首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
Content-aware robust semantic transmission of images over wireless channels with GANs 基于gan的无线信道图像内容感知鲁棒语义传输
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.12.001
Xuyang Chen , Daquan Feng , Qi He , Yao Sun , Gaojie Chen , Xiang-Gen Xia
Semantic Communication (SemCom) can significantly reduce the transmitted data volume and keep robustness. Task-oriented SemCom of images aims to convey the implicit meaning of source messages correctly, rather than achieving precise bit-by-bit reconstruction. Existing image SemCom systems directly perform semantic encoding and decoding on the entire image, which has not considered the correlation between image content and downstream tasks or the adaptability to channel noise. To this end, we propose a content-aware robust SemCom framework for image transmission based on Generative Adversarial Networks (GANs). Specifically, the accurate semantics of the image are extracted by the semantic encoder, and divided into two parts for different downstream tasks: Regions of Interest (ROI) and Regions of Non-Interest (RONI). By reducing the quantization accuracy of RONI, the amount of transmitted data volume is reduced significantly. During the transmission process of semantics, a Signal-to-Noise Ratio (SNR) is randomly initialized, enabling the model to learn the average noise distribution. The experimental results demonstrate that by reducing the quantization level of RONI, transmitted data volume is reduced up to 60.53% compared to using globally consistent quantization while maintaining comparable performance to existing methods in downstream semantic segmentation tasks. Moreover, our model exhibits increased robustness with variable SNRs.
语义通信(SemCom)可以显著减少传输数据量并保持鲁棒性。面向任务的图像SemCom的目的是正确传达源消息的隐含意义,而不是实现精确的逐位重构。现有的图像SemCom系统直接对整个图像进行语义编码和解码,没有考虑图像内容与下游任务之间的相关性以及对信道噪声的适应性。为此,我们提出了一种基于生成对抗网络(GANs)的内容感知鲁棒SemCom图像传输框架。具体而言,通过语义编码器提取图像的准确语义,并将其分为两部分,分别用于不同的下游任务:感兴趣区域(ROI)和非感兴趣区域(RONI)。通过降低RONI的量化精度,可以显著减少传输的数据量。在语义传递过程中,随机初始化信噪比(SNR),使模型能够学习平均噪声分布。实验结果表明,与使用全局一致量化相比,通过降低RONI的量化水平,传输数据量减少了60.53%,同时在下游语义分割任务中保持了与现有方法相当的性能。此外,我们的模型在可变信噪比下表现出更高的鲁棒性。
{"title":"Content-aware robust semantic transmission of images over wireless channels with GANs","authors":"Xuyang Chen ,&nbsp;Daquan Feng ,&nbsp;Qi He ,&nbsp;Yao Sun ,&nbsp;Gaojie Chen ,&nbsp;Xiang-Gen Xia","doi":"10.1016/j.dcan.2024.12.001","DOIUrl":"10.1016/j.dcan.2024.12.001","url":null,"abstract":"<div><div>Semantic Communication (SemCom) can significantly reduce the transmitted data volume and keep robustness. Task-oriented SemCom of images aims to convey the implicit meaning of source messages correctly, rather than achieving precise bit-by-bit reconstruction. Existing image SemCom systems directly perform semantic encoding and decoding on the entire image, which has not considered the correlation between image content and downstream tasks or the adaptability to channel noise. To this end, we propose a content-aware robust SemCom framework for image transmission based on Generative Adversarial Networks (GANs). Specifically, the accurate semantics of the image are extracted by the semantic encoder, and divided into two parts for different downstream tasks: Regions of Interest (ROI) and Regions of Non-Interest (RONI). By reducing the quantization accuracy of RONI, the amount of transmitted data volume is reduced significantly. During the transmission process of semantics, a Signal-to-Noise Ratio (SNR) is randomly initialized, enabling the model to learn the average noise distribution. The experimental results demonstrate that by reducing the quantization level of RONI, transmitted data volume is reduced up to 60.53% compared to using globally consistent quantization while maintaining comparable performance to existing methods in downstream semantic segmentation tasks. Moreover, our model exhibits increased robustness with variable SNRs.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1205-1213"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedStrag: Straggler-aware federated learning for low resource devices FedStrag:用于低资源设备的离散感知联邦学习
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.12.004
Aditya Kumar, Satish Narayana Srirama
Federated Learning (FL) has become a popular training paradigm in recent years. However, stragglers are critical bottlenecks in an Internet of Things (IoT) network while training. These nodes produce stale updates to the server, which slow down the convergence. In this paper, we studied the impact of the stale updates on the global model, which is observed to be significant. To address this, we propose a weighted averaging scheme, FedStrag, that optimizes the training with stale updates. The work is focused on training a model in an IoT network that has multiple challenges, such as resource constraints, stragglers, network issues, device heterogeneity, etc. To this end, we developed a time-bounded asynchronous FL paradigm that can train a model on the continuous inflow of data in the edge-fog-cloud continuum. To test the FedStrag approach, a model is trained with multiple stragglers scenarios on both Independent and Identically Distributed (IID) and non-IID datasets on Raspberry Pis. The experiment results suggest that the FedStrag outperforms the baseline FedAvg in all possible cases.
