首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Frequency Selective Surface Toward 6G Communication Systems: A Contemporary Survey 面向 6G 通信系统的频率选择性表面:当代调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-23 DOI: 10.1109/COMST.2024.3369250
Xuehan Chen;Jingjing Tan;Litian Kang;Fengxiao Tang;Ming Zhao;Nei Kato
Frequency selective surfaces (FSSs) have attracted extensive attention for suppressing interference and improving channel quality and coverage by selectively transmitting or directionally reflecting electromagnetic waves in a specific frequency range in wireless communication networks. Therefore, FSS technology is considered to be another candidate after intelligent reflective surfaces (IRSs) in the sixth generation (6G) communication systems. In this paper, we provide a comprehensive investigation of the theory, design, and classification of FSS, and a contemporary overview of its vision and current applications in future 6G networks, as well as some emerging use cases of FSSs in 6G networks. Then, we describe the fundamentals and design methods of FSS from architecture, performance metrics, and experimental analysis methods and classify the relevant papers according to the FSS applications. Moreover, we review systematically the frequency selection characteristics, reflection, transmission, and absorption properties of FSS, and discuss the corresponding communication models. Additionally, we provide an overview of the vision and requirements for FSS-assisted 6G networks and summarize the FSS communication architecture and performance analysis towards 6G networks. Since the IRS technology is another metasurface candidate for 6G networks, we compare and review them with those for IRS-assisted 6G networks. Furthermore, we review some emerging use cases in 6G networks and present a new use case of adaptive spectrum allocation based on FSS. Finally, based on an extensive literature review and common weaknesses of FSS extant literature, we offer several challenges and some potential research directions.
在无线通信网络中,频率选择性表面(FSS)通过选择性地发射或定向反射特定频率范围内的电磁波来抑制干扰、改善信道质量和覆盖范围,已引起广泛关注。因此,在第六代(6G)通信系统中,FSS 技术被认为是继智能反射面(IRS)之后的又一候选技术。在本文中,我们对 FSS 的理论、设计和分类进行了全面研究,并对其在未来 6G 网络中的愿景和当前应用进行了当代概述,同时还介绍了 FSS 在 6G 网络中的一些新兴用例。然后,我们从架构、性能指标和实验分析方法等方面介绍了 FSS 的基本原理和设计方法,并根据 FSS 的应用对相关论文进行了分类。此外,我们还系统回顾了 FSS 的选频特性、反射、传输和吸收特性,并讨论了相应的通信模型。此外,我们还概述了 FSS 辅助 6G 网络的愿景和要求,并总结了面向 6G 网络的 FSS 通信架构和性能分析。由于 IRS 技术是 6G 网络的另一种元表面候选技术,我们将其与 IRS 辅助 6G 网络进行了比较和审查。此外,我们还回顾了 6G 网络中的一些新兴用例,并介绍了基于 FSS 的自适应频谱分配新用例。最后,基于广泛的文献综述和现有 FSS 文献的共同弱点,我们提出了几个挑战和一些潜在的研究方向。
{"title":"Frequency Selective Surface Toward 6G Communication Systems: A Contemporary Survey","authors":"Xuehan Chen;Jingjing Tan;Litian Kang;Fengxiao Tang;Ming Zhao;Nei Kato","doi":"10.1109/COMST.2024.3369250","DOIUrl":"10.1109/COMST.2024.3369250","url":null,"abstract":"Frequency selective surfaces (FSSs) have attracted extensive attention for suppressing interference and improving channel quality and coverage by selectively transmitting or directionally reflecting electromagnetic waves in a specific frequency range in wireless communication networks. Therefore, FSS technology is considered to be another candidate after intelligent reflective surfaces (IRSs) in the sixth generation (6G) communication systems. In this paper, we provide a comprehensive investigation of the theory, design, and classification of FSS, and a contemporary overview of its vision and current applications in future 6G networks, as well as some emerging use cases of FSSs in 6G networks. Then, we describe the fundamentals and design methods of FSS from architecture, performance metrics, and experimental analysis methods and classify the relevant papers according to the FSS applications. Moreover, we review systematically the frequency selection characteristics, reflection, transmission, and absorption properties of FSS, and discuss the corresponding communication models. Additionally, we provide an overview of the vision and requirements for FSS-assisted 6G networks and summarize the FSS communication architecture and performance analysis towards 6G networks. Since the IRS technology is another metasurface candidate for 6G networks, we compare and review them with those for IRS-assisted 6G networks. Furthermore, we review some emerging use cases in 6G networks and present a new use case of adaptive spectrum allocation based on FSS. Finally, based on an extensive literature review and common weaknesses of FSS extant literature, we offer several challenges and some potential research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1635-1675"},"PeriodicalIF":34.4,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet 量子安全直接通信的演变:通往秦互联网之路
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-19 DOI: 10.1109/COMST.2024.3367535
Dong Pan;Gui-Lu Long;Liuguo Yin;Yu-Bo Sheng;Dong Ruan;Soon Xin Ng;Jianhua Lu;Lajos Hanzo
Communication security has to evolve to a higher plane in the face of the threat from the massive computing power of the emerging quantum computers. Quantum secure direct communication (QSDC) constitutes a promising branch of quantum communication, which is provably secure and overcomes the threat of quantum computing, whilst conveying secret messages directly via the quantum channel. In this survey, we highlight the motivation and the status of QSDC research with special emphasis on its theoretical basis and experimental verification. We will detail the associated point-to-point communication protocols and show how information is protected and transmitted. Finally, we discuss the open challenges as well as the future trends of QSDC networks, emphasizing again that QSDC is not a pure quantum key distribution (QKD) protocol, but a fully-fledged secure communication scheme.
