首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review 自然启发算法在基于物联网的医疗保健服务中的应用:系统性文献综述
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-21 DOI: 10.1002/ett.4969
Zahra Amiri, Arash Heidari, Mohammad Zavvar, Nima Jafari Navimipour, Mansour Esmaeilpour

Nature-inspired algorithms revolve around the intersection of nature-inspired algorithms and the IoT within the healthcare domain. This domain addresses the emerging trends and potential synergies between nature-inspired computational approaches and IoT technologies for advancing healthcare services. Our research aims to fill gaps in addressing algorithmic integration challenges, real-world implementation issues, and the efficacy of nature-inspired algorithms in IoT-based healthcare. We provide insights into the practical aspects and limitations of such applications through a systematic literature review. Specifically, we address the need for a comprehensive understanding of the applications of nature-inspired algorithms in IoT-based healthcare, identifying gaps such as the lack of standardized evaluation metrics and studies on integration challenges and security considerations. By bridging these gaps, our paper offers insights and directions for future research in this domain, exploring the diverse landscape of nature-inspired algorithms in healthcare. Our chosen methodology is a Systematic Literature Review (SLR) to investigate related papers rigorously. Categorizing these algorithms into groups such as genetic algorithms, particle swarm optimization, cuckoo algorithms, ant colony optimization, other approaches, and hybrid methods, we employ meticulous classification based on critical criteria. MATLAB emerges as the predominant programming language, constituting 37.9% of cases, showcasing a prevalent choice among researchers. Our evaluation emphasizes adaptability as the paramount parameter, accounting for 18.4% of considerations. By shedding light on attributes, limitations, and potential directions for future research and development, this review aims to contribute to a comprehensive understanding of nature-inspired algorithms in the dynamic landscape of IoT-based healthcare services.

自然启发算法围绕医疗保健领域中自然启发算法与物联网的交叉点展开。该领域涉及自然启发计算方法与物联网技术之间的新兴趋势和潜在协同作用,以促进医疗保健服务的发展。我们的研究旨在填补在解决算法集成挑战、现实世界实施问题以及自然启发算法在基于物联网的医疗保健领域的功效方面的空白。我们通过系统的文献综述,深入了解了此类应用的实际方面和局限性。具体来说,我们需要全面了解自然启发算法在基于物联网的医疗保健中的应用,找出其中的差距,例如缺乏标准化的评估指标以及有关集成挑战和安全考虑因素的研究。通过弥补这些差距,我们的论文为这一领域的未来研究提供了见解和方向,探索了医疗保健领域自然启发算法的多样化前景。我们选择的方法是系统文献综述(SLR),以严格调查相关论文。我们将这些算法分为遗传算法、粒子群优化、布谷鸟算法、蚁群优化、其他方法和混合方法等类别,并根据关键标准进行了细致分类。MATLAB 是最主要的编程语言,占 37.9%,显示了研究人员的普遍选择。我们的评估强调适应性是最重要的参数,占考虑因素的 18.4%。本综述阐明了自然启发算法的属性、局限性以及未来研究与开发的潜在方向,旨在帮助人们全面了解基于物联网的医疗保健服务动态环境中的自然启发算法。
{"title":"The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review","authors":"Zahra Amiri,&nbsp;Arash Heidari,&nbsp;Mohammad Zavvar,&nbsp;Nima Jafari Navimipour,&nbsp;Mansour Esmaeilpour","doi":"10.1002/ett.4969","DOIUrl":"https://doi.org/10.1002/ett.4969","url":null,"abstract":"<p>Nature-inspired algorithms revolve around the intersection of nature-inspired algorithms and the IoT within the healthcare domain. This domain addresses the emerging trends and potential synergies between nature-inspired computational approaches and IoT technologies for advancing healthcare services. Our research aims to fill gaps in addressing algorithmic integration challenges, real-world implementation issues, and the efficacy of nature-inspired algorithms in IoT-based healthcare. We provide insights into the practical aspects and limitations of such applications through a systematic literature review. Specifically, we address the need for a comprehensive understanding of the applications of nature-inspired algorithms in IoT-based healthcare, identifying gaps such as the lack of standardized evaluation metrics and studies on integration challenges and security considerations. By bridging these gaps, our paper offers insights and directions for future research in this domain, exploring the diverse landscape of nature-inspired algorithms in healthcare. Our chosen methodology is a Systematic Literature Review (SLR) to investigate related papers rigorously. Categorizing these algorithms into groups such as genetic algorithms, particle swarm optimization, cuckoo algorithms, ant colony optimization, other approaches, and hybrid methods, we employ meticulous classification based on critical criteria. MATLAB emerges as the predominant programming language, constituting 37.9% of cases, showcasing a prevalent choice among researchers. Our evaluation emphasizes adaptability as the paramount parameter, accounting for 18.4% of considerations. By shedding light on attributes, limitations, and potential directions for future research and development, this review aims to contribute to a comprehensive understanding of nature-inspired algorithms in the dynamic landscape of IoT-based healthcare services.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141073767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the dissemination of privacy information in online social networks 在线社交网络中隐私信息传播的建模
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-21 DOI: 10.1002/ett.4989
Nafei Zhu, Wenhui Li, Shijia Pan, Shuting Jin, Jingsha He

