首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
A Blockchain-Enabled Secure Authentication and Fair Trading Scheme for Shared Charging Systems 基于区块链的共享收费系统安全认证与公平交易方案
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-26 DOI: 10.1109/TNSE.2025.3648844
Changbing Bi;Yue Cao;Yanzhen Ren;Youliang Tian;Lin Wan;Wei Ke
With the rapid development of the Electric Vehicle (EV) market, the growing demand for electricity charging has driven the evolution of private charging infrastructure toward shared deployment. Shared Charging Systems (SCSs) play a vital role in integrating both private and public Charging Piles (CPs), thereby improving overall resource utilization. However, such multi-party SCSs introduce challenges in security and fairness. EVs and CPs exchange parameters via wireless communication to optimize the charging process, which may exposes various threats such as tampering, eavesdropping, replay, and deletion attacks. Meanwhile, the distributed deployment of CPs complicates charging fee calculation management and may lead to issues such as malicious overcharging. To address these challenges, we propose a blockchain-enabled secure authentication and fair trading scheme, ensuring secure communication while guaranteeing transparency and fairness for SCSs. First, we design a pairing-free heterogeneous signcryption algorithm that supports distributed key generation. It realizes efficient mutual authentication based on this algorithm while preventing information leakage during the process. We provide a rigorous security proof under the Random Oracle Model (ROM) to establish its security. Second, we develop a blockchain-based smart contract mechanism to enable decentralized and transparent charging fee calculation, as well as automated payments. By eliminating third-party intermediaries, our solution reduces trading costs whle effectively addresses challenges such as charging fee calculation difficulties and malicious overcharging in distributed CP deployments. Experimental results show that the proposed scheme outperforms existing approaches in terms of both computational and communication overhead. Additionally, our smart contracts incur extremely low gas costs, enhancing the feasibility of the scheme.
随着电动汽车市场的快速发展,不断增长的充电需求推动了私人充电基础设施向共享部署的演变。共享充电系统在整合私人和公共充电桩方面发挥着至关重要的作用,从而提高整体资源利用率。然而,这种多方安全保障机制在安全性和公平性方面带来了挑战。电动汽车和CPs通过无线通信交换参数,优化充电过程,这可能会暴露出篡改、窃听、重放、删除攻击等各种威胁。同时,CPs的分布式部署使收费费用的计算管理复杂化,可能导致恶意超额收费等问题。为了应对这些挑战,我们提出了一种支持区块链的安全认证和公平交易方案,确保安全通信,同时保证scs的透明度和公平性。首先,我们设计了一个支持分布式密钥生成的无配对异构签名加密算法。在此基础上实现了高效的相互认证,同时防止了认证过程中的信息泄露。我们在随机Oracle模型(ROM)下提供了严格的安全性证明来证明其安全性。其次,我们开发了基于区块链的智能合约机制,以实现分散和透明的收费计算以及自动支付。通过消除第三方中介,我们的解决方案降低了交易成本,同时有效地解决了分布式CP部署中的收费计算困难和恶意超额收费等挑战。实验结果表明,该方案在计算量和通信开销方面都优于现有方法。此外,我们的智能合约产生极低的天然气成本,提高了方案的可行性。
{"title":"A Blockchain-Enabled Secure Authentication and Fair Trading Scheme for Shared Charging Systems","authors":"Changbing Bi;Yue Cao;Yanzhen Ren;Youliang Tian;Lin Wan;Wei Ke","doi":"10.1109/TNSE.2025.3648844","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3648844","url":null,"abstract":"With the rapid development of the Electric Vehicle (EV) market, the growing demand for electricity charging has driven the evolution of private charging infrastructure toward shared deployment. Shared Charging Systems (SCSs) play a vital role in integrating both private and public Charging Piles (CPs), thereby improving overall resource utilization. However, such multi-party SCSs introduce challenges in security and fairness. EVs and CPs exchange parameters via wireless communication to optimize the charging process, which may exposes various threats such as tampering, eavesdropping, replay, and deletion attacks. Meanwhile, the distributed deployment of CPs complicates charging fee calculation management and may lead to issues such as malicious overcharging. To address these challenges, we propose a blockchain-enabled secure authentication and fair trading scheme, ensuring secure communication while guaranteeing transparency and fairness for SCSs. First, we design a pairing-free heterogeneous signcryption algorithm that supports distributed key generation. It realizes efficient mutual authentication based on this algorithm while preventing information leakage during the process. We provide a rigorous security proof under the Random Oracle Model (ROM) to establish its security. Second, we develop a blockchain-based smart contract mechanism to enable decentralized and transparent charging fee calculation, as well as automated payments. By eliminating third-party intermediaries, our solution reduces trading costs whle effectively addresses challenges such as charging fee calculation difficulties and malicious overcharging in distributed CP deployments. Experimental results show that the proposed scheme outperforms existing approaches in terms of both computational and communication overhead. Additionally, our smart contracts incur extremely low gas costs, enhancing the feasibility of the scheme.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5603-5621"},"PeriodicalIF":7.9,"publicationDate":"2025-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Guided Topic Detection Model Based on Data Augmentation and Feature Representation 基于数据增强和特征表示的引导主题检测模型
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-23 DOI: 10.1109/TNSE.2025.3647512
Rong Wang;Runyu Mao;Tao Wen;Shihong Wei;Qian Li;Yunpeng Xiao
In social networks, the accurate detection of guided topics is of great significance for maintaining the healthy order of the network. Aiming at the high-dimensionality of its feature space and the hiddenness of users' emotions, a guided topic detection method based on data enhancement and feature representation is proposed. Firstly, to address the problem of sparse effective data and high-dimensional heterogeneity in the early stage of guided topic, GAN network is introduced to realize homomorphic compensation of data and enhance data diversity. Meanwhile, the SC2vec method is designed to realize the low-rank densification of data. In addition, random wandering is introduced to mine the implicit association network among users and to realize the fusion of multi-dimensional information. Secondly, to address the problem of the hidden nature of users' emotional polarity, the internal attributes and external influences of users are mined. The fine-grained emotional influence factors based on linear multiple regression are constructed. At the same time, the evolutionary game theory is introduced to build an emotional interaction game model between users to reveal the dynamic evolution law of users' emotions. The experimental results show that the method not only successfully realizes the low-rank densification of data and the deep mining of implicit user emotions, but also achieves significant improvement in the accuracy of guided topic detection.
