首页 > 最新文献

Computer Networks最新文献

英文 中文
Task offloading strategies for mobile edge computing: A survey 移动边缘计算的任务卸载策略:一项调查
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1016/j.comnet.2024.110791

With the wide adoption of 5G technology and the rapid development of 6G technology, a variety of new applications have emerged. A multitude of compute-intensive and time-sensitive applications deployed on terminal equipment have placed increased demands on Internet delay and bandwidth. Mobile Edge Computing (MEC) can effectively mitigate the issues of long transmission times, high energy consumption, and data insecurity. Task offloading, as a key technology within MEC, has become a prominent research focus in this field. This paper presents a comprehensive review of the current research progress in MEC task offloading. Firstly, it introduces the fundamental concepts, application scenarios, and related technologies of MEC. Secondly, it categorizes offloading decisions into five aspects: reducing delay, minimizing energy consumption, balancing energy consumption and delay, enabling high-computing offloading, and addressing different application scenarios. It then critically analyzes and compares existing research efforts in these areas.

随着 5G 技术的广泛应用和 6G 技术的快速发展,各种新的应用层出不穷。部署在终端设备上的大量计算密集型和时间敏感型应用对互联网延迟和带宽提出了更高的要求。移动边缘计算(MEC)可以有效缓解传输时间长、能耗高、数据不安全等问题。任务卸载作为 MEC 的一项关键技术,已成为该领域的一个突出研究重点。本文全面回顾了当前 MEC 任务卸载的研究进展。首先,本文介绍了 MEC 的基本概念、应用场景和相关技术。其次,它将卸载决策分为五个方面:减少延迟、最小化能耗、平衡能耗和延迟、实现高运算量卸载以及应对不同的应用场景。然后,它对这些领域的现有研究工作进行了批判性分析和比较。
{"title":"Task offloading strategies for mobile edge computing: A survey","authors":"","doi":"10.1016/j.comnet.2024.110791","DOIUrl":"10.1016/j.comnet.2024.110791","url":null,"abstract":"<div><p>With the wide adoption of 5G technology and the rapid development of 6G technology, a variety of new applications have emerged. A multitude of compute-intensive and time-sensitive applications deployed on terminal equipment have placed increased demands on Internet delay and bandwidth. Mobile Edge Computing (MEC) can effectively mitigate the issues of long transmission times, high energy consumption, and data insecurity. Task offloading, as a key technology within MEC, has become a prominent research focus in this field. This paper presents a comprehensive review of the current research progress in MEC task offloading. Firstly, it introduces the fundamental concepts, application scenarios, and related technologies of MEC. Secondly, it categorizes offloading decisions into five aspects: reducing delay, minimizing energy consumption, balancing energy consumption and delay, enabling high-computing offloading, and addressing different application scenarios. It then critically analyzes and compares existing research efforts in these areas.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lifetime maximization of IoT-enabled smart grid applications using error control strategies 利用误差控制策略实现物联网智能电网应用的寿命最大化
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1016/j.comnet.2024.110778

Recently, with the advancement of Internet of Things (IoT) technology, IoT-enabled Smart Grid (SG) applications have gained tremendous popularity. Ensuring reliable communication in IoT-based SG applications is challenging due to the harsh channel environment often encountered in the power grid. Error Control (EC) techniques have emerged as a promising solution to enhance reliability. Nevertheless, ensuring network reliability requires a substantial amount of energy consumption. In this paper, we formulate a Mixed Integer Programming (MIP) model which considers the energy dissipation of EC techniques to maximize IoT network lifetime while ensuring the desired level of IoT network reliability. We develop meta-heuristic approaches such as Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO) to address the high computation complexity of large-scale IoT networks. Performance evaluations indicate that the EC-Node strategy, where each IoT node employs the most energy-efficient EC technique, yields a minimum of 8.9% extended lifetimes compared to the EC-Net strategies, where all IoT nodes employ the same EC method for a communication. Moreover, the PSO algorithm reduces the computational time by 77% while exhibiting a 2.69% network lifetime decrease compared to the optimal solution.

