首页 > 最新文献

Crystal Growth & Design最新文献

英文 中文
A Survey on Scheduling Techniques in Computing and Network Convergence 计算与网络融合中的调度技术概览
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-11-01 DOI: 10.1109/COMST.2023.3329027
Shujiong Tang;Yue Yu;Hui Wang;Guiliang Wang;Wuhui Chen;Zenglin Xu;Song Guo;Wen Gao
The computing demand for massive applications has led to the ubiquitous deployment of computing power. This trend results in the urgent need for higher-level computing resource scheduling services. The Computing and Network Convergence (CNC), a new type of infrastructure, has become a hot topic. To realize the visions of CNC, such as computing-network integration, ubiquitous collaboration, latency-free, and ready-to-use, an intelligent scheduling strategy for CNC should integrate and collaborate with the network. However, the Computing and Network Convergence is built on the cloud, edge, and endless terminals, making the scheduling problem more difficult due to its wide-area requests, available flexibility arrangements, interconnections, and resource adaptations. In view of this, in this survey, we comprehensively review the literature on scheduling in various scenarios. We cover the scheduling problem of Computing and Network Convergence from heterogeneous resources, multiple-objective optimization, and diverse tasks. Possible explanations and implications are discussed. Finally, we point out important challenges for future work.
海量应用的计算需求导致计算能力的部署无处不在。这一趋势导致人们迫切需要更高级别的计算资源调度服务。计算与网络融合(CNC)作为一种新型基础设施,已成为一个热门话题。为了实现 CNC 的愿景,如计算与网络融合、无处不在的协作、无延迟和随时可用,CNC 的智能调度策略应与网络融合和协作。然而,计算与网络融合是建立在云、边缘和无尽终端基础上的,其广域请求、可用的灵活安排、互联和资源适应性增加了调度问题的难度。有鉴于此,我们在本调查中全面回顾了各种场景下的调度文献。我们从异构资源、多目标优化和多样化任务等方面探讨了计算与网络融合的调度问题。我们还讨论了可能的解释和影响。最后,我们指出了未来工作面临的重要挑战。
{"title":"A Survey on Scheduling Techniques in Computing and Network Convergence","authors":"Shujiong Tang;Yue Yu;Hui Wang;Guiliang Wang;Wuhui Chen;Zenglin Xu;Song Guo;Wen Gao","doi":"10.1109/COMST.2023.3329027","DOIUrl":"10.1109/COMST.2023.3329027","url":null,"abstract":"The computing demand for massive applications has led to the ubiquitous deployment of computing power. This trend results in the urgent need for higher-level computing resource scheduling services. The Computing and Network Convergence (CNC), a new type of infrastructure, has become a hot topic. To realize the visions of CNC, such as computing-network integration, ubiquitous collaboration, latency-free, and ready-to-use, an intelligent scheduling strategy for CNC should integrate and collaborate with the network. However, the Computing and Network Convergence is built on the cloud, edge, and endless terminals, making the scheduling problem more difficult due to its wide-area requests, available flexibility arrangements, interconnections, and resource adaptations. In view of this, in this survey, we comprehensively review the literature on scheduling in various scenarios. We cover the scheduling problem of Computing and Network Convergence from heterogeneous resources, multiple-objective optimization, and diverse tasks. Possible explanations and implications are discussed. Finally, we point out important challenges for future work.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"26 1","pages":"160-195"},"PeriodicalIF":35.6,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134884066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seamless Connectivity: The Power of Integrating Power Line and Wireless Communications 无缝连接:整合电力线和无线通信的力量
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-10-27 DOI: 10.1109/COMST.2023.3327321
Moisés V. Ribeiro;Mateus de L. Filomeno;Ândrei Camponogara;Thiago Rodrigues Oliveira;Túlio F. Moreira;Stefano Galli;H. Vincent Poor
Aimed at inspiring researchers and practitioners, this paper presents comprehensive and multidimensional discussions of the potential and benefits of integrating power line and wireless communication systems to enhance data communication in both indoor and outdoor environments. By systematically examining the strengths and weaknesses of power line and wireless communication systems, we first elucidate the rationale behind their integration—hybrid communication systems. Then we categorize these hybrid communication systems and provide an in-depth analysis of each category, considering technical, chronological, industrial, and standardization aspects. Moreover, we discuss strategies for designing hybrid communication devices. Next, a qualitative assessment of hybrid communication systems follows, offering guidance for advancing their use, while a concise summary of key lessons imparts valuable insights for future endeavors. Lastly, the paper identifies a range of pertinent topics for further exploration and, consequently, advancing hybrid communication systems for smart grid, Internet of Things, and Industry 4.0 or 5.0 applications.