面对新兴量子计算机巨大计算能力的威胁,通信安全必须向更高的层面发展。量子安全直接通信(QSDC)是量子通信的一个有前途的分支,它通过量子信道直接传递秘密信息,具有可证明的安全性,并能克服量子计算的威胁。在本研究中,我们将重点介绍 QSDC 研究的动机和现状,特别强调其理论基础和实验验证。我们将详细介绍相关的点对点通信协议,并展示如何保护和传输信息。最后,我们将讨论 QSDC 网络面临的挑战和未来趋势,并再次强调 QSDC 并不是一个纯粹的量子密钥分发(QKD)协议,而是一个成熟的安全通信方案。
{"title":"The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet","authors":"Dong Pan;Gui-Lu Long;Liuguo Yin;Yu-Bo Sheng;Dong Ruan;Soon Xin Ng;Jianhua Lu;Lajos Hanzo","doi":"10.1109/COMST.2024.3367535","DOIUrl":"10.1109/COMST.2024.3367535","url":null,"abstract":"Communication security has to evolve to a higher plane in the face of the threat from the massive computing power of the emerging quantum computers. Quantum secure direct communication (QSDC) constitutes a promising branch of quantum communication, which is provably secure and overcomes the threat of quantum computing, whilst conveying secret messages directly via the quantum channel. In this survey, we highlight the motivation and the status of QSDC research with special emphasis on its theoretical basis and experimental verification. We will detail the associated point-to-point communication protocols and show how information is protected and transmitted. Finally, we discuss the open challenges as well as the future trends of QSDC networks, emphasizing again that QSDC is not a pure quantum key distribution (QKD) protocol, but a fully-fledged secure communication scheme.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1898-1949"},"PeriodicalIF":34.4,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10440135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Deep Learning to Strengthen the Cyber-Resilience of Renewable Energy Supply Chains: A Survey 利用深度学习加强可再生能源供应链的网络韧性:调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-12 DOI: 10.1109/COMST.2024.3365076
Malka N. Halgamuge
Deep learning shows immense potential for strengthening the cyber-resilience of renewable energy supply chains. However, research gaps in comprehensive benchmarks, real-world model evaluations, and data generation tailored to the renewable domain persist. This study explores applying state-of-the-art deep learning techniques to secure renewable supply chains, drawing insights from over 300 publications. We aim to provide an updated, rigorous analysis of deep learning applications in this field to guide future research. We systematically review literature spanning 2020–2023, retrieving relevant articles from major databases. We examine deep learning’s role in intrusion/anomaly detection, supply chain cyberattack detection frameworks, security standards, historical attack analysis, data management strategies, model architectures, and supply chain cyber datasets. Our analysis demonstrates deep learning enables renewable supply chain anomaly detection by processing massively distributed data. We highlight crucial model design factors, including accuracy, adaptation capability, communication security, and resilience to adversarial threats. Comparing 18 major historical attacks informs risk analysis. We also showcase potential deep learning architectures, evaluating their relative strengths and limitations in security applications. Moreover, our review emphasizes best practices for renewable data curation, considering quality, labeling, access efficiency, and governance. Effective deep learning integration necessitates tailored benchmarks, model tuning guidance, and renewable energy data generation. Our multi-dimensional analysis motivates focused efforts on enhancing detection explanations, securing communications, continually retraining models, and establishing standardized assessment protocols. Overall, we provide a comprehensive roadmap to progress renewable supply chain cyber-resilience leveraging deep learning’s immense potential.