在社交网络中,引导话题的准确检测对于维护网络的健康秩序具有重要意义。针对其特征空间的高维性和用户情感的隐蔽性,提出了一种基于数据增强和特征表示的引导性主题检测方法。首先,针对引导主题早期有效数据稀疏、高维异构的问题,引入GAN网络实现数据同态补偿,增强数据多样性;同时,设计了SC2vec方法,实现了数据的低秩密度化。此外,引入随机漫游来挖掘用户间的隐式关联网络,实现多维信息的融合。其次,针对用户情感极性的隐藏性问题,挖掘用户的内部属性和外部影响。构建了基于线性多元回归的细粒度情感影响因素。同时,引入进化博弈论,构建用户间情感互动博弈模型,揭示用户情感的动态演化规律。实验结果表明,该方法不仅成功地实现了数据的低秩密集化和用户隐式情感的深度挖掘,而且在引导主题检测的准确率上也有了显著提高。
{"title":"A Guided Topic Detection Model Based on Data Augmentation and Feature Representation","authors":"Rong Wang;Runyu Mao;Tao Wen;Shihong Wei;Qian Li;Yunpeng Xiao","doi":"10.1109/TNSE.2025.3647512","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3647512","url":null,"abstract":"In social networks, the accurate detection of guided topics is of great significance for maintaining the healthy order of the network. Aiming at the high-dimensionality of its feature space and the hiddenness of users' emotions, a guided topic detection method based on data enhancement and feature representation is proposed. Firstly, to address the problem of sparse effective data and high-dimensional heterogeneity in the early stage of guided topic, GAN network is introduced to realize homomorphic compensation of data and enhance data diversity. Meanwhile, the SC2vec method is designed to realize the low-rank densification of data. In addition, random wandering is introduced to mine the implicit association network among users and to realize the fusion of multi-dimensional information. Secondly, to address the problem of the hidden nature of users' emotional polarity, the internal attributes and external influences of users are mined. The fine-grained emotional influence factors based on linear multiple regression are constructed. At the same time, the evolutionary game theory is introduced to build an emotional interaction game model between users to reveal the dynamic evolution law of users' emotions. The experimental results show that the method not only successfully realizes the low-rank densification of data and the deep mining of implicit user emotions, but also achieves significant improvement in the accuracy of guided topic detection.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5110-5127"},"PeriodicalIF":7.9,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Community Detection in Complex Networks: A Brief Survey and an Algorithm Based on Identifying High-Quality Core Region 复杂网络中的局部社区检测:综述及基于高质量核心区识别的算法
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-22 DOI: 10.1109/TNSE.2025.3645073
Qianqian Cai;Tong Wang;Mali Xing;Yanyan Ye;Minyue Fu
Community detection is capable of uncovering the inherent structure and functional organization within complex networks by analyzing multi-scale topological features. According to the brief survey, local detection methods demonstrate notable strengths, but challenges persist in selecting suitable seeds, identifying community cores, and precisely extending communities. Therefore, in this paper, a local community detection algorithm based on identifying high-quality core region is proposed. Specifically, at the seed selection stage, a core cohesiveness index is constructed to quantify the node importance, with two-step filtering strategy implemented to refine the selection of suitable seeds. After that, a hierarchical affinity evaluation mechanism is proposed on the basis of node-core affinity values to ensure the formation of high-quality core region (i.e., high-quality initial community). Community extension is then achieved by using the enhanced objective function combined with an incremental update strategy, it preserves structural cohesion and reduces computational costs. Finally, the membership assignments of the remaining nodes will be further processed through community optimization to refine community boundaries. Experimental results demonstrate that our proposed algorithm outperforms other community detection algorithms with relatively low time complexities across multi-scale real-world and synthetic networks.