Driven by the rapid development of information technology, online social networks (OSNs) have experienced a fast development in recent years, allowing increasingly more people to share and spread information over OSNs. The rapid rise of OSN platforms such as Facebook and Twitter is sufficient evidence of such development. As one type of information, privacy information can also be created and disseminated over an OSN, posing a severe threat to individual privacy. This article attempts to construct a model for disseminating privacy information in OSNs and to analyze the model by simulating the dissemination process of privacy information in OSNs. First, we establish network models that exhibit the main characteristics of OSNs. Second, by considering the factors related to social relationships, especially intimacy between users and the attention of users to the privacy subject, we derive the parameters for privacy information dissemination models in OSNs. Third, based on the theory of information dissemination dynamics, we construct a model for information dissemination that conforms to the properties of privacy information. We also present some experimental results based on the constructed model and analyze the characteristics of privacy information dissemination. Fourth, we study and verify the various properties of the model through a set of experiments. The proposed model provides the opportunity to better understand the dynamics of privacy information dissemination in OSNs and the effect of user behavior on dissemination.

在信息技术飞速发展的推动下,在线社交网络(OSN)近年来得到了快速发展,越来越多的人可以通过 OSN 分享和传播信息。Facebook 和 Twitter 等网络社交平台的迅速崛起就充分证明了这一点。作为信息的一种,隐私信息也可以通过 OSN 创建和传播,对个人隐私构成严重威胁。本文试图构建一个在 OSN 中传播隐私信息的模型,并通过模拟 OSN 中隐私信息的传播过程来分析该模型。首先,我们建立了展现 OSN 主要特征的网络模型。其次,通过考虑与社会关系相关的因素,特别是用户之间的亲密关系和用户对隐私主题的关注度,我们得出了 OSNs 中隐私信息传播模型的参数。第三,基于信息传播动力学理论,我们构建了一个符合隐私信息特性的信息传播模型。我们还基于构建的模型给出了一些实验结果,并分析了隐私信息传播的特点。第四,我们通过一系列实验研究并验证了模型的各种特性。所提出的模型为更好地理解操作系统网络中隐私信息传播的动态以及用户行为对传播的影响提供了机会。
{"title":"Modeling the dissemination of privacy information in online social networks","authors":"Nafei Zhu,&nbsp;Wenhui Li,&nbsp;Shijia Pan,&nbsp;Shuting Jin,&nbsp;Jingsha He","doi":"10.1002/ett.4989","DOIUrl":"https://doi.org/10.1002/ett.4989","url":null,"abstract":"<p>Driven by the rapid development of information technology, online social networks (OSNs) have experienced a fast development in recent years, allowing increasingly more people to share and spread information over OSNs. The rapid rise of OSN platforms such as Facebook and Twitter is sufficient evidence of such development. As one type of information, privacy information can also be created and disseminated over an OSN, posing a severe threat to individual privacy. This article attempts to construct a model for disseminating privacy information in OSNs and to analyze the model by simulating the dissemination process of privacy information in OSNs. First, we establish network models that exhibit the main characteristics of OSNs. Second, by considering the factors related to social relationships, especially intimacy between users and the attention of users to the privacy subject, we derive the parameters for privacy information dissemination models in OSNs. Third, based on the theory of information dissemination dynamics, we construct a model for information dissemination that conforms to the properties of privacy information. We also present some experimental results based on the constructed model and analyze the characteristics of privacy information dissemination. Fourth, we study and verify the various properties of the model through a set of experiments. The proposed model provides the opportunity to better understand the dynamics of privacy information dissemination in OSNs and the effect of user behavior on dissemination.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141073766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RCVM-ASS-CICSKA-PAPT-VDF: VLSI design of high-speed reconfigurable compressed Vedic PAPT-VDF filter for ECG medical application RCVM-AS-CICSKA-PAPT-VDF:用于心电图医疗应用的高速可重构压缩吠陀 PAPT-VDF 滤波器的 VLSI 设计
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-20 DOI: 10.1002/ett.4985
K. V. Suresh Kumar, D. Madhavi

During signal acquisition, the signals are impacted by multiple noise sources that must be filtered before any analysis. However, many different filter implementations in VLSI are dispersed among many studies. This study aims to give readers a systematic approach to designing a Pipelined All-Pass Transformation based Variable digital filter (PAPT-VDF) to eliminate the high-frequency noise from ECG data. The modified design emphasizes first- and second-order responses to obtain high-speed filter realization with high operating frequencies. The addition of adder and multiplier designs to the hardware architecture of a filter design improves performance. The fundamental blocks of the filter design are the adder and multiplier. The adder and multiplier are employed with an Adaptable stage size-based concatenation, incremented carry-skip adder (ASS-CICSKA), and Improved reconfigurable compressed Vedic multiplier (IRCVM). Utilizing the adder design diminishes the delay with enhanced performance because receiving the carry from an incrementation block is not mandatory. In the multiplier design, the compressor and the reconfigurable approach are adapted with a data detector block to detect the redundant input and lower the logic gates' switching activity with less area overhead. The proposed filter design is implemented in vertex 7 FPGA family device, and the performance measures are analyzed regarding area utilization, delay, power, and frequency. Also, by using the denoised signal, the mean square error (MSE), and signal-to-noise ratio (SNR) are evaluated in the MATLAB platform.

