首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
Coexistence of Hybrid VLC-RF and Wi-Fi for Indoor Wireless Communication Systems: An Intelligent Approach 室内无线通信系统中混合 VLC-RF 和 Wi-Fi 的共存:一种智能方法
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1109/TNSM.2024.3436887
Yuhan Su;Yuchen Lin;Sicong Liu;Minghui Liwang;Xinqin Liao;Tingzhu Wu;Zhong Chen;Xianbin Wang
Given the exponential surge in data traffic and the proliferation of connected smart devices, traditional radio frequency (RF)-based wireless communication systems have to confront mounting challenges of spectrum scarcity and access congestion, particularly for networks operated in low-frequency bands. Visible light communication (VLC) technology has emerged as a promising solution, but it has own limitations, including coverage constraints and limited uplink capability, necessitating hybrid systems that leverage VLC and RF. This paper focuses on an indoor hybrid VLC-RF system extending VLC to Wi-Fi’s public spectrum, enabling VLC’s uplink via RF while enhancing system capacity. Yet, integrating VLC-RF with Wi-Fi introduces new challenges due to the coexistence of VLC-RF with existing Wi-Fi systems. To address these challenges, we propose an intelligent coexistence approach, dynamically adjusts duty cycles to ensure fairness and performance optimization between VLC-RF and Wi-Fi. Moreover, a spectrum multiplexing algorithm is introduced in the coexistence approach to enable the hybrid VLC-RF system’s multiplexing transmission on public spectrum, while preserving Wi-Fi system transmission integrity without interference, thereby further optimizing resource utilization. Extensive simulations on a meticulously constructed system-level platform validate our approach, showcasing its efficacy in enhancing system performance while maintaining equitable transmission between hybrid VLC-RF and Wi-Fi systems.
鉴于数据流量的指数级增长和连接的智能设备的激增,传统的基于射频(RF)的无线通信系统不得不面对频谱稀缺和接入拥塞的日益严峻的挑战,特别是对于在低频段运行的网络。可见光通信(VLC)技术已经成为一种很有前途的解决方案,但它有自己的局限性,包括覆盖限制和有限的上行能力,需要利用VLC和RF的混合系统。本文重点研究了一种室内混合VLC-RF系统,将VLC扩展到Wi-Fi的公共频谱,使VLC通过RF上行,同时增强系统容量。然而,由于VLC-RF与现有Wi-Fi系统共存,将VLC-RF与Wi-Fi集成会带来新的挑战。为了应对这些挑战,我们提出了一种智能共存方法,动态调整占空比,以确保VLC-RF和Wi-Fi之间的公平性和性能优化。此外,在共存方法中引入了频谱复用算法,使混合VLC-RF系统在公共频谱上复用传输,同时保持Wi-Fi系统传输完整性而不受干扰,进一步优化资源利用率。在精心构建的系统级平台上进行的大量模拟验证了我们的方法,展示了其在提高系统性能的同时保持混合VLC-RF和Wi-Fi系统之间公平传输的有效性。
{"title":"Coexistence of Hybrid VLC-RF and Wi-Fi for Indoor Wireless Communication Systems: An Intelligent Approach","authors":"Yuhan Su;Yuchen Lin;Sicong Liu;Minghui Liwang;Xinqin Liao;Tingzhu Wu;Zhong Chen;Xianbin Wang","doi":"10.1109/TNSM.2024.3436887","DOIUrl":"10.1109/TNSM.2024.3436887","url":null,"abstract":"Given the exponential surge in data traffic and the proliferation of connected smart devices, traditional radio frequency (RF)-based wireless communication systems have to confront mounting challenges of spectrum scarcity and access congestion, particularly for networks operated in low-frequency bands. Visible light communication (VLC) technology has emerged as a promising solution, but it has own limitations, including coverage constraints and limited uplink capability, necessitating hybrid systems that leverage VLC and RF. This paper focuses on an indoor hybrid VLC-RF system extending VLC to Wi-Fi’s public spectrum, enabling VLC’s uplink via RF while enhancing system capacity. Yet, integrating VLC-RF with Wi-Fi introduces new challenges due to the coexistence of VLC-RF with existing Wi-Fi systems. To address these challenges, we propose an intelligent coexistence approach, dynamically adjusts duty cycles to ensure fairness and performance optimization between VLC-RF and Wi-Fi. Moreover, a spectrum multiplexing algorithm is introduced in the coexistence approach to enable the hybrid VLC-RF system’s multiplexing transmission on public spectrum, while preserving Wi-Fi system transmission integrity without interference, thereby further optimizing resource utilization. Extensive simulations on a meticulously constructed system-level platform validate our approach, showcasing its efficacy in enhancing system performance while maintaining equitable transmission between hybrid VLC-RF and Wi-Fi systems.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6465-6479"},"PeriodicalIF":4.7,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141887054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalizable 5G RAN/MEC Slicing and Admission Control for Reliable Network Operation 可通用的 5G RAN/MEC 分片和接入控制,实现可靠的网络运行
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1109/TNSM.2024.3437217
Mahdieh Ahmadi;Arash Moayyedi;Muhammad Sulaiman;Mohammad A. Salahuddin;Raouf Boutaba;Aladdin Saleh
The virtualization and distribution of 5G Radio Access Network (RAN) functions across radio unit (RU), distributed unit (DU), and centralized unit (CU) in conjunction with multi-access edge computing (MEC) enable the creation of network slices tailored for various applications with distinct quality of service (QoS) demands. Nonetheless, given the dynamic nature of slice requests and limited network resources, optimizing long-term revenue for infrastructure providers (InPs) through real-time admission and embedding of slice requests poses a significant challenge. Prior works have employed Deep Reinforcement Learning (DRL) to address this issue, but these approaches require re-training with the slightest topology changes due to node/link failure or overlook the joint consideration of slice admission and embedding problems. This paper proposes a novel method, utilizing multi-agent DRL and Graph Attention Networks (GATs), to overcome these limitations. Specifically, we develop topology-independent admission and slicing agents that are scalable and generalizable across diverse metropolitan networks. Results demonstrate substantial revenue gains-up to 35.2% compared to heuristics and 19.5% when compared to other DRL-based methods. Moreover, our approach showcases robust performance in different network failure scenarios and substrate networks not seen during training without the need for re-training or re-tuning. Additionally, we bring interpretability by analyzing attention maps, which enables InPs to identify network bottlenecks, increase capacity at critical nodes, and gain a clear understanding of the model decision-making process.