最近,随着物联网(IoT)技术的发展,支持物联网的智能电网(SG)应用得到了极大的普及。由于电网中经常会遇到恶劣的信道环境,因此在基于物联网的智能电网应用中确保可靠的通信具有挑战性。差错控制(EC)技术已成为提高可靠性的一种有前途的解决方案。然而,确保网络可靠性需要消耗大量能源。在本文中,我们提出了一个混合整数编程(MIP)模型,该模型考虑了错误控制技术的能量消耗,以最大限度地延长物联网网络的使用寿命,同时确保物联网网络可靠性达到理想水平。我们开发了人工蜂群(ABC)和粒子群优化(PSO)等元启发式方法,以解决大规模物联网网络的高计算复杂性问题。性能评估表明,与 EC-Net 策略(所有物联网节点都采用相同的 EC 方法进行通信)相比,EC-Node 策略(每个物联网节点都采用最节能的 EC 技术)至少延长了 8.9% 的寿命。此外,与最优解相比,PSO 算法减少了 77% 的计算时间,同时网络寿命减少了 2.69%。
{"title":"Lifetime maximization of IoT-enabled smart grid applications using error control strategies","authors":"","doi":"10.1016/j.comnet.2024.110778","DOIUrl":"10.1016/j.comnet.2024.110778","url":null,"abstract":"<div><p>Recently, with the advancement of Internet of Things (IoT) technology, IoT-enabled Smart Grid (SG) applications have gained tremendous popularity. Ensuring reliable communication in IoT-based SG applications is challenging due to the harsh channel environment often encountered in the power grid. Error Control (EC) techniques have emerged as a promising solution to enhance reliability. Nevertheless, ensuring network reliability requires a substantial amount of energy consumption. In this paper, we formulate a Mixed Integer Programming (MIP) model which considers the energy dissipation of EC techniques to maximize IoT network lifetime while ensuring the desired level of IoT network reliability. We develop meta-heuristic approaches such as Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO) to address the high computation complexity of large-scale IoT networks. Performance evaluations indicate that the EC-Node strategy, where each IoT node employs the most energy-efficient EC technique, yields a minimum of 8.9% extended lifetimes compared to the EC-Net strategies, where all IoT nodes employ the same EC method for a communication. Moreover, the PSO algorithm reduces the computational time by 77% while exhibiting a 2.69% network lifetime decrease compared to the optimal solution.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint path planning and power allocation of a cellular-connected UAV using apprenticeship learning via deep inverse reinforcement learning 通过深度反强化学习,利用学徒式学习实现蜂窝连接无人机的联合路径规划和功率分配
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1016/j.comnet.2024.110789

This paper investigates an interference-aware joint path planning and power allocation mechanism for a cellular-connected unmanned aerial vehicle (UAV) in a sparse suburban environment. The UAV’s goal is to fly from an initial point and reach a destination point by moving along the cells to guarantee the required quality of service (QoS). In particular, the UAV aims to maximize its uplink throughput and minimize interference to the ground user equipment (UEs) connected to neighboring cellular base stations (BSs), considering both the shortest path and limitations on flight resources. Expert knowledge is used to experience the scenario and define the desired behavior for the sake of the agent (i.e., UAV) training. To solve the problem, an apprenticeship learning method is utilized via inverse reinforcement learning (IRL) based on both Q-learning and deep reinforcement learning (DRL). The performance of this method is compared to learning from a demonstration technique called behavioral cloning (BC) using a supervised learning approach. Simulation and numerical results show that the proposed approach can achieve expert-level performance. We also demonstrate that, unlike the BC technique, the performance of our proposed approach does not degrade in unseen situations.

本文研究了在郊区稀疏环境中蜂窝连接无人飞行器(UAV)的干扰感知联合路径规划和功率分配机制。无人飞行器的目标是从初始点出发,沿小区移动到达目的地,以保证所需的服务质量(QoS)。特别是,考虑到最短路径和飞行资源的限制,无人机的目标是最大限度地提高上行链路吞吐量,并最大限度地减少对连接到邻近蜂窝基站(BS)的地面用户设备(UE)的干扰。为了对代理(即无人机)进行培训,利用专家知识来体验场景并定义所需的行为。为了解决这个问题,我们在 Q-learning 和深度强化学习(DRL)的基础上,通过反强化学习(IRL)采用了一种学徒学习方法。该方法的性能与使用监督学习方法从名为行为克隆(BC)的演示技术中学习的性能进行了比较。仿真和数值结果表明,所提出的方法可以达到专家级的性能。我们还证明,与 BC 技术不同,我们提出的方法在不可见的情况下性能不会下降。
{"title":"Joint path planning and power allocation of a cellular-connected UAV using apprenticeship learning via deep inverse reinforcement learning","authors":"","doi":"10.1016/j.comnet.2024.110789","DOIUrl":"10.1016/j.comnet.2024.110789","url":null,"abstract":"<div><p>This paper investigates an interference-aware joint path planning and power allocation mechanism for a cellular-connected unmanned aerial vehicle (UAV) in a sparse suburban environment. The UAV’s goal is to fly from an initial point and reach a destination point by moving along the cells to guarantee the required quality of service (QoS). In particular, the UAV aims to maximize its uplink throughput and minimize interference to the ground user equipment (UEs) connected to neighboring cellular base stations (BSs), considering both the shortest path and limitations on flight resources. Expert knowledge is used to experience the scenario and define the desired behavior for the sake of the agent (i.e., UAV) training. To solve the problem, an apprenticeship learning method is utilized via inverse reinforcement learning (IRL) based on both Q-learning and deep reinforcement learning (DRL). The performance of this method is compared to learning from a demonstration technique called behavioral cloning (BC) using a supervised learning approach. Simulation and numerical results show that the proposed approach can achieve expert-level performance. We also demonstrate that, unlike the BC technique, the performance of our proposed approach does not degrade in unseen situations.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624006212/pdfft?md5=dc7b3d1acee33e2f5feab69fccae53be&pid=1-s2.0-S1389128624006212-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142232950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data signals for deep learning applications in Terahertz communications 太赫兹通信中深度学习应用的数据信号
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1016/j.comnet.2024.110800