深度学习在加强可再生能源供应链的网络抗灾能力方面显示出巨大的潜力。然而,在综合基准、真实世界模型评估以及为可再生能源领域量身定制的数据生成方面,仍然存在研究空白。本研究从 300 多篇论文中汲取灵感,探索如何将最先进的深度学习技术应用于可再生能源供应链的安全。我们旨在对深度学习在该领域的应用进行最新、严谨的分析,为未来研究提供指导。我们系统地回顾了 2020-2023 年间的文献,从主要数据库中检索了相关文章。我们研究了深度学习在入侵/异常检测、供应链网络攻击检测框架、安全标准、历史攻击分析、数据管理策略、模型架构和供应链网络数据集中的作用。我们的分析表明,深度学习可通过处理大规模分布式数据实现可再生供应链异常检测。我们强调了模型设计的关键因素,包括准确性、适应能力、通信安全性和对对抗性威胁的复原力。比较 18 种主要的历史性攻击可为风险分析提供信息。我们还展示了潜在的深度学习架构,评估了它们在安全应用中的相对优势和局限性。此外,我们的综述还强调了可再生数据整理的最佳实践,考虑到了质量、标签、访问效率和管理。有效的深度学习集成需要量身定制的基准、模型调整指导和可再生能源数据生成。我们的多维分析促使我们集中精力加强检测解释、确保通信安全、不断重新训练模型,并建立标准化的评估协议。总之,我们为利用深度学习的巨大潜力提高可再生能源供应链的网络复原力提供了一个全面的路线图。
{"title":"Leveraging Deep Learning to Strengthen the Cyber-Resilience of Renewable Energy Supply Chains: A Survey","authors":"Malka N. Halgamuge","doi":"10.1109/COMST.2024.3365076","DOIUrl":"10.1109/COMST.2024.3365076","url":null,"abstract":"Deep learning shows immense potential for strengthening the cyber-resilience of renewable energy supply chains. However, research gaps in comprehensive benchmarks, real-world model evaluations, and data generation tailored to the renewable domain persist. This study explores applying state-of-the-art deep learning techniques to secure renewable supply chains, drawing insights from over 300 publications. We aim to provide an updated, rigorous analysis of deep learning applications in this field to guide future research. We systematically review literature spanning 2020–2023, retrieving relevant articles from major databases. We examine deep learning’s role in intrusion/anomaly detection, supply chain cyberattack detection frameworks, security standards, historical attack analysis, data management strategies, model architectures, and supply chain cyber datasets. Our analysis demonstrates deep learning enables renewable supply chain anomaly detection by processing massively distributed data. We highlight crucial model design factors, including accuracy, adaptation capability, communication security, and resilience to adversarial threats. Comparing 18 major historical attacks informs risk analysis. We also showcase potential deep learning architectures, evaluating their relative strengths and limitations in security applications. Moreover, our review emphasizes best practices for renewable data curation, considering quality, labeling, access efficiency, and governance. Effective deep learning integration necessitates tailored benchmarks, model tuning guidance, and renewable energy data generation. Our multi-dimensional analysis motivates focused efforts on enhancing detection explanations, securing communications, continually retraining models, and establishing standardized assessment protocols. Overall, we provide a comprehensive roadmap to progress renewable supply chain cyber-resilience leveraging deep learning’s immense potential.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"2146-2175"},"PeriodicalIF":34.4,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Tutorial on Environment-Aware Communications via Channel Knowledge Map for 6G 通过 6G 信道知识图谱实现环境感知通信教程
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-09 DOI: 10.1109/COMST.2024.3364508
Yong Zeng;Junting Chen;Jie Xu;Di Wu;Xiaoli Xu;Shi Jin;Xiqi Gao;David Gesbert;Shuguang Cui;Rui Zhang
Sixth-generation (6G) mobile communication networks are expected to have dense infrastructures, large antenna size, wide bandwidth, cost-effective hardware, diversified positioning methods, and enhanced intelligence. Such trends bring both new challenges and opportunities for the practical design of 6G. On one hand, acquiring channel state information (CSI) in real time for all wireless links becomes quite challenging in 6G. On the other hand, there would be numerous data sources in 6G containing high-quality location-tagged channel data, e.g., the estimated channels or beams between base station (BS) and user equipment (UE), making it possible to better learn the local wireless environment. By exploiting this new opportunity and for tackling the CSI acquisition challenge, there is a promising paradigm shift from the conventional environment-unaware communications to the new environment-aware communications based on the novel approach of channel knowledge map (CKM). This article aims to provide a comprehensive overview on environment-aware communications enabled by CKM to fully harness its benefits for 6G. First, the basic concept of CKM is presented, followed by the comparison of CKM with various existing channel inference techniques. Next, the main techniques for CKM construction are discussed, including both environment model-free and environment model-assisted approaches. Furthermore, a general framework is presented for the utilization of CKM to achieve environment-aware communications, followed by some typical CKM-aided communication scenarios. Finally, important open problems in CKM research are highlighted and potential solutions are discussed to inspire future work.
