首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
Distributed Modulation Exploiting IRS for Secure Communications 利用IRS实现安全通信的分布式调制
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-16 DOI: 10.1109/TMC.2025.3579960
Zhao Li;Lijuan Zhang;Siwei Le;Kang G. Shin;Jia Liu;Zheng Yan
Due to the broadcast nature of wireless communications, users’ data transmitted wirelessly is susceptible to security/privacy threats. The conventional modulation scheme “loads” all of the user’s transmitted information onto a physical signal. Then, as long as an adversary overhears and processes the signal, s/he may access the user’s information, hence breaching communication privacy. To counter this threat, we propose IRS-DMSC, a Distributed Modulation based Secure Communication (DMSC) scheme by exploiting Intelligent Reflecting Surface (IRS). Under IRS-DMSC, two sub-signals are employed to realize legitimate data transmission. Of these two signals, one is directly generated by the legitimate transmitter (Tx), while the other is obtained by modulating the phase of the direct signal and then reflecting it at the IRS in an indirect way. Both the direct and indirect signal components superimpose on each other at the legitimate receiver (Rx) to produce a waveform identical to that obtained under traditional centralized modulation (CM), so that the legitimate Rx can employ the conventional demodulation method to recover the desired data from the received signal. IRS-DMSC incorporates the characteristics of wireless channels into the modulation process, and hence can fully exploit the randomness of wireless channels to enhance transmission secrecy. However, due to the distribution and randomization of legitimate transmission, it becomes difficult or even impossible for an eavesdropper to wiretap the legitimate user’s information. Furthermore, in order to address the problem of decoding error incurred by the difference of two physical channels’ fading, we develop Relative Phase Calibration (RPC) and Constellation Point Calibration (CPC), to improve decoding correctness at the legitimate Rx. Our method design, experiment, and simulation have shown the proposed IRS-DMSC to prevent eavesdroppers from intercepting legitimate information while maintaining good performance of the legitimate transmission.
由于无线通信的广播性质,用户无线传输的数据容易受到安全/隐私威胁。传统的调制方案将所有用户的传输信息“加载”到一个物理信号上。那么,攻击者只要对信号进行监听和处理,就可以获取用户的信息,从而侵犯了通信隐私。为了应对这种威胁,我们提出了IRS-DMSC,一种利用智能反射面(IRS)的基于分布式调制的安全通信(DMSC)方案。IRS-DMSC采用两个子信号实现数据的合法传输。在这两个信号中,一个是由合法的发射机(Tx)直接产生的,而另一个是通过调制直接信号的相位,然后以间接的方式在IRS反射得到的。直接和间接信号分量在合法接收机(Rx)上相互叠加,产生与传统集中式调制(CM)下获得的波形相同的波形,从而使合法接收机(Rx)可以采用常规解调方法从接收信号中恢复所需的数据。IRS-DMSC将无线信道的特性融入到调制过程中,可以充分利用无线信道的随机性,提高传输保密性。然而,由于合法传输的分布性和随机性,窃听者很难甚至不可能窃听到合法用户的信息。此外,为了解决两个物理信道衰落差异导致的译码错误问题,我们开发了相对相位校准(RPC)和星座点校准(CPC),以提高合法Rx处的译码正确性。我们的方法设计、实验和仿真表明,本文提出的IRS-DMSC可以防止窃听者拦截合法信息,同时保持合法传输的良好性能。
{"title":"Distributed Modulation Exploiting IRS for Secure Communications","authors":"Zhao Li;Lijuan Zhang;Siwei Le;Kang G. Shin;Jia Liu;Zheng Yan","doi":"10.1109/TMC.2025.3579960","DOIUrl":"https://doi.org/10.1109/TMC.2025.3579960","url":null,"abstract":"Due to the broadcast nature of wireless communications, users’ data transmitted wirelessly is susceptible to security/privacy threats. The conventional modulation scheme “loads” all of the user’s transmitted information onto a physical signal. Then, as long as an adversary overhears and processes the signal, s/he may access the user’s information, hence breaching communication privacy. To counter this threat, we propose <bold>IRS-DMSC</b>, a <italic>Distributed Modulation based Secure Communication</i> (DMSC) scheme by exploiting <italic>Intelligent Reflecting Surface</i> (IRS). Under IRS-DMSC, two sub-signals are employed to realize legitimate data transmission. Of these two signals, one is directly generated by the legitimate transmitter (Tx), while the other is obtained by modulating the phase of the direct signal and then reflecting it at the IRS in an indirect way. Both the direct and indirect signal components superimpose on each other at the legitimate receiver (Rx) to produce a waveform identical to that obtained under traditional centralized modulation (CM), so that the legitimate Rx can employ the conventional demodulation method to recover the desired data from the received signal. IRS-DMSC incorporates the characteristics of wireless channels into the modulation process, and hence can fully exploit the randomness of wireless channels to enhance transmission secrecy. However, due to the distribution and randomization of legitimate transmission, it becomes difficult or even impossible for an eavesdropper to wiretap the legitimate user’s information. Furthermore, in order to address the problem of decoding error incurred by the difference of two physical channels’ fading, we develop <italic>Relative Phase Calibration</i> (RPC) and <italic>Constellation Point Calibration</i> (CPC), to improve decoding correctness at the legitimate Rx. Our method design, experiment, and simulation have shown the proposed IRS-DMSC to prevent eavesdroppers from intercepting legitimate information while maintaining good performance of the legitimate transmission.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"11193-11208"},"PeriodicalIF":9.2,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Charging With Beam Steering 自适应充电与波束转向
