首页 > 最新文献

IEEE INFOCOM 2023 - IEEE Conference on Computer Communications最新文献

英文 中文
Achieving Resilient and Performance-Guaranteed Routing in Space-Terrestrial Integrated Networks 在空间-地面综合网络中实现弹性和性能保证路由
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229104
Zeqi Lai, Hewu Li, Yikun Wang, Qian Wu, Yangtao Deng, Jun Liu, Yuan-Fang Li, Jianping Wu
Satellite routers in emerging space-terrestrial integrated networks (STINs) are operated in a failure-prone, intermittent and resource-constrained space environment, making it very critical but challenging to cope with various network failures effectively. Existing resilient routing approaches either suffer from continuous re-convergences with low network reachability, or involve prohibitive pre-computation and storage overhead due to the huge amount of possible failure scenarios in STINs.This paper presents StarCure, a novel resilient routing mechanism for futuristic STINs. StarCure aims at achieving fast and efficient routing restoration, while maintaining the low-latency, high-bandwidth service capabilities in failure-prone space environments. First, StarCure incorporates a new network model, called the topology-stabilizing model (TSM) to eliminate topological uncertainty by converting the topology variations caused by various failures to traffic variations. Second, StarCure adopts an adaptive hybrid routing scheme, collaboratively combining a constraint optimizer to efficiently handle predictable failures, together with a location-guided protection routing strategy to quickly deal with unexpected failures. Extensive evaluations driven by realistic constellation information show that, StarCure can protect routing against various failures, achieving close-to-100% reachability and better performance restoration with acceptable system overhead, as compared to other existing resilience solutions.
新兴空间-地面综合网络(STINs)中的卫星路由器在故障易发、间歇性和资源受限的空间环境中运行,因此有效应对各种网络故障非常关键,但也具有挑战性。现有的弹性路由方法要么遭受低网络可达性的持续重新收敛的困扰,要么由于stin中可能出现的大量故障场景而涉及令人望而却步的预计算和存储开销。本文提出了StarCure,一种用于未来STINs的新型弹性路由机制。StarCure旨在实现快速高效的路由恢复,同时在故障易发的空间环境中保持低延迟、高带宽的服务能力。首先,StarCure引入了一种新的网络模型,称为拓扑稳定模型(TSM),通过将各种故障引起的拓扑变化转换为流量变化来消除拓扑不确定性。其次,StarCure采用自适应混合路由方案,将约束优化器与位置导向保护路由策略协同结合,有效处理可预测的故障,并快速处理不可预测的故障。由实际星座信息驱动的广泛评估表明,与其他现有的弹性解决方案相比,StarCure可以保护路由免受各种故障的影响,在可接受的系统开销下实现接近100%的可达性和更好的性能恢复。
{"title":"Achieving Resilient and Performance-Guaranteed Routing in Space-Terrestrial Integrated Networks","authors":"Zeqi Lai, Hewu Li, Yikun Wang, Qian Wu, Yangtao Deng, Jun Liu, Yuan-Fang Li, Jianping Wu","doi":"10.1109/INFOCOM53939.2023.10229104","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229104","url":null,"abstract":"Satellite routers in emerging space-terrestrial integrated networks (STINs) are operated in a failure-prone, intermittent and resource-constrained space environment, making it very critical but challenging to cope with various network failures effectively. Existing resilient routing approaches either suffer from continuous re-convergences with low network reachability, or involve prohibitive pre-computation and storage overhead due to the huge amount of possible failure scenarios in STINs.This paper presents StarCure, a novel resilient routing mechanism for futuristic STINs. StarCure aims at achieving fast and efficient routing restoration, while maintaining the low-latency, high-bandwidth service capabilities in failure-prone space environments. First, StarCure incorporates a new network model, called the topology-stabilizing model (TSM) to eliminate topological uncertainty by converting the topology variations caused by various failures to traffic variations. Second, StarCure adopts an adaptive hybrid routing scheme, collaboratively combining a constraint optimizer to efficiently handle predictable failures, together with a location-guided protection routing strategy to quickly deal with unexpected failures. Extensive evaluations driven by realistic constellation information show that, StarCure can protect routing against various failures, achieving close-to-100% reachability and better performance restoration with acceptable system overhead, as compared to other existing resilience solutions.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131930245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prophet: An Efficient Feature Indexing Mechanism for Similarity Data Sharing at Network Edge Prophet:一种高效的网络边缘相似数据共享特征索引机制
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228941
Yuchen Sun, Deke Guo, Lailong Luo, Li Liu, Xinyi Li, Junjie Xie
As a promising infrastructure, edge storage systems have drawn many attempts to efficiently distribute and share data among edge servers. However, it remains open to meeting the increasing demand for similarity retrieval across servers. The intrinsic reason is that the existing solutions can only return an exact data match for a query while more general edge applications require the data similar to a query input from any server. To fill this gap, this paper pioneers a new paradigm to support high-dimensional similarity search at network edges. Specifically, we propose Prophet, the first known architecture for similarity data indexing. We first divide the feature space of data into plenty of subareas, then project both subareas and edge servers into a virtual plane where the distances between any two points can reflect not only data similarity but also network latency. When any edge server submits a request for data insert, delete, or query, it computes the data feature and the virtual coordinates; then iteratively forwards the request through greedy routing based on the forwarding tables and the virtual coordinates. By Prophet, similar high-dimensional features would be stored by a common server or several nearby servers. Compared with distributed hash tables in P2P networks, Prophet requires logarithmic servers to access for a data request and reduces the network latency from the logarithmic to the constant level of the server number. Experimental results indicate that Prophet achieves comparable retrieval accuracy and shortens the query latency by 55%~70% compared with centralized schemes.
