首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
A Novel UAV-Assisted VANET Routing Protocol for Post-Disaster Emergency Communications 一种用于灾后应急通信的新型无人机辅助VANET路由协议
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-15 DOI: 10.1109/TNSE.2025.3644432
Zhijie Fan;Mansi Zhang;Yue Cao;Zilong Liu;Omprakash Kaiwartya;Yasir Javed;Faisal Bashir Hussain
After natural disasters, such as earthquakes or tsunamis, terrestrial communication networks often become inoperative due to infrastructure collapse. Simultaneously, damage to roads and transportation systems inevitably isolates different parts of the affected area, making it challenging for emergency vehicles to reach critical locations and deploy mobile Base Stations (BSs). In such scenarios, UnmannedAerial Vehicles (UAVs) serve as a flexible and efficient solution. With the capability to establish temporary communication links, UAVs can provide emergency coverage for ground entities. In this paper, we propose a Dynamic Priority-based UAV-assisted Vehicular Ad-hoc Network (VANET) Routing (DPUVR) protocol for post-disaster message transmission. Specifically, DPUVR is a trajectory-based method for controlling the direction of message forwarding. DPUVR utilizes a multi-attribute decision-making method to adaptively evaluate the message delivery capability of candidate nodes (in this paper, nodes refer to both UAVs and vehicles), taking into account trajectory similarity, surplus energy, link survival time, remaining distance cost and queuing delay. In addition, we propose a dynamic prioritization delivery model. It evaluates the priority of messages in node buffers, selects appropriate candidate nodes and then chooses the best relay for message forwarding to trigger timely and efficient message delivery. Extensive simulation results show that DPUVR significantly outperforms other baseline methods in terms of delivery ratio, overhead, average delivery latency and average buffering time.
在地震或海啸等自然灾害发生后,由于基础设施崩溃,地面通信网络往往无法运行。同时,道路和运输系统的破坏不可避免地将受影响地区的不同部分隔离开来,使应急车辆难以到达关键地点并部署移动基站(BSs)。在这种情况下,无人驾驶飞行器(uav)是一种灵活高效的解决方案。凭借建立临时通信链路的能力,无人机可以为地面实体提供紧急覆盖。本文提出了一种基于动态优先级的无人机辅助车载自组织网络(VANET)路由(DPUVR)协议,用于灾后信息传输。具体来说,DPUVR是一种基于轨迹的消息转发方向控制方法。DPUVR采用多属性决策方法,综合考虑轨迹相似度、剩余能量、链路生存时间、剩余距离成本和排队延迟等因素,自适应评估候选节点(本文节点既指无人机也指车辆)的消息传递能力。此外,我们提出了一个动态优先级交付模型。它评估节点缓冲区中消息的优先级,选择合适的候选节点,然后选择最佳中继进行消息转发,从而触发及时有效的消息传递。大量的仿真结果表明,DPUVR在交付率、开销、平均交付延迟和平均缓冲时间等方面明显优于其他基准方法。
{"title":"A Novel UAV-Assisted VANET Routing Protocol for Post-Disaster Emergency Communications","authors":"Zhijie Fan;Mansi Zhang;Yue Cao;Zilong Liu;Omprakash Kaiwartya;Yasir Javed;Faisal Bashir Hussain","doi":"10.1109/TNSE.2025.3644432","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3644432","url":null,"abstract":"After natural disasters, such as earthquakes or tsunamis, terrestrial communication networks often become inoperative due to infrastructure collapse. Simultaneously, damage to roads and transportation systems inevitably isolates different parts of the affected area, making it challenging for emergency vehicles to reach critical locations and deploy mobile Base Stations (BSs). In such scenarios, UnmannedAerial Vehicles (UAVs) serve as a flexible and efficient solution. With the capability to establish temporary communication links, UAVs can provide emergency coverage for ground entities. In this paper, we propose a Dynamic Priority-based UAV-assisted Vehicular Ad-hoc Network (VANET) Routing (DPUVR) protocol for post-disaster message transmission. Specifically, DPUVR is a trajectory-based method for controlling the direction of message forwarding. DPUVR utilizes a multi-attribute decision-making method to adaptively evaluate the message delivery capability of candidate nodes (in this paper, nodes refer to both UAVs and vehicles), taking into account trajectory similarity, surplus energy, link survival time, remaining distance cost and queuing delay. In addition, we propose a dynamic prioritization delivery model. It evaluates the priority of messages in node buffers, selects appropriate candidate nodes and then chooses the best relay for message forwarding to trigger timely and efficient message delivery. Extensive simulation results show that DPUVR significantly outperforms other baseline methods in terms of delivery ratio, overhead, average delivery latency and average buffering time.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4863-4882"},"PeriodicalIF":7.9,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145886540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Privacy-Based Adaptive Sparse Federated Learning in UAV Networks 基于差分隐私的无人机网络自适应稀疏联邦学习
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-15 DOI: 10.1109/TNSE.2025.3644438
Ziqi Chen;Jun Du;Chunxiao Jiang;Xiangwang Hou;Zhu Han;H. Vincent Poor
With the rapid development of the low-altitude economy, privacy protection has become a significant challenge in the unmanned aerial vehicles (UAV) networks. Federated learning (FL) provides a concrete framework for addressing privacy concerns in the low-altitude networks by enabling training without exposing raw data. However, there remains a risk of data leakage during aggregation of parameter updates from local models in the FL framework. Existing approaches have introduced differential privacy (DP) to mitigate this issue, but adding DP noise can degrade the performance of the training process. To further enhance the efficiency and accuracy of model training, we propose a novel framework based on DP and adaptive sparsity for FL, named DP-FedAS. On the one hand, this framework reduces communication and training overhead through an adaptive sparsity module. On the other hand, it mitigates privacy errors caused by DP noise by reducing the noise introduced during global aggregation via sparsity, thereby alleviating the performance degradation. Furthermore, we provide detailed theoretical proofs for the convergence of the proposed algorithm and the privacy guarantees it offers. Simulation results validate that DP-FedAS improves global model accuracy by 20%, and reduces communication cost by 23%, while maintaining a robust level of privacy protection. The proposed framework strikes an optimal balance among communication efficiency, privacy preservation, and model performance.
