首页 > 最新文献

IET Communications最新文献

英文 中文
Specific emitter identification by wavelet residual network based on attention mechanism 基于注意力机制的小波残差网络识别特定发射器
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-24 DOI: 10.1049/cmu2.12799
Wenqiang Shi, Yingke Lei, Hu Jin, Fei Teng, Caiyi Lou

Specific emitter identification technology plays a very important role in spectrum resource management, wireless network security, cognitive radio etc. However, in complex electromagnetic environments, the variability and uncertainty of signals make it very difficult to extract representative feature representations of the signals. At the same time, the feature extraction capability of the recognition model is also a factor that needs to be considered. To address these issues, a wavelet residual neural network model based on attention mechanism is proposed for specific emitter identification. First, multi-level wavelet decomposition is performed on all received signals to obtain their wavelet detail coefficients at different scales. Next, all the wavelet detail coefficients are used as the feature input for the attention-based residual network, and perform parallel feature extraction at multi scales. Finally, the feature representation capability of all coefficients are compared, and the model's recognition results based on it are obtained. The recognition rates on the three datasets are 94.7%, 93.21%, and 86.1%, respectively, all of which are superior to recent state-of-the-art algorithms. In addition, through ablation experiment, the validity of each component of the model has been verified.

特定发射器识别技术在频谱资源管理、无线网络安全、认知无线电等方面发挥着非常重要的作用。然而,在复杂的电磁环境中,信号的可变性和不确定性使得提取信号的代表性特征表征变得非常困难。同时,识别模型的特征提取能力也是一个需要考虑的因素。针对这些问题,本文提出了一种基于注意力机制的小波残差神经网络模型,用于特定发射器的识别。首先,对所有接收信号进行多级小波分解,以获得不同尺度的小波细节系数。然后,将所有小波细节系数作为基于注意力的残差网络的特征输入,并进行多尺度并行特征提取。最后,比较所有系数的特征表示能力,并得出基于此的模型识别结果。三个数据集的识别率分别为 94.7%、93.21% 和 86.1%,均优于最新的先进算法。此外,还通过消融实验验证了模型各组成部分的有效性。
{"title":"Specific emitter identification by wavelet residual network based on attention mechanism","authors":"Wenqiang Shi,&nbsp;Yingke Lei,&nbsp;Hu Jin,&nbsp;Fei Teng,&nbsp;Caiyi Lou","doi":"10.1049/cmu2.12799","DOIUrl":"https://doi.org/10.1049/cmu2.12799","url":null,"abstract":"<p>Specific emitter identification technology plays a very important role in spectrum resource management, wireless network security, cognitive radio etc. However, in complex electromagnetic environments, the variability and uncertainty of signals make it very difficult to extract representative feature representations of the signals. At the same time, the feature extraction capability of the recognition model is also a factor that needs to be considered. To address these issues, a wavelet residual neural network model based on attention mechanism is proposed for specific emitter identification. First, multi-level wavelet decomposition is performed on all received signals to obtain their wavelet detail coefficients at different scales. Next, all the wavelet detail coefficients are used as the feature input for the attention-based residual network, and perform parallel feature extraction at multi scales. Finally, the feature representation capability of all coefficients are compared, and the model's recognition results based on it are obtained. The recognition rates on the three datasets are 94.7%, 93.21%, and 86.1%, respectively, all of which are superior to recent state-of-the-art algorithms. In addition, through ablation experiment, the validity of each component of the model has been verified.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12799","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward designing a lightweight RFID authentication protocol for constrained environments 为受限环境设计轻量级 RFID 验证协议
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-22 DOI: 10.1049/cmu2.12794
Nasser Zarbi, Ali Zaeembashi, Nasour Bagheri, Morteza Adeli

In present times, Radio-Frequency Identification (RFID) systems have seen a significant rise in their usage. There has been an increasing interest in developing even lighter RFID protocols suitable for resource-constrained environments. Ensuring security and privacy remain critical challenges in RFID-based systems. Recently proposed lightweight authentication schemes, namely LRSAS+ and LRARP+, are ideally suited for constrained devices. However, this article investigates these schemes and reveals certain vulnerabilities: LRSAS+ is susceptible to tag impersonation, desynchronization, and traceability attacks, while LRARP+ can fall prey to traceability and secret disclosure attacks. An enhanced version of these authentication systems is proposed that tackles their inherent weaknesses by leveraging the χper$chi per$ function. To verify the security of the proposed scheme, a formal analysis is conducted using Gong–Needham–Yahalom logic (GNY logic) and an automated security protocol verification tool, ProVerif. The improved scheme's effectiveness is also compared with multiple contemporary lightweight systems. The results indicate that the enhanced scheme not only meets the security requirements for lightweight authentication schemes but also achieves this with minimal computational overhead.

