首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
Network quality prediction in a designated area using GPS data 利用 GPS 数据预测指定区域的网络质量
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-18 DOI: 10.1016/j.jnca.2024.104002
Onur Sahin , Vanlin Sathya

This study introduces a groundbreaking method for predicting network quality in LTE and 5G environments using only GPS data, focusing on pinpointing specific locations within a designated area to determine network quality as either good or poor. By leveraging machine learning algorithms, we have successfully demonstrated that geographical location can be a key indicator of network performance. Our research involved initially classifying network quality using traditional signal strength metrics and then shifting to rely exclusively on GPS coordinates for prediction. Employing a variety of classifiers, including Decision Tree, Random Forest, Gradient Boosting and K-Nearest Neighbors, we uncovered notable correlations between location data and network quality. This methodology provides network operators with a cost-effective and efficient tool for identifying and addressing network quality issues based on geographic insights. Additionally, we explored the potential implications of our study in various use cases, including healthcare, education, and urban industrialization, highlighting its versatility across different sectors. Our findings pave the way for innovative network management strategies, especially critical in the contexts of both LTE and the rapidly evolving landscape of 5G technology.

本研究介绍了一种仅使用 GPS 数据预测 LTE 和 5G 环境中网络质量的开创性方法,重点是精确定位指定区域内的特定位置,以确定网络质量的好坏。通过利用机器学习算法,我们成功证明了地理位置可以成为网络性能的关键指标。我们的研究包括最初使用传统的信号强度指标对网络质量进行分类,然后转向完全依赖 GPS 坐标进行预测。通过使用决策树、随机森林、梯度提升和 K-近邻等多种分类器,我们发现了位置数据与网络质量之间的显著相关性。这种方法为网络运营商提供了一种经济高效的工具,用于根据地理洞察力识别和解决网络质量问题。此外,我们还探讨了我们的研究在医疗保健、教育和城市工业化等各种使用案例中的潜在影响,突出了它在不同领域的通用性。我们的研究结果为创新的网络管理策略铺平了道路,尤其是在 LTE 和快速发展的 5G 技术背景下至关重要。
{"title":"Network quality prediction in a designated area using GPS data","authors":"Onur Sahin ,&nbsp;Vanlin Sathya","doi":"10.1016/j.jnca.2024.104002","DOIUrl":"10.1016/j.jnca.2024.104002","url":null,"abstract":"<div><p>This study introduces a groundbreaking method for predicting network quality in LTE and 5G environments using only GPS data, focusing on pinpointing specific locations within a designated area to determine network quality as either good or poor. By leveraging machine learning algorithms, we have successfully demonstrated that geographical location can be a key indicator of network performance. Our research involved initially classifying network quality using traditional signal strength metrics and then shifting to rely exclusively on GPS coordinates for prediction. Employing a variety of classifiers, including Decision Tree, Random Forest, Gradient Boosting and K-Nearest Neighbors, we uncovered notable correlations between location data and network quality. This methodology provides network operators with a cost-effective and efficient tool for identifying and addressing network quality issues based on geographic insights. Additionally, we explored the potential implications of our study in various use cases, including healthcare, education, and urban industrialization, highlighting its versatility across different sectors. Our findings pave the way for innovative network management strategies, especially critical in the contexts of both LTE and the rapidly evolving landscape of 5G technology.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 104002"},"PeriodicalIF":7.7,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142012560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid Bi-level management framework for caching and communication in Edge-AI enabled IoT 用于支持边缘人工智能的物联网缓存和通信的混合双层管理框架
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-17 DOI: 10.1016/j.jnca.2024.104000
Samane Sharif, Mohammad Hossein Yaghmaee Moghaddam, Seyed Amin Hosseini Seno

The proliferation of IoT devices has led to a surge in network traffic, resulting in higher energy usage and response delays. In-network caching has emerged as a viable solution to address this issue. However, caching IoT data faces two key challenges: the transient nature of IoT content and the unknown spatiotemporal content popularity. Additionally, the use of a global view on dynamic IoT networks is problematic due to the high communication overhead involved. To tackle these challenges, this paper presents an adaptive management approach that jointly optimizes caching and communication in IoT networks using a novel bi-level control method called BC3. The approach employs two types of controllers: a global ILP-based optimal controller for long-term timeslots and local learning-based controllers for short-term timeslots. The long-term controller periodically establishes a global cache policy for the network and sends specific cache rules to each edge server. The local controller at each edge server solves the joint problem of bandwidth allocation and cache adaptation using deep reinforcement learning (DRL) technique. The main objective is to minimize energy consumption and system response time with utilizing the global and local observations. Experimental results demonstrate that the proposed approach increases cache hit rate by approximately 12% and uses 11% less energy compared to the other methods. Increasing the cache hit rate can lead to a reduction in about 17% in response time for user requests. Our bi-level control approach offers a promising solution for leveraging the network's global visibility while balancing communication overhead (as energy consumption) against system performance. Additionally, the proposed method has the lowest cache eviction, around 19% lower than the lowest eviction of the other comparison methods. The eviction metric is a metric to evaluate the effectiveness of adaptive caching approach designed for transient data.

