首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
Efficient Intrusion Detection for Edge Network via Multi-Stage Few-Shot Class-Incremental Learning 基于多阶段少次类增量学习的边缘网络入侵检测
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-15 DOI: 10.1109/TNSE.2025.3644385
Zhen Yin;Wei Wang;Yanyu Cheng;Yiliang Liu;Xiaozhen Lu
The emerging increasingly sophisticated, intelligent, and stealthy network attacks pose more severe security threats to the edge network. In particular, the emergence of novel intelligent attacks makes it a challenging issue to obtain sufficient attack samples, and thus classical deep learning-driven intrusion detection frameworks (IDSs) become ineffective. To tackle this issue, we introduce a novel intrusion detection framework leveraging few-shot class-incremental learning (FSCIL) capabilities to achieve robust detection of emerging threats with few samples. This approach pre-trains a backbone traffic classification model and employs few-shot training with prototypical networks. To further reduce catastrophic forgetting while improving both accuracy and system robustness, we incrementally fine-tune the classification model with supervised contrastive learning, and also realize rapid adaptation to new attacks. Evaluations on the intrusion detection datasets CIC-IDS2017 and USTC-TF2016 demonstrate that our framework consistently outperforms baseline models for emerging attacks detection with few attack samples while preserving effective recognition of known threats.
网络攻击的高精尖、智能化、隐蔽性日益突出,对边缘网络的安全威胁日益严重。特别是,新型智能攻击的出现使得获取足够的攻击样本成为一个具有挑战性的问题,从而使经典的深度学习驱动的入侵检测框架(ids)变得无效。为了解决这个问题,我们引入了一种新的入侵检测框架,利用少量的类增量学习(FSCIL)能力来实现对新出现的威胁的鲁棒检测。该方法对骨干流量分类模型进行预训练,并利用原型网络进行少次训练。为了进一步减少灾难性遗忘,同时提高准确率和系统鲁棒性,我们使用监督对比学习对分类模型进行增量微调,并实现对新攻击的快速适应。对入侵检测数据集CIC-IDS2017和USTC-TF2016的评估表明,我们的框架在保持对已知威胁的有效识别的同时,在使用少量攻击样本的新兴攻击检测方面始终优于基线模型。
{"title":"Efficient Intrusion Detection for Edge Network via Multi-Stage Few-Shot Class-Incremental Learning","authors":"Zhen Yin;Wei Wang;Yanyu Cheng;Yiliang Liu;Xiaozhen Lu","doi":"10.1109/TNSE.2025.3644385","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3644385","url":null,"abstract":"The emerging increasingly sophisticated, intelligent, and stealthy network attacks pose more severe security threats to the edge network. In particular, the emergence of novel intelligent attacks makes it a challenging issue to obtain sufficient attack samples, and thus classical deep learning-driven intrusion detection frameworks (IDSs) become ineffective. To tackle this issue, we introduce a novel intrusion detection framework leveraging few-shot class-incremental learning (FSCIL) capabilities to achieve robust detection of emerging threats with few samples. This approach pre-trains a backbone traffic classification model and employs few-shot training with prototypical networks. To further reduce catastrophic forgetting while improving both accuracy and system robustness, we incrementally fine-tune the classification model with supervised contrastive learning, and also realize rapid adaptation to new attacks. Evaluations on the intrusion detection datasets CIC-IDS2017 and USTC-TF2016 demonstrate that our framework consistently outperforms baseline models for emerging attacks detection with few attack samples while preserving effective recognition of known threats.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4689-4706"},"PeriodicalIF":7.9,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BECS: A Privacy-Preserving Computing Resource Sharing Mechanism for 6G Computing Power Network 基于6G计算能力网络的隐私保护计算资源共享机制
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-15 DOI: 10.1109/TNSE.2025.3643634
Kun Yan;Wenping Ma;Shaohui Sun
The 6G Computing Power Network (CPN) is envisioned to orchestrate vast, distributed computing resources for future intelligent applications. However, achieving efficient, trusted, and privacy-preserving computing resource sharing in this decentralized environment poses significant challenges. To address these intertwined issues, this article proposes a holistic blockchain and evolutionary algorithm-based computing resource sharing (BECS) mechanism. BECS is designed to dynamically and adaptively balance task offloading among computing resources within the 6G CPN, thereby enhancing resource utilization. We model computing resource sharing as a multi-objective optimization problem, aiming to navigate these trade-offs. To tackle this NP-hard problem, we devise a kernel-distance-based dominance relation and incorporate it into the Non-dominated Sorting Genetic Algorithm III (NSGA-III), thereby significantly enhancing population diversity. In addition, we propose a pseudonym scheme based on zero-knowledge proofs to protect user privacy during computing resource sharing. Finally, security analysis and simulation results demonstrate that BECS can effectively leverage all computing resources in the 6G CPN, thereby significantly improving resource utilization while preserving user privacy.