第六代(6G)移动通信网络预计将拥有密集的基础设施、大尺寸天线、宽带宽、高性价比硬件、多样化定位方法和更高的智能。这些趋势为 6G 的实际设计带来了新的挑战和机遇。一方面,为所有无线链路实时获取信道状态信息(CSI)在 6G 中变得相当具有挑战性。另一方面,在 6G 中会有大量数据源包含高质量的位置标记信道数据,例如基站(BS)和用户设备(UE)之间的估计信道或波束,从而有可能更好地了解本地无线环境。通过利用这一新机会和应对 CSI 获取挑战,有望实现从传统环境感知通信到基于信道知识图(CKM)新方法的新型环境感知通信的范式转变。本文旨在全面概述由 CKM 实现的环境感知通信,以充分发挥其在 6G 中的优势。首先介绍了 CKM 的基本概念,然后比较了 CKM 与现有的各种信道推理技术。接下来,讨论了构建 CKM 的主要技术,包括无环境模型和有环境模型辅助的方法。此外,还提出了利用 CKM 实现环境感知通信的总体框架,并介绍了一些典型的 CKM 辅助通信场景。最后,强调了 CKM 研究中的重要开放问题,并讨论了潜在的解决方案,以启发未来的工作。
{"title":"A Tutorial on Environment-Aware Communications via Channel Knowledge Map for 6G","authors":"Yong Zeng;Junting Chen;Jie Xu;Di Wu;Xiaoli Xu;Shi Jin;Xiqi Gao;David Gesbert;Shuguang Cui;Rui Zhang","doi":"10.1109/COMST.2024.3364508","DOIUrl":"10.1109/COMST.2024.3364508","url":null,"abstract":"Sixth-generation (6G) mobile communication networks are expected to have dense infrastructures, large antenna size, wide bandwidth, cost-effective hardware, diversified positioning methods, and enhanced intelligence. Such trends bring both new challenges and opportunities for the practical design of 6G. On one hand, acquiring channel state information (CSI) in real time for all wireless links becomes quite challenging in 6G. On the other hand, there would be numerous data sources in 6G containing high-quality location-tagged channel data, e.g., the estimated channels or beams between base station (BS) and user equipment (UE), making it possible to better learn the local wireless environment. By exploiting this new opportunity and for tackling the CSI acquisition challenge, there is a promising paradigm shift from the conventional environment-unaware communications to the new environment-aware communications based on the novel approach of channel knowledge map (CKM). This article aims to provide a comprehensive overview on environment-aware communications enabled by CKM to fully harness its benefits for 6G. First, the basic concept of CKM is presented, followed by the comparison of CKM with various existing channel inference techniques. Next, the main techniques for CKM construction are discussed, including both environment model-free and environment model-assisted approaches. Furthermore, a general framework is presented for the utilization of CKM to achieve environment-aware communications, followed by some typical CKM-aided communication scenarios. Finally, important open problems in CKM research are highlighted and potential solutions are discussed to inspire future work.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1478-1519"},"PeriodicalIF":34.4,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Authentication and Security Design in the Machine Learning Era 机器学习时代的物理层认证和安全设计
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-08 DOI: 10.1109/COMST.2024.3363639
Tiep M. Hoang;Alireza Vahid;Hoang Duong Tuan;Lajos Hanzo
Security at the physical layer (PHY) is a salient research topic in wireless systems, and machine learning (ML) is emerging as a powerful tool for providing new data-driven security solutions. Therefore, the application of ML techniques to the PHY security is of crucial importance in the landscape of more and more data-driven wireless services. In this context, we first summarize the family of bespoke ML algorithms that are eminently suitable for wireless security. Then, we review the recent progress in ML-aided PHY security, where the term “PHY security” is classified into two different types: i) PHY authentication and ii) secure PHY transmission. Moreover, we treat NNs as special types of ML and present how to deal with PHY security optimization problems using NNs. Finally, we identify some major challenges and opportunities in tackling PHY security challenges by applying carefully tailored ML tools.
