首页 > 最新文献

ACM Transactions on Sensor Networks最新文献

英文 中文
Room-Scale Location Trace Tracking via Continuous Acoustic Waves 通过连续声波追踪房间尺度的位置轨迹
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-20 DOI: 10.1145/3649136
Jie Lian, Xu Yuan, Jiadong Lou, Li Chen, Hao Wang, Nianfeng Tzeng

The increasing prevalence of smart devices spurs the development of emerging indoor localization technologies for supporting diverse personalized applications at home. Given marked drawbacks of popular chirp signal-based approaches, we aim to develop a novel device-free localization system via the continuous wave of the inaudible frequency. To achieve this goal, solutions are developed for fine-grained analyses, able to precisely locate moving human traces in the room-scale environment. In particular, a smart speaker is controlled to emit continuous waves at inaudible 20kHz, with a co-located microphone array to record their Doppler reflections for localization. We first develop solutions to remove potential noises and then propose a novel idea by slicing signals into a set of narrowband signals, each of which is likely to include at most one body segment’s reflection. Different from previous studies, which take original signals themselves as the baseband, our solutions employ the Doppler frequency of a narrowband signal to estimate the velocity first and apply it to get the accurate baseband frequency, which permits a precise phase measurement after I-Q (i.e., in-phase and quadrature) decomposition. A signal model is then developed, able to formulate the phase with body segment’s velocity, range, and angle. We next develop novel solutions to estimate the motion state in each narrowband signal, cluster the motion states for different body segments corresponding to the same person, and locate the moving traces while mitigating multi-path effects. Our system is implemented with commodity devices in room environments for performance evaluation. The experimental results exhibit that our system can conduct effective localization for up to three persons in a room, with the average errors of 7.49cm for a single person, with 24.06cm for two persons, with 51.15cm for three persons.

智能设备的日益普及推动了新兴室内定位技术的发展,以支持家庭中的各种个性化应用。鉴于流行的基于啁啾信号的方法存在明显缺陷,我们旨在通过不可听频率的连续波开发一种新型的无设备定位系统。为实现这一目标,我们开发了细粒度分析解决方案,能够精确定位房间尺度环境中移动的人体痕迹。特别是,我们控制智能扬声器发射 20kHz 不可听频率的连续波,并通过共定位麦克风阵列记录其多普勒反射以进行定位。我们首先开发了消除潜在噪声的解决方案,然后提出了一个新颖的想法,即把信号切成一组窄带信号,每组窄带信号可能最多包含一个体段的反射。与以往将原始信号本身作为基带的研究不同,我们的解决方案首先利用窄带信号的多普勒频率来估算速度,然后将其用于获得精确的基带频率,这样就可以在 I-Q(即同相和正交)分解后进行精确的相位测量。然后,我们建立了一个信号模型,该模型能够根据体段的速度、范围和角度来确定相位。接下来,我们开发了新颖的解决方案来估计每个窄带信号中的运动状态,对同一人对应的不同身体段的运动状态进行聚类,并在减轻多路径效应的同时定位运动轨迹。我们的系统是在室内环境中使用商品设备实现的,以进行性能评估。实验结果表明,我们的系统可以对房间中的多达三个人进行有效定位,单人的平均误差为 7.49 厘米,两人的平均误差为 24.06 厘米,三人的平均误差为 51.15 厘米。
{"title":"Room-Scale Location Trace Tracking via Continuous Acoustic Waves","authors":"Jie Lian, Xu Yuan, Jiadong Lou, Li Chen, Hao Wang, Nianfeng Tzeng","doi":"10.1145/3649136","DOIUrl":"https://doi.org/10.1145/3649136","url":null,"abstract":"<p>The increasing prevalence of smart devices spurs the development of emerging indoor localization technologies for supporting diverse personalized applications at home. Given marked drawbacks of popular chirp signal-based approaches, we aim to develop a novel device-free localization system via the continuous wave of the inaudible frequency. To achieve this goal, solutions are developed for fine-grained analyses, able to precisely locate moving human traces in the room-scale environment. In particular, a smart speaker is controlled to emit continuous waves at inaudible 20<i>kHz</i>, with a co-located microphone array to record their Doppler reflections for localization. We first develop solutions to remove potential noises and then propose a novel idea by slicing signals into a set of narrowband signals, each of which is likely to include at most one body segment’s reflection. Different from previous studies, which take original signals themselves as the baseband, our solutions employ the Doppler frequency of a narrowband signal to estimate the velocity first and apply it to get the accurate baseband frequency, which permits a precise phase measurement after I-Q (i.e., in-phase and quadrature) decomposition. A signal model is then developed, able to formulate the phase with body segment’s velocity, range, and angle. We next develop novel solutions to estimate the motion state in each narrowband signal, cluster the motion states for different body segments corresponding to the same person, and locate the moving traces while mitigating multi-path effects. Our system is implemented with commodity devices in room environments for performance evaluation. The experimental results exhibit that our system can conduct effective localization for up to three persons in a room, with the average errors of 7.49<i>cm</i> for a single person, with 24.06<i>cm</i> for two persons, with 51.15<i>cm</i> for three persons.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"46 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139928694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UETOPSIS: A Data-Driven Intelligence Approach to Security Decisions for Edge Computing in Smart Cities UETOPSIS:智能城市边缘计算安全决策的数据驱动智能方法
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-14 DOI: 10.1145/3648373
Lijun Xiao, Dezhi Han, Kuan-Ching Li, Muhammad Khurram Khan

