首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
2025 Reviewers List* 2025审稿人名单*
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-04 DOI: 10.1109/TMC.2026.3653591
{"title":"2025 Reviewers List*","authors":"","doi":"10.1109/TMC.2026.3653591","DOIUrl":"https://doi.org/10.1109/TMC.2026.3653591","url":null,"abstract":"","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4455-4477"},"PeriodicalIF":9.2,"publicationDate":"2026-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11372682","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fall Risk Prediction Method Based on Human Electrostatic Field and Stacking Ensemble Learning Algorithm 基于人体静电场和叠加集成学习算法的跌倒风险预测方法
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1109/TMC.2025.3647110
Sichao Qin;Jiaao Yan;Ziyi Jiao;Weijie Yuan;Xi Chen
Accurate fall risk prediction is crucial for early intervention and prevention, effectively reducing the incidence of falls and the associated harm. This paper proposes a non-contact gait detection and fall risk prediction method based on the human electrostatic field and Stacking ensemble learning algorithm. A theoretical model for gait detection based on the human electrostatic field is established, and an experimental scheme is designed. The electrostatic gait measurement system is used to collect electrostatic gait signals from healthy young individuals, healthy elderly individuals, and elderly individuals with a history of falls. Gait features, including 28-dimensional quantifiable characteristics, are proposed for evaluating human balance and motor abilities, covering four aspects: gait time parameters, gait symmetry based on ratios and signal similarity, gait stability based on the maximum Lyapunov exponent and entropy information, and gait time parameter variability. A hybrid feature reduction method based on Particle Swarm Optimization (PSO) is used to obtain the optimal feature subset. Fall risk prediction models based on single classifiers (DT, SVM, KNN, and NB) are constructed using both the original feature set and the optimal feature subset. The single classifier based on the optimal feature subset achieves better classification performance. Furthermore, a Stacking ensemble learning model using LightGBM as the meta-learner is developed, achieving an accuracy of 97.78%. This study provides a novel approach for fall risk prediction that can predict the likelihood of falls and reduce the probability of their occurrence.
准确的跌倒风险预测对于早期干预和预防至关重要,可以有效降低跌倒的发生率和相关危害。提出了一种基于人体静电场和叠加集成学习算法的非接触步态检测和跌倒风险预测方法。建立了基于人体静电场的步态检测理论模型,并设计了实验方案。静电步态测量系统用于采集健康年轻人、健康老年人和有跌倒史的老年人的静电步态信号。步态特征包括28维可量化特征,可用于评估人体平衡和运动能力,涵盖四个方面:步态时间参数、基于比率和信号相似度的步态对称性、基于最大Lyapunov指数和熵信息的步态稳定性以及步态时间参数变异性。采用基于粒子群优化(PSO)的混合特征约简方法获得最优特征子集。利用原始特征集和最优特征子集构建了基于DT、SVM、KNN和NB的单分类器跌倒风险预测模型。基于最优特征子集的单分类器具有更好的分类性能。在此基础上,建立了基于LightGBM元学习器的叠加集成学习模型,准确率达到97.78%。该研究为跌倒风险预测提供了一种新的方法,可以预测跌倒的可能性并降低其发生的概率。
{"title":"Fall Risk Prediction Method Based on Human Electrostatic Field and Stacking Ensemble Learning Algorithm","authors":"Sichao Qin;Jiaao Yan;Ziyi Jiao;Weijie Yuan;Xi Chen","doi":"10.1109/TMC.2025.3647110","DOIUrl":"https://doi.org/10.1109/TMC.2025.3647110","url":null,"abstract":"Accurate fall risk prediction is crucial for early intervention and prevention, effectively reducing the incidence of falls and the associated harm. This paper proposes a non-contact gait detection and fall risk prediction method based on the human electrostatic field and Stacking ensemble learning algorithm. A theoretical model for gait detection based on the human electrostatic field is established, and an experimental scheme is designed. The electrostatic gait measurement system is used to collect electrostatic gait signals from healthy young individuals, healthy elderly individuals, and elderly individuals with a history of falls. Gait features, including 28-dimensional quantifiable characteristics, are proposed for evaluating human balance and motor abilities, covering four aspects: gait time parameters, gait symmetry based on ratios and signal similarity, gait stability based on the maximum Lyapunov exponent and entropy information, and gait time parameter variability. A hybrid feature reduction method based on Particle Swarm Optimization (PSO) is used to obtain the optimal feature subset. Fall risk prediction models based on single classifiers (DT, SVM, KNN, and NB) are constructed using both the original feature set and the optimal feature subset. The single classifier based on the optimal feature subset achieves better classification performance. Furthermore, a Stacking ensemble learning model using LightGBM as the meta-learner is developed, achieving an accuracy of 97.78%. This study provides a novel approach for fall risk prediction that can predict the likelihood of falls and reduce the probability of their occurrence.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4443-4454"},"PeriodicalIF":9.2,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EdgeBatch: Efficient Decentralized Batch Verification for Edge Data Integrity via Reputation-Aware Combination Selection EdgeBatch:通过声誉感知组合选择对边缘数据完整性进行有效的分散批量验证
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-16 DOI: 10.1109/TMC.2025.3645025
Jian Li;Yibo Chen;Qinglin Zhao;Jincheng Cai;Shaohua Teng;Naiqi Wu
Data integrity verification in geographically distributed edge systems remains a critical unsolved challenge. While centralized verification introduces bottlenecks and single points of failure, existing decentralized alternatives suffer from inefficiency due to their lack of batch verification capabilities. This limitation leads to prohibitive communication and computational overheads that scale poorly as data volume grows. This paper introduces EdgeBatch, the first decentralized protocol designed for efficient batch integrity verification, reducing communication rounds from $mathcal {O}(n)$ to $mathcal {O}(1)$ a small, constant number. At its core is a reputation-aware Combination Selection Algorithm (CSA), a polynomial-time heuristic that identifies near-optimal peer server combinations, balancing verifier group size against servers’ historical trustworthiness through intelligent pruning strategies. This process is orchestrated through distributed ledger technology and smart contracts, ensuring a secure, transparent, and trustless verification environment. The protocol’s design is underpinned by rigorous theoretical analysis, including formal proofs of security and correctness, and a probabilistic model for optimizing key system parameters. Extensive simulations show that EdgeBatch drastically outperforms state-of-the-art methods; it improves computational efficiency by an average of 518.60× over EdgeWatch and 1030.93× over CooperEDI, while also reducing communication overhead by 296.68× and 62.66×, respectively. A concluding ablation study confirms the vital role of our reputation mechanism, demonstrating it reduces the required verification rounds by 73% and is the key to the protocol’s efficiency.
