首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
MG-WEP: Multi-Granularity Workload Ensemble and Variational Inference for Multivariate Computing Power Prediction 多元计算能力预测的多粒度工作负载集成和变分推理
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-30 DOI: 10.1109/TNSE.2025.3649358
Shuaishuai Liu;Jin Wang;Geyong Min;Jianhua Hu
Although Computing Power Network (CPN) as the new network computing paradigm which can fully improve the utilization rate of decentralized computing power resources, the dynamic and heterogeneous characteristics of multivariate workloads present significant challenges to maintaining the Quality of Service (QoS) under dynamic resource scheduling. Therefore, workload prediction should be considered to ensure elastic demand services. However, the existing workload prediction methods mainly focus on (1) a single-granularity perspective, and (2) struggle to adapt to dynamic and heterogeneous multivariate workload environments, such as traditional LSTM-based or CNN-based methods that fail to capture cross-granularity dependencies under varying workload patterns. To consider above problems, we propose Multi-Granularity Workload Ensemble and Feature Inference for Multivariate Computing Power Prediction (MG-WEP), which address the problem from a multi-granularity perspective. First, we develop a mutual information feature selection method using a variational inference network to identify key features, facilitating a comprehensive exploration of the relationships among workload variables from an attribute perspective. Then, the clustering method is used to cluster similar workloads, effectively capturing the relationships among them. Furthermore, a combined ensemble prediction method is applied on all clustered workloads to improve prediction accuracy by leveraging the distinctive characteristics of each cluster from object perspective. Finally, we have fully compared the proposed algorithm with eleven comparison methods and four evaluation metrics on three real-world workload trace datasets. The results show that the proposed method has superior prediction performance.
虽然计算能力网络(CPN)作为一种新的网络计算范式,可以充分提高分散计算能力资源的利用率,但多变量工作负载的动态性和异构性对动态资源调度下的服务质量(QoS)的维持提出了重大挑战。因此,应考虑工作负载预测,以确保弹性需求服务。然而,现有的工作负载预测方法主要集中在(1)单粒度视角,(2)难以适应动态和异构的多变量工作负载环境,如传统的基于lstm或基于cnn的方法无法捕获不同工作负载模式下的跨粒度依赖关系。针对以上问题,我们提出了多粒度工作负载集成和多变量计算能力预测特征推理(MG-WEP),从多粒度的角度解决了这些问题。首先,我们开发了一种互信息特征选择方法,使用变分推理网络来识别关键特征,从而从属性的角度全面探索工作负载变量之间的关系。然后,使用聚类方法对相似的工作负载进行聚类,有效地捕获它们之间的关系。此外,在所有集群工作负载上应用组合集成预测方法,从对象的角度利用每个集群的不同特征来提高预测精度。最后,在三个实际工作负载跟踪数据集上,我们将所提出的算法与11种比较方法和4种评估指标进行了全面比较。结果表明,该方法具有较好的预测性能。
{"title":"MG-WEP: Multi-Granularity Workload Ensemble and Variational Inference for Multivariate Computing Power Prediction","authors":"Shuaishuai Liu;Jin Wang;Geyong Min;Jianhua Hu","doi":"10.1109/TNSE.2025.3649358","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3649358","url":null,"abstract":"Although <italic>Computing Power Network</i> (CPN) as the new network computing paradigm which can fully improve the utilization rate of decentralized computing power resources, the dynamic and heterogeneous characteristics of multivariate workloads present significant challenges to maintaining the <italic>Quality of Service</i> (QoS) under dynamic resource scheduling. Therefore, workload prediction should be considered to ensure elastic demand services. However, the existing workload prediction methods mainly focus on (1) a single-granularity perspective, and (2) struggle to adapt to dynamic and heterogeneous multivariate workload environments, such as traditional LSTM-based or CNN-based methods that fail to capture cross-granularity dependencies under varying workload patterns. To consider above problems, we propose <italic>Multi-Granularity Workload Ensemble and Feature Inference for Multivariate Computing Power Prediction</i> (MG-WEP), which address the problem from a multi-granularity perspective. First, we develop a mutual information feature selection method using a variational inference network to identify key features, facilitating a comprehensive exploration of the relationships among workload variables from an attribute perspective. Then, the clustering method is used to cluster similar workloads, effectively capturing the relationships among them. Furthermore, a combined ensemble prediction method is applied on all clustered workloads to improve prediction accuracy by leveraging the distinctive characteristics of each cluster from object perspective. Finally, we have fully compared the proposed algorithm with eleven comparison methods and four evaluation metrics on three real-world workload trace datasets. The results show that the proposed method has superior prediction performance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5471-5488"},"PeriodicalIF":7.9,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting Scalability of Distributed Wireless Networks: A Multi-Hop Communication Perspective 重新审视分布式无线网络的可扩展性:多跳通信的视角
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-29 DOI: 10.1109/TNSE.2025.3649013
Reza Khalvandi;Brunilde Sansò
Large-scale distributed wireless networks provide infrastructure-free and cost-effective connectivity, supporting applications from disaster recovery to global digital inclusion. However, multi-hop communication introduces scalability challenges, as point-to-point (P2P) capacity decreases with the number of intermediate relays (hop count). The growth rate of the expected hop count with network expansion is primarily governed by the underlying interaction patterns among network users. Thus, this study focuses on the critical role of multi-hop communication and user interaction probability, which empirical evidence shows it decays as a power law with geographic distance. We present a comprehensive analysis of network scalability, from capacity estimation to empirical evaluation of real-world interaction patterns. The capacity estimation problem is decomposed using a novel analytical methodology, along with symmetric topology selection and geometric partitioning, to overcome the complexities inherent in previous models. The estimated P2P capacity bounds, derived from expected hop count, surpass previous benchmarks. Specifically, when the power-law exponent exceeds a critical threshold, the expected hop count remains stable and P2P capacity is sustained; otherwise, the hop count grows and capacity declines as the network scales. Accordingly, an analytical method is devised to relate real-world interaction patterns to the power-law exponent, quantified by the contact distribution. The analysis of multiple empirical datasets confirms that the exponent falls within a range that naturally supports scalability. Consequently, multi-hop communication does not fundamentally hinder the wide-scale deployment of distributed wireless networks. This capacity-based analysis provides a clear perspective on scalability under realistic interaction patterns and underscores the promising future of such networks, as well as their potential for widespread deployment.