物联网设备的激增导致网络流量激增,从而造成更高的能耗和响应延迟。网络内缓存已成为解决这一问题的可行方案。然而,缓存物联网数据面临两大挑战:物联网内容的瞬时性和未知的时空内容流行性。此外,由于涉及高通信开销,在动态物联网网络上使用全局视图存在问题。为了应对这些挑战,本文提出了一种自适应管理方法,利用一种名为 BC3 的新型双层控制方法,联合优化物联网网络中的缓存和通信。该方法采用两种类型的控制器:基于 ILP 的全局最优控制器(用于长期时隙)和基于学习的本地控制器(用于短期时隙)。长期控制器定期为网络建立全局高速缓存策略,并向每个边缘服务器发送特定的高速缓存规则。每个边缘服务器上的本地控制器利用深度强化学习(DRL)技术解决带宽分配和高速缓存适应的联合问题。主要目标是利用全局和本地观测结果,最大限度地减少能耗和系统响应时间。实验结果表明,与其他方法相比,所提出的方法将缓存命中率提高了约 12%,能耗降低了 11%。提高缓存命中率可使用户请求的响应时间缩短约 17%。我们的双层控制方法为利用网络的全局可见性提供了一个很有前景的解决方案,同时还能平衡通信开销(作为能耗)与系统性能之间的关系。此外,所提出的方法具有最低的缓存驱逐率,比其他比较方法的最低驱逐率低约 19%。驱逐指标是评估针对瞬态数据设计的自适应缓存方法有效性的指标。
{"title":"A hybrid Bi-level management framework for caching and communication in Edge-AI enabled IoT","authors":"Samane Sharif,&nbsp;Mohammad Hossein Yaghmaee Moghaddam,&nbsp;Seyed Amin Hosseini Seno","doi":"10.1016/j.jnca.2024.104000","DOIUrl":"10.1016/j.jnca.2024.104000","url":null,"abstract":"<div><p>The proliferation of IoT devices has led to a surge in network traffic, resulting in higher energy usage and response delays. In-network caching has emerged as a viable solution to address this issue. However, caching IoT data faces two key challenges: the transient nature of IoT content and the unknown spatiotemporal content popularity. Additionally, the use of a global view on dynamic IoT networks is problematic due to the high communication overhead involved. To tackle these challenges, this paper presents an adaptive management approach that jointly optimizes caching and communication in IoT networks using a novel bi-level control method called BC3. The approach employs two types of controllers: a global ILP-based optimal controller for long-term timeslots and local learning-based controllers for short-term timeslots. The long-term controller periodically establishes a global cache policy for the network and sends specific cache rules to each edge server. The local controller at each edge server solves the joint problem of bandwidth allocation and cache adaptation using deep reinforcement learning (DRL) technique. The main objective is to minimize energy consumption and system response time with utilizing the global and local observations. Experimental results demonstrate that the proposed approach increases cache hit rate by approximately 12% and uses 11% less energy compared to the other methods. Increasing the cache hit rate can lead to a reduction in about 17% in response time for user requests. Our bi-level control approach offers a promising solution for leveraging the network's global visibility while balancing communication overhead (as energy consumption) against system performance. Additionally, the proposed method has the lowest cache eviction, around 19% lower than the lowest eviction of the other comparison methods. The eviction metric is a metric to evaluate the effectiveness of adaptive caching approach designed for transient data.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104000"},"PeriodicalIF":7.7,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142048630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain transaction mechanism in the delay tolerant network 延迟容忍网络中的区块链交易机制
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-14 DOI: 10.1016/j.jnca.2024.103998
Lingling Zi, Xin Cong

Current blockchain systems have high requirements on network connection and data transmission rate, for example, nodes have to receive the latest blocks in time to update the blockchain, nodes have to immediately broadcast the generated block to other nodes for consensus, which restricts the blockchain to run only on real-time connection networks, but the existence of delay tolerant networks poses a great challenge to the deployment of blockchain systems. To address this challenge, a novel blockchain transaction mechanism is proposed. First, the block structure is modified by adding a flag, and on this basis, the definition of the extrachain is proposed. Secondly, based on the blockchain transaction process, transaction verification and consensus algorithms on the extrachain are presented. Thirdly, both the extrachain selection algorithm and appending algorithm are proposed, so that the extrachain can be appended to the blockchain fairly and safely. Finally, an extrachain transmission scheme is presented to broadcast the blocks generated in the delayed network to the normal network. Theoretical analysis and simulation experiments further illustrate the efficiency of the proposed mechanism.