近年来,联邦学习(FL)已成为一种流行的训练模式。然而,在训练时,掉队者是物联网(IoT)网络的关键瓶颈。这些节点对服务器产生过时的更新,从而减慢了收敛速度。在本文中,我们研究了陈旧更新对全球模式的影响,观察到这种影响是显著的。为了解决这个问题,我们提出了一个加权平均方案,FedStrag,它通过陈旧的更新来优化训练。这项工作的重点是在具有多种挑战的物联网网络中训练模型,例如资源约束、掉队者、网络问题、设备异构等。为此,我们开发了一个有时间限制的异步FL范例,可以在边缘-雾-云连续体中连续流入的数据上训练模型。为了测试fedstrg方法,在Raspberry Pis上使用独立和同分布(IID)和非IID数据集上的多个离散场景训练模型。实验结果表明,在所有可能的情况下,FedStrag都优于基线fedag。
{"title":"FedStrag: Straggler-aware federated learning for low resource devices","authors":"Aditya Kumar,&nbsp;Satish Narayana Srirama","doi":"10.1016/j.dcan.2024.12.004","DOIUrl":"10.1016/j.dcan.2024.12.004","url":null,"abstract":"<div><div>Federated Learning (FL) has become a popular training paradigm in recent years. However, stragglers are critical bottlenecks in an Internet of Things (IoT) network while training. These nodes produce stale updates to the server, which slow down the convergence. In this paper, we studied the impact of the stale updates on the global model, which is observed to be significant. To address this, we propose a weighted averaging scheme, FedStrag, that optimizes the training with stale updates. The work is focused on training a model in an IoT network that has multiple challenges, such as resource constraints, stragglers, network issues, device heterogeneity, etc. To this end, we developed a time-bounded asynchronous FL paradigm that can train a model on the continuous inflow of data in the edge-fog-cloud continuum. To test the FedStrag approach, a model is trained with multiple stragglers scenarios on both Independent and Identically Distributed (IID) and non-IID datasets on Raspberry Pis. The experiment results suggest that the FedStrag outperforms the baseline FedAvg in all possible cases.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1214-1224"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous radio frequency/underwater optical wireless communication relaying systems with MIMO scheme MIMO方案的异构射频/水下光无线通信中继系统
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.008
Sai Li , Liang Yang , Yusheng Sun , Qianfen Jiao
This paper studies a cooperative relay transmission system within the framework of Multiple-Input Multiple-Output Radio Frequency/Underwater Optical Wireless Communication (MIMO-RF/UOWC), aiming to establish sea-based heterogeneous networks. In this setup, the RF links obey κ-μ fading, while the UOWC links undergo the generalized Gamma fading with the pointing error impairments. The relay operates under an Amplify-and-Forward (AF) protocol. Additionally, the attenuation caused by the Absorption and Scattering (AaS) is considered in UOWC links. The work yields precise results for the Average Channel Capacity (ACC), Outage Probability (OP), and average Bit Error Rate (BER). Furthermore, to reveal deeper insights, bounds on the ACC and asymptotic results for the OP and average BER are derived. The findings highlight the superior performance of MIMO-RF/UOWC AF systems compared to Single-Input-Single-Output (SISO)-RF/UOWC AF systems. Various factors affecting the Diversity Gain (DG) of the MIMO-RF/UOWC AF system include the number of antennas/apertures, fading parameters of both links, and pointing error parameters. Moreover, while an increase in the AaS effect can result in significant attenuation, it does not determine the achievable DG of the proposed MIMO-RF/UOWC AF relaying system.