边缘存储系统作为一种很有前途的基础设施,在边缘服务器之间有效地分发和共享数据已经引起了许多尝试。但是,它仍然可以满足不断增长的跨服务器相似性检索需求。其内在原因是现有的解决方案只能为查询返回精确的数据匹配,而更通用的边缘应用程序需要类似于来自任何服务器的查询输入的数据。为了填补这一空白,本文开创了一种新的范式来支持网络边缘的高维相似性搜索。具体来说,我们提出了Prophet,这是已知的第一个用于相似数据索引的架构。我们首先将数据的特征空间划分为大量的子区域,然后将子区域和边缘服务器投影到一个虚拟平面中,其中任意两点之间的距离不仅可以反映数据相似度,还可以反映网络延迟。当任何边缘服务器提交数据插入、删除或查询请求时,计算数据特征和虚拟坐标;然后根据转发表和虚拟坐标通过贪婪路由迭代转发请求。通过Prophet,类似的高维特征将存储在一个公共服务器或附近的几个服务器上。与P2P网络中的分布式哈希表相比,每次数据请求都需要对数服务器访问,将网络延迟从服务器数量的对数级降低到常数级。实验结果表明,与集中式方案相比,该方案的检索精度相当,查询延迟缩短了55%~70%。
{"title":"Prophet: An Efficient Feature Indexing Mechanism for Similarity Data Sharing at Network Edge","authors":"Yuchen Sun, Deke Guo, Lailong Luo, Li Liu, Xinyi Li, Junjie Xie","doi":"10.1109/INFOCOM53939.2023.10228941","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228941","url":null,"abstract":"As a promising infrastructure, edge storage systems have drawn many attempts to efficiently distribute and share data among edge servers. However, it remains open to meeting the increasing demand for similarity retrieval across servers. The intrinsic reason is that the existing solutions can only return an exact data match for a query while more general edge applications require the data similar to a query input from any server. To fill this gap, this paper pioneers a new paradigm to support high-dimensional similarity search at network edges. Specifically, we propose Prophet, the first known architecture for similarity data indexing. We first divide the feature space of data into plenty of subareas, then project both subareas and edge servers into a virtual plane where the distances between any two points can reflect not only data similarity but also network latency. When any edge server submits a request for data insert, delete, or query, it computes the data feature and the virtual coordinates; then iteratively forwards the request through greedy routing based on the forwarding tables and the virtual coordinates. By Prophet, similar high-dimensional features would be stored by a common server or several nearby servers. Compared with distributed hash tables in P2P networks, Prophet requires logarithmic servers to access for a data request and reduces the network latency from the logarithmic to the constant level of the server number. Experimental results indicate that Prophet achieves comparable retrieval accuracy and shortens the query latency by 55%~70% compared with centralized schemes.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132191451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Power of Age-based Reward in Fresh Information Acquisition 基于年龄的奖励在新信息获取中的作用
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229008
Zhiyuan Wang, Qingkai Meng, Shan Zhang, Hongbin Luo
Many Internet platforms collect fresh information of various points of interest (PoIs) relying on users who happen to be nearby the PoIs. The platform will offer reward to incentivize users and compensate their costs incurred from information acquisition. In practice, the user cost (and its distribution) is hidden to the platform, thus it is challenging to determine the optimal reward. In this paper, we investigate how the platform dynamically rewards the users, aiming to jointly reduce the age of information (AoI) and the operational expenditure (OpEx). Due to the hidden cost distribution, this is an online non-convex learning problem with partial feedback. To overcome the challenge, we first design an age-based rewarding scheme, which decouples the OpEx from the unknown cost distribution and enables the platform to accurately control its OpEx. We then take advantage of the age-based rewarding scheme and propose an exponentially discretizing and learning (EDAL) policy for platform operation. We prove that the EDAL policy performs asymptotically as well as the optimal decision (derived based on the cost distribution). Simulation results show that the age-based rewarding scheme protects the platform’s OpEx from the influence of the user characteristics, and verify the asymptotic optimality of the EDAL policy.