在信号采集过程中,信号会受到多种噪声源的影响,在进行任何分析之前都必须对噪声源进行过滤。然而,在超大规模集成电路中,许多不同的滤波器实现方法分散在许多研究中。本研究旨在为读者提供一种系统的方法,设计基于管线全通变换的可变数字滤波器(PAPT-VDF),以消除心电图数据中的高频噪声。修改后的设计强调一阶和二阶响应,以获得高工作频率的高速滤波器。在滤波器设计的硬件架构中加入加法器和乘法器设计可提高性能。滤波器设计的基本模块是加法器和乘法器。加法器和乘法器采用了基于大小的自适应级联、增量进位-滑移加法器(ASS-CICSKA)和改进型可重构压缩吠陀乘法器(IRCVM)。利用加法器设计可以减少延迟并提高性能,因为从增量块接收进位并不是强制性的。在乘法器设计中,压缩器和可重构方法与数据检测块相适应,以检测冗余输入,降低逻辑门的开关活动,减少面积开销。拟议的滤波器设计在 vertex 7 FPGA 系列器件中实现,并对面积利用率、延迟、功耗和频率等性能指标进行了分析。此外,通过使用去噪信号,在 MATLAB 平台上评估了均方误差(MSE)和信噪比(SNR)。
{"title":"RCVM-ASS-CICSKA-PAPT-VDF: VLSI design of high-speed reconfigurable compressed Vedic PAPT-VDF filter for ECG medical application","authors":"K. V. Suresh Kumar,&nbsp;D. Madhavi","doi":"10.1002/ett.4985","DOIUrl":"https://doi.org/10.1002/ett.4985","url":null,"abstract":"<p>During signal acquisition, the signals are impacted by multiple noise sources that must be filtered before any analysis. However, many different filter implementations in VLSI are dispersed among many studies. This study aims to give readers a systematic approach to designing a Pipelined All-Pass Transformation based Variable digital filter (PAPT-VDF) to eliminate the high-frequency noise from ECG data. The modified design emphasizes first- and second-order responses to obtain high-speed filter realization with high operating frequencies. The addition of adder and multiplier designs to the hardware architecture of a filter design improves performance. The fundamental blocks of the filter design are the adder and multiplier. The adder and multiplier are employed with an Adaptable stage size-based concatenation, incremented carry-skip adder (ASS-CICSKA), and Improved reconfigurable compressed Vedic multiplier (IRCVM). Utilizing the adder design diminishes the delay with enhanced performance because receiving the carry from an incrementation block is not mandatory. In the multiplier design, the compressor and the reconfigurable approach are adapted with a data detector block to detect the redundant input and lower the logic gates' switching activity with less area overhead. The proposed filter design is implemented in vertex 7 FPGA family device, and the performance measures are analyzed regarding area utilization, delay, power, and frequency. Also, by using the denoised signal, the mean square error (MSE), and signal-to-noise ratio (SNR) are evaluated in the MATLAB platform.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141069096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain 基于中国余数定理和区块链的 Vanet 群组密钥协议
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-16 DOI: 10.1002/ett.4987
Haitao Xiao, An He

Vehicular ad hoc Network (VANET) is a wireless self-organizing network for obtaining information about road conditions, vehicle speed, vehicle location and traffic congestion. Traditional key negotiation protocols create many problems when dealing with a group of vehicles that need to communicate over a public channel. For example, traditional key negotiation protocols rely too much on the participation of trusted institutions and suffer from a single point of failure. Meanwhile, group session key negotiation is usually inefficient with high computational cost and communication overhead. To solve these problems, this paper proposes a blockchain-based Chinese Remainder Theorem (CRT) VANET group key agreement. In addition, the protocol supports dynamic management of vehicles, including joining and exit. Formal security proofs show that our solution satisfies basic security requirements. Experiments using ProVerif show that the protocol functions properly even under many active and passive attacks, such as eavesdropping attacks. Performance analysis shows that the protocol is more efficient in the face of multi-vehicle communication, in particular by reducing the computational cost by up to 75% and the communication overhead by up to 66%.