地理分布边缘系统的数据完整性验证仍然是一个关键的未解决的挑战。虽然集中式验证引入了瓶颈和单点故障,但现有的分散替代方案由于缺乏批量验证功能而效率低下。随着数据量的增长,这种限制导致了令人望而却步的通信和计算开销。本文介绍了EdgeBatch,这是第一个为高效批处理完整性验证而设计的去中心化协议,它将通信轮数从$mathcal {O}(n)$减少到$mathcal {O}(1)$(一个小的常数)。其核心是声誉感知组合选择算法(CSA),这是一种多项式时间启发式算法,用于识别接近最优的对等服务器组合,通过智能修剪策略平衡验证者组大小和服务器的历史可信度。这一过程通过分布式账本技术和智能合约进行编排,确保了一个安全、透明和无需信任的验证环境。该协议的设计以严格的理论分析为基础,包括安全性和正确性的正式证明,以及优化关键系统参数的概率模型。广泛的模拟表明,EdgeBatch大大优于最先进的方法;与EdgeWatch相比,计算效率平均提高518.60倍,与CooperEDI相比,计算效率平均提高1030.93倍,通信开销分别降低296.68倍和62.66倍。一项结论性消融研究证实了我们的声誉机制的重要作用,表明它将所需的验证轮数减少了73%,是协议效率的关键。
{"title":"EdgeBatch: Efficient Decentralized Batch Verification for Edge Data Integrity via Reputation-Aware Combination Selection","authors":"Jian Li;Yibo Chen;Qinglin Zhao;Jincheng Cai;Shaohua Teng;Naiqi Wu","doi":"10.1109/TMC.2025.3645025","DOIUrl":"https://doi.org/10.1109/TMC.2025.3645025","url":null,"abstract":"Data integrity verification in geographically distributed edge systems remains a critical unsolved challenge. While centralized verification introduces bottlenecks and single points of failure, existing decentralized alternatives suffer from inefficiency due to their lack of batch verification capabilities. This limitation leads to prohibitive communication and computational overheads that scale poorly as data volume grows. This paper introduces EdgeBatch, the first decentralized protocol designed for efficient batch integrity verification, reducing communication rounds from <inline-formula><tex-math>$mathcal {O}(n)$</tex-math></inline-formula> to <inline-formula><tex-math>$mathcal {O}(1)$</tex-math></inline-formula> a small, constant number. At its core is a reputation-aware Combination Selection Algorithm (CSA), a polynomial-time heuristic that identifies near-optimal peer server combinations, balancing verifier group size against servers’ historical trustworthiness through intelligent pruning strategies. This process is orchestrated through distributed ledger technology and smart contracts, ensuring a secure, transparent, and trustless verification environment. The protocol’s design is underpinned by rigorous theoretical analysis, including formal proofs of security and correctness, and a probabilistic model for optimizing key system parameters. Extensive simulations show that EdgeBatch drastically outperforms state-of-the-art methods; it improves computational efficiency by an average of 518.60× over EdgeWatch and 1030.93× over CooperEDI, while also reducing communication overhead by 296.68× and 62.66×, respectively. A concluding ablation study confirms the vital role of our reputation mechanism, demonstrating it reduces the required verification rounds by 73% and is the key to the protocol’s efficiency.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4425-4442"},"PeriodicalIF":9.2,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trading Continuous Queries 交易连续查询
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-24 DOI: 10.1109/TMC.2025.3625547
Jin Cheng;Ningning Ding;John C.S. Lui;Jianwei Huang
In the Big Data era, data trading significantly enhances data-driven decision-making by facilitating data sharing. Streaming data from sources such as mobile devices and social media platforms creates new opportunities and challenges for data trading. Traditional data trading methods, designed for one-time queries over static database snapshots, neglect the growing need for trading continuous queries over streaming data. If applied directly to continuous queries, existing methods often result in repeated and imprecise charges that reduce the seller's profit, as they do not consider computation sharing during continuous query execution. To address these challenges, we propose CQTrade, the first mechanism for continuous query-based data trading, which incorporates computation sharing in query execution and integrates seamlessly with existing trading mechanisms. Our contributions are threefold: (1) we provide a theoretical analysis of prevalent computation-sharing techniques, including cost modeling and closed-form computation-sharing strategy derivation; (2) we formulate a general optimization problem to maximize the seller's profit, adaptable to various computation-sharing techniques; (3) we identify that our optimization problem merges vector bin packing and multidimensional knapsack challenges, and we tackle this complexity with a tailored branch-and-price algorithm that decomposes the problem into a masterproblem and multiple sub-problems, achieving a globally optimal solution. Evaluation shows CQTrade improves trading success rate by 12.8% and increases seller profit by 28.7% compared to traditional methods.