本文旨在启发研究人员和从业人员,对电力线和无线通信系统集成的潜力和益处进行全面和多维度的讨论,以增强室内和室外环境中的数据通信。通过系统地研究电力线和无线通信系统的优缺点,我们首先阐明了它们集成--混合通信系统--背后的原理。然后,我们对这些混合通信系统进行了分类,并从技术、年代、工业和标准化等方面对每一类系统进行了深入分析。此外,我们还讨论了设计混合通信设备的策略。接下来,我们对混合通信系统进行了定性评估,为推进其应用提供了指导,同时对关键经验进行了简要总结,为未来的工作提供了宝贵的见解。最后,本文提出了一系列有待进一步探索的相关主题,从而推动混合通信系统在智能电网、物联网和工业 4.0 或 5.0 应用中的发展。
{"title":"Seamless Connectivity: The Power of Integrating Power Line and Wireless Communications","authors":"Moisés V. Ribeiro;Mateus de L. Filomeno;Ândrei Camponogara;Thiago Rodrigues Oliveira;Túlio F. Moreira;Stefano Galli;H. Vincent Poor","doi":"10.1109/COMST.2023.3327321","DOIUrl":"10.1109/COMST.2023.3327321","url":null,"abstract":"Aimed at inspiring researchers and practitioners, this paper presents comprehensive and multidimensional discussions of the potential and benefits of integrating power line and wireless communication systems to enhance data communication in both indoor and outdoor environments. By systematically examining the strengths and weaknesses of power line and wireless communication systems, we first elucidate the rationale behind their integration—hybrid communication systems. Then we categorize these hybrid communication systems and provide an in-depth analysis of each category, considering technical, chronological, industrial, and standardization aspects. Moreover, we discuss strategies for designing hybrid communication devices. Next, a qualitative assessment of hybrid communication systems follows, offering guidance for advancing their use, while a concise summary of key lessons imparts valuable insights for future endeavors. Lastly, the paper identifies a range of pertinent topics for further exploration and, consequently, advancing hybrid communication systems for smart grid, Internet of Things, and Industry 4.0 or 5.0 applications.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"26 1","pages":"1-40"},"PeriodicalIF":35.6,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135214243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks 用于验证、保密和恶意节点检测的物理层安全:物联网网络安全的范式转变
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-10-25 DOI: 10.1109/COMST.2023.3327327
Elmehdi Illi;Marwa Qaraqe;Saud Althunibat;Abdullah Alhasanat;Moath Alsafasfeh;Marcus de Ree;Georgios Mantas;Jonathan Rodriguez;Waqas Aman;Saif Al-Kuwari
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to reach significant levels with the upcoming sixth generation of mobile networks (6G). Throughout the past years, wireless standardization units worldwide have been prominently active in the deployment and performance optimization of such IoT networks and fusing them with current and futuristic cellular networks. Nonetheless, the openness of wireless transmissions and the forecasted overwhelm in connected devices will provoke unprecedented security leakages and vulnerabilities. In addition to the key targets of the 6G and IoT, it has been of paramount importance to cater to decent and lightweight security mechanisms in ultra-massively connected heterogeneous networks. Recently, significant efforts have been made to pave the way for the integration of physical layer security (PLS) in contemporary and futuristic networks. The primary motivation behind its deployment resides in its low complexity and ability to provide information-theoretic secure transmissions, which alleviates the complexity burden caused by implementing complex cryptographic schemes. This survey overviews the recent advancement in PLS techniques with a particular interest in its application to the Internet of Things (IoT). We review essentially recent PLS techniques aiming at ensuring message confidentiality along with node/message authentication and malicious nodes’ detection, where their corresponding application scenarios and underlying pros and cons are discussed. On top of that, we explore recent findings in the incorporation of cutting-edge technologies at the physical layer, such as non-orthogonal multiple-access, reconfigurable intelligent surfaces, joint communication and sensing, and optical wireless/Terahertz communications in boosting confidentiality and authentication at the physical layer. Lastly, promising extensions and future directions are discussed based on the quantified pros and cons of each PLS category, opening up ways for timely research directions within the topic and current/future challenges faced by PLS.