车载特设网络(VANET)是一种无线自组织网络,用于获取路况、车速、车辆位置和交通拥堵等信息。传统的密钥协商协议在处理需要通过公共信道进行通信的一组车辆时会产生许多问题。例如,传统的密钥协商协议过于依赖可信机构的参与,存在单点故障。同时,群组会话密钥协商通常效率低下,计算成本和通信开销较高。为了解决这些问题,本文提出了一种基于区块链的中文余数定理(CRT)VANET 组密钥协议。此外,该协议还支持车辆的动态管理,包括加入和退出。形式安全证明表明,我们的解决方案满足基本的安全要求。使用 ProVerif 进行的实验表明,该协议即使在许多主动和被动攻击(如窃听攻击)下也能正常运行。性能分析表明,面对多车通信,该协议更加高效,尤其是计算成本最多可降低 75%,通信开销最多可降低 66%。
{"title":"A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain","authors":"Haitao Xiao,&nbsp;An He","doi":"10.1002/ett.4987","DOIUrl":"https://doi.org/10.1002/ett.4987","url":null,"abstract":"<p>Vehicular ad hoc Network (VANET) is a wireless self-organizing network for obtaining information about road conditions, vehicle speed, vehicle location and traffic congestion. Traditional key negotiation protocols create many problems when dealing with a group of vehicles that need to communicate over a public channel. For example, traditional key negotiation protocols rely too much on the participation of trusted institutions and suffer from a single point of failure. Meanwhile, group session key negotiation is usually inefficient with high computational cost and communication overhead. To solve these problems, this paper proposes a blockchain-based Chinese Remainder Theorem (CRT) VANET group key agreement. In addition, the protocol supports dynamic management of vehicles, including joining and exit. Formal security proofs show that our solution satisfies basic security requirements. Experiments using ProVerif show that the protocol functions properly even under many active and passive attacks, such as eavesdropping attacks. Performance analysis shows that the protocol is more efficient in the face of multi-vehicle communication, in particular by reducing the computational cost by up to 75% and the communication overhead by up to 66%.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140949138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A generalized detection framework for covert timing channels based on perceptual hashing 基于感知散列的隐蔽定时信道通用检测框架
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-09 DOI: 10.1002/ett.4978
Xiaolong Zhuang, Yonghong Chen, Hui Tian

Network covert channels use network resources to transmit data covertly, and their existence will seriously threaten network security. Therefore, an effective method is needed to prevent and detect them. Current network covert timing channel detection methods often incorporate machine learning methods in order to achieve generalized detection, but they consume a large amount of computational resources. In this paper, we propose a generalized detection framework for covert channels based on perceptual hashing without relying on machine learning methods. And we propose a one-dimensional data feature descriptor for feature extraction of perceptual hash for the data characteristics of covert timing channels. We first generate the hash sequence of the corresponding channel to get the average hash, which is used for comparison in the test phase. The experimental results show that the feature descriptor can capture the feature differences of one-dimensional data well. When compared to machine learning methods, this perceptual hashing algorithms enable faster traffic detection. Meanwhile, our method is able to detect the effectiveness with the smallest coverage window compared with the latest solutions. Moreover, it exhibits robustness in jitter network environment.

网络隐蔽信道利用网络资源隐蔽地传输数据,它们的存在将严重威胁网络安全。因此,需要一种有效的方法来预防和检测它们。目前的网络隐蔽定时信道检测方法通常采用机器学习方法来实现泛化检测,但这些方法需要消耗大量的计算资源。本文提出了一种基于感知哈希的隐蔽信道泛化检测框架,无需依赖机器学习方法。针对隐蔽定时信道的数据特征,我们提出了一种一维数据特征描述器,用于感知哈希的特征提取。我们首先生成相应信道的哈希序列,得到平均哈希值,用于测试阶段的对比。实验结果表明,该特征描述符能很好地捕捉一维数据的特征差异。与机器学习方法相比,这种感知哈希算法能更快地检测到流量。同时,与最新的解决方案相比,我们的方法能以最小的覆盖窗口检测出有效性。此外,它在抖动的网络环境中也表现出了鲁棒性。
{"title":"A generalized detection framework for covert timing channels based on perceptual hashing","authors":"Xiaolong Zhuang,&nbsp;Yonghong Chen,&nbsp;Hui Tian","doi":"10.1002/ett.4978","DOIUrl":"https://doi.org/10.1002/ett.4978","url":null,"abstract":"<p>Network covert channels use network resources to transmit data covertly, and their existence will seriously threaten network security. Therefore, an effective method is needed to prevent and detect them. Current network covert timing channel detection methods often incorporate machine learning methods in order to achieve generalized detection, but they consume a large amount of computational resources. In this paper, we propose a generalized detection framework for covert channels based on perceptual hashing without relying on machine learning methods. And we propose a one-dimensional data feature descriptor for feature extraction of perceptual hash for the data characteristics of covert timing channels. We first generate the hash sequence of the corresponding channel to get the average hash, which is used for comparison in the test phase. The experimental results show that the feature descriptor can capture the feature differences of one-dimensional data well. When compared to machine learning methods, this perceptual hashing algorithms enable faster traffic detection. Meanwhile, our method is able to detect the effectiveness with the smallest coverage window compared with the latest solutions. Moreover, it exhibits robustness in jitter network environment.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140895247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing 基于虚拟化网络功能的物联网移动边缘计算中撤销未经授权访问的基于强化学习的区块链模型
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-07 DOI: 10.1002/ett.4981
C. T. Kalaivani, R. Renugadevi, Jeffin Gracewell, A. Arul Edwin Raj