6G计算能力网络(CPN)旨在为未来的智能应用协调庞大的分布式计算资源。然而,在这种分散的环境中实现高效、可信和保护隐私的计算资源共享带来了重大挑战。为了解决这些相互交织的问题,本文提出了一种基于区块链和进化算法的整体计算资源共享(BECS)机制。BECS旨在动态、自适应地平衡6G CPN内计算资源之间的任务卸载,从而提高资源利用率。我们将计算资源共享建模为一个多目标优化问题,旨在导航这些权衡。为了解决这一np难题,我们设计了一种基于核距离的优势关系,并将其纳入非支配排序遗传算法III (NSGA-III)中,从而显著提高了种群多样性。此外,我们提出了一种基于零知识证明的假名方案,以保护计算资源共享过程中的用户隐私。最后,安全性分析和仿真结果表明,BECS可以有效地利用6G CPN中的所有计算资源,从而在保护用户隐私的同时显著提高资源利用率。
{"title":"BECS: A Privacy-Preserving Computing Resource Sharing Mechanism for 6G Computing Power Network","authors":"Kun Yan;Wenping Ma;Shaohui Sun","doi":"10.1109/TNSE.2025.3643634","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3643634","url":null,"abstract":"The 6G Computing Power Network (CPN) is envisioned to orchestrate vast, distributed computing resources for future intelligent applications. However, achieving efficient, trusted, and privacy-preserving computing resource sharing in this decentralized environment poses significant challenges. To address these intertwined issues, this article proposes a holistic blockchain and evolutionary algorithm-based computing resource sharing (BECS) mechanism. BECS is designed to dynamically and adaptively balance task offloading among computing resources within the 6G CPN, thereby enhancing resource utilization. We model computing resource sharing as a multi-objective optimization problem, aiming to navigate these trade-offs. To tackle this NP-hard problem, we devise a kernel-distance-based dominance relation and incorporate it into the Non-dominated Sorting Genetic Algorithm III (NSGA-III), thereby significantly enhancing population diversity. In addition, we propose a pseudonym scheme based on zero-knowledge proofs to protect user privacy during computing resource sharing. Finally, security analysis and simulation results demonstrate that BECS can effectively leverage all computing resources in the 6G CPN, thereby significantly improving resource utilization while preserving user privacy.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4725-4742"},"PeriodicalIF":7.9,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GraphQWalk: Learning Structural Node Embeddings via Continuous Quantum Walk GraphQWalk:通过连续量子行走学习结构节点嵌入
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-15 DOI: 10.1109/TNSE.2025.3644803
Guojun Liu;Juanhong Zhao;Houzhou Wei;Zhengxiong Zhou;Yunfei Song;Xiaomei Zhou;Guangzhi Qi
Structural node embedding is a fundamental technique for encoding the topology of a graph into low-dimensional vectors. However, many existing methods generate position-dependent embeddings, meaning that structurally similar nodes are represented dissimilarly merely due to their distance in the graph. Furthermore, these approaches often lack interpretability and robustness against structural noise. To address these challenges, this paper introduces GraphQWalk, an interpretable, unsupervised, and position-independent method that leverages the continuous quantum walk to capture structural features. Inspired by quantum physics, GraphQWalk first computes initial node features from the average transition probabilities of a particle in a continuous quantum walk. These features, encoding multi-scale structural information, are then aggregated within multi-hop neighborhoods to incorporate local context. Extensive experiments demonstrate that GraphQWalk effectively captures diverse structural roles, achieving superior robustness and performance over baseline models in downstream tasks from classification to cross-graph alignment.
结构节点嵌入是一种将图的拓扑结构编码为低维向量的基本技术。然而,许多现有的方法生成位置依赖的嵌入,这意味着结构相似的节点仅仅由于它们在图中的距离而被不同地表示。此外,这些方法往往缺乏可解释性和对结构噪声的鲁棒性。为了解决这些挑战,本文介绍了GraphQWalk,这是一种可解释的、无监督的、与位置无关的方法,它利用连续量子行走来捕获结构特征。受量子物理学的启发,GraphQWalk首先从连续量子行走中粒子的平均跃迁概率中计算初始节点特征。这些特征编码多尺度结构信息,然后在多跳邻域中聚合以结合本地上下文。大量的实验表明,GraphQWalk有效地捕获了不同的结构角色,在从分类到跨图对齐的下游任务中,比基线模型获得了更好的鲁棒性和性能。
{"title":"GraphQWalk: Learning Structural Node Embeddings via Continuous Quantum Walk","authors":"Guojun Liu;Juanhong Zhao;Houzhou Wei;Zhengxiong Zhou;Yunfei Song;Xiaomei Zhou;Guangzhi Qi","doi":"10.1109/TNSE.2025.3644803","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3644803","url":null,"abstract":"Structural node embedding is a fundamental technique for encoding the topology of a graph into low-dimensional vectors. However, many existing methods generate position-dependent embeddings, meaning that structurally similar nodes are represented dissimilarly merely due to their distance in the graph. Furthermore, these approaches often lack interpretability and robustness against structural noise. To address these challenges, this paper introduces GraphQWalk, an interpretable, unsupervised, and position-independent method that leverages the continuous quantum walk to capture structural features. Inspired by quantum physics, GraphQWalk first computes initial node features from the average transition probabilities of a particle in a continuous quantum walk. These features, encoding multi-scale structural information, are then aggregated within multi-hop neighborhoods to incorporate local context. Extensive experiments demonstrate that GraphQWalk effectively captures diverse structural roles, achieving superior robustness and performance over baseline models in downstream tasks from classification to cross-graph alignment.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4779-4796"},"PeriodicalIF":7.9,"publicationDate":"2025-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145886555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Link Enabled Reliable and Low Latency Transmission Design for Edge Estimation 边缘估计的可靠低延迟多链路传输设计