社区检测通过分析复杂网络的多尺度拓扑特征,揭示复杂网络的内在结构和功能组织。简要调查表明,局部检测方法具有明显的优势,但在选择合适的种子、确定群落核心和精确扩展群落方面仍然存在挑战。为此,本文提出了一种基于高质量核心区识别的局部社区检测算法。具体而言,在种子选择阶段,构建核心凝聚力指标来量化节点的重要性,并采用两步过滤策略来细化种子的选择。在此基础上,提出了基于节点-核心亲和度值的分级亲和度评价机制,以确保形成高质量的核心区(即高质量的初始群落)。利用增强的目标函数与增量更新策略相结合实现群体扩展,既保持了结构内聚性,又降低了计算成本。最后,通过社区优化进一步处理剩余节点的归属分配,细化社区边界。实验结果表明,我们提出的算法在多尺度真实世界和合成网络中以相对较低的时间复杂度优于其他社区检测算法。
{"title":"Local Community Detection in Complex Networks: A Brief Survey and an Algorithm Based on Identifying High-Quality Core Region","authors":"Qianqian Cai;Tong Wang;Mali Xing;Yanyan Ye;Minyue Fu","doi":"10.1109/TNSE.2025.3645073","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645073","url":null,"abstract":"Community detection is capable of uncovering the inherent structure and functional organization within complex networks by analyzing multi-scale topological features. According to the brief survey, local detection methods demonstrate notable strengths, but challenges persist in selecting suitable seeds, identifying community cores, and precisely extending communities. Therefore, in this paper, a local community detection algorithm based on identifying high-quality core region is proposed. Specifically, at the seed selection stage, a core cohesiveness index is constructed to quantify the node importance, with two-step filtering strategy implemented to refine the selection of suitable seeds. After that, a hierarchical affinity evaluation mechanism is proposed on the basis of node-core affinity values to ensure the formation of high-quality core region (i.e., high-quality initial community). Community extension is then achieved by using the enhanced objective function combined with an incremental update strategy, it preserves structural cohesion and reduces computational costs. Finally, the membership assignments of the remaining nodes will be further processed through community optimization to refine community boundaries. Experimental results demonstrate that our proposed algorithm outperforms other community detection algorithms with relatively low time complexities across multi-scale real-world and synthetic networks.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5489-5504"},"PeriodicalIF":7.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk-Conscious Computing in Space-Air-Ground IoT Networks: A Prospect-Theoretic Game Perspective 空间-空地物联网网络中的风险意识计算:前景论博弈视角
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-22 DOI: 10.1109/TNSE.2025.3647157
Panagiotis Charatsaris;Maria Diamanti;Eirini Eleni Tsiropoulou;Symeon Papavassiliou
Space-Air-Ground Integrated Networks (SAGIN) have been recognized as key enablers of 6G systems for ubiquitous service provisioning, unlocking Internet of Things (IoT) applications in geographically dispersed areas. In this paper, we study the problem of computation task offloading for remotely deployed IoT devices to either a limited-capability Uncrewed Aerial Vehicle (UAV)-mounted Multi-access Edge Computing (MEC) server or a cloud server via satellite relaying. The problem is formulated as a non-cooperative game, where each IoT device autonomously determines the percentage of task offloaded to each server to minimize the aggregate time and energy overhead due to transmissions and remote processing. Diverging from the prevailing literature, in this paper, we model the IoT devices' risk-seeking and loss-averse behavior in sharing the common pools of computing resources, i.e., cloud and MEC server. By incorporating risk-consciousness in their computation offloading decision-making, IoT devices strive to balance the total incurred overhead with the likelihood of task rejection due to overexploitation of limited shared edge resources. To this end, the IoT devices' utility function is modeled using Prospect Theory and Tragedy of the Commons. Two solutions based on normal and satisfaction-form games are derived, targeting to maximize or achieve a minimum value for the prospect-theoretic utility, providing insights from both device and system perspectives, respectively. Numerical results show the effectiveness of the overall risk-conscious computing framework in the achieved time and energy overhead, as well as task probability of failure.
空间-空地集成网络(SAGIN)已被认为是6G系统的关键推动因素,用于无处不在的服务供应,解锁地理分散地区的物联网(IoT)应用。在本文中,我们研究了远程部署的物联网设备的计算任务卸载问题,通过卫星中继将其卸载到能力有限的无人机(UAV)上的多访问边缘计算(MEC)服务器或云服务器上。该问题被描述为一个非合作博弈,其中每个物联网设备自主决定将任务卸载到每个服务器的百分比,以最大限度地减少由于传输和远程处理造成的总时间和能量开销。与主流文献不同,在本文中,我们模拟了物联网设备在共享公共计算资源池(即云和MEC服务器)时的风险寻求和损失规避行为。通过将风险意识纳入其计算卸载决策,物联网设备努力平衡由于过度利用有限的共享边缘资源而导致的总开销与任务拒绝的可能性。为此,利用前景理论和公地悲剧对物联网设备的效用函数进行建模。基于正常和满足形式游戏的两种解决方案,目标是最大化或实现前景理论效用的最小值,分别从设备和系统的角度提供见解。数值结果表明,整体风险意识计算框架在实现的时间和能量开销以及任务失败概率方面是有效的。
{"title":"Risk-Conscious Computing in Space-Air-Ground IoT Networks: A Prospect-Theoretic Game Perspective","authors":"Panagiotis Charatsaris;Maria Diamanti;Eirini Eleni Tsiropoulou;Symeon Papavassiliou","doi":"10.1109/TNSE.2025.3647157","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3647157","url":null,"abstract":"Space-Air-Ground Integrated Networks (SAGIN) have been recognized as key enablers of 6G systems for ubiquitous service provisioning, unlocking Internet of Things (IoT) applications in geographically dispersed areas. In this paper, we study the problem of computation task offloading for remotely deployed IoT devices to either a limited-capability Uncrewed Aerial Vehicle (UAV)-mounted Multi-access Edge Computing (MEC) server or a cloud server via satellite relaying. The problem is formulated as a non-cooperative game, where each IoT device autonomously determines the percentage of task offloaded to each server to minimize the aggregate time and energy overhead due to transmissions and remote processing. Diverging from the prevailing literature, in this paper, we model the IoT devices' risk-seeking and loss-averse behavior in sharing the common pools of computing resources, i.e., cloud and MEC server. By incorporating risk-consciousness in their computation offloading decision-making, IoT devices strive to balance the total incurred overhead with the likelihood of task rejection due to overexploitation of limited shared edge resources. To this end, the IoT devices' utility function is modeled using Prospect Theory and Tragedy of the Commons. Two solutions based on normal and satisfaction-form games are derived, targeting to maximize or achieve a minimum value for the prospect-theoretic utility, providing insights from both device and system perspectives, respectively. Numerical results show the effectiveness of the overall risk-conscious computing framework in the achieved time and energy overhead, as well as task probability of failure.