大规模分布式无线网络提供无基础设施和经济高效的连接,支持从灾难恢复到全球数字包容的应用。然而,多跳通信带来了可伸缩性方面的挑战,因为点对点(P2P)容量随着中间中继的数量(跳数)而减少。期望跳数随网络扩展的增长率主要由网络用户之间的底层交互模式决定。因此,本研究重点关注多跳通信和用户交互概率的关键作用,经验证据表明,多跳通信和用户交互概率随地理距离呈幂律衰减。我们提出了网络可扩展性的全面分析,从容量估计到现实世界交互模式的经验评估。利用一种新的分析方法,以及对称拓扑选择和几何划分来分解容量估计问题,以克服先前模型固有的复杂性。估计的P2P容量界限,从预期跳数推导,超过以前的基准。具体而言,当幂律指数超过临界阈值时,期望跳数保持稳定,P2P容量持续;否则,随着网络规模的扩大,跳数会增加,容量会下降。因此,设计了一种分析方法,将现实世界的相互作用模式与幂律指数联系起来,通过接触分布进行量化。对多个经验数据集的分析证实,指数落在一个自然支持可扩展性的范围内。因此,多跳通信不会从根本上阻碍分布式无线网络的大规模部署。这种基于容量的分析为实际交互模式下的可伸缩性提供了清晰的视角,并强调了此类网络的美好未来及其广泛部署的潜力。
{"title":"Revisiting Scalability of Distributed Wireless Networks: A Multi-Hop Communication Perspective","authors":"Reza Khalvandi;Brunilde Sansò","doi":"10.1109/TNSE.2025.3649013","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3649013","url":null,"abstract":"Large-scale distributed wireless networks provide infrastructure-free and cost-effective connectivity, supporting applications from disaster recovery to global digital inclusion. However, multi-hop communication introduces scalability challenges, as point-to-point (P2P) capacity decreases with the number of intermediate relays (<italic>hop count</i>). The growth rate of the expected <italic>hop count</i> with network expansion is primarily governed by the underlying interaction patterns among network users. Thus, this study focuses on the critical role of multi-hop communication and user interaction probability, which empirical evidence shows it decays as a power law with geographic distance. We present a comprehensive analysis of network scalability, from capacity estimation to empirical evaluation of real-world interaction patterns. The capacity estimation problem is decomposed using a novel analytical methodology, along with symmetric topology selection and geometric partitioning, to overcome the complexities inherent in previous models. The estimated P2P capacity bounds, derived from <italic>expected</i> hop count, surpass previous benchmarks. Specifically, when the power-law exponent exceeds a critical threshold, the expected hop count remains stable and P2P capacity is sustained; otherwise, the hop count grows and capacity declines as the network scales. Accordingly, an analytical method is devised to relate real-world interaction patterns to the power-law exponent, quantified by the <italic>contact distribution</i>. The analysis of multiple empirical datasets confirms that the exponent falls within a range that naturally supports <italic>scalability</i>. Consequently, multi-hop communication does not fundamentally hinder the wide-scale deployment of distributed wireless networks. This capacity-based analysis provides a clear perspective on scalability under realistic interaction patterns and underscores the promising future of such networks, as well as their potential for widespread deployment.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5780-5798"},"PeriodicalIF":7.9,"publicationDate":"2025-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EF21 With Momentum and Partial Participation for Non-Convex Federated Learning Under Biased Compression 有偏压缩下非凸联邦学习的带动量和部分参与EF21
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-26 DOI: 10.1109/TNSE.2025.3648495
Xiaohe Wang;Xinli Shi;Guanghui Wen;Xinghuo Yu
In federated learning, improving communication efficiency is a critical challenge, especially under partial participation and biased compression. Many existing approaches rely on unbiased compression or strong assumptions, such as the bounded gradient assumption, which are often difficult to satisfy in practice. In this paper, we propose a novel federated learning algorithm named EF21-MP (EF21 with Momentum and Partial Participation), which combines biased compression with partial participation and stochastic gradient descent. Furthermore, it incorporates momentum and EF21 to reduce variance from stochastic gradient descent and biased compression. It achieves convergence for nonconvex optimization under standard smoothness and bounded variance conditions, without relying on any bounded gradient assumptions, and could support for batch-free training. The numerical results demonstrate that EF21-MP consistently outperforms the existing baselines.