在大数据时代,数据交易通过促进数据共享,显著增强了数据驱动决策。来自移动设备和社交媒体平台等来源的流数据为数据交易创造了新的机遇和挑战。传统的数据交易方法是为静态数据库快照上的一次性查询而设计的,忽略了对流数据上的连续查询进行交易的日益增长的需求。如果直接应用于连续查询,现有方法通常会导致重复和不精确的收费,从而降低卖方的利润,因为它们没有考虑在连续查询执行期间共享计算。为了应对这些挑战,我们提出了CQTrade,这是第一个基于查询的连续数据交易机制,它在查询执行中集成了计算共享,并与现有交易机制无缝集成。我们的贡献有三个方面:(1)我们对流行的计算共享技术进行了理论分析,包括成本建模和封闭形式的计算共享策略推导;(2)以卖方利润最大化为目标,提出了一个通用的优化问题,该问题适用于各种计算共享技术;(3)我们发现我们的优化问题合并了向量箱包装和多维背包挑战,并且我们使用定制的分支和价格算法来解决这种复杂性,该算法将问题分解为一个主问题和多个子问题,从而获得全局最优解。评估表明,与传统方法相比,CQTrade交易成功率提高了12.8%,卖家利润提高了28.7%。
{"title":"Trading Continuous Queries","authors":"Jin Cheng;Ningning Ding;John C.S. Lui;Jianwei Huang","doi":"10.1109/TMC.2025.3625547","DOIUrl":"https://doi.org/10.1109/TMC.2025.3625547","url":null,"abstract":"In the Big Data era, data trading significantly enhances data-driven decision-making by facilitating data sharing. Streaming data from sources such as mobile devices and social media platforms creates new opportunities and challenges for data trading. Traditional data trading methods, designed for one-time queries over static database snapshots, neglect the growing need for trading continuous queries over streaming data. If applied directly to continuous queries, existing methods often result in repeated and imprecise charges that reduce the seller's profit, as they do not consider computation sharing during continuous query execution. To address these challenges, we propose CQTrade, the first mechanism for continuous query-based data trading, which incorporates computation sharing in query execution and integrates seamlessly with existing trading mechanisms. Our contributions are threefold: (1) we provide a theoretical analysis of prevalent computation-sharing techniques, including cost modeling and closed-form computation-sharing strategy derivation; (2) we formulate a general optimization problem to maximize the seller's profit, adaptable to various computation-sharing techniques; (3) we identify that our optimization problem merges vector bin packing and multidimensional knapsack challenges, and we tackle this complexity with a tailored branch-and-price algorithm that decomposes the problem into a masterproblem and multiple sub-problems, achieving a globally optimal solution. Evaluation shows CQTrade improves trading success rate by 12.8% and increases seller profit by 28.7% compared to traditional methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4253-4268"},"PeriodicalIF":9.2,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Based Versatile Voice Eavesdropping Prevention for Mobile Devices 基于学习的移动设备多功能语音窃听预防
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-23 DOI: 10.1109/TMC.2025.3624756
Wenbin Huang;Ju Ren;Hangcheng Cao;Hongbo Jiang;Panlong Yang;Zhangjie Fu
Voice-enabled mobile applications (apps) are exploding in popularity as they could be manipulated with voice commands to achieve convenient man-machine interaction. These voice-enabled apps also raise security and privacy concerns about whether they would maliciously invoke microphones to realize voice eavesdropping. To explore this issue, in this work, we design baleful apps to access the microphone covertly, the results of test studies demonstrate that covert eavesdropping attacks can bypass existing device detection schemes as well as are unnoticeable to human users. To prevent the covert voice eavesdropping attack, we propose a versatile microphone icon detection (MicID) scheme inspired by the groundtruth that authorization of the voice function requires the user to touch the specific microphone icon in most of voice-based apps. Specifically, we devise a deep learning model, lightweight YOLO (L-YOLO), to locate the microphone icon on the screen quickly and accurately. By determining whether the located microphone icon is touched by the user, we can judge whether the current microphone access belongs to the app’s normal operation or illegal eavesdropping. Finally, we conduct extensive experiments by deploying the scheme on real devices and collecting dataset. The evaluation results show that the proposed MicID scheme achieves more than 99% accuracy with low computation cost.