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-16 DOI: 10.1109/TMC.2025.3579692
Meixuan Ren;Haipeng Dai;Linglin Zhang;Tang Liu
With the maturation of wireless power transfer technology, Wireless Rechargeable Sensor Networks (WRSNs) have been able to provide a continuous energy supply by scheduling a Mobile Charger (MC). However, traditional charging modes suffer from fixed charging areas that lack the ability to adapt to variable sensor distributions. This inflexibility yields a gap between energy supply and utilization, resulting in relatively low charging efficiency. To address this issue, we propose an adaptive charging mode that utilizes beam steering to dynamically adjust the charging area, thereby catering to different sensor distributions encountered during the charging process. First, we build a dual-symmetric steering charging model to describe the characteristics of dynamic beam steering, enabling precise manipulation of the charging area. Then, we develop a charging power discretization based on steering angle and charging distance to obtain a finite feasible charging strategy set for MC. We reformalize charging utility maximization under energy constraints as a submodular function maximization problem, and propose an approximate algorithm to solve it. Lastly, simulations and field experiments demonstrate that our scheme outperforms other algorithms by 43.9% on average.
随着无线能量传输技术的成熟,无线充电传感器网络(WRSNs)已经能够通过调度移动充电器(MC)来提供持续的能量供应。然而,传统的充电模式受到固定充电区域的影响,缺乏适应可变传感器分布的能力。这种不灵活性造成了能源供应和利用之间的差距,导致充电效率相对较低。为了解决这个问题,我们提出了一种自适应充电模式,该模式利用光束转向来动态调整充电区域,从而满足充电过程中遇到的不同传感器分布。首先,我们建立了双对称转向充电模型来描述动态光束转向的特性,实现了对充电区域的精确控制。在此基础上,提出了基于转向角和充电距离的充电功率离散化方法,得到了有限可行的MC充电策略集,并将能量约束下的充电效用最大化问题重新化为子模函数最大化问题,提出了求解该问题的近似算法。最后,仿真和现场实验表明,我们的方案比其他算法平均高出43.9%。
{"title":"Adaptive Charging With Beam Steering","authors":"Meixuan Ren;Haipeng Dai;Linglin Zhang;Tang Liu","doi":"10.1109/TMC.2025.3579692","DOIUrl":"https://doi.org/10.1109/TMC.2025.3579692","url":null,"abstract":"With the maturation of wireless power transfer technology, Wireless Rechargeable Sensor Networks (WRSNs) have been able to provide a continuous energy supply by scheduling a Mobile Charger (MC). However, traditional charging modes suffer from fixed charging areas that lack the ability to adapt to variable sensor distributions. This inflexibility yields a gap between energy supply and utilization, resulting in relatively low charging efficiency. To address this issue, we propose an adaptive charging mode that utilizes beam steering to dynamically adjust the charging area, thereby catering to different sensor distributions encountered during the charging process. First, we build a dual-symmetric steering charging model to describe the characteristics of dynamic beam steering, enabling precise manipulation of the charging area. Then, we develop a charging power discretization based on steering angle and charging distance to obtain a finite feasible charging strategy set for MC. We reformalize charging utility maximization under energy constraints as a submodular function maximization problem, and propose an approximate algorithm to solve it. Lastly, simulations and field experiments demonstrate that our scheme outperforms other algorithms by 43.9% on average.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"11224-11240"},"PeriodicalIF":9.2,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combating BLE Weak Links by Combining PHY Layer Symbol Extension and Link Layer Coding 结合物理层符号扩展和链路层编码对抗BLE弱链路
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-16 DOI: 10.1109/TMC.2025.3579934
Renjie Li;Yeming Li;Jiamei Lv;Hailong Lin;Yi Gao;Wei Dong
Bluetooth Low Energy (BLE) technology supports various Internet-of-Things (IoT) applications. However, because of their limited transmission power and channel interference, their performance is deficient over weak links. Extending physical layer symbols or using error correction code to the link layer is effective somehow. Introducing excessive BLE bits to both respectively can also decrease the network throughput. To optimize the BLE technology performance, we propose CPL, a combining PHY and link layer optimization technology that adaptively allocates BLE bits to both the physical layer and link layer. Then we propose the Cross-Layer BLE Bits Dynamic Allocation Model that unifies the gain of BLE bits in different layers. Finally, we propose an Interference-Aware Controlled CFO Fine-Tuning Method that calibrates the model according to different interference patterns. We implement CPL on Commercial-Off-The-Shelf (COTS) BLE chips and SDR. The experiment results show that under various interference conditions, CPL achieves 50× and 32.16% throughput improvement over RSBLE and Symphony. CPL reduces energy consumption by 60.42% to 97.95% compared to RSBLE, and 11.04% to 25.15% compared to Symphony.