Despite considerable technological advances for smart cities, they still face problems such as instability of cloud server connection, insecurity during data transmission, and slight deficiencies in TCP/IP network architecture. To address such issues, we propose a data-driven intelligence approach to security decisions under Named Data Networking (NDN) architecture for edge computing, taking into consideration factors that impact device entry in smart cities, such as device performance, load, Bluetooth signal strength, and scan frequency. Despite existing techniques for Order Preference by Similarity to Ideal Solution (TOPSIS)-based on entropy weights methods are improved and applied, there exist unstable decision results. Due to this, we propose a technique for Order Preference by Similarity to Ideal Solution (TOPSIS)-based on utility function and entropy weights, named UETOPSIS, where the corresponding utility function is applied according to the influence of each attribute on the decision, ensuring the stability of the ranking of decision results. We rely on an entropy-based weights mechanism to select a suitable master controller for the design of the multi-control protocol in the smart city system, and utilize a utility function to calculate the attribute values and then combine the normalized attribute values of utility numbers, starting by analyzing the main work of the controllers. Lastly, a prototype is developed for performance evaluation purposes. Experimental evaluation and analysis show that the proposed work has better authenticity and reliability than existing works and can reduce the workload of edge computing devices when forwarding data, with stability 24.7% higher than TOPSIS, significantly improving the performance and stability of system fault tolerance and reliability in smart cities, as the second-ranked controller can efficiently take over the work when a central controller fails or damaged.

尽管智慧城市技术取得了长足进步,但仍面临云服务器连接不稳定、数据传输不安全、TCP/IP 网络架构略有缺陷等问题。为了解决这些问题,我们提出了一种数据驱动的智能方法,在边缘计算的命名数据网络(NDN)架构下进行安全决策,同时考虑到影响设备进入智慧城市的因素,如设备性能、负载、蓝牙信号强度和扫描频率等。尽管现有的基于熵权重方法的理想解相似度排序偏好(TOPSIS)技术得到了改进和应用,但仍存在决策结果不稳定的问题。因此,我们提出了一种基于效用函数和熵权重的理想解相似度排序偏好(TOPSIS)技术,命名为 UETOPSIS,根据各属性对决策的影响程度应用相应的效用函数,确保决策结果排序的稳定性。在智慧城市系统的多控制协议设计中,我们依靠基于熵的权重机制来选择合适的主控制器,并利用效用函数计算属性值,然后结合效用数的归一化属性值,从分析控制器的主要工作入手。最后,开发了一个原型用于性能评估。实验评估和分析表明,与现有作品相比,所提出的作品具有更好的真实性和可靠性,并能减少边缘计算设备在转发数据时的工作量,稳定性比 TOPSIS 高 24.7%,显著提高了智慧城市中系统容错和可靠性的性能和稳定性,因为当中央控制器发生故障或损坏时,排名第二的控制器可以高效地接管工作。
{"title":"UETOPSIS: A Data-Driven Intelligence Approach to Security Decisions for Edge Computing in Smart Cities","authors":"Lijun Xiao, Dezhi Han, Kuan-Ching Li, Muhammad Khurram Khan","doi":"10.1145/3648373","DOIUrl":"https://doi.org/10.1145/3648373","url":null,"abstract":"<p>Despite considerable technological advances for smart cities, they still face problems such as instability of cloud server connection, insecurity during data transmission, and slight deficiencies in TCP/IP network architecture. To address such issues, we propose a data-driven intelligence approach to security decisions under Named Data Networking (NDN) architecture for edge computing, taking into consideration factors that impact device entry in smart cities, such as device performance, load, Bluetooth signal strength, and scan frequency. Despite existing techniques for Order Preference by Similarity to Ideal Solution (TOPSIS)-based on entropy weights methods are improved and applied, there exist unstable decision results. Due to this, we propose a technique for Order Preference by Similarity to Ideal Solution (TOPSIS)-based on utility function and entropy weights, named UETOPSIS, where the corresponding utility function is applied according to the influence of each attribute on the decision, ensuring the stability of the ranking of decision results. We rely on an entropy-based weights mechanism to select a suitable master controller for the design of the multi-control protocol in the smart city system, and utilize a utility function to calculate the attribute values and then combine the normalized attribute values of utility numbers, starting by analyzing the main work of the controllers. Lastly, a prototype is developed for performance evaluation purposes. Experimental evaluation and analysis show that the proposed work has better authenticity and reliability than existing works and can reduce the workload of edge computing devices when forwarding data, with stability 24.7% higher than TOPSIS, significantly improving the performance and stability of system fault tolerance and reliability in smart cities, as the second-ranked controller can efficiently take over the work when a central controller fails or damaged.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"10 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139762180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Fine-grained Dimming with Improved LiFi Throughput 利用细粒度调光提高 LiFi 吞吐量
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-13 DOI: 10.1145/3643814
Xiao Zhang, James Mariani, Li Xiao, Matt W. Mutka