当前,射频识别(RFID)系统的使用率大幅上升。人们对开发适合资源有限环境的更轻便的 RFID 协议越来越感兴趣。在基于 RFID 的系统中,确保安全性和隐私性仍是关键挑战。最近提出的轻量级认证方案,即 LRSAS+ 和 LRARP+,非常适合受限设备。然而,本文对这些方案进行了研究,并揭示了某些漏洞:LRSAS+ 容易受到标签冒充、不同步和可追踪性攻击,而 LRARP+ 则可能受到可追踪性和秘密泄露攻击。本文提出了这些认证系统的增强版,通过利用 χ p e r $chi per$ 函数来解决其固有的弱点。为了验证所提方案的安全性,我们使用 Gong-Needham-Yahalom 逻辑(GNY 逻辑)和自动安全协议验证工具 ProVerif 进行了形式分析。此外,还将改进方案的有效性与多个当代轻量级系统进行了比较。结果表明,改进后的方案不仅能满足轻量级身份验证方案的安全要求,而且能以最小的计算开销实现这一目标。
{"title":"Toward designing a lightweight RFID authentication protocol for constrained environments","authors":"Nasser Zarbi,&nbsp;Ali Zaeembashi,&nbsp;Nasour Bagheri,&nbsp;Morteza Adeli","doi":"10.1049/cmu2.12794","DOIUrl":"https://doi.org/10.1049/cmu2.12794","url":null,"abstract":"<p>In present times, Radio-Frequency Identification (RFID) systems have seen a significant rise in their usage. There has been an increasing interest in developing even lighter RFID protocols suitable for resource-constrained environments. Ensuring security and privacy remain critical challenges in RFID-based systems. Recently proposed lightweight authentication schemes, namely LRSAS+ and LRARP+, are ideally suited for constrained devices. However, this article investigates these schemes and reveals certain vulnerabilities: LRSAS+ is susceptible to tag impersonation, desynchronization, and traceability attacks, while LRARP+ can fall prey to traceability and secret disclosure attacks. An enhanced version of these authentication systems is proposed that tackles their inherent weaknesses by leveraging the <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>χ</mi>\u0000 <mi>p</mi>\u0000 <mi>e</mi>\u0000 <mi>r</mi>\u0000 </mrow>\u0000 <annotation>$chi per$</annotation>\u0000 </semantics></math> function. To verify the security of the proposed scheme, a formal analysis is conducted using Gong–Needham–Yahalom logic (GNY logic) and an automated security protocol verification tool, ProVerif. The improved scheme's effectiveness is also compared with multiple contemporary lightweight systems. The results indicate that the enhanced scheme not only meets the security requirements for lightweight authentication schemes but also achieves this with minimal computational overhead.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12794","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning 利用深度学习改进 5G 网络切片,增强 SDN 环境中的 QoS 抗攻击能力
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-17 DOI: 10.1049/cmu2.12735
Mohammed Salah Abood, Hua Wang, Bal S. Virdee, Dongxuan He, Maha Fathy, Abdulganiyu Abdu Yusuf, Omar Jamal, Taha A. Elwi, Mohammad Alibakhshikenari, Lida Kouhalvandi, Ashfaq Ahmad

Within the evolving landscape of fifth-generation (5G) wireless networks, the introduction of network-slicing protocols has become pivotal, enabling the accommodation of diverse application needs while fortifying defences against potential security breaches. This study endeavours to construct a comprehensive network-slicing model integrated with an attack detection system within the 5G framework. Leveraging software-defined networking (SDN) along with deep learning techniques, this approach seeks to fortify security measures while optimizing network performance. This undertaking introduces network slicing predicated on SDN with the OpenFlow protocol and Ryu control technology, complemented by a neural network model for attack detection using deep learning methodologies. Additionally, the proposed convolutional neural networks-long short-term memory approach demonstrates superiority over conventional ML algorithms, signifying its potential for real-time attack detection. Evaluation of the proposed system using a 5G dataset showcases an impressive accuracy of 99%, surpassing previous studies, and affirming the efficacy of the approach. Moreover, network slicing significantly enhances quality of service by segmenting services based on bandwidth. Future research will concentrate on real-world implementation, encompassing diverse dataset evaluations, and assessing the model's adaptability across varied scenarios.