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-11 DOI: 10.1109/TNSE.2025.3642623
Siyu Qian;Xiaolin Wang;Fangfei Li;Yi'ang Ren
Edge computing enables real-time estimation for mission-critical Industrial Internet of Things (IIoT) systems by processing massive data streams at the network edge. Existing methods struggle to balance estimation performance and energy efficiency under varying reliability and latency requirements. We investigate Multi-Link Operation (MLO) to improve adaptability under dynamic wireless conditions. However, existing schemes offer limited flexibility in transmission modes and rely on simplified network models, which restricts the potential for MLO-specific performance optimization. To overcome these challenges, we propose a novel flexible transmission mode selection mechanism called Synchronous-Asynchronous Co-existence Multi-Link Aggregation (SACMLA). Based on switchable MLO modes, we formulate a scheduling-estimation co-design problem that optimizes the trade-off between estimation error covariance and transmission energy consumption. Given the environmental complexity and the action space explosion caused by the joint optimization of transmission mode, packet-to-link mapping, and energy allocation, we design a Proximal Policy Optimization (PPO)-based Hierarchical Deep Reinforcement Learning for Multi-Link Co-optimization (HDRL-MLC), a two-tier architecture where a PPO-based outer loop dynamically adjusts scheduling, and an inner loop optimizes energy allocation in MLO. Simulation results demonstrate the necessity of the SACMLA mechanism and highlight the superior performance of the PPO-based HDRL-MLC algorithm over flat algorithms in balancing multiple communication metrics and adapting to varying traffic conditions.
边缘计算通过在网络边缘处理大量数据流,实现对关键任务的工业物联网(IIoT)系统的实时评估。在不同的可靠性和延迟要求下,现有的方法难以平衡估计性能和能源效率。我们研究了多链路操作(MLO),以提高动态无线环境下的适应性。然而,现有方案在传输模式上提供的灵活性有限,并且依赖于简化的网络模型,这限制了mlo特定性能优化的潜力。为了克服这些挑战,我们提出了一种新的灵活的传输模式选择机制,称为同步-异步共存多链路聚合(SACMLA)。基于可切换的MLO模式,提出了一种调度-估计协同设计问题,优化了估计误差协方差与传输能耗之间的权衡。考虑到传输模式、包到链路映射和能量分配联合优化所带来的环境复杂性和动作空间爆炸,设计了一种基于近端策略优化(PPO)的分层深度强化学习多链路协同优化(HDRL-MLC),即基于PPO的外环动态调整调度,内环优化MLO中的能量分配的两层体系结构。仿真结果证明了SACMLA机制的必要性,并突出了基于ppo的HDRL-MLC算法在平衡多个通信指标和适应不同流量条件方面优于平面算法。
{"title":"Multi-Link Enabled Reliable and Low Latency Transmission Design for Edge Estimation","authors":"Siyu Qian;Xiaolin Wang;Fangfei Li;Yi'ang Ren","doi":"10.1109/TNSE.2025.3642623","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3642623","url":null,"abstract":"Edge computing enables real-time estimation for mission-critical Industrial Internet of Things (IIoT) systems by processing massive data streams at the network edge. Existing methods struggle to balance estimation performance and energy efficiency under varying reliability and latency requirements. We investigate Multi-Link Operation (MLO) to improve adaptability under dynamic wireless conditions. However, existing schemes offer limited flexibility in transmission modes and rely on simplified network models, which restricts the potential for MLO-specific performance optimization. To overcome these challenges, we propose a novel flexible transmission mode selection mechanism called Synchronous-Asynchronous Co-existence Multi-Link Aggregation (SACMLA). Based on switchable MLO modes, we formulate a scheduling-estimation co-design problem that optimizes the trade-off between estimation error covariance and transmission energy consumption. Given the environmental complexity and the action space explosion caused by the joint optimization of transmission mode, packet-to-link mapping, and energy allocation, we design a Proximal Policy Optimization (PPO)-based Hierarchical Deep Reinforcement Learning for Multi-Link Co-optimization (HDRL-MLC), a two-tier architecture where a PPO-based outer loop dynamically adjusts scheduling, and an inner loop optimizes energy allocation in MLO. Simulation results demonstrate the necessity of the SACMLA mechanism and highlight the superior performance of the PPO-based HDRL-MLC algorithm over flat algorithms in balancing multiple communication metrics and adapting to varying traffic conditions.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4707-4724"},"PeriodicalIF":7.9,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rebalanced Divergence-Enhanced Adversarial Training for Long-Tailed Robustness 长尾鲁棒性的再平衡发散增强对抗训练