物理层(PHY)安全是无线系统的一个突出研究课题,而机器学习(ML)正在成为提供新的数据驱动安全解决方案的有力工具。因此,在越来越多的数据驱动型无线服务中,将 ML 技术应用于物理层安全至关重要。在此背景下,我们首先总结了非常适合无线安全的定制 ML 算法系列。然后,我们回顾了 ML 辅助 PHY 安全的最新进展,其中 "PHY 安全 "一词分为两种不同类型:i) PHY 身份验证和 ii) 安全 PHY 传输。此外,我们将 NNs 视为特殊类型的 ML,并介绍了如何使用 NNs 处理 PHY 安全优化问题。最后,我们指出了通过应用精心定制的 ML 工具应对 PHY 安全挑战的一些主要挑战和机遇。
{"title":"Physical Layer Authentication and Security Design in the Machine Learning Era","authors":"Tiep M. Hoang;Alireza Vahid;Hoang Duong Tuan;Lajos Hanzo","doi":"10.1109/COMST.2024.3363639","DOIUrl":"10.1109/COMST.2024.3363639","url":null,"abstract":"Security at the physical layer (PHY) is a salient research topic in wireless systems, and machine learning (ML) is emerging as a powerful tool for providing new data-driven security solutions. Therefore, the application of ML techniques to the PHY security is of crucial importance in the landscape of more and more data-driven wireless services. In this context, we first summarize the family of bespoke ML algorithms that are eminently suitable for wireless security. Then, we review the recent progress in ML-aided PHY security, where the term “PHY security” is classified into two different types: i) PHY authentication and ii) secure PHY transmission. Moreover, we treat NNs as special types of ML and present how to deal with PHY security optimization problems using NNs. Finally, we identify some major challenges and opportunities in tackling PHY security challenges by applying carefully tailored ML tools.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1830-1860"},"PeriodicalIF":34.4,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey 无线联合学习的数据和模型中毒后门攻击及防御机制:全面调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-07 DOI: 10.1109/COMST.2024.3361451
Yichen Wan;Youyang Qu;Wei Ni;Yong Xiang;Longxiang Gao;Ekram Hossain
Due to the greatly improved capabilities of devices, massive data, and increasing concern about data privacy, Federated Learning (FL) has been increasingly considered for applications to wireless communication networks (WCNs). Wireless FL (WFL) is a distributed method of training a global deep learning model in which a large number of participants each train a local model on their training datasets and then upload the local model updates to a central server. However, in general, non-independent and identically distributed (non-IID) data of WCNs raises concerns about robustness, as a malicious participant could potentially inject a “backdoor” into the global model by uploading poisoned data or models over WCN. This could cause the model to misclassify malicious inputs as a specific target class while behaving normally with benign inputs. This survey provides a comprehensive review of the latest backdoor attacks and defense mechanisms. It classifies them according to their targets (data poisoning or model poisoning), the attack phase (local data collection, training, or aggregation), and defense stage (local training, before aggregation, during aggregation, or after aggregation). The strengths and limitations of existing attack strategies and defense mechanisms are analyzed in detail. Comparisons of existing attack methods and defense designs are carried out, pointing to noteworthy findings, open challenges, and potential future research directions related to security and privacy of WFL.
由于设备性能的大幅提升、海量数据以及对数据隐私的日益关注,人们越来越多地考虑将联合学习(FL)应用于无线通信网络(WCN)。无线联合学习(WFL)是一种训练全局深度学习模型的分布式方法,在这种方法中,大量参与者各自在其训练数据集上训练本地模型,然后将本地模型更新上传到中央服务器。然而,一般来说,WCN 的非独立和同分布(non-IID)数据会引发对鲁棒性的担忧,因为恶意参与者有可能通过 WCN 上传有毒数据或模型,向全局模型注入 "后门"。这可能导致模型将恶意输入错误分类为特定目标类别,而对良性输入则表现正常。本调查全面回顾了最新的后门攻击和防御机制。它根据目标(数据中毒或模型中毒)、攻击阶段(本地数据收集、训练或聚合)和防御阶段(本地训练、聚合前、聚合中或聚合后)对它们进行了分类。详细分析了现有攻击策略和防御机制的优势和局限性。比较了现有的攻击方法和防御设计,指出了与 WFL 的安全性和隐私性相关的值得注意的发现、公开挑战和潜在的未来研究方向。
{"title":"Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey","authors":"Yichen Wan;Youyang Qu;Wei Ni;Yong Xiang;Longxiang Gao;Ekram Hossain","doi":"10.1109/COMST.2024.3361451","DOIUrl":"10.1109/COMST.2024.3361451","url":null,"abstract":"Due to the greatly improved capabilities of devices, massive data, and increasing concern about data privacy, Federated Learning (FL) has been increasingly considered for applications to wireless communication networks (WCNs). Wireless FL (WFL) is a distributed method of training a global deep learning model in which a large number of participants each train a local model on their training datasets and then upload the local model updates to a central server. However, in general, non-independent and identically distributed (non-IID) data of WCNs raises concerns about robustness, as a malicious participant could potentially inject a “backdoor” into the global model by uploading poisoned data or models over WCN. This could cause the model to misclassify malicious inputs as a specific target class while behaving normally with benign inputs. This survey provides a comprehensive review of the latest backdoor attacks and defense mechanisms. It classifies them according to their targets (data poisoning or model poisoning), the attack phase (local data collection, training, or aggregation), and defense stage (local training, before aggregation, during aggregation, or after aggregation). The strengths and limitations of existing attack strategies and defense mechanisms are analyzed in detail. Comparisons of existing attack methods and defense designs are carried out, pointing to noteworthy findings, open challenges, and potential future research directions related to security and privacy of WFL.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1861-1897"},"PeriodicalIF":34.4,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Quantum Internet Protocols From a Layered Perspective 分层视角下的量子互联网协议概览
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-05 DOI: 10.1109/COMST.2024.3361662
Yuan Li;Hao Zhang;Chen Zhang;Tao Huang;F. Richard Yu
With the development of quantum technologies, the quantum Internet has demonstrated unique applications beyond the classical Internet and has been investigated extensively in recent years. In the construction of conventional Internet software, the protocol stack is the core architecture for coordinating modules. How to design a protocol stack for the quantum Internet is a challenging problem. In this paper, we systematically review the latest developments in quantum Internet protocols from the perspective of protocol stack layering. By summarizing and analyzing the progress in each layer’s protocols, we reveal the current research status and connections among the layers. Our work provides readers with a comprehensive understanding of the quantum Internet and can help support researchers focusing on a single layer to better define the functions that the layer should possess and optimize related protocols. This approach enables all layers to work better together based on an understanding of the other layers.