在不断发展的第五代(5G)无线网络中,网络切片协议的引入变得至关重要,它既能满足不同的应用需求,又能加强对潜在安全漏洞的防御。本研究致力于在 5G 框架内构建一个集成了攻击检测系统的综合网络切片模型。该方法利用软件定义网络(SDN)和深度学习技术,力求在优化网络性能的同时强化安全措施。这项工作引入了基于 SDN 的网络切片技术、OpenFlow 协议和 Ryu 控制技术,并辅以利用深度学习方法进行攻击检测的神经网络模型。此外,所提出的卷积神经网络长短期记忆方法比传统的 ML 算法更具优势,这表明它具有实时攻击检测的潜力。使用 5G 数据集对所提议的系统进行的评估显示,其准确率达到了令人印象深刻的 99%,超越了以往的研究,肯定了该方法的功效。此外,网络切片还能根据带宽分割服务,从而大大提高服务质量。未来的研究将集中于现实世界的实施,包括各种数据集评估,以及评估模型在不同场景下的适应性。
{"title":"Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning","authors":"Mohammed Salah Abood,&nbsp;Hua Wang,&nbsp;Bal S. Virdee,&nbsp;Dongxuan He,&nbsp;Maha Fathy,&nbsp;Abdulganiyu Abdu Yusuf,&nbsp;Omar Jamal,&nbsp;Taha A. Elwi,&nbsp;Mohammad Alibakhshikenari,&nbsp;Lida Kouhalvandi,&nbsp;Ashfaq Ahmad","doi":"10.1049/cmu2.12735","DOIUrl":"https://doi.org/10.1049/cmu2.12735","url":null,"abstract":"<p>Within the evolving landscape of fifth-generation (5G) wireless networks, the introduction of network-slicing protocols has become pivotal, enabling the accommodation of diverse application needs while fortifying defences against potential security breaches. This study endeavours to construct a comprehensive network-slicing model integrated with an attack detection system within the 5G framework. Leveraging software-defined networking (SDN) along with deep learning techniques, this approach seeks to fortify security measures while optimizing network performance. This undertaking introduces network slicing predicated on SDN with the OpenFlow protocol and Ryu control technology, complemented by a neural network model for attack detection using deep learning methodologies. Additionally, the proposed convolutional neural networks-long short-term memory approach demonstrates superiority over conventional ML algorithms, signifying its potential for real-time attack detection. Evaluation of the proposed system using a 5G dataset showcases an impressive accuracy of 99%, surpassing previous studies, and affirming the efficacy of the approach. Moreover, network slicing significantly enhances quality of service by segmenting services based on bandwidth. Future research will concentrate on real-world implementation, encompassing diverse dataset evaluations, and assessing the model's adaptability across varied scenarios.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12735","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KDGAN: Knowledge distillation-based model copyright protection for secure and communication-efficient model publishing KDGAN:基于知识提炼的模型版权保护,实现安全、通信高效的模型发布
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-17 DOI: 10.1049/cmu2.12795
Bingyi Xie, Honghui Xu, Daehee Seo, DongMyung Shin, Zhipeng Cai

Deep learning-based models have become ubiquitous across a wide range of applications, including computer vision, natural language processing, and robotics. Despite their efficacy, one of the significant challenges associated with deep neural network (DNN) models is the potential risk of copyright leakage due to the inherent vulnerability of the entire model architecture and the communication burden of the large models during publishing. So far, it is still challenging for us to safeguard the intellectual property rights of these DNN models while reducing the communication time during model publishing. To this end, this paper introduces a novel approach using knowledge distillation techniques aimed at training a surrogate model to stand in for the original DNN model. To be specific, a knowledge distillation generative adversarial network (KDGAN) model is proposed to train a student model capable of achieving remarkable performance levels while simultaneously safeguarding the copyright integrity of the original large teacher model and improving communication efficiency during model publishing. Herein, comprehensive experiments are conducted to showcase the efficacy of model copyright protection, communication-efficient model publishing, and the superiority of the proposed KDGAN model over other copyright protection mechanisms.

基于深度学习的模型已在计算机视觉、自然语言处理和机器人等广泛应用中无处不在。尽管深度神经网络(DNN)模型功效卓著,但由于整个模型架构本身的脆弱性以及大型模型在发布过程中的通信负担,其潜在的版权泄露风险也是与之相关的重大挑战之一。迄今为止,如何在减少模型发布过程中的通信时间的同时保护这些 DNN 模型的知识产权,对我们来说仍是一个挑战。为此,本文介绍了一种使用知识蒸馏技术的新方法,旨在训练一个代理模型来替代原始 DNN 模型。具体来说,本文提出了一种知识蒸馏生成式对抗网络(KDGAN)模型,用于训练一个学生模型,该模型能够在保护原始大型教师模型版权完整性和提高模型发布过程中的通信效率的同时,实现出色的性能水平。本文通过综合实验展示了模型版权保护的有效性、模型发布的通信效率以及所提出的 KDGAN 模型相对于其他版权保护机制的优越性。
{"title":"KDGAN: Knowledge distillation-based model copyright protection for secure and communication-efficient model publishing","authors":"Bingyi Xie,&nbsp;Honghui Xu,&nbsp;Daehee Seo,&nbsp;DongMyung Shin,&nbsp;Zhipeng Cai","doi":"10.1049/cmu2.12795","DOIUrl":"https://doi.org/10.1049/cmu2.12795","url":null,"abstract":"<p>Deep learning-based models have become ubiquitous across a wide range of applications, including computer vision, natural language processing, and robotics. Despite their efficacy, one of the significant challenges associated with deep neural network (DNN) models is the potential risk of copyright leakage due to the inherent vulnerability of the entire model architecture and the communication burden of the large models during publishing. So far, it is still challenging for us to safeguard the intellectual property rights of these DNN models while reducing the communication time during model publishing. To this end, this paper introduces a novel approach using knowledge distillation techniques aimed at training a surrogate model to stand in for the original DNN model. To be specific, a knowledge distillation generative adversarial network (KDGAN) model is proposed to train a student model capable of achieving remarkable performance levels while simultaneously safeguarding the copyright integrity of the original large teacher model and improving communication efficiency during model publishing. Herein, comprehensive experiments are conducted to showcase the efficacy of model copyright protection, communication-efficient model publishing, and the superiority of the proposed KDGAN model over other copyright protection mechanisms.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12795","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable communication based on energy spreading transform and iterative detection in MIMO-OFDM systems 基于 MIMO-OFDM 系统中能量传播变换和迭代检测的可靠通信
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-16 DOI: 10.1049/cmu2.12792
Bo He, Hongji Xu, Wei Ji, Yan Du, Hailiang Xiong, Jun Li