Optical wireless communication (OWC) shows great potential due to its broad spectrum and the exceptional intensity switching speed of LEDs. Under poor conditions, most OWC systems switch from complex and more error prone high-order modulation schemes to more robust On-Off Keying (OOK) modulation defined in the IEEE OWC standard. This paper presents LiFOD, a high-speed indoor OOK-based OWC system with fine-grained dimming support. While ensuring fine-grained dimming, LiFOD remarkably achieves robust communication at up to 400 Kbps at a distance of 6 meters. This is the first time that the data rate has improved via OWC dimming in comparison to the previous approaches that consider trading off dimming and communication. LiFOD makes two key technical contributions. First, LiFOD utilizes Compensation Symbols (CS) as a reliable side-channel to represent bit patterns dynamically and improve throughput. We firstly design greedy-based bit pattern mining. Then we propose 2D feature enhancement via YOLO model for real-time bit pattern mining. Second, LiFOD synchronously redesigns optical symbols and CS relocation schemes for fine-grained dimming and robust decoding. Experiments on low-cost Beaglebone prototypes with commercial LED lamps and the photodiode (PD) demonstrate that LiFOD significantly outperforms the state-of-art system with 2.1x throughput on the SIGCOMM17 data-trace.

光学无线通信(OWC)因其宽广的频谱和发光二极管出色的强度切换速度而显示出巨大的潜力。在条件较差的情况下,大多数 OWC 系统会从复杂且更容易出错的高阶调制方案切换到 IEEE OWC 标准中定义的更稳健的开关键控(OOK)调制。本文介绍的 LiFOD 是一种基于 OOK 的高速室内 OWC 系统,支持细粒度调光。在确保细粒度调光的同时,LiFOD 还能在 6 米距离内以高达 400 Kbps 的速度实现稳定通信。与之前考虑调光和通信权衡的方法相比,这是首次通过 OWC 调光提高数据传输速率。LiFOD 有两大技术贡献。首先,LiFOD 利用补偿符号(CS)作为可靠的侧信道,动态表示位模式并提高吞吐量。我们首先设计了基于贪婪的比特模式挖掘。然后,我们提出了通过 YOLO 模型增强二维特征的实时比特模式挖掘方法。其次,LiFOD 会同步重新设计光学符号和 CS 重定位方案,以实现精细调光和稳健解码。在使用商用 LED 灯和光电二极管 (PD) 的低成本 Beaglebone 原型机上进行的实验表明,LiFOD 在 SIGCOMM17 数据轨迹上的吞吐量为现有系统的 2.1 倍,明显优于现有系统。
{"title":"Exploiting Fine-grained Dimming with Improved LiFi Throughput","authors":"Xiao Zhang, James Mariani, Li Xiao, Matt W. Mutka","doi":"10.1145/3643814","DOIUrl":"https://doi.org/10.1145/3643814","url":null,"abstract":"<p>Optical wireless communication (OWC) shows great potential due to its broad spectrum and the exceptional intensity switching speed of LEDs. Under poor conditions, most OWC systems switch from complex and more error prone high-order modulation schemes to more robust On-Off Keying (OOK) modulation defined in the IEEE OWC standard. This paper presents LiFOD, a high-speed indoor OOK-based OWC system with fine-grained dimming support. While ensuring fine-grained dimming, LiFOD remarkably achieves robust communication at up to 400 Kbps at a distance of 6 meters. This is the first time that the data rate has improved via OWC dimming in comparison to the previous approaches that consider trading off dimming and communication. LiFOD makes two key technical contributions. First, LiFOD utilizes Compensation Symbols (CS) as a reliable side-channel to represent bit patterns dynamically and improve throughput. We firstly design greedy-based bit pattern mining. Then we propose 2D feature enhancement via YOLO model for real-time bit pattern mining. Second, LiFOD synchronously redesigns optical symbols and CS relocation schemes for fine-grained dimming and robust decoding. Experiments on low-cost Beaglebone prototypes with commercial LED lamps and the photodiode (PD) demonstrate that LiFOD significantly outperforms the state-of-art system with 2.1x throughput on the SIGCOMM17 data-trace.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"53 29 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139761827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Experimental Study on BLE 5 Mesh Applied to Public Transportation BLE 5 网格应用于公共交通的实验研究
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-12 DOI: 10.1145/3647641
Anderson Biegelmeyer, Alexandre dos Santos Roque, Edison Pignaton de Freitas

Nowadays In-Vehicle Wireless Sensor Networks (IVWSN) are taking place in car manufacturers because it saves time in the assembling process, saves costs in harness and after-sales, and represents less weight on vehicles helping in diminishing fuel consumption. There is no definition for wireless solution technology for IVWSN, because each one has its own characteristics, and probably this is one of the reasons for its smooth usage in the automotive industry. A gap identified in Wireless Sensor Networks (WSN) for the automotive domain is that the related literature focuses only on ordinary cars with a star topology and few of them with mesh topology. This paper aims to cover this gap by presenting an experimental study performed on verifying the new Bluetooth 5 technology working in a mesh topology applied to public transportation systems (buses). In order to perform this evaluation, a setup to emulate an IVWSN was deployed in a working city bus. Measuring the network metrics, the bus was placed under work in a variety of conditions during its trajectory to determine the influence of the passengers and the whole environment in the data transmission. The results suggest Bluetooth 5 in a mesh topology as a promising candidate for IVWSN because it showed the robustness of losing only 0.16% packets in the worst test, as well as its ability to cover a wider range compared to its previous version, indeed a better RSSI and jitter, with lower transmission power, compared to a star topology. The round trip time results can supports the analysis for time-critical applications.