本文研究了多输入多输出射频/水下光无线通信(MIMO-RF/UOWC)框架下的协同中继传输系统,旨在建立海基异构网络。在这种情况下,射频链路服从κ-μ衰落,而UOWC链路则服从广义伽玛衰落,并伴有指向误差损害。继电器在放大和转发(AF)协议下工作。此外,在UOWC链路中考虑了由吸收和散射(AaS)引起的衰减。这项工作得到了平均信道容量(ACC)、中断概率(OP)和平均误码率(BER)的精确结果。此外,为了揭示更深入的见解,推导了ACC的界以及OP和平均BER的渐近结果。研究结果强调了MIMO-RF/UOWC AF系统与单输入-单输出(SISO)-RF/UOWC AF系统相比的优越性能。影响MIMO-RF/UOWC自动对焦系统分集增益(DG)的因素包括天线数量/孔径、链路衰落参数和指向误差参数。此外,虽然AaS效应的增加会导致显著的衰减,但它并不能决定所提出的MIMO-RF/UOWC AF中继系统的可实现DG。
{"title":"Heterogeneous radio frequency/underwater optical wireless communication relaying systems with MIMO scheme","authors":"Sai Li ,&nbsp;Liang Yang ,&nbsp;Yusheng Sun ,&nbsp;Qianfen Jiao","doi":"10.1016/j.dcan.2024.10.008","DOIUrl":"10.1016/j.dcan.2024.10.008","url":null,"abstract":"<div><div>This paper studies a cooperative relay transmission system within the framework of Multiple-Input Multiple-Output Radio Frequency/Underwater Optical Wireless Communication (MIMO-RF/UOWC), aiming to establish sea-based heterogeneous networks. In this setup, the RF links obey <em>κ</em>-<em>μ</em> fading, while the UOWC links undergo the generalized Gamma fading with the pointing error impairments. The relay operates under an Amplify-and-Forward (AF) protocol. Additionally, the attenuation caused by the Absorption and Scattering (AaS) is considered in UOWC links. The work yields precise results for the Average Channel Capacity (ACC), Outage Probability (OP), and average Bit Error Rate (BER). Furthermore, to reveal deeper insights, bounds on the ACC and asymptotic results for the OP and average BER are derived. The findings highlight the superior performance of MIMO-RF/UOWC AF systems compared to Single-Input-Single-Output (SISO)-RF/UOWC AF systems. Various factors affecting the Diversity Gain (DG) of the MIMO-RF/UOWC AF system include the number of antennas/apertures, fading parameters of both links, and pointing error parameters. Moreover, while an increase in the AaS effect can result in significant attenuation, it does not determine the achievable DG of the proposed MIMO-RF/UOWC AF relaying system.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1018-1028"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations 联合干扰机选择和能量优化在秘密通信中对抗一个不确定位置的典狱长
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.019
Zhijun Han , Yiqing Zhou , Yu Zhang , Tong-Xing Zheng , Ling Liu , Jinglin Shi
In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to achieve in practice. To be more practical, it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI, which makes it difficult for legitimate transceivers to estimate the detection probability of the warden. First, the uncertainty caused by the unknown warden location must be removed, and the Optimal Detection Position (OPTDP) of the warden is derived which can provide the best detection performance (i.e., the worst case for a covert communication). Then, to further avoid the impractical assumption of perfect CSI, the covert throughput is maximized using only the channel distribution information. Given this OPTDP based worst case for covert communications, the jammer selection, the jamming power, the transmission power, and the transmission rate are jointly optimized to maximize the covert throughput (OPTDP-JP). To solve this coupling problem, a Heuristic algorithm based on Maximum Distance Ratio (H-MAXDR) is proposed to provide a sub-optimal solution. First, according to the analysis of the covert throughput, the node with the maximum distance ratio (i.e., the ratio of the distances from the jammer to the receiver and that to the warden) is selected as the friendly jammer (MAXDR). Then, the optimal transmission and jamming power can be derived, followed by the optimal transmission rate obtained via the bisection method. In numerical and simulation results, it is shown that although the location of the warden is unknown, by assuming the OPTDP of the warden, the proposed OPTDP-JP can always satisfy the covertness constraint. In addition, with an uncertain warden and imperfect CSI, the covert throughput provided by OPTDP-JP is 80% higher than the existing schemes when the covertness constraint is 0.9, showing the effectiveness of OPTDP-JP.
在隐蔽通信中,联合干扰机的选择和功率优化对提高通信性能至关重要。然而,现有的方案通常假设一个具有已知位置和完善的信道状态信息(CSI)的监狱长,这在实践中很难实现。更实际的是,调查针对不确定位置和不完善CSI的监狱长的秘密通信非常重要,这使得合法收发器难以估计监狱长的检测概率。首先,必须消除未知监狱长位置所带来的不确定性,并推导出监狱长的最佳检测位置(OPTDP),该位置可以提供最佳的检测性能(即隐蔽通信的最坏情况)。然后,为了进一步避免不切实际的完美CSI假设,仅使用信道分布信息最大化隐蔽吞吐量。考虑到这种基于OPTDP的隐蔽通信的最坏情况,干扰器选择,干扰功率,传输功率和传输速率共同优化,以最大化隐蔽吞吐量(OPTDP- jp)。为了解决这一耦合问题,提出了一种基于最大距离比(H-MAXDR)的启发式算法来提供次优解。首先,根据隐蔽吞吐量的分析,选择距离比(即干扰机到接收端的距离与监督端的距离之比)最大的节点作为友好干扰机(MAXDR)。然后推导出最优传输功率和干扰功率,再通过对分法得到最优传输速率。数值和仿真结果表明,尽管看守者的位置未知,但通过假设看守者的OPTDP,所提出的OPTDP- jp总能满足隐蔽性约束。此外,在不确定的监狱长和不完善的CSI条件下,当隐蔽性约束为0.9时,OPTDP-JP提供的隐蔽吞吐量比现有方案高80%,显示了OPTDP-JP的有效性。
