首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
Signaling Rate and Performance of RIS Reconfiguration and Handover Management in Next Generation Mobile Networks 下一代移动网络中RIS重构与切换管理的信令速率与性能
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-11 DOI: 10.1109/TNSM.2025.3608077
Mounir Bensalem;Admela Jukan
We consider the problem of signaling rate and performance for control and management of reconfigurable intelligent surfaces (RISs) in next-generation mobile networks. To this end, we first analytically determine the rates of RIS reconfigurations and handover using a stochastic geometry network model. We derive closed-form expressions of these rates, while taking into account static obstacles (both known and unknown), self-blockage, RIS location density, and variations in the angle and direction of user mobility. Based on the derived rates, we analyze the signaling rates of a sample novel signaling protocol, which we propose as an extension of the current handover signaling protocol. We evaluate the signaling overhead due to RIS reconfigurations and the related energy consumption. We also provide a capacity planning analysis of the related RIS control plane server for its dimensioning in the network management system. The results quantify the impact of known and unknown obstacles on the RIS reconfiguration rate and the handover rate as a function of device density and mobility. We evaluate the scalability of the model, the related signaling overhead, energy efficiency, and server capacity in the control plane. To the best of our knowledge, this is the first analytical model to derive the closed form expressions of RIS reconfiguration rates, along with handover rates, and relate its statistical properties to the signaling rate and performance in next-generation mobile networks.
我们考虑了下一代移动网络中可重构智能表面(RISs)控制和管理的信号速率和性能问题。为此,我们首先使用随机几何网络模型解析确定RIS重构和切换的速率。我们推导了这些速率的封闭表达式,同时考虑了静态障碍物(已知和未知)、自阻塞、RIS位置密度以及用户移动角度和方向的变化。在此基础上,我们分析了一种新型信令协议的信令速率,并提出了该协议作为当前切换信令协议的扩展。我们评估了由于RIS重新配置和相关的能量消耗而产生的信令开销。本文还对相关的RIS控制平面服务器进行了容量规划分析,以便在网管系统中对其进行维度划分。结果量化了已知和未知障碍对RIS重构率和切换率的影响,并将其作为设备密度和移动性的函数。我们评估了模型的可扩展性、相关的信令开销、能源效率和控制平面中的服务器容量。据我们所知,这是第一个导出RIS重构率和切换率的封闭形式表达式的分析模型,并将其统计特性与下一代移动网络中的信令率和性能联系起来。
{"title":"Signaling Rate and Performance of RIS Reconfiguration and Handover Management in Next Generation Mobile Networks","authors":"Mounir Bensalem;Admela Jukan","doi":"10.1109/TNSM.2025.3608077","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3608077","url":null,"abstract":"We consider the problem of signaling rate and performance for control and management of reconfigurable intelligent surfaces (RISs) in next-generation mobile networks. To this end, we first analytically determine the rates of RIS reconfigurations and handover using a stochastic geometry network model. We derive closed-form expressions of these rates, while taking into account static obstacles (both known and unknown), self-blockage, RIS location density, and variations in the angle and direction of user mobility. Based on the derived rates, we analyze the signaling rates of a sample novel signaling protocol, which we propose as an extension of the current handover signaling protocol. We evaluate the signaling overhead due to RIS reconfigurations and the related energy consumption. We also provide a capacity planning analysis of the related RIS control plane server for its dimensioning in the network management system. The results quantify the impact of known and unknown obstacles on the RIS reconfiguration rate and the handover rate as a function of device density and mobility. We evaluate the scalability of the model, the related signaling overhead, energy efficiency, and server capacity in the control plane. To the best of our knowledge, this is the first analytical model to derive the closed form expressions of RIS reconfiguration rates, along with handover rates, and relate its statistical properties to the signaling rate and performance in next-generation mobile networks.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6159-6176"},"PeriodicalIF":5.4,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11160619","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
There is More Control in Egalitarian Edge IoT Meshes 在平等边缘物联网网格中有更多的控制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-11 DOI: 10.1109/TNSM.2025.3608796
Anna Karanika;Rui Yang;Xiaojuan Ma;Jiangran Wang;Shalni Sundram;Indranil Gupta
While mesh networking for edge settings (e.g., smart buildings, farms, battlefields, etc.) has received much attention, the layer of control over such meshes remains largely centralized and cloud-based. This paper focuses on applications with commonplace sense-trigger-actuate (STA) workloads—like the abstraction of routines popular now in smart homes, but applied to larger-scale edge IoT deployments. We present CoMesh, which tackles the challenge of building a decentralized mesh-based control plane for local, non-cloud, and hubless management of sense-trigger-actuate applications. CoMesh builds atop an abstraction called the coterie, which spreads STA load in a fine-grained way both across space and across time. A coterie uses a novel combination of techniques such as zero-message-exchange protocols (for fast proactive member selection), quorum-based agreement, and locality-sensitive hashing. We analyze and theoretically prove safety and liveness properties of CoMesh. Our evaluation with both a Raspberry Pi-4 deployment and larger-scale simulations, using real building maps and real routine workloads, shows that CoMesh is load-balanced, fast, fault-tolerant, and scalable.