蓝牙低功耗(BLE)技术支持各种物联网(IoT)应用。然而,由于其传输功率有限和信道干扰,在薄弱环节中性能较差。在链路层扩展物理层符号或使用纠错码是有效的。在两者中分别引入过多的BLE位也会降低网络吞吐量。为了优化BLE技术的性能,我们提出了CPL,这是一种结合物理层和链路层的优化技术,可以自适应地将BLE位分配到物理层和链路层。在此基础上,提出了统一各层BLE位增益的跨层BLE位动态分配模型。最后,我们提出了一种干扰感知控制CFO微调方法,根据不同的干扰模式对模型进行校准。我们在商用现货(COTS) BLE芯片和SDR上实现CPL。实验结果表明,在各种干扰条件下,CPL的吞吐量比RSBLE和Symphony分别提高了50倍和32.16%。CPL与RSBLE相比能耗降低60.42%至97.95%,与Symphony相比能耗降低11.04%至25.15%。
{"title":"Combating BLE Weak Links by Combining PHY Layer Symbol Extension and Link Layer Coding","authors":"Renjie Li;Yeming Li;Jiamei Lv;Hailong Lin;Yi Gao;Wei Dong","doi":"10.1109/TMC.2025.3579934","DOIUrl":"https://doi.org/10.1109/TMC.2025.3579934","url":null,"abstract":"Bluetooth Low Energy (BLE) technology supports various Internet-of-Things (IoT) applications. However, because of their limited transmission power and channel interference, their performance is deficient over weak links. Extending physical layer symbols or using error correction code to the link layer is effective somehow. Introducing excessive BLE bits to both respectively can also decrease the network throughput. To optimize the BLE technology performance, we propose <italic>CPL</i>, a combining PHY and link layer optimization technology that adaptively allocates BLE bits to both the physical layer and link layer. Then we propose the <italic>Cross-Layer BLE Bits Dynamic Allocation Model</i> that unifies the gain of BLE bits in different layers. Finally, we propose an <italic>Interference-Aware Controlled CFO Fine-Tuning Method</i> that calibrates the model according to different interference patterns. We implement <italic>CPL</i> on Commercial-Off-The-Shelf (COTS) BLE chips and SDR. The experiment results show that under various interference conditions, <italic>CPL</i> achieves 50× and 32.16% throughput improvement over RSBLE and Symphony. <italic>CPL</i> reduces energy consumption by 60.42% to 97.95% compared to RSBLE, and 11.04% to 25.15% compared to Symphony.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"11277-11291"},"PeriodicalIF":9.2,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative UAV-Mounted RISs-Assisted Energy-Efficient Communications 协同无人机搭载的riss辅助节能通信
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-12 DOI: 10.1109/TMC.2025.3579597
Hongyang Pan;Yanheng Liu;Geng Sun;Qingqing Wu;Tierui Gong;Pengfei Wang;Dusit Niyato;Chau Yuen
Cooperative reconfigurable intelligent surfaces (RISs) are promising technologies for 6G networks to support a great number of users. Compared with the fixed RISs, the properly deployed RISs may improve the communication performance with less communication energy consumption, thereby improving the energy efficiency. In this paper, we consider a cooperative uncrewed aerial vehicle-mounted RISs (UAV-RISs)-assisted cellular network, where multiple RISs are carried and enhanced by UAVs to serve multiple ground users (GUs) simultaneously such that achieving the three-dimensional (3D) mobility and opportunistic deployment. Specifically, we formulate an energy-efficient communication problem based on multi-objective optimization framework (EEComm-MOF) to jointly consider the beamforming vector of base station (BS), the location deployment and the discrete phase shifts of UAV-RIS system so as to simultaneously maximize the minimum available rate over all GUs, maximize the total available rate of all GUs, and minimize the total energy consumption of the system, while the transmit power constraint of BS is considered. To comprehensively solve EEComm-MOF which is an NP-hard and non-convex problem with constraints, a non-dominated sorting genetic algorithm-II with a continuous solution processing mechanism, a discrete solution processing mechanism, and a complex solution processing mechanism (INSGA-II-CDC) is proposed. Simulations results demonstrate that the proposed INSGA-II-CDC can solve EEComm-MOF effectively and outperforms other benchmarks under different parameter settings. Moreover, the stability of INSGA-II-CDC and the effectiveness of the improved mechanisms are verified. Finally, the implementability analysis of the algorithm is given.
