) offer onboard computing and sensing capabilities for delivering a wide range of services. In this paper, we propose a dynamic adaptability service model that leverages the swift mobility of vehicles to adjust the distribution of IVs to users’ dynamically changing locations. There are two types of areas in our model: the user area and the parking area. The former is where services are provided, while the latter serves as the preparation zone for backup IVs. IVs in the parking area are dispatched to service areas, where existing vehicle resources cannot meet user demand, and they return to the parking area after delivering the service. Multiple users share sensing resources, and our model allocates the costs among them. To ensure strategy-proofness, we introduce the concepts of no additional cost and allocation stability. We propose a strategy-proof cost-sharing mechanism for dynamic adaptability service. The proposed mechanism achieves no positive transfers, voluntary participation, individual rationality, consumer sovereignty, budget balance, no additional costs, and allocation stability. Moreover, the proposed mechanism’s approximation performance is analyzed. We further use comprehensive simulations to verify the effectiveness and efficiency of the proposed mechanism.
车载计算已经成为向物联网应用程序提供时间敏感计算服务的一个有前途的范例。智能车辆(IVs)提供车载计算和传感能力,以提供广泛的服务。本文提出了一种动态适应性服务模型,该模型利用车辆的快速移动性,根据用户动态变化的位置来调整车辆的分布。在我们的模型中有两种类型的区域:用户区和停车区。前者是提供服务的地方,后者是备份iv的准备区。停车区域的IVs被派往现有车辆资源无法满足用户需求的服务区,完成服务后返回停车区域。多个用户共享感知资源,我们的模型在用户之间分配成本。为了确保策略的正确性,我们引入了无额外成本和分配稳定性的概念。提出了一种不受策略约束的动态适应性服务成本分担机制。该机制没有实现正向转移、自愿参与、个人理性、消费者主权、预算平衡、无额外成本和分配稳定。此外,还分析了该机构的逼近性能。我们进一步使用综合仿真来验证所提出机制的有效性和效率。
{"title":"Strategy-Proof Cost-Sharing Mechanism for Dynamic Adaptability Service in Vehicle Computing","authors":"Xi Liu;Jun Liu;Weidong Li","doi":"10.1109/TNSM.2025.3646778","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3646778","url":null,"abstract":"Vehicle computing has emerged as a promising paradigm for delivering time-sensitive computing services to Internet of Things applications. Intelligent vehicles (IVs) offer onboard computing and sensing capabilities for delivering a wide range of services. In this paper, we propose a dynamic adaptability service model that leverages the swift mobility of vehicles to adjust the distribution of IVs to users’ dynamically changing locations. There are two types of areas in our model: the user area and the parking area. The former is where services are provided, while the latter serves as the preparation zone for backup IVs. IVs in the parking area are dispatched to service areas, where existing vehicle resources cannot meet user demand, and they return to the parking area after delivering the service. Multiple users share sensing resources, and our model allocates the costs among them. To ensure strategy-proofness, we introduce the concepts of no additional cost and allocation stability. We propose a strategy-proof cost-sharing mechanism for dynamic adaptability service. The proposed mechanism achieves no positive transfers, voluntary participation, individual rationality, consumer sovereignty, budget balance, no additional costs, and allocation stability. Moreover, the proposed mechanism’s approximation performance is analyzed. We further use comprehensive simulations to verify the effectiveness and efficiency of the proposed mechanism.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1942-1959"},"PeriodicalIF":5.4,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Slicing in MEC-Based RANs With Nonlinear Cost Rate Functions 基于mec的具有非线性代价率函数的局域网网络切片
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-19 DOI: 10.1109/TNSM.2025.3646478
Jiahe Xu;Jing Fu;Bige Yang;Zengfu Wang;Jingjin Wu;Xinyu Wang;Moshe Zukerman
This paper addresses network slicing in a large-scale Multi-Access Edge Computing (MEC)-enabled Radio Access Network (RAN) comprising heterogeneous edge nodes with varying computing and storage resource capacities. These resources are dynamically allocated to slice requests and released when the service of a slice request is completed. Our objective is to optimize the resource allocation for each admitted arriving slice request, considering its demands for computing and storage resources, to maximize the long-run average Earning Before Interest and Taxes (EBIT) of the MEC slicing system. We formulate the optimization problem as a Restless Multi-Armed Bandit (RMAB)-based resource allocation problem with a nonlinear cost rate function. To solve this, we introduce a new policy called Prioritizing-the-Future-Approximated earning per request (PFA) where for each admitted slice request, we always prioritize the allocation of the resource combination that gives the highest achievable earning, considering the future effects of this allocation. PFA is designed to be scalable and applicable to large-scale networks. We numerically demonstrate the superior performance of PFA in maximizing long-run average EBIT through simulations, comparing it with two baseline policies, at various cases of parameter values. Moreover, our findings offer insights for network operators in resource allocation policy selection.