随着低空经济的快速发展,隐私保护已成为无人机网络面临的重大挑战。联邦学习(FL)通过在不暴露原始数据的情况下进行训练,为解决低空网络中的隐私问题提供了一个具体框架。然而,在FL框架中聚合来自局部模型的参数更新时,仍然存在数据泄漏的风险。现有的方法已经引入了差分隐私(DP)来缓解这个问题,但是添加DP噪声会降低训练过程的性能。为了进一步提高模型训练的效率和准确性,我们提出了一种新的基于DP和自适应稀疏度的模型训练框架,称为DP- fedas。一方面,该框架通过自适应稀疏性模块减少了通信和训练开销。另一方面,它通过稀疏性降低全局聚合过程中引入的噪声,从而减轻了由DP噪声引起的隐私错误,从而减轻了性能下降。此外,我们还提供了详细的理论证明,证明了所提出算法的收敛性及其提供的隐私保证。仿真结果表明,DP-FedAS在保持稳健的隐私保护水平的同时,将全局模型精度提高了20%,将通信成本降低了23%。该框架在通信效率、隐私保护和模型性能之间取得了最佳平衡。
{"title":"Differential Privacy-Based Adaptive Sparse Federated Learning in UAV Networks","authors":"Ziqi Chen;Jun Du;Chunxiao Jiang;Xiangwang Hou;Zhu Han;H. Vincent Poor","doi":"10.1109/TNSE.2025.3644438","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3644438","url":null,"abstract":"With the rapid development of the low-altitude economy, privacy protection has become a significant challenge in the unmanned aerial vehicles (UAV) networks. Federated learning (FL) provides a concrete framework for addressing privacy concerns in the low-altitude networks by enabling training without exposing raw data. However, there remains a risk of data leakage during aggregation of parameter updates from local models in the FL framework. Existing approaches have introduced differential privacy (DP) to mitigate this issue, but adding DP noise can degrade the performance of the training process. To further enhance the efficiency and accuracy of model training, we propose a novel framework based on DP and adaptive sparsity for FL, named DP-FedAS. On the one hand, this framework reduces communication and training overhead through an adaptive sparsity module. On the other hand, it mitigates privacy errors caused by DP noise by reducing the noise introduced during global aggregation via sparsity, thereby alleviating the performance degradation. Furthermore, we provide detailed theoretical proofs for the convergence of the proposed algorithm and the privacy guarantees it offers. Simulation results validate that DP-FedAS improves global model accuracy by 20%, and reduces communication cost by 23%, while maintaining a robust level of privacy protection. The proposed framework strikes an optimal balance among communication efficiency, privacy preservation, and model performance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5128-5144"},"PeriodicalIF":7.9,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Intrusion Detection for Edge Network via Multi-Stage Few-Shot Class-Incremental Learning 基于多阶段少次类增量学习的边缘网络入侵检测
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-15 DOI: 10.1109/TNSE.2025.3644385
Zhen Yin;Wei Wang;Yanyu Cheng;Yiliang Liu;Xiaozhen Lu
The emerging increasingly sophisticated, intelligent, and stealthy network attacks pose more severe security threats to the edge network. In particular, the emergence of novel intelligent attacks makes it a challenging issue to obtain sufficient attack samples, and thus classical deep learning-driven intrusion detection frameworks (IDSs) become ineffective. To tackle this issue, we introduce a novel intrusion detection framework leveraging few-shot class-incremental learning (FSCIL) capabilities to achieve robust detection of emerging threats with few samples. This approach pre-trains a backbone traffic classification model and employs few-shot training with prototypical networks. To further reduce catastrophic forgetting while improving both accuracy and system robustness, we incrementally fine-tune the classification model with supervised contrastive learning, and also realize rapid adaptation to new attacks. Evaluations on the intrusion detection datasets CIC-IDS2017 and USTC-TF2016 demonstrate that our framework consistently outperforms baseline models for emerging attacks detection with few attack samples while preserving effective recognition of known threats.