The Terahertz (THz) band (0.1–10 THz) is projected to enable broadband wireless communications of the future, and many envision deep learning as a solution to improve the performance of THz communication systems and networks. However, there are few available datasets of true THz signals that could enable testing and training of deep learning algorithms for the research community. In this paper, we provide an extensive dataset of 120,000 data frames for the research community. All signals were transmitted at 165 GHz but with varying bandwidths (5 GHz, 10 GHz, and 20 GHz), modulations (4PSK, 8PSK, 16QAM, and 64QAM), and transmit amplitudes (75 mV and 600 mV), resulting in twenty-four distinct bandwidth-modulation-power combinations each with 5,000 unique captures. The signals were captured after down conversion at an intermediate frequency of 10 GHz. This dataset enables the research community to experimentally explore solutions relating to ultrabroadband deep and machine learning applications.

太赫兹(THz)波段(0.1-10 THz)预计将在未来实现宽带无线通信,许多人将深度学习视为提高太赫兹通信系统和网络性能的解决方案。然而,能为研究界测试和训练深度学习算法的真实太赫兹信号数据集却很少。在本文中,我们为研究界提供了一个包含 120,000 个数据帧的广泛数据集。所有信号都在 165 GHz 频率下传输,但带宽(5 GHz、10 GHz 和 20 GHz)、调制(4PSK、8PSK、16QAM 和 64QAM)和传输振幅(75 mV 和 600 mV)各不相同,从而产生了二十四种不同的带宽-调制-功率组合,每种组合都有 5,000 个独特的捕获信号。信号是在 10 GHz 的中间频率进行下变频后捕获的。该数据集使研究界能够通过实验探索与超宽带深度学习和机器学习应用相关的解决方案。
{"title":"Data signals for deep learning applications in Terahertz communications","authors":"","doi":"10.1016/j.comnet.2024.110800","DOIUrl":"10.1016/j.comnet.2024.110800","url":null,"abstract":"<div><p>The Terahertz (THz) band (0.1–10 THz) is projected to enable broadband wireless communications of the future, and many envision deep learning as a solution to improve the performance of THz communication systems and networks. However, there are few available datasets of true THz signals that could enable testing and training of deep learning algorithms for the research community. In this paper, we provide an extensive dataset of 120,000 data frames for the research community. All signals were transmitted at 165 GHz but with varying bandwidths (5 GHz, 10 GHz, and 20 GHz), modulations (4PSK, 8PSK, 16QAM, and 64QAM), and transmit amplitudes (75 mV and 600 mV), resulting in twenty-four distinct bandwidth-modulation-power combinations each with 5,000 unique captures. The signals were captured after down conversion at an intermediate frequency of 10 GHz. This dataset enables the research community to experimentally explore solutions relating to ultrabroadband deep and machine learning applications.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624006327/pdfft?md5=c4870e9a435477344bfb00ccf315d922&pid=1-s2.0-S1389128624006327-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142232951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fast malware detection model based on heterogeneous graph similarity search 基于异构图相似性搜索的快速恶意软件检测模型
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1016/j.comnet.2024.110799

The Android operating system has long been vulnerable to malicious software. Existing malware detection methods often fail to identify ever-evolving malware and are slow in detection. To address this, we propose a new model for rapid Android malware detection, which constructs various Android entities and relationships into a heterogeneous graph. Firstly, to address the semantic fusion problem in high-order heterogeneous graphs that arises with the increase in the depth of the heterogeneous graph model, we introduce adaptive weights during node aggregation to absorb the local semantics of nodes. This allows more attention to be paid to the feature information of the node itself during the semantic aggregation stage, thereby avoiding semantic confusion. Secondly, to mitigate the high time costs associated with detecting unknown applications, we employ an incremental similarity search model. This model quickly measures the similarity between unknown applications and those within the sample, aggregating the weights of nodes based on similarity scores and semantic attention coefficients, thereby enabling rapid detection. Lastly, considering the high time and space complexity of calculating node similarity scores on large graphs, we design a NeuSim model based on an encoder–decoder structure. The encoder module embeds each path instance as a vector, while the decoder converts the vector into a scalar similarity score, significantly reducing the complexity of the calculation. Experiments demonstrate that this model can not only rapidly detect malware but also capture high-level semantic relationships of application software in complex malware networks by hierarchically aggregating information from neighbors and meta-paths of different orders. Moreover, this model achieved an AUC of 0.9356 and an F1 score of 0.9355, surpassing existing malware detection algorithms. Particularly in the detection of unknown application software, the NeuSim model can double the detection speed, with an average detection time of 105 ms.