当前的区块链系统对网络连接和数据传输速率有很高的要求,比如节点要及时接收最新的区块才能更新区块链,节点要立即将生成的区块广播给其他节点以达成共识,这就限制了区块链只能运行在实时连接的网络上,但延迟容忍网络的存在给区块链系统的部署带来了很大的挑战。为解决这一难题,本文提出了一种新颖的区块链交易机制。首先,通过添加标志对区块结构进行修改,并在此基础上提出了链外的定义。其次,基于区块链交易过程,提出了链外的交易验证和共识算法。第三,提出了链外选择算法和追加算法,使链外可以公平、安全地追加到区块链中。最后,提出了一种链外传输方案,将延迟网络中生成的区块广播到正常网络中。理论分析和模拟实验进一步说明了所提机制的效率。
{"title":"A blockchain transaction mechanism in the delay tolerant network","authors":"Lingling Zi,&nbsp;Xin Cong","doi":"10.1016/j.jnca.2024.103998","DOIUrl":"10.1016/j.jnca.2024.103998","url":null,"abstract":"<div><p>Current blockchain systems have high requirements on network connection and data transmission rate, for example, nodes have to receive the latest blocks in time to update the blockchain, nodes have to immediately broadcast the generated block to other nodes for consensus, which restricts the blockchain to run only on real-time connection networks, but the existence of delay tolerant networks poses a great challenge to the deployment of blockchain systems. To address this challenge, a novel blockchain transaction mechanism is proposed. First, the block structure is modified by adding a flag, and on this basis, the definition of the extrachain is proposed. Secondly, based on the blockchain transaction process, transaction verification and consensus algorithms on the extrachain are presented. Thirdly, both the extrachain selection algorithm and appending algorithm are proposed, so that the extrachain can be appended to the blockchain fairly and safely. Finally, an extrachain transmission scheme is presented to broadcast the blocks generated in the delayed network to the normal network. Theoretical analysis and simulation experiments further illustrate the efficiency of the proposed mechanism.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103998"},"PeriodicalIF":7.7,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141981088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning CESA:联合学习中通过稀疏图实现的通信高效安全聚合方案
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-14 DOI: 10.1016/j.jnca.2024.103997
Ruijin Wang , Jinbo Wang , Xiong Li , Jinshan Lai , Fengli Zhang , Xikai Pei , Muhammad Khurram Khan

As a distributed learning paradigm, federated learning can be effectively applied to the decentralized system since it can resolve the “data island” problem. However, it is also vulnerable to serious privacy breaches. Although existing secure aggregation technique can address privacy concerns, they also incur significant additional computation and communication costs. To address these challenges, this paper offers a Communication Efficient Secure Aggregation scheme. Firstly, the central server uses the communication delay between terminals as the weight of the fully terminal-connected graph to transform it into a sparse connected graph based on the minimal spanning tree. Secondly, instead of relying on central server for key advertisement, the terminals advertise keys via a neighboring terminal forwarding approach based on sparsely graph. Thirdly, we propose using the central server for auxiliary advertising to address unexpected terminal dropout. Simultaneously, we theoretically demonstrate our scheme’s security and have lower computation and communication costs. Experiments show that CESA can reduce the running time by 28.2% without sacrificing security and model accuracy compared to conventional secure aggregation when there are 10 terminals in the system.

作为一种分布式学习范式,联盟学习可以有效地应用于分散系统,因为它可以解决 "数据孤岛 "问题。然而,它也容易造成严重的隐私泄露。虽然现有的安全聚合技术可以解决隐私问题,但也会产生大量额外的计算和通信成本。为了应对这些挑战,本文提出了一种通信高效安全聚合方案。首先,中央服务器利用终端之间的通信延迟作为全终端连接图的权重,将其转换为基于最小生成树的稀疏连接图。其次,终端不依赖中央服务器发布密钥,而是通过基于稀疏图的相邻终端转发方式发布密钥。第三,我们建议使用中央服务器进行辅助广告,以解决终端意外掉线的问题。同时,我们从理论上证明了我们方案的安全性,并降低了计算和通信成本。实验表明,当系统中有 10 个终端时,与传统的安全聚合相比,CESA 可以在不牺牲安全性和模型准确性的情况下减少 28.2% 的运行时间。
{"title":"CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning","authors":"Ruijin Wang ,&nbsp;Jinbo Wang ,&nbsp;Xiong Li ,&nbsp;Jinshan Lai ,&nbsp;Fengli Zhang ,&nbsp;Xikai Pei ,&nbsp;Muhammad Khurram Khan","doi":"10.1016/j.jnca.2024.103997","DOIUrl":"10.1016/j.jnca.2024.103997","url":null,"abstract":"<div><p>As a distributed learning paradigm, federated learning can be effectively applied to the decentralized system since it can resolve the “data island” problem. However, it is also vulnerable to serious privacy breaches. Although existing secure aggregation technique can address privacy concerns, they also incur significant additional computation and communication costs. To address these challenges, this paper offers a <u>C</u>ommunication <u>E</u>fficient <u>S</u>ecure <u>A</u>ggregation scheme. Firstly, the central server uses the communication delay between terminals as the weight of the fully terminal-connected graph to transform it into a sparse connected graph based on the minimal spanning tree. Secondly, instead of relying on central server for key advertisement, the terminals advertise keys via a neighboring terminal forwarding approach based on sparsely graph. Thirdly, we propose using the central server for auxiliary advertising to address unexpected terminal dropout. Simultaneously, we theoretically demonstrate our scheme’s security and have lower computation and communication costs. Experiments show that CESA can reduce the running time by 28.2% without sacrificing security and model accuracy compared to conventional secure aggregation when there are 10 terminals in the system.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103997"},"PeriodicalIF":7.7,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142012562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on security issues in IoT operating systems 物联网操作系统安全问题调查
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-06 DOI: 10.1016/j.jnca.2024.103976
Panjun Sun, Yi Wan, Zongda Wu, Zhaoxi Fang