{"title":"Joint jammer selection and power optimization in covert communications against a warden with uncertain locations","authors":"Zhijun Han ,&nbsp;Yiqing Zhou ,&nbsp;Yu Zhang ,&nbsp;Tong-Xing Zheng ,&nbsp;Ling Liu ,&nbsp;Jinglin Shi","doi":"10.1016/j.dcan.2024.10.019","DOIUrl":"10.1016/j.dcan.2024.10.019","url":null,"abstract":"<div><div>In covert communications, joint jammer selection and power optimization are important to improve performance. However, existing schemes usually assume a warden with a known location and perfect Channel State Information (CSI), which is difficult to achieve in practice. To be more practical, it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI, which makes it difficult for legitimate transceivers to estimate the detection probability of the warden. First, the uncertainty caused by the unknown warden location must be removed, and the Optimal Detection Position (OPTDP) of the warden is derived which can provide the best detection performance (i.e., the worst case for a covert communication). Then, to further avoid the impractical assumption of perfect CSI, the covert throughput is maximized using only the channel distribution information. Given this OPTDP based worst case for covert communications, the jammer selection, the jamming power, the transmission power, and the transmission rate are jointly optimized to maximize the covert throughput (OPTDP-JP). To solve this coupling problem, a Heuristic algorithm based on Maximum Distance Ratio (H-MAXDR) is proposed to provide a sub-optimal solution. First, according to the analysis of the covert throughput, the node with the maximum distance ratio (i.e., the ratio of the distances from the jammer to the receiver and that to the warden) is selected as the friendly jammer (MAXDR). Then, the optimal transmission and jamming power can be derived, followed by the optimal transmission rate obtained via the bisection method. In numerical and simulation results, it is shown that although the location of the warden is unknown, by assuming the OPTDP of the warden, the proposed OPTDP-JP can always satisfy the covertness constraint. In addition, with an uncertain warden and imperfect CSI, the covert throughput provided by OPTDP-JP is 80% higher than the existing schemes when the covertness constraint is 0.9, showing the effectiveness of OPTDP-JP.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1114-1124"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing flexibility and system performance in 6G and beyond: A user-based numerology and waveform approach 增强6G及以上的灵活性和系统性能:基于用户的数字命理学和波形方法
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.020
Mohamed S. Sayed , Hatem M. Zakaria , Abdelhady M. Abdelhady
A Mixed Numerology OFDM (MN-OFDM) system is essential in 6G and beyond. However, it encounters challenges due to Inter-Numerology Interference (INI). The upcoming 6G technology aims to support innovative applications with high data rates, low latency, and reliability. Therefore, effective handling of INI is crucial to meet the diverse requirements of these applications. To address INI in MN-OFDM systems, this paper proposes a User-Based Numerology and Waveform (UBNW) approach that uses various OFDM-based waveforms and their parameters to mitigate INI. By assigning a specific waveform and numerology to each user, UBNW mitigates INI, optimizes service characteristics, and addresses user demands efficiently. The required Guard Bands (GB), expressed as a ratio of user bandwidth, vary significantly across different waveforms at an SIR of 25 dB. For instance, OFDM-FOFDM needs only 2.5%, while OFDM-UFMC, OFDM-WOLA, and conventional OFDM require 7.5%, 24%, and 40%, respectively. The time-frequency efficiency also varies between the waveforms. FOFDM achieves 85.6%, UFMC achieves 81.6%, WOLA achieves 70.7%, and conventional OFDM achieves 66.8%. The simulation results demonstrate that the UBNW approach not only effectively mitigates INI but also enhances system flexibility and time-frequency efficiency while simultaneously reducing the required GB.
混合数字数字OFDM (MN-OFDM)系统在6G及以后是必不可少的。然而,由于数字命理学之间的干扰(INI),它遇到了挑战。即将推出的6G技术旨在支持具有高数据速率、低延迟和可靠性的创新应用。因此,有效地处理INI对于满足这些应用程序的不同需求至关重要。为了解决MN-OFDM系统中的INI,本文提出了一种基于用户的数字和波形(UBNW)方法,该方法使用各种基于ofdm的波形及其参数来缓解INI。通过为每个用户分配特定的波形和数字,UBNW减轻了INI,优化了服务特性,并有效地满足了用户需求。所需的保护带(GB),表示为用户带宽的比率,在25 dB的SIR下,在不同的波形之间变化很大。例如,OFDM- fofdm只需要2.5%,而OFDM- ufmc、OFDM- wola和传统OFDM分别需要7.5%、24%和40%。不同波形的时频效率也不同。FOFDM达到85.6%,UFMC达到81.6%,WOLA达到70.7%,传统OFDM达到66.8%。仿真结果表明,UBNW方法不仅有效地缓解了INI,而且提高了系统的灵活性和时频效率,同时降低了所需的GB。
{"title":"Enhancing flexibility and system performance in 6G and beyond: A user-based numerology and waveform approach","authors":"Mohamed S. Sayed ,&nbsp;Hatem M. Zakaria ,&nbsp;Abdelhady M. Abdelhady","doi":"10.1016/j.dcan.2024.10.020","DOIUrl":"10.1016/j.dcan.2024.10.020","url":null,"abstract":"<div><div>A Mixed Numerology OFDM (MN-OFDM) system is essential in 6G and beyond. However, it encounters challenges due to Inter-Numerology Interference (INI). The upcoming 6G technology aims to support innovative applications with high data rates, low latency, and reliability. Therefore, effective handling of INI is crucial to meet the diverse requirements of these applications. To address INI in MN-OFDM systems, this paper proposes a User-Based Numerology and Waveform (UBNW) approach that uses various OFDM-based waveforms and their parameters to