5G 无线接入网(RAN)功能在无线单元(RU)、分布式单元(DU)和集中式单元(CU)之间的虚拟化和分布与多接入边缘计算(MEC)相结合,能够为具有不同服务质量(QoS)需求的各种应用创建量身定制的网络切片。然而,考虑到切片请求的动态性和有限的网络资源,通过实时接纳和嵌入切片请求来优化基础设施提供商(InPs)的长期收入是一项重大挑战。之前的研究采用了深度强化学习(DRL)来解决这一问题,但这些方法需要在节点/链路故障导致拓扑发生细微变化时重新训练,或者忽略了切片接纳和嵌入问题的共同考虑。本文提出了一种利用多代理 DRL 和图注意网络 (GAT) 的新方法,以克服这些局限性。具体来说,我们开发了与拓扑无关的接入和分片代理,这些代理可在不同的城域网中扩展和通用。结果表明,与启发式方法相比,我们获得了高达 35.2% 的收入收益,与其他基于 DRL 的方法相比,我们获得了 19.5% 的收入收益。此外,我们的方法在不同的网络故障场景和训练过程中未见的基质网络中都表现出了强大的性能,无需重新训练或调整。此外,我们还通过分析注意力图带来了可解释性,这使 InPs 能够识别网络瓶颈,提高关键节点的容量,并清楚地了解模型的决策过程。
{"title":"Generalizable 5G RAN/MEC Slicing and Admission Control for Reliable Network Operation","authors":"Mahdieh Ahmadi;Arash Moayyedi;Muhammad Sulaiman;Mohammad A. Salahuddin;Raouf Boutaba;Aladdin Saleh","doi":"10.1109/TNSM.2024.3437217","DOIUrl":"10.1109/TNSM.2024.3437217","url":null,"abstract":"The virtualization and distribution of 5G Radio Access Network (RAN) functions across radio unit (RU), distributed unit (DU), and centralized unit (CU) in conjunction with multi-access edge computing (MEC) enable the creation of network slices tailored for various applications with distinct quality of service (QoS) demands. Nonetheless, given the dynamic nature of slice requests and limited network resources, optimizing long-term revenue for infrastructure providers (InPs) through real-time admission and embedding of slice requests poses a significant challenge. Prior works have employed Deep Reinforcement Learning (DRL) to address this issue, but these approaches require re-training with the slightest topology changes due to node/link failure or overlook the joint consideration of slice admission and embedding problems. This paper proposes a novel method, utilizing multi-agent DRL and Graph Attention Networks (GATs), to overcome these limitations. Specifically, we develop topology-independent admission and slicing agents that are scalable and generalizable across diverse metropolitan networks. Results demonstrate substantial revenue gains-up to 35.2% compared to heuristics and 19.5% when compared to other DRL-based methods. Moreover, our approach showcases robust performance in different network failure scenarios and substrate networks not seen during training without the need for re-training or re-tuning. Additionally, we bring interpretability by analyzing attention maps, which enables InPs to identify network bottlenecks, increase capacity at critical nodes, and gain a clear understanding of the model decision-making process.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5384-5399"},"PeriodicalIF":4.7,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141880559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-Employed Intelligent Approach to Identify Injured Soldier on Blockchain-Integrated Internet of Battlefield Things 无人机采用智能方法在区块链整合的战场物联网上识别受伤士兵
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1109/TNSM.2024.3436674
Md. Masuduzzaman;Tariq Rahim;Anik Islam;Soo Young Shin
This study proposes an intelligent approach to identifying an injured soldier on blockchain-integrated Internet-of-Battlefield Things (IoBT) employing unmanned aerial vehicles (UAVs). The intelligent approach combines a unique deep learning (DL) model with a smartwatch-based heart-rate (HR) data collection technique. Different activation functions (i.e., MISH and Leaky rectified linear unit) are used in the proposed DL model to enhance the identification task by extracting the in-depth features from the images. Furthermore, a smart-watch-based HR data analyzing technique is introduced to confirm the injury of a soldier. However, due to the UAV’s low battery capacity, the identification task is offloaded to the neighboring edge computing server to improve system performance. Moreover, to restrict the access of registered IoT devices (e.g., UAV, smartwatch, etc.) and protect the sensitive data leakage on IoBT, a blockchain-integrated access control (ACL) mechanism is utilized. Detailed experimental results are provided for the proposed DL model that outperforms existing DL models. Besides, implementing a smartwatch-based HR data analysis technique for the soldiers improves the outcome of the proposed DL model. To provide a fine-grained data protection mechanism in the proposed system, a private blockchain-based ACL management policy is constructed utilizing hyperledger, and various assessment metrics have been scrutinized.