网络攻击的高精尖、智能化、隐蔽性日益突出,对边缘网络的安全威胁日益严重。特别是,新型智能攻击的出现使得获取足够的攻击样本成为一个具有挑战性的问题,从而使经典的深度学习驱动的入侵检测框架(ids)变得无效。为了解决这个问题,我们引入了一种新的入侵检测框架,利用少量的类增量学习(FSCIL)能力来实现对新出现的威胁的鲁棒检测。该方法对骨干流量分类模型进行预训练,并利用原型网络进行少次训练。为了进一步减少灾难性遗忘,同时提高准确率和系统鲁棒性,我们使用监督对比学习对分类模型进行增量微调,并实现对新攻击的快速适应。对入侵检测数据集CIC-IDS2017和USTC-TF2016的评估表明,我们的框架在保持对已知威胁的有效识别的同时,在使用少量攻击样本的新兴攻击检测方面始终优于基线模型。
{"title":"Efficient Intrusion Detection for Edge Network via Multi-Stage Few-Shot Class-Incremental Learning","authors":"Zhen Yin;Wei Wang;Yanyu Cheng;Yiliang Liu;Xiaozhen Lu","doi":"10.1109/TNSE.2025.3644385","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3644385","url":null,"abstract":"The emerging increasingly sophisticated, intelligent, and stealthy network attacks pose more severe security threats to the edge network. In particular, the emergence of novel intelligent attacks makes it a challenging issue to obtain sufficient attack samples, and thus classical deep learning-driven intrusion detection frameworks (IDSs) become ineffective. To tackle this issue, we introduce a novel intrusion detection framework leveraging few-shot class-incremental learning (FSCIL) capabilities to achieve robust detection of emerging threats with few samples. This approach pre-trains a backbone traffic classification model and employs few-shot training with prototypical networks. To further reduce catastrophic forgetting while improving both accuracy and system robustness, we incrementally fine-tune the classification model with supervised contrastive learning, and also realize rapid adaptation to new attacks. Evaluations on the intrusion detection datasets CIC-IDS2017 and USTC-TF2016 demonstrate that our framework consistently outperforms baseline models for emerging attacks detection with few attack samples while preserving effective recognition of known threats.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4689-4706"},"PeriodicalIF":7.9,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BECS: A Privacy-Preserving Computing Resource Sharing Mechanism for 6G Computing Power Network 基于6G计算能力网络的隐私保护计算资源共享机制
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-15 DOI: 10.1109/TNSE.2025.3643634
Kun Yan;Wenping Ma;Shaohui Sun
The 6G Computing Power Network (CPN) is envisioned to orchestrate vast, distributed computing resources for future intelligent applications. However, achieving efficient, trusted, and privacy-preserving computing resource sharing in this decentralized environment poses significant challenges. To address these intertwined issues, this article proposes a holistic blockchain and evolutionary algorithm-based computing resource sharing (BECS) mechanism. BECS is designed to dynamically and adaptively balance task offloading among computing resources within the 6G CPN, thereby enhancing resource utilization. We model computing resource sharing as a multi-objective optimization problem, aiming to navigate these trade-offs. To tackle this NP-hard problem, we devise a kernel-distance-based dominance relation and incorporate it into the Non-dominated Sorting Genetic Algorithm III (NSGA-III), thereby significantly enhancing population diversity. In addition, we propose a pseudonym scheme based on zero-knowledge proofs to protect user privacy during computing resource sharing. Finally, security analysis and simulation results demonstrate that BECS can effectively leverage all computing resources in the 6G CPN, thereby significantly improving resource utilization while preserving user privacy.