VNFs boost data processing efficiency in Mobile Edge Computing (MEC)-driven Internet of Things (IoT) for healthcare, smart cities, and industrial automation. VNF-based IoT MEC systems encounter a significant security threat due to unauthorized access, posing risks to data privacy and system integrity. Existing approaches struggle to adapt to dynamic environments and lack tamper-proof enforcement mechanisms. In this work, we propose a novel system combining Reinforcement Learning (RL) and blockchain technology to revoke unauthorized access in VNF-based IoT MEC. We introduce the Integrated Action-selection DRL Algorithm for Unauthorized Access Revocation (IASDRL-UAR), a novel RL approach that excels in dynamic environments by handling both continuous and discrete actions, enabling real-time optimization of security risk, execution time, and energy consumption. A behavior control contract (BCC) is proposed and integrated into the RL system, automating behavior checks and enforcement, streamlining security management, and reducing manual intervention. RL feedback plays a pivotal role in steering dynamic security adjustments, gaining valuable perspectives from user behavior via trust scores in the behavior contract. The security features of the proposed method are analyzed. Performance comparisons reveal a substantial improvement, with the proposed system outperforming existing methods by 30% in terms of throughput, 21.7% in system stability, and 26% in access revocation latency. Additionally, the system demonstrates a higher security index, energy efficiency, and scalability.

在移动边缘计算(MEC)驱动的物联网(IoT)中,VNF 可提高数据处理效率,用于医疗保健、智能城市和工业自动化。由于存在未经授权的访问,基于 VNF 的物联网 MEC 系统面临着巨大的安全威胁,给数据隐私和系统完整性带来了风险。现有方法难以适应动态环境,并且缺乏防篡改执行机制。在这项工作中,我们提出了一种结合了强化学习(RL)和区块链技术的新型系统,用于撤销基于 VNF 的物联网 MEC 中的未授权访问。我们介绍了用于撤销未经授权访问的集成行动选择 DRL 算法(IASDRL-UAR),这是一种新型 RL 方法,可通过处理连续和离散行动在动态环境中发挥出色作用,从而实现安全风险、执行时间和能耗的实时优化。我们提出了一种行为控制合约(BCC),并将其集成到 RL 系统中,实现了行为检查和执行的自动化,简化了安全管理,减少了人工干预。RL 反馈在指导动态安全调整方面发挥着关键作用,通过行为合约中的信任分数从用户行为中获得有价值的观点。本文分析了拟议方法的安全特性。性能比较显示,所提出的系统在吞吐量方面比现有方法高出 30%,在系统稳定性方面高出 21.7%,在访问撤销延迟方面高出 26%。此外,该系统还展示了更高的安全指数、能效和可扩展性。
{"title":"Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing","authors":"C. T. Kalaivani,&nbsp;R. Renugadevi,&nbsp;Jeffin Gracewell,&nbsp;A. Arul Edwin Raj","doi":"10.1002/ett.4981","DOIUrl":"https://doi.org/10.1002/ett.4981","url":null,"abstract":"<p>VNFs boost data processing efficiency in Mobile Edge Computing (MEC)-driven Internet of Things (IoT) for healthcare, smart cities, and industrial automation. VNF-based IoT MEC systems encounter a significant security threat due to unauthorized access, posing risks to data privacy and system integrity. Existing approaches struggle to adapt to dynamic environments and lack tamper-proof enforcement mechanisms. In this work, we propose a novel system combining Reinforcement Learning (RL) and blockchain technology to revoke unauthorized access in VNF-based IoT MEC. We introduce the Integrated Action-selection DRL Algorithm for Unauthorized Access Revocation (IASDRL-UAR), a novel RL approach that excels in dynamic environments by handling both continuous and discrete actions, enabling real-time optimization of security risk, execution time, and energy consumption. A behavior control contract (BCC) is proposed and integrated into the RL system, automating behavior checks and enforcement, streamlining security management, and reducing manual intervention. RL feedback plays a pivotal role in steering dynamic security adjustments, gaining valuable perspectives from user behavior via trust scores in the behavior contract. The security features of the proposed method are analyzed. Performance comparisons reveal a substantial improvement, with the proposed system outperforming existing methods by 30% in terms of throughput, 21.7% in system stability, and 26% in access revocation latency. Additionally, the system demonstrates a higher security index, energy efficiency, and scalability.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced authentication and device integrity protection for GDOI using blockchain 利用区块链为 GDOI 提供增强型身份验证和设备完整性保护
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-06 DOI: 10.1002/ett.4986
Munkenyi Mukhandi, Eduardo Andrade, Jorge Granjal, João P. Vilela

