首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
Implementation of Core Algorithms for Automated Mine Ventilation Network Diagram Generation 矿井通风网络图自动生成核心算法的实现
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-01-12 DOI: 10.1109/TNSE.2026.3651634
Jinyang Dong;Junqiao Li;Yucheng Li;Bolun Li;Yunan Cui;Zhitao Zhang;Wei Zhang;Jinzhe Liu
Ventilation network diagrams play a vital role in mine safety, enabling simulation, airflow control, and emergency planning. Traditional manual drawing methods are time-consuming, error-prone, and difficult to synchronize with evolving mine structures. To address this, we propose an automated framework that generates schematic ventilation diagrams from spatial models while preserving topological fidelity. The framework integrates a hierarchical node layering algorithm based on Hasse diagrams, a trunk–branch decomposition strategy for structural abstraction, and a deformation-based curve layout model inspired by water droplet geometry to enhance visual clarity and structural alignment. A 3D elevation inference module ensures semantic consistency across 2D diagrams, 3D models, and graph representations. The system further supports reactive multi-view synchronized editing, enabling coherent modifications across different representations while preserving user-defined constraints. Although developed and validated in mine ventilation, the framework is generally applicable to directed-graph–based industrial systems. Its generality is further demonstrated on a schematic exhaust pipeline case, where a tree structure rather than a network diagram provides a more suitable abstraction, highlighting that the method supports domain-adaptive abstraction guided by topological characteristics. This approach has been integrated into real-world mining operations through the “Ventilation Brain System,” offering a scalable solution for intelligent layout generation, adaptive design iteration, and responsive decision-making. By bridging spatial realism with schematic abstraction, the proposed method streamlines diagram construction and reinforces intelligent mine ventilation management.
通风网络图在矿井安全中具有重要的作用,可以进行模拟、气流控制和应急预案。传统的手工绘制方法耗时长、容易出错,且难以与不断变化的矿山结构同步。为了解决这个问题,我们提出了一个自动化框架,该框架可以从空间模型生成通风示意图,同时保持拓扑保真度。该框架集成了基于Hasse图的分层节点分层算法、用于结构抽象的干支分解策略和基于水滴几何启发的基于变形的曲线布局模型,以增强视觉清晰度和结构对齐性。3D高程推理模块确保了2D图、3D模型和图形表示之间的语义一致性。系统进一步支持响应式多视图同步编辑,在保留用户定义约束的同时,支持跨不同表示的一致修改。虽然该框架是在矿井通风中开发和验证的,但它一般适用于基于定向图的工业系统。该方法的通用性在一个示意图排气管道案例中得到进一步证明,其中树形结构而不是网络图提供了更合适的抽象,突出表明该方法支持由拓扑特征引导的领域自适应抽象。这种方法已经通过“通风大脑系统”集成到现实世界的采矿作业中,为智能布局生成、自适应设计迭代和响应式决策提供了可扩展的解决方案。该方法通过将空间真实感与原理抽象相结合,简化了图的绘制,加强了矿井通风管理的智能化。
{"title":"Implementation of Core Algorithms for Automated Mine Ventilation Network Diagram Generation","authors":"Jinyang Dong;Junqiao Li;Yucheng Li;Bolun Li;Yunan Cui;Zhitao Zhang;Wei Zhang;Jinzhe Liu","doi":"10.1109/TNSE.2026.3651634","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3651634","url":null,"abstract":"Ventilation network diagrams play a vital role in mine safety, enabling simulation, airflow control, and emergency planning. Traditional manual drawing methods are time-consuming, error-prone, and difficult to synchronize with evolving mine structures. To address this, we propose an automated framework that generates schematic ventilation diagrams from spatial models while preserving topological fidelity. The framework integrates a hierarchical node layering algorithm based on Hasse diagrams, a trunk–branch decomposition strategy for structural abstraction, and a deformation-based curve layout model inspired by water droplet geometry to enhance visual clarity and structural alignment. A 3D elevation inference module ensures semantic consistency across 2D diagrams, 3D models, and graph representations. The system further supports reactive multi-view synchronized editing, enabling coherent modifications across different representations while preserving user-defined constraints. Although developed and validated in mine ventilation, the framework is generally applicable to directed-graph–based industrial systems. Its generality is further demonstrated on a schematic exhaust pipeline case, where a tree structure rather than a network diagram provides a more suitable abstraction, highlighting that the method supports domain-adaptive abstraction guided by topological characteristics. This approach has been integrated into real-world mining operations through the “Ventilation Brain System,” offering a scalable solution for intelligent layout generation, adaptive design iteration, and responsive decision-making. By bridging spatial realism with schematic abstraction, the proposed method streamlines diagram construction and reinforces intelligent mine ventilation management.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6079-6105"},"PeriodicalIF":7.9,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Disconnection-Resistant Authenticated Diffie-Hellman Protocol in Wireless Weak-Link Sensor Networks 无线弱链路传感器网络中抗断开认证的Diffie-Hellman协议
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-01-12 DOI: 10.1109/TNSE.2026.3653104
Jia Zhang;Guanghua Liu;Chenlong Wang;Zhihao Liu;Tao Jiang
The application of wireless sensor networks (WSNs) in underground or underwater regions is becoming increasingly prevalent. This specific type of WSNs are referred to as wireless weak-link sensor networks(WWSNs), whose key distribution is identified as a prerequisite for ensuring network security. However, due to the fragile links of WWSNs, it is not feasible to directly transfer existing authenticated Diffie-Hellman (ADH) protocols from traditional WSNs to WWSNs. To address this challenge, we propose a disconnection-resistant authenticated Diffie-Hellman protocol (D-ADH) for key distribution in WWSNs. For mitigating the adverse impact of fragile links, we significantly reduce the number of node interactions in existing ADH protocols by having the sensor node use fixed negotiation public keys. Each sensor node only needs to receive the broadcast message of the base station on a single occasion to generate the session key. The results of simulation experiments and security analysis demonstrate that the proposed D-ADH protocol exhibits the lowest energy consumption, the longest network lifetime, the highest probability of successful key distribution and good network scalability compared to the state-of-the-art protocols, while maintaining an acceptable middle level security.