The security issues of the core (operating systems) of the Internet of Things (IoT) are becoming increasingly urgent and prominent, this article conducts a systematic research and summary of the security of the current mainstream IoT operating system. Firstly, based on the architecture and applications functions of IoT devices, this article introduces the concept of operating system security, analyzes and studies the security vulnerabilities, key technologies, and attack and defense security mechanisms of operating systems. Secondly, this article investigates the application scenario used by IoT operating systems, such as smart homes, smart healthcare, smart industries, blockchain, and the Internet of Vehicles. Next, from the perspective of building a complete security system, this article investigates the security mechanisms, security frameworks, security kernels, platform integrity, and security testing of IoT operating systems. Finally, this article points out the security challenges and opportunities faced by IoT operating systems, summarizes the current research status, and puts forward corresponding suggestions.

物联网核心(操作系统)的安全问题日益紧迫和突出,本文对当前主流物联网操作系统的安全性进行了系统研究和总结。首先,本文基于物联网设备的体系结构和应用功能,介绍了操作系统安全的概念,分析研究了操作系统的安全漏洞、关键技术和攻防安全机制。其次,本文研究了物联网操作系统的应用场景,如智能家居、智能医疗、智能工业、区块链、车联网等。其次,本文从构建完整安全体系的角度出发,研究了物联网操作系统的安全机制、安全框架、安全内核、平台完整性和安全测试。最后,本文指出了物联网操作系统面临的安全挑战和机遇,总结了目前的研究现状,并提出了相应的建议。
{"title":"A survey on security issues in IoT operating systems","authors":"Panjun Sun,&nbsp;Yi Wan,&nbsp;Zongda Wu,&nbsp;Zhaoxi Fang","doi":"10.1016/j.jnca.2024.103976","DOIUrl":"10.1016/j.jnca.2024.103976","url":null,"abstract":"<div><p>The security issues of the core (operating systems) of the Internet of Things (IoT) are becoming increasingly urgent and prominent, this article conducts a systematic research and summary of the security of the current mainstream IoT operating system. Firstly, based on the architecture and applications functions of IoT devices, this article introduces the concept of operating system security, analyzes and studies the security vulnerabilities, key technologies, and attack and defense security mechanisms of operating systems. Secondly, this article investigates the application scenario used by IoT operating systems, such as smart homes, smart healthcare, smart industries, blockchain, and the Internet of Vehicles. Next, from the perspective of building a complete security system, this article investigates the security mechanisms, security frameworks, security kernels, platform integrity, and security testing of IoT operating systems. Finally, this article points out the security challenges and opportunities faced by IoT operating systems, summarizes the current research status, and puts forward corresponding suggestions.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103976"},"PeriodicalIF":7.7,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141904703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving federated learning for proactive maintenance of IoT-empowered multi-location smart city facilities 为主动维护物联网赋能的多地点智能城市设施而进行的隐私保护联合学习
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-05 DOI: 10.1016/j.jnca.2024.103996
Zu-Sheng Tan , Eric W.K. See-To , Kwan-Yeung Lee , Hong-Ning Dai , Man-Leung Wong

The widespread adoption of the Internet of Things (IoT) and deep learning (DL) have facilitated a social paradigm shift towards smart cities, accelerating the rapid construction of smart facilities. However, newly constructed facilities often lack the necessary data to learn any predictive models, preventing them from being truly smart. Additionally, data collected from different facilities is heterogeneous or may even be privacy-sensitive, making it harder to train proactive maintenance management (PMM) models that are robust to provide services across them. These properties impose challenges that have not been adequately addressed, especially at the city level. In this paper, we present a privacy-preserving, federated learning (FL) framework that can assist management personnel to proactively manage the maintenance schedule of IoT-empowered facilities in different organizations through analyzing heterogeneous IoT data. Our framework consists of (1) an FL platform implemented with fully homomorphic encryption (FHE) for training DL models with time-series heterogeneous IoT data and (2) an FL-based long short-term memory autoencoder model, namely FedLSTMA, for facility-level PMM. To evaluate our framework, we did extensive simulations with real-world data harvested from IoT-empowered public toilets, demonstrating that the DL-based FedLSTMA outperformed other traditional machine learning (ML) algorithms and had a high level of generalizability and capabilities of transferring knowledge from existing facilities to newly constructed facilities under the situation of huge data heterogeneity. We believe that our framework can be a potential solution for overcoming the challenges inherent in managing and maintaining other smart facilities, ultimately contributing to the effective realization of smart cities.