The challenge of ensuring reliability for high-efficiency technology, multiple-input-multiple-output orthogonal-frequency-division-multiplexing (MIMO-OFDM), in wireless frequency-selective fading environments persists. In this article, the concept of spreading a symbol's energy is proposed as a viable solution to enhance transmission reliability for MIMO-OFDM systems. And an energy-spreading-transform (EST)-based MIMO-OFDM transceiver is developed. Following the Inverse Fast Fourier Transform (IFFT) performed by the conventional MIMO-OFDM transmitter, an orthogonal transformation called the EST is introduced. This transform spreads the energy of a symbol across the entire frequency domain and all time slots. The EST is coupled with the improved iterative detection algorithm named EST-partial decision (PD)-iterative-interference-cancellation (EST-PD-IIC) to maximize and leverage the potential diversity gain. Numerical simulation results demonstrate that the proposed scheme approaches the performance bound when signal-to-noise ratio (SNR) is about 21dB for 16-ary quadrature amplitude modulation (16-QAM). Complexity analysis illustrates that the computational complexity of the evolved EST-PD-IIC algorithm is lower than that of the famous vertically Bell laboratory layered space-time detector (V-BLAST) when the antenna array size is greater than 3×3$3times 3$. In summary, the proposed scheme is practical for providing high-quality communication in multi-path fading environments and can even enable a reliable communication without channel encoding when Eb/N0 exceeds a threshold in 5G-Advanced.