本研究提出了一种在区块链集成的战场物联网(IoBT)上识别受伤士兵的智能方法,该方法采用了无人驾驶飞行器(UAV)。该智能方法将独特的深度学习(DL)模型与基于智能手表的心率(HR)数据收集技术相结合。在所提出的深度学习模型中使用了不同的激活函数(即 MISH 和 Leaky 整流线性单元),通过从图像中提取深度特征来增强识别任务。此外,还引入了基于智能手表的心率数据分析技术来确认士兵的伤情。然而,由于无人机的电池容量较低,识别任务被卸载到邻近的边缘计算服务器,以提高系统性能。此外,为了限制已注册物联网设备(如无人机、智能手表等)的访问,保护 IoBT 上敏感数据的泄漏,利用了区块链集成访问控制(ACL)机制。详细的实验结果表明,所提出的 DL 模型优于现有的 DL 模型。此外,为士兵实施基于智能手表的人力资源数据分析技术也改善了所提出的 DL 模型的结果。为了在拟议系统中提供细粒度的数据保护机制,利用超级账本构建了基于私有区块链的 ACL 管理策略,并仔细研究了各种评估指标。
{"title":"UAV-Employed Intelligent Approach to Identify Injured Soldier on Blockchain-Integrated Internet of Battlefield Things","authors":"Md. Masuduzzaman;Tariq Rahim;Anik Islam;Soo Young Shin","doi":"10.1109/TNSM.2024.3436674","DOIUrl":"10.1109/TNSM.2024.3436674","url":null,"abstract":"This study proposes an intelligent approach to identifying an injured soldier on blockchain-integrated Internet-of-Battlefield Things (IoBT) employing unmanned aerial vehicles (UAVs). The intelligent approach combines a unique deep learning (DL) model with a smartwatch-based heart-rate (HR) data collection technique. Different activation functions (i.e., MISH and Leaky rectified linear unit) are used in the proposed DL model to enhance the identification task by extracting the in-depth features from the images. Furthermore, a smart-watch-based HR data analyzing technique is introduced to confirm the injury of a soldier. However, due to the UAV’s low battery capacity, the identification task is offloaded to the neighboring edge computing server to improve system performance. Moreover, to restrict the access of registered IoT devices (e.g., UAV, smartwatch, etc.) and protect the sensitive data leakage on IoBT, a blockchain-integrated access control (ACL) mechanism is utilized. Detailed experimental results are provided for the proposed DL model that outperforms existing DL models. Besides, implementing a smartwatch-based HR data analysis technique for the soldiers improves the outcome of the proposed DL model. To provide a fine-grained data protection mechanism in the proposed system, a private blockchain-based ACL management policy is constructed utilizing hyperledger, and various assessment metrics have been scrutinized.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5197-5214"},"PeriodicalIF":4.7,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141880635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Replica Transfer Optimization Schemes in Geographically Distributed Data Centers 地理分布式数据中心中的副本传输优化方案概览
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1109/TNSM.2024.3437165
Bita Fatemipour;Zhe Zhang;Marc St-Hilaire
Data centers have undergone significant expansions in recent years, as cloud service providers seek to improve the quality of service and reduce operational costs. Cloud providers are investing heavily in inter-data center wide-area networks, which help to transport traffic between geographically distributed data centers. However, efficient workload management in complex large-scale networks with a dynamic environment is challenging. In this regard, researchers have developed various solutions to address different challenges for data transfer in inter-data center networks. In this paper, we present a comprehensive review of recent strategies and optimization schemes proposed in the literature to optimize data transfer in geographically distributed data centers. This review paper examines the challenges of data delivery and classifies recent existing solutions for addressing the issues based on communication patterns, objectives, proposed communication frameworks, and evaluation methods. In this study, we provide valuable insights into the current challenges and identify several promising research directions that require significant research endeavors in the future. The findings of this study are useful for researchers and practitioners interested in optimizing data transfer in inter-data center networks.