虽然边缘设置的网状网络(例如,智能建筑,农场,战场等)受到了很多关注,但对这些网格的控制层仍然主要集中在云上。本文重点关注具有普通感知触发-驱动(STA)工作负载的应用,类似于现在智能家居中流行的例程抽象,但适用于更大规模的边缘物联网部署。我们提出了CoMesh,它解决了为本地、非云和无中心管理的感知触发驱动应用程序构建分散的基于网格的控制平面的挑战。CoMesh构建在一个称为coterie的抽象之上,该抽象以细粒度的方式跨空间和时间分布STA负载。小圈子使用一种新颖的技术组合,例如零消息交换协议(用于快速主动选择成员)、基于群体的协议和对位置敏感的散列。分析并从理论上证明了CoMesh的安全性和活动性。我们对Raspberry Pi-4部署和大规模模拟(使用真实的建筑地图和真实的日常工作负载)的评估表明,CoMesh具有负载均衡、快速、容错和可扩展性。
{"title":"There is More Control in Egalitarian Edge IoT Meshes","authors":"Anna Karanika;Rui Yang;Xiaojuan Ma;Jiangran Wang;Shalni Sundram;Indranil Gupta","doi":"10.1109/TNSM.2025.3608796","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3608796","url":null,"abstract":"While mesh networking for edge settings (e.g., smart buildings, farms, battlefields, etc.) has received much attention, the layer of control over such meshes remains largely centralized and cloud-based. This paper focuses on applications with commonplace sense-trigger-actuate (STA) workloads—like the abstraction of routines popular now in smart homes, but applied to larger-scale edge IoT deployments. We present CoMesh, which tackles the challenge of building a decentralized mesh-based control plane for local, non-cloud, and hubless management of sense-trigger-actuate applications. CoMesh builds atop an abstraction called the coterie, which spreads STA load in a fine-grained way both across space and across time. A coterie uses a novel combination of techniques such as zero-message-exchange protocols (for fast proactive member selection), quorum-based agreement, and locality-sensitive hashing. We analyze and theoretically prove safety and liveness properties of CoMesh. Our evaluation with both a Raspberry Pi-4 deployment and larger-scale simulations, using real building maps and real routine workloads, shows that CoMesh is load-balanced, fast, fault-tolerant, and scalable.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"896-909"},"PeriodicalIF":5.4,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11159320","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145852462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-Aware and Routing-Flexible Network Slicing for Service-Oriented Networks 面向服务网络的qos感知和路由柔性网络切片
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-10 DOI: 10.1109/TNSM.2025.3608074
Wei-Kun Chen;Ya-Feng Liu;Yu-Hong Dai;Zhi-Quan Luo
In this paper, we consider the network slicing (NS) problem which aims to map multiple customized virtual network requests (also called services) to a common shared network infrastructure and manage network resources to meet diverse quality of service (QoS) requirements. We propose a mixed-integer nonlinear programming (MINLP) formulation for the considered NS problem that can flexibly route the traffic flow of the services on multiple paths and provide end-to-end delay and reliability guarantees for all services. To overcome the computational difficulty due to the intrinsic nonlinearity in the MINLP formulation, we transform the MINLP formulation into an equivalent mixed-integer linear programming (MILP) formulation and further show that their continuous relaxations are equivalent. In sharp contrast to the continuous relaxation of the MINLP formulation which is a nonconvex nonlinear programming problem, the continuous relaxation of the MILP formulation is a polynomial-time solvable linear programming problem, which significantly facilitates the algorithmic design. Based on the newly proposed MILP formulation, we develop a customized column generation (cCG) algorithm for solving the NS problem. The proposed cCG algorithm is a decomposition-based algorithm and is particularly suitable for solving large-scale NS problems. Numerical results demonstrate the efficacy of the proposed formulations and the proposed cCG algorithm.