长期以来,安卓操作系统一直容易受到恶意软件的攻击。现有的恶意软件检测方法往往无法识别不断演变的恶意软件,而且检测速度缓慢。针对这一问题,我们提出了一种快速检测安卓恶意软件的新模型,将各种安卓实体和关系构建成一个异构图。首先,为了解决高阶异构图中随着异构图模型深度增加而产生的语义融合问题,我们在节点聚合过程中引入了自适应权重,以吸收节点的局部语义。这样就能在语义聚合阶段更多地关注节点本身的特征信息,从而避免语义混淆。其次,为了降低检测未知应用所需的高昂时间成本,我们采用了增量相似性搜索模型。该模型可快速测量未知应用与样本内应用之间的相似性,根据相似性得分和语义关注系数聚合节点的权重,从而实现快速检测。最后,考虑到在大型图上计算节点相似性得分的时间和空间复杂性较高,我们设计了一个基于编码器-解码器结构的 NeuSim 模型。编码器模块将每个路径实例嵌入为一个向量,而解码器则将向量转换为标量相似性得分,从而大大降低了计算的复杂性。实验证明,该模型不仅能快速检测恶意软件,还能通过分层聚合来自邻域和不同阶元路径的信息,捕捉复杂恶意软件网络中应用软件的高层语义关系。此外,该模型的AUC达到0.9356,F1得分达到0.9355,超越了现有的恶意软件检测算法。特别是在检测未知应用软件时,NeuSim 模型能将检测速度提高一倍,平均检测时间为 105 毫秒。
{"title":"A fast malware detection model based on heterogeneous graph similarity search","authors":"","doi":"10.1016/j.comnet.2024.110799","DOIUrl":"10.1016/j.comnet.2024.110799","url":null,"abstract":"<div><p>The Android operating system has long been vulnerable to malicious software. Existing malware detection methods often fail to identify ever-evolving malware and are slow in detection. To address this, we propose a new model for rapid Android malware detection, which constructs various Android entities and relationships into a heterogeneous graph. Firstly, to address the semantic fusion problem in high-order heterogeneous graphs that arises with the increase in the depth of the heterogeneous graph model, we introduce adaptive weights during node aggregation to absorb the local semantics of nodes. This allows more attention to be paid to the feature information of the node itself during the semantic aggregation stage, thereby avoiding semantic confusion. Secondly, to mitigate the high time costs associated with detecting unknown applications, we employ an incremental similarity search model. This model quickly measures the similarity between unknown applications and those within the sample, aggregating the weights of nodes based on similarity scores and semantic attention coefficients, thereby enabling rapid detection. Lastly, considering the high time and space complexity of calculating node similarity scores on large graphs, we design a <em>NeuSim</em> model based on an encoder–decoder structure. The encoder module embeds each path instance as a vector, while the decoder converts the vector into a scalar similarity score, significantly reducing the complexity of the calculation. Experiments demonstrate that this model can not only rapidly detect malware but also capture high-level semantic relationships of application software in complex malware networks by hierarchically aggregating information from neighbors and meta-paths of different orders. Moreover, this model achieved an AUC of 0.9356 and an F1 score of 0.9355, surpassing existing malware detection algorithms. Particularly in the detection of unknown application software, the <em>NeuSim</em> model can double the detection speed, with an average detection time of 105 ms.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truthful mechanism for joint resource allocation and task offloading in mobile edge computing 移动边缘计算中联合资源分配和任务卸载的真实机制
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-11 DOI: 10.1016/j.comnet.2024.110796

In the context of mobile edge computing (MEC), the delay-sensitive tasks can achieve real-time data processing and analysis by offloading to the MEC servers. The objective is maximizing social welfare in an auction-based model. However, the distances between mobile devices and access points lead to differences in energy consumption. Unfortunately, existing works have not considered both maximizing social welfare and minimizing energy consumption. Motivated by this, we address the problem of joint resource allocation and task offloading in MEC, with heterogeneous MEC servers providing multiple types of resources for mobile devices (MDs) to perform tasks remotely. We split the problem into two sub-problems: winner determination and offloading decision. The first sub-problem determines winners granted the ability to offload tasks to maximize social welfare. The second sub-problem determines how to offload tasks among the MEC servers to minimize energy consumption. In the winner determination problem, we propose a truthful algorithm that drives the system into equilibrium. We then show the approximate ratios for single and multiple MEC servers. In the offloading decision problem, we propose an approximation algorithm. We then show it is a polynomial-time approximation scheme for a single MEC server. Experiment results show that our proposed mechanism finds high-quality solutions in changing mobile environments.