许多互联网平台都是依靠恰好在兴趣点附近的用户来收集各种兴趣点的新鲜信息。该平台将提供奖励,以激励用户,并补偿他们因获取信息而产生的成本。在实践中,用户成本(及其分布)对平台来说是隐藏的,因此确定最优奖励是一个挑战。在本文中,我们研究了平台如何动态奖励用户,旨在共同降低信息年龄(AoI)和运营支出(OpEx)。由于隐含的成本分布,这是一个带有部分反馈的在线非凸学习问题。为了克服这一挑战,我们首先设计了一种基于年龄的奖励方案,该方案将运营成本与未知成本分布解耦,使平台能够准确控制运营成本。然后,我们利用基于年龄的奖励方案,提出了一种指数离散和学习(EDAL)策略用于平台运行。我们证明了EDAL策略的渐近性和最优决策(基于成本分布导出)的性能。仿真结果表明,基于年龄的奖励方案保护了平台的OpEx不受用户特征的影响,验证了EDAL策略的渐近最优性。
{"title":"The Power of Age-based Reward in Fresh Information Acquisition","authors":"Zhiyuan Wang, Qingkai Meng, Shan Zhang, Hongbin Luo","doi":"10.1109/INFOCOM53939.2023.10229008","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229008","url":null,"abstract":"Many Internet platforms collect fresh information of various points of interest (PoIs) relying on users who happen to be nearby the PoIs. The platform will offer reward to incentivize users and compensate their costs incurred from information acquisition. In practice, the user cost (and its distribution) is hidden to the platform, thus it is challenging to determine the optimal reward. In this paper, we investigate how the platform dynamically rewards the users, aiming to jointly reduce the age of information (AoI) and the operational expenditure (OpEx). Due to the hidden cost distribution, this is an online non-convex learning problem with partial feedback. To overcome the challenge, we first design an age-based rewarding scheme, which decouples the OpEx from the unknown cost distribution and enables the platform to accurately control its OpEx. We then take advantage of the age-based rewarding scheme and propose an exponentially discretizing and learning (EDAL) policy for platform operation. We prove that the EDAL policy performs asymptotically as well as the optimal decision (derived based on the cost distribution). Simulation results show that the age-based rewarding scheme protects the platform’s OpEx from the influence of the user characteristics, and verify the asymptotic optimality of the EDAL policy.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134271424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One Pass is Sufficient: A Solver for Minimizing Data Delivery Time over Time-varying Networks 一次传递就足够了:时变网络中最小化数据传递时间的求解器
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228959
Peng Wang, S. Sourav, Hongyan Li, Binbin Chen
How to allocate network paths and their resources to minimize the delivery time of data transfer tasks over time-varying networks? Solving this MDDT (Minimizing Data Delivery Time) problem has important applications from data centers to delay-tolerant networking. In particular, with the rapid deployment of satellite networks in recent years, an efficient MDDT solver will serve as a key building block there.The MDDT problem can be solved in polynomial time by finding the maximum flow in a time-expanded graph. A binary-search-based solver incurs O(N•log N•Γ) time complexity, where N corresponds to time horizon and Γ is the time complexity to solve a maximum flow problem for one snapshot of the network. In this work, we design a one-pass solver that progressively expands the graph over time until it reaches the earliest time interval n to complete the delivery. By reusing the calculated maximum flow results from earlier iterations, it solves the MDDT problem while incurring only O(nΓ) time complexity for algorithms that can apply our technique. We apply the one-pass design to Ford-Fulkerson algorithm and evaluate our solver using a network of 184 satellites from Starlink constellations. We demonstrate >75× speed-up in the running time and show that our solution can also enable advanced applications such as preemptive scheduling.