随着第六代移动网络(6G)的即将到来,全球商业物联网(IoT)的普及率预计将达到相当高的水平。在过去的几年里,全球无线标准化机构一直积极致力于物联网网络的部署和性能优化,并将其与当前和未来的蜂窝网络相融合。然而,无线传输的开放性和联网设备的迅猛增长将引发前所未有的安全漏洞和漏洞。除了 6G 和物联网的关键目标外,在超大规模连接的异构网络中采用适当的轻量级安全机制也至关重要。最近,人们做出了巨大努力,为在当代和未来网络中集成物理层安全(PLS)铺平道路。部署物理层安全的主要动机在于它的低复杂性和提供信息论安全传输的能力,这减轻了实施复杂加密方案所带来的复杂性负担。本调查概述了 PLS 技术的最新进展,尤其关注其在物联网(IoT)中的应用。我们回顾了近期旨在确保信息保密性、节点/信息身份验证和恶意节点检测的 PLS 技术,并讨论了其相应的应用场景和基本利弊。此外,我们还探讨了在物理层结合尖端技术的最新研究成果,如非正交多址、可重构智能表面、联合通信和传感以及光无线/太赫兹通信,以提高物理层的保密性和认证。最后,根据每个 PLS 类别的量化利弊,讨论了有前景的扩展和未来方向,为该主题内的及时研究方向和 PLS 当前/未来面临的挑战开辟了途径。
{"title":"Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks","authors":"Elmehdi Illi;Marwa Qaraqe;Saud Althunibat;Abdullah Alhasanat;Moath Alsafasfeh;Marcus de Ree;Georgios Mantas;Jonathan Rodriguez;Waqas Aman;Saif Al-Kuwari","doi":"10.1109/COMST.2023.3327327","DOIUrl":"10.1109/COMST.2023.3327327","url":null,"abstract":"The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to reach significant levels with the upcoming sixth generation of mobile networks (6G). Throughout the past years, wireless standardization units worldwide have been prominently active in the deployment and performance optimization of such IoT networks and fusing them with current and futuristic cellular networks. Nonetheless, the openness of wireless transmissions and the forecasted overwhelm in connected devices will provoke unprecedented security leakages and vulnerabilities. In addition to the key targets of the 6G and IoT, it has been of paramount importance to cater to decent and lightweight security mechanisms in ultra-massively connected heterogeneous networks. Recently, significant efforts have been made to pave the way for the integration of physical layer security (PLS) in contemporary and futuristic networks. The primary motivation behind its deployment resides in its low complexity and ability to provide information-theoretic secure transmissions, which alleviates the complexity burden caused by implementing complex cryptographic schemes. This survey overviews the recent advancement in PLS techniques with a particular interest in its application to the Internet of Things (IoT). We review essentially recent PLS techniques aiming at ensuring message confidentiality along with node/message authentication and malicious nodes’ detection, where their corresponding application scenarios and underlying pros and cons are discussed. On top of that, we explore recent findings in the incorporation of cutting-edge technologies at the physical layer, such as non-orthogonal multiple-access, reconfigurable intelligent surfaces, joint communication and sensing, and optical wireless/Terahertz communications in boosting confidentiality and authentication at the physical layer. Lastly, promising extensions and future directions are discussed based on the quantified pros and cons of each PLS category, opening up ways for timely research directions within the topic and current/future challenges faced by PLS.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"26 1","pages":"347-388"},"PeriodicalIF":35.6,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135158607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain Generalization in Machine Learning Models for Wireless Communications: Concepts, State-of-the-Art, and Open Issues 无线通信机器学习模型的领域泛化:概念、最新技术和开放问题
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-10-20 DOI: 10.1109/COMST.2023.3326399
Mohamed Akrout;Amal Feriani;Faouzi Bellili;Amine Mezghani;Ekram Hossain
Data-driven machine learning (ML) is promoted as one potential technology to be used in next-generation wireless systems. This led to a large body of research work that applies ML techniques to solve problems in different layers of the wireless transmission link. However, most of these applications rely on supervised learning which assumes that the source (training) and target (test) data are independent and identically distributed (i.i.d). This assumption is often violated in the real world due to domain or distribution shifts between the source and the target data. Thus, it is important to ensure that these algorithms generalize to out-of-distribution (OOD) data. In this context, domain generalization (DG) tackles the OOD-related issues by learning models on different and distinct source domains/datasets with generalization capabilities to unseen new domains without additional finetuning. Motivated by the importance of DG requirements for wireless applications, we present a comprehensive overview of the recent developments in DG and the different sources of domain shift. We also summarize the existing DG methods and review their applications in selected wireless communication problems, and conclude with insights and open questions.
数据驱动的机器学习(ML)被认为是下一代无线系统的潜在技术之一。这导致了大量的研究工作,应用机器学习技术来解决无线传输链路的不同层的问题。然而,大多数这些应用程序依赖于监督学习,它假设源(训练)和目标(测试)数据是独立和同分布的(i.i.d)。在现实世界中,由于源数据和目标数据之间的域或分布变化,这个假设经常被违背。因此,确保这些算法推广到分布外(OOD)数据是很重要的。在这种情况下,域泛化(DG)通过在不同的和不同的源域/数据集上学习模型来解决ood相关的问题,这些模型具有对未见过的新域的泛化能力,而无需额外的微调。由于无线应用中DG要求的重要性,我们对DG的最新发展和不同的域转移来源进行了全面概述。我们还总结了现有的DG方法,并回顾了它们在选定的无线通信问题中的应用,最后提出了见解和悬而未决的问题。
{"title":"Domain Generalization in Machine Learning Models for Wireless Communications: Concepts, State-of-the-Art, and Open Issues","authors":"Mohamed Akrout;Amal Feriani;Faouzi Bellili;Amine Mezghani;Ekram Hossain","doi":"10.1109/COMST.2023.3326399","DOIUrl":"10.1109/COMST.2023.3326399","url":null,"abstract":"Data-driven machine learning (ML) is promoted as one potential technology to be used in next-generation wireless systems. This led to a large body of research work that applies ML techniques to solve problems in different layers of the wireless transmission link. However, most of these applications rely on supervised learning which assumes that the source (training) and target (test) data are independent and identically distributed (i.i.d). This assumption is often violated in the real world due to domain or distribution shifts between the source and the target data. Thus, it is important to ensure that these algorithms generalize to out-of-distribution (OOD) data. In this context, domain generalization (DG) tackles the OOD-related issues by learning models on different and distinct source domains/datasets with generalization capabilities to unseen new domains without additional finetuning. Motivated by the importance of DG requirements for wireless applications, we present a comprehensive overview of the recent developments in DG and the different sources of domain shift. We also summarize the existing DG methods and review their applications in selected wireless communication problems, and conclude with insights and open questions.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"25 4","pages":"3014-3037"},"PeriodicalIF":35.6,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135784599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey and Comparison of Post-Quantum and Quantum Blockchains 后量子区块链与量子区块链的调查与比较
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-10-19 DOI: 10.1109/COMST.2023.3325761
Zebo Yang;Haneen Alfauri;Behrooz Farkiani;Raj Jain;Roberto Di Pietro;Aiman Erbad
Blockchains have gained substantial attention from academia and industry for their ability to facilitate decentralized trust and communications. However, the rapid progress of quantum computing poses a significant threat to the security of existing blockchain technologies. Notably, the emergence of Shor’s and Grover’s algorithms raises concerns regarding the compromise of the cryptographic systems underlying blockchains. Consequently, it is essential to develop methods that reinforce blockchain technology against quantum attacks. In response to this challenge, two distinct approaches have been proposed. The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. The second approach explores quantum blockchains, which leverage the power of quantum computers and networks to rebuild the foundations of blockchains. This paper aims to provide a comprehensive overview and comparison of post-quantum and quantum blockchains while exploring open questions and remaining challenges in these domains. It offers an in-depth introduction, examines differences in blockchain structure, security, privacy, and other key factors, and concludes by discussing current research trends.