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5056-5073"},"PeriodicalIF":7.9,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Sum-Rate Maximization in Rate-Splitting MISO Downlink Systems 分频MISO下行系统的加权和速率最大化
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-18 DOI: 10.1109/TNSE.2025.3645935
Anh-Tien Tran;Thanh Phung Truong;Dongwook Won;Nhu-Ngoc Dao;Sungrae Cho
Rate-splitting multiple access (RSMA) and successive interference cancellation (SIC) are essential approaches in the next-generation communication systems that boost spectrum efficiency by effectively managing and mitigating interference between multiple signals. However, a challenge arises in ensuring that users can distinguish the common message from the remaining non-decoded private messages without considering a separate SIC constraint per user. This imperfection cancellation leads to residual interference from the common stream that remains in the received signal. This work investigates the maximization of the weighted sum-rate (WSR) in single-layer RSMA multiple input single output (MISO) downlink network by proposing explicit SIC constraints. In particular, we suggest an approach that initially addresses the critical problem of allocating power and precoding vectors for streams using a deep reinforcement learning (DRL) method, and then determines the user-specific allocations within the common rate to meet the criteria of users’ minimum rate by solving a linear programming problem. Simulation results exhibit the supremacy of the proposed DRL framework over SDMA and other DRL approaches in terms of spectral efficiency leading to an improvement of approximately 30% of WSR in several scenarios.
速率分割多址(RSMA)和连续干扰消除(SIC)是下一代通信系统中必不可少的方法,通过有效管理和减轻多个信号之间的干扰来提高频谱效率。但是,在不考虑每个用户单独的SIC约束的情况下,如何确保用户能够将公共消息与其余未解码的私有消息区分开来,这就产生了一个挑战。这种不完美的对消导致接收信号中保留的公共流的残余干扰。本文通过提出明确的SIC约束,研究了单层RSMA多输入单输出(MISO)下行网络中加权和速率(WSR)的最大化。特别是,我们提出了一种方法,该方法首先使用深度强化学习(DRL)方法解决流分配功率和预编码向量的关键问题,然后通过求解线性规划问题确定在公共速率内的用户特定分配,以满足用户最小速率的标准。仿真结果表明,在频谱效率方面,所提出的DRL框架优于SDMA和其他DRL方法,在一些场景下,WSR提高了约30%。
{"title":"Weighted Sum-Rate Maximization in Rate-Splitting MISO Downlink Systems","authors":"Anh-Tien Tran;Thanh Phung Truong;Dongwook Won;Nhu-Ngoc Dao;Sungrae Cho","doi":"10.1109/TNSE.2025.3645935","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645935","url":null,"abstract":"Rate-splitting multiple access (RSMA) and successive interference cancellation (SIC) are essential approaches in the next-generation communication systems that boost spectrum efficiency by effectively managing and mitigating interference between multiple signals. However, a challenge arises in ensuring that users can distinguish the common message from the remaining non-decoded private messages without considering a separate SIC constraint per user. This imperfection cancellation leads to residual interference from the common stream that remains in the received signal. This work investigates the maximization of the weighted sum-rate (WSR) in single-layer RSMA multiple input single output (MISO) downlink network by proposing explicit SIC constraints. In particular, we suggest an approach that initially addresses the critical problem of allocating power and precoding vectors for streams using a deep reinforcement learning (DRL) method, and then determines the user-specific allocations within the common rate to meet the criteria of users’ minimum rate by solving a linear programming problem. Simulation results exhibit the supremacy of the proposed DRL framework over SDMA and other DRL approaches in terms of spectral efficiency leading to an improvement of approximately 30% of WSR in several scenarios.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5522-5538"},"PeriodicalIF":7.9,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routing in Hierarchical Hybrid Satellite Networks: A Survey 分层混合卫星网络中的路由研究
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-18 DOI: 10.1109/TNSE.2025.3645802
Zeyu Liu;Shuai Wang;Rui Zhang;Zhe Song;Gaofeng Pan
With the deep evolution of satellite communication technologies and hierarchical hybrid networks (HHSNs), modern communication satellites have transformed from single-function relay nodes into core hubs enabling global interconnectivity. The dynamic topology, open-channel environment, and resource limitations inherent to HHSN expose satellite routing protocols to the challenges of the Reliability-Security-Efficiency (RSE) trilemma. In this paper, we provide a systematic review of advancements in HHSN routing research, analyzing core technical challenges through the lens of typical application scenarios while highlighting the divergent performance of various solutions under the RSE trilemma. To the best of our knowledge, we are the first to analyze the performance of HHSN routing protocols within the framework of the RSE theory. Existing reviews either treat routing merely as a component of broader surveys or lack analysis based on the RSE trilemma framework. Building on our review of HHSN routing protocols, we discuss the topology description and security aspects of HHSN and propose potential directions for future HHSN routing research.