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-10 DOI: 10.1109/TNSE.2025.3642330
Kang Hao Cheong
In recent years, the adversarial robustness of deep neural networks has been widely studied. Several attack and defense models have been proposed to date for models focusing on balanced datasets. However, the adversarial robustness study for imbalanced (long-tailed) datasets has rarely been investigated. Recently, a study investigated the combination of re-balancing tricks focusing on adversarial robustness. However, such adversarial training may not be suitable for long-tailed robustness. We observe that the adversarial samples from long-tailed datasets require additional exploration divergence in the sampling space. To solve this problem, we propose a Rebalanced Divergence-Enhanced Adversarial Training method (RbDAT) to improve the adversarial robustness of long-tailed classes. Our model comprises two parts, a re-balanced loss to avoid discrimination for tail classes and adversarial distributional learning to fully explore the adversarial perturbation space. We demonstrate the effectiveness of the proposed method by outperforming the state-of-the-art (SOTA) method. i.e., RbDAT outperforms the SOTA method with a clear margin of 5.01% under a projected gradient descent (PGD) attack on the CIFAR-10-LT dataset.
近年来,深度神经网络的对抗鲁棒性得到了广泛的研究。迄今为止,针对专注于平衡数据集的模型,已经提出了几种攻击和防御模型。然而,针对不平衡(长尾)数据集的对抗鲁棒性研究很少被研究。最近,一项研究调查了重新平衡技巧的组合,重点是对抗性鲁棒性。然而,这种对抗性训练可能不适合长尾鲁棒性。我们观察到,来自长尾数据集的对抗性样本需要在采样空间中进行额外的探索发散。为了解决这一问题,我们提出了一种再平衡发散增强对抗训练方法(RbDAT)来提高长尾类的对抗鲁棒性。我们的模型包括两个部分,一个是重新平衡损失,以避免对尾类的歧视,另一个是对抗性分布学习,以充分探索对抗性扰动空间。我们通过优于最先进的(SOTA)方法来证明所提出方法的有效性。也就是说,在CIFAR-10-LT数据集的预测梯度下降(PGD)攻击下,RbDAT以5.01%的明显优势优于SOTA方法。
{"title":"Rebalanced Divergence-Enhanced Adversarial Training for Long-Tailed Robustness","authors":"Kang Hao Cheong","doi":"10.1109/TNSE.2025.3642330","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3642330","url":null,"abstract":"In recent years, the adversarial robustness of deep neural networks has been widely studied. Several attack and defense models have been proposed to date for models focusing on balanced datasets. However, the adversarial robustness study for imbalanced (long-tailed) datasets has rarely been investigated. Recently, a study investigated the combination of re-balancing tricks focusing on adversarial robustness. However, such adversarial training may not be suitable for long-tailed robustness. We observe that the adversarial samples from long-tailed datasets require additional exploration divergence in the sampling space. To solve this problem, we propose a <bold>R</b>ebalanced <bold>D</b>ivergence-Enhanced <bold>A</b>dversarial <bold>T</b>raining method (RbDAT) to improve the adversarial robustness of long-tailed classes. Our model comprises two parts, a re-balanced loss to avoid discrimination for tail classes and adversarial distributional learning to fully explore the adversarial perturbation space. We demonstrate the effectiveness of the proposed method by outperforming the state-of-the-art (SOTA) method. i.e., RbDAT outperforms the SOTA method with a clear margin of 5.01% under a projected gradient descent (PGD) attack on the CIFAR-10-LT dataset.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5721-5735"},"PeriodicalIF":7.9,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drone-Aided Secure Task Offloading Optimization for Internet of Vehicles: Review, Challenges and Method 无人机辅助的车联网安全任务卸载优化:综述、挑战与方法
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-09 DOI: 10.1109/TNSE.2025.3641579
Ye Wang;Jingjing Wang;Jianrui Chen;Xiangwang Hou;Ziyang Wang;Chunxiao Jiang
The evolution of the Internet of Vehicles (IoV) has introduced computation-intensive and latency-sensitive applications that challenge traditional cloud architectures. Although drone-aided IoV offers a flexible solution, it presents a complex optimization problem. The core challenge lies in balancing task offloading efficiency with crucial operational safety constraints, such as collision avoidance and battery management, a gap often overlooked in existing research. This paper addresses this problem by first modeling the drone-aided task offloading system as a constrained multi-agent Markov decision process. Based on this framework, we propose a novel safe multi-agent reinforcement learning algorithm (MARL) named Lagrangian-constrained multi-agent policy optimization (LC-MAPO). The LC-MAPO integrates safety constraints into the twin delayed deep deterministic policy gradient (TD3) actor-critic framework using Lagrangian duality theory. The algorithm's effectiveness was validated in three distinct simulation scenarios and compared against an unconstrained multi-agent deep deterministic policy gradient (MADDPG) algorithm and a greedy algorithm. Experimental results demonstrate that LC-MAPO achieves superior performance in both safety adherence and task processing efficiency.