物联网(IoT)和深度学习(DL)的广泛应用促进了社会模式向智能城市的转变,加快了智能设施的快速建设。然而,新建设施往往缺乏学习任何预测模型所需的数据,无法实现真正的智能化。此外,从不同设施收集到的数据是异构的,甚至可能是隐私敏感的,这就更难训练出强大的主动维护管理(PMM)模型,以便在不同设施之间提供服务。这些特性带来的挑战尚未得到充分解决,尤其是在城市层面。在本文中,我们提出了一个保护隐私的联合学习(FL)框架,该框架可以帮助管理人员通过分析异构物联网数据,主动管理不同组织中物联网供电设施的维护计划。我们的框架包括:(1)利用全同态加密(FHE)实现的 FL 平台,用于利用时间序列异构物联网数据训练 DL 模型;(2)基于 FL 的长短期记忆自动编码器模型,即 FedLSTMA,用于设施级 PMM。为了评估我们的框架,我们利用从物联网供电的公共厕所获取的真实世界数据进行了大量模拟,结果表明,基于 DL 的 FedLSTMA 优于其他传统机器学习(ML)算法,并且在数据异构性巨大的情况下,具有较高的泛化能力,能够将知识从现有设施转移到新建设施。我们相信,我们的框架可以成为克服管理和维护其他智能设施固有挑战的潜在解决方案,最终为有效实现智慧城市做出贡献。
{"title":"Privacy-preserving federated learning for proactive maintenance of IoT-empowered multi-location smart city facilities","authors":"Zu-Sheng Tan ,&nbsp;Eric W.K. See-To ,&nbsp;Kwan-Yeung Lee ,&nbsp;Hong-Ning Dai ,&nbsp;Man-Leung Wong","doi":"10.1016/j.jnca.2024.103996","DOIUrl":"10.1016/j.jnca.2024.103996","url":null,"abstract":"<div><p>The widespread adoption of the Internet of Things (IoT) and deep learning (DL) have facilitated a social paradigm shift towards smart cities, accelerating the rapid construction of smart facilities. However, newly constructed facilities often lack the necessary data to learn any predictive models, preventing them from being truly smart. Additionally, data collected from different facilities is heterogeneous or may even be privacy-sensitive, making it harder to train proactive maintenance management (PMM) models that are robust to provide services across them. These properties impose challenges that have not been adequately addressed, especially at the city level. In this paper, we present a privacy-preserving, federated learning (FL) framework that can assist management personnel to proactively manage the maintenance schedule of IoT-empowered facilities in different organizations through analyzing heterogeneous IoT data. Our framework consists of (1) an FL platform implemented with fully homomorphic encryption (FHE) for training DL models with time-series heterogeneous IoT data and (2) an FL-based long short-term memory autoencoder model, namely FedLSTMA, for facility-level PMM. To evaluate our framework, we did extensive simulations with real-world data harvested from IoT-empowered public toilets, demonstrating that the DL-based FedLSTMA outperformed other traditional machine learning (ML) algorithms and had a high level of generalizability and capabilities of transferring knowledge from existing facilities to newly constructed facilities under the situation of huge data heterogeneity. We believe that our framework can be a potential solution for overcoming the challenges inherent in managing and maintaining other smart facilities, ultimately contributing to the effective realization of smart cities.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103996"},"PeriodicalIF":7.7,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142012561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication CRSFL:基于集群的资源感知拆分联合学习,实现持续验证
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-02 DOI: 10.1016/j.jnca.2024.103987
Mohamad Wazzeh , Mohamad Arafeh , Hani Sami , Hakima Ould-Slimane , Chamseddine Talhi , Azzam Mourad , Hadi Otrok

In the ever-changing world of technology, continuous authentication and comprehensive access management are essential during user interactions with a device. Split Learning (SL) and Federated Learning (FL) have recently emerged as promising technologies for training a decentralized Machine Learning (ML) model. With the increasing use of smartphones and Internet of Things (IoT) devices, these distributed technologies enable users with limited resources to complete neural network model training with server assistance and collaboratively combine knowledge between different nodes. In this study, we propose combining these technologies to address the continuous authentication challenge while protecting user privacy and limiting device resource usage. However, the model’s training is slowed due to SL sequential training and resource differences between IoT devices with different specifications. Therefore, we use a cluster-based approach to group devices with similar capabilities to mitigate the impact of slow devices while filtering out the devices incapable of training the model. In addition, we address the efficiency and robustness of training ML models by using SL and FL techniques to train the clients simultaneously while analyzing the overhead burden of the process. Following clustering, we select the best set of clients to participate in training through a Genetic Algorithm (GA) optimized on a carefully designed list of objectives. The performance of our proposed framework is compared to baseline methods, and the advantages are demonstrated using a real-life UMDAA-02-FD face detection dataset. The results show that CRSFL, our proposed approach, maintains high accuracy and reduces the overhead burden in continuous authentication scenarios while preserving user privacy.