如何分配网络路径及其资源,以最大限度地减少时变网络中数据传输任务的交付时间?解决这个MDDT(最小化数据传递时间)问题具有从数据中心到容错网络的重要应用。特别是,随着近年来卫星网络的迅速部署,高效的MDDT求解器将成为其中的关键组成部分。MDDT问题可以在多项式时间内通过在时间扩展图中找到最大流量来求解。基于二叉搜索的求解器的时间复杂度为O(N•log N•Γ),其中N代表时间范围,Γ代表网络一个快照解决最大流量问题的时间复杂度。在这项工作中,我们设计了一个单遍求解器,随着时间的推移逐步扩展图,直到达到完成交付的最早时间间隔n。通过重用从早期迭代中计算出的最大流量结果,它解决了MDDT问题,同时对于可以应用我们的技术的算法只产生0 (nΓ)的时间复杂度。我们将一遍设计应用于Ford-Fulkerson算法,并使用来自Starlink星座的184颗卫星网络评估我们的求解器。我们在运行时间上演示了b> 75倍的加速,并展示了我们的解决方案还可以启用高级应用程序,例如抢占式调度。
{"title":"One Pass is Sufficient: A Solver for Minimizing Data Delivery Time over Time-varying Networks","authors":"Peng Wang, S. Sourav, Hongyan Li, Binbin Chen","doi":"10.1109/INFOCOM53939.2023.10228959","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228959","url":null,"abstract":"How to allocate network paths and their resources to minimize the delivery time of data transfer tasks over time-varying networks? Solving this MDDT (Minimizing Data Delivery Time) problem has important applications from data centers to delay-tolerant networking. In particular, with the rapid deployment of satellite networks in recent years, an efficient MDDT solver will serve as a key building block there.The MDDT problem can be solved in polynomial time by finding the maximum flow in a time-expanded graph. A binary-search-based solver incurs O(N•log N•Γ) time complexity, where N corresponds to time horizon and Γ is the time complexity to solve a maximum flow problem for one snapshot of the network. In this work, we design a one-pass solver that progressively expands the graph over time until it reaches the earliest time interval n to complete the delivery. By reusing the calculated maximum flow results from earlier iterations, it solves the MDDT problem while incurring only O(nΓ) time complexity for algorithms that can apply our technique. We apply the one-pass design to Ford-Fulkerson algorithm and evaluate our solver using a network of 184 satellites from Starlink constellations. We demonstrate >75× speed-up in the running time and show that our solution can also enable advanced applications such as preemptive scheduling.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Effective Capacity of RIS-enabled mmWave Networks with Outdated CSI 基于ris的过时CSI毫米波网络的有效容量研究
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229028
Syed Waqas Haider Shah, Sai Pavan Deram, Joerg Widmer
Reconfigurable intelligent surfaces (RISs) have great potential to improve the coverage of mmWave networks; however, acquiring perfect channel state information (CSI) of a RIS-enabled mmWave network is very costly and should thus be done infrequently. At the same time, finding an optimal RIS configuration when CSI is outdated is challenging. To this end, this work aims to provide practical insights into the tradeoff between the outdatedness of the CSI and the system performance by using the effective capacity as analytical tool. We consider a RIS-enabled mmWave downlink where the base station (BS) operates under statistical quality-of-service (QoS) constraints. We find a closed-form expression for the effective capacity that incorporates the degree of optimism of packet scheduling and correlation strength between instantaneous and outdated CSI. Moreover, our analysis allows us to find optimal values of the signal-to-interference-plus-noise-ratio (SINR) distribution parameter and their impact on the effective capacity in different network scenarios. Simulation results demonstrate that better effective capacity can be achieved with suboptimal RIS configuration when the channel estimates are known to be outdated. It allows us to design system parameters that guarantee better performance while keeping the complexity and cost associated with channel estimation to a minimum.
可重构智能表面(RISs)在改善毫米波网络覆盖方面具有巨大潜力;然而,在支持ris的毫米波网络中获取完美信道状态信息(CSI)是非常昂贵的,因此不应该经常这样做。同时,在CSI过时的情况下,找到一个最佳的RIS配置是具有挑战性的。为此,本研究旨在通过使用有效容量作为分析工具,为CSI的过时性与系统性能之间的权衡提供实用的见解。我们考虑一个支持ris的毫米波下行链路,其中基站(BS)在统计服务质量(QoS)约束下运行。我们找到了有效容量的封闭表达式,该表达式结合了分组调度的乐观程度和瞬时和过时CSI之间的相关强度。此外,我们的分析使我们能够找到不同网络场景下信噪比(SINR)分布参数的最优值及其对有效容量的影响。仿真结果表明,在已知信道估计过时的情况下,次优RIS配置可以获得更好的有效容量。它允许我们设计系统参数,以保证更好的性能,同时保持与信道估计相关的复杂性和成本降至最低。
{"title":"On the Effective Capacity of RIS-enabled mmWave Networks with Outdated CSI","authors":"Syed Waqas Haider Shah, Sai Pavan Deram, Joerg Widmer","doi":"10.1109/INFOCOM53939.2023.10229028","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229028","url":null,"abstract":"Reconfigurable intelligent surfaces (RISs) have great potential to improve the coverage of mmWave networks; however, acquiring perfect channel state information (CSI) of a RIS-enabled mmWave network is very costly and should thus be done infrequently. At the same time, finding an optimal RIS configuration when CSI is outdated is challenging. To this end, this work aims to provide practical insights into the tradeoff between the outdatedness of the CSI and the system performance by using the effective capacity as analytical tool. We consider a RIS-enabled mmWave downlink where the base station (BS) operates under statistical quality-of-service (QoS) constraints. We find a closed-form expression for the effective capacity that incorporates the degree of optimism of packet scheduling and correlation strength between instantaneous and outdated CSI. Moreover, our analysis allows us to find optimal values of the signal-to-interference-plus-noise-ratio (SINR) distribution parameter and their impact on the effective capacity in different network scenarios. Simulation results demonstrate that better effective capacity can be achieved with suboptimal RIS configuration when the channel estimates are known to be outdated. It allows us to design system parameters that guarantee better performance while keeping the complexity and cost associated with channel estimation to a minimum.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117149000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Device Trust Bootstrapping Against Collaborative Signal Modification Attacks 针对协同信号修改攻击的安全设备信任引导
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229007
Xiaochan Xue, Shucheng Yu, Min Song
Bootstrapping security among wireless devices without prior-shared secrets is frequently demanded in emerging wireless and mobile applications. One promising approach for this problem is to utilize in-band physical-layer radio-frequency (RF) signals for authenticated key establishment because of the efficiency and high usability. However, existing in-band authenticated key agreement (AKA) protocols are mostly vulnerable to Man-in-the-Middle (MitM) attacks, which can be launched by modifying the transmitted wireless signals over the air. By annihilating legitimate signals and injecting malicious signals, signal modification attackers are able to completely control the communication channels and spoof victim wireless devices. State-of-the-art (SOTA) techniques addressing such attacks require additional auxiliary hardware or are limited to single attackers. This paper proposes a novel in-band security bootstrapping technique that can thwart colluding signal modification attackers. Different from SOTA solutions, our design is compatible with commodity devices without requiring additional hardware. We achieve this based on the internal randomness of each device that is unpredictable to attackers. Any modification to RF signals will be detected with high probabilities. Extensive security analysis and experimentation on the USRP platform demonstrate the effectiveness of our design under various attack strategies.