随着卫星通信技术和分层混合网络(hhsn)的深入发展,现代通信卫星已经从单一功能中继节点转变为实现全球互联的核心枢纽。HHSN固有的动态拓扑结构、开放信道环境和资源限制使卫星路由协议面临可靠性-安全性-效率(RSE)三难困境的挑战。本文对HHSN路由研究进展进行了系统回顾,通过典型应用场景分析了HHSN路由的核心技术挑战,同时强调了在RSE三难困境下各种解决方案的不同性能。据我们所知,我们是第一个在RSE理论框架内分析HHSN路由协议性能的人。现有的评论要么仅仅将路由视为更广泛调查的一个组成部分,要么缺乏基于RSE三难困境框架的分析。在回顾HHSN路由协议的基础上,讨论了HHSN的拓扑描述和安全方面,并提出了未来HHSN路由研究的潜在方向。
{"title":"Routing in Hierarchical Hybrid Satellite Networks: A Survey","authors":"Zeyu Liu;Shuai Wang;Rui Zhang;Zhe Song;Gaofeng Pan","doi":"10.1109/TNSE.2025.3645802","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645802","url":null,"abstract":"With the deep evolution of satellite communication technologies and hierarchical hybrid networks (HHSNs), modern communication satellites have transformed from single-function relay nodes into core hubs enabling global interconnectivity. The dynamic topology, open-channel environment, and resource limitations inherent to HHSN expose satellite routing protocols to the challenges of the Reliability-Security-Efficiency (RSE) trilemma. In this paper, we provide a systematic review of advancements in HHSN routing research, analyzing core technical challenges through the lens of typical application scenarios while highlighting the divergent performance of various solutions under the RSE trilemma. To the best of our knowledge, we are the first to analyze the performance of HHSN routing protocols within the framework of the RSE theory. Existing reviews either treat routing merely as a component of broader surveys or lack analysis based on the RSE trilemma framework. Building on our review of HHSN routing protocols, we discuss the topology description and security aspects of HHSN and propose potential directions for future HHSN routing research.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4883-4911"},"PeriodicalIF":7.9,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145879961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subversion-Resistant Autonomous Path Proxy Re-Encryption With Secure Deduplication for IoMT 支持IoMT安全重复数据删除的抗颠覆自治路径代理重加密
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-18 DOI: 10.1109/TNSE.2025.3645991
Jiasheng Chen;Zhenfu Cao;Lulu Wang;Jiachen Shen;Zehui Xiong;Xiaolei Dong
The Internet of Medical Things (IoMT) consists of many resource-constrained medical devices that provide patients with medical services anytime and anywhere. In such an environment, the collection and sharing of medical records raise serious security concerns. Although various cryptographic schemes have been proposed, most fail to address two critical threats simultaneously: (i) sensitive data exposure caused by external cloud servers and/or open network environments; (ii) algorithm substitution attacks (ASAs) by internal adversaries. Furthermore, when data owners (e.g., delegators) are inconvenient to process their data, it is desirable to establish a more fine-grained way to delegate encryption rights. To tackle these issues, we propose a subversion-resistant autonomous path proxy re-encryption with an equality test function (SRAP-PRET). Specifically, our scheme allows the delegator to create a multi-hop delegation path in advance with the delegator's preferences, effectively preventing unauthorized access. By deploying a cryptographic reverse firewall zone, SRAP-PRET addresses the problem of information leakage caused by adversaries initiating ASAs. Additionally, SRAP-PRET also supports secure deduplication and efficient data decryption. Security analysis shows that SRAP-PRET provides resistance against ASAs and security against chosen plaintext attacks. Performance evaluations demonstrate that SRAP-PRET offers enhanced security properties without sacrificing efficiency.