在无线频率选择性衰减环境中,如何确保高效技术--多输入多输出正交频分复用(MIMO-OFDM)--的可靠性一直是个难题。本文提出了传播符号能量的概念,作为增强 MIMO-OFDM 系统传输可靠性的可行解决方案。并开发了一种基于能量扩散变换(EST)的 MIMO-OFDM 收发器。在传统 MIMO-OFDM 发射机进行反快速傅里叶变换 (IFFT) 之后,引入了一种称为 EST 的正交变换。这种变换将一个符号的能量扩散到整个频域和所有时隙。EST与名为EST-部分决策(PD)-迭代干扰消除(EST-PD-IIC)的改进型迭代检测算法相结合,可最大限度地利用潜在的分集增益。数值模拟结果表明,当信噪比(SNR)约为 21dB 时,对于 16-ary 正交振幅调制(16-QAM),所提出的方案接近性能极限。复杂性分析表明,当天线阵列尺寸大于 3 × 3 3times 3$ 时,进化EST-PD-IIC 算法的计算复杂性低于著名的垂直贝尔实验室分层时空探测器(V-BLAST)。总之,所提出的方案可以在多径衰落环境中提供高质量的通信,在 5G-Advanced 中,当 Eb/N0 超过阈值时,甚至无需信道编码就能实现可靠的通信。
{"title":"Reliable communication based on energy spreading transform and iterative detection in MIMO-OFDM systems","authors":"Bo He,&nbsp;Hongji Xu,&nbsp;Wei Ji,&nbsp;Yan Du,&nbsp;Hailiang Xiong,&nbsp;Jun Li","doi":"10.1049/cmu2.12792","DOIUrl":"https://doi.org/10.1049/cmu2.12792","url":null,"abstract":"<p>The challenge of ensuring reliability for high-efficiency technology, multiple-input-multiple-output orthogonal-frequency-division-multiplexing (MIMO-OFDM), in wireless frequency-selective fading environments persists. In this article, the concept of spreading a symbol's energy is proposed as a viable solution to enhance transmission reliability for MIMO-OFDM systems. And an energy-spreading-transform (EST)-based MIMO-OFDM transceiver is developed. Following the Inverse Fast Fourier Transform (IFFT) performed by the conventional MIMO-OFDM transmitter, an orthogonal transformation called the EST is introduced. This transform spreads the energy of a symbol across the entire frequency domain and all time slots. The EST is coupled with the improved iterative detection algorithm named EST-partial decision (PD)-iterative-interference-cancellation (EST-PD-IIC) to maximize and leverage the potential diversity gain. Numerical simulation results demonstrate that the proposed scheme approaches the performance bound when signal-to-noise ratio (SNR) is about 21dB for 16-ary quadrature amplitude modulation (16-QAM). Complexity analysis illustrates that the computational complexity of the evolved EST-PD-IIC algorithm is lower than that of the famous vertically Bell laboratory layered space-time detector (V-BLAST) when the antenna array size is greater than <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>3</mn>\u0000 <mo>×</mo>\u0000 <mn>3</mn>\u0000 </mrow>\u0000 <annotation>$3times 3$</annotation>\u0000 </semantics></math>. In summary, the proposed scheme is practical for providing high-quality communication in multi-path fading environments and can even enable a reliable communication without channel encoding when Eb/N0 exceeds a threshold in 5G-Advanced.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12792","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A literature review on V2X communications security: Foundation, solutions, status, and future 关于 V2X 通信安全的文献综述:基础、解决方案、现状和未来
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-06-14 DOI: 10.1049/cmu2.12778
Zuobin Ying, Kaichao Wang, Jinbo Xiong, Maode Ma
With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects.
随着车联网(Vehicle to Everything,V2X)概念的完善和发展,其安全问题也逐渐凸显,暴露出许多安全隐患,对V2X的安全要求也越来越高,同样也出现了许多防护措施。本文首先介绍了过去车联网(IoV)的发展历程,总结了一些常见的 V2X 安全威胁,调查了用于 V2X 通信的安全技术,并概述了近 3 年来各技术的发展情况和提出的安全协议。鉴于以往保护方案的不同优缺点,提出了使用国家密码学来补充安全方案或基于国家密码学算法(又称 SM 算法)设计新的安全方案文章的想法。然后介绍了SM2、SM3、SM9和ZUC算法,阐述了近年来SM商用算法的发展和应用情况,最后统计和介绍了目前物联网中使用的安全协议中关于SM算法的部分发展过程,并给出了一些应用前景。
{"title":"A literature review on V2X communications security: Foundation, solutions, status, and future","authors":"Zuobin Ying, Kaichao Wang, Jinbo Xiong, Maode Ma","doi":"10.1049/cmu2.12778","DOIUrl":"https://doi.org/10.1049/cmu2.12778","url":null,"abstract":"With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, surveys the security technologies used for V2X communication, and outlines the development of each technology and the proposed security protocols in the last 3 years. Due to the different advantages and disadvantages of previous protection schemes, the idea of using National Cryptography to supplement the security scheme or designing a new security scheme article based on the National Cryptography Algorithms((AKA SM algorithms) is proposed. The survey then introduces the SM2, SM3, SM9, and ZUC algorithms, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV regarding the SM algorithms and gives some application prospects.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141338787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis of two-stage approaches for embedding network function virtualization enabled multicast services 嵌入网络功能虚拟化组播服务的两阶段方法比较分析
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-14 DOI: 10.1049/cmu2.12787
Mina Asgarian, Ghasem Mirjalily

The Network Function Virtualization (NFV) technology has emerged to turn hardware-based network functions into software-based virtual entities. In NFV-enabled multicast services, the data flow should be passed through a series of Virtual Network Functions (VNFs) before reaching destinations. In the problem of NFV-enabled multicast service embedding, not only the VNFs must be deployed, but also the traffic forwarding topology must be constructed. As the exact solution of this problem suffers from high computational complexity, the heuristic or approximation approaches are used in practice. However, as a way to control the trade off between complexity and efficiency, using multistage solutions is offered in literature. In this article, some two-stage approaches for embedding NFV-enabled multicast services are introduced, and they are compared through analysis and simulation. Specifically, a new low-complexity approach based on the Auxiliary VNF Graph (AVG) is proposed to determine the sub-optimal locations for VNF placement and to construct the NFV-based multicast routing tree. The comparative analysis shows that the proposal has acceptable performance while reducing the computational complexity significantly.