在联邦学习中,提高通信效率是一个关键的挑战,特别是在部分参与和偏压缩的情况下。许多现有的方法依赖于无偏压缩或强假设,如有界梯度假设,这些假设在实践中往往难以满足。在本文中,我们提出了一种新的联合学习算法EF21- mp (EF21 with Momentum and Partial Participation),它结合了偏压、偏参与和随机梯度下降。此外,该方法还结合了动量和EF21来减小随机梯度下降和偏压带来的方差。它在标准平滑和有界方差条件下实现了非凸优化的收敛性,不依赖于任何有界梯度假设,可以支持无批处理训练。数值结果表明,EF21-MP始终优于现有基线。
{"title":"EF21 With Momentum and Partial Participation for Non-Convex Federated Learning Under Biased Compression","authors":"Xiaohe Wang;Xinli Shi;Guanghui Wen;Xinghuo Yu","doi":"10.1109/TNSE.2025.3648495","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3648495","url":null,"abstract":"In federated learning, improving communication efficiency is a critical challenge, especially under partial participation and biased compression. Many existing approaches rely on unbiased compression or strong assumptions, such as the bounded gradient assumption, which are often difficult to satisfy in practice. In this paper, we propose a novel federated learning algorithm named EF21-MP (EF21 with Momentum and Partial Participation), which combines biased compression with partial participation and stochastic gradient descent. Furthermore, it incorporates momentum and EF21 to reduce variance from stochastic gradient descent and biased compression. It achieves convergence for nonconvex optimization under standard smoothness and bounded variance conditions, without relying on any bounded gradient assumptions, and could support for batch-free training. The numerical results demonstrate that EF21-MP consistently outperforms the existing baselines.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5539-5550"},"PeriodicalIF":7.9,"publicationDate":"2025-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Enabled Secure Authentication and Fair Trading Scheme for Shared Charging Systems 基于区块链的共享收费系统安全认证与公平交易方案
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-26 DOI: 10.1109/TNSE.2025.3648844
Changbing Bi;Yue Cao;Yanzhen Ren;Youliang Tian;Lin Wan;Wei Ke
With the rapid development of the Electric Vehicle (EV) market, the growing demand for electricity charging has driven the evolution of private charging infrastructure toward shared deployment. Shared Charging Systems (SCSs) play a vital role in integrating both private and public Charging Piles (CPs), thereby improving overall resource utilization. However, such multi-party SCSs introduce challenges in security and fairness. EVs and CPs exchange parameters via wireless communication to optimize the charging process, which may exposes various threats such as tampering, eavesdropping, replay, and deletion attacks. Meanwhile, the distributed deployment of CPs complicates charging fee calculation management and may lead to issues such as malicious overcharging. To address these challenges, we propose a blockchain-enabled secure authentication and fair trading scheme, ensuring secure communication while guaranteeing transparency and fairness for SCSs. First, we design a pairing-free heterogeneous signcryption algorithm that supports distributed key generation. It realizes efficient mutual authentication based on this algorithm while preventing information leakage during the process. We provide a rigorous security proof under the Random Oracle Model (ROM) to establish its security. Second, we develop a blockchain-based smart contract mechanism to enable decentralized and transparent charging fee calculation, as well as automated payments. By eliminating third-party intermediaries, our solution reduces trading costs whle effectively addresses challenges such as charging fee calculation difficulties and malicious overcharging in distributed CP deployments. Experimental results show that the proposed scheme outperforms existing approaches in terms of both computational and communication overhead. Additionally, our smart contracts incur extremely low gas costs, enhancing the feasibility of the scheme.