6G计算能力网络(CPN)旨在为未来的智能应用协调庞大的分布式计算资源。然而,在这种分散的环境中实现高效、可信和保护隐私的计算资源共享带来了重大挑战。为了解决这些相互交织的问题,本文提出了一种基于区块链和进化算法的整体计算资源共享(BECS)机制。BECS旨在动态、自适应地平衡6G CPN内计算资源之间的任务卸载,从而提高资源利用率。我们将计算资源共享建模为一个多目标优化问题,旨在导航这些权衡。为了解决这一np难题,我们设计了一种基于核距离的优势关系,并将其纳入非支配排序遗传算法III (NSGA-III)中,从而显著提高了种群多样性。此外,我们提出了一种基于零知识证明的假名方案,以保护计算资源共享过程中的用户隐私。最后,安全性分析和仿真结果表明,BECS可以有效地利用6G CPN中的所有计算资源,从而在保护用户隐私的同时显著提高资源利用率。
{"title":"BECS: A Privacy-Preserving Computing Resource Sharing Mechanism for 6G Computing Power Network","authors":"Kun Yan;Wenping Ma;Shaohui Sun","doi":"10.1109/TNSE.2025.3643634","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3643634","url":null,"abstract":"The 6G Computing Power Network (CPN) is envisioned to orchestrate vast, distributed computing resources for future intelligent applications. However, achieving efficient, trusted, and privacy-preserving computing resource sharing in this decentralized environment poses significant challenges. To address these intertwined issues, this article proposes a holistic blockchain and evolutionary algorithm-based computing resource sharing (BECS) mechanism. BECS is designed to dynamically and adaptively balance task offloading among computing resources within the 6G CPN, thereby enhancing resource utilization. We model computing resource sharing as a multi-objective optimization problem, aiming to navigate these trade-offs. To tackle this NP-hard problem, we devise a kernel-distance-based dominance relation and incorporate it into the Non-dominated Sorting Genetic Algorithm III (NSGA-III), thereby significantly enhancing population diversity. In addition, we propose a pseudonym scheme based on zero-knowledge proofs to protect user privacy during computing resource sharing. Finally, security analysis and simulation results demonstrate that BECS can effectively leverage all computing resources in the 6G CPN, thereby significantly improving resource utilization while preserving user privacy.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4725-4742"},"PeriodicalIF":7.9,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GraphQWalk: Learning Structural Node Embeddings via Continuous Quantum Walk GraphQWalk:通过连续量子行走学习结构节点嵌入
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-15 DOI: 10.1109/TNSE.2025.3644803
Guojun Liu;Juanhong Zhao;Houzhou Wei;Zhengxiong Zhou;Yunfei Song;Xiaomei Zhou;Guangzhi Qi
Structural node embedding is a fundamental technique for encoding the topology of a graph into low-dimensional vectors. However, many existing methods generate position-dependent embeddings, meaning that structurally similar nodes are represented dissimilarly merely due to their distance in the graph. Furthermore, these approaches often lack interpretability and robustness against structural noise. To address these challenges, this paper introduces GraphQWalk, an interpretable, unsupervised, and position-independent method that leverages the continuous quantum walk to capture structural features. Inspired by quantum physics, GraphQWalk first computes initial node features from the average transition probabilities of a particle in a continuous quantum walk. These features, encoding multi-scale structural information, are then aggregated within multi-hop neighborhoods to incorporate local context. Extensive experiments demonstrate that GraphQWalk effectively captures diverse structural roles, achieving superior robustness and performance over baseline models in downstream tasks from classification to cross-graph alignment.
结构节点嵌入是一种将图的拓扑结构编码为低维向量的基本技术。然而,许多现有的方法生成位置依赖的嵌入,这意味着结构相似的节点仅仅由于它们在图中的距离而被不同地表示。此外,这些方法往往缺乏可解释性和对结构噪声的鲁棒性。为了解决这些挑战,本文介绍了GraphQWalk,这是一种可解释的、无监督的、与位置无关的方法,它利用连续量子行走来捕获结构特征。受量子物理学的启发,GraphQWalk首先从连续量子行走中粒子的平均跃迁概率中计算初始节点特征。这些特征编码多尺度结构信息,然后在多跳邻域中聚合以结合本地上下文。大量的实验表明,GraphQWalk有效地捕获了不同的结构角色,在从分类到跨图对齐的下游任务中,比基线模型获得了更好的鲁棒性和性能。
{"title":"GraphQWalk: Learning Structural Node Embeddings via Continuous Quantum Walk","authors":"Guojun Liu;Juanhong Zhao;Houzhou Wei;Zhengxiong Zhou;Yunfei Song;Xiaomei Zhou;Guangzhi Qi","doi":"10.1109/TNSE.2025.3644803","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3644803","url":null,"abstract":"Structural node embedding is a fundamental technique for encoding the topology of a graph into low-dimensional vectors. However, many existing methods generate position-dependent embeddings, meaning that structurally similar nodes are represented dissimilarly merely due to their distance in the graph. Furthermore, these approaches often lack interpretability and robustness against structural noise. To address these challenges, this paper introduces GraphQWalk, an interpretable, unsupervised, and position-independent method that leverages the continuous quantum walk to capture structural features. Inspired by quantum physics, GraphQWalk first computes initial node features from the average transition probabilities of a particle in a continuous quantum walk. These features, encoding multi-scale structural information, are then aggregated within multi-hop neighborhoods to incorporate local context. Extensive experiments demonstrate that GraphQWalk effectively captures diverse structural roles, achieving superior robustness and performance over baseline models in downstream tasks from classification to cross-graph alignment.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4779-4796"},"PeriodicalIF":7.9,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145886555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Link Enabled Reliable and Low Latency Transmission Design for Edge Estimation 边缘估计的可靠低延迟多链路传输设计
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-11 DOI: 10.1109/TNSE.2025.3642623
Siyu Qian;Xiaolin Wang;Fangfei Li;Yi'ang Ren
Edge computing enables real-time estimation for mission-critical Industrial Internet of Things (IIoT) systems by processing massive data streams at the network edge. Existing methods struggle to balance estimation performance and energy efficiency under varying reliability and latency requirements. We investigate Multi-Link Operation (MLO) to improve adaptability under dynamic wireless conditions. However, existing schemes offer limited flexibility in transmission modes and rely on simplified network models, which restricts the potential for MLO-specific performance optimization. To overcome these challenges, we propose a novel flexible transmission mode selection mechanism called Synchronous-Asynchronous Co-existence Multi-Link Aggregation (SACMLA). Based on switchable MLO modes, we formulate a scheduling-estimation co-design problem that optimizes the trade-off between estimation error covariance and transmission energy consumption. Given the environmental complexity and the action space explosion caused by the joint optimization of transmission mode, packet-to-link mapping, and energy allocation, we design a Proximal Policy Optimization (PPO)-based Hierarchical Deep Reinforcement Learning for Multi-Link Co-optimization (HDRL-MLC), a two-tier architecture where a PPO-based outer loop dynamically adjusts scheduling, and an inner loop optimizes energy allocation in MLO. Simulation results demonstrate the necessity of the SACMLA mechanism and highlight the superior performance of the PPO-based HDRL-MLC algorithm over flat algorithms in balancing multiple communication metrics and adapting to varying traffic conditions.