Recent device-level cyber-attacks have targeted IoT critical applications in power distribution systems integrated with the Internet communications infrastructure. These systems utilize group domain of interpretation (GDOI) as designated by International Electrotechnical Commission (IEC) power utility standards IEC 61850 and IEC 62351. However, GDOI cannot protect against novel threats, such as IoT device-level attacks that can modify device firmware and configuration files to create command and control malicious communication. As a consequence, the attacks can compromise substations with potentially catastrophic consequences. With this in mind, this article proposes a permissioned/private blockchain-based authentication framework that provides a solution to current security threats such as the IoT device-level attacks. Our work improves the GDOI protocol applied in critical IoT applications by achieving decentralized and distributed device authentication. The security of our proposal is demonstrated against known attacks as well as through formal mechanisms via the joint use of the AVISPA and SPAN tools. The proposed approach adds negligible authentication latency, thus ensuring appropriate scalability as the number of nodes increases.

最近的设备级网络攻击针对的是与互联网通信基础设施集成的配电系统中的物联网关键应用。这些系统利用国际电工委员会(IEC)电力公用事业标准 IEC 61850 和 IEC 62351 指定的组解释域(GDOI)。然而,GDOI 无法抵御新的威胁,例如物联网设备级攻击,这种攻击可以修改设备固件和配置文件,以创建命令和控制恶意通信。因此,这些攻击可能会危及变电站,造成潜在的灾难性后果。有鉴于此,本文提出了一种基于许可/私有区块链的身份验证框架,为当前的安全威胁(如物联网设备级攻击)提供了一种解决方案。我们的工作通过实现去中心化和分布式设备身份验证,改进了关键物联网应用中的 GDOI 协议。通过联合使用 AVISPA 和 SPAN 工具,我们针对已知攻击以及通过正式机制证明了我们建议的安全性。所提出的方法增加的认证延迟可以忽略不计,从而确保了随着节点数量的增加而具有适当的可扩展性。
{"title":"Enhanced authentication and device integrity protection for GDOI using blockchain","authors":"Munkenyi Mukhandi,&nbsp;Eduardo Andrade,&nbsp;Jorge Granjal,&nbsp;João P. Vilela","doi":"10.1002/ett.4986","DOIUrl":"https://doi.org/10.1002/ett.4986","url":null,"abstract":"<p>Recent device-level cyber-attacks have targeted IoT critical applications in power distribution systems integrated with the Internet communications infrastructure. These systems utilize group domain of interpretation (GDOI) as designated by International Electrotechnical Commission (IEC) power utility standards IEC 61850 and IEC 62351. However, GDOI cannot protect against novel threats, such as IoT device-level attacks that can modify device firmware and configuration files to create command and control malicious communication. As a consequence, the attacks can compromise substations with potentially catastrophic consequences. With this in mind, this article proposes a permissioned/private blockchain-based authentication framework that provides a solution to current security threats such as the IoT device-level attacks. Our work improves the GDOI protocol applied in critical IoT applications by achieving decentralized and distributed device authentication. The security of our proposal is demonstrated against known attacks as well as through formal mechanisms via the joint use of the AVISPA and SPAN tools. The proposed approach adds negligible authentication latency, thus ensuring appropriate scalability as the number of nodes increases.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.4986","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140844955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensitive data identification for multi-category and multi-scenario data 多类别和多场景数据的敏感数据识别
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-25 DOI: 10.1002/ett.4983
Yuning Cui, Yonghui Huang, Yongbing Bai, Yuchen Wang, Chao Wang

Sensitive data identification is the prerequisite for protecting critical user and business data. Traditional methods usually only target a certain type of application scenario or a certain type of data, thus making it difficult to meet the needs of enterprise-level data protection. This paper proposes an introduction to the end-to-end sensitive data identification system of Beike Inc. The system consists of the data identification & annotation platform, dataset management platform, and sensitive data identification model, which propose different governance methods for batch data and streaming data respectively. Specifically, we propose a sliding window-based identification method for long text to improve the identification of streaming data. Evaluation results show that this method can improve the effect of identifying long text sensitive data without losing the ability on short text, for the open source test dataset, the value can be up to 94.15, so it is applicable in diverse scenarios.