随着电动汽车市场的快速发展,不断增长的充电需求推动了私人充电基础设施向共享部署的演变。共享充电系统在整合私人和公共充电桩方面发挥着至关重要的作用,从而提高整体资源利用率。然而,这种多方安全保障机制在安全性和公平性方面带来了挑战。电动汽车和CPs通过无线通信交换参数,优化充电过程,这可能会暴露出篡改、窃听、重放、删除攻击等各种威胁。同时,CPs的分布式部署使收费费用的计算管理复杂化,可能导致恶意超额收费等问题。为了应对这些挑战,我们提出了一种支持区块链的安全认证和公平交易方案,确保安全通信,同时保证scs的透明度和公平性。首先,我们设计了一个支持分布式密钥生成的无配对异构签名加密算法。在此基础上实现了高效的相互认证,同时防止了认证过程中的信息泄露。我们在随机Oracle模型(ROM)下提供了严格的安全性证明来证明其安全性。其次,我们开发了基于区块链的智能合约机制,以实现分散和透明的收费计算以及自动支付。通过消除第三方中介,我们的解决方案降低了交易成本,同时有效地解决了分布式CP部署中的收费计算困难和恶意超额收费等挑战。实验结果表明,该方案在计算量和通信开销方面都优于现有方法。此外,我们的智能合约产生极低的天然气成本,提高了方案的可行性。
{"title":"A Blockchain-Enabled Secure Authentication and Fair Trading Scheme for Shared Charging Systems","authors":"Changbing Bi;Yue Cao;Yanzhen Ren;Youliang Tian;Lin Wan;Wei Ke","doi":"10.1109/TNSE.2025.3648844","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3648844","url":null,"abstract":"With the rapid development of the Electric Vehicle (EV) market, the growing demand for electricity charging has driven the evolution of private charging infrastructure toward shared deployment. Shared Charging Systems (SCSs) play a vital role in integrating both private and public Charging Piles (CPs), thereby improving overall resource utilization. However, such multi-party SCSs introduce challenges in security and fairness. EVs and CPs exchange parameters via wireless communication to optimize the charging process, which may exposes various threats such as tampering, eavesdropping, replay, and deletion attacks. Meanwhile, the distributed deployment of CPs complicates charging fee calculation management and may lead to issues such as malicious overcharging. To address these challenges, we propose a blockchain-enabled secure authentication and fair trading scheme, ensuring secure communication while guaranteeing transparency and fairness for SCSs. First, we design a pairing-free heterogeneous signcryption algorithm that supports distributed key generation. It realizes efficient mutual authentication based on this algorithm while preventing information leakage during the process. We provide a rigorous security proof under the Random Oracle Model (ROM) to establish its security. Second, we develop a blockchain-based smart contract mechanism to enable decentralized and transparent charging fee calculation, as well as automated payments. By eliminating third-party intermediaries, our solution reduces trading costs whle effectively addresses challenges such as charging fee calculation difficulties and malicious overcharging in distributed CP deployments. Experimental results show that the proposed scheme outperforms existing approaches in terms of both computational and communication overhead. Additionally, our smart contracts incur extremely low gas costs, enhancing the feasibility of the scheme.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5603-5621"},"PeriodicalIF":7.9,"publicationDate":"2025-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Guided Topic Detection Model Based on Data Augmentation and Feature Representation 基于数据增强和特征表示的引导主题检测模型
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-23 DOI: 10.1109/TNSE.2025.3647512
Rong Wang;Runyu Mao;Tao Wen;Shihong Wei;Qian Li;Yunpeng Xiao
In social networks, the accurate detection of guided topics is of great significance for maintaining the healthy order of the network. Aiming at the high-dimensionality of its feature space and the hiddenness of users' emotions, a guided topic detection method based on data enhancement and feature representation is proposed. Firstly, to address the problem of sparse effective data and high-dimensional heterogeneity in the early stage of guided topic, GAN network is introduced to realize homomorphic compensation of data and enhance data diversity. Meanwhile, the SC2vec method is designed to realize the low-rank densification of data. In addition, random wandering is introduced to mine the implicit association network among users and to realize the fusion of multi-dimensional information. Secondly, to address the problem of the hidden nature of users' emotional polarity, the internal attributes and external influences of users are mined. The fine-grained emotional influence factors based on linear multiple regression are constructed. At the same time, the evolutionary game theory is introduced to build an emotional interaction game model between users to reveal the dynamic evolution law of users' emotions. The experimental results show that the method not only successfully realizes the low-rank densification of data and the deep mining of implicit user emotions, but also achieves significant improvement in the accuracy of guided topic detection.
在社交网络中,引导话题的准确检测对于维护网络的健康秩序具有重要意义。针对其特征空间的高维性和用户情感的隐蔽性,提出了一种基于数据增强和特征表示的引导性主题检测方法。首先,针对引导主题早期有效数据稀疏、高维异构的问题,引入GAN网络实现数据同态补偿,增强数据多样性;同时,设计了SC2vec方法,实现了数据的低秩密度化。此外,引入随机漫游来挖掘用户间的隐式关联网络,实现多维信息的融合。其次,针对用户情感极性的隐藏性问题,挖掘用户的内部属性和外部影响。构建了基于线性多元回归的细粒度情感影响因素。同时,引入进化博弈论,构建用户间情感互动博弈模型,揭示用户情感的动态演化规律。实验结果表明,该方法不仅成功地实现了数据的低秩密集化和用户隐式情感的深度挖掘,而且在引导主题检测的准确率上也有了显著提高。
{"title":"A Guided Topic Detection Model Based on Data Augmentation and Feature Representation","authors":"Rong Wang;Runyu Mao;Tao Wen;Shihong Wei;Qian Li;Yunpeng Xiao","doi":"10.1109/TNSE.2025.3647512","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3647512","url":null,"abstract":"In social networks, the accurate detection of guided topics is of great significance for maintaining the healthy order of the network. Aiming at the high-dimensionality of its feature space and the hiddenness of users' emotions, a guided topic detection method based on data enhancement and feature representation is proposed. Firstly, to address the problem of sparse effective data and high-dimensional heterogeneity in the early stage of guided topic, GAN network is introduced to realize homomorphic compensation of data and enhance data diversity. Meanwhile, the SC2vec method is designed to realize the low-rank densification of data. In addition, random wandering is introduced to mine the implicit association network among users and to realize the fusion of multi-dimensional information. Secondly, to address the problem of the hidden nature of users' emotional polarity, the internal attributes and external influences of users are mined. The fine-grained emotional influence factors based on linear multiple regression are constructed. At the same time, the evolutionary game theory is introduced to build an emotional interaction game model between users to reveal the dynamic evolution law of users' emotions. The experimental results show that the method not only successfully realizes the low-rank densification of data and the deep mining of implicit user emotions, but also achieves significant improvement in the accuracy of guided topic detection.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5110-5127"},"PeriodicalIF":7.9,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Community Detection in Complex Networks: A Brief Survey and an Algorithm Based on Identifying High-Quality Core Region 复杂网络中的局部社区检测:综述及基于高质量核心区识别的算法