医疗物联网(IoMT)由许多资源受限的医疗设备组成,可以随时随地为患者提供医疗服务。在这种环境下,医疗记录的收集和共享引起了严重的安全问题。虽然提出了各种加密方案,但大多数方案未能同时解决两个关键威胁:(i)外部云服务器和/或开放网络环境造成的敏感数据暴露;(ii)内部对手的算法替代攻击(ASAs)。此外,当数据所有者(例如委派者)不方便处理其数据时,需要建立一种更细粒度的方式来委派加密权。为了解决这些问题,我们提出了一种具有相等性测试功能的抗颠覆自治路径代理重加密(SRAP-PRET)。具体来说,我们的方案允许委托方根据委托方的首选项提前创建多跳委托路径,有效防止未经授权的访问。通过部署加密的反向防火墙区域,sla - pret解决了攻击者发起asa导致的信息泄露问题。此外,SRAP-PRET还支持安全的重复数据删除和高效的数据解密。安全性分析表明,SRAP-PRET提供了对asa的抵抗力和对所选明文攻击的安全性。性能评估表明,在不牺牲效率的情况下,SRAP-PRET提供了增强的安全属性。
{"title":"Subversion-Resistant Autonomous Path Proxy Re-Encryption With Secure Deduplication for IoMT","authors":"Jiasheng Chen;Zhenfu Cao;Lulu Wang;Jiachen Shen;Zehui Xiong;Xiaolei Dong","doi":"10.1109/TNSE.2025.3645991","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645991","url":null,"abstract":"The Internet of Medical Things (IoMT) consists of many resource-constrained medical devices that provide patients with medical services anytime and anywhere. In such an environment, the collection and sharing of medical records raise serious security concerns. Although various cryptographic schemes have been proposed, most fail to address two critical threats simultaneously: (i) sensitive data exposure caused by external cloud servers and/or open network environments; (ii) algorithm substitution attacks (ASAs) by internal adversaries. Furthermore, when data owners (e.g., delegators) are inconvenient to process their data, it is desirable to establish a more fine-grained way to delegate encryption rights. To tackle these issues, we propose a subversion-resistant autonomous path proxy re-encryption with an equality test function (SRAP-PRET). Specifically, our scheme allows the delegator to create a multi-hop delegation path in advance with the delegator's preferences, effectively preventing unauthorized access. By deploying a cryptographic reverse firewall zone, SRAP-PRET addresses the problem of information leakage caused by adversaries initiating ASAs. Additionally, SRAP-PRET also supports secure deduplication and efficient data decryption. Security analysis shows that SRAP-PRET provides resistance against ASAs and security against chosen plaintext attacks. Performance evaluations demonstrate that SRAP-PRET offers enhanced security properties without sacrificing efficiency.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5551-5567"},"PeriodicalIF":7.9,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-Assisted Task Offloading and Resource Allocation in Internet of Vehicles: An Integration of Digital Twin and Generative AI 车联网中无人机辅助任务卸载与资源分配:数字孪生与生成式人工智能的集成
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-18 DOI: 10.1109/TNSE.2025.3645844
Xing Wang;Chao He;Wenhui Jiang;Wanting Wang;Leida Li;Xin Xie
With the increasing deployment of environment-aware services in the Internet of Vehicles (IoV), vehicles are required to execute multiple computational tasks in real time. However, resource allocation and task offloading in unmanned aerial vehicles (UAVs)-assisted IoV systems remain challenging due tothe growing number of vehicle terminals (VTs), potential privacy leakage, and resource-constrained edge devices. This paper proposes a digital twin (DT) and generative artificial intelligence (GAI)-powered hierarchical aerial-ground cooperative architecture (DTG-HACA) that achieves dynamic resource optimization through a three-layer framework. The DT layer enables real-time synchronization of vehicle/UAV states and simulated trajectory planning. The high altitude platforms (HAPs) layer provides low-latency offloading channels through stratospheric wide-area coverage and solar-powered endurance, while the physical entity layer executes energy-efficient edge computing via UAV-vehicle-roadside units (RSUs) collaboration. For UAV trajectory optimization, we introduce the multi-agent deep deterministic policy gradient (MADDPG)-improved prioritized experience replay (MADDPG-IPER) algorithm that minimizes communication overhead and energy consumption while integrating DT-simulated trajectory planning. For the joint challenge of edge caching and task offloading under privacy preservation constraints, we develop a federated deep reinforcement learning (FDRL) based generative adversarial network (FDRL-GAN) algorithm. This solution addresses critical challenges in dynamic task offloading and resource allocation for UAV-assisted IoV by leveraging GAI to predict task demands for cache hit rate optimization, while implementing FDRL for distributed privacy-preserving decision-making without raw data sharing, thereby achieving global resource allocation optimality. Extensive simulation experiments confirm that our proposed scheme demonstrates significant advantages over existing benchmark algorithms across five critical performance metrics, including training stability, computational capacity, task offloading efficiency, cache hit rate, and energy consumption.