区块链因其促进去中心化信任和通信的能力而受到学术界和工业界的广泛关注。然而,量子计算的快速发展对现有区块链技术的安全性构成了重大威胁。值得注意的是,肖尔算法和格罗弗算法的出现引发了人们对区块链底层加密系统受损的担忧。因此,必须开发出能够加强区块链技术抵御量子攻击的方法。为了应对这一挑战,人们提出了两种不同的方法。第一种方法涉及后量子区块链,旨在利用经典加密算法抵御量子攻击。第二种方法是探索量子区块链,利用量子计算机和网络的力量重建区块链的基础。本文旨在对后量子区块链和量子区块链进行全面概述和比较,同时探讨这些领域的未决问题和依然存在的挑战。本文深入介绍了后量子区块链和量子区块链,研究了区块链结构、安全性、隐私和其他关键因素的差异,最后讨论了当前的研究趋势。
{"title":"A Survey and Comparison of Post-Quantum and Quantum Blockchains","authors":"Zebo Yang;Haneen Alfauri;Behrooz Farkiani;Raj Jain;Roberto Di Pietro;Aiman Erbad","doi":"10.1109/COMST.2023.3325761","DOIUrl":"10.1109/COMST.2023.3325761","url":null,"abstract":"Blockchains have gained substantial attention from academia and industry for their ability to facilitate decentralized trust and communications. However, the rapid progress of quantum computing poses a significant threat to the security of existing blockchain technologies. Notably, the emergence of Shor’s and Grover’s algorithms raises concerns regarding the compromise of the cryptographic systems underlying blockchains. Consequently, it is essential to develop methods that reinforce blockchain technology against quantum attacks. In response to this challenge, two distinct approaches have been proposed. The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. The second approach explores quantum blockchains, which leverage the power of quantum computers and networks to rebuild the foundations of blockchains. This paper aims to provide a comprehensive overview and comparison of post-quantum and quantum blockchains while exploring open questions and remaining challenges in these domains. It offers an in-depth introduction, examines differences in blockchain structure, security, privacy, and other key factors, and concludes by discussing current research trends.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"26 2","pages":"967-1002"},"PeriodicalIF":35.6,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10288193","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135057264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies X.509公钥基础设施、证书撤销及其在区块链和分类账技术上的现代实现的调查
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-10-13 DOI: 10.1109/COMST.2023.3323640
Salabat Khan;Fei Luo;Zijian Zhang;Farhan Ullah;Farhan Amin;Syed Furqan Qadri;Md Belal Bin Heyat;Rukhsana Ruby;Lu Wang;Shamsher Ullah;Meng Li;Victor C. M. Leung;Kaishun Wu
Cyber-attacks are becoming more common against Internet users due to the increasing dependency on online communication in their daily lives. X.509 Public-Key Infrastructure (PKIX) is the most widely adopted and used system to secure online communications and digital identities. However, different attack vectors exist against the PKIX system, which attackers exploit to breach the security of the reliant protocols. Recently, various projects (e.g., Let’s Encrypt and Google Certificate Transparency) have been started to encrypt online communications, fix PKIX vulnerabilities, and guard Internet users against cyber-attacks. This survey focuses on classical PKIX proposals, certificate revocation proposals, and their implementation on blockchain as well as ledger technologies. First, we discuss the PKIX architecture, the history of the World Wide Web, the certificate issuance process, and possible attacks on the certificate issuance process. Second, a taxonomy of PKIX proposals, revocation proposals, and their modern implementation is provided. Then, a set of evaluation metrics is defined for comparison. Finally, the leading proposals are compared using 15 evaluation metrics and 13 cyber-attacks before presenting the lessons learned and suggesting future PKIX and revocation research.