近年来,随着云服务提供商寻求提高服务质量和降低运营成本,数据中心经历了重大扩展。云提供商正在大力投资于数据中心间的广域网,这有助于在地理分布的数据中心之间传输流量。然而,在具有动态环境的复杂大型网络中,高效的工作负载管理是一个挑战。在这方面,研究人员已经开发了各种解决方案来解决数据中心间网络中数据传输的不同挑战。在本文中,我们全面回顾了文献中提出的优化地理分布数据中心数据传输的最新策略和优化方案。这篇综述研究了数据交付的挑战,并根据通信模式、目标、拟议的通信框架和评估方法,对解决问题的最新现有解决方案进行了分类。在本研究中,我们对当前的挑战提供了有价值的见解,并确定了几个有前途的研究方向,这些方向需要在未来进行重大的研究努力。本研究的结果对研究优化数据中心间网络数据传输的研究人员和实践者很有帮助。
{"title":"A Survey on Replica Transfer Optimization Schemes in Geographically Distributed Data Centers","authors":"Bita Fatemipour;Zhe Zhang;Marc St-Hilaire","doi":"10.1109/TNSM.2024.3437165","DOIUrl":"10.1109/TNSM.2024.3437165","url":null,"abstract":"Data centers have undergone significant expansions in recent years, as cloud service providers seek to improve the quality of service and reduce operational costs. Cloud providers are investing heavily in inter-data center wide-area networks, which help to transport traffic between geographically distributed data centers. However, efficient workload management in complex large-scale networks with a dynamic environment is challenging. In this regard, researchers have developed various solutions to address different challenges for data transfer in inter-data center networks. In this paper, we present a comprehensive review of recent strategies and optimization schemes proposed in the literature to optimize data transfer in geographically distributed data centers. This review paper examines the challenges of data delivery and classifies recent existing solutions for addressing the issues based on communication patterns, objectives, proposed communication frameworks, and evaluation methods. In this study, we provide valuable insights into the current challenges and identify several promising research directions that require significant research endeavors in the future. The findings of this study are useful for researchers and practitioners interested in optimizing data transfer in inter-data center networks.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6301-6317"},"PeriodicalIF":4.7,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141880636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Malicious Domains With Concept Drift Using Ensemble Learning 利用集合学习检测概念漂移的恶意域
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-01 DOI: 10.1109/TNSM.2024.3435516
Pin-Hsuan Chiang;Shi-Chun Tsai
In the current landscape of network technology, it is indisputable that the Domain Name System (DNS) plays a vital role but also encounters significant security challenges. Despite the potential of recent advancements in deep learning and machine learning, concept drift is often not addressed. In this work, we designed a DNS anomaly detection system leveraging client-domain associations. We propose the Modified Deterministic Sampling Classifier with weighted Bagging (MDSCB) method, a chunk-based ensemble learning approach addressing concept drift and data imbalance. It integrates weighted bagging, resampling, random feature selection, and a retention strategy for classifier updates, enhancing adaptability and efficiency. We conducted experiments using multiple real-world and synthetic datasets for evaluation. Empirical studies show that our detection system can help identify malicious domains that are difficult for firewalls to detect timely. Moreover, MDSCB outperforms other methods in terms of performance and efficiency.
在当前的网络技术格局中,域名系统(DNS)发挥着不可否认的重要作用,但也面临着重大的安全挑战。尽管最近在深度学习和机器学习方面取得了进展,但概念漂移往往没有得到解决。在这项工作中,我们设计了一个利用客户端-域关联的DNS异常检测系统。我们提出了一种基于块的集成学习方法——基于加权Bagging的改进确定性采样分类器(MDSCB)方法,以解决概念漂移和数据不平衡问题。它集成了加权装袋、重采样、随机特征选择和分类器更新的保留策略,增强了适应性和效率。我们使用多个真实世界和合成数据集进行实验进行评估。实证研究表明,我们的检测系统可以帮助识别防火墙难以及时检测的恶意域。此外,MDSCB在性能和效率方面优于其他方法。
{"title":"Detection of Malicious Domains With Concept Drift Using Ensemble Learning","authors":"Pin-Hsuan Chiang;Shi-Chun Tsai","doi":"10.1109/TNSM.2024.3435516","DOIUrl":"10.1109/TNSM.2024.3435516","url":null,"abstract":"In the current landscape of network technology, it is indisputable that the Domain Name System (DNS) plays a vital role but also encounters significant security challenges. Despite the potential of recent advancements in deep learning and machine learning, concept drift is often not addressed. In this work, we designed a DNS anomaly detection system leveraging client-domain associations. We propose the Modified Deterministic Sampling Classifier with weighted Bagging (MDSCB) method, a chunk-based ensemble learning approach addressing concept drift and data imbalance. It integrates weighted bagging, resampling, random feature selection, and a retention strategy for classifier updates, enhancing adaptability and efficiency. We conducted experiments using multiple real-world and synthetic datasets for evaluation. Empirical studies show that our detection system can help identify malicious domains that are difficult for firewalls to detect timely. Moreover, MDSCB outperforms other methods in terms of performance and efficiency.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6796-6809"},"PeriodicalIF":4.7,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141880637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient and Fast Block Transmission System for Scalable Hyperledger Fabric Blockchain in Multi-Cloud Environments 多云环境中可扩展 Hyperledger Fabric 区块链的弹性快速区块传输系统
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-31 DOI: 10.1109/TNSM.2024.3436049
Hyunmin Noh;Seunggyu Ji;Yunmin Go;Gi Seok Park;Hwangjun Song
In this paper, we propose a resilient and fast block transmission system for Hyperledger Fabric in multi-cloud environments. The goal of the proposed system is to improve the scalability, transaction throughput, and resilience of Hyperledger Fabric by minimizing the block synchronization time among nodes. To achieve this goal, the proposed system is designed to deliver blocks quickly and reliably to all the participating nodes in time-varying multi-cloud environments. The proposed system includes the delay estimating process with O(N) control message overhead over the P2P network, the effective bandwidth estimating process for block transmission, the Gaussian Mixture Model-based clustering and cluster leader selecting process, and hybrid P2P multicast tree constructing process. In addition, a control message format and delivery process are proposed to efficiently provide hybrid P2P multicast tree and neighbor nodes information to all the participating nodes. And we propose a pull-based local block loss recovery process that can receive lost blocks from multi-node without complicated scheduling using a rateless code. The proposed system is fully implemented by using well-known open sources (e.g., Hyperledger Fabric, Docker, Containernet, and Mininet) and Go/C/Python. Experiment results show that the proposed system can reduce the maximum block arriving time among all the participating nodes by approximately 50%~95% compared to the existing algorithms. This improves not only blockchain transaction per second, but also resilience to various network-layer vulnerabilities and attacks that may occur when the block propagation delay increases.