随着量子技术的发展,量子互联网已展现出超越经典互联网的独特应用,近年来已被广泛研究。在传统互联网软件的构建中,协议栈是协调模块的核心架构。如何设计量子互联网的协议栈是一个具有挑战性的问题。本文从协议栈分层的角度,系统回顾了量子互联网协议的最新发展。通过总结和分析各层协议的进展,我们揭示了各层协议的研究现状和联系。我们的工作为读者提供了对量子互联网的全面了解,有助于支持研究人员专注于单层,更好地定义该层应具备的功能并优化相关协议。这种方法能让所有层在了解其他层的基础上更好地协同工作。
{"title":"A Survey of Quantum Internet Protocols From a Layered Perspective","authors":"Yuan Li;Hao Zhang;Chen Zhang;Tao Huang;F. Richard Yu","doi":"10.1109/COMST.2024.3361662","DOIUrl":"10.1109/COMST.2024.3361662","url":null,"abstract":"With the development of quantum technologies, the quantum Internet has demonstrated unique applications beyond the classical Internet and has been investigated extensively in recent years. In the construction of conventional Internet software, the protocol stack is the core architecture for coordinating modules. How to design a protocol stack for the quantum Internet is a challenging problem. In this paper, we systematically review the latest developments in quantum Internet protocols from the perspective of protocol stack layering. By summarizing and analyzing the progress in each layer’s protocols, we reveal the current research status and connections among the layers. Our work provides readers with a comprehensive understanding of the quantum Internet and can help support researchers focusing on a single layer to better define the functions that the layer should possess and optimize related protocols. This approach enables all layers to work better together based on an understanding of the other layers.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1606-1634"},"PeriodicalIF":34.4,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Beam Management for mmWave and THz Communications Towards 6G 面向 6G 的毫米波和太赫兹通信波束管理概览
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-05 DOI: 10.1109/COMST.2024.3361991
Qing Xue;Chengwang Ji;Shaodan Ma;Jiajia Guo;Yongjun Xu;Qianbin Chen;Wei Zhang
Communication in millimeter wave (mmWave) and even terahertz (THz) frequency bands is ushering in a new era of wireless communications. Beam management, namely initial access and beam tracking, has been recognized as an essential technique to ensure robust mmWave/THz communications, especially for mobile scenarios. However, narrow beams at higher carrier frequency lead to huge beam measurement overhead, which has a negative impact on beam acquisition and tracking. In addition, the beam management process is further complicated by the fluctuation of mmWave/THz channels, the random movement patterns of users, and the dynamic changes in the environment. For mmWave and THz communications toward 6G, we have witnessed a substantial increase in research and industrial attention on artificial intelligence (AI), reconfigurable intelligent surface (RIS), and integrated sensing and communications (ISAC). The introduction of these enabling technologies presents both open opportunities and unique challenges for beam management. In this paper, we present a comprehensive survey on mmWave and THz beam management. Further, we give some insights on technical challenges and future research directions in this promising area.