由于人们在日常生活中越来越依赖在线交流,针对互联网用户的网络攻击变得越来越普遍。X.509公钥基础设施(PKIX)是最广泛采用和使用的系统,用于保护在线通信和数字身份。然而,针对PKIX系统存在不同的攻击向量,攻击者利用这些攻击向量来破坏依赖协议的安全性。最近,各种项目(例如Let’s Encrypt和b谷歌Certificate Transparency)已经开始加密在线通信,修复PKIX漏洞,保护互联网用户免受网络攻击。本调查的重点是经典的PKIX提案,证书撤销提案,以及它们在区块链和分类账技术上的实现。首先,我们讨论了PKIX体系结构、万维网的历史、证书颁发过程以及对证书颁发过程可能的攻击。其次,提供了PKIX提案、撤销提案及其现代实现的分类。然后,定义一组评价指标进行比较。最后,在提出经验教训并建议未来的PKIX和撤销研究之前,使用15个评估指标和13个网络攻击对领先的提案进行了比较。
{"title":"A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies","authors":"Salabat Khan;Fei Luo;Zijian Zhang;Farhan Ullah;Farhan Amin;Syed Furqan Qadri;Md Belal Bin Heyat;Rukhsana Ruby;Lu Wang;Shamsher Ullah;Meng Li;Victor C. M. Leung;Kaishun Wu","doi":"10.1109/COMST.2023.3323640","DOIUrl":"10.1109/COMST.2023.3323640","url":null,"abstract":"Cyber-attacks are becoming more common against Internet users due to the increasing dependency on online communication in their daily lives. X.509 Public-Key Infrastructure (PKIX) is the most widely adopted and used system to secure online communications and digital identities. However, different attack vectors exist against the PKIX system, which attackers exploit to breach the security of the reliant protocols. Recently, various projects (e.g., Let’s Encrypt and Google Certificate Transparency) have been started to encrypt online communications, fix PKIX vulnerabilities, and guard Internet users against cyber-attacks. This survey focuses on classical PKIX proposals, certificate revocation proposals, and their implementation on blockchain as well as ledger technologies. First, we discuss the PKIX architecture, the history of the World Wide Web, the certificate issuance process, and possible attacks on the certificate issuance process. Second, a taxonomy of PKIX proposals, revocation proposals, and their modern implementation is provided. Then, a set of evaluation metrics is defined for comparison. Finally, the leading proposals are compared using 15 evaluation metrics and 13 cyber-attacks before presenting the lessons learned and suggesting future PKIX and revocation research.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"25 4","pages":"2529-2568"},"PeriodicalIF":35.6,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135783336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward Autonomous Multi-UAV Wireless Network: A Survey of Reinforcement Learning-Based Approaches 面向自主多无人机无线网络:基于强化学习的方法综述
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-10-12 DOI: 10.1109/COMST.2023.3323344
Yu Bai;Hui Zhao;Xin Zhang;Zheng Chang;Riku Jäntti;Kun Yang
Unmanned aerial vehicle (UAV)-based wireless networks have received increasing research interest in recent years and are gradually being utilized in various aspects of our society. The growing complexity of UAV applications such as disaster management, plant protection, and environment monitoring, has resulted in escalating and stringent requirements for UAV networks that a single UAV cannot fulfill. To address this, multi-UAV wireless networks (MUWNs) have emerged, offering enhanced resource-carrying capacity and enabling collaborative mission completion by multiple UAVs. However, the effective operation of MUWNs necessitates a higher level of autonomy and intelligence, particularly in decision-making and multi-objective optimization under diverse environmental conditions. Reinforcement Learning (RL), an intelligent and goal-oriented decision-making approach, has emerged as a promising solution for addressing the intricate tasks associated with MUWNs. As one may notice, the literature still lacks a comprehensive survey of recent advancements in RL-based MUWNs. Thus, this paper aims to bridge this gap by providing a comprehensive review of RL-based approaches in the context of autonomous MUWNs. We present an informative overview of RL and demonstrate its application within the framework of MUWNs. Specifically, we summarize various applications of RL in MUWNs, including data access, sensing and collection, resource allocation for wireless connectivity, UAV-assisted mobile edge computing, localization, trajectory planning, and network security. Furthermore, we identify and discuss several open challenges based on the insights gained from our review.