在移动边缘计算(MEC)的背景下,延迟敏感任务可以通过卸载到 MEC 服务器来实现实时数据处理和分析。其目标是在基于拍卖的模型中实现社会福利最大化。然而,移动设备与接入点之间的距离会导致能耗的差异。遗憾的是,现有研究还没有同时考虑社会福利最大化和能源消耗最小化。受此启发,我们解决了 MEC 中的联合资源分配和任务卸载问题,由异构 MEC 服务器为移动设备(MD)提供多种类型的资源,以便其远程执行任务。我们将该问题分为两个子问题:胜者确定和卸载决策。第一个子问题是确定获胜者,授予卸载任务的能力,以实现社会福利最大化。第二个子问题是确定如何在 MEC 服务器之间卸载任务,以尽量减少能源消耗。在获胜者确定问题中,我们提出了一种可使系统达到平衡的真实算法。然后,我们展示了单台和多台 MEC 服务器的近似比率。在卸载决策问题中,我们提出了一种近似算法。然后,我们展示了针对单个 MEC 服务器的多项式时间近似方案。实验结果表明,我们提出的机制能在不断变化的移动环境中找到高质量的解决方案。
{"title":"Truthful mechanism for joint resource allocation and task offloading in mobile edge computing","authors":"","doi":"10.1016/j.comnet.2024.110796","DOIUrl":"10.1016/j.comnet.2024.110796","url":null,"abstract":"<div><p>In the context of mobile edge computing (MEC), the delay-sensitive tasks can achieve real-time data processing and analysis by offloading to the MEC servers. The objective is maximizing social welfare in an auction-based model. However, the distances between mobile devices and access points lead to differences in energy consumption. Unfortunately, existing works have not considered both maximizing social welfare and minimizing energy consumption. Motivated by this, we address the problem of joint resource allocation and task offloading in MEC, with heterogeneous MEC servers providing multiple types of resources for mobile devices (MDs) to perform tasks remotely. We split the problem into two sub-problems: winner determination and offloading decision. The first sub-problem determines winners granted the ability to offload tasks to maximize social welfare. The second sub-problem determines how to offload tasks among the MEC servers to minimize energy consumption. In the winner determination problem, we propose a truthful algorithm that drives the system into equilibrium. We then show the approximate ratios for single and multiple MEC servers. In the offloading decision problem, we propose an approximation algorithm. We then show it is a polynomial-time approximation scheme for a single MEC server. Experiment results show that our proposed mechanism finds high-quality solutions in changing mobile environments.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142228492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance 基于对抗式机器学习的分布式智能城市监控中保护隐私的人脸识别方法
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-11 DOI: 10.1016/j.comnet.2024.110798

Smart cities rely heavily on surveillance cameras for urban management and security. However, the extensive use of these cameras also raises significant concerns regarding data privacy. Unauthorized access to facial data captured by these cameras and the potential for misuse of this data poses serious threats to individuals’ privacy. Current privacy preservation solutions often compromise data usability with noise application-based approaches and vulnerable centralized data handling settings. To address these privacy challenges, we propose a novel approach that combines Adversarial Machine Learning (AML) with Federated Learning (FL). Our approach involves the use of a noise generator that perturbs surveillance data right from the source before they leave the surveillance cameras. By exclusively training the Federated Learning model on these perturbed samples, we ensure that sensitive biometric features are not shared with centralized servers. Instead, such data remains on local devices (e.g., cameras), thereby ensuring that data privacy is maintained. We performed a thorough real-world evaluation of the proposed method and achieved an accuracy of around 99.95% in standard machine learning settings. In distributed settings, we achieved an accuracy of around 96.24% using federated learning, demonstrating the practicality and effectiveness of the proposed solution.1