在本文中,我们为多云环境中的 Hyperledger Fabric 提出了一种弹性、快速的区块传输系统。该系统的目标是通过最大限度地减少节点间的区块同步时间,提高 Hyperledger Fabric 的可扩展性、交易吞吐量和弹性。为实现这一目标,所提出的系统旨在向时变多云环境中的所有参与节点快速、可靠地交付区块。所提出的系统包括在 P2P 网络上具有 O(N) 控制信息开销的延迟估计过程、区块传输的有效带宽估计过程、基于高斯混合模型的聚类和聚类领导者选择过程,以及混合 P2P 多播树构建过程。此外,我们还提出了一种控制信息格式和传送过程,以有效地向所有参与节点提供混合 P2P 组播树和邻居节点信息。我们还提出了一种基于拉动的本地块丢失恢复流程,它可以使用无鼠形码接收来自多节点的丢失块,而无需复杂的调度。我们利用知名的开放源代码(如 Hyperledger Fabric、Docker、Containernet 和 Mininet)和 Go/C/Python 实现了所提出的系统。实验结果表明,与现有算法相比,提议的系统能将所有参与节点之间的最大区块到达时间缩短约 50%~95%。这不仅提高了区块链的每秒交易量,还提高了对各种网络层漏洞和攻击的抵御能力,这些漏洞和攻击可能会在区块传播延迟增加时发生。
{"title":"Resilient and Fast Block Transmission System for Scalable Hyperledger Fabric Blockchain in Multi-Cloud Environments","authors":"Hyunmin Noh;Seunggyu Ji;Yunmin Go;Gi Seok Park;Hwangjun Song","doi":"10.1109/TNSM.2024.3436049","DOIUrl":"10.1109/TNSM.2024.3436049","url":null,"abstract":"In this paper, we propose a resilient and fast block transmission system for Hyperledger Fabric in multi-cloud environments. The goal of the proposed system is to improve the scalability, transaction throughput, and resilience of Hyperledger Fabric by minimizing the block synchronization time among nodes. To achieve this goal, the proposed system is designed to deliver blocks quickly and reliably to all the participating nodes in time-varying multi-cloud environments. The proposed system includes the delay estimating process with O(N) control message overhead over the P2P network, the effective bandwidth estimating process for block transmission, the Gaussian Mixture Model-based clustering and cluster leader selecting process, and hybrid P2P multicast tree constructing process. In addition, a control message format and delivery process are proposed to efficiently provide hybrid P2P multicast tree and neighbor nodes information to all the participating nodes. And we propose a pull-based local block loss recovery process that can receive lost blocks from multi-node without complicated scheduling using a rateless code. The proposed system is fully implemented by using well-known open sources (e.g., Hyperledger Fabric, Docker, Containernet, and Mininet) and Go/C/Python. Experiment results show that the proposed system can reduce the maximum block arriving time among all the participating nodes by approximately 50%~95% compared to the existing algorithms. This improves not only blockchain transaction per second, but also resilience to various network-layer vulnerabilities and attacks that may occur when the block propagation delay increases.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5118-5134"},"PeriodicalIF":4.7,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141873178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Criteria Decision Approach for Lightpath Restoration After Resource Crunch 资源紧张后恢复光路的多标准决策方法
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1109/TNSM.2024.3435544
Alex S. Santos;Eonassis Oliveira Santos;Sabidur Rahman;Lena Wosinska;Juliana de Santi;Gustavo B. Figueiredo
Network operators must deal with Classes of Service (CoS), which have several quality requirements, such as latency, bandwidth/capacity, priority, etc. Besides, it is observed an increase in the volume of traffic that is offered to the transport network. This traffic can be affected by network natural disasters or human-made attacks. In this case, network operators must decide which services to restore, considering their different requirements. In this work, we present a Lightpath Selection Algorithm (LSA) that aims to select lightpaths to be restored after a resource crunch. This algorithm has a multicriteria decision approach considering CoS, Bandwidth, number of Hops, and Holding time. Moreover, service degradation is also considered for those lightpaths that can not be restored with full bandwidth. Results show that our proposed algorithm can improve network restorability and availability without penalizing low-level CoSs.