敏感数据识别是保护关键用户和业务数据的前提。传统方法通常只针对某一类应用场景或某一类数据,难以满足企业级数据保护的需求。本文介绍了北科公司的端到端敏感数据识别系统。该系统由数据识别平台、标注平台、数据集管理平台和敏感数据识别模型组成,分别针对批量数据和流式数据提出了不同的治理方法。具体来说,我们提出了一种基于滑动窗口的长文本识别方法,以改进流数据的识别。评估结果表明,该方法在提高长文本敏感数据识别效果的同时,不失对短文本的识别能力,对于开源测试数据集,该值可达 94.15,适用于多种场景。
{"title":"Sensitive data identification for multi-category and multi-scenario data","authors":"Yuning Cui,&nbsp;Yonghui Huang,&nbsp;Yongbing Bai,&nbsp;Yuchen Wang,&nbsp;Chao Wang","doi":"10.1002/ett.4983","DOIUrl":"https://doi.org/10.1002/ett.4983","url":null,"abstract":"<p>Sensitive data identification is the prerequisite for protecting critical user and business data. Traditional methods usually only target a certain type of application scenario or a certain type of data, thus making it difficult to meet the needs of enterprise-level data protection. This paper proposes an introduction to the end-to-end sensitive data identification system of Beike Inc. The system consists of the data identification &amp; annotation platform, dataset management platform, and sensitive data identification model, which propose different governance methods for batch data and streaming data respectively. Specifically, we propose a sliding window-based identification method for long text to improve the identification of streaming data. Evaluation results show that this method can improve the effect of identifying long text sensitive data without losing the ability on short text, for the open source test dataset, the value can be up to 94.15, so it is applicable in diverse scenarios.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140648161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An advancing method for web service reliability and scalability using ResNet convolution neural network optimized with Zebra Optimization Algorithm 利用斑马优化算法优化的 ResNet 卷积神经网络提高网络服务可靠性和可扩展性的方法
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-24 DOI: 10.1002/ett.4968
D. Gokulakrishan, R. Ramakrishnan, G. Saritha, B. Sreedevi

Web service reliability and scalability is an important mission that keeps web services running normally. Within web service, the web services invoked by users not only depend on the service itself, but also on web load condition. Due to the features of web dynamics, traditional reliability and scalability methods have become inappropriate; at the same time, the web condition parameter sparsity problem will cause inaccurate reliability prediction. To address these challenges, Web Service Reliability and Scalability Determination Using ResNet Convolutional Neural Network optimized with Zero Optimization Algorithm (WRS-ResNetCNN-ZOA) is proposed in this manuscript. Initially, the input data is collected from WSRec dataset. The ResNet convolutional neural network (ResNetCNN) with Business Process Execution Language (BPEL) specification is introduced to forecast the reliability and scalability of web service. The results are categorized as right and wrong based on ResNetCNN. The weight parameters of the ResNetCNN is optimized by Zebra Optimization Algorithm to improve accuracy of the prediction. The performance of the proposed method is examined under some performance metrics, like F-measure, reliability, scalability, accuracy, sensitivity, specificity, and precision. The proposed technique attains 15.36%, 35.39%, 23.87%, 20.67% better reliability, 42.39%, 11.39%, 34.16%, 25.78% better accuracy when analyzed to the existing methods, like Web Reliability based on K-clustering, (WRS-KClustering), Web Reliability prediction based on AdaBoostM1 and J48 (WRS-AdaM1-J48), Web Reliability prediction based on Online service Reliability (WRS-OPUN), and Web Reliability prediction based on Dynamic Bayesian Network (WRS-DBNS), respectively.

网络服务的可靠性和可扩展性是保证网络服务正常运行的一项重要任务。在网络服务中,用户调用的网络服务不仅取决于服务本身,还取决于网络负载状况。由于网络动态性的特点,传统的可靠性和可扩展性方法已不适用;同时,网络条件参数稀疏性问题也会导致可靠性预测不准确。为解决这些难题,本文提出了使用零优化算法优化的 ResNet 卷积神经网络(WRS-ResNetCNN-ZOA)进行网络服务可靠性和可扩展性判断。最初,输入数据来自 WSRec 数据集。在此基础上,引入带有业务流程执行语言(BPEL)规范的 ResNet 卷积神经网络(ResNetCNN)来预测网络服务的可靠性和可扩展性。预测结果根据 ResNetCNN 分为正确和错误。ResNetCNN 的权重参数通过斑马优化算法进行优化,以提高预测的准确性。根据一些性能指标,如 F 值、可靠性、可扩展性、准确性、灵敏度、特异性和精确度,对所提出方法的性能进行了检验。所提出的技术的可靠性分别提高了 15.36%、35.39%、23.87% 和 20.67%,准确性分别提高了 42.39%、11.39%、34.16% 和 25.78%。与基于 K 聚类的网络可靠性预测(WRS-KClustering)、基于 AdaBoostM1 和 J48 的网络可靠性预测(WRS-AdaM1-J48)、基于在线服务可靠性的网络可靠性预测(WRS-OPUN)和基于动态贝叶斯网络的网络可靠性预测(WRS-DBNS)等现有方法相比,所提技术的准确率分别提高了 15.36%、35.39%、23.87%、20.67%、42.39%、11.39%、34.16%、25.78%。
{"title":"An advancing method for web service reliability and scalability using ResNet convolution neural network optimized with Zebra Optimization Algorithm","authors":"D. Gokulakrishan,&nbsp;R. Ramakrishnan,&nbsp;G. Saritha,&nbsp;B. Sreedevi","doi":"10.1002/ett.4968","DOIUrl":"https://doi.org/10.1002/ett.4968","url":null,"abstract":"<p>Web service reliability and scalability is an important mission that keeps web services running normally. Within web service, the web services invoked by users not only depend on the service itself, but also on web load condition. Due to the features of web dynamics, traditional reliability and scalability methods have become inappropriate; at the same time, the web condition parameter sparsity problem will cause inaccurate reliability prediction. To address these challenges, Web Service Reliability and Scalability Determination Using ResNet Convolutional Neural Network optimized with Zero Optimization Algorithm (WRS-ResNetCNN-ZOA) is proposed in this manuscript. Initially, the input data is collected from WSRec dataset. The ResNet convolutional neural network (ResNetCNN) with Business Process Execution Language (BPEL) specification is introduced to forecast the reliability and scalability of web service. The results are categorized as right and wrong based on ResNetCNN. The weight parameters of the ResNetCNN is optimized by Zebra Optimization Algorithm to improve accuracy of the prediction. The performance of the proposed method is examined under some performance metrics, like <i>F</i>-measure, reliability, scalability, accuracy, sensitivity, specificity, and precision. The proposed technique attains 15.36%, 35.39%, 23.87%, 20.67% better reliability, 42.39%, 11.39%, 34.16%, 25.78% better accuracy when analyzed to the existing methods, like Web Reliability based on K-clustering, (WRS-KClustering), Web Reliability prediction based on AdaBoostM1 and J48 (WRS-AdaM1-J48), Web Reliability prediction based on Online service Reliability (WRS-OPUN), and Web Reliability prediction based on Dynamic Bayesian Network (WRS-DBNS), respectively.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140641765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog–cloud computing 虚拟化雾云计算中物联网任务调度的贪婪随机自适应搜索程序
IF 3.6 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-24 DOI: 10.1002/ett.4980
Rezvan Salimi, Sadoon Azizi, Jemal Abawajy