如今,车载无线传感器网络(IVWSN)已在汽车制造商中得到广泛应用,因为它节省了装配过程的时间,节约了线束和售后服务的成本,并减轻了汽车的重量,有助于降低油耗。IVWSN 的无线解决方案技术没有定义,因为每种技术都有自己的特点,这可能是其在汽车行业顺利使用的原因之一。无线传感器网络(WSN)在汽车领域的一个不足是,相关文献只关注采用星形拓扑结构的普通汽车,而采用网状拓扑结构的汽车则很少。本文旨在填补这一空白,介绍了一项实验研究,以验证新蓝牙 5 技术在网状拓扑中的应用,该技术应用于公共交通系统(公交车)。为了进行评估,在一辆运行中的城市公交车上部署了一个模拟 IVWSN 的装置。在测量网络指标时,公交车在行驶过程中的各种条件下工作,以确定乘客和整个环境对数据传输的影响。结果表明,采用网状拓扑结构的蓝牙 5 是 IVWSN 的理想候选方案,因为它具有很强的鲁棒性,在最糟糕的测试中仅丢失 0.16% 的数据包,而且与之前的版本相比,它能够覆盖更广的范围,与星形拓扑结构相比,它的 RSSI 和抖动都更好,传输功率更低。往返时间结果可支持对时间要求严格的应用进行分析。
{"title":"An Experimental Study on BLE 5 Mesh Applied to Public Transportation","authors":"Anderson Biegelmeyer, Alexandre dos Santos Roque, Edison Pignaton de Freitas","doi":"10.1145/3647641","DOIUrl":"https://doi.org/10.1145/3647641","url":null,"abstract":"<p>Nowadays In-Vehicle Wireless Sensor Networks (IVWSN) are taking place in car manufacturers because it saves time in the assembling process, saves costs in harness and after-sales, and represents less weight on vehicles helping in diminishing fuel consumption. There is no definition for wireless solution technology for IVWSN, because each one has its own characteristics, and probably this is one of the reasons for its smooth usage in the automotive industry. A gap identified in Wireless Sensor Networks (WSN) for the automotive domain is that the related literature focuses only on ordinary cars with a star topology and few of them with mesh topology. This paper aims to cover this gap by presenting an experimental study performed on verifying the new Bluetooth 5 technology working in a mesh topology applied to public transportation systems (buses). In order to perform this evaluation, a setup to emulate an IVWSN was deployed in a working city bus. Measuring the network metrics, the bus was placed under work in a variety of conditions during its trajectory to determine the influence of the passengers and the whole environment in the data transmission. The results suggest Bluetooth 5 in a mesh topology as a promising candidate for IVWSN because it showed the robustness of losing only 0.16% packets in the worst test, as well as its ability to cover a wider range compared to its previous version, indeed a better RSSI and jitter, with lower transmission power, compared to a star topology. The round trip time results can supports the analysis for time-critical applications.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"4 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139762020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Compressive Sensing on the Security of Computer Vision Systems 评估压缩传感对计算机视觉系统安全性的影响
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-08 DOI: 10.1145/3645093
Yushi Cheng, Boyang Zhou, Yanjiao Chen, Yi-Chao Chen, Xiaoyu Ji, Wenyuan Xu

The rising demand for utilizing fine-grained data in deep-learning (DL) based intelligent systems presents challenges for the collection and transmission abilities of real-world devices. Deep compressive sensing, which employs deep learning algorithms to compress signals at the sensing stage and reconstruct them with high quality at the receiving stage, provides a state-of-the-art solution for the problem of large-scale fine-grained data. However, recent works have proven that fatal security flaws exist in current deep learning methods and such instability is universal for DL-based image reconstruction methods. In this paper, we assess the security risks introduced by deep compressive sensing in the widely-used computer vision system in the face of adversarial example attacks and poisoning attacks. To implement the security inspection in an unbiased and complete manner, we develop a comprehensive methodology and a set of evaluation metrics to manage all potential combinations of attack methods, datasets (application scenarios), categories of deep compressive sensing models, and image classifiers. The results demonstrate that deep compressive sensing models unknown to adversaries can protect the computer vision system from adversarial example attacks and poisoning attacks, whereas the ones exposed to adversaries can cause the system to become more vulnerable.