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-22 DOI: 10.1109/TNSE.2025.3645073
Qianqian Cai;Tong Wang;Mali Xing;Yanyan Ye;Minyue Fu
Community detection is capable of uncovering the inherent structure and functional organization within complex networks by analyzing multi-scale topological features. According to the brief survey, local detection methods demonstrate notable strengths, but challenges persist in selecting suitable seeds, identifying community cores, and precisely extending communities. Therefore, in this paper, a local community detection algorithm based on identifying high-quality core region is proposed. Specifically, at the seed selection stage, a core cohesiveness index is constructed to quantify the node importance, with two-step filtering strategy implemented to refine the selection of suitable seeds. After that, a hierarchical affinity evaluation mechanism is proposed on the basis of node-core affinity values to ensure the formation of high-quality core region (i.e., high-quality initial community). Community extension is then achieved by using the enhanced objective function combined with an incremental update strategy, it preserves structural cohesion and reduces computational costs. Finally, the membership assignments of the remaining nodes will be further processed through community optimization to refine community boundaries. Experimental results demonstrate that our proposed algorithm outperforms other community detection algorithms with relatively low time complexities across multi-scale real-world and synthetic networks.
社区检测通过分析复杂网络的多尺度拓扑特征,揭示复杂网络的内在结构和功能组织。简要调查表明,局部检测方法具有明显的优势,但在选择合适的种子、确定群落核心和精确扩展群落方面仍然存在挑战。为此,本文提出了一种基于高质量核心区识别的局部社区检测算法。具体而言,在种子选择阶段,构建核心凝聚力指标来量化节点的重要性,并采用两步过滤策略来细化种子的选择。在此基础上,提出了基于节点-核心亲和度值的分级亲和度评价机制,以确保形成高质量的核心区(即高质量的初始群落)。利用增强的目标函数与增量更新策略相结合实现群体扩展,既保持了结构内聚性,又降低了计算成本。最后,通过社区优化进一步处理剩余节点的归属分配,细化社区边界。实验结果表明,我们提出的算法在多尺度真实世界和合成网络中以相对较低的时间复杂度优于其他社区检测算法。
{"title":"Local Community Detection in Complex Networks: A Brief Survey and an Algorithm Based on Identifying High-Quality Core Region","authors":"Qianqian Cai;Tong Wang;Mali Xing;Yanyan Ye;Minyue Fu","doi":"10.1109/TNSE.2025.3645073","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645073","url":null,"abstract":"Community detection is capable of uncovering the inherent structure and functional organization within complex networks by analyzing multi-scale topological features. According to the brief survey, local detection methods demonstrate notable strengths, but challenges persist in selecting suitable seeds, identifying community cores, and precisely extending communities. Therefore, in this paper, a local community detection algorithm based on identifying high-quality core region is proposed. Specifically, at the seed selection stage, a core cohesiveness index is constructed to quantify the node importance, with two-step filtering strategy implemented to refine the selection of suitable seeds. After that, a hierarchical affinity evaluation mechanism is proposed on the basis of node-core affinity values to ensure the formation of high-quality core region (i.e., high-quality initial community). Community extension is then achieved by using the enhanced objective function combined with an incremental update strategy, it preserves structural cohesion and reduces computational costs. Finally, the membership assignments of the remaining nodes will be further processed through community optimization to refine community boundaries. Experimental results demonstrate that our proposed algorithm outperforms other community detection algorithms with relatively low time complexities across multi-scale real-world and synthetic networks.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5489-5504"},"PeriodicalIF":7.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk-Conscious Computing in Space-Air-Ground IoT Networks: A Prospect-Theoretic Game Perspective 空间-空地物联网网络中的风险意识计算:前景论博弈视角
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-22 DOI: 10.1109/TNSE.2025.3647157
Panagiotis Charatsaris;Maria Diamanti;Eirini Eleni Tsiropoulou;Symeon Papavassiliou
Space-Air-Ground Integrated Networks (SAGIN) have been recognized as key enablers of 6G systems for ubiquitous service provisioning, unlocking Internet of Things (IoT) applications in geographically dispersed areas. In this paper, we study the problem of computation task offloading for remotely deployed IoT devices to either a limited-capability Uncrewed Aerial Vehicle (UAV)-mounted Multi-access Edge Computing (MEC) server or a cloud server via satellite relaying. The problem is formulated as a non-cooperative game, where each IoT device autonomously determines the percentage of task offloaded to each server to minimize the aggregate time and energy overhead due to transmissions and remote processing. Diverging from the prevailing literature, in this paper, we model the IoT devices' risk-seeking and loss-averse behavior in sharing the common pools of computing resources, i.e., cloud and MEC server. By incorporating risk-consciousness in their computation offloading decision-making, IoT devices strive to balance the total incurred overhead with the likelihood of task rejection due to overexploitation of limited shared edge resources. To this end, the IoT devices' utility function is modeled using Prospect Theory and Tragedy of the Commons. Two solutions based on normal and satisfaction-form games are derived, targeting to maximize or achieve a minimum value for the prospect-theoretic utility, providing insights from both device and system perspectives, respectively. Numerical results show the effectiveness of the overall risk-conscious computing framework in the achieved time and energy overhead, as well as task probability of failure.