在新兴的无线和移动应用中,没有先前共享秘密的无线设备之间的引导安全性经常被要求。利用带内物理层射频(RF)信号建立身份验证密钥是解决该问题的一种很有前途的方法,因为它效率高,可用性高。然而,现有的带内认证密钥协议(AKA)协议大多容易受到中间人(MitM)攻击,这种攻击可以通过修改空中传输的无线信号来发起。信号修改攻击者通过湮灭合法信号和注入恶意信号,可以完全控制通信信道并欺骗受害无线设备。处理此类攻击的最先进(SOTA)技术需要额外的辅助硬件,或者仅限于单个攻击者。提出了一种新的带内安全自举技术,可以有效地阻止串通信号修改攻击者。与SOTA解决方案不同,我们的设计与商品设备兼容,无需额外的硬件。我们基于攻击者无法预测的每个设备的内部随机性来实现这一点。对射频信号的任何修改都将以高概率被检测到。在USRP平台上进行的大量安全分析和实验证明了我们的设计在各种攻击策略下的有效性。
{"title":"Secure Device Trust Bootstrapping Against Collaborative Signal Modification Attacks","authors":"Xiaochan Xue, Shucheng Yu, Min Song","doi":"10.1109/INFOCOM53939.2023.10229007","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229007","url":null,"abstract":"Bootstrapping security among wireless devices without prior-shared secrets is frequently demanded in emerging wireless and mobile applications. One promising approach for this problem is to utilize in-band physical-layer radio-frequency (RF) signals for authenticated key establishment because of the efficiency and high usability. However, existing in-band authenticated key agreement (AKA) protocols are mostly vulnerable to Man-in-the-Middle (MitM) attacks, which can be launched by modifying the transmitted wireless signals over the air. By annihilating legitimate signals and injecting malicious signals, signal modification attackers are able to completely control the communication channels and spoof victim wireless devices. State-of-the-art (SOTA) techniques addressing such attacks require additional auxiliary hardware or are limited to single attackers. This paper proposes a novel in-band security bootstrapping technique that can thwart colluding signal modification attackers. Different from SOTA solutions, our design is compatible with commodity devices without requiring additional hardware. We achieve this based on the internal randomness of each device that is unpredictable to attackers. Any modification to RF signals will be detected with high probabilities. Extensive security analysis and experimentation on the USRP platform demonstrate the effectiveness of our design under various attack strategies.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115160523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast and Exact Evaluation Algorithm for the Expected Number of Connected Nodes: an Enhanced Network Reliability Measure 一种快速准确的期望连接节点数评估算法:一种增强的网络可靠性度量
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228897
Kengo Nakamura, Takeru Inoue, Masaaki Nishino, Norihito Yasuda, S. Minato
Contemporary society survives on several network infrastructures, such as communication and transportation. These network infrastructures are required to keep all nodes connected, although these nodes are occasionally disconnected due to failures. Thus, the expected number of connected node pairs (ECP) during an operation period is a reasonable reliability measure in network design. However, no work has studied ECP due to its computational hardness; we have to solve the reliability evaluation problem, which is a computationally tough problem, for O(n2) times where n is the number of nodes in a network. This paper proposes an efficient method that exactly computes ECP. Our method performs dynamic programming just once without explicit repetition for each node pair and obtains an exact ECP value weighted by the number of users at each node. A thorough complexity analysis reveals that our method is faster than an existing reliability evaluation method, which can be transferred to ECP computation, by O(n). Numerical experiments using real topologies show great efficiency; e.g., our method computes the ECP of an 821-link network in ten seconds; the existing method cannot complete it in an hour. This paper also presents two applications: critical link identification and optimal resource (e.g., a server) placement.