随着环境感知服务在车联网(IoV)中的部署越来越多,车辆需要实时执行多个计算任务。然而,由于越来越多的车载终端(vt)、潜在的隐私泄露和资源受限的边缘设备,无人机(uav)辅助物联网系统的资源分配和任务卸载仍然具有挑战性。提出了一种以数字孪生(DT)和生成式人工智能(GAI)为动力的分层地空协同体系结构(DTG-HACA),通过三层框架实现动态资源优化。DT层实现了车辆/无人机状态的实时同步和模拟轨迹规划。高空平台(HAPs)层通过平流层广域覆盖和太阳能续航能力提供低延迟卸载通道,而物理实体层通过无人机-车辆-路边单元(rsu)协作执行节能边缘计算。针对无人机的轨迹优化,我们引入了多智能体深度确定性策略梯度(MADDPG)改进的优先体验重放(MADDPG- iper)算法,该算法在集成dt模拟轨迹规划的同时,最大限度地降低了通信开销和能耗。针对隐私保护约束下边缘缓存和任务卸载的共同挑战,我们开发了一种基于联邦深度强化学习(FDRL)的生成对抗网络(FDRL- gan)算法。该解决方案通过利用GAI预测任务需求以优化缓存命中率,解决了无人机辅助车联网在动态任务卸载和资源分配方面的关键挑战,同时在没有原始数据共享的情况下实现FDRL分布式隐私保护决策,从而实现全局资源分配的最优性。大量的模拟实验证实,我们提出的方案在五个关键性能指标上比现有的基准算法有显著的优势,包括训练稳定性、计算能力、任务卸载效率、缓存命中率和能耗。
{"title":"UAV-Assisted Task Offloading and Resource Allocation in Internet of Vehicles: An Integration of Digital Twin and Generative AI","authors":"Xing Wang;Chao He;Wenhui Jiang;Wanting Wang;Leida Li;Xin Xie","doi":"10.1109/TNSE.2025.3645844","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645844","url":null,"abstract":"With the increasing deployment of environment-aware services in the Internet of Vehicles (IoV), vehicles are required to execute multiple computational tasks in real time. However, resource allocation and task offloading in unmanned aerial vehicles (UAVs)-assisted IoV systems remain challenging due tothe growing number of vehicle terminals (VTs), potential privacy leakage, and resource-constrained edge devices. This paper proposes a digital twin (DT) and generative artificial intelligence (GAI)-powered hierarchical aerial-ground cooperative architecture (DTG-HACA) that achieves dynamic resource optimization through a three-layer framework. The DT layer enables real-time synchronization of vehicle/UAV states and simulated trajectory planning. The high altitude platforms (HAPs) layer provides low-latency offloading channels through stratospheric wide-area coverage and solar-powered endurance, while the physical entity layer executes energy-efficient edge computing via UAV-vehicle-roadside units (RSUs) collaboration. For UAV trajectory optimization, we introduce the multi-agent deep deterministic policy gradient (MADDPG)-improved prioritized experience replay (MADDPG-IPER) algorithm that minimizes communication overhead and energy consumption while integrating DT-simulated trajectory planning. For the joint challenge of edge caching and task offloading under privacy preservation constraints, we develop a federated deep reinforcement learning (FDRL) based generative adversarial network (FDRL-GAN) algorithm. This solution addresses critical challenges in dynamic task offloading and resource allocation for UAV-assisted IoV by leveraging GAI to predict task demands for cache hit rate optimization, while implementing FDRL for distributed privacy-preserving decision-making without raw data sharing, thereby achieving global resource allocation optimality. Extensive simulation experiments confirm that our proposed scheme demonstrates significant advantages over existing benchmark algorithms across five critical performance metrics, including training stability, computational capacity, task offloading efficiency, cache hit rate, and energy consumption.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5038-5055"},"PeriodicalIF":7.9,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Online Optimization of Power Allocation and Task Scheduling for Data Offloading in LEO Satellite Networks 低轨道卫星网络数据卸载功率分配与任务调度联合在线优化
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-17 DOI: 10.1109/TNSE.2025.3645282
Lijun He;Zheyuan Li;Juncheng Wang;Ziye Jia;Yanting Wang;Chau Yuen;Zhu Han
The rapid expansion of Low Earth Orbit (LEO) satellites inescapably leads to the explosive growth of space data in LEO Satellite Networks (LSNs). The stochastic nature of space data arrivals and the intrinsically time-varying satellite-ground links in LSNs pose significant challenges for offloading substantial volumes of space data from LSNs to the ground stations. To overcome these challenges, we systematically study the joint online optimization of power allocation and task scheduling for data offloading in LSNs. Firstly, we remove the constraint of mean rate queue stability from the formulated joint online optimization problem and leverage Lyapunov optimization to decouple it into a set of per-time-slot subproblems. Each subproblem is then divided into a task scheduling problem and a power allocation problem. Subsequently, we derive a closed-form optimal solution for the power allocation problem, and a multi-armed bandit-based quasi-optimal solution for the task scheduling problem. Furthermore, we extend the aforementioned solutions to address the original joint online optimization problem. Through theoretical analyses, we show that the proposed algorithms consistently attain a sublinear time-averaged regret. Extensive simulation results demonstrate that our proposed algorithms exhibit superior performance over other benchmarks.