智能城市的城市管理和安全在很大程度上依赖于监控摄像头。然而,这些摄像头的广泛使用也引起了人们对数据隐私的极大关注。未经授权访问这些摄像头捕捉到的面部数据以及滥用这些数据的可能性对个人隐私构成了严重威胁。目前的隐私保护解决方案往往会因基于应用程序的噪声方法和易受攻击的集中式数据处理设置而影响数据的可用性。为了应对这些隐私挑战,我们提出了一种将对抗式机器学习(AML)与联合学习(FL)相结合的新方法。我们的方法包括使用噪声发生器,在监控数据离开监控摄像头之前从源头对其进行扰动。通过专门在这些扰动样本上训练 Federated Learning 模型,我们可以确保敏感的生物识别特征不会与中央服务器共享。相反,这些数据会保留在本地设备(如摄像头)上,从而确保数据隐私得到维护。我们对所提出的方法进行了全面的实际评估,并在标准机器学习设置中达到了约 99.95% 的准确率。在分布式环境中,我们利用联合学习实现了约 96.24% 的准确率,证明了所提解决方案的实用性和有效性1。
{"title":"An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance","authors":"","doi":"10.1016/j.comnet.2024.110798","DOIUrl":"10.1016/j.comnet.2024.110798","url":null,"abstract":"<div><p>Smart cities rely heavily on surveillance cameras for urban management and security. However, the extensive use of these cameras also raises significant concerns regarding data privacy. Unauthorized access to facial data captured by these cameras and the potential for misuse of this data poses serious threats to individuals’ privacy. Current privacy preservation solutions often compromise data usability with noise application-based approaches and vulnerable centralized data handling settings. To address these privacy challenges, we propose a novel approach that combines Adversarial Machine Learning (AML) with Federated Learning (FL). Our approach involves the use of a noise generator that perturbs surveillance data right from the source before they leave the surveillance cameras. By exclusively training the Federated Learning model on these perturbed samples, we ensure that sensitive biometric features are not shared with centralized servers. Instead, such data remains on local devices (e.g., cameras), thereby ensuring that data privacy is maintained. We performed a thorough real-world evaluation of the proposed method and achieved an accuracy of around 99.95% in standard machine learning settings. In distributed settings, we achieved an accuracy of around 96.24% using federated learning, demonstrating the practicality and effectiveness of the proposed solution.<span><span><sup>1</sup></span></span></p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624006303/pdfft?md5=da5fe96757f1e618798967bd74657413&pid=1-s2.0-S1389128624006303-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient data transmission mechanisms in energy harvesting wireless body area networks: A survey 能量采集无线体域网络中的高效数据传输机制:调查
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-10 DOI: 10.1016/j.comnet.2024.110769

Limited energy and reliable data transmission are two key issues in Wireless body area networks (WBANs). The utilization of energy harvesting technology has alleviated the energy problem in WBANs, making continuous operation possible. However, Energy Harvesting WBANs (EH-WBANs) face new challenges. How to design efficient data transmission mechanisms taking into account the unstable energy harvesting conditions and dynamic network topology has become crucial. The efficiency of data transmission mainly depends on the network layer and media access control (MAC) layer. Therefore, this paper surveys the routing and MAC protocols proposed for EH-WBANs. There are some surveys on routing and MAC protocols for traditional battery-powered WBANs. However, these mechanisms cannot be directly applied to EH-WBANs due to the randomness and time-varying nature of the energy obtained by energy harvesting, which differs from the energy characteristics of nodes powered solely by batteries. In addition, due to the dynamic network topology and heterogeneous nodes in WBANs, the research results on routing and MAC protocols for Energy Harvesting Wireless Sensor Networks (EH-WSNs) cannot be directly applied to EH-WBANs. Thus, unlike previous surveys, this paper focuses on protocols specifically designed for EH-WBANs. It introduces and analyzes these protocols, summarizes the comprehensive performance metrics and efficient measures for data transmission mechanisms in EH-WBANs, and conducts a comprehensive performance analysis on the protocols proposed for EH-WBANs based on these metrics. This paper intends to provide assistance in addressing the energy and reliable data transmission issues in WBANs, thereby enhancing the applicability of EH-WBANs.