边缘计算通过在网络边缘处理大量数据流,实现对关键任务的工业物联网(IIoT)系统的实时评估。在不同的可靠性和延迟要求下,现有的方法难以平衡估计性能和能源效率。我们研究了多链路操作(MLO),以提高动态无线环境下的适应性。然而,现有方案在传输模式上提供的灵活性有限,并且依赖于简化的网络模型,这限制了mlo特定性能优化的潜力。为了克服这些挑战,我们提出了一种新的灵活的传输模式选择机制,称为同步-异步共存多链路聚合(SACMLA)。基于可切换的MLO模式,提出了一种调度-估计协同设计问题,优化了估计误差协方差与传输能耗之间的权衡。考虑到传输模式、包到链路映射和能量分配联合优化所带来的环境复杂性和动作空间爆炸,设计了一种基于近端策略优化(PPO)的分层深度强化学习多链路协同优化(HDRL-MLC),即基于PPO的外环动态调整调度,内环优化MLO中的能量分配的两层体系结构。仿真结果证明了SACMLA机制的必要性,并突出了基于ppo的HDRL-MLC算法在平衡多个通信指标和适应不同流量条件方面优于平面算法。
{"title":"Multi-Link Enabled Reliable and Low Latency Transmission Design for Edge Estimation","authors":"Siyu Qian;Xiaolin Wang;Fangfei Li;Yi'ang Ren","doi":"10.1109/TNSE.2025.3642623","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3642623","url":null,"abstract":"Edge computing enables real-time estimation for mission-critical Industrial Internet of Things (IIoT) systems by processing massive data streams at the network edge. Existing methods struggle to balance estimation performance and energy efficiency under varying reliability and latency requirements. We investigate Multi-Link Operation (MLO) to improve adaptability under dynamic wireless conditions. However, existing schemes offer limited flexibility in transmission modes and rely on simplified network models, which restricts the potential for MLO-specific performance optimization. To overcome these challenges, we propose a novel flexible transmission mode selection mechanism called Synchronous-Asynchronous Co-existence Multi-Link Aggregation (SACMLA). Based on switchable MLO modes, we formulate a scheduling-estimation co-design problem that optimizes the trade-off between estimation error covariance and transmission energy consumption. Given the environmental complexity and the action space explosion caused by the joint optimization of transmission mode, packet-to-link mapping, and energy allocation, we design a Proximal Policy Optimization (PPO)-based Hierarchical Deep Reinforcement Learning for Multi-Link Co-optimization (HDRL-MLC), a two-tier architecture where a PPO-based outer loop dynamically adjusts scheduling, and an inner loop optimizes energy allocation in MLO. Simulation results demonstrate the necessity of the SACMLA mechanism and highlight the superior performance of the PPO-based HDRL-MLC algorithm over flat algorithms in balancing multiple communication metrics and adapting to varying traffic conditions.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4707-4724"},"PeriodicalIF":7.9,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drone-Aided Secure Task Offloading Optimization for Internet of Vehicles: Review, Challenges and Method 无人机辅助的车联网安全任务卸载优化:综述、挑战与方法
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-09 DOI: 10.1109/TNSE.2025.3641579
Ye Wang;Jingjing Wang;Jianrui Chen;Xiangwang Hou;Ziyang Wang;Chunxiao Jiang
The evolution of the Internet of Vehicles (IoV) has introduced computation-intensive and latency-sensitive applications that challenge traditional cloud architectures. Although drone-aided IoV offers a flexible solution, it presents a complex optimization problem. The core challenge lies in balancing task offloading efficiency with crucial operational safety constraints, such as collision avoidance and battery management, a gap often overlooked in existing research. This paper addresses this problem by first modeling the drone-aided task offloading system as a constrained multi-agent Markov decision process. Based on this framework, we propose a novel safe multi-agent reinforcement learning algorithm (MARL) named Lagrangian-constrained multi-agent policy optimization (LC-MAPO). The LC-MAPO integrates safety constraints into the twin delayed deep deterministic policy gradient (TD3) actor-critic framework using Lagrangian duality theory. The algorithm's effectiveness was validated in three distinct simulation scenarios and compared against an unconstrained multi-agent deep deterministic policy gradient (MADDPG) algorithm and a greedy algorithm. Experimental results demonstrate that LC-MAPO achieves superior performance in both safety adherence and task processing efficiency.