近地轨道卫星的快速扩张不可避免地导致近地轨道卫星网络空间数据的爆炸式增长。空间数据到达的随机性和地面站卫星-地面链路的内在时变特性给从地面站卫星网络向地面站卸载大量空间数据带来了重大挑战。为了克服这些挑战,我们系统地研究了lnsn中数据卸载的功率分配和任务调度联合在线优化。首先,我们从公式化的联合在线优化问题中去除平均速率队列稳定性约束,并利用Lyapunov优化将其解耦为一组逐时隙子问题。然后将每个子问题分为任务调度问题和功率分配问题。在此基础上,推导出了功率分配问题的封闭最优解,以及任务调度问题的基于多臂强盗的拟最优解。此外,我们扩展了上述解决方案,以解决原始的联合在线优化问题。通过理论分析,我们表明所提出的算法一致地获得了亚线性时间平均遗憾。大量的仿真结果表明,我们提出的算法表现出优于其他基准的性能。
{"title":"Joint Online Optimization of Power Allocation and Task Scheduling for Data Offloading in LEO Satellite Networks","authors":"Lijun He;Zheyuan Li;Juncheng Wang;Ziye Jia;Yanting Wang;Chau Yuen;Zhu Han","doi":"10.1109/TNSE.2025.3645282","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3645282","url":null,"abstract":"The rapid expansion of Low Earth Orbit (LEO) satellites inescapably leads to the explosive growth of space data in LEO Satellite Networks (LSNs). The stochastic nature of space data arrivals and the intrinsically time-varying satellite-ground links in LSNs pose significant challenges for offloading substantial volumes of space data from LSNs to the ground stations. To overcome these challenges, we systematically study the joint online optimization of power allocation and task scheduling for data offloading in LSNs. Firstly, we remove the constraint of mean rate queue stability from the formulated joint online optimization problem and leverage Lyapunov optimization to decouple it into a set of per-time-slot subproblems. Each subproblem is then divided into a task scheduling problem and a power allocation problem. Subsequently, we derive a closed-form optimal solution for the power allocation problem, and a multi-armed bandit-based quasi-optimal solution for the task scheduling problem. Furthermore, we extend the aforementioned solutions to address the original joint online optimization problem. Through theoretical analyses, we show that the proposed algorithms consistently attain a sublinear time-averaged regret. Extensive simulation results demonstrate that our proposed algorithms exhibit superior performance over other benchmarks.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"5018-5037"},"PeriodicalIF":7.9,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Source Localization Based on Graph Representation Learning and Bayesian Optimization 基于图表示学习和贝叶斯优化的多源定位
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2025-12-16 DOI: 10.1109/TNSE.2025.3644931
Zhangfei Zhou;Youguo Wang;Qiqing Zhai;Jun Yan
Source localization, the inverse problem of diffusion processes, is crucial for tracking social rumors, identifying epidemic spreaders, and detecting computer viruses. Multi-source localization based on snapshot observation has garnered significant attention due to its low cost and ease of acquisition. However, challenges such as ill-posedness and heavy dependence on diffusion models hinder effective solutions. Existing methods often rely on deterministic techniques that require searching the entire graph space, struggle to effectively encode topological information, and are limited to a single diffusion model. To address these limitations, we propose Source Localization based on Representation Learning and Bayesian Optimization (SL-RLBO), a generic framework that quantifies source uncertainty via Monte Carlo simulation. Specifically, we first develop a novel algorithm to simultaneously estimate diffusion parameters and time from a single snapshot. Then, we utilize a multi-source reverse infection algorithm to identify candidate sources and leverage graph representation learning techniques to capture latent topological features. Finally, we formulate an objective function applicable to various diffusion models and efficiently optimize it using Bayesian optimization. Extensive experiments and case studies conducted on two synthetic and six real-world datasets show that SL-RLBO consistently outperforms four state-of-the-art baselines across different diffusion models, reducing error distance by an average of 18.94%.
来源定位是传播过程的逆问题,对于跟踪社会谣言、识别流行病传播者和检测计算机病毒至关重要。基于快照观测的多源定位因其成本低、易于获取而受到广泛关注。然而,诸如不适定性和对扩散模型的严重依赖等挑战阻碍了有效的解决方案。现有的方法通常依赖于需要搜索整个图空间的确定性技术,难以有效地编码拓扑信息,并且仅限于单个扩散模型。为了解决这些限制,我们提出了基于表示学习和贝叶斯优化(SL-RLBO)的源定位,这是一个通过蒙特卡罗模拟量化源不确定性的通用框架。具体来说,我们首先开发了一种新的算法来同时估计单个快照的扩散参数和时间。然后,我们利用多源反向感染算法来识别候选源,并利用图表示学习技术来捕获潜在的拓扑特征。最后,我们建立了一个适用于各种扩散模型的目标函数,并利用贝叶斯优化对其进行了有效的优化。在两个合成数据集和六个真实数据集上进行的大量实验和案例研究表明,SL-RLBO在不同扩散模型中始终优于四个最先进的基线,平均将误差距离降低了18.94%。
{"title":"Multi-Source Localization Based on Graph Representation Learning and Bayesian Optimization","authors":"Zhangfei Zhou;Youguo Wang;Qiqing Zhai;Jun Yan","doi":"10.1109/TNSE.2025.3644931","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3644931","url":null,"abstract":"Source localization, the inverse problem of diffusion processes, is crucial for tracking social rumors, identifying epidemic spreaders, and detecting computer viruses. Multi-source localization based on snapshot observation has garnered significant attention due to its low cost and ease of acquisition. However, challenges such as ill-posedness and heavy dependence on diffusion models hinder effective solutions. Existing methods often rely on deterministic techniques that require searching the entire graph space, struggle to effectively encode topological information, and are limited to a single diffusion model. To address these limitations, we propose <underline>S</u>ource <underline>L</u>ocalization based on <underline>R</u>epresentation <underline>L</u>earning and <underline>B</u>ayesian <underline>O</u>ptimization (SL-RLBO), a generic framework that quantifies source uncertainty via Monte Carlo simulation. Specifically, we first develop a novel algorithm to simultaneously estimate diffusion parameters and time from a single snapshot. Then, we utilize a multi-source reverse infection algorithm to identify candidate sources and leverage graph representation learning techniques to capture latent topological features. Finally, we formulate an objective function applicable to various diffusion models and efficiently optimize it using Bayesian optimization. Extensive experiments and case studies conducted on two synthetic and six real-world datasets show that SL-RLBO consistently outperforms four state-of-the-art baselines across different diffusion models, reducing error distance by an average of 18.94%.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"4815-4832"},"PeriodicalIF":7.9,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145886569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1