在瞬息万变的技术世界中,持续的身份验证和全面的访问管理对于用户与设备的交互至关重要。最近出现的拆分学习(SL)和联合学习(FL)是训练分散式机器学习(ML)模型的有前途的技术。随着智能手机和物联网(IoT)设备的使用越来越多,这些分布式技术使资源有限的用户能够在服务器的协助下完成神经网络模型训练,并在不同节点之间协同组合知识。在本研究中,我们建议将这些技术结合起来,在保护用户隐私和限制设备资源使用的同时,解决持续验证难题。然而,由于 SL 的顺序训练和不同规格的物联网设备之间的资源差异,模型的训练速度较慢。因此,我们采用基于集群的方法,将功能相似的设备分组,以减轻速度慢的设备的影响,同时过滤掉无法训练模型的设备。此外,我们还使用 SL 和 FL 技术同时训练客户端,同时分析该过程的开销负担,从而解决训练 ML 模型的效率和鲁棒性问题。在聚类之后,我们通过遗传算法(GA)根据精心设计的目标列表进行优化,选择一组最佳客户端参与训练。我们将所提框架的性能与基线方法进行了比较,并使用真实的 UMDAA-02-FD 人脸检测数据集展示了其优势。结果表明,我们提出的 CRSFL 方法在连续身份验证场景中保持了较高的准确性,并减少了开销负担,同时保护了用户隐私。
{"title":"CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication","authors":"Mohamad Wazzeh ,&nbsp;Mohamad Arafeh ,&nbsp;Hani Sami ,&nbsp;Hakima Ould-Slimane ,&nbsp;Chamseddine Talhi ,&nbsp;Azzam Mourad ,&nbsp;Hadi Otrok","doi":"10.1016/j.jnca.2024.103987","DOIUrl":"10.1016/j.jnca.2024.103987","url":null,"abstract":"<div><p>In the ever-changing world of technology, continuous authentication and comprehensive access management are essential during user interactions with a device. Split Learning (SL) and Federated Learning (FL) have recently emerged as promising technologies for training a decentralized Machine Learning (ML) model. With the increasing use of smartphones and Internet of Things (IoT) devices, these distributed technologies enable users with limited resources to complete neural network model training with server assistance and collaboratively combine knowledge between different nodes. In this study, we propose combining these technologies to address the continuous authentication challenge while protecting user privacy and limiting device resource usage. However, the model’s training is slowed due to SL sequential training and resource differences between IoT devices with different specifications. Therefore, we use a cluster-based approach to group devices with similar capabilities to mitigate the impact of slow devices while filtering out the devices incapable of training the model. In addition, we address the efficiency and robustness of training ML models by using SL and FL techniques to train the clients simultaneously while analyzing the overhead burden of the process. Following clustering, we select the best set of clients to participate in training through a Genetic Algorithm (GA) optimized on a carefully designed list of objectives. The performance of our proposed framework is compared to baseline methods, and the advantages are demonstrated using a real-life UMDAA-02-FD face detection dataset. The results show that CRSFL, our proposed approach, maintains high accuracy and reduces the overhead burden in continuous authentication scenarios while preserving user privacy.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103987"},"PeriodicalIF":7.7,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing transport scheme of 3D naked-eye system 设计 3D 裸眼系统的传输方案
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-02 DOI: 10.1016/j.jnca.2024.103988
Rong Zheng, Xiaoqin Feng, Fengyuan Ren

3D naked-eye is constructed from multi-stream as a typical representation of stereoscopic video. Its enormous data volume and stringent low-delay transport requirements pose significant challenges for high-quality real-time transport. Through analysis and experimental verification that current streaming media transport frameworks using the server–client or peer-to-peer scheme face difficulties when transmitting 3D naked-eye in a one-to-one format. Besides, the existing bandwidth estimation algorithms cannot achieve the expected performance when dealing with delay-sensitive traffic. This results in low bandwidth utilization and slow bandwidth estimation, rendering it unfeasible to deliver multi-stream on time. We propose an effective transport framework with different modules for real-time multi-stream and introduce an Agent-to-Agent transport scheme that provides many-to-one connection as the main implementation way of 3D naked-eye transport framework. Additionally, we propose a direct bandwidth estimation algorithm to quickly match network bandwidth for low-delay transport. The Agent terminal centrally processes consolidates transports, and provides macro-level management of multiple video streams. The algorithm directly detects the available bandwidth using packet interval and packet rate models. Finally, using rate decision algorithm arbitrates the results to directly measure the maximum available bandwidth of the link. The Agent-to-Agent achieves 99% bandwidth utilization, addressing the limitations of existing streaming schemes in handling concurrent data streams. Our algorithm provides precise bandwidth estimates with minimal time overhead, meeting the requirements of a delay-sensitive 3D naked-eye system across diverse environments.