在本文中,我们考虑了网络切片(NS)问题,其目的是将多个定制的虚拟网络请求(也称为服务)映射到一个共同的共享网络基础设施,并管理网络资源以满足不同的服务质量(QoS)需求。针对所考虑的NS问题,我们提出了一种混合整数非线性规划(MINLP)公式,该公式可以灵活地将业务的流量流路由到多条路径上,并为所有业务提供端到端的延迟和可靠性保证。为了克服MINLP公式固有的非线性所带来的计算困难,我们将MINLP公式转化为等效混合整数线性规划(MILP)公式,并进一步证明了它们的连续松弛是等价的。与MINLP公式的连续松弛是一个非凸非线性规划问题形成鲜明对比的是,MILP公式的连续松弛是一个多项式时间可解的线性规划问题,这极大地方便了算法设计。基于新提出的MILP公式,我们开发了一种定制的列生成(cCG)算法来解决NS问题。本文提出的cCG算法是一种基于分解的算法,特别适用于求解大规模NS问题。数值结果验证了所提公式和所提cCG算法的有效性。
{"title":"QoS-Aware and Routing-Flexible Network Slicing for Service-Oriented Networks","authors":"Wei-Kun Chen;Ya-Feng Liu;Yu-Hong Dai;Zhi-Quan Luo","doi":"10.1109/TNSM.2025.3608074","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3608074","url":null,"abstract":"In this paper, we consider the network slicing (NS) problem which aims to map multiple customized virtual network requests (also called services) to a common shared network infrastructure and manage network resources to meet diverse quality of service (QoS) requirements. We propose a mixed-integer nonlinear programming (MINLP) formulation for the considered NS problem that can flexibly route the traffic flow of the services on multiple paths and provide end-to-end delay and reliability guarantees for all services. To overcome the computational difficulty due to the intrinsic nonlinearity in the MINLP formulation, we transform the MINLP formulation into an equivalent mixed-integer linear programming (MILP) formulation and further show that their continuous relaxations are equivalent. In sharp contrast to the continuous relaxation of the MINLP formulation which is a nonconvex nonlinear programming problem, the continuous relaxation of the MILP formulation is a polynomial-time solvable linear programming problem, which significantly facilitates the algorithmic design. Based on the newly proposed MILP formulation, we develop a customized column generation (cCG) algorithm for solving the NS problem. The proposed cCG algorithm is a decomposition-based algorithm and is particularly suitable for solving large-scale NS problems. Numerical results demonstrate the efficacy of the proposed formulations and the proposed cCG algorithm.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6021-6036"},"PeriodicalIF":5.4,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node-Reliability: Monte Carlo, Laplace, and Stochastic Approximations and a Greedy Link-Augmentation Strategy 节点可靠性:蒙特卡罗、拉普拉斯、随机逼近和贪婪链路增强策略
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-08 DOI: 10.1109/TNSM.2025.3607004
Xinhan Liu;Robert Kooij;Piet Van Mieghem
The node-reliability polynomial $nRel_{G}(p)$ measures the probability that a connected network remains connected given that each node functions independently with probability $p$ . Computing node-reliability polynomials $nRel_{G}(p)$ exactly is NP-hard. Here we propose efficient approximations. First, we develop an accurate Monte Carlo simulation, which is accelerated by incorporating a Laplace approximation that captures the polynomial’s main behavior. We also introduce three degree-based stochastic approximations (Laplace, arithmetic, and geometric), which leverage the degree distribution to estimate $nRel_{G}(p)$ with low complexity. Beyond approximations, our framework addresses the reliability-based Global Robustness Improvement Problem ( $k$ -GRIP) by selecting exactly $k$ links to add to a given graph so as to maximize its node reliability. A Greedy Lowest-Degree Pairing Link Addition (Greedy-LD) Algorithm, is proposed which offers a computationally efficient and practically effective heuristic, particularly suitable for large-scale networks.
节点可靠性多项式$nRel_{G}(p)$测量给定每个节点以概率$p$独立运行的连接网络保持连接的概率。计算节点可靠性多项式$nRel_{G}(p)$完全是NP-hard。这里我们提出有效的近似。首先,我们开发了一个精确的蒙特卡罗模拟,通过结合捕捉多项式主要行为的拉普拉斯近似来加速。我们还引入了三种基于度的随机近似(拉普拉斯、算术和几何),它们利用度分布以低复杂度估计$nRel_{G}(p)$。除了近似之外,我们的框架通过精确选择$k$链接添加到给定图中以最大化其节点可靠性来解决基于可靠性的全局鲁棒性改进问题($k$ -GRIP)。提出了一种贪心最低度配对链路相加算法(Greedy- ld),它提供了一种计算效率高、实用效果好的启发式算法,特别适用于大规模网络。
{"title":"Node-Reliability: Monte Carlo, Laplace, and Stochastic Approximations and a Greedy Link-Augmentation Strategy","authors":"Xinhan Liu;Robert Kooij;Piet Van Mieghem","doi":"10.1109/TNSM.2025.3607004","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3607004","url":null,"abstract":"The node-reliability polynomial <inline-formula> <tex-math>$nRel_{G}(p)$ </tex-math></inline-formula> measures the probability that a connected network remains connected given that each node functions independently with probability <inline-formula> <tex-math>$p$ </tex-math></inline-formula>. Computing node-reliability polynomials <inline-formula> <tex-math>$nRel_{G}(p)$ </tex-math></inline-formula> exactly is NP-hard. Here we propose efficient approximations. First, we develop an accurate Monte Carlo simulation, which is accelerated by incorporating a Laplace approximation that captures the polynomial’s main behavior. We also introduce three degree-based stochastic approximations (Laplace, arithmetic, and geometric), which leverage the degree distribution to estimate <inline-formula> <tex-math>$nRel_{G}(p)$ </tex-math></inline-formula> with low complexity. Beyond approximations, our framework addresses the reliability-based Global Robustness Improvement Problem (<inline-formula> <tex-math>$k$ </tex-math></inline-formula>-GRIP) by selecting exactly <inline-formula> <tex-math>$k$ </tex-math></inline-formula> links to add to a given graph so as to maximize its node reliability. A Greedy Lowest-Degree Pairing Link Addition (Greedy-LD) Algorithm, is proposed which offers a computationally efficient and practically effective heuristic, particularly suitable for large-scale networks.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"756-766"},"PeriodicalIF":5.4,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145852507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Linux Kernel-Based Packet Switching on WiFi Access Points 了解基于Linux内核的WiFi接入点分组交换