毫米波(mmWave)甚至太赫兹(THz)频段的通信正在开创无线通信的新时代。波束管理,即初始接入和波束跟踪,已被公认为是确保毫米波/太赫兹通信(尤其是移动通信)稳健性的基本技术。然而,较高载波频率下的窄波束会导致巨大的波束测量开销,从而对波束获取和跟踪产生负面影响。此外,毫米波/太赫兹信道的波动、用户的随机移动模式以及环境的动态变化都会使波束管理过程变得更加复杂。对于迈向 6G 的毫米波和太赫兹通信,人工智能 (AI)、可重构智能表面 (RIS) 以及集成传感和通信 (ISAC) 等方面的研究和产业关注度大幅提高。这些使能技术的引入既为波束管理带来了机遇,也带来了独特的挑战。在本文中,我们对毫米波和太赫兹波束管理进行了全面研究。此外,我们还对这一前景广阔领域的技术挑战和未来研究方向提出了一些见解。
{"title":"A Survey of Beam Management for mmWave and THz Communications Towards 6G","authors":"Qing Xue;Chengwang Ji;Shaodan Ma;Jiajia Guo;Yongjun Xu;Qianbin Chen;Wei Zhang","doi":"10.1109/COMST.2024.3361991","DOIUrl":"10.1109/COMST.2024.3361991","url":null,"abstract":"Communication in millimeter wave (mmWave) and even terahertz (THz) frequency bands is ushering in a new era of wireless communications. Beam management, namely initial access and beam tracking, has been recognized as an essential technique to ensure robust mmWave/THz communications, especially for mobile scenarios. However, narrow beams at higher carrier frequency lead to huge beam measurement overhead, which has a negative impact on beam acquisition and tracking. In addition, the beam management process is further complicated by the fluctuation of mmWave/THz channels, the random movement patterns of users, and the dynamic changes in the environment. For mmWave and THz communications toward 6G, we have witnessed a substantial increase in research and industrial attention on artificial intelligence (AI), reconfigurable intelligent surface (RIS), and integrated sensing and communications (ISAC). The introduction of these enabling technologies presents both open opportunities and unique challenges for beam management. In this paper, we present a comprehensive survey on mmWave and THz beam management. Further, we give some insights on technical challenges and future research directions in this promising area.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 3","pages":"1520-1559"},"PeriodicalIF":34.4,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of Human Activity Recognition Based on Mobile Devices: Overview, Progress and Trends 基于移动设备的人类活动识别系统综述:概述、进展与趋势
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-23 DOI: 10.1109/COMST.2024.3357591
Yafeng Yin;Lei Xie;Zhiwei Jiang;Fu Xiao;Jiannong Cao;Sanglu Lu
Due to the ever-growing powers in sensing, computing, communicating and storing, mobile devices (e.g., smartphone, smartwatch, smart glasses) become ubiquitous and an indispensable part of people’s daily life. Until now, mobile devices have been adopted in many applications, e.g., exercise assessment, daily life monitoring, human-computer interactions, user authentication, etc. Among the various applications, Human Activity Recognition (HAR) is the core technology behind them. Specifically, HAR gets the sensor data corresponding to human activities based on the built-in sensors of mobile devices, and then adopts suitable recognition approaches to infer the type of activity based on sensor data. The last two decades have witnessed the ever-increasing research in HAR. However, new challenges and opportunities are emerging, especially for HAR based on mobile devices. Therefore, in this paper, we review the research of HAR based on mobile devices, aiming to advance the following research in this area. Firstly, we give an overview of HAR based on mobile devices, including the general rationales, main components and challenges. Secondly, we review and analyze the research progress of HAR based on mobile devices from each main aspect, including human activities, sensor data, data preprocessing, recognition approaches, evaluation standards and application cases. Finally, we present some promising trends in HAR based on mobile devices for future research.
由于移动设备(如智能手机、智能手表、智能眼镜)在传感、计算、通信和存储方面的功能日益强大,移动设备已变得无处不在,成为人们日常生活中不可或缺的一部分。迄今为止,移动设备已被广泛应用于多种领域,如运动评估、日常生活监测、人机交互、用户身份验证等。在各种应用中,人类活动识别(HAR)是其背后的核心技术。具体来说,人类活动识别(HAR)是基于移动设备的内置传感器获取与人类活动相对应的传感器数据,然后根据传感器数据采用合适的识别方法来推断活动类型。在过去的二十年里,对 HAR 的研究与日俱增。然而,新的挑战和机遇也在不断涌现,尤其是基于移动设备的 HAR。因此,本文回顾了基于移动设备的 HAR 研究,旨在推动该领域的后续研究。首先,我们概述了基于移动设备的 HAR,包括一般原理、主要组成部分和挑战。其次,我们从人类活动、传感器数据、数据预处理、识别方法、评估标准和应用案例等各个主要方面回顾和分析了基于移动设备的 HAR 的研究进展。最后,我们介绍了基于移动设备的 HAR 的一些有前景的发展趋势,供未来研究参考。
{"title":"A Systematic Review of Human Activity Recognition Based on Mobile Devices: Overview, Progress and Trends","authors":"Yafeng Yin;Lei Xie;Zhiwei Jiang;Fu Xiao;Jiannong Cao;Sanglu Lu","doi":"10.1109/COMST.2024.3357591","DOIUrl":"10.1109/COMST.2024.3357591","url":null,"abstract":"Due to the ever-growing powers in sensing, computing, communicating and storing, mobile devices (e.g., smartphone, smartwatch, smart glasses) become ubiquitous and an indispensable part of people’s daily life. Until now, mobile devices have been adopted in many applications, e.g., exercise assessment, daily life monitoring, human-computer interactions, user authentication, etc. Among the various applications, Human Activity Recognition (HAR) is the core technology behind them. Specifically, HAR gets the sensor data corresponding to human activities based on the built-in sensors of mobile devices, and then adopts suitable recognition approaches to infer the type of activity