协作可重构智能表面(RISs)是支持大量用户的6G网络中有前途的技术。与固定的RISs相比,合理部署RISs可以在减少通信能耗的情况下提高通信性能,从而提高能源效率。在本文中,我们考虑了一种协作式无人机机载RISs (UAV-RISs)辅助蜂窝网络,其中多个RISs由无人机携带和增强,同时为多个地面用户(GUs)服务,从而实现三维(3D)移动性和机会部署。具体而言,我们制定了一个基于多目标优化框架(EEComm-MOF)的节能通信问题,综合考虑基站波束形成矢量(BS)、位置部署和UAV-RIS系统的离散相移,以同时最大化所有GUs的最小可用速率,最大化所有GUs的总可用速率,最小化系统的总能耗。同时考虑了BS的发射功率约束。为了综合求解带约束的NP-hard非凸eecom - mof问题,提出了一种具有连续解处理机制、离散解处理机制和复杂解处理机制的非支配排序遗传算法INSGA-II-CDC。仿真结果表明,所提出的INSGA-II-CDC可以有效地解决eecom - mof问题,并在不同参数设置下优于其他基准测试。此外,还验证了INSGA-II-CDC的稳定性和改进机制的有效性。最后,对算法的可实现性进行了分析。
{"title":"Cooperative UAV-Mounted RISs-Assisted Energy-Efficient Communications","authors":"Hongyang Pan;Yanheng Liu;Geng Sun;Qingqing Wu;Tierui Gong;Pengfei Wang;Dusit Niyato;Chau Yuen","doi":"10.1109/TMC.2025.3579597","DOIUrl":"https://doi.org/10.1109/TMC.2025.3579597","url":null,"abstract":"Cooperative reconfigurable intelligent surfaces (RISs) are promising technologies for 6G networks to support a great number of users. Compared with the fixed RISs, the properly deployed RISs may improve the communication performance with less communication energy consumption, thereby improving the energy efficiency. In this paper, we consider a cooperative uncrewed aerial vehicle-mounted RISs (UAV-RISs)-assisted cellular network, where multiple RISs are carried and enhanced by UAVs to serve multiple ground users (GUs) simultaneously such that achieving the three-dimensional (3D) mobility and opportunistic deployment. Specifically, we formulate an energy-efficient communication problem based on multi-objective optimization framework (EEComm-MOF) to jointly consider the beamforming vector of base station (BS), the location deployment and the discrete phase shifts of UAV-RIS system so as to simultaneously maximize the minimum available rate over all GUs, maximize the total available rate of all GUs, and minimize the total energy consumption of the system, while the transmit power constraint of BS is considered. To comprehensively solve EEComm-MOF which is an NP-hard and non-convex problem with constraints, a non-dominated sorting genetic algorithm-II with a continuous solution processing mechanism, a discrete solution processing mechanism, and a complex solution processing mechanism (INSGA-II-CDC) is proposed. Simulations results demonstrate that the proposed INSGA-II-CDC can solve EEComm-MOF effectively and outperforms other benchmarks under different parameter settings. Moreover, the stability of INSGA-II-CDC and the effectiveness of the improved mechanisms are verified. Finally, the implementability analysis of the algorithm is given.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"11241-11258"},"PeriodicalIF":9.2,"publicationDate":"2025-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Empowered Game Theoretical Incentive for Secure Bandwidth Allocation in UAV-Assisted Wireless Networks 无人机辅助无线网络中安全带宽分配的区块链授权博弈理论激励
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-12 DOI: 10.1109/TMC.2025.3579505
Qichao Xu;Zhou Su;Haixia Peng;Yuan Wu;Ruidong Li
Recently, the promising unmanned aerial vehicle (UAV)-assisted wireless networks (UAWNs) have emerged by advocating the UAVs to provide wireless transmission services. However, owing to the ever-growing volume of data traffic and the untrusted network operation environment, efficiently and securely assigning limited bandwidth for high-quality wireless communication between UAVs and mobile users poses a significant challenge. To address this challenge, we propose a novel secure UAV-bandwidth allocation scheme to provision reliable wireless transmission services for mobile users in UAWNs. Specifically, we first introduce a novel blockchain-empowered framework for secure bandwidth allocation, designed to automate payment processes and deter malicious activities through the immutable logging of transactional and behavioral data. Wherein, a smart contract is designed to regulate the honest behaviors of both mobile users and UAVs during bandwidth allocation with a distributed manner. Besides, a delegated proof-of-stake (DPoS) with reputation consensus protocol is presented to ensure the authenticity and efficiency of the decision-making process. Further, we apply the Stackelberg game theory to model the dynamic of the bandwidth allocation between mobile users and UAVs. In this game, the UAVs act as game leaders to determine the bandwidth price, while each mobile user acts as a game follower, making decision on the bandwidth request. We utilize the backward induction method to derive the optimal strategies of both parties, culminating in the identification of the Stackelberg equilibrium of the formulated game. Finally, extensive simulations are carried out to show the superiority of the proposed scheme over conventional schemes in terms of security, efficiency, and fairness in bandwidth allocation.