无线传感器网络(WSNs)在地下或水下区域的应用越来越普遍。这种特殊类型的wsn被称为无线弱链路传感器网络,其密钥分发被认为是确保网络安全的先决条件。但是,由于wsn的链路脆弱,将现有的ADH (Diffie-Hellman)协议从传统wsn直接传输到wsn是不可实现的。为了解决这一挑战,我们提出了一种用于WWSNs密钥分发的抗断开认证的Diffie-Hellman协议(D-ADH)。为了减轻脆弱链路的不利影响,我们通过让传感器节点使用固定的协商公钥,大大减少了现有ADH协议中节点交互的数量。每个传感器节点只需要接收一次基站的广播消息就可以生成会话密钥。仿真实验和安全性分析结果表明,与现有协议相比,所提出的D-ADH协议具有最低的能耗、最长的网络生命周期、最高的成功密钥分发概率和良好的网络可扩展性,同时保持了可接受的中级安全性。
{"title":"A Disconnection-Resistant Authenticated Diffie-Hellman Protocol in Wireless Weak-Link Sensor Networks","authors":"Jia Zhang;Guanghua Liu;Chenlong Wang;Zhihao Liu;Tao Jiang","doi":"10.1109/TNSE.2026.3653104","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3653104","url":null,"abstract":"The application of wireless sensor networks (WSNs) in underground or underwater regions is becoming increasingly prevalent. This specific type of WSNs are referred to as wireless weak-link sensor networks(WWSNs), whose key distribution is identified as a prerequisite for ensuring network security. However, due to the fragile links of WWSNs, it is not feasible to directly transfer existing authenticated Diffie-Hellman (ADH) protocols from traditional WSNs to WWSNs. To address this challenge, we propose a disconnection-resistant authenticated Diffie-Hellman protocol (D-ADH) for key distribution in WWSNs. For mitigating the adverse impact of fragile links, we significantly reduce the number of node interactions in existing ADH protocols by having the sensor node use fixed negotiation public keys. Each sensor node only needs to receive the broadcast message of the base station on a single occasion to generate the session key. The results of simulation experiments and security analysis demonstrate that the proposed D-ADH protocol exhibits the lowest energy consumption, the longest network lifetime, the highest probability of successful key distribution and good network scalability compared to the state-of-the-art protocols, while maintaining an acceptable middle level security.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6010-6026"},"PeriodicalIF":7.9,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft Information Fusion for Tracking Multiple Targets in NLoS Environments NLoS环境下多目标跟踪的软信息融合
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-01-05 DOI: 10.1109/TNSE.2026.3650814
Yuhan Wang;Yinuo Du;Jian Wang;Yuan Shen
An efficient approximation of the latent soft information (SI) is a key enabler for tracking multiple targets in time-varying non-line-of-sight (NLoS) environments. Such information can be approximated by associating numerous NLoS observations with the targets’ movement, a novel paradigm that transitions from the traditional “tracking after localization” approaches to a more comprehensive “tracking with localization” method. In particular, we establish the extended states (ETs) for targets to associate with their possible measurements in multipath scenarios. The joint distribution of ETs is regarded as an approximation of the latent SI at the sensor level. The information carried by ETs is then transferred to the target level for tracking using a variational message passing approach, and subsequently fed back to the sensor level to estimate the SI for future steps. We establish a factor graph depicting the propagation of information from multi-sensor measurements to multi-target states and vice versa. Numerical results including uncrewed aerial vehicles (UAVs) validate the superior performance of our proposed algorithm compared to alternative approaches.