车联网(IoV)的发展带来了计算密集型和延迟敏感型应用,挑战了传统的云架构。尽管无人机辅助车联网提供了一个灵活的解决方案,但它提出了一个复杂的优化问题。核心挑战在于平衡任务卸载效率和关键的操作安全约束,如避免碰撞和电池管理,这在现有研究中经常被忽视。本文首先将无人机辅助任务卸载系统建模为约束多智能体马尔可夫决策过程来解决这一问题。基于此框架,我们提出了一种安全的多智能体强化学习算法——拉格朗日约束多智能体策略优化算法(LC-MAPO)。LC-MAPO使用拉格朗日对偶理论将安全约束集成到双延迟深度确定性策略梯度(TD3)参与者-批评框架中。通过三种不同的仿真场景验证了该算法的有效性,并与无约束多智能体深度确定性策略梯度(madpg)算法和贪心算法进行了比较。实验结果表明,LC-MAPO在安全依从性和任务处理效率方面都取得了优异的成绩。
{"title":"Drone-Aided Secure Task Offloading Optimization for Internet of Vehicles: Review, Challenges and Method","authors":"Ye Wang;Jingjing Wang;Jianrui Chen;Xiangwang Hou;Ziyang Wang;Chunxiao Jiang","doi":"10.1109/TNSE.2025.3641579","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3641579","url":null,"abstract":"The evolution of the Internet of Vehicles (IoV) has introduced computation-intensive and latency-sensitive applications that challenge traditional cloud architectures. Although drone-aided IoV offers a flexible solution, it presents a complex optimization problem. The core challenge lies in balancing task offloading efficiency with crucial operational safety constraints, such as collision avoidance and battery management, a gap often overlooked in existing research. This paper addresses this problem by first modeling the drone-aided task offloading system as a constrained multi-agent Markov decision process. Based on this framework, we propose a novel safe multi-agent reinforcement learning algorithm (MARL) named Lagrangian-constrained multi-agent policy optimization (LC-MAPO). The LC-MAPO integrates safety constraints into the twin delayed deep deterministic policy gradient (TD3) actor-critic framework using Lagrangian duality theory. The algorithm's effectiveness was validated in three distinct simulation scenarios and compared against an unconstrained multi-agent deep deterministic policy gradient (MADDPG) algorithm and a greedy algorithm. Experimental results demonstrate that LC-MAPO achieves superior performance in both safety adherence and task processing efficiency.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4596-4615"},"PeriodicalIF":7.9,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully Distributed Nash Equilibrium Search for Aggregate Games Under Coupling Constraints With Bounded Disturbances 具有有界扰动的耦合约束下集合对策的全分布纳什均衡搜索
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-09 DOI: 10.1109/TNSE.2025.3642184
Yixuan Lv;Lei Liu;Yan-Jun Liu;Yang Chen
In this article, based on nodes and edges, we research the fully distributed generalized Nash equilibrium (GNE) search problem for aggregate games under coupling constraints with bounded disturbances. In order to solve this problem, the node adaptive control law and edge adaptive control law are introdued. In the node-based adaptive control law, agents dynamically adjust their weights through parameters tuning, whereas the edge-based adaptive control law introduces additional adjustable parameters to enable the multi-agent system to autonomously regulate the gain size. Compared with the aggregation game discussed earlier, it can make the agent adjust its behavior under the condition of complete information. Then, it is proved that the GNE of the system can remain asymptotically stable under these two strategies. Although preliminary explorations of disturbances mitigation in GNE problems exist in the literature, the dynamic compensation mechanisms and system performance control under bounded disturbances in aggregation games with coupling constraints remain insufficiently explored. In this article, the disturbances compensations are designed to minimize the damage of the system by keeping the system stable when bounded disturbances occur in the aggregate game under coupling constraints. Finally, the real effectiveness of the designed strategy is proved by simulation experiments.