基于无人机(UAV)的无线网络近年来受到越来越多的研究兴趣,并逐渐应用于社会的各个方面。无人机应用的日益复杂,如灾害管理、植物保护和环境监测,导致对无人机网络的要求不断升级和严格,单个无人机无法满足。为了解决这个问题,多无人机无线网络(MUWNs)已经出现,提供增强的资源承载能力,并使多无人机能够协同完成任务。然而,多目标网络的有效运行需要更高的自主性和智能水平,特别是在不同环境条件下的决策和多目标优化方面。强化学习(RL)是一种智能的、目标导向的决策方法,已经成为解决与MUWNs相关的复杂任务的一种有前途的解决方案。正如人们可能注意到的那样,文献仍然缺乏对基于rl的MUWNs的最新进展的全面调查。因此,本文旨在通过对自主MUWNs背景下基于强化学习的方法进行全面回顾来弥合这一差距。我们介绍了RL的信息概述,并展示了它在MUWNs框架内的应用。具体来说,我们总结了RL在MUWNs中的各种应用,包括数据访问、传感和收集、无线连接的资源分配、无人机辅助的移动边缘计算、定位、轨迹规划和网络安全。此外,我们根据从回顾中获得的见解,确定并讨论了几个开放的挑战。
{"title":"Toward Autonomous Multi-UAV Wireless Network: A Survey of Reinforcement Learning-Based Approaches","authors":"Yu Bai;Hui Zhao;Xin Zhang;Zheng Chang;Riku Jäntti;Kun Yang","doi":"10.1109/COMST.2023.3323344","DOIUrl":"10.1109/COMST.2023.3323344","url":null,"abstract":"Unmanned aerial vehicle (UAV)-based wireless networks have received increasing research interest in recent years and are gradually being utilized in various aspects of our society. The growing complexity of UAV applications such as disaster management, plant protection, and environment monitoring, has resulted in escalating and stringent requirements for UAV networks that a single UAV cannot fulfill. To address this, multi-UAV wireless networks (MUWNs) have emerged, offering enhanced resource-carrying capacity and enabling collaborative mission completion by multiple UAVs. However, the effective operation of MUWNs necessitates a higher level of autonomy and intelligence, particularly in decision-making and multi-objective optimization under diverse environmental conditions. Reinforcement Learning (RL), an intelligent and goal-oriented decision-making approach, has emerged as a promising solution for addressing the intricate tasks associated with MUWNs. As one may notice, the literature still lacks a comprehensive survey of recent advancements in RL-based MUWNs. Thus, this paper aims to bridge this gap by providing a comprehensive review of RL-based approaches in the context of autonomous MUWNs. We present an informative overview of RL and demonstrate its application within the framework of MUWNs. Specifically, we summarize various applications of RL in MUWNs, including data access, sensing and collection, resource allocation for wireless connectivity, UAV-assisted mobile edge computing, localization, trajectory planning, and network security. Furthermore, we identify and discuss several open challenges based on the insights gained from our review.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"25 4","pages":"3038-3067"},"PeriodicalIF":35.6,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10283826","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135783332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge Video Analytics: A Survey on Applications, Systems and Enabling Techniques 边缘视频分析:应用、系统和使能技术综述
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-10-10 DOI: 10.1109/COMST.2023.3323091
Renjie Xu;Saiedeh Razavi;Rong Zheng
Video, as a key driver in the global explosion of digital information, can create tremendous benefits for human society. Governments and enterprises are deploying innumerable cameras for a variety of applications, e.g., law enforcement, emergency management, traffic control, and security surveillance, all facilitated by video analytics (VA). This trend is spurred by the rapid advancement of deep learning (DL), which enables more precise models for object classification, detection, and tracking. Meanwhile, with the proliferation of Internet-connected devices, massive amounts of data are generated daily, overwhelming the cloud. Edge computing, an emerging paradigm that moves workloads and services from the network core to the network edge, has been widely recognized as a promising solution. The resulting new intersection, edge video analytics (EVA), begins to attract widespread attention. Nevertheless, only a few loosely-related surveys exist on this topic. The basic concepts of EVA (e.g., definition, architectures) were not fully elucidated due to the rapid development of this domain. To fill these gaps, we provide a comprehensive survey of the recent efforts on EVA. In this paper, we first review the fundamentals of edge computing, followed by an overview of VA. EVA systems and their enabling techniques are discussed next. In addition, we introduce prevalent frameworks and datasets to aid future researchers in the development of EVA systems. Finally, we discuss existing challenges and foresee future research directions. We believe this survey will help readers comprehend the relationship between VA and edge computing, and spark new ideas on EVA.