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-29 DOI: 10.1109/TNSM.2025.3603597
Shiqi Zhang;Mridul Gupta;Behnam Dezfouli
As the number of WiFi devices and their traffic demands continue to rise, the need for a scalable and high-performance wireless infrastructure becomes increasingly essential. Central to this infrastructure are WiFi Access Points (APs), which facilitate packet switching between Ethernet and WiFi interfaces. Despite APs’ reliance on the Linux kernel’s data plane for packet switching, the detailed operations and complexities of switching packets between Ethernet and WiFi interfaces have not been investigated in existing works. This paper makes the following contributions towards filling this research gap. Through macro and micro-analysis of empirical experiments, our study reveals insights in two distinct categories. Firstly, while the kernel’s statistics offer valuable insights into system operations, we identify and discuss potential pitfalls that can severely affect system analysis. For instance, we reveal how packet switching rate and the implementation of drivers influence the meaning and accuracy of statistics related to packet-switching tasks and processor utilization. Secondly, we analyze the impact of the packet switching path and core configuration on performance and power consumption. Specifically, we identify the differences in Ethernet-to-WiFi and WiFi-to-Ethernet data paths regarding processing components, multi-core utilization, and energy efficiency.
随着WiFi设备的数量及其流量需求的不断增加,对可扩展和高性能无线基础设施的需求变得越来越重要。该基础设施的核心是WiFi接入点(ap),它促进了以太网和WiFi接口之间的数据包交换。尽管ap依赖于Linux内核的数据平面进行数据包交换,但是在以太网和WiFi接口之间交换数据包的详细操作和复杂性尚未在现有的工作中进行研究。本文为填补这一研究空白做出了以下贡献。通过实证实验的宏观和微观分析,我们的研究揭示了两个不同类别的见解。首先,虽然内核的统计数据提供了对系统操作的有价值的见解,但我们确定并讨论了可能严重影响系统分析的潜在缺陷。例如,我们揭示了分组交换速率和驱动程序的实现如何影响与分组交换任务和处理器利用率相关的统计数据的意义和准确性。其次,分析了分组交换路径和核心配置对性能和功耗的影响。具体来说,我们确定了以太网到wifi和wifi到以太网数据路径在处理组件、多核利用率和能源效率方面的差异。
{"title":"Understanding Linux Kernel-Based Packet Switching on WiFi Access Points","authors":"Shiqi Zhang;Mridul Gupta;Behnam Dezfouli","doi":"10.1109/TNSM.2025.3603597","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3603597","url":null,"abstract":"As the number of WiFi devices and their traffic demands continue to rise, the need for a scalable and high-performance wireless infrastructure becomes increasingly essential. Central to this infrastructure are WiFi Access Points (APs), which facilitate packet switching between Ethernet and WiFi interfaces. Despite APs’ reliance on the Linux kernel’s data plane for packet switching, the detailed operations and complexities of switching packets between Ethernet and WiFi interfaces have not been investigated in existing works. This paper makes the following contributions towards filling this research gap. Through macro and micro-analysis of empirical experiments, our study reveals insights in two distinct categories. Firstly, while the kernel’s statistics offer valuable insights into system operations, we identify and discuss potential pitfalls that can severely affect system analysis. For instance, we reveal how packet switching rate and the implementation of drivers influence the meaning and accuracy of statistics related to packet-switching tasks and processor utilization. Secondly, we analyze the impact of the packet switching path and core configuration on performance and power consumption. Specifically, we identify the differences in Ethernet-to-WiFi and WiFi-to-Ethernet data paths regarding processing components, multi-core utilization, and energy efficiency.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"3792-3808"},"PeriodicalIF":5.4,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing VNDN With Multi-Indicator Intrusion Detection Approach Against the IFA Threat 利用多指标入侵检测方法保护VNDN免受IFA威胁
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-28 DOI: 10.1109/TNSM.2025.3603630
Wenjun Fan;Na Fan;Junhui Zhang;Jia Liu;Yifan Dai
On vehicular named data network (VNDN), Interest Flooding Attack (IFA) can exhaust the computing resources by sending a large number of malicious Interest packets, which leads to the failure of satisfying the legitimate requests and seriously hazards the operation of Internet of Vehicles (IoV). To solve this problem, this paper proposes a distributed network traffic monitoring-enabled multi-indicator detection and prevention approach for VNDN to detect and resist the IFA attacks. In order for facilitating this approach, a distributed network traffic monitoring layer based on road side unit (RSU) is constructed. With such a monitoring layer, a multi-indicator detection approach is designed, which consists of three indicators: information entropy, self-similarity, and singularity, whereby the thresholds are tweaked by the real-time density of traffic flow. Apart from the detection, a blacklisting based prevention approach is realized to mitigate the attack impact. We validate the proposed approach via prototyping it on our VNDN experimental platform using realistic parameters setting and leveraging the original NDN packet structure to corroborate the usage of the required Source ID for identifying the source of the Interest packet, which consolidates the practicability of the approach. The experimental results show that our multi-indicator detection approach has a greatly higher detection performance than those of using indicators individually, and the blacklisting-based prevention can effectively mitigate the attack impact as well.