本文在节点和边的基础上,研究了具有有界干扰的耦合约束下集合对策的全分布广义纳什均衡(GNE)搜索问题。为了解决这一问题,引入了节点自适应控制律和边缘自适应控制律。在基于节点的自适应控制律中,智能体通过参数整定来动态调整其权值,而基于边缘的自适应控制律引入了额外的可调参数,使多智能体系统能够自主调节增益大小。与前面讨论的聚合对策相比,它可以使agent在完全信息条件下调整自己的行为。然后,证明了在这两种策略下,系统的GNE可以保持渐近稳定。虽然已有文献对GNE问题中的干扰缓解进行了初步探索,但对耦合约束下有界干扰下的聚集对策动态补偿机制和系统性能控制的探索还不够。在本文中,干扰补偿的目的是在耦合约束下,当聚集对策中出现有界干扰时,通过保持系统稳定来使系统的损害最小化。最后,通过仿真实验验证了所设计策略的有效性。
{"title":"Fully Distributed Nash Equilibrium Search for Aggregate Games Under Coupling Constraints With Bounded Disturbances","authors":"Yixuan Lv;Lei Liu;Yan-Jun Liu;Yang Chen","doi":"10.1109/TNSE.2025.3642184","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3642184","url":null,"abstract":"In this article, based on nodes and edges, we research the fully distributed generalized Nash equilibrium (GNE) search problem for aggregate games under coupling constraints with bounded disturbances. In order to solve this problem, the node adaptive control law and edge adaptive control law are introdued. In the node-based adaptive control law, agents dynamically adjust their weights through parameters tuning, whereas the edge-based adaptive control law introduces additional adjustable parameters to enable the multi-agent system to autonomously regulate the gain size. Compared with the aggregation game discussed earlier, it can make the agent adjust its behavior under the condition of complete information. Then, it is proved that the GNE of the system can remain asymptotically stable under these two strategies. Although preliminary explorations of disturbances mitigation in GNE problems exist in the literature, the dynamic compensation mechanisms and system performance control under bounded disturbances in aggregation games with coupling constraints remain insufficiently explored. In this article, the disturbances compensations are designed to minimize the damage of the system by keeping the system stable when bounded disturbances occur in the aggregate game under coupling constraints. Finally, the real effectiveness of the designed strategy is proved by simulation experiments.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4651-4668"},"PeriodicalIF":7.9,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Pilot Assignment for D2D-Underlaid NOMA Cell-Free Massive MIMO Systems: A Hypergraph Coloring Approach 基于d2d的NOMA无单元大规模MIMO系统的有效导频分配:超图着色方法
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-05 DOI: 10.1109/TNSE.2025.3640946
Qin Wang;Haotian Chang;Yongxu Zhu;Mei Chen;Li Gao;Wenchao Xia;Haitao Zhao
In this paper, a cell-free massive multiple-input multiple-output (CF-mMIMO) system coexisting with device-to-device (D2D) pairs is investigated under ultra-dense wireless networks (UDWNs), aiming to accommodate the growing number of devices and escalating data traffic demands in future sixth-generation (6G) networks. To overcome the challenge of pilot shortage in UDWNs, non-orthogonal multiple-access (NOMA) and successive interference cancellation (SIC) technologies are employed, enabling users within the same cluster to share pilots efficiently. A closed-form expression for the spectral efficiency of conjugate beamforming receivers is derived, revealing that pilot contamination caused by pilot sharing severely degrades system performance. A novel hypergraph coloring (HGC)-based pilot assignment algorithm is proposed to address this issue, effectively capturing the complex cumulative interference among multiple users and D2D pairs. The algorithm constructs users’ interference hypergraphs using a user-centric access point (AP) selection strategy and allocates pilots based on interference weights within these hyperedges. Numerical results demonstrate that the proposed scheme significantly improves spectral efficiency, offering a promising solution for interference management in CF-mMIMO systems under UDWNs.
本文研究了在超密集无线网络(UDWNs)下与设备对设备(D2D)对共存的无蜂窝大规模多输入多输出(CF-mMIMO)系统,旨在适应未来第六代(6G)网络中不断增长的设备数量和不断升级的数据流量需求。为了克服udwn导频不足的挑战,采用了非正交多址(NOMA)和连续干扰消除(SIC)技术,使同一集群内的用户能够有效地共享导频。推导了共轭波束形成接收机频谱效率的封闭表达式,揭示了由导频共享引起的导频污染严重降低了系统性能。针对这一问题,提出了一种基于超图着色(hypergraph coloring, HGC)的导频分配算法,该算法能够有效地捕获多个用户和D2D对之间复杂的累积干扰。该算法采用以用户为中心的接入点(AP)选择策略构建用户干扰超图,并根据这些超边缘内的干扰权重分配导频。数值计算结果表明,该方案显著提高了频谱效率,为在UDWNs下的CF-mMIMO系统的干扰管理提供了一种有希望的解决方案。
{"title":"Efficient Pilot Assignment for D2D-Underlaid NOMA Cell-Free Massive MIMO Systems: A Hypergraph Coloring Approach","authors":"Qin Wang;Haotian Chang;Yongxu Zhu;Mei Chen;Li Gao;Wenchao Xia;Haitao Zhao","doi":"10.1109/TNSE.2025.3640946","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3640946","url":null,"abstract":"In this paper, a cell-free massive multiple-input multiple-output (CF-mMIMO) system coexisting with device-to-device (D2D) pairs is investigated under ultra-dense wireless networks (UDWNs), aiming to accommodate the growing number of devices and escalating data traffic demands in future sixth-generation (6G) networks. To overcome the challenge of pilot shortage in UDWNs, non-orthogonal multiple-access (NOMA) and successive interference cancellation (SIC) technologies are employed, enabling users within the same cluster to share pilots efficiently. A closed-form expression for the spectral efficiency of conjugate beamforming receivers is derived, revealing that pilot contamination caused by pilot sharing severely degrades system performance. A novel hypergraph coloring (HGC)-based pilot assignment algorithm is proposed to address this issue, effectively capturing the complex cumulative interference among multiple users and D2D pairs. The algorithm constructs users’ interference hypergraphs using a user-centric access point (AP) selection strategy and allocates pilots based on interference weights within these hyperedges. Numerical results demonstrate that the proposed scheme significantly improves spectral efficiency, offering a promising solution for interference management in CF-mMIMO systems under UDWNs.