视频作为全球数字信息爆炸的关键驱动力,可以为人类社会创造巨大的利益。政府和企业正在为各种应用部署无数摄像机,例如,执法、应急管理、交通控制和安全监控,所有这些都得益于视频分析(VA)。这一趋势是由深度学习(DL)的快速发展所推动的,它为目标分类、检测和跟踪提供了更精确的模型。与此同时,随着联网设备的激增,每天都会产生大量数据,使云计算不堪重负。边缘计算是一种将工作负载和服务从网络核心转移到网络边缘的新兴范式,已被广泛认为是一种有前途的解决方案。由此产生的新交叉领域——边缘视频分析(EVA)开始引起广泛关注。然而,关于这一主题的调查很少。由于该领域的快速发展,EVA的基本概念(例如,定义、体系结构)没有得到充分阐明。为了填补这些空白,我们对经济增加值的最新工作进行了全面的调查。在本文中,我们首先回顾了边缘计算的基础知识,然后概述了EVA。接下来讨论了EVA系统及其使能技术。此外,我们介绍了流行的框架和数据集,以帮助未来的研究人员在EVA系统的发展。最后,讨论了当前面临的挑战,展望了未来的研究方向。我们相信这项调查将有助于读者理解增值价值和边缘计算之间的关系,并激发出关于增值价值的新想法。
{"title":"Edge Video Analytics: A Survey on Applications, Systems and Enabling Techniques","authors":"Renjie Xu;Saiedeh Razavi;Rong Zheng","doi":"10.1109/COMST.2023.3323091","DOIUrl":"10.1109/COMST.2023.3323091","url":null,"abstract":"Video, as a key driver in the global explosion of digital information, can create tremendous benefits for human society. Governments and enterprises are deploying innumerable cameras for a variety of applications, e.g., law enforcement, emergency management, traffic control, and security surveillance, all facilitated by video analytics (VA). This trend is spurred by the rapid advancement of deep learning (DL), which enables more precise models for object classification, detection, and tracking. Meanwhile, with the proliferation of Internet-connected devices, massive amounts of data are generated daily, overwhelming the cloud. Edge computing, an emerging paradigm that moves workloads and services from the network core to the network edge, has been widely recognized as a promising solution. The resulting new intersection, edge video analytics (EVA), begins to attract widespread attention. Nevertheless, only a few loosely-related surveys exist on this topic. The basic concepts of EVA (e.g., definition, architectures) were not fully elucidated due to the rapid development of this domain. To fill these gaps, we provide a comprehensive survey of the recent efforts on EVA. In this paper, we first review the fundamentals of edge computing, followed by an overview of VA. EVA systems and their enabling techniques are discussed next. In addition, we introduce prevalent frameworks and datasets to aid future researchers in the development of EVA systems. Finally, we discuss existing challenges and foresee future research directions. We believe this survey will help readers comprehend the relationship between VA and edge computing, and spark new ideas on EVA.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"25 4","pages":"2951-2982"},"PeriodicalIF":35.6,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136206858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Resource-Efficient AIoT System With Cross-Level Optimization: A Survey 通过跨层优化实现资源高效的人工智能物联网系统:调查
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-27 DOI: 10.1109/COMST.2023.3319952
Sicong Liu;Bin Guo;Cheng Fang;Ziqi Wang;Shiyan Luo;Zimu Zhou;Zhiwen Yu
The emerging field of artificial intelligence of things (AIoT, AI+IoT) is driven by the widespread use of intelligent infrastructures and the impressive success of deep learning (DL). With the deployment of DL on various intelligent infrastructures featuring rich sensors and weak DL computing capabilities, a diverse range of AIoT applications has become possible. However, DL models are notoriously resource-intensive. Existing research strives to realize near-/realtime inference of AIoT live data and low-cost training using AIoT datasets on resource-scare infrastructures. Accordingly, the accuracy and responsiveness of DL models are bounded by resource availability. To this end, the algorithm-system co-design that jointly optimizes the resource-friendly DL models and model-adaptive system scheduling improves the runtime resource availability and thus pushes the performance boundary set by the standalone level. Unlike previous surveys on resource-friendly DL models or hand-crafted DL compilers/frameworks with partially fine-tuned components, this survey aims to provide a broader optimization space for more free resource-performance tradeoffs. The cross-level optimization landscape involves various granularity, including the DL model, computation graph, operator, memory schedule, and hardware instructor in both on-device and distributed paradigms. Furthermore, due to the dynamic nature of AIoT context, which includes heterogeneous hardware, agnostic sensing data, varying user-specified performance demands, and resource constraints, this survey explores the context-aware inter-/intra-device controllers for automatic cross-level adaptation. Additionally, we identify some potential directions for resource-efficient AIoT systems. By consolidating problems and techniques scattered over diverse levels, we aim to help readers understand their connections and stimulate further discussions.
智能基础设施的广泛应用和深度学习(DL)的巨大成功推动了新兴的人工智能物联网(AIoT,AI+IoT)领域。随着深度学习在具有丰富传感器和较弱深度学习计算能力的各种智能基础设施上的部署,各种 AIoT 应用成为可能。然而,DL 模型是众所周知的资源密集型模型。现有研究致力于在资源紧张的基础设施上使用人工智能物联网数据集实现近实时/实时推理和低成本训练。因此,DL 模型的准确性和响应速度受到资源可用性的限制。为此,联合优化资源友好型 DL 模型和模型自适应系统调度的算法-系统协同设计提高了运行时的资源可用性,从而突破了独立水平设定的性能边界。与以往关于资源友好型 DL 模型或带有部分微调组件的手工制作 DL 编译器/框架的调查不同,本调查旨在为更自由的资源-性能权衡提供更广阔的优化空间。跨级别优化涉及各种粒度,包括 DL 模型、计算图、算子、内存调度,以及设备上和分布式范例中的硬件指导员。此外,由于人工智能物联网上下文的动态性质,包括异构硬件、不可知觉的传感数据、不同的用户指定性能需求和资源限制,本调查探讨了自动跨级适应的上下文感知设备间/设备内控制器。此外,我们还确定了资源节约型人工智能物联网系统的一些潜在方向。通过整合分散在不同层面的问题和技术,我们旨在帮助读者了解它们之间的联系,并激发进一步的讨论。