mitigate INI. By assigning a specific waveform and numerology to each user, UBNW mitigates INI, optimizes service characteristics, and addresses user demands efficiently. The required Guard Bands (GB), expressed as a ratio of user bandwidth, vary significantly across different waveforms at an SIR of 25 dB. For instance, OFDM-FOFDM needs only 2.5%, while OFDM-UFMC, OFDM-WOLA, and conventional OFDM require 7.5%, 24%, and 40%, respectively. The time-frequency efficiency also varies between the waveforms. FOFDM achieves 85.6%, UFMC achieves 81.6%, WOLA achieves 70.7%, and conventional OFDM achieves 66.8%. The simulation results demonstrate that the UBNW approach not only effectively mitigates INI but also enhances system flexibility and time-frequency efficiency while simultaneously reducing the required GB.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 975-991"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VANETs group message secure forwarding with trust evaluation VANETs组消息安全转发与信任评估
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.007
Lijun Wang , Huajie Hao , Chun Wang , Xianzhou Han
Efficient and safe information exchange between vehicles can reduce the probability of road accidents, thereby improving the driving experience of vehicles in Vehicular Ad Hoc Networks (VANETs). This paper proposes a group management algorithm with trust and mobility evaluation to address the enormous pressure on VANETs topology caused by high-speed vehicle movement and dynamic changes in the direction of travel. This algorithm utilizes historical interactive data to mine the fusion trust between vehicles. Then, combined with fusion mobility, the selection of center members and information maintenance of group members is achieved. Furthermore, based on bilinear pairing, an encryption protocol is designed to solve the problem of key management and update when the group structure changes rapidly, ensuring the safe forwarding of messages within and between groups. Numerical analysis shows that the algorithm in the paper ensures group stability and improves performance such as average message delivery rate and interaction delay.
车辆之间高效、安全的信息交换可以降低道路事故发生的概率,从而改善车辆在车辆自组织网络(VANETs)中的驾驶体验。针对车辆高速行驶和行驶方向动态变化对VANETs拓扑结构造成的巨大压力,提出了一种具有信任度和机动性评价的群管理算法。该算法利用历史交互数据挖掘车辆间的融合信任。然后结合融合移动性,实现了中心成员的选择和群体成员的信息维护。在此基础上,设计了基于双线性对的加密协议,解决了组结构快速变化时密钥管理和更新的问题,保证了组内和组间消息的安全转发。数值分析表明,本文算法保证了群的稳定性,提高了平均消息传递率和交互延迟等性能。
{"title":"VANETs group message secure forwarding with trust evaluation","authors":"Lijun Wang ,&nbsp;Huajie Hao ,&nbsp;Chun Wang ,&nbsp;Xianzhou Han","doi":"10.1016/j.dcan.2024.11.007","DOIUrl":"10.1016/j.dcan.2024.11.007","url":null,"abstract":"<div><div>Efficient and safe information exchange between vehicles can reduce the probability of road accidents, thereby improving the driving experience of vehicles in Vehicular Ad Hoc Networks (VANETs). This paper proposes a group management algorithm with trust and mobility evaluation to address the enormous pressure on VANETs topology caused by high-speed vehicle movement and dynamic changes in the direction of travel. This algorithm utilizes historical interactive data to mine the fusion trust between vehicles. Then, combined with fusion mobility, the selection of center members and information maintenance of group members is achieved. Furthermore, based on bilinear pairing, an encryption protocol is designed to solve the problem of key management and update when the group structure changes rapidly, ensuring the safe forwarding of messages within and between groups. Numerical analysis shows that the algorithm in the paper ensures group stability and improves performance such as average message delivery rate and interaction delay.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1150-1157"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight consensus mechanisms in the Internet of Blockchained Things: Thorough analysis and research directions 区块链物联网中的轻量级共识机制:深入分析和研究方向
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.12.007
Somia Sahraoui , Abdelmalik Bachir
The Internet of Things (IoT) has gained substantial attention in both academic research and real-world applications. The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services. However, this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats. Consequently, innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed. Recently, the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions, commonly referred to as the Internet of Blockchained Things (IoBT). Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments. Within this context, consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems. The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential. This paper presents a comprehensive examination of lightweight, constraint-aware consensus algorithms tailored for IoBT. The study categorizes these consensus mechanisms based on their core operations, the security of the block validation process, the incorporation of AI techniques, and the specific applications they are designed to support.