本文讨论了大规模多访问边缘计算(MEC)无线接入网(RAN)中的网络切片,该网络由具有不同计算和存储资源容量的异构边缘节点组成。这些资源被动态地分配给片请求,并在片请求的服务完成时释放。我们的目标是优化每个被允许到达的切片请求的资源分配,考虑其对计算和存储资源的需求,以最大化MEC切片系统的长期平均息税前收益(EBIT)。我们将优化问题表述为一个具有非线性成本率函数的基于不动多臂强盗(RMAB)的资源分配问题。为了解决这个问题,我们引入了一种新的策略,称为优先考虑每个请求的未来近似收益(PFA),其中对于每个被接受的切片请求,我们总是优先考虑可实现最高收益的资源组合的分配,同时考虑到这种分配的未来影响。PFA具有可扩展性,适用于大规模网络。我们通过模拟在数值上证明了PFA在最大化长期平均息税前利润方面的优越性能,并将其与两种基线策略在各种参数值情况下进行了比较。此外,我们的研究结果为网络运营商的资源配置策略选择提供了见解。
{"title":"Network Slicing in MEC-Based RANs With Nonlinear Cost Rate Functions","authors":"Jiahe Xu;Jing Fu;Bige Yang;Zengfu Wang;Jingjin Wu;Xinyu Wang;Moshe Zukerman","doi":"10.1109/TNSM.2025.3646478","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3646478","url":null,"abstract":"This paper addresses network slicing in a large-scale Multi-Access Edge Computing (MEC)-enabled Radio Access Network (RAN) comprising heterogeneous edge nodes with varying computing and storage resource capacities. These resources are dynamically allocated to slice requests and released when the service of a slice request is completed. Our objective is to optimize the resource allocation for each admitted arriving slice request, considering its demands for computing and storage resources, to maximize the long-run average Earning Before Interest and Taxes (EBIT) of the MEC slicing system. We formulate the optimization problem as a Restless Multi-Armed Bandit (RMAB)-based resource allocation problem with a nonlinear cost rate function. To solve this, we introduce a new policy called Prioritizing-the-Future-Approximated earning per request (PFA) where for each admitted slice request, we always prioritize the allocation of the resource combination that gives the highest achievable earning, considering the future effects of this allocation. PFA is designed to be scalable and applicable to large-scale networks. We numerically demonstrate the superior performance of PFA in maximizing long-run average EBIT through simulations, comparing it with two baseline policies, at various cases of parameter values. Moreover, our findings offer insights for network operators in resource allocation policy selection.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1989-2005"},"PeriodicalIF":5.4,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Traffic Camouflage Against Network Analyzers via Deep Reinforcement Learning 通过深度强化学习对网络分析器进行在线流量伪装
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-19 DOI: 10.1109/TNSM.2025.3646259
Wenhao Li;Jie Chen;Zhaoxuan Li;Shuai Wang;Huamin Jin;Xiao-Yu Zhang
Traffic analysis plays a pivotal role in network management. However, despite the prevalence of encryption, attackers are still able to deduce privacy elements such as user behavior and OS identification through advanced learning-based methods that exploit side-channel features. Existing defense strategies, which manipulate feature distribution to evade traffic analyzers, are often hampered by the need for impractical decoder deployment across all routes in symmetric framework methods. Moreover, reversing feature distribution modifications to real-time traffic, especially through dummy packet crafting or padding, is a complex task. In response to these challenges, we propose Veil, a novel and practical defender designed to protect live connections against encrypted network traffic analyzers. Leveraging an asymmetric deployment structure, Veil is capable of reconstructing live streams at the packet-block level, thereby allowing for seamless deployment on any connection node while enforcing transmission constraints. By employing a traffic-customized DQN framework, Veil not only reverses statistical feature perturbations back to the traffic space but also directs the distribution towards a target class. Extensive experiments conducted on real-world datasets validate the efficacy of Veil in efficiently evading analyzers in both targeted and untargeted modes, outperforming existing defense mechanisms. Notably, Veil addresses the key issues of impractical decoder deployment and complex real-time traffic manipulation, offering a more viable solution for network traffic privacy protection. The source code is publicly available at https://github.com/SecTeamPolaris/Veil, facilitating further research and application in the field of network security.