based on sensor data. The last two decades have witnessed the ever-increasing research in HAR. However, new challenges and opportunities are emerging, especially for HAR based on mobile devices. Therefore, in this paper, we review the research of HAR based on mobile devices, aiming to advance the following research in this area. Firstly, we give an overview of HAR based on mobile devices, including the general rationales, main components and challenges. Secondly, we review and analyze the research progress of HAR based on mobile devices from each main aspect, including human activities, sensor data, data preprocessing, recognition approaches, evaluation standards and application cases. Finally, we present some promising trends in HAR based on mobile devices for future research.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 2","pages":"890-929"},"PeriodicalIF":35.6,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revolutionizing Future Connectivity: A Contemporary Survey on AI-Empowered Satellite-Based Non-Terrestrial Networks in 6G 革新未来连接:关于 6G 中人工智能驱动的卫星非地面网络的当代调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-19 DOI: 10.1109/COMST.2023.3347145
Shadab Mahboob;Lingjia Liu
Non-Terrestrial Networks (NTN) are expected to be a critical component of 6th Generation (6G) networks, providing ubiquitous, continuous, and scalable services. Satellites emerge as the primary enabler for NTN, leveraging their extensive coverage, stable orbits, scalability, and adherence to international regulations. However, satellite-based NTN presents unique challenges, including long propagation delay, high Doppler shift, frequent handovers, spectrum sharing complexities, and intricate beam and resource allocation, among others. The integration of NTNs into existing terrestrial networks in 6G introduces a range of novel challenges, including task offloading, network routing, network slicing, and many more. To tackle all these obstacles, this paper proposes Artificial Intelligence (AI) as a promising solution, harnessing its ability to capture intricate correlations among diverse network parameters. We begin by providing a comprehensive background on NTN and AI, highlighting the potential of AI techniques in addressing various NTN challenges. Next, we present an overview of existing works, emphasizing AI as an enabling tool for satellite-based NTN, and explore potential research directions. Furthermore, we discuss ongoing research efforts that aim to enable AI in satellite-based NTN through software-defined implementations, while also discussing the associated challenges. Finally, we conclude by providing insights and recommendations for enabling AI-driven satellite-based NTN in future 6G networks.
非地面网络(NTN)有望成为第六代(6G)网络的重要组成部分,提供无处不在、连续和可扩展的服务。卫星利用其广泛的覆盖范围、稳定的轨道、可扩展性以及对国际法规的遵守,成为 NTN 的主要推动力。然而,基于卫星的 NTN 面临着独特的挑战,包括长传播延迟、高多普勒频移、频繁切换、频谱共享复杂性以及错综复杂的波束和资源分配等。在 6G 时代,将 NTN 集成到现有地面网络会带来一系列新的挑战,包括任务卸载、网络路由、网络切片等。为了解决所有这些障碍,本文提出人工智能(AI)作为一种有前途的解决方案,利用其捕捉各种网络参数之间错综复杂的相关性的能力。我们首先全面介绍了 NTN 和人工智能的背景,强调了人工智能技术在应对各种 NTN 挑战方面的潜力。接下来,我们概述了现有的工作,强调人工智能是基于卫星的 NTN 的有利工具,并探讨了潜在的研究方向。此外,我们还讨论了正在进行的研究工作,这些工作旨在通过软件定义的实现方式在基于卫星的 NTN 中启用人工智能,同时还讨论了相关的挑战。最后,我们就如何在未来的 6G 网络中实现人工智能驱动的星基 NTN 提出了见解和建议。
{"title":"Revolutionizing Future Connectivity: A Contemporary Survey on AI-Empowered Satellite-Based Non-Terrestrial Networks in 6G","authors":"Shadab Mahboob;Lingjia Liu","doi":"10.1109/COMST.2023.3347145","DOIUrl":"10.1109/COMST.2023.3347145","url":null,"abstract":"Non-Terrestrial Networks (NTN) are expected to be a critical component of 6th Generation (6G) networks, providing ubiquitous, continuous, and scalable services. Satellites emerge as the primary enabler for NTN, leveraging their extensive coverage, stable orbits, scalability, and adherence to international regulations. However, satellite-based NTN presents unique challenges, including long propagation delay, high Doppler shift, frequent handovers, spectrum sharing complexities, and intricate beam and resource allocation, among others. The integration of NTNs into existing terrestrial networks in 6G introduces a range of novel challenges, including task offloading, network routing, network slicing, and many more. To tackle all these obstacles, this paper proposes Artificial Intelligence (AI) as a promising solution, harnessing its ability to capture intricate correlations among diverse network parameters. We begin by providing a comprehensive background on NTN and AI, highlighting the potential of AI techniques in addressing various NTN challenges. Next, we present an overview of existing works, emphasizing AI as an enabling tool for satellite-based NTN, and explore potential research directions. Furthermore, we discuss ongoing research efforts that aim to enable AI in satellite-based NTN through software-defined implementations, while also discussing the associated challenges. Finally, we conclude by providing insights and recommendations for enabling AI-driven satellite-based NTN in future 6G networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"26 2","pages":"1279-1321"},"PeriodicalIF":35.6,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1