物联网(IoT)在学术研究和实际应用中都得到了极大的关注。跨不同领域的互联设备的激增承诺提供智能和先进的服务。然而,这种快速扩张也加剧了物联网生态系统对安全威胁的脆弱性。因此,迫切需要能够有效降低风险,同时适应物联网环境独特限制的创新解决方案。最近,区块链技术和物联网的融合引入了一个分散和强大的框架来保护数据和交互,通常被称为区块链物联网(IoBT)。广泛的研究工作致力于调整区块链技术以满足物联网部署的具体要求。在此背景下,共识算法在评估区块链融入物联网生态系统的可行性方面发挥着关键作用。采用高效和轻量级的共识机制进行区块验证变得越来越重要。本文介绍了为IoBT量身定制的轻量级,约束感知共识算法的全面检查。该研究根据这些共识机制的核心操作、区块验证过程的安全性、人工智能技术的结合以及它们旨在支持的特定应用程序对这些共识机制进行了分类。
{"title":"Lightweight consensus mechanisms in the Internet of Blockchained Things: Thorough analysis and research directions","authors":"Somia Sahraoui ,&nbsp;Abdelmalik Bachir","doi":"10.1016/j.dcan.2024.12.007","DOIUrl":"10.1016/j.dcan.2024.12.007","url":null,"abstract":"<div><div>The Internet of Things (IoT) has gained substantial attention in both academic research and real-world applications. The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services. However, this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats. Consequently, innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed. Recently, the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions, commonly referred to as the Internet of Blockchained Things (IoBT). Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments. Within this context, consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems. The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential. This paper presents a comprehensive examination of lightweight, constraint-aware consensus algorithms tailored for IoBT. The study categorizes these consensus mechanisms based on their core operations, the security of the block validation process, the incorporation of AI techniques, and the specific applications they are designed to support.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1246-1261"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proof-of-trusted-work: A lightweight blockchain consensus for decentralized IoT networks 可信工作证明:分布式物联网网络的轻量级区块链共识
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.011
Pengzhan Jiang , Long Shi , Bin Cao , Taotao Wang , Baofeng Ji , Jun Li
Traditional Internet of Things (IoT) architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage. To address this issue, blockchain has been advocated for decentralized data management in a tamper-resistance, traceable, and transparent manner. However, a major issue that hinders the integration of blockchain and IoT lies in that, it is rather challenging for resource-constrained IoT devices to perform computation-intensive blockchain consensuses such as Proof-of-Work (PoW). Furthermore, the incentive mechanism of PoW pushes lightweight IoT nodes to aggregate their computing power to increase the possibility of successful block generation. Nevertheless, this eventually leads to the formation of computing power alliances, and significantly compromises the decentralization and security of BlockChain-aided IoT (BC-IoT) networks. To cope with these issues, we propose a lightweight consensus protocol for BC-IoT, called Proof-of-Trusted-Work (PoTW). The goal of the proposed consensus is to disincentivize the centralization of computing power and encourage the independent participation of lightweight IoT nodes in blockchain consensus. First, we put forth an on-chain reputation evaluation rule and a reputation chain for PoTW to enable the verifiability and traceability of nodes' reputations based on their contributions of computing power to the blockchain consensus, and we incorporate the multi-level block generation difficulty as a rewards for nodes to accumulate reputations. Second, we model the block generation process of PoTW and analyze the block throughput using the continuous time Markov chain. Additionally, we define and optimize the relative throughput gain to quantify and maximize the capability of PoTW that suppresses the computing power centralization (i.e., centralization suppression). Furthermore, we investigate the impact of the computing power of the computing power alliance and the levels of block generation difficulty on the centralization suppression capability of PoTW. Finally, simulation results demonstrate the consistency of the analytical results in terms of block throughput. In particular, the results show that PoTW effectively reduces the block generation proportion of the computing power alliance compared with PoW, while simultaneously improving that of individual lightweight nodes. This indicates that PoTW is capable of suppressing the centralization of computing power to a certain degree. Moreover, as the levels of block generation difficulty in PoTW increase, its centralization suppression capability strengthens.