在车载命名数据网络(VNDN)上,兴趣泛洪攻击(IFA)通过发送大量恶意兴趣报文,耗尽计算资源,导致合法请求无法得到满足,严重危害车联网的正常运行。针对这一问题,本文提出了一种基于分布式网络流量监控的VNDN多指标检测与防范方法,用于检测和抵御IFA攻击。为了便于实现该方法,构建了一个基于路旁单元(RSU)的分布式网络流量监控层。在此监控层上,设计了一种多指标检测方法,该方法由信息熵、自相似性和奇异性三个指标组成,并根据交通流的实时密度调整阈值。除了检测外,还实现了基于黑名单的防御方法,以减轻攻击的影响。我们通过在我们的VNDN实验平台上使用实际参数设置和利用原始NDN数据包结构进行原型设计来验证所提出的方法,以确认使用所需的源ID来识别兴趣数据包的来源,从而巩固了该方法的实用性。实验结果表明,我们的多指标检测方法比单独使用指标检测方法具有更高的检测性能,并且基于黑名单的防御可以有效地减轻攻击的影响。
{"title":"Securing VNDN With Multi-Indicator Intrusion Detection Approach Against the IFA Threat","authors":"Wenjun Fan;Na Fan;Junhui Zhang;Jia Liu;Yifan Dai","doi":"10.1109/TNSM.2025.3603630","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3603630","url":null,"abstract":"On vehicular named data network (VNDN), Interest Flooding Attack (IFA) can exhaust the computing resources by sending a large number of malicious Interest packets, which leads to the failure of satisfying the legitimate requests and seriously hazards the operation of Internet of Vehicles (IoV). To solve this problem, this paper proposes a distributed network traffic monitoring-enabled multi-indicator detection and prevention approach for VNDN to detect and resist the IFA attacks. In order for facilitating this approach, a distributed network traffic monitoring layer based on road side unit (RSU) is constructed. With such a monitoring layer, a multi-indicator detection approach is designed, which consists of three indicators: information entropy, self-similarity, and singularity, whereby the thresholds are tweaked by the real-time density of traffic flow. Apart from the detection, a blacklisting based prevention approach is realized to mitigate the attack impact. We validate the proposed approach via prototyping it on our VNDN experimental platform using realistic parameters setting and leveraging the original NDN packet structure to corroborate the usage of the required Source ID for identifying the source of the Interest packet, which consolidates the practicability of the approach. The experimental results show that our multi-indicator detection approach has a greatly higher detection performance than those of using indicators individually, and the blacklisting-based prevention can effectively mitigate the attack impact as well.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6097-6111"},"PeriodicalIF":5.4,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RLpatch: A Robust Low-Overhead Website Fingerprinting Defense Method Based on Reinforcement Learning Within Sensitive Regions RLpatch:一种基于敏感区域强化学习的鲁棒低开销网站指纹防御方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-26 DOI: 10.1109/TNSM.2025.3602964
Shuangwu Chen;Siyang Chen;Yuxing Wei;Dong Jin;Xiaobin Tan;Xiaofeng Jiang;Jian Yang
Website Fingerprinting (WF) attacks have posed a serious threat to the anonymity of the onion router (Tor) communication system, as attackers can passively pry into the encrypted traffic and infer the website visited by users. To defend against WF, recent studies focus on adversarial perturbations. However, most of them suffer from a high bandwidth overhead and a low defense performance. To address this problem, our basic idea is to generate perturbation only on the sensitive regions, which can effectively mask the website’s fingerprint, thus misleading the WF attack models and reducing the bandwidth overhead. In this paper, we formulate a joint optimization problem of perturbation position and magnitude by confining the perturbations within sensitive regions, which is rarely considered in the literature. We propose a robust low-overhead WF defense method based on reinforcement learning (RL), named RLpatch. RLpatch identifies the common sensitive regions of various surrogate models and adjusts perturbation according to the query result from a query WF model. It further employs the positional frequency of perturbations to generate a common perturbation paradigm for different traces of a same website. Experimental results show that RLpatch achieves higher defense performance, lower bandwidth overhead and better robustness against adversarial training compared to the state-of-the-art methods.