网络功能虚拟化(NFV)技术的出现,将基于硬件的网络功能转化为基于软件的虚拟实体。在 NFV 支持的组播服务中,数据流需要经过一系列虚拟网络功能(VNF)才能到达目的地。在 NFV 支持的组播服务嵌入问题中,不仅必须部署 VNF,还必须构建流量转发拓扑。由于该问题的精确解具有很高的计算复杂性,因此在实践中使用了启发式或近似方法。不过,为了控制复杂性和效率之间的权衡,文献中提出了使用多阶段解决方案的方法。本文介绍了一些嵌入 NFV 多播服务的两阶段方法,并通过分析和仿真对这些方法进行了比较。具体而言,本文提出了一种基于辅助 VNF 图(AVG)的低复杂度新方法,用于确定 VNF 放置的次优位置,并构建基于 NFV 的组播路由树。对比分析表明,该建议具有可接受的性能,同时大大降低了计算复杂度。
{"title":"A comparative analysis of two-stage approaches for embedding network function virtualization enabled multicast services","authors":"Mina Asgarian,&nbsp;Ghasem Mirjalily","doi":"10.1049/cmu2.12787","DOIUrl":"10.1049/cmu2.12787","url":null,"abstract":"<p>The Network Function Virtualization (NFV) technology has emerged to turn hardware-based network functions into software-based virtual entities. In NFV-enabled multicast services, the data flow should be passed through a series of Virtual Network Functions (VNFs) before reaching destinations. In the problem of NFV-enabled multicast service embedding, not only the VNFs must be deployed, but also the traffic forwarding topology must be constructed. As the exact solution of this problem suffers from high computational complexity, the heuristic or approximation approaches are used in practice. However, as a way to control the trade off between complexity and efficiency, using multistage solutions is offered in literature. In this article, some two-stage approaches for embedding NFV-enabled multicast services are introduced, and they are compared through analysis and simulation. Specifically, a new low-complexity approach based on the Auxiliary VNF Graph (AVG) is proposed to determine the sub-optimal locations for VNF placement and to construct the NFV-based multicast routing tree. The comparative analysis shows that the proposal has acceptable performance while reducing the computational complexity significantly.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12787","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141337901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models 增强轻量级自动调制分类模型对抗鲁棒性的知识提炼策略
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-13 DOI: 10.1049/cmu2.12793
Fanghao Xu, Chao Wang, Jiakai Liang, Chenyang Zuo, Keqiang Yue, Wenjun Li

Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully crafted adversarial interference to the transmitted signal. Based on the requirements of efficient computing and edge deployment, a lightweight automatic modulation classification model is proposed. Considering that the lightweight automatic modulation classification model is more susceptible to interference from adversarial attacks and that adversarial training of the lightweight auto-modulation classification model fails to achieve the desired results, an adversarial attack defense system for the lightweight automatic modulation classification model is further proposed, which can enhance the robustness when subjected to adversarial attacks. The defense method aims to transfer the adversarial robustness from a trained large automatic modulation classification model to a lightweight model through the technique of adversarial robust distillation. The proposed method exhibits better adversarial robustness than current defense techniques in feature fusion based automatic modulation classification models in white box attack scenarios.

基于深度学习模型的自动调制分类模型有可能受到对抗性攻击的干扰。在对抗性攻击中,攻击者通过向传输信号添加精心制作的对抗性干扰,导致分类模型对接收信号进行错误分类。根据高效计算和边缘部署的要求,提出了一种轻量级自动调制分类模型。考虑到轻量级自动调制分类模型更容易受到对抗性攻击的干扰,而且对轻量级自动调制分类模型的对抗性训练无法达到预期效果,因此进一步提出了一种针对轻量级自动调制分类模型的对抗性攻击防御系统,该系统可以增强轻量级自动调制分类模型在受到对抗性攻击时的鲁棒性。该防御方法旨在通过对抗鲁棒性蒸馏技术,将经过训练的大型自动调制分类模型的对抗鲁棒性转移到轻量级模型中。与当前基于特征融合的自动调制分类模型的防御技术相比,所提出的方法在白盒攻击场景下表现出更好的对抗鲁棒性。
{"title":"A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models","authors":"Fanghao Xu,&nbsp;Chao Wang,&nbsp;Jiakai Liang,&nbsp;Chenyang Zuo,&nbsp;Keqiang Yue,&nbsp;Wenjun Li","doi":"10.1049/cmu2.12793","DOIUrl":"10.1049/cmu2.12793","url":null,"abstract":"<p>Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully crafted adversarial interference to the transmitted signal. Based on the requirements of efficient computing and edge deployment, a lightweight automatic modulation classification model is proposed. Considering that the lightweight automatic modulation classification model is more susceptible to interference from adversarial attacks and that adversarial training of the lightweight auto-modulation classification model fails to achieve the desired results, an adversarial attack defense system for the lightweight automatic modulation classification model is further proposed, which can enhance the robustness when subjected to adversarial attacks. The defense method aims to transfer the adversarial robustness from a trained large automatic modulation classification model to a lightweight model through the technique of adversarial robust distillation. The proposed method exhibits better adversarial robustness than current defense techniques in feature fusion based automatic modulation classification models in white box attack scenarios.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12793","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141346119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise modelling and mitigation for broadband in-door power line communication systems 宽带室内电力线通信系统的噪声建模与缓解
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-10 DOI: 10.1049/cmu2.12797
Ogunlade M. Adegoke, Saheed Lekan Gbadamosi, Babatunde S. Adejumobi, Israel E. Owolabi, Wasiu Adeyemi Oke, Nnamdi I. Nwulu