基于深度学习(DL)的智能系统对利用细粒度数据的需求日益增长,这对现实世界设备的收集和传输能力提出了挑战。深度压缩传感利用深度学习算法在传感阶段压缩信号,并在接收阶段高质量地重构信号,为大规模细粒度数据问题提供了最先进的解决方案。然而,最近的研究证明,目前的深度学习方法存在致命的安全缺陷,这种不稳定性对于基于深度学习的图像重建方法来说是普遍存在的。在本文中,我们评估了在广泛使用的计算机视觉系统中,面对对抗性实例攻击和中毒攻击,深度压缩传感所带来的安全风险。为了公正、完整地进行安全检测,我们开发了一套全面的方法和评估指标,以管理所有潜在的攻击方法组合、数据集(应用场景)、深度压缩传感模型类别和图像分类器。结果表明,敌方未知的深度压缩传感模型可以保护计算机视觉系统免受敌方示例攻击和中毒攻击,而暴露给敌方的模型则会导致系统变得更加脆弱。
{"title":"Evaluating Compressive Sensing on the Security of Computer Vision Systems","authors":"Yushi Cheng, Boyang Zhou, Yanjiao Chen, Yi-Chao Chen, Xiaoyu Ji, Wenyuan Xu","doi":"10.1145/3645093","DOIUrl":"https://doi.org/10.1145/3645093","url":null,"abstract":"<p>The rising demand for utilizing fine-grained data in deep-learning (DL) based intelligent systems presents challenges for the collection and transmission abilities of real-world devices. Deep compressive sensing, which employs deep learning algorithms to compress signals at the sensing stage and reconstruct them with high quality at the receiving stage, provides a state-of-the-art solution for the problem of large-scale fine-grained data. However, recent works have proven that fatal security flaws exist in current deep learning methods and such instability is universal for DL-based image reconstruction methods. In this paper, we assess the security risks introduced by deep compressive sensing in the widely-used computer vision system in the face of adversarial example attacks and poisoning attacks. To implement the security inspection in an unbiased and complete manner, we develop a comprehensive methodology and a set of evaluation metrics to manage all potential combinations of attack methods, datasets (application scenarios), categories of deep compressive sensing models, and image classifiers. The results demonstrate that deep compressive sensing models unknown to adversaries can protect the computer vision system from adversarial example attacks and poisoning attacks, whereas the ones exposed to adversaries can cause the system to become more vulnerable.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"104 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139762032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow-Time Minimization for Timely Data Stream Processing in UAV-Aided Mobile Edge Computing 无人机辅助移动边缘计算中及时处理数据流的流时最小化
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-02 DOI: 10.1145/3643813
Zichuan Xu, Haiyang Qiao, Weifa Liang, Zhou Xu, Qiufen Xia, Pan Zhou, Omer F. Rana, Wenzheng Xu

Unmanned Aerial Vehicle (UAV) has gained increasing attentions by both academic and industrial communities, due to its flexible deployment and efficient line-of-sight communication. Recently, UAVs equipped with base stations have been envisioned as a key technology to provide 5G network services for mobile users. In this paper, we provide timely services on the data streams of mobile users in a UAV-aided Mobile Edge Computing (MEC) network, in which each UAV is equipped with a 5G small-cell base station for communication and data processing. Specifically, we first formulate a flow-time minimization problem by jointly caching services and offloading tasks of mobile users to the UAV-aided MEC with the aim to minimize the flow-time, where the flow-time of a user request is referred to the time duration from the request issuing time point to its completion point, subject to resource and energy capacity on each UAV. We then propose a spatial-temporal learning optimization framework. We also devise an online algorithm with a competitive ratio for the problem based upon the framework, by leveraging the round-robin scheduling and dual fitting techniques. Finally, we evaluate the performance of the proposed algorithms through experimental simulation. The simulation results demonstrated that the proposed algorithms outperform their comparison counterparts, by reducing the flow-time no less than 19% on average.

无人飞行器(UAV)因其灵活的部署和高效的视距通信,越来越受到学术界和工业界的关注。最近,配备基站的无人机被认为是为移动用户提供 5G 网络服务的关键技术。在本文中,我们将在无人机辅助的移动边缘计算(MEC)网络中为移动用户的数据流提供及时服务,在该网络中,每架无人机都配备了一个 5G 小蜂窝基站,用于通信和数据处理。具体来说,我们首先提出了一个流量时间最小化问题,即在每个无人机的资源和能源容量允许的情况下,将移动用户的服务缓存和任务卸载到无人机辅助的 MEC,以实现流量时间最小化。然后,我们提出了一个时空学习优化框架。在此框架的基础上,我们还利用轮循调度和二元拟合技术设计了一种具有竞争比的在线算法。最后,我们通过实验仿真评估了所提算法的性能。仿真结果表明,所提出的算法平均缩短了不少于 19% 的流量时间,优于其他同类算法。
{"title":"Flow-Time Minimization for Timely Data Stream Processing in UAV-Aided Mobile Edge Computing","authors":"Zichuan Xu, Haiyang Qiao, Weifa Liang, Zhou Xu, Qiufen Xia, Pan Zhou, Omer F. Rana, Wenzheng Xu","doi":"10.1145/3643813","DOIUrl":"https://doi.org/10.1145/3643813","url":null,"abstract":"<p>Unmanned Aerial Vehicle (UAV) has gained increasing attentions by both academic and industrial communities, due to its flexible deployment and efficient line-of-sight communication. Recently, UAVs equipped with base stations have been envisioned as a key technology to provide 5G network services for mobile users. In this paper, we provide timely services on the data streams of mobile users in a UAV-aided Mobile Edge Computing (MEC) network, in which each UAV is equipped with a 5G small-cell base station for communication and data processing. Specifically, we first formulate a flow-time minimization problem by jointly caching services and offloading tasks of mobile users to the UAV-aided MEC with the aim to minimize the flow-time, where the flow-time of a user request is referred to the time duration from the request issuing time point to its completion point, subject to resource and energy capacity on each UAV. We then propose a spatial-temporal learning optimization framework. We also devise an online algorithm with a competitive ratio for the problem based upon the framework, by leveraging the round-robin scheduling and dual fitting techniques. Finally, we evaluate the performance of the proposed algorithms through experimental simulation. The simulation results demonstrated that the proposed algorithms outperform their comparison counterparts, by reducing the flow-time no less than 19% on average.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"2 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139668926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behave Differently when Clustering: a Semi-Asynchronous Federated Learning Approach for IoT 聚类时的不同行为:物联网半同步联合学习方法
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-25 DOI: 10.1145/3639825
Boyu Fan, Xiang Su, Sasu Tarkoma, Pan Hui