车联网(IoV)的发展带来了计算密集型和延迟敏感型应用,挑战了传统的云架构。尽管无人机辅助车联网提供了一个灵活的解决方案,但它提出了一个复杂的优化问题。核心挑战在于平衡任务卸载效率和关键的操作安全约束,如避免碰撞和电池管理,这在现有研究中经常被忽视。本文首先将无人机辅助任务卸载系统建模为约束多智能体马尔可夫决策过程来解决这一问题。基于此框架,我们提出了一种安全的多智能体强化学习算法——拉格朗日约束多智能体策略优化算法(LC-MAPO)。LC-MAPO使用拉格朗日对偶理论将安全约束集成到双延迟深度确定性策略梯度(TD3)参与者-批评框架中。通过三种不同的仿真场景验证了该算法的有效性,并与无约束多智能体深度确定性策略梯度(madpg)算法和贪心算法进行了比较。实验结果表明,LC-MAPO在安全依从性和任务处理效率方面都取得了优异的成绩。
{"title":"Drone-Aided Secure Task Offloading Optimization for Internet of Vehicles: Review, Challenges and Method","authors":"Ye Wang;Jingjing Wang;Jianrui Chen;Xiangwang Hou;Ziyang Wang;Chunxiao Jiang","doi":"10.1109/TNSE.2025.3641579","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3641579","url":null,"abstract":"The evolution of the Internet of Vehicles (IoV) has introduced computation-intensive and latency-sensitive applications that challenge traditional cloud architectures. Although drone-aided IoV offers a flexible solution, it presents a complex optimization problem. The core challenge lies in balancing task offloading efficiency with crucial operational safety constraints, such as collision avoidance and battery management, a gap often overlooked in existing research. This paper addresses this problem by first modeling the drone-aided task offloading system as a constrained multi-agent Markov decision process. Based on this framework, we propose a novel safe multi-agent reinforcement learning algorithm (MARL) named Lagrangian-constrained multi-agent policy optimization (LC-MAPO). The LC-MAPO integrates safety constraints into the twin delayed deep deterministic policy gradient (TD3) actor-critic framework using Lagrangian duality theory. The algorithm's effectiveness was validated in three distinct simulation scenarios and compared against an unconstrained multi-agent deep deterministic policy gradient (MADDPG) algorithm and a greedy algorithm. Experimental results demonstrate that LC-MAPO achieves superior performance in both safety adherence and task processing efficiency.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4596-4615"},"PeriodicalIF":7.9,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully Distributed Nash Equilibrium Search for Aggregate Games Under Coupling Constraints With Bounded Disturbances 具有有界扰动的耦合约束下集合对策的全分布纳什均衡搜索
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-09 DOI: 10.1109/TNSE.2025.3642184
Yixuan Lv;Lei Liu;Yan-Jun Liu;Yang Chen
In this article, based on nodes and edges, we research the fully distributed generalized Nash equilibrium (GNE) search problem for aggregate games under coupling constraints with bounded disturbances. In order to solve this problem, the node adaptive control law and edge adaptive control law are introdued. In the node-based adaptive control law, agents dynamically adjust their weights through parameters tuning, whereas the edge-based adaptive control law introduces additional adjustable parameters to enable the multi-agent system to autonomously regulate the gain size. Compared with the aggregation game discussed earlier, it can make the agent adjust its behavior under the condition of complete information. Then, it is proved that the GNE of the system can remain asymptotically stable under these two strategies. Although preliminary explorations of disturbances mitigation in GNE problems exist in the literature, the dynamic compensation mechanisms and system performance control under bounded disturbances in aggregation games with coupling constraints remain insufficiently explored. In this article, the disturbances compensations are designed to minimize the damage of the system by keeping the system stable when bounded disturbances occur in the aggregate game under coupling constraints. Finally, the real effectiveness of the designed strategy is proved by simulation experiments.