流量分析在网络管理中起着举足轻重的作用。然而,尽管加密盛行,攻击者仍然能够通过利用侧信道特性的高级基于学习的方法推断出隐私元素,例如用户行为和操作系统识别。现有的防御策略,通过操纵特征分布来逃避流量分析,经常受到需要在对称框架方法中跨所有路由部署不切实际的解码器的阻碍。此外,逆转实时流量的特征分布修改,特别是通过虚拟数据包制作或填充,是一项复杂的任务。为了应对这些挑战,我们提出了Veil,这是一种新颖实用的防御器,旨在保护实时连接免受加密网络流量分析器的攻击。利用非对称部署结构,Veil能够在包块级别重构实时流,从而允许在任何连接节点上无缝部署,同时强制传输约束。通过采用流量定制的DQN框架,Veil不仅将统计特征扰动逆转回流量空间,而且还将分布指向目标类。在真实世界数据集上进行的大量实验验证了Veil在靶向和非靶向模式下有效逃避分析器的功效,优于现有的防御机制。值得注意的是,Veil解决了解码器部署不切实际和复杂的实时流量操纵的关键问题,为网络流量隐私保护提供了更可行的解决方案。源代码可在https://github.com/SecTeamPolaris/Veil上公开获取,以促进在网络安全领域的进一步研究和应用。
{"title":"Online Traffic Camouflage Against Network Analyzers via Deep Reinforcement Learning","authors":"Wenhao Li;Jie Chen;Zhaoxuan Li;Shuai Wang;Huamin Jin;Xiao-Yu Zhang","doi":"10.1109/TNSM.2025.3646259","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3646259","url":null,"abstract":"Traffic analysis plays a pivotal role in network management. However, despite the prevalence of encryption, attackers are still able to deduce privacy elements such as user behavior and OS identification through advanced learning-based methods that exploit side-channel features. Existing defense strategies, which manipulate feature distribution to evade traffic analyzers, are often hampered by the need for impractical decoder deployment across all routes in symmetric framework methods. Moreover, reversing feature distribution modifications to real-time traffic, especially through dummy packet crafting or padding, is a complex task. In response to these challenges, we propose <monospace>Veil</monospace>, a novel and practical defender designed to protect live connections against encrypted network traffic analyzers. Leveraging an asymmetric deployment structure, <monospace>Veil</monospace> is capable of reconstructing live streams at the packet-block level, thereby allowing for seamless deployment on any connection node while enforcing transmission constraints. By employing a traffic-customized DQN framework, <monospace>Veil</monospace> not only reverses statistical feature perturbations back to the traffic space but also directs the distribution towards a target class. Extensive experiments conducted on real-world datasets validate the efficacy of <monospace>Veil</monospace> in efficiently evading analyzers in both targeted and untargeted modes, outperforming existing defense mechanisms. Notably, <monospace>Veil</monospace> addresses the key issues of impractical decoder deployment and complex real-time traffic manipulation, offering a more viable solution for network traffic privacy protection. The source code is publicly available at <uri>https://github.com/SecTeamPolaris/Veil</uri>, facilitating further research and application in the field of network security.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1927-1941"},"PeriodicalIF":5.4,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GAN4RM: A CWGAN-Based Framework for Radio Maps Generation in Real Cellular Networks GAN4RM:真实蜂窝网络中基于cwgan的无线地图生成框架
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-18 DOI: 10.1109/TNSM.2025.3645305
Lei Zhang;Wanting Su;Qin Ni;Jiawangnan Lu;Bin Chen
With the evolution of mobile networks towards Artificial Intelligence as a Service (AIaaS), generative radio maps not only need to reflect the signal strength distribution in specific areas, but also possess the capability of proactive prediction. However, due to the rapid updates in urban infrastructure and the network iterations, crafting radio maps in complex urban environments represents a substantial challenge. In this paper, a multi-output framework for generating radio maps in real multi-building scenarios is proposed, based on Reference Signal Received Power (RSRP) and Reference Signal Received Quality (RSRQ) extracted from actual urban and suburban Measurement Reports (MRs). Specifically, An image encoding method integrating environmental features and base station system information is designed, while considering the sector antenna characteristics in actual communication environments. Then, a multi-output Conditional Wasserstein Generative Adversarial Network (CWGAN) is constructed for image conversion, and the radio maps are generated by learning the mapping from environmental & system information to RSRP & RSRQ radio maps, on the basis of image encoding that incorporates the physical laws of radio propagation. By calculating the priority of communication link gains at receiving points, it provides generative networks with reliable theoretical basis and conditional information, for serving cells and first neighboring cells. Experimental results show that the root mean square errors (RMSE) of the proposed method for RSRP / RSRQ of serving and neighboring cells are 1.7821 / 2.2251 and 0.8108 / 1.5121, which demonstrates the proposed method outperforms the baseline results. Simultaneously radio maps generation endows the cellular network with a certain “prophetic” capability, significantly enhancing the live service experience.