The Internet of Things (IoT) has revolutionized the connectivity of diverse sensing devices, generating an enormous volume of data. However, applying machine learning algorithms to sensing devices presents substantial challenges due to resource constraints and privacy concerns. Federated learning (FL) emerges as a promising solution allowing for training models in a distributed manner while preserving data privacy on client devices. We contribute SAFI, a semi-asynchronous FL approach based on clustering to achieve a novel in-cluster synchronous and out-cluster asynchronous FL training mode. Specifically, we propose a three-tier architecture to enable IoT data processing on edge devices and design a clustering selection module to effectively group heterogeneous edge devices based on their processing capacities. The performance of SAFI has been extensively evaluated through experiments conducted on a real-world testbed. As the heterogeneity of edge devices increases, SAFI surpasses the baselines in terms of the convergence time, achieving a speedup of approximately × 3 when the heterogeneity ratio is 7:1. Moreover, SAFI demonstrates favorable performance in non-IID settings and requires lower communication cost compared to FedAsync. Notably, SAFI is the first Java-implemented FL approach and holds significant promise to serve as an efficient FL algorithm in IoT environments.

物联网(IoT)彻底改变了各种传感设备的连接方式,产生了大量数据。然而,由于资源限制和隐私问题,将机器学习算法应用于传感设备面临着巨大挑战。联合学习(FL)是一种很有前景的解决方案,它允许以分布式方式训练模型,同时保护客户端设备上的数据隐私。我们提出了基于聚类的半异步 FL 方法 SAFI,以实现新颖的集群内同步和集群外异步 FL 训练模式。具体来说,我们提出了一种三层架构来实现边缘设备上的物联网数据处理,并设计了一个聚类选择模块来根据异构边缘设备的处理能力对其进行有效分组。通过在实际测试平台上进行实验,我们对 SAFI 的性能进行了广泛评估。随着边缘设备异构性的增加,SAFI 的收敛时间超过了基线,当异构比为 7:1 时,速度提高了约 3 倍。此外,与 FedAsync 相比,SAFI 在非 IID 环境中表现出良好的性能,而且所需的通信成本更低。值得注意的是,SAFI 是第一种 Java 实现的 FL 方法,有望成为物联网环境中的高效 FL 算法。
{"title":"Behave Differently when Clustering: a Semi-Asynchronous Federated Learning Approach for IoT","authors":"Boyu Fan, Xiang Su, Sasu Tarkoma, Pan Hui","doi":"10.1145/3639825","DOIUrl":"https://doi.org/10.1145/3639825","url":null,"abstract":"<p>The Internet of Things (IoT) has revolutionized the connectivity of diverse sensing devices, generating an enormous volume of data. However, applying machine learning algorithms to sensing devices presents substantial challenges due to resource constraints and privacy concerns. Federated learning (FL) emerges as a promising solution allowing for training models in a distributed manner while preserving data privacy on client devices. We contribute <i>SAFI</i>, a semi-asynchronous FL approach based on clustering to achieve a novel in-cluster synchronous and out-cluster asynchronous FL training mode. Specifically, we propose a three-tier architecture to enable IoT data processing on edge devices and design a clustering selection module to effectively group heterogeneous edge devices based on their processing capacities. The performance of <i>SAFI</i> has been extensively evaluated through experiments conducted on a real-world testbed. As the heterogeneity of edge devices increases, <i>SAFI</i> surpasses the baselines in terms of the convergence time, achieving a speedup of approximately × 3 when the heterogeneity ratio is 7:1. Moreover, <i>SAFI</i> demonstrates favorable performance in non-IID settings and requires lower communication cost compared to FedAsync. Notably, <i>SAFI</i> is the first Java-implemented FL approach and holds significant promise to serve as an efficient FL algorithm in IoT environments.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"16 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139558910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing SecEG:针对移动边缘计算中 DDoS 攻击的安全高效策略
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-23 DOI: 10.1145/3641106
Haiyang Huang, Tianhui Meng, Jianxiong Guo, Xuekai Wei, Weijia Jia

Application-layer distributed denial-of-service (DDoS) attacks incapacitate systems by using up their resources, causing service interruptions, financial losses, and more. Consequently, advanced deep-learning techniques are used to detect and mitigate these attacks in cloud infrastructures. However, in mobile edge computing (MEC), it becomes economically impractical to equip each node with defensive resources, as these resources may largely remain unused in edge devices. Furthermore, current methods are mainly concentrated on improving the accuracy of DDoS attack detection and saving CPU resources, neglecting the effective allocation of computational power for benign tasks under DDoS attacks. To address these issues, this paper introduces SecEG, a secure and efficient strategy against DDoS attacks for MEC that integrates container-based task isolation with lightweight online anomaly detection on edge nodes. More specifically, a new model is proposed to analyze resource contention dynamics between DDoS attacks and benign tasks. Subsequently, by employing periodic packet sampling and real-time attack intensity predicting, an autoencoder-based method is proposed to detect DDoS attacks. We leverage an efficient scheduling method to optimize the edge resource allocation and the service quality for benign users during DDoS attacks. When executed in the real-world edge environment, our experimental findings validate the efficacy of the proposed SecEG strategy. Compared to conventional methods, the service rate of benign requests increases by 23% under intense DDoS attacks, and the CPU resource is saved up to 35%.