本文在节点和边的基础上,研究了具有有界干扰的耦合约束下集合对策的全分布广义纳什均衡(GNE)搜索问题。为了解决这一问题,引入了节点自适应控制律和边缘自适应控制律。在基于节点的自适应控制律中,智能体通过参数整定来动态调整其权值,而基于边缘的自适应控制律引入了额外的可调参数,使多智能体系统能够自主调节增益大小。与前面讨论的聚合对策相比,它可以使agent在完全信息条件下调整自己的行为。然后,证明了在这两种策略下,系统的GNE可以保持渐近稳定。虽然已有文献对GNE问题中的干扰缓解进行了初步探索,但对耦合约束下有界干扰下的聚集对策动态补偿机制和系统性能控制的探索还不够。在本文中,干扰补偿的目的是在耦合约束下,当聚集对策中出现有界干扰时,通过保持系统稳定来使系统的损害最小化。最后,通过仿真实验验证了所设计策略的有效性。
{"title":"Fully Distributed Nash Equilibrium Search for Aggregate Games Under Coupling Constraints With Bounded Disturbances","authors":"Yixuan Lv;Lei Liu;Yan-Jun Liu;Yang Chen","doi":"10.1109/TNSE.2025.3642184","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3642184","url":null,"abstract":"In this article, based on nodes and edges, we research the fully distributed generalized Nash equilibrium (GNE) search problem for aggregate games under coupling constraints with bounded disturbances. In order to solve this problem, the node adaptive control law and edge adaptive control law are introdued. In the node-based adaptive control law, agents dynamically adjust their weights through parameters tuning, whereas the edge-based adaptive control law introduces additional adjustable parameters to enable the multi-agent system to autonomously regulate the gain size. Compared with the aggregation game discussed earlier, it can make the agent adjust its behavior under the condition of complete information. Then, it is proved that the GNE of the system can remain asymptotically stable under these two strategies. Although preliminary explorations of disturbances mitigation in GNE problems exist in the literature, the dynamic compensation mechanisms and system performance control under bounded disturbances in aggregation games with coupling constraints remain insufficiently explored. In this article, the disturbances compensations are designed to minimize the damage of the system by keeping the system stable when bounded disturbances occur in the aggregate game under coupling constraints. Finally, the real effectiveness of the designed strategy is proved by simulation experiments.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4651-4668"},"PeriodicalIF":7.9,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and Accurate Privacy-Preserving Task Allocation for Unmanned Aerial Vehicle-Based Mobile Crowdsensing 基于无人机的移动人群感知中高效准确的隐私保护任务分配
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-08 DOI: 10.1109/TNSE.2025.3641172
Bowen Zhao;Siyuan Guan;Minghui Chen;Jiali Wu;Cheng Qiao;Yang Xiao
Unmanned aerial vehicle-based mobile crowdsensing (UAV-MCS) has emerged as a promising paradigm for large-scale data collection in low-altitude environments. Efficient task allocation is critical in UAV-MCS to reduce the flight distance of UAVs and ensure timely data acquisition. However, since UAVs typically depart from the locations of their operators, task allocation based on geographical coordinates can leak the location privacy of both UAV operators (called workers for simplicity) and task requesters. Existing privacy-preserving task allocation schemes often focus solely on protecting the privacy of UAV operators, while neglecting that of task requesters, and many fail to achieve accurate allocation results, particularly in multi-task scenarios. To address these challenges, we propose an efficient and accurate privacy-preserving task allocation scheme for UAV-MCS that leverages additive secret sharing to simultaneously protect the locations of both UAV operators and task requesters. To enable accurate allocation, we design a privacy-preserving comparison protocol (PAC) based on additive secret sharing and an optimized Paillier cryptosystem. Moreover, to support multi-task allocation under privacy constraints, we develop a privacy-preserving version of the Hungarian method. Experimental results on both real-world and synthetic datasets demonstrate that our scheme effectively reduces UAV travel distance while preserving location privacy, outperforming existing schemes in both efficiency and accuracy.
基于无人机的移动人群传感(UAV-MCS)已经成为低空环境下大规模数据收集的一个有前途的范例。有效的任务分配是减少无人机飞行距离和保证数据及时获取的关键。然而,由于无人机通常离开其操作员的位置,基于地理坐标的任务分配可能泄露无人机操作员(简单地称为工作人员)和任务请求者的位置隐私。现有的保护隐私的任务分配方案往往只关注保护无人机操作人员的隐私,而忽略了任务请求者的隐私,许多方案无法获得准确的分配结果,特别是在多任务场景下。为了解决这些挑战,我们提出了一种高效准确的无人机- mcs任务分配方案,该方案利用附加秘密共享来同时保护无人机操作员和任务请求者的位置。为了实现准确的分配,我们设计了一种基于加性秘密共享和优化的Paillier密码系统的隐私保护比较协议(PAC)。此外,为了支持隐私约束下的多任务分配,我们开发了匈牙利方法的隐私保护版本。在真实数据集和合成数据集上的实验结果表明,该方案在保持位置隐私的同时有效地减少了无人机的飞行距离,在效率和精度上都优于现有方案。