随着移动网络向人工智能即服务(AIaaS)的发展,生成式无线地图不仅需要反映特定区域的信号强度分布,还需要具备主动预测的能力。然而,由于城市基础设施的快速更新和网络的迭代,在复杂的城市环境中制作无线电地图是一项重大挑战。本文提出了一种基于参考信号接收功率(RSRP)和参考信号接收质量(RSRQ)的多输出框架,用于在实际多建筑场景下生成无线电地图。具体而言,在考虑实际通信环境扇形天线特性的同时,设计了一种综合环境特征和基站系统信息的图像编码方法。然后,构建多输出条件Wasserstein生成对抗网络(CWGAN)进行图像转换,在结合无线电传播物理规律的图像编码基础上,通过学习环境和系统信息到RSRP和RSRQ无线电地图的映射,生成无线电地图。通过计算接收点通信链路增益的优先级,为服务小区和第一相邻小区的生成网络提供可靠的理论依据和条件信息。实验结果表明,所提方法对服务单元和相邻单元的RSRP / RSRQ的均方根误差(RMSE)分别为1.7821 / 2.2251和0.8108 / 1.5121,表明所提方法优于基线结果。同时,无线地图的生成赋予了蜂窝网络一定的“预见性”能力,显著提升了现场服务体验。
{"title":"GAN4RM: A CWGAN-Based Framework for Radio Maps Generation in Real Cellular Networks","authors":"Lei Zhang;Wanting Su;Qin Ni;Jiawangnan Lu;Bin Chen","doi":"10.1109/TNSM.2025.3645305","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3645305","url":null,"abstract":"With the evolution of mobile networks towards Artificial Intelligence as a Service (AIaaS), generative radio maps not only need to reflect the signal strength distribution in specific areas, but also possess the capability of proactive prediction. However, due to the rapid updates in urban infrastructure and the network iterations, crafting radio maps in complex urban environments represents a substantial challenge. In this paper, a multi-output framework for generating radio maps in real multi-building scenarios is proposed, based on Reference Signal Received Power (RSRP) and Reference Signal Received Quality (RSRQ) extracted from actual urban and suburban Measurement Reports (MRs). Specifically, An image encoding method integrating environmental features and base station system information is designed, while considering the sector antenna characteristics in actual communication environments. Then, a multi-output Conditional Wasserstein Generative Adversarial Network (CWGAN) is constructed for image conversion, and the radio maps are generated by learning the mapping from environmental & system information to RSRP & RSRQ radio maps, on the basis of image encoding that incorporates the physical laws of radio propagation. By calculating the priority of communication link gains at receiving points, it provides generative networks with reliable theoretical basis and conditional information, for serving cells and first neighboring cells. Experimental results show that the root mean square errors (RMSE) of the proposed method for RSRP / RSRQ of serving and neighboring cells are 1.7821 / 2.2251 and 0.8108 / 1.5121, which demonstrates the proposed method outperforms the baseline results. Simultaneously radio maps generation endows the cellular network with a certain “prophetic” capability, significantly enhancing the live service experience.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1329-1341"},"PeriodicalIF":5.4,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segment Routing Header (SRH)-Aware Traffic Engineering in Hybrid IP/SRv6 Networks With Deep Reinforcement Learning 基于深度强化学习的混合IP/SRv6网络中SRH感知流量工程
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-18 DOI: 10.1109/TNSM.2025.3645463
Shuyi Liu;Yuang Chen;Zhengze Li;Fangyu Zhang;Hancheng Lu;Xiaobo Guo;Lizhe Liu
Segment Routing over IPv6 (SRv6) gives operators explicit path control and alleviates network congestion, making it a compelling technique for traffic engineering (TE). Yet two practical hurdles slow adoption. First, a one-shot upgrade of every traditional device is prohibitively expensive, so operators must prioritize which devices to upgrade. Second, the Segment Routing Header (SRH) increases packet size; if TE algorithms ignore this overhead, they will underestimate link load and may cause congestion in practice. We address both challenges with DRL-TE, an algorithm that couples deep reinforcement learning (DRL) with a lightweight local search (LS) step to minimize the network’s maximum link utilization (MLU). DRL-TE first identifies the smallest set of critical devices whose upgrade yields the largest drop in MLU, enabling hybrid IP/SRv6 networks to approach optimal performance with minimal investment. It then computes SRH-aware routes, and the DRL agent, augmented by a fast LS refinement, rapidly reduces MLU even under traffic variation. Experiments on an 11-node hardware testbed and three larger simulated topologies show that upgrading about 30% of devices allows DRL-TE to match fully upgraded networks and reduce MLU by up to 34% compared with existing algorithms. DRL-TE also maintains high performance under link failures and traffic variations, offering a cost-effective and robust path toward incremental SRv6 deployment.
IPv6分段路由(SRv6)为运营商提供了明确的路径控制,减轻了网络拥塞,使其成为交通工程(TE)的一项引人注目的技术。然而,有两个实际障碍阻碍了采用。首先,对每个传统设备进行一次性升级是非常昂贵的,因此运营商必须优先考虑升级哪些设备。第二,段路由头(SRH)增加包的大小;如果TE算法忽略这个开销,它们将低估链路负载,并可能在实践中导致拥塞。我们通过DRL- te解决了这两个挑战,DRL- te是一种将深度强化学习(DRL)与轻量级本地搜索(LS)步骤相结合的算法,以最小化网络的最大链路利用率(MLU)。DRL-TE首先识别出最小的关键设备集,这些设备的升级产生最大的MLU下降,使混合IP/SRv6网络能够以最小的投资接近最佳性能。然后计算srh感知路由,DRL代理通过快速LS细化增强,即使在流量变化的情况下也能快速减少MLU。在11节点硬件测试平台和三个更大的模拟拓扑上进行的实验表明,升级约30%的设备使DRL-TE能够匹配完全升级的网络,与现有算法相比,MLU最多可减少34%。DRL-TE还在链路故障和流量变化下保持高性能,为增量SRv6部署提供了经济有效且稳健的途径。
{"title":"Segment Routing Header (SRH)-Aware Traffic Engineering in Hybrid IP/SRv6 Networks With Deep Reinforcement Learning","authors":"Shuyi Liu;Yuang Chen;Zhengze Li;Fangyu Zhang;Hancheng Lu;Xiaobo Guo;Lizhe Liu","doi":"10.1109/TNSM.2025.3645463","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3645463","url":null,"abstract":"Segment Routing over IPv6 (SRv6) gives operators explicit path control and alleviates network congestion, making it a compelling technique for traffic engineering (TE). Yet two practical hurdles slow adoption. First, a one-shot upgrade of every traditional device is prohibitively expensive, so operators must prioritize which devices to upgrade. Second, the Segment Routing Header (SRH) increases packet size; if TE algorithms ignore this overhead, they will underestimate link load and may cause congestion in practice. We address both challenges with DRL-TE, an algorithm that couples deep reinforcement learning (DRL) with a lightweight local search (LS) step to minimize the network’s maximum link utilization (MLU). DRL-TE first identifies the smallest set of critical devices whose upgrade yields the largest drop in MLU, enabling hybrid IP/SRv6 networks to approach optimal performance with minimal investment. It then computes SRH-aware routes, and the DRL agent, augmented by a fast LS refinement, rapidly reduces MLU even under traffic variation. Experiments on an 11-node hardware testbed and three larger simulated topologies show that upgrading about 30% of devices allows DRL-TE to match fully upgraded networks and reduce MLU by up to 34% compared with existing algorithms. DRL-TE also maintains high performance under link failures and traffic variations, offering a cost-effective and robust path toward incremental SRv6 deployment.