应用层分布式拒绝服务(DDoS)攻击会占用系统资源,导致系统瘫痪,造成服务中断、经济损失等。因此,先进的深度学习技术被用于检测和缓解云基础设施中的这些攻击。然而,在移动边缘计算(MEC)中,为每个节点配备防御资源在经济上并不现实,因为这些资源在边缘设备中可能大部分都未被使用。此外,目前的方法主要集中在提高 DDoS 攻击检测的准确性和节省 CPU 资源上,忽视了在 DDoS 攻击下为良性任务有效分配计算能力。为了解决这些问题,本文介绍了 SecEG,一种针对 MEC 的安全高效的 DDoS 攻击策略,它将基于容器的任务隔离与边缘节点上的轻量级在线异常检测集成在一起。更具体地说,本文提出了一个新模型来分析 DDoS 攻击与良性任务之间的资源争用动态。随后,通过采用周期性数据包采样和实时攻击强度预测,提出了一种基于自动编码器的方法来检测 DDoS 攻击。在 DDoS 攻击期间,我们利用高效的调度方法来优化边缘资源分配和良性用户的服务质量。在真实世界的边缘环境中,我们的实验结果验证了所提出的 SecEG 策略的有效性。与传统方法相比,在激烈的 DDoS 攻击下,良性请求的服务率提高了 23%,CPU 资源节省达 35%。
{"title":"SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing","authors":"Haiyang Huang, Tianhui Meng, Jianxiong Guo, Xuekai Wei, Weijia Jia","doi":"10.1145/3641106","DOIUrl":"https://doi.org/10.1145/3641106","url":null,"abstract":"<p>Application-layer distributed denial-of-service (DDoS) attacks incapacitate systems by using up their resources, causing service interruptions, financial losses, and more. Consequently, advanced deep-learning techniques are used to detect and mitigate these attacks in cloud infrastructures. However, in mobile edge computing (MEC), it becomes economically impractical to equip each node with defensive resources, as these resources may largely remain unused in edge devices. Furthermore, current methods are mainly concentrated on improving the accuracy of DDoS attack detection and saving CPU resources, neglecting the effective allocation of computational power for benign tasks under DDoS attacks. To address these issues, this paper introduces SecEG, a secure and efficient strategy against DDoS attacks for MEC that integrates container-based task isolation with lightweight online anomaly detection on edge nodes. More specifically, a new model is proposed to analyze resource contention dynamics between DDoS attacks and benign tasks. Subsequently, by employing periodic packet sampling and real-time attack intensity predicting, an autoencoder-based method is proposed to detect DDoS attacks. We leverage an efficient scheduling method to optimize the edge resource allocation and the service quality for benign users during DDoS attacks. When executed in the real-world edge environment, our experimental findings validate the efficacy of the proposed SecEG strategy. Compared to conventional methods, the service rate of benign requests increases by 23% under intense DDoS attacks, and the CPU resource is saved up to 35%.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"10 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Holistic Energy Awareness and Robustness for Intelligent Drones 智能无人机的整体能源意识和鲁棒性
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-23 DOI: 10.1145/3641855
Ravi Raj Saxena, Joydeep Pal, Srinivasan Iyengar, Bhawana Chhaglani, Anurag Ghosh, Venkata N. Padmanabhan, Prabhakar T. Venkata

Drones represent a significant technological shift at the convergence of on-demand cyber-physical systems and edge intelligence. However, realizing their full potential necessitates managing the limited energy resources carefully. Prior work looks at factors such as battery characteristics, intelligent edge sensing considerations, planning and robustness in isolation. But a global view of energy awareness that considers these factors and looks at various tradeoffs is essential. To this end, we present results from our detailed empirical study of battery charge-discharge characteristics and the impact of altitude and lighting on edge inference accuracy. Our energy models, derived from these observations, predict energy usage while performing various manoeuvres with an error of 5.6%, a 2.5X improvement over the state-of-the-art. Furthermore, we propose a holistic energy-aware multi-drone scheduling system that decreases the energy consumed by 21.14% and the mission times by 46.91% over state-of-the-art baselines. To achieve system robustness in the event of link or drone failure, we observe trends in Packet Delivery Ratio to propose a methodology to establish reliable communication between nodes. We release an open-source implementation of our system. Finally, we tie all of these pieces together using a people-counting case study.