潜在软信息(SI)的有效逼近是在时变非视距(NLoS)环境中跟踪多个目标的关键。这些信息可以通过将大量NLoS观测与目标运动相关联来近似获取,这是一种从传统的“定位后跟踪”方法过渡到更全面的“定位跟踪”方法的新范式。特别地,我们建立了目标的扩展状态(ETs),并将其与多路径场景下的可能测量相关联。ETs的联合分布被认为是传感器水平上潜在SI的近似。然后,利用变分信息传递方法将ETs携带的信息传递到目标层进行跟踪,并随后反馈到传感器层以估计未来步骤的SI。我们建立了一个因子图来描述信息从多传感器测量到多目标状态的传播,反之亦然。包括无人驾驶飞行器(uav)在内的数值结果验证了我们提出的算法与其他方法相比的优越性能。
{"title":"Soft Information Fusion for Tracking Multiple Targets in NLoS Environments","authors":"Yuhan Wang;Yinuo Du;Jian Wang;Yuan Shen","doi":"10.1109/TNSE.2026.3650814","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3650814","url":null,"abstract":"An efficient approximation of the latent soft information (SI) is a key enabler for tracking multiple targets in time-varying non-line-of-sight (NLoS) environments. Such information can be approximated by associating numerous NLoS observations with the targets’ movement, a novel paradigm that transitions from the traditional “tracking after localization” approaches to a more comprehensive “tracking with localization” method. In particular, we establish the extended states (ETs) for targets to associate with their possible measurements in multipath scenarios. The joint distribution of ETs is regarded as an approximation of the latent SI at the sensor level. The information carried by ETs is then transferred to the target level for tracking using a variational message passing approach, and subsequently fed back to the sensor level to estimate the SI for future steps. We establish a factor graph depicting the propagation of information from multi-sensor measurements to multi-target states and vice versa. Numerical results including uncrewed aerial vehicles (UAVs) validate the superior performance of our proposed algorithm compared to alternative approaches.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5663-5679"},"PeriodicalIF":7.9,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Profitable Energy-Efficient UPF and Application Placement and Routing in Dynamic 5G Edge 动态5G边缘的可盈利节能UPF和应用放置和路由
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-01-05 DOI: 10.1109/TNSE.2025.3650572
Endri Goshi;Ece Nur Şen;Hasanin Harkous;Shohreh Ahvar;Rastin Pries;Fidan Mehmeti;Wolfgang Kellerer
The development of 5G networks has enabled diverse applications with stringent communication and computation requirements. Ensuring timely operation for these applications requires proximity to compute and network resources, such as edge servers and User Plane Functions. With control over network resources and partial ownership of compute resources, Mobile Network Operators (MNOs) can assume a larger role in service orchestration within a multi-owner edge infrastructure. However, the increasing demand for edge applications often exceeds MNO capacity. To address this, some user requests can be offloaded to third-party cloud operators, expanding capacity but incurring costs and reducing profitability. Beyond profit, energy consumption is a key concern, particularly as we transition toward 6G. Addressing high energy consumption adds complexity to resource orchestration, as it directly conflicts with the goal of maximizing profit. Moreover, in dynamic edge environments, frequent service migrations increase orchestration overhead and can negatively impact user experience. Navigating these trade-offs requires an effective optimization approach. To this end, we formulate a multi-objective optimization problem for demand placement and routing, aiming to maximize MNO profit while minimizing energy consumption and migration overhead. Given its NP-hard nature, we propose a ranked greedy heuristic to effectively balance these objectives. Simulation results show that our approach outperforms benchmark algorithms in both static and dynamic scenarios, achieving near-optimal performance and deviating less than 7% from the optimal solution.
5G网络的发展使各种应用成为可能,对通信和计算的要求也很严格。确保这些应用程序的及时运行需要靠近计算和网络资源,如边缘服务器和用户平面功能。通过对网络资源的控制和对计算资源的部分所有权,移动网络运营商(mno)可以在多所有者边缘基础设施的服务编排中承担更大的角色。然而,对边缘应用不断增长的需求往往超过了MNO的容量。为了解决这个问题,可以将一些用户请求转移给第三方云运营商,这样可以扩大容量,但会产生成本并降低盈利能力。除了利润,能源消耗也是一个关键问题,尤其是在我们向6G过渡的过程中。处理高能耗增加了资源编排的复杂性,因为它直接与利润最大化的目标相冲突。此外,在动态边缘环境中,频繁的服务迁移会增加编排开销,并可能对用户体验产生负面影响。驾驭这些权衡需要一种有效的优化方法。为此,我们制定了一个需求放置和路由的多目标优化问题,以最大化MNO利润,同时最小化能耗和迁移开销。鉴于其NP-hard性质,我们提出了一个排名贪婪启发式来有效地平衡这些目标。仿真结果表明,我们的方法在静态和动态场景下都优于基准算法,实现了接近最优的性能,与最优解的偏差小于7%。
{"title":"Profitable Energy-Efficient UPF and Application Placement and Routing in Dynamic 5G Edge","authors":"Endri Goshi;Ece Nur Şen;Hasanin Harkous;Shohreh Ahvar;Rastin Pries;Fidan Mehmeti;Wolfgang Kellerer","doi":"10.1109/TNSE.2025.3650572","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3650572","url":null,"abstract":"The development of 5G networks has enabled diverse applications with stringent communication and computation requirements. Ensuring timely operation for these applications requires proximity to compute and network resources, such as edge servers and User Plane Functions. With control over network resources and partial ownership of compute resources, Mobile Network Operators (MNOs) can assume a larger role in service orchestration within a multi-owner edge infrastructure. However, the increasing demand for edge applications often exceeds MNO capacity. To address this, some user requests can be offloaded to third-party cloud operators, expanding capacity but incurring costs and reducing profitability. Beyond profit, energy consumption is a key concern, particularly as we transition toward 6G. Addressing high energy consumption adds complexity to resource orchestration, as it directly conflicts with the goal of maximizing profit. Moreover, in dynamic edge environments, frequent service migrations increase orchestration overhead and can negatively impact user experience. Navigating these trade-offs requires an effective optimization approach. To this end, we formulate a multi-objective optimization problem for demand placement and routing, aiming to maximize MNO profit while minimizing energy consumption and migration overhead. Given its NP-hard nature, we propose a ranked greedy heuristic to effectively balance these objectives. Simulation results show that our approach outperforms benchmark algorithms in both static and dynamic scenarios, achieving near-optimal performance and deviating less than 7% from the optimal solution.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5698-5720"},"PeriodicalIF":7.9,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11328872","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Modal Generative Semantic Communications Powered by Semantic Knowledge Base 基于语义知识库的跨模态生成语义通信