语音移动应用程序(app)可以通过语音命令进行操作,从而实现方便的人机交互,因此受到了广泛的欢迎。这些支持语音的应用程序也引起了人们对安全和隐私的担忧,即它们是否会恶意调用麦克风来实现语音窃听。为了探索这个问题,在这项工作中,我们设计了恶意应用程序来隐蔽地访问麦克风,测试研究的结果表明,隐蔽窃听攻击可以绕过现有的设备检测方案,并且对人类用户来说是不明显的。为了防止隐蔽的语音窃听攻击,我们提出了一种通用的麦克风图标检测(MicID)方案,该方案的灵感来自于在大多数基于语音的应用程序中,语音功能的授权需要用户触摸特定的麦克风图标。具体来说,我们设计了一个深度学习模型,轻量级YOLO (L-YOLO),以快速准确地定位屏幕上的麦克风图标。通过判断所定位的麦克风图标是否被用户触摸,我们可以判断当前的麦克风访问是属于应用的正常操作还是非法窃听。最后,我们通过在实际设备上部署该方案并收集数据集进行了广泛的实验。评价结果表明,该方案的准确率达到99%以上,且计算成本低。
{"title":"Learning Based Versatile Voice Eavesdropping Prevention for Mobile Devices","authors":"Wenbin Huang;Ju Ren;Hangcheng Cao;Hongbo Jiang;Panlong Yang;Zhangjie Fu","doi":"10.1109/TMC.2025.3624756","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624756","url":null,"abstract":"Voice-enabled <italic>mobile applications</i> (apps) are exploding in popularity as they could be manipulated with voice commands to achieve convenient man-machine interaction. These voice-enabled apps also raise security and privacy concerns about whether they would maliciously invoke microphones to realize voice eavesdropping. To explore this issue, in this work, we design baleful apps to access the microphone covertly, the results of test studies demonstrate that covert eavesdropping attacks can bypass existing device detection schemes as well as are unnoticeable to human users. To prevent the covert voice eavesdropping attack, we propose a versatile <italic>microphone icon detection</i> (MicID) scheme inspired by the groundtruth that authorization of the voice function requires the user to touch the specific microphone icon in most of voice-based apps. Specifically, we devise a deep learning model, <italic>lightweight YOLO</i> (L-YOLO), to locate the microphone icon on the screen quickly and accurately. By determining whether the located microphone icon is touched by the user, we can judge whether the current microphone access belongs to the app’s normal operation or illegal eavesdropping. Finally, we conduct extensive experiments by deploying the scheme on real devices and collecting dataset. The evaluation results show that the proposed MicID scheme achieves more than 99% accuracy with low computation cost.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4393-4408"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symmetric Orchestration Under Service Mesh Paradigm: Empowering Massive Online Applications in Edge Clouds 服务网格范式下的对称编排:增强边缘云中的大规模在线应用
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-23 DOI: 10.1109/TMC.2025.3624628
Kai Peng;Tongxin Liao;Mingyuan Ren;Yi Hu;Liangliang Wu;Menglan Hu;Hongbo Jiang
With the rapid advancement of edge computing, service mesh has emerged as a critical technology for improving network performance, owing to its flexibility and scalability. However, massive online applications in edge clouds pose significant challenges to microservice orchestration, including high concurrency, complex service dependencies, strict response delay requirements, and fast orchestration needs. Addressing these challenges requires efficient and fast orchestration strategies, but existing approaches often lack accurate models and effective algorithms to handle these complexities. To tackle the above challenges, this paper proposes an efficient Symmetric Microservice Deployment (SMD) algorithm for fast orchestration. First, accurate modeling is achieved with the queuing network, which analyzes intertwined requests and calculates detailed delays. Moreover, the SMD algorithm simplifies the coupling between deployment and routing by considering internal dependencies during deployment. This integrated approach eliminates the need for separate routing solutions and ensures provable optimal performance under symmetric deployment. Experimental results demonstrate that, compared to four baseline algorithms, the proposed method reduces response delay by 25.5% and execution time by 58.4%, showcasing the potential and advantages of the algorithm for optimizing microservice orchestration in edge clouds networks.