近年来,倡导无人机提供无线传输服务的无人机辅助无线网络(UAV -assisted wireless network, UAWNs)应运而生。然而,由于不断增长的数据流量和不可信的网络运行环境,有效和安全地分配有限带宽以实现无人机和移动用户之间的高质量无线通信提出了重大挑战。为了解决这一挑战,我们提出了一种新的安全的无人机带宽分配方案,为UAWNs中的移动用户提供可靠的无线传输服务。具体来说,我们首先引入了一种新的区块链授权框架,用于安全带宽分配,旨在通过不可变的交易和行为数据记录自动化支付流程并阻止恶意活动。其中,设计智能合约,以分布式方式规范移动用户和无人机在带宽分配过程中的诚实行为。此外,为了保证决策过程的真实性和有效性,提出了一种具有信誉共识的委托权益证明(DPoS)协议。在此基础上,应用Stackelberg博弈论建立了移动用户与无人机之间带宽分配的动态模型。在这个博弈中,无人机作为博弈领导者决定带宽价格,而每个移动用户作为博弈追随者决定带宽请求。我们利用逆向归纳法推导出双方的最优策略,最终确定了制定的博弈的Stackelberg均衡。最后,进行了大量的仿真,证明了该方案在带宽分配的安全性、效率和公平性方面优于传统方案。
{"title":"Blockchain-Empowered Game Theoretical Incentive for Secure Bandwidth Allocation in UAV-Assisted Wireless Networks","authors":"Qichao Xu;Zhou Su;Haixia Peng;Yuan Wu;Ruidong Li","doi":"10.1109/TMC.2025.3579505","DOIUrl":"https://doi.org/10.1109/TMC.2025.3579505","url":null,"abstract":"Recently, the promising unmanned aerial vehicle (UAV)-assisted wireless networks (UAWNs) have emerged by advocating the UAVs to provide wireless transmission services. However, owing to the ever-growing volume of data traffic and the untrusted network operation environment, efficiently and securely assigning limited bandwidth for high-quality wireless communication between UAVs and mobile users poses a significant challenge. To address this challenge, we propose a novel secure UAV-bandwidth allocation scheme to provision reliable wireless transmission services for mobile users in UAWNs. Specifically, we first introduce a novel blockchain-empowered framework for secure bandwidth allocation, designed to automate payment processes and deter malicious activities through the immutable logging of transactional and behavioral data. Wherein, a smart contract is designed to regulate the honest behaviors of both mobile users and UAVs during bandwidth allocation with a distributed manner. Besides, a delegated proof-of-stake (DPoS) with reputation consensus protocol is presented to ensure the authenticity and efficiency of the decision-making process. Further, we apply the Stackelberg game theory to model the dynamic of the bandwidth allocation between mobile users and UAVs. In this game, the UAVs act as game leaders to determine the bandwidth price, while each mobile user acts as a game follower, making decision on the bandwidth request. We utilize the backward induction method to derive the optimal strategies of both parties, culminating in the identification of the Stackelberg equilibrium of the formulated game. Finally, extensive simulations are carried out to show the superiority of the proposed scheme over conventional schemes in terms of security, efficiency, and fairness in bandwidth allocation.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"11209-11223"},"PeriodicalIF":9.2,"publicationDate":"2025-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoE-Driven Proactive Caching With DRL in Sustainable Cloud-to-Edge Continuum 可持续云到边缘连续体中qos驱动的主动缓存与DRL
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-06 DOI: 10.1109/TMC.2025.3577197
Xiaoming He;Yunzhe Jiang;Huajun Cui;Yinqiu Liu;Mingkai Chen;Maher Guizani;Shahid Mumtaz
Cloud-assisted edge computing scenarios can intelligently cache and update the content periodically, thereby enhancing users’ overall perception of service, which is called quality of experience (QoE). To maximize QoE in cloud-to-edge continuum, we formulate a multi-objective optimization problem, which optimizes the cache hit ratio while simultaneously minimizing traffic load and time latency. Particularly, we present an innovative algorithm named Hyperdimensional Transformer with Priority Experience Playback-based Agent Deep network (HT-PAD), which provides a complete solution for prediction and decision-making for proactive caching. First, to improve the prediction accuracy of cached content, we use the encoding layer in hyperdimensional (HD) computing to extract the information features. Second, HD-Transformer, as the prediction part of HT-PAD, is proposed to make predictions based on user preferences, historical information, and popular information. HD-Transformer uses deep neural networks to predict user preferences and process time series data by combining hyperdimensional computation with the Transformer. Third, to avoid errors in the prediction content, we employ PER-MADDPG as the decision-making part of HT-PAD, which consists of Multi-Agent Deep Deterministic Policy Gradient (MADDPG) and Prioritized Experience Replay (PER). We use MADDPG to improve content decision-making and utilize PER to select appropriate training samples for PER-MADDPG. Finally, our experiments show that our proposed approach achieves strong performance in terms of edge hit ratio, latency, and traffic load, thus improving QoE.