网站指纹(Website Fingerprinting, WF)攻击对洋葱路由器(Tor)通信系统的匿名性构成了严重威胁,攻击者可以被动地窥探加密流量,推断出用户访问的网站。为了防御WF,最近的研究集中在对抗性扰动上。但是,它们大多存在带宽开销大、防御性能低的问题。为了解决这个问题,我们的基本思路是只在敏感区域产生扰动,这样可以有效地掩盖网站的指纹,从而误导WF攻击模型,减少带宽开销。本文通过将微扰限制在敏感区域内,构造了一个微扰位置和大小的联合优化问题,这是文献中很少考虑的问题。我们提出了一种基于强化学习(RL)的鲁棒低开销WF防御方法,称为RLpatch。RLpatch识别各种代理模型的共同敏感区域,并根据查询WF模型的查询结果调整扰动。它进一步采用扰动的位置频率来为同一网站的不同轨迹生成共同的扰动范式。实验结果表明,与现有方法相比,RLpatch具有更高的防御性能、更低的带宽开销和更好的对抗性训练鲁棒性。
{"title":"RLpatch: A Robust Low-Overhead Website Fingerprinting Defense Method Based on Reinforcement Learning Within Sensitive Regions","authors":"Shuangwu Chen;Siyang Chen;Yuxing Wei;Dong Jin;Xiaobin Tan;Xiaofeng Jiang;Jian Yang","doi":"10.1109/TNSM.2025.3602964","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3602964","url":null,"abstract":"Website Fingerprinting (WF) attacks have posed a serious threat to the anonymity of the onion router (Tor) communication system, as attackers can passively pry into the encrypted traffic and infer the website visited by users. To defend against WF, recent studies focus on adversarial perturbations. However, most of them suffer from a high bandwidth overhead and a low defense performance. To address this problem, our basic idea is to generate perturbation only on the sensitive regions, which can effectively mask the website’s fingerprint, thus misleading the WF attack models and reducing the bandwidth overhead. In this paper, we formulate a joint optimization problem of perturbation position and magnitude by confining the perturbations within sensitive regions, which is rarely considered in the literature. We propose a robust low-overhead WF defense method based on reinforcement learning (RL), named RLpatch. RLpatch identifies the common sensitive regions of various surrogate models and adjusts perturbation according to the query result from a query WF model. It further employs the positional frequency of perturbations to generate a common perturbation paradigm for different traces of a same website. Experimental results show that RLpatch achieves higher defense performance, lower bandwidth overhead and better robustness against adversarial training compared to the state-of-the-art methods.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6066-6082"},"PeriodicalIF":5.4,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Top-k Multi-Armed Bandit Learning for Content Dissemination in Swarms of Micro-UAVs 基于Top-k多臂强盗学习的微无人机群内容传播
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-25 DOI: 10.1109/TNSM.2025.3602646
Amit Kumar Bhuyan;Hrishikesh Dutta;Subir Biswas
This paper presents a Micro-Unmanned Aerial Vehicle (UAV)-enhanced content management system for disaster scenarios where communication infrastructure is generally compromised. Utilizing a hybrid network of stationary and mobile Micro-UAVs, this system aims to provide crucial content access to isolated communities. In the developed architecture, stationary anchor UAVs, equipped with vertical and lateral links, serve users in individual disaster-affected communities. and mobile micro-ferrying UAVs, with enhanced mobility, extend coverage across multiple such communities. The primary goal is to devise a content dissemination system that dynamically learns caching policies to maximize content accessibility to users left without communication infrastructure. The core contribution is an adaptive content dissemination framework that employs a decentralized Top-k Multi-Armed Bandit learning approach for efficient UAV caching decisions. This approach accounts for geo-temporal variations in content popularity and diverse user demands. Additionally, a Selective Caching Algorithm is proposed to minimize redundant content copies by leveraging inter-UAV information sharing. Through functional verification and performance evaluation, the proposed framework demonstrates improved system performance and adaptability across varying network sizes, micro-UAV swarms, and content popularity distributions.
本文提出了一种基于微型无人机(UAV)的内容管理系统,用于通信基础设施普遍受损的灾难场景。该系统利用固定和移动微型无人机的混合网络,旨在为偏远社区提供关键内容访问。在已开发的架构中,固定式锚定无人机配备了垂直和横向链接,为个别受灾社区的用户提供服务。以及机动性增强的移动微型轮渡无人机,将覆盖范围扩大到多个此类社区。主要目标是设计一个动态学习缓存策略的内容传播系统,以最大限度地提高对没有通信基础设施的用户的内容可访问性。核心贡献是自适应内容传播框架,该框架采用分散的Top-k Multi-Armed Bandit学习方法,用于高效的无人机缓存决策。这种方法考虑了内容受欢迎程度和不同用户需求的地理时间变化。此外,提出了一种利用无人机间信息共享最小化冗余内容副本的选择性缓存算法。通过功能验证和性能评估,提出的框架证明了改进的系统性能和适应不同网络规模、微型无人机群和内容流行分布的能力。
{"title":"Top-k Multi-Armed Bandit Learning for Content Dissemination in Swarms of Micro-UAVs","authors":"Amit Kumar Bhuyan;Hrishikesh Dutta;Subir Biswas","doi":"10.1109/TNSM.2025.3602646","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3602646","url":null,"abstract":"This paper presents a Micro-Unmanned Aerial Vehicle (UAV)-enhanced content management system for disaster scenarios where communication infrastructure is generally compromised. Utilizing a hybrid network of stationary and mobile Micro-UAVs, this system aims to provide crucial content access to isolated communities. In the developed architecture, stationary anchor UAVs, equipped with vertical and lateral links, serve users in individual disaster-affected communities. and mobile micro-ferrying UAVs, with