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-01-01 DOI: 10.1109/TNSE.2025.3650269
Zechuan Fang;Mengying Sun;Sen Wang;Xiaodong Xu;Haixiao Gao;Jinghong Huang;Shujun Han;Ping Zhang
The rapid advancement of generative artificial intelligence (GAI) has opened new avenues for semantic communication (SemCom). In this paper, we propose CG-SemCom, a unified cross-modal generative semantic communication framework powered by shared semantic knowledge bases (SKBs). CG-SemCom leverages GAI technologies as semantic extractor at the transmitter and generative reconstructor at the receiver, enabling flexible and interpretable cross-modal transmission. We further develop VCG-SemCom, a visual transmission-oriented implementation of CG-SemCom. Specifically, the transmitter employs a vision-language large model (vLLM) to extract concise semantic information in the form of visual difference description, which is transmitted via the joint source-channel coding (JSCC). At the receiver, the diffusion model (DM)-based generative reconstructor synthesizes the target image. The knowledge retrieval mechanism tailored for shared SKBs is introduced to guide semantic extraction and ensure consistency. Additionally, a deep reinforcement learning (DRL)-driven inference agent is proposed to dynamically optimize the generation process at the receiver. To address semantic noise caused by knowledge misalignment and module mismatch, a dual-level error detection and retransmission mechanism is introduced. Moreover, we propose a novel generation similarity metric to evaluate reconstruction quality without requiring access to the original image. Extensive experiments demonstrate that the proposed VCG-SemCom achieves superior information transfer efficiency compared to SemCom benchmark schemes with up to 6% improvement in semantic fidelity and over 4 times reduction in bandwidth consumption.
生成式人工智能(GAI)的快速发展为语义通信(SemCom)开辟了新的途径。本文提出了一种基于共享语义知识库(skb)的统一跨模态生成语义通信框架CG-SemCom。CG-SemCom利用GAI技术作为发射器的语义提取器和接收器的生成重构器,实现灵活和可解释的跨模态传输。我们进一步开发了CG-SemCom,一种面向视觉传输的CG-SemCom实现。具体来说,发射器采用视觉语言大模型(vLLM)提取简洁的语义信息,以视觉差异描述的形式进行表达,并通过联合信源信道编码(JSCC)进行传输。在接收端,基于扩散模型(DM)的生成重建器对目标图像进行综合。引入了为共享skb量身定制的知识检索机制,以指导语义提取并确保一致性。此外,提出了一个深度强化学习(DRL)驱动的推理代理来动态优化接收端的生成过程。为了解决知识不匹配和模块不匹配引起的语义噪声,引入了双级错误检测和重传机制。此外,我们提出了一种新的生成相似度度量来评估重建质量,而不需要访问原始图像。大量实验表明,与SemCom基准方案相比,VCG-SemCom实现了更高的信息传输效率,语义保真度提高了6%,带宽消耗降低了4倍以上。
{"title":"Cross-Modal Generative Semantic Communications Powered by Semantic Knowledge Base","authors":"Zechuan Fang;Mengying Sun;Sen Wang;Xiaodong Xu;Haixiao Gao;Jinghong Huang;Shujun Han;Ping Zhang","doi":"10.1109/TNSE.2025.3650269","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3650269","url":null,"abstract":"The rapid advancement of generative artificial intelligence (GAI) has opened new avenues for semantic communication (SemCom). In this paper, we propose CG-SemCom, a unified cross-modal generative semantic communication framework powered by shared semantic knowledge bases (SKBs). CG-SemCom leverages GAI technologies as semantic extractor at the transmitter and generative reconstructor at the receiver, enabling flexible and interpretable cross-modal transmission. We further develop VCG-SemCom, a visual transmission-oriented implementation of CG-SemCom. Specifically, the transmitter employs a vision-language large model (vLLM) to extract concise semantic information in the form of visual difference description, which is transmitted via the joint source-channel coding (JSCC). At the receiver, the diffusion model (DM)-based generative reconstructor synthesizes the target image. The knowledge retrieval mechanism tailored for shared SKBs is introduced to guide semantic extraction and ensure consistency. Additionally, a deep reinforcement learning (DRL)-driven inference agent is proposed to dynamically optimize the generation process at the receiver. To address semantic noise caused by knowledge misalignment and module mismatch, a dual-level error detection and retransmission mechanism is introduced. Moreover, we propose a novel generation similarity metric to evaluate reconstruction quality without requiring access to the original image. Extensive experiments demonstrate that the proposed VCG-SemCom achieves superior information transfer efficiency compared to SemCom benchmark schemes with up to 6% improvement in semantic fidelity and over 4 times reduction in bandwidth consumption.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5568-5585"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Authentication and Granularized Authorization With a Cross-Domain Zero Trust Architecture in Large-Scale IoT Networks 大规模物联网网络中跨域零信任架构的动态认证和粒度化授权
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-01-01 DOI: 10.1109/TNSE.2025.3650377
Xiaoyu Ma;Fang Fang;Tianlong Liu;Xianbin Wang