有限的能量和可靠的数据传输是无线体域网(WBAN)的两个关键问题。能量收集技术的应用缓解了无线体域网的能量问题,使其能够连续运行。然而,能量收集无线局域网(EH-WBAN)面临着新的挑战。如何在考虑不稳定的能量收集条件和动态网络拓扑的情况下设计高效的数据传输机制变得至关重要。数据传输的效率主要取决于网络层和媒体访问控制(MAC)层。因此,本文研究了为 EH-WBAN 提出的路由和 MAC 协议。目前已有一些针对传统电池供电无线局域网的路由和 MAC 协议的研究。但是,这些机制不能直接应用于 EH-WBAN,因为通过能量收集获得的能量具有随机性和时变性,与仅由电池供电的节点的能量特性不同。此外,由于无线局域网中的动态网络拓扑和异构节点,针对能量收集无线传感器网络(EH-WSN)的路由和 MAC 协议的研究成果无法直接应用于 EH-WBAN。因此,与以往的研究不同,本文重点关注专为 EH-WBAN 设计的协议。本文介绍并分析了这些协议,总结了 EH-WBAN 中数据传输机制的综合性能指标和高效措施,并根据这些指标对为 EH-WBAN 提出的协议进行了综合性能分析。本文旨在为解决 WBAN 中的能量和可靠数据传输问题提供帮助,从而提高 EH-WBAN 的适用性。
{"title":"Efficient data transmission mechanisms in energy harvesting wireless body area networks: A survey","authors":"","doi":"10.1016/j.comnet.2024.110769","DOIUrl":"10.1016/j.comnet.2024.110769","url":null,"abstract":"<div><p>Limited energy and reliable data transmission are two key issues in Wireless body area networks (WBANs). The utilization of energy harvesting technology has alleviated the energy problem in WBANs, making continuous operation possible. However, Energy Harvesting WBANs (EH-WBANs) face new challenges. How to design efficient data transmission mechanisms taking into account the unstable energy harvesting conditions and dynamic network topology has become crucial. The efficiency of data transmission mainly depends on the network layer and media access control (MAC) layer. Therefore, this paper surveys the routing and MAC protocols proposed for EH-WBANs. There are some surveys on routing and MAC protocols for traditional battery-powered WBANs. However, these mechanisms cannot be directly applied to EH-WBANs due to the randomness and time-varying nature of the energy obtained by energy harvesting, which differs from the energy characteristics of nodes powered solely by batteries. In addition, due to the dynamic network topology and heterogeneous nodes in WBANs, the research results on routing and MAC protocols for Energy Harvesting Wireless Sensor Networks (EH-WSNs) cannot be directly applied to EH-WBANs. Thus, unlike previous surveys, this paper focuses on protocols specifically designed for EH-WBANs. It introduces and analyzes these protocols, summarizes the comprehensive performance metrics and efficient measures for data transmission mechanisms in EH-WBANs, and conducts a comprehensive performance analysis on the protocols proposed for EH-WBANs based on these metrics. This paper intends to provide assistance in addressing the energy and reliable data transmission issues in WBANs, thereby enhancing the applicability of EH-WBANs.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624006017/pdfft?md5=90e00118fa2bd76046fbb62975e2c484&pid=1-s2.0-S1389128624006017-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting the cyber-physical-social cooperated APTs in high-DER-penetrated smart grids: Threats, current work and challenges 检测高密度可再生能源渗透智能电网中的网络-物理-社会合作 APT:威胁、当前工作和挑战
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-07 DOI: 10.1016/j.comnet.2024.110776

Large-scale renewable distributed energy sources (DERs) penetrating into smart grids (SGs) is an inevitable trend. Such high-DER-penetrated SGs entail heavy reliance on information and communication technologies and increasing impact of social behaviors on system operation and management. In this sense, the SGs become cyber-physical-social systems. However, the deeply coupling of cyber networks, physical grids, and societies leads SGs more complex and openness, and therefore a higher possibility of facing to various threats, especially advanced persistent threats (APTs) that disrupt system operations at a large scale. To better study the threats, current APTs detection work and challenges of the SGs, we first analyze the key features of high-DER-penetrated SGs, and the vulnerabilities of devices, networks, and applications in the SGs introduced by system design, limitation of deployed security measures, and social behaviors. On this basis, we analyze APTs faced by the SGs and deem that the APTs are in the form of cyber-physical-social cooperated and multi-stage APTs. The possible attacking methods for each stage of the APTs, typically stealthy attacks at the early stages and coordinated attacks at the action stage, are also summarized. Thereafter, a review of current work on security architectures for APT detection and intelligent intrusion detection methods is provided. Finally, we discuss the key challenges, research needs, and potential solutions of future work for the SGs against the APTs from the aspects of threat modeling, threat detection, threat hunting, and implementation technology.