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4636-4650"},"PeriodicalIF":7.9,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-Based Weakly Supervised Traffic Anomaly Detection for IoT Networks 基于drl的物联网弱监督流量异常检测
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-04 DOI: 10.1109/TNSE.2025.3640175
Ziteng Wang;Yiheng Ruan;Xianjun Deng;Xiaoxuan Fan;Shenghao Liu;Wei Feng;Deng Zhang
With the proliferation of Internet of Things (IoT) devices, IoT systems face increasingly severe threats from large-scale cyberattacks during network communications. To effectively recognize potential network threats and ensure the security of IoT, network traffic anomaly detection has been widely studied. Due to the high cost of manual labeling in real-world scenarios, only limited network traffic data is explicitly labeled as abnormal or normal. However, most existing anomaly detection methods struggle to enhance detection accuracy with minimal supervision and perform ineffectively at identifying potential unknown anomalies in unlabeled data. To address these limitations, this paper proposes WADE, a Weakly supervised Anomaly DEtection method based on Deep Reinforcement Learning (DRL). WADE enables simultaneous identification of known and unknown anomaly traffic with limited labeled data. Specifically, it incorporates a Dueling Q-network architecture and introduces a novel reward optimization mechanism that: 1) strengthens feature extraction from unlabeled data and 2) elevates decision accuracy via dynamic reward adaptation. Extensive experiments on IoT traffic datasets demonstrate that WADE outperforms four peer weakly supervised methods, achieving performance improvements of 12.2$%$ in Area Under the Precision-Recall Curve (AUC-PR) and 6.6$%$ in Area Under the Receiver Operating Characteristic Curve (AUC-ROC), which validate the effectiveness of WADE in safeguarding IoT systems.
随着物联网(IoT)设备的激增,物联网系统在网络通信过程中面临的大规模网络攻击威胁日益严重。为了有效识别潜在的网络威胁,保障物联网的安全,网络流量异常检测得到了广泛的研究。由于实际场景中手工标注的成本较高,只有有限的网络流量数据被明确标注为异常或正常。然而,大多数现有的异常检测方法都难以在最小监督下提高检测精度,并且在识别未标记数据中的潜在未知异常方面表现不佳。为了解决这些限制,本文提出了WADE,一种基于深度强化学习(DRL)的弱监督异常检测方法。WADE可以使用有限的标记数据同时识别已知和未知的异常流量。具体来说,它结合了Dueling Q-network架构,并引入了一种新的奖励优化机制,该机制可以:1)加强对未标记数据的特征提取;2)通过动态奖励适应提高决策准确性。在物联网流量数据集上的大量实验表明,WADE优于四种弱监督方法,在精确召回率曲线下的面积(AUC-PR)和接收器工作特征曲线下的面积(AUC-ROC)上的性能分别提高了12.2美元和6.6美元,验证了WADE在保护物联网系统方面的有效性。
{"title":"DRL-Based Weakly Supervised Traffic Anomaly Detection for IoT Networks","authors":"Ziteng Wang;Yiheng Ruan;Xianjun Deng;Xiaoxuan Fan;Shenghao Liu;Wei Feng;Deng Zhang","doi":"10.1109/TNSE.2025.3640175","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3640175","url":null,"abstract":"With the proliferation of Internet of Things (IoT) devices, IoT systems face increasingly severe threats from large-scale cyberattacks during network communications. To effectively recognize potential network threats and ensure the security of IoT, network traffic anomaly detection has been widely studied. Due to the high cost of manual labeling in real-world scenarios, only limited network traffic data is explicitly labeled as abnormal or normal. However, most existing anomaly detection methods struggle to enhance detection accuracy with minimal supervision and perform ineffectively at identifying potential unknown anomalies in unlabeled data. To address these limitations, this paper proposes WADE, a <italic>Weakly supervised Anomaly DEtection</i> method based on Deep Reinforcement Learning (DRL). WADE enables simultaneous identification of known and unknown anomaly traffic with limited labeled data. Specifically, it incorporates a Dueling Q-network architecture and introduces a novel reward optimization mechanism that: 1) strengthens feature extraction from unlabeled data and 2) elevates decision accuracy via dynamic reward adaptation. Extensive experiments on IoT traffic datasets demonstrate that WADE outperforms four peer weakly supervised methods, achieving performance improvements of 12.2<inline-formula><tex-math>$%$</tex-math></inline-formula> in Area Under the Precision-Recall Curve (AUC-PR) and 6.6<inline-formula><tex-math>$%$</tex-math></inline-formula> in Area Under the Receiver Operating Characteristic Curve (AUC-ROC), which validate the effectiveness of WADE in safeguarding IoT systems.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4562-4577"},"PeriodicalIF":7.9,"publicationDate":"2025-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145879968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1