当代社会的生存依赖于几个网络基础设施,如通信和交通。这些网络基础设施需要保持所有节点的连接,尽管这些节点偶尔会由于故障而断开连接。因此,在一个运行周期内的预期连接节点对数(ECP)是网络设计中合理的可靠性度量。然而,由于ECP的计算硬度,尚无研究工作;我们需要解决O(n2)次的可靠性评估问题,这是一个计算困难的问题,其中n是网络中的节点数。本文提出了一种精确计算ECP的有效方法。该方法对每个节点对只执行一次动态规划,无需显式重复,并获得每个节点上用户数量加权的精确ECP值。通过全面的复杂性分析表明,该方法比现有的可靠性评估方法(可转换为ECP计算)快0 (n)。利用实际拓扑进行的数值实验表明,该方法具有较高的效率;例如,我们的方法在10秒内计算821链路网络的ECP;现有的方法无法在一小时内完成。本文还介绍了两个应用:关键链接识别和最优资源(例如,服务器)放置。
{"title":"A Fast and Exact Evaluation Algorithm for the Expected Number of Connected Nodes: an Enhanced Network Reliability Measure","authors":"Kengo Nakamura, Takeru Inoue, Masaaki Nishino, Norihito Yasuda, S. Minato","doi":"10.1109/INFOCOM53939.2023.10228897","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228897","url":null,"abstract":"Contemporary society survives on several network infrastructures, such as communication and transportation. These network infrastructures are required to keep all nodes connected, although these nodes are occasionally disconnected due to failures. Thus, the expected number of connected node pairs (ECP) during an operation period is a reasonable reliability measure in network design. However, no work has studied ECP due to its computational hardness; we have to solve the reliability evaluation problem, which is a computationally tough problem, for O(n2) times where n is the number of nodes in a network. This paper proposes an efficient method that exactly computes ECP. Our method performs dynamic programming just once without explicit repetition for each node pair and obtains an exact ECP value weighted by the number of users at each node. A thorough complexity analysis reveals that our method is faster than an existing reliability evaluation method, which can be transferred to ECP computation, by O(n). Numerical experiments using real topologies show great efficiency; e.g., our method computes the ECP of an 821-link network in ten seconds; the existing method cannot complete it in an hour. This paper also presents two applications: critical link identification and optimal resource (e.g., a server) placement.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborative Streaming and Super Resolution Adaptation for Mobile Immersive Videos 移动沉浸式视频的协同流媒体和超分辨率适应
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228906
Lei Zhang, Haotian Guo, Yanjie Dong, Fang Wang, Laizhong Cui, Victor C. M. Leung
Tile-based streaming and super resolution are two representative technologies adopted to improve bandwidth efficiency of immersive video steaming. The former allows selective download of contents in the user viewport by splitting the video into multiple independently decodable tiles. The latter leverages client-side computation to reconstruct the received video into higher quality using advanced neural network models. In this work, we propose CASE, a collaborated adaptive streaming and enhancement framework for mobile immersive videos, which integrates super resolution with tile-based streaming to optimize user experience with dynamic bandwidth and limited computing capability. To coordinate the video transmission and reconstruction in CASE, we identify and address several key design issues including unified video quality assessment, computation complexity model for super resolution, and buffer analysis considering the interplay between transmission and reconstruction. We further formulate the quality-of-experience (QoE) maximization problem for mobile immersive video streaming and propose a rate adaptation algorithm to make the best decisions for download and for reconstruction based on the Lyapunov optimization theory. Extensive evaluation results validate the superiority of our proposed approach, which presents stable performance with considerable QoE improvement, while enabling trade-off between playback smoothness and video quality.