网络运营商必须处理服务等级 (CoS),这些等级有多种质量要求,如延迟、带宽/容量、优先级等。此外,向传输网络提供的流量也在增加。这些流量可能会受到网络自然灾害或人为攻击的影响。在这种情况下,网络运营商必须根据不同需求决定恢复哪些服务。在这项工作中,我们提出了一种光路选择算法(LSA),旨在选择资源紧缩后需要恢复的光路。该算法采用多标准决策方法,考虑了 CoS、带宽、跳数和保持时间。此外,对于那些无法以全带宽恢复的光路,还考虑了服务降级问题。结果表明,我们提出的算法可以提高网络的可恢复性和可用性,而不会影响低级别的 CoS。
{"title":"Multi-Criteria Decision Approach for Lightpath Restoration After Resource Crunch","authors":"Alex S. Santos;Eonassis Oliveira Santos;Sabidur Rahman;Lena Wosinska;Juliana de Santi;Gustavo B. Figueiredo","doi":"10.1109/TNSM.2024.3435544","DOIUrl":"10.1109/TNSM.2024.3435544","url":null,"abstract":"Network operators must deal with Classes of Service (CoS), which have several quality requirements, such as latency, bandwidth/capacity, priority, etc. Besides, it is observed an increase in the volume of traffic that is offered to the transport network. This traffic can be affected by network natural disasters or human-made attacks. In this case, network operators must decide which services to restore, considering their different requirements. In this work, we present a Lightpath Selection Algorithm (LSA) that aims to select lightpaths to be restored after a resource crunch. This algorithm has a multicriteria decision approach considering CoS, Bandwidth, number of Hops, and Holding time. Moreover, service degradation is also considered for those lightpaths that can not be restored with full bandwidth. Results show that our proposed algorithm can improve network restorability and availability without penalizing low-level CoSs.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5521-5531"},"PeriodicalIF":4.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141873445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIM: Achieving High Profit Through Integration of Selfish Strategy Into Innocent Mining SIM:通过将 "自私战略 "融入 "无辜采矿 "实现高利润
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1109/TNSM.2024.3435869
Jiaze Shang;Tianbo Lu;Pengfei Zhao
Selfish mining, one of the most renowned attack in Bitcoin, involves a selfish miner withholding discovered blocks and broadcasting them at an opportune moment to gain higher rewards than honest mining. However, selfish mining and its variants rely on two assumptions: the attacker solely engages in infiltration mining within the victim pool (attack assumption) and the system operates in a perfect network environment (network assumption). In this paper, we propose a novel attack called Selfish in Innocent Mining (SIM). SIM expands the range of attacker’s behaviors by incorporating selfish mining into the traditional framework of innocent and infiltration mining, without increasing the attacker’s computational power. Initially, we analyze all possible states of chains in the system and their transition probabilities in the context of the SIM attack using Markov Chain. We determine the attacker’s rewards in one victim pool, multiple victim pools, and the miner’s dilemma within different cases. Subsequently, we examine the impact of an imperfect network environment on the attacker’s rewards within the SIM framework, focusing on the influence of unintentional fork rates on rewards. Our quantitative analysis demonstrates that the attacker’s rewards in SIM exceed those in power-adjusting withholding (PAW) by $1.9times $ and $2.7times $ in different network environments, respectively. The attacker’s rewards threshold reduced to 12.38% compared to other benchmarks.
自私挖矿是比特币中最著名的攻击之一,它涉及到一个自私的矿工将发现的区块隐瞒起来,并在适当的时候广播它们,以获得比诚实挖矿更高的奖励。然而,自私挖掘及其变体依赖于两个假设:攻击者仅在受害者池内进行渗透挖掘(攻击假设)和系统在完美的网络环境中运行(网络假设)。在本文中,我们提出了一种新的攻击,称为“自私的无辜采矿”(SIM)。SIM在不增加攻击者计算能力的前提下,将自私挖掘纳入传统的无害挖掘和渗透挖掘框架,扩大了攻击者的行为范围。首先,我们利用马尔可夫链分析了系统中链的所有可能状态及其在SIM攻击背景下的转移概率。我们确定了攻击者在一个受害者池、多个受害者池中的奖励,以及不同情况下的矿工困境。随后,我们研究了不完美的网络环境对SIM框架内攻击者奖励的影响,重点关注无意分叉率对奖励的影响。我们的定量分析表明,在不同的网络环境下,攻击者在SIM中的奖励分别超过了在功率调整预扣(PAW)中的奖励1.9倍和2.7倍。与其他基准相比,攻击者的奖励阈值降低到12.38%。
{"title":"SIM: Achieving High Profit Through Integration of Selfish Strategy Into Innocent Mining","authors":"Jiaze Shang;Tianbo Lu;Pengfei Zhao","doi":"10.1109/TNSM.2024.3435869","DOIUrl":"10.1109/TNSM.2024.3435869","url":null,"abstract":"Selfish mining, one of the most renowned attack in Bitcoin, involves a selfish miner withholding discovered blocks and broadcasting them at an opportune moment to gain higher rewards than honest mining. However, selfish mining and its variants rely on two assumptions: the attacker solely engages in infiltration mining within the victim pool (attack assumption) and the system operates in a perfect network environment (network assumption). In this paper, we propose a novel attack called Selfish in Innocent Mining (SIM). SIM expands the range of attacker’s behaviors by incorporating selfish mining into the traditional framework of innocent and infiltration mining, without increasing the attacker’s computational power. Initially, we analyze all possible states of chains in the system and their transition probabilities in the context of the