空间-空地集成网络(SAGIN)已被认为是6G系统的关键推动因素,用于无处不在的服务供应,解锁地理分散地区的物联网(IoT)应用。在本文中,我们研究了远程部署的物联网设备的计算任务卸载问题,通过卫星中继将其卸载到能力有限的无人机(UAV)上的多访问边缘计算(MEC)服务器或云服务器上。该问题被描述为一个非合作博弈,其中每个物联网设备自主决定将任务卸载到每个服务器的百分比,以最大限度地减少由于传输和远程处理造成的总时间和能量开销。与主流文献不同,在本文中,我们模拟了物联网设备在共享公共计算资源池(即云和MEC服务器)时的风险寻求和损失规避行为。通过将风险意识纳入其计算卸载决策,物联网设备努力平衡由于过度利用有限的共享边缘资源而导致的总开销与任务拒绝的可能性。为此,利用前景理论和公地悲剧对物联网设备的效用函数进行建模。基于正常和满足形式游戏的两种解决方案,目标是最大化或实现前景理论效用的最小值,分别从设备和系统的角度提供见解。数值结果表明,整体风险意识计算框架在实现的时间和能量开销以及任务失败概率方面是有效的。
{"title":"Risk-Conscious Computing in Space-Air-Ground IoT Networks: A Prospect-Theoretic Game Perspective","authors":"Panagiotis Charatsaris;Maria Diamanti;Eirini Eleni Tsiropoulou;Symeon Papavassiliou","doi":"10.1109/TNSE.2025.3647157","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3647157","url":null,"abstract":"Space-Air-Ground Integrated Networks (SAGIN) have been recognized as key enablers of 6G systems for ubiquitous service provisioning, unlocking Internet of Things (IoT) applications in geographically dispersed areas. In this paper, we study the problem of computation task offloading for remotely deployed IoT devices to either a limited-capability Uncrewed Aerial Vehicle (UAV)-mounted Multi-access Edge Computing (MEC) server or a cloud server via satellite relaying. The problem is formulated as a non-cooperative game, where each IoT device autonomously determines the percentage of task offloaded to each server to minimize the aggregate time and energy overhead due to transmissions and remote processing. Diverging from the prevailing literature, in this paper, we model the IoT devices' risk-seeking and loss-averse behavior in sharing the common pools of computing resources, i.e., cloud and MEC server. By incorporating risk-consciousness in their computation offloading decision-making, IoT devices strive to balance the total incurred overhead with the likelihood of task rejection due to overexploitation of limited shared edge resources. To this end, the IoT devices' utility function is modeled using Prospect Theory and Tragedy of the Commons. Two solutions based on normal and satisfaction-form games are derived, targeting to maximize or achieve a minimum value for the prospect-theoretic utility, providing insights from both device and system perspectives, respectively. Numerical results show the effectiveness of the overall risk-conscious computing framework in the achieved time and energy overhead, as well as task probability of failure.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5056-5073"},"PeriodicalIF":7.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Sum-Rate Maximization in Rate-Splitting MISO Downlink Systems 分频MISO下行系统的加权和速率最大化
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-18 DOI: 10.1109/TNSE.2025.3645935
Anh-Tien Tran;Thanh Phung Truong;Dongwook Won;Nhu-Ngoc Dao;Sungrae Cho
Rate-splitting multiple access (RSMA) and successive interference cancellation (SIC) are essential approaches in the next-generation communication systems that boost spectrum efficiency by effectively managing and mitigating interference between multiple signals. However, a challenge arises in ensuring that users can distinguish the common message from the remaining non-decoded private messages without considering a separate SIC constraint per user. This imperfection cancellation leads to residual interference from the common stream that remains in the received signal. This work investigates the maximization of the weighted sum-rate (WSR) in single-layer RSMA multiple input single output (MISO) downlink network by proposing explicit SIC constraints. In particular, we suggest an approach that initially addresses the critical problem of allocating power and precoding vectors for streams using a deep reinforcement learning (DRL) method, and then determines the user-specific allocations within the common rate to meet the criteria of users’ minimum rate by solving a linear programming problem. Simulation results exhibit the supremacy of the proposed DRL framework over SDMA and other DRL approaches in terms of spectral efficiency leading to an improvement of approximately 30% of WSR in several scenarios.