云辅助边缘计算场景可以智能缓存和定期更新内容,从而增强用户对服务的整体感知,即体验质量(quality of experience, QoE)。为了在云到边缘连续体中最大化QoE,我们制定了一个多目标优化问题,在优化缓存命中率的同时最小化流量负载和时间延迟。特别地,我们提出了一种基于优先体验播放的Agent Deep network (HT-PAD)算法,它为主动缓存的预测和决策提供了一个完整的解决方案。首先,为了提高缓存内容的预测精度,我们使用了高维计算中的编码层来提取信息特征。其次,提出HD-Transformer作为HT-PAD的预测部分,基于用户偏好、历史信息和流行信息进行预测。HD-Transformer使用深度神经网络来预测用户偏好,并通过将超维计算与Transformer相结合来处理时间序列数据。第三,为了避免预测内容的误差,我们采用PER-MADDPG作为HT-PAD的决策部分,该部分由多智能体深度确定性策略梯度(madpg)和优先体验重放(PER)组成。我们使用MADDPG来改进内容决策,并利用PER来选择合适的PER-MADDPG训练样本。最后,我们的实验表明,我们提出的方法在边缘命中率、延迟和流量负载方面取得了较好的性能,从而提高了QoE。
{"title":"QoE-Driven Proactive Caching With DRL in Sustainable Cloud-to-Edge Continuum","authors":"Xiaoming He;Yunzhe Jiang;Huajun Cui;Yinqiu Liu;Mingkai Chen;Maher Guizani;Shahid Mumtaz","doi":"10.1109/TMC.2025.3577197","DOIUrl":"https://doi.org/10.1109/TMC.2025.3577197","url":null,"abstract":"Cloud-assisted edge computing scenarios can intelligently cache and update the content periodically, thereby enhancing users’ overall perception of service, which is called quality of experience (QoE). To maximize QoE in cloud-to-edge continuum, we formulate a multi-objective optimization problem, which optimizes the cache hit ratio while simultaneously minimizing traffic load and time latency. Particularly, we present an innovative algorithm named <underline>H</u>yperdimensional <underline>T</u>ransformer with <underline>P</u>riority Experience Playback-based <underline>A</u>gent <underline>D</u>eep network (HT-PAD), which provides a complete solution for prediction and decision-making for proactive caching. First, to improve the prediction accuracy of cached content, we use the encoding layer in hyperdimensional (HD) computing to extract the information features. Second, HD-Transformer, as the prediction part of HT-PAD, is proposed to make predictions based on user preferences, historical information, and popular information. HD-Transformer uses deep neural networks to predict user preferences and process time series data by combining hyperdimensional computation with the Transformer. Third, to avoid errors in the prediction content, we employ PER-MADDPG as the decision-making part of HT-PAD, which consists of Multi-Agent Deep Deterministic Policy Gradient (MADDPG) and Prioritized Experience Replay (PER). We use MADDPG to improve content decision-making and utilize PER to select appropriate training samples for PER-MADDPG. Finally, our experiments show that our proposed approach achieves strong performance in terms of edge hit ratio, latency, and traffic load, thus improving QoE.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"10992-11004"},"PeriodicalIF":9.2,"publicationDate":"2025-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrections to “Learning Domain-Invariant Model for WiFi-Based Indoor Localization” 对“基于wifi的室内定位学习域不变模型”的修正
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-05 DOI: 10.1109/TMC.2025.3539443
Guanzhong Wang;Dongheng Zhang;Tianyu Zhang;Shuai Yang;Qibin Sun;Yan Chen
In the above article [1], on page 13900, right column, there is an empty reference citation “[?]” in the sentence “By applying Model-Agnostic Meta-Learning (MAML) to fingerprint localization, MetaLoc [?] enables the model to quickly adapt to new environments based on the obtained meta-parameters, thus reducing human labor costs.” The missing reference is listed below as [2].
在上述文章[1]中,在第13900页右栏,有一个空参考引文“[?通过将模型不可知元学习(MAML)应用于指纹定位,MetaLoc [?]使模型能够根据获得的元参数快速适应新环境,从而降低人力成本。”缺失的引用如下所示为[2]。
{"title":"Corrections to “Learning Domain-Invariant Model for WiFi-Based Indoor Localization”","authors":"Guanzhong Wang;Dongheng Zhang;Tianyu Zhang;Shuai Yang;Qibin Sun;Yan Chen","doi":"10.1109/TMC.2025.3539443","DOIUrl":"https://doi.org/10.1109/TMC.2025.3539443","url":null,"abstract":"In the above article [1], on page 13900, right column, there is an empty reference citation “[?]” in the sentence “By applying Model-Agnostic Meta-Learning (MAML) to fingerprint localization, MetaLoc [?] enables the model to quickly adapt to new environments based on the obtained meta-parameters, thus reducing human labor costs.” The missing reference is listed below as [2].","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 7","pages":"6718-6718"},"PeriodicalIF":7.7,"publicationDate":"2025-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11026061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to “CV-Cast: Computer Vision–Oriented Linear Coding and Transmission” 更正“CV-Cast:计算机视觉导向的线性编码和传输”
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-05 DOI: 10.1109/TMC.2025.3565860
Jakub Žádník;Michel Kieffer;Anthony Trioux;Markku Mäkitalo;Pekka Jääskeläinen
In the above article [1], on page 1151, eq. (6), there is an error in the equation. The correct equation is: begin{equation*} min.,,D,,,text{s.t.} sumlimits_{k = 1}^K {{{lambda }_k}beta _k^2 leqslant P.} tag{6} end{equation*} min.D,s.t.∑k=1Kλkβk2⩽P.(6)