{"title":"Enabling Resource-Efficient AIoT System With Cross-Level Optimization: A Survey","authors":"Sicong Liu;Bin Guo;Cheng Fang;Ziqi Wang;Shiyan Luo;Zimu Zhou;Zhiwen Yu","doi":"10.1109/COMST.2023.3319952","DOIUrl":"10.1109/COMST.2023.3319952","url":null,"abstract":"The emerging field of artificial intelligence of things (AIoT, AI+IoT) is driven by the widespread use of intelligent infrastructures and the impressive success of deep learning (DL). With the deployment of DL on various intelligent infrastructures featuring rich sensors and weak DL computing capabilities, a diverse range of AIoT applications has become possible. However, DL models are notoriously resource-intensive. Existing research strives to realize near-/realtime inference of AIoT live data and low-cost training using AIoT datasets on resource-scare infrastructures. Accordingly, the accuracy and responsiveness of DL models are bounded by resource availability. To this end, the algorithm-system co-design that jointly optimizes the resource-friendly DL models and model-adaptive system scheduling improves the runtime resource availability and thus pushes the performance boundary set by the standalone level. Unlike previous surveys on resource-friendly DL models or hand-crafted DL compilers/frameworks with partially fine-tuned components, this survey aims to provide a broader optimization space for more free resource-performance tradeoffs. The cross-level optimization landscape involves various granularity, including the DL model, computation graph, operator, memory schedule, and hardware instructor in both on-device and distributed paradigms. Furthermore, due to the dynamic nature of AIoT context, which includes heterogeneous hardware, agnostic sensing data, varying user-specified performance demands, and resource constraints, this survey explores the context-aware inter-/intra-device controllers for automatic cross-level adaptation. Additionally, we identify some potential directions for resource-efficient AIoT systems. By consolidating problems and techniques scattered over diverse levels, we aim to help readers understand their connections and stimulate further discussions.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"26 1","pages":"389-427"},"PeriodicalIF":35.6,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135794555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey 基于机器学习的通信系统和网络中的对抗性攻击和防御:当代调查
IF 35.6 2区 化学 Q2 CHEMISTRY, MULTIDISCIPLINARY Pub Date : 2023-09-26 DOI: 10.1109/COMST.2023.3319492
Yulong Wang;Tong Sun;Shenghong Li;Xin Yuan;Wei Ni;Ekram Hossain;H. Vincent Poor
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have been gaining significant attention due to the rapidly growing applications of deep learning in communication networks. This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques, with a focus on DNN-based classification models for communication applications. Specifically, we conduct a comprehensive classification of recent adversarial attack methods and state-of-the-art adversarial defense techniques based on attack principles, and present them in visually appealing tables and tree diagrams. This is based on a rigorous evaluation of the existing works, including an analysis of their strengths and limitations. We also categorize the methods into counter-attack detection and robustness enhancement, with a specific focus on regularization-based methods for enhancing robustness. New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks, and a hierarchical classification of the latest defense methods is provided, highlighting the challenges of balancing training costs with performance, maintaining clean accuracy, overcoming the effect of gradient masking, and ensuring method transferability. At last, the lessons learned and open challenges are summarized with future research opportunities recommended.
由于深度学习在通信网络中的应用迅速增长,机器学习和深度神经网络(DNN)中的对抗性攻击和防御受到了极大的关注。该调查提供了对抗性攻击和防御技术领域最新进展的全面概述,重点是基于dnn的通信应用分类模型。具体来说,我们根据攻击原理对最近的对抗性攻击方法和最先进的对抗性防御技术进行了全面的分类,并以视觉上吸引人的表格和树形图的形式呈现出来。这是基于对现有作品的严格评估,包括对其优势和局限性的分析。我们还将这些方法分为反击检测和鲁棒性增强,并特别关注基于正则化的增强鲁棒性的方法。还探索了新的攻击途径,包括基于搜索的,基于决策的,基于dropbased的和物理世界的攻击,并提供了最新防御方法的分层分类,突出了平衡训练成本和性能的挑战,保持干净的准确性,克服梯度掩蔽的影响,并确保方法可转移性。最后,总结了研究的经验教训和面临的挑战,并提出了未来的研究机会。
{"title":"Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey","authors":"Yulong Wang;Tong Sun;Shenghong Li;Xin Yuan;Wei Ni;Ekram Hossain;H. Vincent Poor","doi":"10.1109/COMST.2023.3319492","DOIUrl":"10.1109/COMST.2023.3319492","url":null,"abstract":"Adversarial attacks and defenses in machine learning and deep neural network (DNN) have been gaining significant attention due to the rapidly growing applications of deep learning in communication networks. This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques, with a focus on DNN-based classification models for communication applications. Specifically, we conduct a comprehensive classification of recent adversarial attack methods and state-of-the-art adversarial defense techniques based on attack principles, and present them in visually appealing tables and tree diagrams. This is based on a rigorous evaluation of the existing works, including an analysis of their strengths and limitations. We also categorize the methods into counter-attack detection and robustness enhancement, with a specific focus on regularization-based methods for enhancing robustness. New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks, and a hierarchical classification of the latest defense methods is provided, highlighting the challenges of balancing training costs with performance, maintaining clean accuracy, overcoming the effect of gradient masking, and ensuring method transferability. At last, the lessons learned and open challenges are summarized with future research opportunities recommended.","PeriodicalId":34,"journal":{"name":"Crystal Growth & Design","volume":"25 4","pages":"2245-2298"},"PeriodicalIF":35.6,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135784392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Crystal Growth & Design
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1