enhanced mobility, extend coverage across multiple such communities. The primary goal is to devise a content dissemination system that dynamically learns caching policies to maximize content accessibility to users left without communication infrastructure. The core contribution is an adaptive content dissemination framework that employs a decentralized Top-k Multi-Armed Bandit learning approach for efficient UAV caching decisions. This approach accounts for geo-temporal variations in content popularity and diverse user demands. Additionally, a Selective Caching Algorithm is proposed to minimize redundant content copies by leveraging inter-UAV information sharing. Through functional verification and performance evaluation, the proposed framework demonstrates improved system performance and adaptability across varying network sizes, micro-UAV swarms, and content popularity distributions.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6229-6244"},"PeriodicalIF":5.4,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11141493","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Urban Mobile Data Prediction With Geospatial Clustering and Dual Residual Learning 基于地理空间聚类和双残差学习的城市移动数据预测
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-18 DOI: 10.1109/TNSM.2025.3599168
Huigyu Yang;Jeongjun Park;Syed M. Raza;Moonseong Kim;Min Young Chung;Hyunseung Choo
The mobile network traffic patterns in urban areas significantly diverge depending on commercial and residential establishments. These regional traffic patterns provide crucial clues for predicting traffic patterns precisely. Previous studies have employed a combination of time-series and convolutional Deep Learning (DL) models to effectively capture the correlation of the regional features and traffic patterns. Despite promising results, these approaches are limited in identifying pattern similarities among sparsely located regions and can be further improved. To this end, this study proposes a GEospatial clustering and residual Convolutional temporal long Short-term memory (GECOS) framework consisting of clustering and DL components. The proposed Urbanflow Peak Clustering (UPC) component exploits the peak traffic times of daily mobile data to obtain the groups of cells with similar traffic patterns apart from their geographical diversity. The UPC improves the scalability of existing algorithms and enables DL components to improve their accuracy by recognizing unique regional patterns and localizing the training targets. The proposed Residual Convolutional TCN-LSTM (RCTL) serves as the DL component of GECOS that improves TCN-LSTM structure through layer-wise feature transfer and enhances long-term dependency learnability. The RCTL ensures more accurate capturing of extensive spatiotemporal features through structural enhancements. The experiments conducted on real-world mobile traffic data showcase 43% improvement by GECOS compared to state-of-the-art models, enabling precise traffic engineering policies by operators.
城市地区的移动网络流量模式因商业和住宅设施的不同而有很大差异。这些区域交通模式为精确预测交通模式提供了重要线索。以前的研究采用时间序列和卷积深度学习(DL)模型相结合的方法来有效地捕获区域特征和交通模式之间的相关性。尽管取得了令人鼓舞的结果,但这些方法在识别稀疏区域之间的模式相似性方面受到限制,并且可以进一步改进。为此,本研究提出了一个由聚类和深度学习组成的地理空间聚类和残差卷积时间长短期记忆(GECOS)框架。所提出的城市流量峰值聚类(UPC)组件利用每日移动数据的高峰交通时间来获得具有相似交通模式的单元群,而不考虑其地理多样性。UPC提高了现有算法的可扩展性,并使深度学习组件能够通过识别独特的区域模式和定位训练目标来提高其准确性。残差卷积TCN-LSTM (RCTL)作为GECOS的DL组件,通过分层特征转移改善TCN-LSTM结构,提高长期依赖可学习性。RCTL通过结构增强确保更准确地捕获广泛的时空特征。在实际移动交通数据上进行的实验表明,与最先进的模型相比,GECOS提高了43%,使运营商能够制定精确的交通工程政策。
{"title":"Urban Mobile Data Prediction With Geospatial Clustering and Dual Residual Learning","authors":"Huigyu Yang;Jeongjun Park;Syed M. Raza;Moonseong Kim;Min Young Chung;Hyunseung Choo","doi":"10.1109/TNSM.2025.3599168","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3599168","url":null,"abstract":"The mobile network traffic patterns in urban areas significantly diverge depending on commercial and residential establishments. These regional traffic patterns provide crucial clues for predicting traffic patterns precisely. Previous studies have employed a combination of time-series and convolutional Deep Learning (DL) models to effectively capture the correlation of the regional features and traffic patterns. Despite promising results, these approaches are limited in identifying pattern similarities among sparsely located regions and can be further improved. To this end, this study proposes a GEospatial clustering and residual Convolutional temporal long Short-term memory (GECOS) framework consisting of clustering and DL components. The proposed Urbanflow Peak Clustering (UPC) component exploits the peak traffic times of daily mobile data to obtain the groups of cells with similar traffic patterns apart from their geographical diversity. The UPC improves the scalability of existing algorithms and enables DL components to improve their accuracy by recognizing unique regional patterns and localizing the training targets. The proposed Residual Convolutional TCN-LSTM (RCTL) serves as the DL component of GECOS that improves TCN-LSTM structure through layer-wise feature transfer and enhances long-term dependency learnability. The RCTL ensures more accurate capturing of extensive spatiotemporal features through structural enhancements. The experiments conducted on real-world mobile traffic data showcase 43% improvement by GECOS compared to state-of-the-art models, enabling precise traffic engineering policies by operators.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 6","pages":"6260-6273"},"PeriodicalIF":5.4,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145665789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A GNN-Based Autopilot Recommendation Strategy to Mitigate Payment Channel Imbalance Problem in Bitcoin Lightning Network 基于gnn的自动驾驶推荐策略缓解比特币闪电网络支付通道不平衡问题