在上面的文章[1]中,在第1151页,方程(6)中,方程中有一个错误。正确公式为:begin{equation*} min.,,D,,,text{s.t.} sumlimits_{k = 1}^K {{{lambda }_k}beta _k^2 leqslant P.} tag{6} end{equation*} min.D,s.t.∑k=1Kλkβk2≤p (6)
{"title":"Correction to “CV-Cast: Computer Vision–Oriented Linear Coding and Transmission”","authors":"Jakub Žádník;Michel Kieffer;Anthony Trioux;Markku Mäkitalo;Pekka Jääskeläinen","doi":"10.1109/TMC.2025.3565860","DOIUrl":"https://doi.org/10.1109/TMC.2025.3565860","url":null,"abstract":"In the above article [1], on page 1151, eq. (6), there is an error in the equation. The correct equation is: begin{equation*} min.,,D,,,text{s.t.} sumlimits_{k = 1}^K {{{lambda }_k}beta _k^2 leqslant P.} tag{6} end{equation*} min.D,s.t.∑k=1Kλkβk2⩽P.(6)","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 7","pages":"6719-6719"},"PeriodicalIF":7.7,"publicationDate":"2025-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11026062","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMART: Sim2Real Meta-Learning-Based Training for mmWave Beam Selection in V2X Networks SMART:基于Sim2Real元学习的V2X网络毫米波波束选择训练
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-03 DOI: 10.1109/TMC.2025.3576203
Divyadharshini Muruganandham;Suyash Pradhan;Jerry Gu;Torsten Braun;Debashri Roy;Kaushik Chowdhury
Digital twins (DT) offer a low-overhead evaluation platform and the ability to generate rich datasets for training machine learning (ML) models before actual deployment. Specifically, for the scenario of ML-aided millimeter wave (mmWave) links between moving vehicles to roadside units, we show how DT can create an accurate replica of the real world for model training and testing. The contributions of this paper are twofold: First, we propose a framework to create a multimodal Digital Twin (DT), where synthetic images and LiDAR data for the deployment location are generated along with RF propagation measurements obtained via ray-tracing. Second, to ensure effective domain adaptation, we leverage meta-learning, specifically Model-Agnostic Meta-Learning (MAML), with transfer learning (TL) serving as a baseline validation approach. The proposed framework is validated using a comprehensive dataset containing both real and synthetic LiDAR and image data for mmWave V2X beam selection. It also enables the investigation of how each sensor modality impacts domain adaptation, taking into account the unique requirements of mmWave beam selection. Experimental results show that models trained on synthetic data using transfer learning and meta-learning, followed by minimal fine-tuning with real-world data, achieve up to 4.09× and 14.04× improvements in accuracy, respectively. These findings highlight the potential of synthetic data and meta-learning to bridge the domain gap and adapt rapidly to real-world beamforming challenges.
数字孪生(DT)提供了一个低开销的评估平台,并能够在实际部署之前生成丰富的数据集,用于训练机器学习(ML)模型。具体而言,对于移动车辆与路边单元之间的ml辅助毫米波(mmWave)链接的场景,我们展示了DT如何为模型训练和测试创建真实世界的精确副本。本文的贡献是双重的:首先,我们提出了一个创建多模态数字孪生(DT)的框架,其中生成部署位置的合成图像和激光雷达数据,以及通过光线跟踪获得的RF传播测量。其次,为了确保有效的领域适应,我们利用元学习,特别是模型不可知元学习(MAML),并将迁移学习(TL)作为基线验证方法。使用包含毫米波V2X波束选择的真实和合成激光雷达和图像数据的综合数据集对所提出的框架进行了验证。考虑到毫米波波束选择的独特要求,它还可以研究每种传感器模态如何影响域适应。实验结果表明,使用迁移学习和元学习在合成数据上训练的模型,在对真实数据进行最小的微调后,准确率分别提高了4.09倍和14.04倍。这些发现突出了合成数据和元学习在弥合领域差距和快速适应现实世界波束形成挑战方面的潜力。
{"title":"SMART: Sim2Real Meta-Learning-Based Training for mmWave Beam Selection in V2X Networks","authors":"Divyadharshini Muruganandham;Suyash Pradhan;Jerry Gu;Torsten Braun;Debashri Roy;Kaushik Chowdhury","doi":"10.1109/TMC.2025.3576203","DOIUrl":"https://doi.org/10.1109/TMC.2025.3576203","url":null,"abstract":"Digital twins (DT) offer a low-overhead evaluation platform and the ability to generate rich datasets for training machine learning (ML) models before actual deployment. Specifically, for the scenario of ML-aided millimeter wave (mmWave) links between moving vehicles to roadside units, we show how DT can create an accurate replica of the real world for model training and testing. The contributions of this paper are twofold: First, we propose a framework to create a multimodal Digital Twin (DT), where synthetic images and LiDAR data for the deployment location are generated along with RF propagation measurements obtained via ray-tracing. Second, to ensure effective domain adaptation, we leverage <italic>meta-learning</i>, specifically <italic>Model-Agnostic Meta-Learning</i> (MAML), with <italic>transfer learning</i> (TL) serving as a baseline validation approach. The proposed framework is validated using a comprehensive dataset containing both real and synthetic LiDAR and image data for mmWave V2X beam selection. It also enables the investigation of how each sensor modality impacts domain adaptation, taking into account the unique requirements of mmWave beam selection. Experimental results show that models trained on synthetic data using transfer learning and meta-learning, followed by minimal fine-tuning with real-world data, achieve up to 4.09× and 14.04× improvements in accuracy, respectively. These findings highlight the potential of synthetic data and meta-learning to bridge the domain gap and adapt rapidly to real-world beamforming challenges.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"11076-11091"},"PeriodicalIF":9.2,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MMTO: Multi-Vehicle Multi-Hop Task Offloading in MEC-Enabled Vehicular Networks MMTO:支持mec的车辆网络中的多车辆多跳任务卸载