速率分割多址(RSMA)和连续干扰消除(SIC)是下一代通信系统中必不可少的方法,通过有效管理和减轻多个信号之间的干扰来提高频谱效率。但是,在不考虑每个用户单独的SIC约束的情况下,如何确保用户能够将公共消息与其余未解码的私有消息区分开来,这就产生了一个挑战。这种不完美的对消导致接收信号中保留的公共流的残余干扰。本文通过提出明确的SIC约束,研究了单层RSMA多输入单输出(MISO)下行网络中加权和速率(WSR)的最大化。特别是,我们提出了一种方法,该方法首先使用深度强化学习(DRL)方法解决流分配功率和预编码向量的关键问题,然后通过求解线性规划问题确定在公共速率内的用户特定分配,以满足用户最小速率的标准。仿真结果表明,在频谱效率方面,所提出的DRL框架优于SDMA和其他DRL方法,在一些场景下,WSR提高了约30%。
{"title":"Weighted Sum-Rate Maximization in Rate-Splitting MISO Downlink Systems","authors":"Anh-Tien Tran;Thanh Phung Truong;Dongwook Won;Nhu-Ngoc Dao;Sungrae Cho","doi":"10.1109/TNSE.2025.3645935","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645935","url":null,"abstract":"Rate-splitting multiple access (RSMA) and successive interference cancellation (SIC) are essential approaches in the next-generation communication systems that boost spectrum efficiency by effectively managing and mitigating interference between multiple signals. However, a challenge arises in ensuring that users can distinguish the common message from the remaining non-decoded private messages without considering a separate SIC constraint per user. This imperfection cancellation leads to residual interference from the common stream that remains in the received signal. This work investigates the maximization of the weighted sum-rate (WSR) in single-layer RSMA multiple input single output (MISO) downlink network by proposing explicit SIC constraints. In particular, we suggest an approach that initially addresses the critical problem of allocating power and precoding vectors for streams using a deep reinforcement learning (DRL) method, and then determines the user-specific allocations within the common rate to meet the criteria of users’ minimum rate by solving a linear programming problem. Simulation results exhibit the supremacy of the proposed DRL framework over SDMA and other DRL approaches in terms of spectral efficiency leading to an improvement of approximately 30% of WSR in several scenarios.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5522-5538"},"PeriodicalIF":7.9,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routing in Hierarchical Hybrid Satellite Networks: A Survey 分层混合卫星网络中的路由研究
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-18 DOI: 10.1109/TNSE.2025.3645802
Zeyu Liu;Shuai Wang;Rui Zhang;Zhe Song;Gaofeng Pan
With the deep evolution of satellite communication technologies and hierarchical hybrid networks (HHSNs), modern communication satellites have transformed from single-function relay nodes into core hubs enabling global interconnectivity. The dynamic topology, open-channel environment, and resource limitations inherent to HHSN expose satellite routing protocols to the challenges of the Reliability-Security-Efficiency (RSE) trilemma. In this paper, we provide a systematic review of advancements in HHSN routing research, analyzing core technical challenges through the lens of typical application scenarios while highlighting the divergent performance of various solutions under the RSE trilemma. To the best of our knowledge, we are the first to analyze the performance of HHSN routing protocols within the framework of the RSE theory. Existing reviews either treat routing merely as a component of broader surveys or lack analysis based on the RSE trilemma framework. Building on our review of HHSN routing protocols, we discuss the topology description and security aspects of HHSN and propose potential directions for future HHSN routing research.