Communication systems are greatly hampered by many disruptive noises in powerline communication systems (PLC), which come with strong interference, resulting in the malfunction of PLC systems. Hence, there is a need to model noise and its effect on communication systems. This paper presents noise modelling and mitigation techniques for indoor broadband powerline communication systems. To model the PLC noise, frequency domain measurements employing the GSP-930 spectrum analyser were carried out to determine the noise frequency response in the frequency range of 1–30 MHz. The results obtained were plotted. While the analytical model for the noise model is presented, furthermore, noise mitigation techniques for multiple input multiple output PLC (MIMO-PLC) systems in the form of spatial modulation PLC systems have been proposed. The SM-PLC system employs the indices of the individual transmit lines to increase the data rate, as opposed to the traditional MIMO-PLC systems, where the symbol to be transmitted is transmitted by duplicating the symbol across all lines. The proposed system uses the maximum likelihood (ML) detector at the receiver to obtain estimates of the transmitted symbols. The simulation results of the SM-PLC system are compared with the already existing MIMO-PLC system and show a significant improvement of ≈6 dB and 5.2 dB in signal-to-noise ratio (SNR) at a bit error rate of 10(−5) for spectral efficiencies of 4 bits per channel use (bpcu) and 6 bpcu, respectively. On comparison of the SM-PLC system having a combination of additive white Gaussian noise and impulse noise at the receiver, the SM-PLC system outperformed the traditional MIMO-PLC by 3.5 and 3.8 dB in SNR for 4 and 6 bpcu, respectively.

电力线通信系统(PLC)中的许多干扰性噪声对通信系统的影响很大,这些噪声具有很强的干扰性,导致 PLC 系统出现故障。因此,有必要对噪声及其对通信系统的影响进行建模。本文介绍了室内宽带电力线通信系统的噪声建模和缓解技术。为建立 PLC 噪声模型,使用 GSP-930 频谱分析仪进行了频域测量,以确定 1-30 MHz 频率范围内的噪声频率响应。获得的结果绘制成图。在介绍噪声模型的分析模型的同时,还进一步提出了空间调制 PLC 系统形式的多输入多输出 PLC(MIMO-PLC)系统的噪声缓解技术。与传统的 MIMO-PLC 系统不同,SM-PLC 系统利用各个传输线路的指数来提高数据传输速率,而传统的 MIMO-PLC 系统是通过在所有线路上重复传输要传输的符号来提高数据传输速率。建议的系统在接收器上使用最大似然(ML)检测器来获取传输符号的估计值。SM-PLC 系统的仿真结果与现有的 MIMO-PLC 系统进行了比较,结果表明,在误码率为 10(-5)、频谱效率为每信道使用 4 比特 (bpcu) 和 6 bpcu 时,信噪比 (SNR) 分别显著提高了≈6 dB 和 5.2 dB。在接收器结合了加性白高斯噪声和脉冲噪声的 SM-PLC 系统的比较中,SM-PLC 系统在 4 和 6 bpcu 的信噪比方面分别比传统的 MIMO-PLC 系统高出 3.5 和 3.8 dB。
{"title":"Noise modelling and mitigation for broadband in-door power line communication systems","authors":"Ogunlade M. Adegoke,&nbsp;Saheed Lekan Gbadamosi,&nbsp;Babatunde S. Adejumobi,&nbsp;Israel E. Owolabi,&nbsp;Wasiu Adeyemi Oke,&nbsp;Nnamdi I. Nwulu","doi":"10.1049/cmu2.12797","DOIUrl":"10.1049/cmu2.12797","url":null,"abstract":"<p>Communication systems are greatly hampered by many disruptive noises in powerline communication systems (PLC), which come with strong interference, resulting in the malfunction of PLC systems. Hence, there is a need to model noise and its effect on communication systems. This paper presents noise modelling and mitigation techniques for indoor broadband powerline communication systems. To model the PLC noise, frequency domain measurements employing the GSP-930 spectrum analyser were carried out to determine the noise frequency response in the frequency range of 1–30 MHz. The results obtained were plotted. While the analytical model for the noise model is presented, furthermore, noise mitigation techniques for multiple input multiple output PLC (MIMO-PLC) systems in the form of spatial modulation PLC systems have been proposed. The SM-PLC system employs the indices of the individual transmit lines to increase the data rate, as opposed to the traditional MIMO-PLC systems, where the symbol to be transmitted is transmitted by duplicating the symbol across all lines. The proposed system uses the maximum likelihood (ML) detector at the receiver to obtain estimates of the transmitted symbols. The simulation results of the SM-PLC system are compared with the already existing MIMO-PLC system and show a significant improvement of ≈6 dB and 5.2 dB in signal-to-noise ratio (SNR) at a bit error rate of 10(−5) for spectral efficiencies of 4 bits per channel use (bpcu) and 6 bpcu, respectively. On comparison of the SM-PLC system having a combination of additive white Gaussian noise and impulse noise at the receiver, the SM-PLC system outperformed the traditional MIMO-PLC by 3.5 and 3.8 dB in SNR for 4 and 6 bpcu, respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12797","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141364955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sum-rate maximization for downlink multiuser MISO URLLC system aided by IRS with discrete phase shifters 利用带离散移相器的 IRS 辅助下行多用户 MISO URLLC 系统的总和速率最大化
IF 1.5 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-06-09 DOI: 10.1049/cmu2.12790
Chang-Qing Ye, Hong Jiang, Chen-Ping Zeng, Hao-Xin Shi, Zhan-Peng Tang