With the increasing number of connected devices and complex networks involved, current domain-specific authentication mechanisms become inadequate for the dynamic access demands of large-scale Internet of Things (IoT) systems. Cross-domain authentication and authorization could enhance device interoperability across different security domains. However, they face new challenges including increased authentication latency, non-transferable trust, and excessive authorization computational overhead. To address these issues, in this paper, we propose Dynamic Authentication and Granularized Authorization (DAGA), a cross-domain Zero Trust Architecture (ZTA)-based framework that enables efficient, adaptive, and scalable authentication and authorization for large-scale IoT systems. Rather than relying on full authentication for every request, DAGA introduces a cross-domain pre-authentication phase that estimates device trustworthiness in advance. Specifically, DAGA leverages Federated Learning (FL) and Long Short-Term Memory (LSTM)-based dynamic trust management to minimize unnecessary trust score computations, thereby accelerating cross-domain pre-authentication. At the same time, DAGA employs multi-level and cached fast authorization to achieve adaptive granularized access control, enhancing the accuracy and efficiency. Experimental results demonstrate that DAGA achieves notable reductions in communication and computation overhead compared to ZTA, blockchain-based, and lightweight mechanisms, significantly reducing authentication latency. Despite its efficiency gains, DAGA achieves a superior accuracy–latency trade-off over other baseline approaches, effectively balancing security and efficiency through adaptive optimization.
随着连接设备数量的增加和网络的复杂,现有的特定领域认证机制已经无法满足大规模物联网系统的动态访问需求。跨域认证和授权可以增强设备跨不同安全域的互操作性。然而,它们面临着新的挑战,包括增加的身份验证延迟、不可转移的信任和过多的授权计算开销。为了解决这些问题,在本文中,我们提出了动态认证和颗粒化授权(DAGA),这是一个基于跨域零信任架构(ZTA)的框架,可为大规模物联网系统实现高效、自适应和可扩展的认证和授权。与对每个请求依赖完整的身份验证不同,DAGA引入了一个跨域预身份验证阶段,可以提前估计设备的可信度。具体来说,DAGA利用基于联邦学习(FL)和长短期记忆(LSTM)的动态信任管理来最大限度地减少不必要的信任分数计算,从而加速跨域预认证。同时,DAGA采用多级缓存快速授权,实现自适应粒度化访问控制,提高了访问控制的准确性和效率。实验结果表明,与ZTA、基于区块链的轻量级机制相比,DAGA显著降低了通信和计算开销,显著降低了身份验证延迟。尽管效率有所提高,但与其他基准方法相比,DAGA实现了更高的准确性和延迟权衡,通过自适应优化有效地平衡了安全性和效率。
{"title":"Dynamic Authentication and Granularized Authorization With a Cross-Domain Zero Trust Architecture in Large-Scale IoT Networks","authors":"Xiaoyu Ma;Fang Fang;Tianlong Liu;Xianbin Wang","doi":"10.1109/TNSE.2025.3650377","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3650377","url":null,"abstract":"With the increasing number of connected devices and complex networks involved, current domain-specific authentication mechanisms become inadequate for the dynamic access demands of large-scale Internet of Things (IoT) systems. Cross-domain authentication and authorization could enhance device interoperability across different security domains. However, they face new challenges including increased authentication latency, non-transferable trust, and excessive authorization computational overhead. To address these issues, in this paper, we propose Dynamic Authentication and Granularized Authorization (DAGA), a cross-domain Zero Trust Architecture (ZTA)-based framework that enables efficient, adaptive, and scalable authentication and authorization for large-scale IoT systems. Rather than relying on full authentication for every request, DAGA introduces a cross-domain pre-authentication phase that estimates device trustworthiness in advance. Specifically, DAGA leverages Federated Learning (FL) and Long Short-Term Memory (LSTM)-based dynamic trust management to minimize unnecessary trust score computations, thereby accelerating cross-domain pre-authentication. At the same time, DAGA employs multi-level and cached fast authorization to achieve adaptive granularized access control, enhancing the accuracy and efficiency. Experimental results demonstrate that DAGA achieves notable reductions in communication and computation overhead compared to ZTA, blockchain-based, and lightweight mechanisms, significantly reducing authentication latency. Despite its efficiency gains, DAGA achieves a superior accuracy–latency trade-off over other baseline approaches, effectively balancing security and efficiency through adaptive optimization.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5888-5904"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Software-Defined Perimeter Placement for Dynamic User Distributions in Zero-Trust Networks 零信任网络中动态用户分布的自适应软件定义周界布局
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-31 DOI: 10.1109/TNSE.2025.3649680
Xuanbo Huang;Kaiping Xue;Lutong Chen;Zixu Huang;Jiangping Han;Jian Li;Ruidong Li
Zero Trust Network (ZTN) has become a widely adopted security architecture in enterprise and campus networks. A typical implementation involves Software-Defined Perimeter (SDP), which deploys proxy-based gateways to mediate user-service communication and block unauthorized access. However, existing deployment approaches rely on empirical placement and static user binding, overlooking user mobility and dynamic traffic patterns. This limitation can lead to suboptimal connection paths, increased delays, and potential performance bottlenecks. This paper presents the first formulation of the SDP gateway placement problem under user mobility. We model this challenge as a multiobjective optimization problem that jointly minimizes user-server connection delay and balances load across gateways. To address it, we propose a two-stage solution comprising offline deployment and online adaptation. The offline stage introduces PathHeatMap-guided SDP embedding, which aggregates user-server flow paths into a heatmap to identify convergence hotspots and guide SDP placement at high-impact nodes. The online stage integrates mobility tracking and deferred SDP rebinding, which dynamically responds to user mobility by temporarily assigning displaced users to nearby gateways and triggering global reassignment only when necessary. Extensive simulations demonstrate that our method attains near-Pareto-front delay and load-balance trade-offs while running orders of magnitude faster than heavy solvers (MILP, Convex, NSGA-II).