裸眼 3D 由多数据流构建而成,是立体视频的典型表现形式。其巨大的数据量和严格的低延迟传输要求为高质量的实时传输带来了巨大挑战。通过分析和实验验证,目前使用服务器-客户端或点对点方案的流媒体传输框架在以一对一格式传输裸眼 3D 时面临困难。此外,现有的带宽估算算法在处理对延迟敏感的流量时无法达到预期性能。这导致带宽利用率低,带宽估算速度慢,无法按时传输多数据流。我们为实时多流提出了一个包含不同模块的有效传输框架,并引入了一种提供多对一连接的代理对代理传输方案,作为三维裸眼传输框架的主要实现方式。此外,我们还提出了一种直接带宽估算算法,以快速匹配网络带宽,实现低延迟传输。代理终端集中处理合并传输,对多个视频流进行宏观管理。该算法利用数据包间隔和数据包速率模型直接检测可用带宽。最后,使用速率决策算法对结果进行仲裁,以直接测量链路的最大可用带宽。代理对代理的带宽利用率达到 99%,解决了现有流媒体方案在处理并发数据流方面的局限性。我们的算法以最小的时间开销提供精确的带宽估算,满足了不同环境下对延迟敏感的 3D 裸眼系统的要求。
{"title":"Designing transport scheme of 3D naked-eye system","authors":"Rong Zheng,&nbsp;Xiaoqin Feng,&nbsp;Fengyuan Ren","doi":"10.1016/j.jnca.2024.103988","DOIUrl":"10.1016/j.jnca.2024.103988","url":null,"abstract":"<div><p>3D naked-eye is constructed from multi-stream as a typical representation of stereoscopic video. Its enormous data volume and stringent low-delay transport requirements pose significant challenges for high-quality real-time transport. Through analysis and experimental verification that current streaming media transport frameworks using the server–client or peer-to-peer scheme face difficulties when transmitting 3D naked-eye in a one-to-one format. Besides, the existing bandwidth estimation algorithms cannot achieve the expected performance when dealing with delay-sensitive traffic. This results in low bandwidth utilization and slow bandwidth estimation, rendering it unfeasible to deliver multi-stream on time. We propose an effective transport framework with different modules for real-time multi-stream and introduce an Agent-to-Agent transport scheme that provides many-to-one connection as the main implementation way of 3D naked-eye transport framework. Additionally, we propose a direct bandwidth estimation algorithm to quickly match network bandwidth for low-delay transport. The Agent terminal centrally processes consolidates transports, and provides macro-level management of multiple video streams. The algorithm directly detects the available bandwidth using packet interval and packet rate models. Finally, using rate decision algorithm arbitrates the results to directly measure the maximum available bandwidth of the link. The Agent-to-Agent achieves 99% bandwidth utilization, addressing the limitations of existing streaming schemes in handling concurrent data streams. Our algorithm provides precise bandwidth estimates with minimal time overhead, meeting the requirements of a delay-sensitive 3D naked-eye system across diverse environments.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103988"},"PeriodicalIF":7.7,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141904708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFier: A directed vulnerability verifier for Ethereum smart contracts DFier:以太坊智能合约的定向漏洞验证器
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-30 DOI: 10.1016/j.jnca.2024.103984
Zeli Wang , Weiqi Dai , Ming Li , Kim-Kwang Raymond Choo , Deqing Zou

Smart contracts are self-executing digital agreements that automatically enforce the terms between parties, playing a crucial role in blockchain systems. However, due to the potential losses of digital assets caused by vulnerabilities, the security issues of Ethereum smart contracts have garnered widespread attention. To address this, researchers have developed various techniques to detect vulnerabilities in smart contracts, with fuzzing techniques achieving promising results. Nonetheless, current fuzzers are unable to effectively exercise suspicious targets because they overlook two key factors: comprehensively exploring all paths to the targets and providing high-quality directed seed inputs. This paper presents a Directed vulnerability veriFier (DFier), which elaborates effective transaction sequences with directed inputs for the fuzzer. This focuses on exploring target paths and automatically validating whether the specified locations are vulnerable. Specifically, DFier employs static analysis to help locate target paths, facilitating their comprehensive exploration. Additionally, we devise three heuristic strategies to enable our fuzzing technique to generate directed inputs that effectively validate the targets. Extensive experiments demonstrate that DFier is effective in verifying contract security, compared with three existing contract fuzzers (i.e., contractFuzzer, sFuzz, and conFuzzius), while the performance losses are in an acceptable range.

智能合约是一种自动执行的数字协议,可以自动执行各方之间的条款,在区块链系统中发挥着至关重要的作用。然而,由于漏洞可能导致数字资产损失,以太坊智能合约的安全问题引起了广泛关注。为此,研究人员开发了各种技术来检测智能合约中的漏洞,其中模糊技术取得了可喜的成果。然而,目前的模糊器由于忽略了两个关键因素,即全面探索通往目标的所有路径和提供高质量的定向种子输入,因此无法有效地对可疑目标进行练习。本文提出了一种定向漏洞验证器(DFier),它为模糊器精心设计了具有定向输入的有效交易序列。其重点是探索目标路径,并自动验证指定位置是否存在漏洞。具体来说,DFier 利用静态分析来帮助定位目标路径,从而促进对目标路径的全面探索。此外,我们还设计了三种启发式策略,使我们的模糊技术能够生成有效验证目标的定向输入。广泛的实验证明,与现有的三种合同模糊器(即 contractFuzzer、sFuzz 和 conFuzzius)相比,DFier 能有效验证合同的安全性,而性能损失在可接受的范围内。
{"title":"DFier: A directed vulnerability verifier for Ethereum smart contracts","authors":"Zeli Wang ,&nbsp;Weiqi Dai ,&nbsp;Ming Li ,&nbsp;Kim-Kwang Raymond Choo ,&nbsp;Deqing Zou","doi":"10.1016/j.jnca.2024.103984","DOIUrl":"10.1016/j.jnca.2024.103984","url":null,"abstract":"<div><p>Smart contracts are self-executing digital agreements that automatically enforce the terms between parties, playing a crucial role in blockchain systems. However, due to the potential losses of digital assets caused by vulnerabilities, the security issues of Ethereum smart contracts have garnered widespread attention. To address this, researchers have developed various techniques to detect vulnerabilities in smart contracts, with fuzzing techniques achieving promising results. Nonetheless, current fuzzers are unable to effectively exercise suspicious targets because they overlook two key factors: comprehensively exploring all paths to the targets and providing high-quality directed seed inputs. This paper presents a <u>D</u>irected vulnerability veri<u>Fier</u> (DFier), which elaborates effective transaction sequences with directed inputs for the fuzzer. This focuses on exploring target paths and automatically validating whether the specified locations are vulnerable. Specifically, DFier employs static analysis to help locate target paths, facilitating their comprehensive exploration. Additionally, we devise three heuristic strategies to enable our fuzzing technique to generate directed inputs that effectively validate the targets. Extensive experiments demonstrate that DFier is effective in verifying contract security, compared with three existing contract fuzzers (i.e., contractFuzzer, sFuzz, and conFuzzius), while the performance losses are in an acceptable range.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103984"},"PeriodicalIF":7.7,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141904701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks MATE:用于混合软件定义网络流量工程的多代理强化学习方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-30 DOI: 10.1016/j.jnca.2024.103981
Yingya Guo , Mingjie Ding , Weihong Zhou , Bin Lin , Cen Chen , Huan Luo