Intelligent reflecting surface (IRS) has recently been considered as a potential technology for realizing ultra-reliable and low-latency (URLLC) in wireless networks. This paper proposes a resource optimization scheme to maximize the sum-rate for an IRS-assisted downlink multiuser multi-input single-output (MISO) URLLC system. For the perfect CSI scenario, we jointly optimize each user's block-length and packet-error probability, the precoding vectors at the base station (BS), and the passive beamforming with discrete phase shifts at the IRS. Given the problem's complexity, we design a computationally efficient iterative algorithm using successive convex approximation (SCA) and semidefinite relaxation (SDR) techniques to obtain a locally optimal solution. Specifically, for the imperfect CSI scenario, we construct a robust resource optimization problem model and incorporate the S-procedure to address the impact of channel uncertainty, proposing an iterative algorithm based on the alternating optimization (AO) method to achieve a locally optimal solution. Simulation results demonstrate that: 1) An IRS equipped with a 2-bit quantized resolution phase shifter is sufficient to achieve a system sum-rate comparable to that of an ideal phase shifter; 2) Compared to other Baseline schemes, Algorithm 2 exhibits better robustness and superior performance gains under imperfect CSI.

智能反射面(IRS)最近被认为是实现无线网络超可靠和低延迟(URLLC)的潜在技术。本文提出了一种资源优化方案,以最大限度地提高 IRS 辅助下行多用户多输入单输出(MISO)URLLC 系统的总和速率。在完美 CSI 情景下,我们联合优化每个用户的块长度和数据包错误概率、基站(BS)的预编码向量以及 IRS 的离散相移无源波束成形。考虑到问题的复杂性,我们利用连续凸近似(SCA)和半无限松弛(SDR)技术设计了一种计算高效的迭代算法,以获得局部最优解。具体来说,针对不完美 CSI 场景,我们构建了一个鲁棒资源优化问题模型,并结合 S 过程来解决信道不确定性的影响,提出了一种基于交替优化 (AO) 方法的迭代算法,以实现局部最优解。仿真结果表明1) 配备 2 位量化分辨率移相器的 IRS 足以实现与理想移相器相当的系统总和速率;2) 与其他基线方案相比,算法 2 在不完善的 CSI 条件下表现出更好的鲁棒性和卓越的性能增益。
{"title":"Sum-rate maximization for downlink multiuser MISO URLLC system aided by IRS with discrete phase shifters","authors":"Chang-Qing Ye,&nbsp;Hong Jiang,&nbsp;Chen-Ping Zeng,&nbsp;Hao-Xin Shi,&nbsp;Zhan-Peng Tang","doi":"10.1049/cmu2.12790","DOIUrl":"10.1049/cmu2.12790","url":null,"abstract":"<p>Intelligent reflecting surface (IRS) has recently been considered as a potential technology for realizing ultra-reliable and low-latency (URLLC) in wireless networks. This paper proposes a resource optimization scheme to maximize the sum-rate for an IRS-assisted downlink multiuser multi-input single-output (MISO) URLLC system. For the perfect CSI scenario, we jointly optimize each user's block-length and packet-error probability, the precoding vectors at the base station (BS), and the passive beamforming with discrete phase shifts at the IRS. Given the problem's complexity, we design a computationally efficient iterative algorithm using successive convex approximation (SCA) and semidefinite relaxation (SDR) techniques to obtain a locally optimal solution. Specifically, for the imperfect CSI scenario, we construct a robust resource optimization problem model and incorporate the S-procedure to address the impact of channel uncertainty, proposing an iterative algorithm based on the alternating optimization (AO) method to achieve a locally optimal solution. Simulation results demonstrate that: 1) An IRS equipped with a 2-bit quantized resolution phase shifter is sufficient to achieve a system sum-rate comparable to that of an ideal phase shifter; 2) Compared to other Baseline schemes, Algorithm 2 exhibits better robustness and superior performance gains under imperfect CSI.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12790","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141367074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1