随着卫星通信技术和分层混合网络(hhsn)的深入发展,现代通信卫星已经从单一功能中继节点转变为实现全球互联的核心枢纽。HHSN固有的动态拓扑结构、开放信道环境和资源限制使卫星路由协议面临可靠性-安全性-效率(RSE)三难困境的挑战。本文对HHSN路由研究进展进行了系统回顾,通过典型应用场景分析了HHSN路由的核心技术挑战,同时强调了在RSE三难困境下各种解决方案的不同性能。据我们所知,我们是第一个在RSE理论框架内分析HHSN路由协议性能的人。现有的评论要么仅仅将路由视为更广泛调查的一个组成部分,要么缺乏基于RSE三难困境框架的分析。在回顾HHSN路由协议的基础上,讨论了HHSN的拓扑描述和安全方面,并提出了未来HHSN路由研究的潜在方向。
{"title":"Routing in Hierarchical Hybrid Satellite Networks: A Survey","authors":"Zeyu Liu;Shuai Wang;Rui Zhang;Zhe Song;Gaofeng Pan","doi":"10.1109/TNSE.2025.3645802","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645802","url":null,"abstract":"With the deep evolution of satellite communication technologies and hierarchical hybrid networks (HHSNs), modern communication satellites have transformed from single-function relay nodes into core hubs enabling global interconnectivity. The dynamic topology, open-channel environment, and resource limitations inherent to HHSN expose satellite routing protocols to the challenges of the Reliability-Security-Efficiency (RSE) trilemma. In this paper, we provide a systematic review of advancements in HHSN routing research, analyzing core technical challenges through the lens of typical application scenarios while highlighting the divergent performance of various solutions under the RSE trilemma. To the best of our knowledge, we are the first to analyze the performance of HHSN routing protocols within the framework of the RSE theory. Existing reviews either treat routing merely as a component of broader surveys or lack analysis based on the RSE trilemma framework. Building on our review of HHSN routing protocols, we discuss the topology description and security aspects of HHSN and propose potential directions for future HHSN routing research.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4883-4911"},"PeriodicalIF":7.9,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145879961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subversion-Resistant Autonomous Path Proxy Re-Encryption With Secure Deduplication for IoMT 支持IoMT安全重复数据删除的抗颠覆自治路径代理重加密
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-18 DOI: 10.1109/TNSE.2025.3645991
Jiasheng Chen;Zhenfu Cao;Lulu Wang;Jiachen Shen;Zehui Xiong;Xiaolei Dong
The Internet of Medical Things (IoMT) consists of many resource-constrained medical devices that provide patients with medical services anytime and anywhere. In such an environment, the collection and sharing of medical records raise serious security concerns. Although various cryptographic schemes have been proposed, most fail to address two critical threats simultaneously: (i) sensitive data exposure caused by external cloud servers and/or open network environments; (ii) algorithm substitution attacks (ASAs) by internal adversaries. Furthermore, when data owners (e.g., delegators) are inconvenient to process their data, it is desirable to establish a more fine-grained way to delegate encryption rights. To tackle these issues, we propose a subversion-resistant autonomous path proxy re-encryption with an equality test function (SRAP-PRET). Specifically, our scheme allows the delegator to create a multi-hop delegation path in advance with the delegator's preferences, effectively preventing unauthorized access. By deploying a cryptographic reverse firewall zone, SRAP-PRET addresses the problem of information leakage caused by adversaries initiating ASAs. Additionally, SRAP-PRET also supports secure deduplication and efficient data decryption. Security analysis shows that SRAP-PRET provides resistance against ASAs and security against chosen plaintext attacks. Performance evaluations demonstrate that SRAP-PRET offers enhanced security properties without sacrificing efficiency.
医疗物联网(IoMT)由许多资源受限的医疗设备组成,可以随时随地为患者提供医疗服务。在这种环境下,医疗记录的收集和共享引起了严重的安全问题。虽然提出了各种加密方案,但大多数方案未能同时解决两个关键威胁:(i)外部云服务器和/或开放网络环境造成的敏感数据暴露;(ii)内部对手的算法替代攻击(ASAs)。此外,当数据所有者(例如委派者)不方便处理其数据时,需要建立一种更细粒度的方式来委派加密权。为了解决这些问题,我们提出了一种具有相等性测试功能的抗颠覆自治路径代理重加密(SRAP-PRET)。具体来说,我们的方案允许委托方根据委托方的首选项提前创建多跳委托路径,有效防止未经授权的访问。通过部署加密的反向防火墙区域,sla - pret解决了攻击者发起asa导致的信息泄露问题。此外,SRAP-PRET还支持安全的重复数据删除和高效的数据解密。安全性分析表明,SRAP-PRET提供了对asa的抵抗力和对所选明文攻击的安全性。性能评估表明,在不牺牲效率的情况下,SRAP-PRET提供了增强的安全属性。
{"title":"Subversion-Resistant Autonomous Path Proxy Re-Encryption With Secure Deduplication for IoMT","authors":"Jiasheng Chen;Zhenfu Cao;Lulu Wang;Jiachen Shen;Zehui Xiong;Xiaolei Dong","doi":"10.1109/TNSE.2025.3645991","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645991","url":null,"abstract":"The Internet of Medical Things (IoMT) consists of many resource-constrained medical devices that provide patients with medical services anytime and anywhere. In such an environment, the collection and sharing of medical records raise serious security concerns. Although various cryptographic schemes have been proposed, most fail to address two critical threats simultaneously: (i) sensitive data exposure caused by external cloud servers and/or open network environments; (ii) algorithm substitution attacks (ASAs) by internal adversaries. Furthermore, when data owners (e.g., delegators) are inconvenient to process their data, it is desirable to establish a more fine-grained way to delegate encryption rights. To tackle these issues, we propose a subversion-resistant autonomous path proxy re-encryption with an equality test function (SRAP-PRET). Specifically, our scheme allows the delegator to create a multi-hop delegation path in advance with the delegator's preferences, effectively preventing unauthorized access. By deploying a cryptographic reverse firewall zone, SRAP-PRET addresses the problem of information leakage caused by adversaries initiating ASAs. Additionally, SRAP-PRET also supports secure deduplication and efficient data decryption. Security analysis shows that SRAP-PRET provides resistance against ASAs and security against chosen plaintext attacks. Performance evaluations demonstrate that SRAP-PRET offers enhanced security properties without sacrificing efficiency.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5551-5567"},"PeriodicalIF":7.9,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1