随着边缘计算的快速发展,业务网格以其灵活性和可扩展性成为提高网络性能的关键技术。然而,边缘云中的大量在线应用程序对微服务编排提出了重大挑战,包括高并发性、复杂的服务依赖关系、严格的响应延迟要求和快速编排需求。解决这些挑战需要高效和快速的编排策略,但是现有的方法通常缺乏精确的模型和有效的算法来处理这些复杂性。为了解决上述问题,本文提出了一种高效的对称微服务部署(SMD)算法,用于快速编排。首先,利用排队网络实现了精确的建模,该网络分析了相互交织的请求并计算了详细的延迟。此外,SMD算法通过考虑部署过程中的内部依赖关系,简化了部署与路由之间的耦合。这种集成方法消除了对单独路由解决方案的需求,并确保在对称部署下可证明的最佳性能。实验结果表明,与四种基准算法相比,该算法的响应延迟降低了25.5%,执行时间降低了58.4%,显示了该算法在边缘云网络中优化微服务编排的潜力和优势。
{"title":"Symmetric Orchestration Under Service Mesh Paradigm: Empowering Massive Online Applications in Edge Clouds","authors":"Kai Peng;Tongxin Liao;Mingyuan Ren;Yi Hu;Liangliang Wu;Menglan Hu;Hongbo Jiang","doi":"10.1109/TMC.2025.3624628","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624628","url":null,"abstract":"With the rapid advancement of edge computing, service mesh has emerged as a critical technology for improving network performance, owing to its flexibility and scalability. However, massive online applications in edge clouds pose significant challenges to microservice orchestration, including high concurrency, complex service dependencies, strict response delay requirements, and fast orchestration needs. Addressing these challenges requires efficient and fast orchestration strategies, but existing approaches often lack accurate models and effective algorithms to handle these complexities. To tackle the above challenges, this paper proposes an efficient Symmetric Microservice Deployment (SMD) algorithm for fast orchestration. First, accurate modeling is achieved with the queuing network, which analyzes intertwined requests and calculates detailed delays. Moreover, the SMD algorithm simplifies the coupling between deployment and routing by considering internal dependencies during deployment. This integrated approach eliminates the need for separate routing solutions and ensures provable optimal performance under symmetric deployment. Experimental results demonstrate that, compared to four baseline algorithms, the proposed method reduces response delay by 25.5% and execution time by 58.4%, showcasing the potential and advantages of the algorithm for optimizing microservice orchestration in edge clouds networks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4300-4316"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BagChain: A Dual-Functional Blockchain Leveraging Bagging-Based Distributed Machine Learning 袋子链:利用基于袋子的分布式机器学习的双功能袋子
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-23 DOI: 10.1109/TMC.2025.3624804
Zixiang Cui;Xintong Ling;Xingyu Zhou;Jiaheng Wang;Zhi Ding;Xiqi Gao
Exploiting on-device data and computing power for machine learning at the network edge is challenged by constrained device resources, privacy requirements, and local data heterogeneity. To address the above gap, this work proposes a dual-functional blockchain framework named BagChain for bagging-based decentralized ML. BagChain integrates blockchain with distributed ML by replacing the computationally costly hash computing in proof-of-work with ML model training and validation, and does not rely on any trusted central servers. Individual miners in BagChain train base models by using their local computing resources and private data and further aggregate these base models, which could be very weak, into strong ensemble models. More specifically, we design a three-layer blockchain structure and associated generation and validation mechanisms to enable distributed ML among uncoordinated miners without revealing raw data. To reduce computational waste due to blockchain forking, we further propose the cross fork sharing mechanism for practical networks with lengthy delay and limited bandwidth. Extensive experiments illustrate the superiority and efficacy of BagChain when handling various ML tasks on both independently and identically distributed (IID) and non-IID datasets. BagChain remains robust and effective even when facing resource-constrained mobile devices, heterogeneous private user data, and limited network connectivity.
在网络边缘利用设备上的数据和计算能力进行机器学习受到设备资源、隐私要求和本地数据异构性的限制。为了解决上述差距,本工作提出了一个名为BagChain的双功能区块链框架,用于基于bagging的去中心化ML。BagChain通过用ML模型训练和验证取代工作量证明中计算成本高昂的哈希计算,将区块链与分布式ML集成在一起,并且不依赖于任何可信的中央服务器。BagChain中的个体矿工通过使用他们的本地计算资源和私有数据来训练基础模型,并进一步将这些可能非常弱的基础模型聚合为强大的集成模型。更具体地说,我们设计了一个三层区块链结构和相关的生成和验证机制,以在不泄露原始数据的情况下在不协调的矿工之间实现分布式ML。为了减少区块链分叉造成的计算浪费,我们进一步提出了用于长时延和有限带宽的实际网络的交叉分叉共享机制。大量的实验证明了BagChain在处理独立和同分布(IID)和非IID数据集上的各种ML任务时的优越性和有效性。即使面对资源受限的移动设备、异构私有用户数据和有限的网络连接,BagChain仍然保持强大和有效。
{"title":"BagChain: A Dual-Functional Blockchain Leveraging Bagging-Based Distributed Machine Learning","authors":"Zixiang Cui;Xintong Ling;Xingyu Zhou;Jiaheng Wang;Zhi Ding;Xiqi Gao","doi":"10.1109/TMC.2025.3624804","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624804","url":null,"abstract":"Exploiting on-device data and computing power for machine learning at the network edge is challenged by constrained device resources, privacy requirements, and local data heterogeneity. To address the above gap, this work proposes a dual-functional blockchain framework named BagChain for bagging-based decentralized ML. BagChain integrates blockchain with distributed ML by replacing the computationally costly hash computing in proof-of-work with ML model training and validation, and does not rely on any trusted central servers. Individual miners in BagChain train base models by using their local computing resources and private data and further aggregate these base models, which could be very weak, into strong ensemble models. More specifically, we design a three-layer blockchain structure and associated generation and validation mechanisms to enable distributed ML among uncoordinated miners without revealing raw data. To reduce computational waste due to blockchain forking, we further propose the cross fork sharing mechanism for practical networks with lengthy delay and limited bandwidth. Extensive experiments illustrate the superiority and efficacy of BagChain when handling various ML tasks on both independently and identically distributed (IID) and non-IID datasets. BagChain remains robust and effective even when facing resource-constrained mobile devices, heterogeneous private user data, and limited network connectivity.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4206-4222"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Movable Antenna-Enabled Micro-Mobility Replace UAV-Enabled Macro-Mobility? A Physical Layer Security Perspective 可移动天线的微机动性能取代无人机的宏观机动性吗?物理层安全透视图