零信任网络(Zero Trust Network, ZTN)已经成为企业和校园网中广泛采用的安全架构。典型的实现涉及软件定义周界(SDP),它部署基于代理的网关来协调用户服务通信并阻止未经授权的访问。然而,现有的部署方法依赖于经验放置和静态用户绑定,忽略了用户移动性和动态流量模式。这种限制可能导致次优连接路径、延迟增加和潜在的性能瓶颈。本文提出了用户移动性下的SDP网关放置问题的第一个公式。我们将此挑战建模为一个多目标优化问题,该问题共同最小化用户-服务器连接延迟并平衡网关之间的负载。为了解决这个问题,我们提出了一个两阶段的解决方案,包括离线部署和在线适应。离线阶段引入了pathheatmap引导的SDP嵌入,它将用户-服务器流路径聚合到热图中,以识别融合热点,并指导SDP在高影响节点上的放置。在线阶段集成了移动性跟踪和延迟SDP重新绑定,通过临时将迁移的用户分配到附近的网关,并在必要时触发全局重新分配,动态响应用户的移动性。大量的模拟表明,我们的方法在运行速度比重型求解器(MILP, Convex, NSGA-II)快几个数量级的同时,实现了近帕累托前延迟和负载平衡权衡。
{"title":"Adaptive Software-Defined Perimeter Placement for Dynamic User Distributions in Zero-Trust Networks","authors":"Xuanbo Huang;Kaiping Xue;Lutong Chen;Zixu Huang;Jiangping Han;Jian Li;Ruidong Li","doi":"10.1109/TNSE.2025.3649680","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3649680","url":null,"abstract":"Zero Trust Network (ZTN) has become a widely adopted security architecture in enterprise and campus networks. A typical implementation involves Software-Defined Perimeter (SDP), which deploys proxy-based gateways to mediate user-service communication and block unauthorized access. However, existing deployment approaches rely on empirical placement and static user binding, overlooking user mobility and dynamic traffic patterns. This limitation can lead to suboptimal connection paths, increased delays, and potential performance bottlenecks. This paper presents the first formulation of the SDP gateway placement problem under user mobility. We model this challenge as a multiobjective optimization problem that jointly minimizes user-server connection delay and balances load across gateways. To address it, we propose a two-stage solution comprising offline deployment and online adaptation. The offline stage introduces <italic>PathHeatMap-guided SDP embedding</i>, which aggregates user-server flow paths into a heatmap to identify convergence hotspots and guide SDP placement at high-impact nodes. The online stage integrates <italic>mobility tracking</i> and <italic>deferred SDP rebinding</i>, which dynamically responds to user mobility by temporarily assigning displaced users to nearby gateways and triggering global reassignment only when necessary. Extensive simulations demonstrate that our method attains near-Pareto-front delay and load-balance trade-offs while running orders of magnitude faster than heavy solvers (MILP, Convex, NSGA-II).","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5505-5521"},"PeriodicalIF":7.9,"publicationDate":"2025-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary Dynamics of Pairwise and Group Cooperation in Heterogeneous Social Networks 异质社会网络中成对和群体合作的进化动力学
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-30 DOI: 10.1109/TNSE.2025.3647918
Dini Wang;Peng Yi;Gang Yan;Feng Fu
Understanding how cooperation evolves in structured populations remains a fundamental question across diverse disciplines. The problem of cooperation typically involves pairwise or group interactions among individuals. While prior studies have extensively investigated the role of networks in shaping cooperative dynamics, the influence of tie or connection strengths between individuals has not been fully understood. Here, we introduce a quenched mean-field based framework for analyzing both pairwise and group dilemmas on any weighted network, providing interpretable conditions required for favoring cooperation. Our theoretical advances further motivate us to find that the degree-inverse weighted social ties – reinforcing tie strengths between peripheral nodes while weakening those between hubs – robustly promote cooperation in both pairwise and group dilemmas. Importantly, this configuration enables heterogeneous networks to outperform homogeneous ones in fixation of cooperation, thereby adding to the conventional view that degree heterogeneity inhibits cooperative behavior under the local stochastic strategy update. We further test the generality of degree-inverse weighted social ties in promoting cooperation on $30, 000$ random networks and 13 empirical networks drawn from real-world systems. Finally, we unveil the underlying mechanism by examining the formation and evolution of cooperative ties under social ties with degree-inverse weights. Our systematic analyses provide new insights into how the network adjustment of tie strengths can effectively steer structured populations toward cooperative outcomes in biological and social systems.