大规模可再生分布式能源(DER)渗入智能电网(SG)是一个不可避免的趋势。这种大规模分布式能源(DER)渗透到智能电网(SGs)中,会严重依赖信息和通信技术,社会行为对系统运行和管理的影响也会越来越大。从这个意义上说,SGs 已成为网络-物理-社会系统。然而,网络、物理电网和社会的深度耦合导致 SG 更加复杂和开放,因此面临各种威胁的可能性也更高,尤其是大规模破坏系统运行的高级持续性威胁(APT)。为了更好地研究 SGs 的威胁、当前 APTs 检测工作和挑战,我们首先分析了高 DER 渗透 SGs 的主要特征,以及由系统设计、已部署安全措施的局限性和社会行为引入的 SGs 中设备、网络和应用程序的漏洞。在此基础上,我们对 SG 所面临的 APT 进行了分析,认为 APT 的形式是网络-物理-社会合作的多阶段 APT。此外,还总结了 APT 各阶段可能采用的攻击方法,其中早期阶段通常采用隐身攻击,行动阶段则采用协同攻击。随后,我们回顾了当前在 APT 检测安全架构和智能入侵检测方法方面所做的工作。最后,我们从威胁建模、威胁检测、威胁猎捕和实施技术等方面讨论了 SG 在应对 APT 方面面临的主要挑战、研究需求和未来工作的潜在解决方案。
{"title":"Detecting the cyber-physical-social cooperated APTs in high-DER-penetrated smart grids: Threats, current work and challenges","authors":"","doi":"10.1016/j.comnet.2024.110776","DOIUrl":"10.1016/j.comnet.2024.110776","url":null,"abstract":"<div><p>Large-scale renewable distributed energy sources (DERs) penetrating into smart grids (SGs) is an inevitable trend. Such high-DER-penetrated SGs entail heavy reliance on information and communication technologies and increasing impact of social behaviors on system operation and management. In this sense, the SGs become cyber-physical-social systems. However, the deeply coupling of cyber networks, physical grids, and societies leads SGs more complex and openness, and therefore a higher possibility of facing to various threats, especially advanced persistent threats (APTs) that disrupt system operations at a large scale. To better study the threats, current APTs detection work and challenges of the SGs, we first analyze the key features of high-DER-penetrated SGs, and the vulnerabilities of devices, networks, and applications in the SGs introduced by system design, limitation of deployed security measures, and social behaviors. On this basis, we analyze APTs faced by the SGs and deem that the APTs are in the form of cyber-physical-social cooperated and multi-stage APTs. The possible attacking methods for each stage of the APTs, typically stealthy attacks at the early stages and coordinated attacks at the action stage, are also summarized. Thereafter, a review of current work on security architectures for APT detection and intelligent intrusion detection methods is provided. Finally, we discuss the key challenges, research needs, and potential solutions of future work for the SGs against the APTs from the aspects of threat modeling, threat detection, threat hunting, and implementation technology.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
All in one: Improving GPS accuracy and security via crowdsourcing 一举多得:通过众包提高 GPS 的准确性和安全性
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-06 DOI: 10.1016/j.comnet.2024.110775

GPS is an integral part of billions of devices that serve a wide range of applications. This reliance upon GPS renders the users vulnerable to GPS spoofing attacks, especially when in need of precise or real-time location information. To protect commodity devices, we first propose a crowdsourcing-based method for detecting GPS spoofing. In this method, called method I, we leverage the orientation diversity of different users to expose spoofing attacks and, in many cases, the location of the attacker. In all scenarios, our method not only recovers the correct location but also significantly improves the location accuracy. This is an important incentive that can drive the adoption of our approach along with the use of privacy-preserving location sharing. Additionally, we leverage the users’ distances produced by GPS and Bluetooth measurements to detect discrepancies and account for errors, called Method II. Method II is robust even in the presence of multiple coordinate adversaries. The experimental results based on our prototype implementation and large-scale simulations demonstrate a detection rate as high as 98.72 % and latency of 62 ms with average localization error of 2.43 m.

全球定位系统是服务于各种应用的数十亿设备不可或缺的一部分。这种对 GPS 的依赖使用户容易受到 GPS 欺骗攻击,尤其是在需要精确或实时位置信息时。为了保护商品设备,我们首先提出了一种基于众包的 GPS 欺骗检测方法。在这个被称为方法 I 的方法中,我们利用不同用户的定位多样性来揭露欺骗攻击,并在许多情况下揭露攻击者的位置。在所有情况下,我们的方法不仅能恢复正确的位置,还能显著提高定位精度。这是一个重要的激励因素,可以推动我们的方法与保护隐私的位置共享一起得到采用。此外,我们还利用全球定位系统和蓝牙测量产生的用户距离来检测差异并考虑误差,这被称为方法 II。方法 II 即使在存在多个坐标对手的情况下也很稳健。基于我们的原型实施和大规模模拟的实验结果表明,检测率高达 98.72%,延迟时间为 62 毫秒,平均定位误差为 2.43 米。
{"title":"All in one: Improving GPS accuracy and security via crowdsourcing","authors":"","doi":"10.1016/j.comnet.2024.110775","DOIUrl":"10.1016/j.comnet.2024.110775","url":null,"abstract":"<div><p>GPS is an integral part of billions of devices that serve a wide range of applications. This reliance upon GPS renders the users vulnerable to GPS spoofing attacks, especially when in need of precise or real-time location information. To protect commodity devices, we first propose a crowdsourcing-based method for detecting GPS spoofing. In this method, called method I, we leverage the orientation diversity of different users to expose spoofing attacks and, in many cases, the location of the attacker. In all scenarios, our method not only recovers the correct location but also significantly improves the location accuracy. This is an important incentive that can drive the adoption of our approach along with the use of privacy-preserving location sharing. Additionally, we leverage the users’ distances produced by GPS and Bluetooth measurements to detect discrepancies and account for errors, called Method II. Method II is robust even in the presence of multiple coordinate adversaries. The experimental results based on our prototype implementation and large-scale simulations demonstrate a detection rate as high as 98.72<!--> <!-->% and latency of 62<!--> <!-->ms with average localization error of 2.43<!--> <!-->m.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1