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-22 DOI: 10.1109/TMC.2025.3624340
Kaixuan Li;Kan Yu;Dingyou Ma;Yujia Zhao;Xiaowu Liu;Qixun Zhang;Zhiyong Feng
This paper investigates the potential of movable antenna (MA)-enabled micro-mobility to replace UAV-enabled macro-mobility for enhancing physical layer security (PLS) in air-to-ground communications. While UAV trajectory optimization offers high flexibility and Line-of-Sight (LoS) advantages, it suffers from significant energy consumption, latency, and complex trajectory optimization. Conversely, MA technology provides fine-grained spatial reconfiguration (antenna positioning within a confined area) with ultra-low energy overhead and millisecond-scale response, enabling real-time channel manipulation and covert beam steering. To systematically compare these paradigms, we establish a dual-scale mobility framework where a UAV-mounted uniform linear array (ULA) serves as a base station transmitting confidential information to a legitimate user (Bob) in the presence of an eavesdropper (Eve). We formulate non-convex average secrecy rate (ASR) maximization problems for both schemes: 1) MA-based micro-mobility: Jointly optimizing antenna positions and beamforming (BF) vectors under positioning constraints; 2) UAV-based macro-mobility: Jointly optimizing the UAV’s trajectory and BF vectors under kinematic constraints. Extensive simulations reveal distinct operational regimes: MA micro-mobility demonstrates significant ASR advantages in low-transmit-power scenarios or under antenna constraints due to its energy-efficient spatial control. Conversely, UAV macro-mobility excels under resource-sufficient conditions (higher power, larger antenna arrays) by leveraging global mobility for optimal positioning. The findings highlight the complementary strengths of both approaches, suggesting hybrid micro-macro mobility as a promising direction for balancing security, energy efficiency, and deployment complexity in future wireless networks.
本文研究了可移动天线(MA)支持的微移动性取代无人机支持的宏观移动性的潜力,以增强空对地通信中的物理层安全性(PLS)。当UAV轨迹优化提供高灵活性和视距(LoS)优势时,它遭受显著的能量消耗、延迟和复杂的轨迹优化。相反,MA技术提供了细粒度的空间重构(在受限区域内的天线定位),具有超低的能量开销和毫秒级的响应,可以实现实时通道操纵和隐蔽波束转向。为了系统地比较这些范例,我们建立了一个双尺度移动框架,其中无人机安装的均匀线性阵列(ULA)作为基站,在窃听者(Eve)存在的情况下向合法用户(Bob)传输机密信息。提出了两种方案的非凸平均保密率(ASR)最大化问题:1)基于ma的微移动性:在定位约束下联合优化天线位置和波束成形(BF)矢量;2)基于无人机的宏观机动性:在运动学约束下,联合优化无人机的轨迹和BF向量。大量的模拟揭示了不同的运行机制:由于其节能的空间控制,MA微移动性在低发射功率场景或天线约束下显示出显著的ASR优势。相反,无人机的宏观机动性在资源充足的条件下(更高的功率,更大的天线阵列)通过利用全局机动性来实现最佳定位。研究结果强调了这两种方法的互补优势,表明混合微宏观移动性是未来无线网络平衡安全性、能源效率和部署复杂性的一个有前途的方向。
{"title":"Can Movable Antenna-Enabled Micro-Mobility Replace UAV-Enabled Macro-Mobility? A Physical Layer Security Perspective","authors":"Kaixuan Li;Kan Yu;Dingyou Ma;Yujia Zhao;Xiaowu Liu;Qixun Zhang;Zhiyong Feng","doi":"10.1109/TMC.2025.3624340","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624340","url":null,"abstract":"This paper investigates the potential of movable antenna (MA)-enabled micro-mobility to replace UAV-enabled macro-mobility for enhancing physical layer security (PLS) in air-to-ground communications. While UAV trajectory optimization offers high flexibility and Line-of-Sight (LoS) advantages, it suffers from significant energy consumption, latency, and complex trajectory optimization. Conversely, MA technology provides fine-grained spatial reconfiguration (antenna positioning within a confined area) with ultra-low energy overhead and millisecond-scale response, enabling real-time channel manipulation and covert beam steering. To systematically compare these paradigms, we establish a dual-scale mobility framework where a UAV-mounted uniform linear array (ULA) serves as a base station transmitting confidential information to a legitimate user (Bob) in the presence of an eavesdropper (Eve). We formulate non-convex average secrecy rate (ASR) maximization problems for both schemes: 1) MA-based micro-mobility: Jointly optimizing antenna positions and beamforming (BF) vectors under positioning constraints; 2) UAV-based macro-mobility: Jointly optimizing the UAV’s trajectory and BF vectors under kinematic constraints. Extensive simulations reveal distinct operational regimes: MA micro-mobility demonstrates significant ASR advantages in low-transmit-power scenarios or under antenna constraints due to its energy-efficient spatial control. Conversely, UAV macro-mobility excels under resource-sufficient conditions (higher power, larger antenna arrays) by leveraging global mobility for optimal positioning. The findings highlight the complementary strengths of both approaches, suggesting hybrid micro-macro mobility as a promising direction for balancing security, energy efficiency, and deployment complexity in future wireless networks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4317-4330"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Multi-Authority Accurate Matchmaking Encryption Scheme for Mobile Social Networks 移动社交网络的分散多权威精确配对加密方案
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-22 DOI: 10.1109/TMC.2025.3623732
Jiayun Yan;Jie Chen;Haifeng Qian;Jianting Ning;Debiao He