SIM attack using Markov Chain. We determine the attacker’s rewards in one victim pool, multiple victim pools, and the miner’s dilemma within different cases. Subsequently, we examine the impact of an imperfect network environment on the attacker’s rewards within the SIM framework, focusing on the influence of unintentional fork rates on rewards. Our quantitative analysis demonstrates that the attacker’s rewards in SIM exceed those in power-adjusting withholding (PAW) by \u0000<inline-formula> <tex-math>$1.9times $ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$2.7times $ </tex-math></inline-formula>\u0000 in different network environments, respectively. The attacker’s rewards threshold reduced to 12.38% compared to other benchmarks.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6153-6173"},"PeriodicalIF":4.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141870315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHaul: A PPO-Based Forwarding Agent for Sub6-Enhanced Integrated Access and Backhaul Networks PHaul:基于 PPO 的转发代理,用于 Sub6 增强型综合接入和回程网络
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1109/TNSM.2024.3435505
Jorge Pueyo;Daniel Camps-Mur;Miguel Catalan-Cid
3GPP Integrated Access and Backhaul (IAB) allows operators to deploy outdoor mm-wave access networks in a cost-efficient manner, by reusing the same spectrum in access and backhaul. In IAB networks the performance bottleneck is the wireless backhaul segment, where efficient forwarding strategies are needed to effectively use the available capacity. In addition, the performance of the mm-wave IAB backhaul segment is contingent on the availability of line of sight (LoS) conditions in the selected deployment sites. To mitigate LoS dependence, in this paper, we propose to complement the mm-wave backhaul segment of IAB networks with additional Sub6 backhaul links, which contribute to the capacity and robustness of the backhaul network. We refer to IAB networks combining Sub6 and mm-wave links in the backhaul as Sub6 enhanced IAB networks. In this context, the main contribution of this paper is PHaul, a forwarding engine for Sub6 enhanced IAB networks that accomodates different traffic engineering criteria, and combines an offline path selection heuristic with an online Deep Reinforcement Learning (DRL) agent based on Proximal Policy Optimization (PPO). By leveraging a network digital twin of the IAB wireless backhaul, PHaul periodically samples the input traffic of the backhaul network and updates flow to path mappings, with execution times below 10 seconds in realistic backhaul topologies. We present an exhaustive performance evaluation, where we demonstrate that PHaul can achieve gains of up to 36% in throughput efficiency and of up to 20% in fairness, when compared against two alternative heuristics in a wide range of network configurations. We also demonstrate that PHaul is robust to differences between the network topologies considered in the training and inference phases, which can occur in practice due to link failures.
3GPP综合接入和回程(IAB)允许运营商通过在接入和回程中重复使用相同的频谱,以经济高效的方式部署室外毫米波接入网。在IAB网络中,性能瓶颈是无线回程段,需要有效的转发策略来有效地利用可用容量。此外,毫米波IAB回程段的性能取决于所选部署站点的视线(LoS)条件的可用性。为了减轻对LoS的依赖,在本文中,我们建议在IAB网络的毫米波回程段中添加额外的Sub6回程链路,这有助于回程网络的容量和鲁棒性。我们将回程中结合Sub6和毫米波链路的IAB网络称为Sub6增强型IAB网络。在此背景下,本文的主要贡献是PHaul,这是一个用于Sub6增强IAB网络的转发引擎,它适应不同的流量工程标准,并将离线路径选择启发式算法与基于近端策略优化(PPO)的在线深度强化学习(DRL)代理相结合。通过利用IAB无线回程的网络数字孪生,paul定期对回程网络的输入流量进行采样,并将流更新为路径映射,在实际的回程拓扑中执行时间低于10秒。我们提供了一个详尽的性能评估,其中我们证明,在广泛的网络配置中,与两种可选的启发式方法相比,paul可以实现高达36%的吞吐量效率和高达20%的公平性。我们还证明了paul对训练和推理阶段中考虑的网络拓扑之间的差异具有鲁棒性,这种差异在实践中可能由于链路故障而发生。
{"title":"PHaul: A PPO-Based Forwarding Agent for Sub6-Enhanced Integrated Access and Backhaul Networks","authors":"Jorge Pueyo;Daniel Camps-Mur;Miguel Catalan-Cid","doi":"10.1109/TNSM.2024.3435505","DOIUrl":"10.1109/TNSM.2024.3435505","url":null,"abstract":"3GPP Integrated Access and Backhaul (IAB) allows operators to deploy outdoor mm-wave access networks in a cost-efficient manner, by reusing the same spectrum in access and backhaul. In IAB networks the performance bottleneck is the wireless backhaul segment, where efficient forwarding strategies are needed to effectively use the available capacity. In addition, the performance of the mm-wave IAB backhaul segment is contingent on the availability of line of sight (LoS) conditions in the selected deployment sites. To mitigate LoS dependence, in this paper, we propose to complement the mm-wave backhaul segment of IAB networks with additional Sub6 backhaul links, which contribute to the capacity and robustness of the backhaul network. We refer to IAB networks combining Sub6 and mm-wave links in the backhaul as Sub6 enhanced IAB networks. In this context, the main contribution of this paper is PHaul, a forwarding engine for Sub6 enhanced IAB networks that accomodates different traffic engineering criteria, and combines an offline path selection heuristic with an online