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1260-1275"},"PeriodicalIF":5.4,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and Invisible Flow Watermarking With Invertible Neural Network for Traffic Tracking 基于可逆神经网络的交通跟踪鲁棒不可见流水印
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-17 DOI: 10.1109/TNSM.2025.3645079
Yali Yuan;Ruolin Ma;Jian Ge;Guang Cheng
This paper introduces an innovative blind flow watermarking framework on the basis of Invertible Neural Network (INN) called IFW, which aims to solve the problem of suboptimal encoder-decoder coupling in existing end-to-end watermarking architectures. The framework tightly couples the encoder and decoder to achieve highly consistent feature mapping using the same parameters, thus effectively avoiding redundant feature embedding. In addition, this paper adopts the INN to implement watermarking, which supports forward encoding and backward decoding, and the watermark extraction is completely dependent on the embedding algorithm without the need for the original network flow. This feature enables both the embedding and the blind extraction of watermarks simultaneously. Extensive experiments demonstrate that the proposed IFW method achieves a watermark extraction accuracy exceeding 96.6% and maintains a stable K-S test p-value above 0.85 in both simulated and real-world Tor traffic environments. These results indicate a clear advantage over mainstream baselines, highlighting the method’s ability to jointly ensure robustness and invisibility, as well as its strong potential for real-world deployment.
本文介绍了一种基于可逆神经网络(INN)的盲流水印框架IFW,该框架旨在解决现有端到端水印架构中编解码器耦合次优的问题。该框架将编码器和解码器紧密耦合,使用相同的参数实现高度一致的特征映射,从而有效地避免了冗余的特征嵌入。此外,本文采用INN实现水印,支持前向编码和后向解码,水印提取完全依赖于嵌入算法,不需要原始网络流。该特性可以同时实现水印的嵌入和盲提取。大量实验表明,本文提出的IFW方法在模拟和真实Tor流量环境下水印提取精度均超过96.6%,K-S检验p值稳定在0.85以上。这些结果表明,与主流基线相比,该方法具有明显的优势,突出了该方法联合确保鲁棒性和不可见性的能力,以及其在实际部署中的强大潜力。
{"title":"Robust and Invisible Flow Watermarking With Invertible Neural Network for Traffic Tracking","authors":"Yali Yuan;Ruolin Ma;Jian Ge;Guang Cheng","doi":"10.1109/TNSM.2025.3645079","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3645079","url":null,"abstract":"This paper introduces an innovative blind flow watermarking framework on the basis of Invertible Neural Network (INN) called IFW, which aims to solve the problem of suboptimal encoder-decoder coupling in existing end-to-end watermarking architectures. The framework tightly couples the encoder and decoder to achieve highly consistent feature mapping using the same parameters, thus effectively avoiding redundant feature embedding. In addition, this paper adopts the INN to implement watermarking, which supports forward encoding and backward decoding, and the watermark extraction is completely dependent on the embedding algorithm without the need for the original network flow. This feature enables both the embedding and the blind extraction of watermarks simultaneously. Extensive experiments demonstrate that the proposed IFW method achieves a watermark extraction accuracy exceeding 96.6% and maintains a stable K-S test p-value above 0.85 in both simulated and real-world Tor traffic environments. These results indicate a clear advantage over mainstream baselines, highlighting the method’s ability to jointly ensure robustness and invisibility, as well as its strong potential for real-world deployment.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1381-1394"},"PeriodicalIF":5.4,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient RAN Selection and SFC Deployment in Dependable Wireless Edge Cloud Networks 可靠无线边缘云网络中弹性RAN选择和SFC部署
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-17 DOI: 10.1109/TNSM.2025.3645449
Ioannis Dimolitsas;Maria Diamanti;Stefanos Voikos;Symeon Papavassiliou
The evolution toward sixth-generation (6G) networks necessitates integrated resource management solutions to address the interdependencies between network segments, such as Radio Access Network (RAN) and Edge Cloud (EC) infrastructures. Unified management of network and compute fabrics is crucial for achieving seamless service delivery, end-to-end power efficiency, and delay guarantees, while resiliency becomes a key enabler for adapting to various application demands and diverse network segment conditions. In this context, this paper proposes a unified framework for dependable wireless EC networks that jointly addresses the problems of RAN selection and Service Function Chain (SFC) embedding to minimize the total power consumption across network segments under end-to-end delay SFC deployment constraints. The framework iteratively solves these problems, considering the interdependencies between RAN ingress points and the EC network resource constraints. To deal with the high dimensionality of the considered parameters and achieve timely and scalable decision-making, a coalition formation game optimizes RAN selection, while a delay-aware heuristic approach undertakes the power-efficient embedding of multiple SFCs within the EC network. Simulation results demonstrate the framework’s efficiency in reducing power consumption compared to segment-specific approaches, highlighting the importance of cross-segment dependencies. Also, the adaptability of the proposed unified modeling and the framework’s scalability are demonstrated, ensuring resilient performance under varying network parameter settings.