基于贴片的流媒体技术和超分辨率技术是提高沉浸式视频直播带宽效率的两种代表性技术。前者通过将视频分割成多个独立可解码的图像块,允许在用户视口中选择性地下载内容。后者利用客户端计算,利用先进的神经网络模型将接收到的视频重建为更高质量。在这项工作中,我们提出了CASE,这是一个用于移动沉浸式视频的自适应流媒体和增强框架,它将超分辨率与基于tile的流媒体集成在一起,以优化动态带宽和有限计算能力的用户体验。为了在CASE中协调视频传输和重建,我们确定并解决了几个关键的设计问题,包括统一的视频质量评估、超分辨率计算复杂度模型以及考虑传输和重建之间相互作用的缓冲区分析。我们进一步制定了移动沉浸式视频流的体验质量(QoE)最大化问题,并提出了一种基于Lyapunov优化理论的速率自适应算法,以做出下载和重建的最佳决策。广泛的评估结果验证了我们提出的方法的优越性,该方法具有稳定的性能和相当大的QoE改进,同时能够在播放平滑性和视频质量之间进行权衡。
{"title":"Collaborative Streaming and Super Resolution Adaptation for Mobile Immersive Videos","authors":"Lei Zhang, Haotian Guo, Yanjie Dong, Fang Wang, Laizhong Cui, Victor C. M. Leung","doi":"10.1109/INFOCOM53939.2023.10228906","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228906","url":null,"abstract":"Tile-based streaming and super resolution are two representative technologies adopted to improve bandwidth efficiency of immersive video steaming. The former allows selective download of contents in the user viewport by splitting the video into multiple independently decodable tiles. The latter leverages client-side computation to reconstruct the received video into higher quality using advanced neural network models. In this work, we propose CASE, a collaborated adaptive streaming and enhancement framework for mobile immersive videos, which integrates super resolution with tile-based streaming to optimize user experience with dynamic bandwidth and limited computing capability. To coordinate the video transmission and reconstruction in CASE, we identify and address several key design issues including unified video quality assessment, computation complexity model for super resolution, and buffer analysis considering the interplay between transmission and reconstruction. We further formulate the quality-of-experience (QoE) maximization problem for mobile immersive video streaming and propose a rate adaptation algorithm to make the best decisions for download and for reconstruction based on the Lyapunov optimization theory. Extensive evaluation results validate the superiority of our proposed approach, which presents stable performance with considerable QoE improvement, while enabling trade-off between playback smoothness and video quality.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128066081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Edge-centric Resource Provisioning for Online and Offline Services Co-location 在线和离线业务共置的动态边缘中心资源发放
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228949
Ouyang Tao, Kongyange Zhao, Xiaoxi Zhang, Zhi Zhou, Xu Chen
Due to the penetration of edge computing, a wide variety of workloads are sunk down to the network edge to alleviate huge pressure of the cloud. With the presence of high input workload dynamics and intensive edge resource contention, it is highly non-trivial for an edge proxy to optimize the scheduling of heterogeneous services with diverse QoS requirements. In general, online services should be quickly completed in a quite stable running environment to meet their tight latency constraint, while offline services can be processed in a loose manner for their elastic soft deadlines. To well coordinate such services at the resource-limited edge cluster, in this paper, we study an edge-centric resource provisioning optimization for dynamic online and offline services co-location, where the proxy seeks to maximize timely online service performances while maintaining satisfactory long-term offline service performances. However, intricate hybrid couplings for provisioning decisions arise due to heterogeneous constraints of the co-located services and their different time-scale performances. We hence first propose a reactive provisioning approach without requiring a prior knowledge of future system dynamics, which leverages a Lagrange relaxation for devising constraint-aware stochastic subgradient algorithm to deal with the challenge of hybrid couplings. To further boost the performance by integrating the powerful machine learning techniques, we also advocate a predictive provisioning approach, where the future request arrivals can be estimated accurately. With rigorous theoretical analysis and extensive trace-driven evaluations, we show the superior performance of our proposed algorithms for online and offline services co-location at the edge.
由于边缘计算的渗透,各种各样的工作负载被下沉到网络边缘,以减轻云的巨大压力。由于存在高输入动态工作负载和密集的边缘资源争用,对具有不同QoS需求的异构服务进行调度优化是一个非常重要的问题。一般来说,在线服务需要在一个相当稳定的运行环境中快速完成,以满足其严格的延迟约束,而离线服务由于具有弹性的软期限,可以以宽松的方式处理。为了在资源有限的边缘集群中很好地协调这些服务,本文研究了一种以边缘为中心的动态在线和离线服务协同配置的资源配置优化,其中代理寻求最大化及时的在线服务性能,同时保持令人满意的长期离线服务性能。然而,由于共存服务的异构约束及其不同的时间尺度性能,供应决策产生了复杂的混合耦合。因此,我们首先提出了一种不需要预先了解未来系统动力学的反应性供应方法,该方法利用拉格朗日松弛来设计约束感知的随机子梯度算法来处理混合耦合的挑战。为了通过集成强大的机器学习技术进一步提高性能,我们还提倡一种预测供应方法,可以准确地估计未来的请求到达。通过严格的理论分析和广泛的跟踪驱动评估,我们展示了我们提出的算法在边缘的在线和离线服务协同定位方面的卓越性能。