Virtualized fog–cloud computing (VFCC) has emerged as an optimal platform for processing the increasing number of emerging Internet of Things (IoT) applications. VFCC resources are provisioned to IoT applications in the form of virtual machines (VMs). Effectively utilizing VMs for diverse IoT tasks with varying requirements poses a significant challenge due to their heterogeneity in processing power, communication delay, and energy consumption. In addressing this challenge, in this article, we propose a system model for scheduling IoT tasks in VFCCs, considering not only individual task deadlines but also the system's overall energy consumption. Subsequently, we employ a greedy randomized adaptive search procedure (GRASP) to determine the optimal assignment of IoT tasks among VMs. GRASP, a metaheuristic-based technique, offers appealing characteristics, including simplicity, ease of implementation, a limited number of tuning parameters, and the potential for parallel implementation. Our comprehensive experiments evaluate the effectiveness of the proposed method, comparing its performance with the most advanced algorithms. The results demonstrate that the proposed approach outperforms the existing methods in terms of deadline satisfaction ratio, average response time, energy consumption, and makespan.

虚拟雾云计算(VFCC)已成为处理日益增多的新兴物联网(IoT)应用的最佳平台。VFCC 资源以虚拟机(VM)的形式提供给物联网应用。由于虚拟机在处理能力、通信延迟和能耗方面的异质性,如何有效地利用虚拟机来完成具有不同要求的各种物联网任务成为一个重大挑战。为应对这一挑战,我们在本文中提出了在 VFCC 中调度物联网任务的系统模型,不仅考虑了单个任务的截止日期,还考虑了系统的整体能耗。随后,我们采用贪婪随机自适应搜索程序(GRASP)来确定虚拟机之间物联网任务的最优分配。GRASP 是一种基于元启发式的技术,具有吸引人的特点,包括简单、易于实施、调整参数数量有限以及并行实施的潜力。我们的综合实验评估了所提方法的有效性,并将其性能与最先进的算法进行了比较。结果表明,所提出的方法在截止日期满足率、平均响应时间、能耗和时间跨度方面都优于现有方法。
{"title":"A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog–cloud computing","authors":"Rezvan Salimi,&nbsp;Sadoon Azizi,&nbsp;Jemal Abawajy","doi":"10.1002/ett.4980","DOIUrl":"https://doi.org/10.1002/ett.4980","url":null,"abstract":"<p>Virtualized fog–cloud computing (VFCC) has emerged as an optimal platform for processing the increasing number of emerging Internet of Things (IoT) applications. VFCC resources are provisioned to IoT applications in the form of virtual machines (VMs). Effectively utilizing VMs for diverse IoT tasks with varying requirements poses a significant challenge due to their heterogeneity in processing power, communication delay, and energy consumption. In addressing this challenge, in this article, we propose a system model for scheduling IoT tasks in VFCCs, considering not only individual task deadlines but also the system's overall energy consumption. Subsequently, we employ a greedy randomized adaptive search procedure (GRASP) to determine the optimal assignment of IoT tasks among VMs. GRASP, a metaheuristic-based technique, offers appealing characteristics, including simplicity, ease of implementation, a limited number of tuning parameters, and the potential for parallel implementation. Our comprehensive experiments evaluate the effectiveness of the proposed method, comparing its performance with the most advanced algorithms. The results demonstrate that the proposed approach outperforms the existing methods in terms of deadline satisfaction ratio, average response time, energy consumption, and makespan.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140641767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1