传统的物联网(IoT)架构依赖集中式服务器进行数据管理和决策,容易受到安全威胁和隐私泄露。为了解决这个问题,区块链一直提倡以防篡改、可追踪和透明的方式进行分散的数据管理。然而,阻碍区块链与物联网融合的一个主要问题在于,对于资源受限的物联网设备来说,执行工作量证明(PoW)等计算密集型区块链共识是相当具有挑战性的。此外,PoW的激励机制推动轻量级物联网节点聚集其计算能力,以增加成功生成区块的可能性。然而,这最终导致了计算能力联盟的形成,并严重损害了区块链辅助物联网(BC-IoT)网络的去中心化和安全性。为了解决这些问题,我们提出了一种轻量级的BC-IoT共识协议,称为可信工作证明(pow)。提议共识的目标是抑制计算能力的集中化,并鼓励轻量级物联网节点独立参与区块链共识。首先,我们提出了链上声誉评估规则和pow声誉链,根据节点对区块链共识的计算能力贡献,实现节点声誉的可验证性和可追溯性,并将多级块生成难度作为节点积累声誉的奖励。其次,对pow的区块生成过程进行建模,并利用连续时间马尔可夫链分析区块吞吐量。此外,我们定义并优化了相对吞吐量增益,以量化和最大化PoTW抑制计算能力集中化(即集中化抑制)的能力。此外,我们还研究了算力联盟的算力和区块生成难度对pow中心化抑制能力的影响。最后,仿真结果证明了分析结果在块吞吐量方面的一致性。特别是,结果表明,与PoW相比,PoTW有效地降低了计算能力联盟的块生成比例,同时提高了单个轻量级节点的生成比例。这说明PoTW能够在一定程度上抑制计算能力的集中化。此外,随着区块生成难度等级的增加,PoTW的中心化抑制能力增强。
{"title":"Proof-of-trusted-work: A lightweight blockchain consensus for decentralized IoT networks","authors":"Pengzhan Jiang ,&nbsp;Long Shi ,&nbsp;Bin Cao ,&nbsp;Taotao Wang ,&nbsp;Baofeng Ji ,&nbsp;Jun Li","doi":"10.1016/j.dcan.2024.10.011","DOIUrl":"10.1016/j.dcan.2024.10.011","url":null,"abstract":"<div><div>Traditional Internet of Things (IoT) architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage. To address this issue, blockchain has been advocated for decentralized data management in a tamper-resistance, traceable, and transparent manner. However, a major issue that hinders the integration of blockchain and IoT lies in that, it is rather challenging for resource-constrained IoT devices to perform computation-intensive blockchain consensuses such as Proof-of-Work (PoW). Furthermore, the incentive mechanism of PoW pushes lightweight IoT nodes to aggregate their computing power to increase the possibility of successful block generation. Nevertheless, this eventually leads to the formation of computing power alliances, and significantly compromises the decentralization and security of BlockChain-aided IoT (BC-IoT) networks. To cope with these issues, we propose a lightweight consensus protocol for BC-IoT, called Proof-of-Trusted-Work (PoTW). The goal of the proposed consensus is to disincentivize the centralization of computing power and encourage the independent participation of lightweight IoT nodes in blockchain consensus. First, we put forth an on-chain reputation evaluation rule and a reputation chain for PoTW to enable the verifiability and traceability of nodes' reputations based on their contributions of computing power to the blockchain consensus, and we incorporate the multi-level block generation difficulty as a rewards for nodes to accumulate reputations. Second, we model the block generation process of PoTW and analyze the block throughput using the continuous time Markov chain. Additionally, we define and optimize the relative throughput gain to quantify and maximize the capability of PoTW that suppresses the computing power centralization (i.e., centralization suppression). Furthermore, we investigate the impact of the computing power of the computing power alliance and the levels of block generation difficulty on the centralization suppression capability of PoTW. Finally, simulation results demonstrate the consistency of the analytical results in terms of block throughput. In particular, the results show that PoTW effectively reduces the block generation proportion of the computing power alliance compared with PoW, while simultaneously improving that of individual lightweight nodes. This indicates that PoTW is capable of suppressing the centralization of computing power to a certain degree. Moreover, as the levels of block generation difficulty in PoTW increase, its centralization suppression capability strengthens.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1055-1066"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios 非合作场景下基于联合通信参数估计的高效调制模式识别
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.016
Xiangdong Huang , Yimin Wang , Yanping Li , Xiaolei Wang
Due to the neglect of the retrieval of communication parameters (including the symbol rate, the symbol timing offset, and the carrier frequency), the existing non-cooperative communication mode recognizers suffer from the generality ability degradation and severe difficulty in distinguishing a large number of modulation modes, etc. To overcome these drawbacks, this paper proposes an efficient communication mode recognizer consisting of communication parameter estimation, the constellation diagram retrieval, and a classification network. In particular, we define a 2-D symbol synchronization metric to retrieve both the symbol rate and the symbol timing offset, whereas a constellation dispersity annealing procedure is devised to correct the carrier frequency accurately. Owing to the accurate estimation of these crucial parameters, high-regularity constellation maps can be retrieved and thus simplify the subsequent classification work. Numerical results show that the proposed communication mode recognizer acquires higher classification accuracy, stronger anti-noise robustness, and higher applicability of distinguishing multiple types, which presents the proposed scheme with vast applicable potentials in non-cooperative scenarios.