理解合作是如何在结构化群体中进化的,仍然是一个跨多个学科的基本问题。合作问题通常涉及个体之间的成对或群体互动。虽然先前的研究广泛地调查了网络在塑造合作动力中的作用,但个体之间的联系或连接强度的影响尚未得到充分理解。在这里,我们引入了一个基于淬灭平均场的框架来分析任意加权网络上的两两困境和群体困境,提供有利于合作所需的可解释条件。我们的理论进展进一步促使我们发现,度逆加权的社会联系——增强外围节点之间的联系强度,削弱中心节点之间的联系强度——在配对和群体困境中都有力地促进了合作。重要的是,这种配置使得异构网络在合作固定方面优于同质网络,从而增加了在局部随机策略更新下程度异质性抑制合作行为的传统观点。我们在$ 30,000 $随机网络和13个来自现实世界系统的经验网络上进一步测试了度逆加权社会关系在促进合作方面的普遍性。最后,我们通过考察度逆权重社会关系下合作关系的形成和演化,揭示了其潜在机制。我们的系统分析为联系强度的网络调整如何有效地引导结构化人群走向生物和社会系统中的合作结果提供了新的见解。
{"title":"Evolutionary Dynamics of Pairwise and Group Cooperation in Heterogeneous Social Networks","authors":"Dini Wang;Peng Yi;Gang Yan;Feng Fu","doi":"10.1109/TNSE.2025.3647918","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3647918","url":null,"abstract":"Understanding how cooperation evolves in structured populations remains a fundamental question across diverse disciplines. The problem of cooperation typically involves pairwise or group interactions among individuals. While prior studies have extensively investigated the role of networks in shaping cooperative dynamics, the influence of tie or connection strengths between individuals has not been fully understood. Here, we introduce a quenched mean-field based framework for analyzing both pairwise and group dilemmas on any weighted network, providing interpretable conditions required for favoring cooperation. Our theoretical advances further motivate us to find that the degree-inverse weighted social ties – reinforcing tie strengths between peripheral nodes while weakening those between hubs – robustly promote cooperation in both pairwise and group dilemmas. Importantly, this configuration enables heterogeneous networks to outperform homogeneous ones in fixation of cooperation, thereby adding to the conventional view that degree heterogeneity inhibits cooperative behavior under the local stochastic strategy update. We further test the generality of degree-inverse weighted social ties in promoting cooperation on <inline-formula><tex-math>$30, 000$</tex-math></inline-formula> random networks and 13 empirical networks drawn from real-world systems. Finally, we unveil the underlying mechanism by examining the formation and evolution of cooperative ties under social ties with degree-inverse weights. Our systematic analyses provide new insights into how the network adjustment of tie strengths can effectively steer structured populations toward cooperative outcomes in biological and social systems.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5074-5091"},"PeriodicalIF":7.9,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Edge-Aware Graph Learning Methods 边缘感知图学习方法综述
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-30 DOI: 10.1109/TNSE.2025.3649386
Wagner A. Junior;Fábio Ramos;Alex B. Vieira;José Augusto M. Nacif;Ricardo S. Ferreira
Graph Neural Networks (GNNs) have gained popularity as an efficient choice for learning on graph-structured data. However, most methods are node or graph-centered, often overlooking valuable information that can be encoded in edge features and relations. In this survey, we present a comprehensive review and a novel taxonomy of Edge-Aware Graph Learning Methods, i.e., models that explicitly leverage edge information in the learning process. We trace the evolution of these methods from classical approaches through random walks to modern GNN architectures, including the emerging paradigm of Edge-Aware Graph Transformers. Through a comparative analysis, we demonstrate the consistent performance gains of these models over traditional node-centric approaches across a wide range of real-world applications and benchmarks. However, many challenges arise in this field. As such, we provide an explicit discussion of key limitations, particularly the scalability issues and computational overhead associated with many current architectures. Finally, by synthesizing the state-of-the-art and identifying open problems, this survey provides a clear roadmap to guide future research toward developing more efficient, scalable, and robust edge-aware models.