{"title":"Dynamic Edge-centric Resource Provisioning for Online and Offline Services Co-location","authors":"Ouyang Tao, Kongyange Zhao, Xiaoxi Zhang, Zhi Zhou, Xu Chen","doi":"10.1109/INFOCOM53939.2023.10228949","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228949","url":null,"abstract":"Due to the penetration of edge computing, a wide variety of workloads are sunk down to the network edge to alleviate huge pressure of the cloud. With the presence of high input workload dynamics and intensive edge resource contention, it is highly non-trivial for an edge proxy to optimize the scheduling of heterogeneous services with diverse QoS requirements. In general, online services should be quickly completed in a quite stable running environment to meet their tight latency constraint, while offline services can be processed in a loose manner for their elastic soft deadlines. To well coordinate such services at the resource-limited edge cluster, in this paper, we study an edge-centric resource provisioning optimization for dynamic online and offline services co-location, where the proxy seeks to maximize timely online service performances while maintaining satisfactory long-term offline service performances. However, intricate hybrid couplings for provisioning decisions arise due to heterogeneous constraints of the co-located services and their different time-scale performances. We hence first propose a reactive provisioning approach without requiring a prior knowledge of future system dynamics, which leverages a Lagrange relaxation for devising constraint-aware stochastic subgradient algorithm to deal with the challenge of hybrid couplings. To further boost the performance by integrating the powerful machine learning techniques, we also advocate a predictive provisioning approach, where the future request arrivals can be estimated accurately. With rigorous theoretical analysis and extensive trace-driven evaluations, we show the superior performance of our proposed algorithms for online and offline services co-location at the edge.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoShield: Voice Liveness Detection with Sound Field Dynamics VoShield:声场动力学的声音活力检测
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229038
Qiang Yang, Kaiyan Cui, Yuanqing Zheng
Voice assistants are widely integrated into a variety of smart devices, enabling users to easily complete daily tasks and even critical operations like online transactions with voice commands. Thus, once attackers replay a secretly-recorded voice command by loudspeakers to compromise users’ voice assistants, this operation will cause serious consequences, such as information leakage and property loss. Unfortunately, most voice liveness detection approaches against replay attacks mainly rely on detecting lip motions or subtle physiological features in speech, which are limited within a very short range. In this paper, we propose VoShield to check whether a voice command is from a genuine user or a loudspeaker imposter. VoShield measures sound field dynamics, a feature that changes fast as the human mouths dynamically open and close. In contrast, it would remain rather stable for loudspeakers due to the fixed size. This feature enables VoShield to largely extend the working distance and remain resilient to user locations. Besides, sound field dynamics are extracted from the difference between multiple microphone channels, making this feature robust to voice volume. To evaluate VoShield, we conducted comprehensive experiments with various settings in different working scenarios. The results show that VoShield can achieve a detection accuracy of 98.2% and an Equal Error Rate of 2.0%, which serves as a promising complement to current voice authentication systems for smart devices.
语音助手被广泛集成到各种智能设备中,用户可以通过语音命令轻松完成日常任务,甚至是在线交易等关键操作。因此,一旦攻击者通过扬声器重放秘密录制的语音命令,破坏用户的语音助手,就会造成信息泄露和财产损失等严重后果。不幸的是,大多数针对重放攻击的语音活力检测方法主要依赖于检测语音中的嘴唇运动或微妙的生理特征,这些特征的范围很短。在本文中,我们提出了VoShield来检查语音命令是来自真实用户还是扬声器冒充者。VoShield测量声场动态,这是一种随着人类嘴巴动态张开和闭合而快速变化的特征。相比之下,由于扬声器的尺寸固定,它将保持相当稳定。该功能使VoShield能够在很大程度上延长工作距离,并保持对用户位置的弹性。此外,从多个传声器通道之间的差异中提取声场动态,使该特征对语音音量具有鲁棒性。为了评估VoShield,我们在不同的工作场景下进行了各种设置的综合实验。结果表明,VoShield的检测准确率为98.2%,平均错误率为2.0%,是对现有智能设备语音认证系统的有力补充。
{"title":"VoShield: Voice Liveness Detection with Sound Field Dynamics","authors":"Qiang Yang, Kaiyan Cui, Yuanqing Zheng","doi":"10.1109/INFOCOM53939.2023.10229038","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229038","url":null,"abstract":"Voice assistants are widely integrated into a variety of smart devices, enabling users to easily complete daily tasks and even critical operations like online transactions with voice commands. Thus, once attackers replay a secretly-recorded voice command by loudspeakers to compromise users’ voice assistants, this operation will cause serious consequences, such as information leakage and property loss. Unfortunately, most voice liveness detection approaches against replay attacks mainly rely on detecting lip motions or subtle physiological features in speech, which are limited within a very short range. In this paper, we propose VoShield to check whether a voice command is from a genuine user or a loudspeaker imposter. VoShield measures sound field dynamics, a feature that changes fast as the human mouths dynamically open and close. In contrast, it would remain rather stable for loudspeakers due to the fixed size. This feature enables VoShield to largely extend the working distance and remain resilient to user locations. Besides, sound field dynamics are extracted from the difference between multiple microphone channels, making this feature robust to voice volume. To evaluate VoShield, we conducted comprehensive experiments with various settings in different working scenarios. The results show that VoShield can achieve a detection accuracy of 98.2% and an Equal Error Rate of 2.0%, which serves as a promising complement to current voice authentication systems for smart devices.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IEEE INFOCOM 2023 - IEEE Conference on Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1