现有的非合作通信模式识别器由于忽略了对通信参数(包括码元速率、码元时序偏移和载波频率)的检索,存在通用性下降、难以识别大量调制模式等问题。为了克服这些缺点,本文提出了一种由通信参数估计、星座图检索和分类网络组成的高效通信模式识别器。特别地,我们定义了一个二维符号同步度量来检索符号速率和符号时间偏移,而设计了一个星座分散退火程序来精确校正载波频率。由于这些关键参数的准确估计,可以检索到高规律性的星座图,从而简化后续的分类工作。数值结果表明,该通信模式识别器具有较高的分类精度、较强的抗噪声鲁棒性和较强的多类型识别适用性,在非合作场景下具有广阔的应用潜力。
{"title":"Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios","authors":"Xiangdong Huang ,&nbsp;Yimin Wang ,&nbsp;Yanping Li ,&nbsp;Xiaolei Wang","doi":"10.1016/j.dcan.2024.10.016","DOIUrl":"10.1016/j.dcan.2024.10.016","url":null,"abstract":"<div><div>Due to the neglect of the retrieval of communication parameters (including the symbol rate, the symbol timing offset, and the carrier frequency), the existing non-cooperative communication mode recognizers suffer from the generality ability degradation and severe difficulty in distinguishing a large number of modulation modes, etc. To overcome these drawbacks, this paper proposes an efficient communication mode recognizer consisting of communication parameter estimation, the constellation diagram retrieval, and a classification network. In particular, we define a 2-D symbol synchronization metric to retrieve both the symbol rate and the symbol timing offset, whereas a constellation dispersity annealing procedure is devised to correct the carrier frequency accurately. Owing to the accurate estimation of these crucial parameters, high-regularity constellation maps can be retrieved and thus simplify the subsequent classification work. Numerical results show that the proposed communication mode recognizer acquires higher classification accuracy, stronger anti-noise robustness, and higher applicability of distinguishing multiple types, which presents the proposed scheme with vast applicable potentials in non-cooperative scenarios.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1080-1090"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-chain mapping blockchain: Scalable data management in massive IoT networks 跨链映射区块链:大规模物联网网络中的可扩展数据管理
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.001
Wenjian Hu , Yao Yu , Xin Hao , Phee Lep Yeoh , Lei Guo , Yonghui Li
We propose a Cross-Chain Mapping Blockchain (CCMB) for scalable data management in massive Internet of Things (IoT) networks. Specifically, CCMB aims to improve the scalability of securely storing, tracing, and transmitting IoT behavior and reputation data based on our proposed cross-mapped Behavior Chain (BChain) and Reputation Chain (RChain). To improve off-chain IoT data storage scalability, we show that our lightweight CCMB architecture efficiently utilizes available fog-cloud resources. The scalability of on-chain IoT data tracing is enhanced using our Mapping Smart Contract (MSC) and cross-chain mapping design to perform rapid Reputation-to-Behavior (R2B) traceability queries between BChain and RChain blocks. To maximize off-chain to on-chain throughput, we optimize the CCMB block settings and producers based on a general Poisson Point Process (PPP) network model. The constrained optimization problem is formulated as a Markov Decision Process (MDP), and solved using a dual-network Deep Reinforcement Learning (DRL) algorithm. Simulation results validate CCMB's scalability advantages in storage, traceability, and throughput. In specific massive IoT scenarios, CCMB can reduce the storage footprint by 50% and traceability query time by 90%, while improving system throughput by 55% compared to existing benchmarks.
我们提出了一种跨链映射区块链(CCMB),用于大规模物联网(IoT)网络中的可扩展数据管理。具体来说,CCMB旨在提高基于我们提出的交叉映射行为链(BChain)和声誉链(RChain)的安全存储、跟踪和传输物联网行为和声誉数据的可扩展性。为了提高链下物联网数据存储的可扩展性,我们的轻量级CCMB架构有效地利用了可用的雾云资源。使用我们的映射智能合约(MSC)和跨链映射设计来增强链上物联网数据跟踪的可扩展性,以在BChain和RChain块之间执行快速的声誉到行为(R2B)可追溯性查询。为了最大限度地提高链下到链上的吞吐量,我们基于通用泊松点过程(PPP)网络模型优化了CCMB区块设置和生产者。将约束优化问题表述为马尔可夫决策过程(MDP),并采用双网络深度强化学习(DRL)算法求解。仿真结果验证了CCMB在存储、可追溯性和吞吐量方面的可扩展性优势。在特定的大规模物联网场景中,与现有基准相比,CCMB可以将存储空间占用减少50%,可追溯性查询时间减少90%,同时将系统吞吐量提高55%。
{"title":"Cross-chain mapping blockchain: Scalable data management in massive IoT networks","authors":"Wenjian Hu ,&nbsp;Yao Yu ,&nbsp;Xin Hao ,&nbsp;Phee Lep Yeoh ,&nbsp;Lei Guo ,&nbsp;Yonghui Li","doi":"10.1016/j.dcan.2024.11.001","DOIUrl":"10.1016/j.dcan.2024.11.001","url":null,"abstract":"<div><div>We propose a Cross-Chain Mapping Blockchain (CCMB) for scalable data management in massive Internet of Things (IoT) networks. Specifically, CCMB aims to improve the scalability of securely storing, tracing, and transmitting IoT behavior and reputation data based on our proposed cross-mapped Behavior Chain (BChain) and Reputation Chain (RChain). To improve off-chain IoT data storage scalability, we show that our lightweight CCMB architecture efficiently utilizes available fog-cloud resources. The scalability of on-chain IoT data tracing is enhanced using our Mapping Smart Contract (MSC) and cross-chain mapping design to perform rapid Reputation-to-Behavior (R2B) traceability queries between BChain and RChain blocks. To maximize off-chain to on-chain throughput, we optimize the CCMB block settings and producers based on a general Poisson Point Process (PPP) network model. The constrained optimization problem is formulated as a Markov Decision Process (MDP), and solved using a dual-network Deep Reinforcement Learning (DRL) algorithm. Simulation results validate CCMB's scalability advantages in storage, traceability, and throughput. In specific massive IoT scenarios, CCMB can reduce the storage footprint by 50% and traceability query time by 90%, while improving system throughput by 55% compared to existing benchmarks.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1125-1140"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1