向第六代(6G)网络的发展需要集成资源管理解决方案来解决网段之间的相互依赖性,例如无线接入网(RAN)和边缘云(EC)基础设施。网络和计算结构的统一管理对于实现无缝服务交付、端到端能效和延迟保证至关重要,而弹性则成为适应各种应用需求和不同网段条件的关键因素。在此背景下,本文提出了一个统一的可靠无线EC网络框架,该框架共同解决了RAN选择和业务功能链(SFC)嵌入问题,以在端到端延迟SFC部署约束下最小化跨网段的总功耗。该框架考虑了RAN入口点之间的相互依赖关系和EC网络资源约束,迭代地解决了这些问题。为了处理所考虑参数的高维性并实现及时和可扩展的决策,联盟形成博弈优化了RAN选择,而延迟感知启发式方法在EC网络中进行了多个sfc的节能嵌入。仿真结果表明,与特定段的方法相比,该框架在降低功耗方面具有效率,突出了跨段依赖关系的重要性。此外,还验证了所提出的统一建模的适应性和框架的可扩展性,确保了在不同网络参数设置下的弹性性能。
{"title":"Resilient RAN Selection and SFC Deployment in Dependable Wireless Edge Cloud Networks","authors":"Ioannis Dimolitsas;Maria Diamanti;Stefanos Voikos;Symeon Papavassiliou","doi":"10.1109/TNSM.2025.3645449","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3645449","url":null,"abstract":"The evolution toward sixth-generation (6G) networks necessitates integrated resource management solutions to address the interdependencies between network segments, such as Radio Access Network (RAN) and Edge Cloud (EC) infrastructures. Unified management of network and compute fabrics is crucial for achieving seamless service delivery, end-to-end power efficiency, and delay guarantees, while resiliency becomes a key enabler for adapting to various application demands and diverse network segment conditions. In this context, this paper proposes a unified framework for dependable wireless EC networks that jointly addresses the problems of RAN selection and Service Function Chain (SFC) embedding to minimize the total power consumption across network segments under end-to-end delay SFC deployment constraints. The framework iteratively solves these problems, considering the interdependencies between RAN ingress points and the EC network resource constraints. To deal with the high dimensionality of the considered parameters and achieve timely and scalable decision-making, a coalition formation game optimizes RAN selection, while a delay-aware heuristic approach undertakes the power-efficient embedding of multiple SFCs within the EC network. Simulation results demonstrate the framework’s efficiency in reducing power consumption compared to segment-specific approaches, highlighting the importance of cross-segment dependencies. Also, the adaptability of the proposed unified modeling and the framework’s scalability are demonstrated, ensuring resilient performance under varying network parameter settings.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1312-1328"},"PeriodicalIF":5.4,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S3Cross: Blockchain-Based Cross-Domain Authentication With Self-Sovereign and Supervised Identity Management S3Cross:基于区块链的跨域认证,具有自我主权和监督身份管理
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-10 DOI: 10.1109/TNSM.2025.3642315
Chang Chen;Guoyu Yang;Dawei Zhang;Wei Wang;Qi Chen;Jin Li
The widespread deployment of Internet of Things (IoT) devices has driven their segmentation into distinct trust domains for the purpose of governance, creating a critical need for secure cross-domain authentication (CDA). CDA must preserve both anonymity and traceability of device identities to enable trustworthy data exchange. However, existing approaches, while exploring this trade-off, remain vulnerable to single points of failure and Sybil attacks—threats that are especially severe for unattended and resource-constrained devices. In this paper, we propose a Self-Sovereign and Supervised Cross-domain authentication scheme (S3Cross) to tackle these issues. The main building block we designed is a pseudonym management scheme (PMS) that allows devices to generate and use pseudonyms without relying on a trusted party. Although devices has full control of their identities, PMS still ensures traceability, Sybil resistance, and revocability. We define the formal security models of PMS, instantiate it under two different approaches, namely group signature (S3Cross-GS) and zero-knowledge succinct non-interactive arguments of knowledge (zkSNARKs, S3Cross-ZK), and present security proofs for our proposal. We implemented and evaluated S3Cross. The result shows that our scheme achieves an effective trade-off between security and efficiency.