图神经网络作为一种学习图结构数据的有效选择而得到了广泛的应用。然而,大多数方法都是以节点或图为中心的,往往忽略了可以在边缘特征和关系中编码的有价值的信息。在本研究中,我们对边缘感知图学习方法进行了全面的回顾和新的分类,即在学习过程中明确利用边缘信息的模型。我们追溯了这些方法的演变,从经典方法到随机漫步,再到现代GNN架构,包括新兴的边缘感知图转换器范例。通过比较分析,我们在广泛的实际应用程序和基准测试中展示了这些模型相对于传统的以节点为中心的方法的一致性能增益。然而,这一领域出现了许多挑战。因此,我们提供了对关键限制的明确讨论,特别是与许多当前体系结构相关的可伸缩性问题和计算开销。最后,通过综合最先进的技术和识别开放的问题,本调查提供了一个清晰的路线图,指导未来的研究朝着开发更高效、可扩展和健壮的边缘感知模型的方向发展。
{"title":"A Survey on Edge-Aware Graph Learning Methods","authors":"Wagner A. Junior;Fábio Ramos;Alex B. Vieira;José Augusto M. Nacif;Ricardo S. Ferreira","doi":"10.1109/TNSE.2025.3649386","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3649386","url":null,"abstract":"Graph Neural Networks (GNNs) have gained popularity as an efficient choice for learning on graph-structured data. However, most methods are node or graph-centered, often overlooking valuable information that can be encoded in edge features and relations. In this survey, we present a comprehensive review and a novel taxonomy of Edge-Aware Graph Learning Methods, i.e., models that explicitly leverage edge information in the learning process. We trace the evolution of these methods from classical approaches through random walks to modern GNN architectures, including the emerging paradigm of Edge-Aware Graph Transformers. Through a comparative analysis, we demonstrate the consistent performance gains of these models over traditional node-centric approaches across a wide range of real-world applications and benchmarks. However, many challenges arise in this field. As such, we provide an explicit discussion of key limitations, particularly the scalability issues and computational overhead associated with many current architectures. Finally, by synthesizing the state-of-the-art and identifying open problems, this survey provides a clear roadmap to guide future research toward developing more efficient, scalable, and robust edge-aware models.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5680-5697"},"PeriodicalIF":7.9,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11319233","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of Sensing, Communication, and Computation for Cooperative Spectrum Sensing 协同频谱感知的感知、通信和计算联合优化
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-30 DOI: 10.1109/TNSE.2025.3649240
Xuesong Liu;Junkang Ge;Xiaoqian Li;Yansong Liu;Haoyu Tang;Gang Feng
Cooperative spectrum sensing (CSS) is a technique that exploits spatial diversity to enhance spectrum detection in cognitive radio (CR) networks. It involves multiple cognitive users to collaboratively sense spectrum bands and report their raw sensed data or local detection results to a fusion center to make spectrum allocation decisions for CR. The performance of CSS is often degraded by the non-stationarity of the wireless channels and limited computation and communication resources in the CR network. To address these challenges, we propose a novel joint optimization framework tailored for multidimensional resource-constrained CR networks in this paper, by simultaneously determining the user selection, the sensing-transmission-computation duration, and the allocation of communication and computation resources involved in the system, with the aim of maximizing the spectrum sensing performance under strict resource constraints. The proposed framework first derives a closed-form solution for optimal sensing-transmission-computation duration and then develops an efficient iterative algorithm for joint user selection and resource allocation. Simulation results show that the proposed framework significantly outperforms existing solutions without jointly considering the sensing, transmission, and computation processes and/or multidimensional resource limitations.
协同频谱感知(CSS)是一种利用空间分异增强认知无线电(CR)网络频谱检测的技术。它涉及多个认知用户协同感知频谱带,并将其原始感知数据或本地检测结果报告给融合中心,以便为CR进行频谱分配决策。由于无线信道的非平稳性以及CR网络中有限的计算和通信资源,CSS的性能经常受到影响。为了解决这些问题,本文提出了一种针对多维资源约束的CR网络的联合优化框架,通过同时确定用户选择、感知-传输-计算持续时间以及系统中涉及的通信和计算资源的分配,以在严格的资源约束下最大化频谱感知性能。该框架首先推导出最优感知-传输-计算时间的封闭解,然后开发出一种高效的联合用户选择和资源分配迭代算法。仿真结果表明,该框架在不考虑感知、传输和计算过程以及/或多维资源限制的情况下,显著优于现有的解决方案。
{"title":"Joint Optimization of Sensing, Communication, and Computation for Cooperative Spectrum Sensing","authors":"Xuesong Liu;Junkang Ge;Xiaoqian Li;Yansong Liu;Haoyu Tang;Gang Feng","doi":"10.1109/TNSE.2025.3649240","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3649240","url":null,"abstract":"Cooperative spectrum sensing (CSS) is a technique that exploits spatial diversity to enhance spectrum detection in cognitive radio (CR) networks. It involves multiple cognitive users to collaboratively sense spectrum bands and report their raw sensed data or local detection results to a fusion center to make spectrum allocation decisions for CR. The performance of CSS is often degraded by the non-stationarity of the wireless channels and limited computation and communication resources in the CR network. To address these challenges, we propose a novel joint optimization framework tailored for multidimensional resource-constrained CR networks in this paper, by simultaneously determining the user selection, the sensing-transmission-computation duration, and the allocation of communication and computation resources involved in the system, with the aim of maximizing the spectrum sensing performance under strict resource constraints. The proposed framework first derives a closed-form solution for optimal sensing-transmission-computation duration and then develops an efficient iterative algorithm for joint user selection and resource allocation. Simulation results show that the proposed framework significantly outperforms existing solutions without jointly considering the sensing, transmission, and computation processes and/or multidimensional resource limitations.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5453-5470"},"PeriodicalIF":7.9,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1