Mobile social networks (MSNs) are integral to the digital era, but the current architectures raise fundamental challenges to user privacy and security. First, these systems rely on a trusted authority, which causes the single point of failure and raises concerns about data leakage. Second, there is a lack of cryptographic mechanisms to enforce bilateral access control, which ensures mutual consent communication by both senders and receivers. Therefore, it’s necessary to design a system to eliminate single-point trust and accurate consent-based matchmaking access control between users. To address these issues, we propose a decentralized multi-authority identity-based matchmaking encryption (DMA-IBME) scheme, including its formal syntax and security definitions. This primitive enables bilateral access control, which ensures both data privacy and user authenticity. Moreover, we formally prove the security of our scheme in the random oracle model under the standard bilinear Diffie-Hellman ($mathsf {BDH}$) assumption. Performance evaluation demonstrates the efficiency of our scheme. Compared to existing works, our construction reduces the setup time by approximately 50% and the encryption key generation time by 30%. Furthermore, the storage costs for public parameters, encryption keys, and ciphertexts are reduced by approximately 30%, 30%, and 88%, respectively.
移动社交网络(msn)是数字时代不可或缺的一部分,但目前的架构对用户隐私和安全提出了根本性的挑战。首先,这些系统依赖于可信的权威机构,这会导致单点故障,并引起对数据泄漏的担忧。其次,缺乏加密机制来执行双边访问控制,从而确保发送方和接收方之间的相互同意通信。因此,有必要设计一个系统来消除用户之间的单点信任和精确的基于同意的配对访问控制。为了解决这些问题,我们提出了一个分散的多权威基于身份的配对加密(DMA-IBME)方案,包括其正式语法和安全定义。该原语支持双边访问控制,从而确保数据隐私和用户真实性。此外,在标准双线性Diffie-Hellman ($mathsf {BDH}$)假设下,我们正式证明了该方案在随机oracle模型中的安全性。性能评估表明了该方案的有效性。与现有的工作相比,我们的构建减少了大约50%的设置时间和30%的加密密钥生成时间。此外,公共参数、加密密钥和密文的存储成本分别降低了大约30%、30%和88%。
{"title":"Decentralized Multi-Authority Accurate Matchmaking Encryption Scheme for Mobile Social Networks","authors":"Jiayun Yan;Jie Chen;Haifeng Qian;Jianting Ning;Debiao He","doi":"10.1109/TMC.2025.3623732","DOIUrl":"https://doi.org/10.1109/TMC.2025.3623732","url":null,"abstract":"Mobile social networks (MSNs) are integral to the digital era, but the current architectures raise fundamental challenges to user privacy and security. First, these systems rely on a trusted authority, which causes the single point of failure and raises concerns about data leakage. Second, there is a lack of cryptographic mechanisms to enforce bilateral access control, which ensures mutual consent communication by both senders and receivers. Therefore, it’s necessary to design a system to eliminate single-point trust and accurate consent-based matchmaking access control between users. To address these issues, we propose a decentralized multi-authority identity-based matchmaking encryption (DMA-IBME) scheme, including its formal syntax and security definitions. This primitive enables bilateral access control, which ensures both data privacy and user authenticity. Moreover, we formally prove the security of our scheme in the random oracle model under the standard bilinear Diffie-Hellman (<inline-formula><tex-math>$mathsf {BDH}$</tex-math></inline-formula>) assumption. Performance evaluation demonstrates the efficiency of our scheme. Compared to existing works, our construction reduces the setup time by approximately 50% and the encryption key generation time by 30%. Furthermore, the storage costs for public parameters, encryption keys, and ciphertexts are reduced by approximately 30%, 30%, and 88%, respectively.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4381-4392"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twin-Assisted Space-Air-Ground Integrated Multi-Access Edge Computing for Low-Altitude Economy: An Online Decentralized Optimization Approach 面向低空经济的数字双辅助空-空-地集成多址边缘计算:一种在线分散优化方法
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-22 DOI: 10.1109/TMC.2025.3623636
Long He;Geng Sun;Zemin Sun;Jiacheng Wang;Hongyang Du;Dusit Niyato;Jiangchuan Liu;Victor C. M. Leung
The emergence of space-air-ground integrated multi-access edge computing (SAGIMEC) networks opens a significant opportunity for the rapidly growing low altitude economy (LAE), facilitating the development of various applications by offering efficient communication and computing services. However, the heterogeneous nature of SAGIMEC networks, coupled with the stringent computational and communication requirements of diverse applications in the LAE, introduces considerable challenges in integrating SAGIMEC into the LAE. In this work, we first present a digital twin-assisted SAGIMEC paradigm for LAE, where digital twin enables reliable network monitoring and management, while SAGIMEC provides efficient computing offloading services for Internet of Things sensor devices (ISDs). Then, a joint satellite selection, computation offloading, communication resource allocation, computation resource allocation and uncrewed aerial vehicle (UAV) trajectory control optimization problem ($text{JSC}^{4}text{OP}$) is formulated to maximize the quality of service (QoS) of ISDs. Given the complexity of $text{JSC}^{4}text{OP}$, we propose an online decentralized optimization approach (ODOA) to address the problem. Specifically, $text{JSC}^{4}text{OP}$ is first transformed into a real-time decision-making optimization problem (RDOP) by leveraging Lyapunov optimization. Then, to solve the RDOP, we introduce an online learning-based latency prediction method to predict the uncertain system environment and a game theoretic decision-making method to make real-time decisions. Finally, theoretical analysis confirms the effectiveness of the ODOA. Simulation results show that the proposed ODOA outperforms various benchmark approaches and improves the QoS of ISDs by at least 14.5% compared to deep reinforcement learning (DRL)-based approaches, thereby validating the superiority of the proposed approach.