Hybrid Software Defined Networks (Hybrid SDNs), which combines the robustness of distributed network and the flexibility of centralized network, is now a prevailing network architecture. Previous hybrid SDN Traffic Engineering (TE) solutions search an optimal link weight setting or compute the splitting ratios of traffic leveraging heuristic algorithms. However, these methods cannot react timely to the fluctuating traffic demands in dynamic environments and suffer a hefty performance degradation when traffic demands change or network failures happen, especially when network scale is large. To cope with this, we propose a Multi-Agent reinforcement learning based TE method MATE that timely determines the route selection for network flows in dynamic hybrid SDNs. Through dividing the large-scale routing optimization problem into small-scale problem, MATE can better learn the mapping between the traffic demands and routing policy, and efficiently make online routing inference with dynamic traffic demands. To collaborate multiple agents and speed up the convergence in the training process, we innovatively design the actor network and introduce previous actions of all agents in the training of each agent. Extensive experiments conducted on different network topologies demonstrate our proposed method MATE has superior TE performance with dynamic traffic demands and is robust to network failures.

混合软件定义网络(Hybrid SDN)结合了分布式网络的鲁棒性和集中式网络的灵活性,是目前流行的网络架构。以往的混合 SDN 流量工程(TE)解决方案利用启发式算法搜索最佳链路权重设置或计算流量分流比。然而,这些方法无法及时应对动态环境中不断变化的流量需求,当流量需求发生变化或网络发生故障时,尤其是当网络规模较大时,性能会严重下降。为此,我们提出了一种基于多代理强化学习的 TE 方法 MATE,它能及时确定动态混合 SDN 中网络流的路由选择。通过将大规模路由优化问题划分为小规模问题,MATE 可以更好地学习流量需求与路由策略之间的映射关系,并在动态流量需求下高效地进行在线路由推断。为了让多个代理协同工作并加快训练过程的收敛速度,我们创新性地设计了代理网络,并在每个代理的训练中引入了所有代理之前的行动。在不同网络拓扑结构上进行的大量实验证明,我们提出的 MATE 方法在动态流量需求下具有卓越的 TE 性能,并且对网络故障具有鲁棒性。
{"title":"MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks","authors":"Yingya Guo ,&nbsp;Mingjie Ding ,&nbsp;Weihong Zhou ,&nbsp;Bin Lin ,&nbsp;Cen Chen ,&nbsp;Huan Luo","doi":"10.1016/j.jnca.2024.103981","DOIUrl":"10.1016/j.jnca.2024.103981","url":null,"abstract":"<div><p>Hybrid Software Defined Networks (Hybrid SDNs), which combines the robustness of distributed network and the flexibility of centralized network, is now a prevailing network architecture. Previous hybrid SDN Traffic Engineering (TE) solutions search an optimal link weight setting or compute the splitting ratios of traffic leveraging heuristic algorithms. However, these methods cannot react timely to the fluctuating traffic demands in dynamic environments and suffer a hefty performance degradation when traffic demands change or network failures happen, especially when network scale is large. To cope with this, we propose a Multi-Agent reinforcement learning based TE method MATE that timely determines the route selection for network flows in dynamic hybrid SDNs. Through dividing the large-scale routing optimization problem into small-scale problem, MATE can better learn the mapping between the traffic demands and routing policy, and efficiently make online routing inference with dynamic traffic demands. To collaborate multiple agents and speed up the convergence in the training process, we innovatively design the actor network and introduce previous actions of all agents in the training of each agent. Extensive experiments conducted on different network topologies demonstrate our proposed method MATE has superior TE performance with dynamic traffic demands and is robust to network failures.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103981"},"PeriodicalIF":7.7,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141904706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1