{"title":"Efficient and Accurate Privacy-Preserving Task Allocation for Unmanned Aerial Vehicle-Based Mobile Crowdsensing","authors":"Bowen Zhao;Siyuan Guan;Minghui Chen;Jiali Wu;Cheng Qiao;Yang Xiao","doi":"10.1109/TNSE.2025.3641172","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3641172","url":null,"abstract":"Unmanned aerial vehicle-based mobile crowdsensing (UAV-MCS) has emerged as a promising paradigm for large-scale data collection in low-altitude environments. Efficient task allocation is critical in UAV-MCS to reduce the flight distance of UAVs and ensure timely data acquisition. However, since UAVs typically depart from the locations of their operators, task allocation based on geographical coordinates can leak the location privacy of both UAV operators (called workers for simplicity) and task requesters. Existing privacy-preserving task allocation schemes often focus solely on protecting the privacy of UAV operators, while neglecting that of task requesters, and many fail to achieve accurate allocation results, particularly in multi-task scenarios. To address these challenges, we propose an efficient and accurate privacy-preserving task allocation scheme for UAV-MCS that leverages additive secret sharing to simultaneously protect the locations of both UAV operators and task requesters. To enable accurate allocation, we design a privacy-preserving comparison protocol (PAC) based on additive secret sharing and an optimized Paillier cryptosystem. Moreover, to support multi-task allocation under privacy constraints, we develop a privacy-preserving version of the Hungarian method. Experimental results on both real-world and synthetic datasets demonstrate that our scheme effectively reduces UAV travel distance while preserving location privacy, outperforming existing schemes in both efficiency and accuracy.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5638-5653"},"PeriodicalIF":7.9,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Pilot Assignment for D2D-Underlaid NOMA Cell-Free Massive MIMO Systems: A Hypergraph Coloring Approach 基于d2d的NOMA无单元大规模MIMO系统的有效导频分配:超图着色方法
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-05 DOI: 10.1109/TNSE.2025.3640946
Qin Wang;Haotian Chang;Yongxu Zhu;Mei Chen;Li Gao;Wenchao Xia;Haitao Zhao
In this paper, a cell-free massive multiple-input multiple-output (CF-mMIMO) system coexisting with device-to-device (D2D) pairs is investigated under ultra-dense wireless networks (UDWNs), aiming to accommodate the growing number of devices and escalating data traffic demands in future sixth-generation (6G) networks. To overcome the challenge of pilot shortage in UDWNs, non-orthogonal multiple-access (NOMA) and successive interference cancellation (SIC) technologies are employed, enabling users within the same cluster to share pilots efficiently. A closed-form expression for the spectral efficiency of conjugate beamforming receivers is derived, revealing that pilot contamination caused by pilot sharing severely degrades system performance. A novel hypergraph coloring (HGC)-based pilot assignment algorithm is proposed to address this issue, effectively capturing the complex cumulative interference among multiple users and D2D pairs. The algorithm constructs users’ interference hypergraphs using a user-centric access point (AP) selection strategy and allocates pilots based on interference weights within these hyperedges. Numerical results demonstrate that the proposed scheme significantly improves spectral efficiency, offering a promising solution for interference management in CF-mMIMO systems under UDWNs.
本文研究了在超密集无线网络(UDWNs)下与设备对设备(D2D)对共存的无蜂窝大规模多输入多输出(CF-mMIMO)系统,旨在适应未来第六代(6G)网络中不断增长的设备数量和不断升级的数据流量需求。为了克服udwn导频不足的挑战,采用了非正交多址(NOMA)和连续干扰消除(SIC)技术,使同一集群内的用户能够有效地共享导频。推导了共轭波束形成接收机频谱效率的封闭表达式,揭示了由导频共享引起的导频污染严重降低了系统性能。针对这一问题,提出了一种基于超图着色(hypergraph coloring, HGC)的导频分配算法,该算法能够有效地捕获多个用户和D2D对之间复杂的累积干扰。该算法采用以用户为中心的接入点(AP)选择策略构建用户干扰超图,并根据这些超边缘内的干扰权重分配导频。数值计算结果表明,该方案显著提高了频谱效率,为在UDWNs下的CF-mMIMO系统的干扰管理提供了一种有希望的解决方案。
{"title":"Efficient Pilot Assignment for D2D-Underlaid NOMA Cell-Free Massive MIMO Systems: A Hypergraph Coloring Approach","authors":"Qin Wang;Haotian Chang;Yongxu Zhu;Mei Chen;Li Gao;Wenchao Xia;Haitao Zhao","doi":"10.1109/TNSE.2025.3640946","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3640946","url":null,"abstract":"In this paper, a cell-free massive multiple-input multiple-output (CF-mMIMO) system coexisting with device-to-device (D2D) pairs is investigated under ultra-dense wireless networks (UDWNs), aiming to accommodate the growing number of devices and escalating data traffic demands in future sixth-generation (6G) networks. To overcome the challenge of pilot shortage in UDWNs, non-orthogonal multiple-access (NOMA) and successive interference cancellation (SIC) technologies are employed, enabling users within the same cluster to share pilots efficiently. A closed-form expression for the spectral efficiency of conjugate beamforming receivers is derived, revealing that pilot contamination caused by pilot sharing severely degrades system performance. A novel hypergraph coloring (HGC)-based pilot assignment algorithm is proposed to address this issue, effectively capturing the complex cumulative interference among multiple users and D2D pairs. The algorithm constructs users’ interference hypergraphs using a user-centric access point (AP) selection strategy and allocates pilots based on interference weights within these hyperedges. Numerical results demonstrate that the proposed scheme significantly improves spectral efficiency, offering a promising solution for interference management in CF-mMIMO systems under UDWNs.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4636-4650"},"PeriodicalIF":7.9,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145830799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-Based Weakly Supervised Traffic Anomaly Detection for IoT Networks 基于drl的物联网弱监督流量异常检测