Deep Reinforcement Learning (DRL) agent based on Proximal Policy Optimization (PPO). By leveraging a network digital twin of the IAB wireless backhaul, PHaul periodically samples the input traffic of the backhaul network and updates flow to path mappings, with execution times below 10 seconds in realistic backhaul topologies. We present an exhaustive performance evaluation, where we demonstrate that PHaul can achieve gains of up to 36% in throughput efficiency and of up to 20% in fairness, when compared against two alternative heuristics in a wide range of network configurations. We also demonstrate that PHaul is robust to differences between the network topologies considered in the training and inference phases, which can occur in practice due to link failures.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6273-6289"},"PeriodicalIF":4.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141870557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DPU-Enhanced Multi-Agent Actor-Critic Algorithm for Cross-Domain Resource Scheduling in Computing Power Network 用于计算能力网络中跨域资源调度的 DPU 增强型多代理行动者批判算法
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1109/TNSM.2024.3434997
Shuaichao Wang;Shaoyong Guo;Jiakai Hao;Yinlin Ren;Feng Qi
The distribution of computing resources in the Computing Power Network (CPN) is uneven, leading to an imbalance in resource supply and demand within domains, necessitating cross-domain resource scheduling. To address the cross-domain resource scheduling challenge in CPN, this paper presents an Improved Multi-Agent Actor-Critic (IMAAC) resource scheduling approach leveraging Data Processing Unit (DPU) offloading. Initially, we introduce a cross-domain resource scheduling architecture tailored for CPN by leveraging DPU offloading. Specifically, we delegate certain functionalities of the Multi-Agent Deep Reinforcement Learning (MADRL) Agent to DPUs, aiming to mitigate communication costs incurred during the generation of cross-domain scheduling decisions. Second, we introduce the parallel experience ensemble and multi-head attention mechanism in the Multi-Agent Actor-Critic (MAAC) framework to compress the state-space dimensionality of agent association across domains. Finally, we introduce the parallelized dual-policy network structure to mitigate training instability and convergence challenges within the actor and critic networks. Experimental results showcase that IMAAC achieves noteworthy reductions of 5.98%~13.56%, 23.54%~33.55%, and 41.17%~58.88% in total system delay, energy consumption, and the number of discarded tasks, respectively, compared to benchmark experiments.
计算能力网络(CPN)中计算资源分布不均匀,导致域内资源供需不平衡,需要跨域资源调度。为了解决CPN中的跨域资源调度挑战,本文提出了一种利用数据处理单元(DPU)卸载的改进的多代理Actor-Critic (IMAAC)资源调度方法。首先,我们引入了一种利用DPU卸载为CPN量身定制的跨域资源调度体系结构。具体来说,我们将多智能体深度强化学习(MADRL)智能体的某些功能委托给dpu,旨在减少在跨域调度决策生成过程中产生的通信成本。其次,在多agent Actor-Critic (MAAC)框架中引入并行经验集成和多头关注机制,压缩agent跨域关联的状态空间维度;最后,我们引入了并行的双策略网络结构,以减轻演员和评论家网络中的训练不稳定性和收敛性挑战。实验结果表明,与基准实验相比,IMAAC在系统总延迟、能耗和丢弃任务数方面分别降低了5.98%~13.56%、23.54%~33.55%和41.17%~58.88%。
{"title":"DPU-Enhanced Multi-Agent Actor-Critic Algorithm for Cross-Domain Resource Scheduling in Computing Power Network","authors":"Shuaichao Wang;Shaoyong Guo;Jiakai Hao;Yinlin Ren;Feng Qi","doi":"10.1109/TNSM.2024.3434997","DOIUrl":"10.1109/TNSM.2024.3434997","url":null,"abstract":"The distribution of computing resources in the Computing Power Network (CPN) is uneven, leading to an imbalance in resource supply and demand within domains, necessitating cross-domain resource scheduling. To address the cross-domain resource scheduling challenge in CPN, this paper presents an Improved Multi-Agent Actor-Critic (IMAAC) resource scheduling approach leveraging Data Processing Unit (DPU) offloading. Initially, we introduce a cross-domain resource scheduling architecture tailored for CPN by leveraging DPU offloading. Specifically, we delegate certain functionalities of the Multi-Agent Deep Reinforcement Learning (MADRL) Agent to DPUs, aiming to mitigate communication costs incurred during the generation of cross-domain scheduling decisions. Second, we introduce the parallel experience ensemble and multi-head attention mechanism in the Multi-Agent Actor-Critic (MAAC) framework to compress the state-space dimensionality of agent association across domains. Finally, we introduce the parallelized dual-policy network structure to mitigate training instability and convergence challenges within the actor and critic networks. Experimental results showcase that IMAAC achieves noteworthy reductions of 5.98%~13.56%, 23.54%~33.55%, and 41.17%~58.88% in total system delay, energy consumption, and the number of discarded tasks, respectively, compared to benchmark experiments.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6008-6025"},"PeriodicalIF":4.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141870559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1