IF 9.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-03 DOI: 10.1109/TMC.2025.3576154
Wenjie Huang;Zhiwei Zhao;Geyong Min;Yang Wang;Zheng Chang
Mobile Edge Computing (MEC)-enabled vehicular networks have emerged as a promising approach to enhancing the performance and efficiency of the Internet-of-Vehicles (IoV) applications. By leveraging some vehicles to act as transmission relays, multi-hop task offloading addresses the problem of intermittent connectivity between vehicles and edge servers to cope with the issues of network congestion or obstacles. However, two critical issues, i.e., uncooperative behaviors of selfish vehicles and network resource dynamics, resulting from multi-vehicle concurrent offloading are not fully considered in the existing work. To fill this gap, this paper proposes a novel and efficient task offloading scheme, namely MMTO, that exploits the multi-hop computational resources to maximize the system-wide profit, and supports incentive compatibility of vehicular users and concurrent offloading. Specifically, an iterative hierarchical estimation algorithm is designed to estimate the offloading delay and energy cost in order to iteratively optimize the offloading decisions. An energy-efficient routing approach is then proposed to schedule the transmission paths for the offloading vehicles. Furthermore, an effective reward-driven auction-based incentive mechanism is designed for incentivizing relayers and calculators to engage in collaboration. Both simulation and field experiments are conducted; extensive results demonstrate that MMTO outperforms the state-of-the-art approaches in terms of the system-wide profit improvement and overall task delay reduction.
支持移动边缘计算(MEC)的车载网络已经成为提高车联网(IoV)应用性能和效率的一种有前途的方法。通过利用一些车辆作为传输中继,多跳任务卸载解决了车辆和边缘服务器之间间歇性连接的问题,以应对网络拥塞或障碍的问题。但是,现有的工作没有充分考虑到多车并发卸载导致的自私车辆的不合作行为和网络资源动态两个关键问题。为了填补这一空白,本文提出了一种新颖高效的任务卸载方案MMTO,该方案利用多跳计算资源实现全系统利润最大化,并支持车辆用户的激励兼容和并发卸载。具体而言,设计了一种迭代分层估计算法来估计卸载延迟和能量成本,从而迭代优化卸载决策。在此基础上,提出了一种高效节能的路径调度方法。此外,设计了一个有效的奖励驱动的基于拍卖的激励机制,以激励继电器和计算器参与合作。进行了仿真和现场试验;广泛的结果表明,MMTO在系统范围内的利润改善和整体任务延迟减少方面优于最先进的方法。
{"title":"MMTO: Multi-Vehicle Multi-Hop Task Offloading in MEC-Enabled Vehicular Networks","authors":"Wenjie Huang;Zhiwei Zhao;Geyong Min;Yang Wang;Zheng Chang","doi":"10.1109/TMC.2025.3576154","DOIUrl":"https://doi.org/10.1109/TMC.2025.3576154","url":null,"abstract":"Mobile Edge Computing (MEC)-enabled vehicular networks have emerged as a promising approach to enhancing the performance and efficiency of the Internet-of-Vehicles (IoV) applications. By leveraging some vehicles to act as transmission relays, multi-hop task offloading addresses the problem of intermittent connectivity between vehicles and edge servers to cope with the issues of network congestion or obstacles. However, two critical issues, i.e., uncooperative behaviors of selfish vehicles and network resource dynamics, resulting from multi-vehicle concurrent offloading are not fully considered in the existing work. To fill this gap, this paper proposes a novel and efficient task offloading scheme, namely MMTO, that exploits the multi-hop computational resources to maximize the system-wide profit, and supports incentive compatibility of vehicular users and concurrent offloading. Specifically, an iterative hierarchical estimation algorithm is designed to estimate the offloading delay and energy cost in order to iteratively optimize the offloading decisions. An energy-efficient routing approach is then proposed to schedule the transmission paths for the offloading vehicles. Furthermore, an effective reward-driven auction-based incentive mechanism is designed for incentivizing relayers and calculators to engage in collaboration. Both simulation and field experiments are conducted; extensive results demonstrate that MMTO outperforms the state-of-the-art approaches in terms of the system-wide profit improvement and overall task delay reduction.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 10","pages":"11125-11136"},"PeriodicalIF":9.2,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1