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-04 DOI: 10.1109/TNSE.2025.3640175
Ziteng Wang;Yiheng Ruan;Xianjun Deng;Xiaoxuan Fan;Shenghao Liu;Wei Feng;Deng Zhang
With the proliferation of Internet of Things (IoT) devices, IoT systems face increasingly severe threats from large-scale cyberattacks during network communications. To effectively recognize potential network threats and ensure the security of IoT, network traffic anomaly detection has been widely studied. Due to the high cost of manual labeling in real-world scenarios, only limited network traffic data is explicitly labeled as abnormal or normal. However, most existing anomaly detection methods struggle to enhance detection accuracy with minimal supervision and perform ineffectively at identifying potential unknown anomalies in unlabeled data. To address these limitations, this paper proposes WADE, a Weakly supervised Anomaly DEtection method based on Deep Reinforcement Learning (DRL). WADE enables simultaneous identification of known and unknown anomaly traffic with limited labeled data. Specifically, it incorporates a Dueling Q-network architecture and introduces a novel reward optimization mechanism that: 1) strengthens feature extraction from unlabeled data and 2) elevates decision accuracy via dynamic reward adaptation. Extensive experiments on IoT traffic datasets demonstrate that WADE outperforms four peer weakly supervised methods, achieving performance improvements of 12.2$%$ in Area Under the Precision-Recall Curve (AUC-PR) and 6.6$%$ in Area Under the Receiver Operating Characteristic Curve (AUC-ROC), which validate the effectiveness of WADE in safeguarding IoT systems.
随着物联网(IoT)设备的激增,物联网系统在网络通信过程中面临的大规模网络攻击威胁日益严重。为了有效识别潜在的网络威胁,保障物联网的安全,网络流量异常检测得到了广泛的研究。由于实际场景中手工标注的成本较高,只有有限的网络流量数据被明确标注为异常或正常。然而,大多数现有的异常检测方法都难以在最小监督下提高检测精度,并且在识别未标记数据中的潜在未知异常方面表现不佳。为了解决这些限制,本文提出了WADE,一种基于深度强化学习(DRL)的弱监督异常检测方法。WADE可以使用有限的标记数据同时识别已知和未知的异常流量。具体来说,它结合了Dueling Q-network架构,并引入了一种新的奖励优化机制,该机制可以:1)加强对未标记数据的特征提取;2)通过动态奖励适应提高决策准确性。在物联网流量数据集上的大量实验表明,WADE优于四种弱监督方法,在精确召回率曲线下的面积(AUC-PR)和接收器工作特征曲线下的面积(AUC-ROC)上的性能分别提高了12.2美元和6.6美元,验证了WADE在保护物联网系统方面的有效性。
{"title":"DRL-Based Weakly Supervised Traffic Anomaly Detection for IoT Networks","authors":"Ziteng Wang;Yiheng Ruan;Xianjun Deng;Xiaoxuan Fan;Shenghao Liu;Wei Feng;Deng Zhang","doi":"10.1109/TNSE.2025.3640175","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3640175","url":null,"abstract":"With the proliferation of Internet of Things (IoT) devices, IoT systems face increasingly severe threats from large-scale cyberattacks during network communications. To effectively recognize potential network threats and ensure the security of IoT, network traffic anomaly detection has been widely studied. Due to the high cost of manual labeling in real-world scenarios, only limited network traffic data is explicitly labeled as abnormal or normal. However, most existing anomaly detection methods struggle to enhance detection accuracy with minimal supervision and perform ineffectively at identifying potential unknown anomalies in unlabeled data. To address these limitations, this paper proposes WADE, a <italic>Weakly supervised Anomaly DEtection</i> method based on Deep Reinforcement Learning (DRL). WADE enables simultaneous identification of known and unknown anomaly traffic with limited labeled data. Specifically, it incorporates a Dueling Q-network architecture and introduces a novel reward optimization mechanism that: 1) strengthens feature extraction from unlabeled data and 2) elevates decision accuracy via dynamic reward adaptation. Extensive experiments on IoT traffic datasets demonstrate that WADE outperforms four peer weakly supervised methods, achieving performance improvements of 12.2<inline-formula><tex-math>$%$</tex-math></inline-formula> in Area Under the Precision-Recall Curve (AUC-PR) and 6.6<inline-formula><tex-math>$%$</tex-math></inline-formula> in Area Under the Receiver Operating Characteristic Curve (AUC-ROC), which validate the effectiveness of WADE in safeguarding IoT systems.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4562-4577"},"PeriodicalIF":7.9,"publicationDate":"2025-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145879968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1