空间-空地综合多接入边缘计算(SAGIMEC)网络的出现为快速增长的低空经济(LAE)打开了一个重要的机会,通过提供高效的通信和计算服务,促进了各种应用的发展。然而,SAGIMEC网络的异构特性,加上LAE中各种应用的严格计算和通信要求,为将SAGIMEC集成到LAE中带来了相当大的挑战。在这项工作中,我们首先提出了一种用于LAE的数字孪生辅助SAGIMEC范式,其中数字孪生实现了可靠的网络监控和管理,而SAGIMEC为物联网传感器设备(isd)提供了高效的计算卸载服务。然后,为实现isd服务质量(QoS)的最大化,制定了联合卫星选择、计算卸载、通信资源分配、计算资源分配和无人机(UAV)轨迹控制优化问题($text{JSC}^{4}text{OP}$)。鉴于$text{JSC}^{4}text{OP}$的复杂性,我们提出了一种在线分散优化方法(ODOA)来解决这个问题。具体来说,$text{JSC}^{4}text{OP}$首先通过利用Lyapunov优化将其转化为实时决策优化问题(RDOP)。然后,为了解决RDOP问题,我们引入了一种基于在线学习的延迟预测方法来预测不确定的系统环境,并引入了一种博弈论决策方法来进行实时决策。最后,通过理论分析验证了ODOA的有效性。仿真结果表明,与基于深度强化学习(DRL)的方法相比,所提出的ODOA优于各种基准方法,并将isd的QoS提高了至少14.5%,从而验证了所提出方法的优越性。
{"title":"Digital Twin-Assisted Space-Air-Ground Integrated Multi-Access Edge Computing for Low-Altitude Economy: An Online Decentralized Optimization Approach","authors":"Long He;Geng Sun;Zemin Sun;Jiacheng Wang;Hongyang Du;Dusit Niyato;Jiangchuan Liu;Victor C. M. Leung","doi":"10.1109/TMC.2025.3623636","DOIUrl":"https://doi.org/10.1109/TMC.2025.3623636","url":null,"abstract":"The emergence of space-air-ground integrated multi-access edge computing (SAGIMEC) networks opens a significant opportunity for the rapidly growing low altitude economy (LAE), facilitating the development of various applications by offering efficient communication and computing services. However, the heterogeneous nature of SAGIMEC networks, coupled with the stringent computational and communication requirements of diverse applications in the LAE, introduces considerable challenges in integrating SAGIMEC into the LAE. In this work, we first present a digital twin-assisted SAGIMEC paradigm for LAE, where digital twin enables reliable network monitoring and management, while SAGIMEC provides efficient computing offloading services for Internet of Things sensor devices (ISDs). Then, a <u><b>j</b></u>oint <u><b>s</b></u>atellite selection, <u><b>c</b></u>omputation offloading, <u><b>c</b></u>ommunication resource allocation, <u><b>c</b></u>omputation resource allocation and uncrewed aerial vehicle (UAV) trajectory <u><b>c</b></u>ontrol optimization problem (<inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula>) is formulated to maximize the quality of service (QoS) of ISDs. Given the complexity of <inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula>, we propose an online decentralized optimization approach (ODOA) to address the problem. Specifically, <inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula> is first transformed into a real-time decision-making optimization problem (RDOP) by leveraging Lyapunov optimization. Then, to solve the RDOP, we introduce an online learning-based latency prediction method to predict the uncertain system environment and a game theoretic decision-making method to make real-time decisions. Finally, theoretical analysis confirms the effectiveness of the ODOA. Simulation results show that the proposed ODOA outperforms various benchmark approaches and improves the QoS of ISDs by at least 14.5% compared to deep reinforcement learning (DRL)-based approaches, thereby validating the superiority of the proposed approach.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4363-4380"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1