物联网(IoT)设备的广泛部署已经将其划分为不同的信任域,以实现治理目的,从而产生了对安全跨域身份验证(CDA)的迫切需求。CDA必须保持设备身份的匿名性和可追溯性,以实现可信的数据交换。然而,现有的方法在探索这种权衡的同时,仍然容易受到单点故障和Sybil攻击的攻击——对于无人值守和资源受限的设备来说,这种威胁尤其严重。在本文中,我们提出了一个自我主权和监督跨域认证方案(S3Cross)来解决这些问题。我们设计的主要构建块是一个假名管理方案(PMS),它允许设备生成和使用假名,而不依赖于受信任的一方。尽管设备完全控制其身份,但PMS仍然确保可追溯性、抗Sybil性和可撤销性。我们定义了PMS的形式化安全模型,在两种不同的方法下进行了实例化,即群签名(S3Cross-GS)和零知识简洁非交互式知识参数(zkSNARKs, S3Cross-ZK),并为我们的提议提供了安全证明。我们实施并评估了S3Cross。结果表明,该方案实现了安全与效率之间的有效权衡。
{"title":"S3Cross: Blockchain-Based Cross-Domain Authentication With Self-Sovereign and Supervised Identity Management","authors":"Chang Chen;Guoyu Yang;Dawei Zhang;Wei Wang;Qi Chen;Jin Li","doi":"10.1109/TNSM.2025.3642315","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3642315","url":null,"abstract":"The widespread deployment of Internet of Things (IoT) devices has driven their segmentation into distinct trust domains for the purpose of governance, creating a critical need for secure cross-domain authentication (CDA). CDA must preserve both anonymity and traceability of device identities to enable trustworthy data exchange. However, existing approaches, while exploring this trade-off, remain vulnerable to single points of failure and Sybil attacks—threats that are especially severe for unattended and resource-constrained devices. In this paper, we propose a Self-Sovereign and Supervised Cross-domain authentication scheme (S3Cross) to tackle these issues. The main building block we designed is a pseudonym management scheme (PMS) that allows devices to generate and use pseudonyms without relying on a trusted party. Although devices has full control of their identities, PMS still ensures traceability, Sybil resistance, and revocability. We define the formal security models of PMS, instantiate it under two different approaches, namely group signature (S3Cross-GS) and zero-knowledge succinct non-interactive arguments of knowledge (zkSNARKs, S3Cross-ZK), and present security proofs for our proposal. We implemented and evaluated S3Cross. The result shows that our scheme achieves an effective trade-off between security and efficiency.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1217-1231"},"PeriodicalIF":5.4,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta-Computing Enhanced Federated Learning in IIoT: Satisfaction-Aware Incentive Scheme via DRL-Based Stackelberg Game 工业物联网中元计算增强的联邦学习:基于drl的Stackelberg博弈的满意度感知激励机制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-10 DOI: 10.1109/TNSM.2025.3642395
Xiaohuan Li;Shaowen Qin;Xin Tang;Jiawen Kang;Jin Ye;Zhonghua Zhao;Yusi Zheng;Dusit Niyato
The Industrial Internet of Things (IIoT) leverages Federated Learning (FL) for distributed model training while preserving data privacy, and meta-computing enhances FL by optimizing and integrating distributed computing resources, improving efficiency and scalability. Efficient IIoT operations require a trade-off between model quality and training latency. Consequently, a primary challenge of FL in IIoT is to optimize overall system performance by balancing model quality and training latency. This paper designs a satisfaction function that accounts for data size, Age of Information (AoI), and training latency for meta-computing. Additionally, the satisfaction function is incorporated into the utility function to incentivize IIoT nodes to participate in model training. We model the utility functions of servers and nodes as a two-stage Stackelberg game and employ a deep reinforcement learning approach to learn the Stackelberg equilibrium. This approach ensures balanced rewards and enhances the applicability of the incentive scheme for IIoT. Simulation results demonstrate that, under the same budget constraints, the proposed incentive scheme improves utility by at least 23.7% compared to existing FL schemes without compromising model accuracy.