无人机是按需网络物理系统和边缘智能融合的重大技术变革。然而,要充分发挥无人机的潜力,就必须谨慎管理有限的能源资源。之前的研究工作孤立地研究了电池特性、智能边缘传感考虑因素、规划和稳健性等因素。但是,考虑这些因素并研究各种权衡的能源意识全局视图是必不可少的。为此,我们介绍了对电池充放电特性以及海拔和照明对边缘推断准确性的影响进行详细实证研究的结果。我们根据这些观察结果推导出的能量模型在预测执行各种操作时的能量消耗时,误差仅为 5.6%,比最先进的模型提高了 2.5 倍。此外,我们还提出了一种整体能源感知多无人机调度系统,与最先进的基线相比,能耗降低了 21.14%,任务时间缩短了 46.91%。为了在链路或无人机发生故障时实现系统的鲁棒性,我们观察了数据包交付率的趋势,提出了一种在节点间建立可靠通信的方法。我们发布了系统的开源实现。最后,我们通过一项人员统计案例研究将所有这些内容结合在一起。
{"title":"Holistic Energy Awareness and Robustness for Intelligent Drones","authors":"Ravi Raj Saxena, Joydeep Pal, Srinivasan Iyengar, Bhawana Chhaglani, Anurag Ghosh, Venkata N. Padmanabhan, Prabhakar T. Venkata","doi":"10.1145/3641855","DOIUrl":"https://doi.org/10.1145/3641855","url":null,"abstract":"<p>Drones represent a significant technological shift at the convergence of on-demand cyber-physical systems and edge intelligence. However, realizing their full potential necessitates managing the limited energy resources carefully. Prior work looks at factors such as battery characteristics, intelligent edge sensing considerations, planning and robustness in isolation. But a global view of energy awareness that considers these factors and looks at various tradeoffs is essential. To this end, we present results from our detailed empirical study of battery charge-discharge characteristics and the impact of altitude and lighting on edge inference accuracy. Our energy models, derived from these observations, predict energy usage while performing various manoeuvres with an error of 5.6%, a 2.5X improvement over the state-of-the-art. Furthermore, we propose a holistic energy-aware multi-drone scheduling system that decreases the energy consumed by 21.14% and the mission times by 46.91% over state-of-the-art baselines. To achieve system robustness in the event of link or drone failure, we observe trends in Packet Delivery Ratio to propose a methodology to establish reliable communication between nodes. We release an open-source implementation of our system. Finally, we tie all of these pieces together using a people-counting case study.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"116 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAM-FOG Net: A Lightweight Weed Detection Model Deployed on Smart Weeding Robots PAM-FOG Net:部署在智能除草机器人上的轻量级杂草检测模型
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-22 DOI: 10.1145/3641821
Jiahua Bao, Siyao Cheng, Jie Liu

Visual target detection based on deep learning with high computing power devices has been successful, but the performance in intelligent agriculture with edge devices has not been prominent. Specifically, the existing model architecture and optimization methods are not well-suited to low-power edge devices, the agricultural tasks such as weed detection require high accuracy, short inference latency, and low cost. Although there are automated tuning methods available, the search space is extremely large, using existing models for compression and optimization greatly wastes tuning resources. In this article, we propose a lightweight PAM-FOG net based on weed distribution and projection mapping. More significantly, we propose a novel model compression optimization method to fit our model. Compared with other models, PAM-FOG net runs on smart weeding robots supported by edge devices, and achieves superior accuracy and high frame rate. We effectively balance model size, performance and inference speed, reducing the original model size by nearly 50%, power consumption by 26%, and improving the frame rate by 40%. It shows the effectiveness of our model architecture and optimization method, which provides a reference for the future development of deep learning in intelligent agriculture.

基于深度学习的视觉目标检测在高计算能力的设备上已经取得了成功,但在使用边缘设备的智慧农业中表现并不突出。具体来说,现有的模型架构和优化方法并不适合低功耗边缘设备,而杂草检测等农业任务要求高精度、短推理延迟和低成本。虽然有自动调整方法,但搜索空间非常大,使用现有模型进行压缩和优化会极大地浪费调整资源。在本文中,我们提出了一种基于杂草分布和投影映射的轻量级 PAM-FOG 网。更重要的是,我们提出了一种新颖的模型压缩优化方法来适应我们的模型。与其他模型相比,PAM-FOG 网可在边缘设备支持的智能除草机器人上运行,并实现了更高的精度和帧率。我们有效地平衡了模型大小、性能和推理速度,使原始模型大小减少了近 50%,功耗降低了 26%,帧速率提高了 40%。这显示了我们的模型架构和优化方法的有效性,为深度学习在智慧农业领域的未来发展提供了参考。
{"title":"PAM-FOG Net: A Lightweight Weed Detection Model Deployed on Smart Weeding Robots","authors":"Jiahua Bao, Siyao Cheng, Jie Liu","doi":"10.1145/3641821","DOIUrl":"https://doi.org/10.1145/3641821","url":null,"abstract":"<p>Visual target detection based on deep learning with high computing power devices has been successful, but the performance in intelligent agriculture with edge devices has not been prominent. Specifically, the existing model architecture and optimization methods are not well-suited to low-power edge devices, the agricultural tasks such as weed detection require high accuracy, short inference latency, and low cost. Although there are automated tuning methods available, the search space is extremely large, using existing models for compression and optimization greatly wastes tuning resources. In this article, we propose a lightweight PAM-FOG net based on weed distribution and projection mapping. More significantly, we propose a novel model compression optimization method to fit our model. Compared with other models, PAM-FOG net runs on smart weeding robots supported by edge devices, and achieves superior accuracy and high frame rate. We effectively balance model size, performance and inference speed, reducing the original model size by nearly 50%, power consumption by 26%, and improving the frame rate by 40%. It shows the effectiveness of our model architecture and optimization method, which provides a reference for the future development of deep learning in intelligent agriculture.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"15 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139515383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1