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-18 DOI: 10.1109/TNSM.2025.3599393
Mohammad Saleh Mahdizadeh;Behnam Bahrak;Mohammad Sayad Haghighi
The Bitcoin Lightning Network, as a second-layer solution for enhancing the scalability of Bitcoin transactions, facilitates transactions through payment channels between nodes. However, the rapid growth of the network and rising transaction volumes have exacerbated the challenge of managing payment channel imbalances. Payment channel imbalance, characterized by the concentration of liquidity in one direction, leads to a decrease in payment success rates, a reduction in the effective lifespan of payment channels, and a decline in the network’s overall efficiency and throughput. This study introduces a graph neural network-based recommendation strategy designed to enhance the Lightning Network’s autopilot system. The proposed approach proactively mitigates channel imbalances by optimizing channel recommendations, enabling dynamic and scalable liquidity management for network users. Simulations conducted using the CLoTH tool demonstrate a 45% increase in payment success rates, a 46% reduction in imbalanced channels, and a 14% increase in the lifespan of payment channels across the network compared to the existing autopilot recommendation strategies, and when compared with the commonly adopted circular rebalancing method, the proposed strategy achieves a 27% improvement in payment success rates. Additionally, we offer a comparative topological analysis between two snapshots of the LN, taken in November 2021 and August 2023, to facilitate unsupervised learning tasks. The results highlight an increase in network centralization alongside a decrease in the network size, emphasizing the growing need for decentralization strategies in the LN, such as the one proposed in this study.
比特币闪电网络作为增强比特币交易可扩展性的第二层解决方案,通过节点之间的支付通道促进交易。然而,网络的快速增长和交易量的上升加剧了管理支付渠道失衡的挑战。支付通道不平衡以流动性向一个方向集中为特征,导致支付成功率下降,支付通道有效寿命缩短,网络整体效率和吞吐量下降。本研究介绍了一种基于图神经网络的推荐策略,旨在增强闪电网络的自动驾驶系统。所提出的方法通过优化渠道建议,主动减轻渠道不平衡,为网络用户提供动态和可扩展的流动性管理。使用CLoTH工具进行的模拟表明,与现有的自动驾驶推荐策略相比,支付成功率提高了45%,不平衡渠道减少了46%,整个网络的支付渠道寿命延长了14%,与通常采用的循环再平衡方法相比,所提出的策略在支付成功率方面提高了27%。此外,我们提供了2021年11月和2023年8月拍摄的两个LN快照之间的比较拓扑分析,以促进无监督学习任务。结果突出了网络集中化的增加以及网络规模的减少,强调了LN中对去中心化策略的需求日益增长,例如本研究中提出的策略。
{"title":"A GNN-Based Autopilot Recommendation Strategy to Mitigate Payment Channel Imbalance Problem in Bitcoin Lightning Network","authors":"Mohammad Saleh Mahdizadeh;Behnam Bahrak;Mohammad Sayad Haghighi","doi":"10.1109/TNSM.2025.3599393","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3599393","url":null,"abstract":"The Bitcoin Lightning Network, as a second-layer solution for enhancing the scalability of Bitcoin transactions, facilitates transactions through payment channels between nodes. However, the rapid growth of the network and rising transaction volumes have exacerbated the challenge of managing payment channel imbalances. Payment channel imbalance, characterized by the concentration of liquidity in one direction, leads to a decrease in payment success rates, a reduction in the effective lifespan of payment channels, and a decline in the network’s overall efficiency and throughput. This study introduces a graph neural network-based recommendation strategy designed to enhance the Lightning Network’s autopilot system. The proposed approach proactively mitigates channel imbalances by optimizing channel recommendations, enabling dynamic and scalable liquidity management for network users. Simulations conducted using the CLoTH tool demonstrate a 45% increase in payment success rates, a 46% reduction in imbalanced channels, and a 14% increase in the lifespan of payment channels across the network compared to the existing autopilot recommendation strategies, and when compared with the commonly adopted circular rebalancing method, the proposed strategy achieves a 27% improvement in payment success rates. Additionally, we offer a comparative topological analysis between two snapshots of the LN, taken in November 2021 and August 2023, to facilitate unsupervised learning tasks. The results highlight an increase in network centralization alongside a decrease in the network size, emphasizing the growing need for decentralization strategies in the LN, such as the one proposed in this study.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1863-1873"},"PeriodicalIF":5.4,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1