工业物联网(IIoT)利用联邦学习(FL)进行分布式模型训练,同时保护数据隐私,元计算通过优化和集成分布式计算资源、提高效率和可扩展性来增强联邦学习。高效的工业物联网操作需要在模型质量和训练延迟之间进行权衡。因此,人工智能在工业物联网中的主要挑战是通过平衡模型质量和训练延迟来优化整体系统性能。本文设计了一个考虑数据大小、信息时代(Age of Information, AoI)和元计算训练延迟的满意度函数。此外,在效用函数中加入满意度函数,激励IIoT节点参与模型训练。我们将服务器和节点的效用函数建模为两阶段Stackelberg博弈,并采用深度强化学习方法来学习Stackelberg均衡。这种方法确保了平衡的奖励,并增强了激励方案对工业物联网的适用性。仿真结果表明,在相同的预算约束下,与现有的FL方案相比,所提出的激励方案在不影响模型精度的情况下,提高了至少23.7%的效用。
{"title":"Meta-Computing Enhanced Federated Learning in IIoT: Satisfaction-Aware Incentive Scheme via DRL-Based Stackelberg Game","authors":"Xiaohuan Li;Shaowen Qin;Xin Tang;Jiawen Kang;Jin Ye;Zhonghua Zhao;Yusi Zheng;Dusit Niyato","doi":"10.1109/TNSM.2025.3642395","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3642395","url":null,"abstract":"The Industrial Internet of Things (IIoT) leverages Federated Learning (FL) for distributed model training while preserving data privacy, and meta-computing enhances FL by optimizing and integrating distributed computing resources, improving efficiency and scalability. Efficient IIoT operations require a trade-off between model quality and training latency. Consequently, a primary challenge of FL in IIoT is to optimize overall system performance by balancing model quality and training latency. This paper designs a satisfaction function that accounts for data size, Age of Information (AoI), and training latency for meta-computing. Additionally, the satisfaction function is incorporated into the utility function to incentivize IIoT nodes to participate in model training. We model the utility functions of servers and nodes as a two-stage Stackelberg game and employ a deep reinforcement learning approach to learn the Stackelberg equilibrium. This approach ensures balanced rewards and enhances the applicability of the incentive scheme for IIoT. Simulation results demonstrate that, under the same budget constraints, the proposed incentive scheme improves utility by at least 23.7% compared to existing FL schemes without compromising model accuracy.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1356-1368"},"PeriodicalIF":5.4,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VLSA: Voting-Based Leader Selection Algorithm for Multi-Party Signature Blockchain Transactions VLSA:基于投票的多方签名区块链交易领袖选择算法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-08 DOI: 10.1109/TNSM.2025.3640095
Narendra K. Dewangan;Preeti Chandrakar
Blockchain is increasingly used in industrial, financial, and IoT settings for secure and auditable transaction processing; however, existing leader election and consensus methods, such as PBFT, Raft, and reputation-based schemes, suffer from static leadership, unfair vote distribution, and limited scalability. To address these gaps, we propose VLSA (Vote-based Leader Selection Algorithm), a decentralized rotation-based mechanism that ensures fairness in leader election, and MPoAh (Modified Proof-of-Authentication), a lightweight consensus protocol tailored for multi-party signatures. Our implementation, built with Python, CouchDB, and Ed25519 cryptography, achieves a 35% reduction in signature and verification latency and a 30% decrease in on-chain storage compared to state-of-the-art approaches. Simulation further shows 95% packet delivery, average authentication latency of 12 ms, and ledger throughput of 250 tx/s. These results demonstrate that the proposed system enables democratic participation in consensus, supports deployment on resource-constrained devices, and strengthens resistance against insider and Sybil attacks, thereby advancing secure and scalable blockchain-based authentication.
区块链越来越多地用于工业、金融和物联网环境,用于安全、可审计的交易处理;然而,现有的领导人选举和共识方法,如PBFT, Raft和基于声誉的方案,存在静态领导,不公平的投票分配和有限的可扩展性。为了解决这些差距,我们提出了VLSA(基于投票的领导者选择算法),这是一种分散的基于轮换的机制,可确保领导者选举的公平性,以及MPoAh(修改的身份验证证明),这是一种为多方签名量身定制的轻量级共识协议。我们的实现使用Python、CouchDB和Ed25519加密技术构建,与最先进的方法相比,签名和验证延迟减少了35%,链上存储减少了30%。仿真进一步显示95%的数据包传递,平均身份验证延迟为12 ms,账本吞吐量为250 tx/s。这些结果表明,所提出的系统能够实现共识的民主参与,支持在资源受限设备上的部署,并加强对内部和Sybil攻击的抵抗力,从而推进安全和可扩展的基于区块链的身份验证。
{"title":"VLSA: Voting-Based Leader Selection Algorithm for Multi-Party Signature Blockchain Transactions","authors":"Narendra K. Dewangan;Preeti Chandrakar","doi":"10.1109/TNSM.2025.3640095","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3640095","url":null,"abstract":"Blockchain is increasingly used in industrial, financial, and IoT settings for secure and auditable transaction processing; however, existing leader election and consensus methods, such as PBFT, Raft, and reputation-based schemes, suffer from static leadership, unfair vote distribution, and limited scalability. To address these gaps, we propose VLSA (Vote-based Leader Selection Algorithm), a decentralized rotation-based mechanism that ensures fairness in leader election, and MPoAh (Modified Proof-of-Authentication), a lightweight consensus protocol tailored for multi-party signatures. Our implementation, built with Python, CouchDB, and Ed25519 cryptography, achieves a 35% reduction in signature and verification latency and a 30% decrease in on-chain storage compared to state-of-the-art approaches. Simulation further shows 95% packet delivery, average authentication latency of 12 ms, and ledger throughput of 250 tx/s. These results demonstrate that the proposed system enables democratic participation in consensus, supports deployment on resource-constrained devices, and strengthens resistance against insider and Sybil attacks, thereby advancing secure and scalable blockchain-based authentication.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1395-1405"},"PeriodicalIF":5.4,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1