首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Mobile Edge Intelligence for Large Language Models: A Contemporary Survey 大型语言模型的移动边缘智能:当代调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-09 DOI: 10.1109/COMST.2025.3527641
Guanqiao Qu;Qiyuan Chen;Wei Wei;Zheng Lin;Xianhao Chen;Kaibin Huang
On-device large language models (LLMs), referring to running LLMs on edge devices, have raised considerable interest since they are more cost-effective, latency-efficient, and privacy-preserving compared with the cloud LLM paradigm. Nonetheless unlike cloud LLMs, the performance of on-device LLMs is intrinsically constrained by resource limitations on edge devices. Sitting between cloud and on-device AI, mobile edge intelligence (MEI) may address this dilemma by provisioning AI capabilities at the edge of mobile networks, e.g., on base stations. This article provides a contemporary survey on harnessing MEI for LLM deployment. We begin by illustrating several killer applications to demonstrate the urgent need for deploying LLMs at the network edge. Next, we present the preliminaries of LLMs, MEI, and resource-efficient LLM techniques. We then provide an architectural overview of MEI for LLMs (MEI4LLM), outlining its core components and how it supports LLM deployment. Subsequently, we delve into various aspects of MEI4LLM, extensively covering edge LLM caching and delivery, edge LLM training, and edge LLM inference. Finally, we identify future research opportunities. We hope this article inspires researchers in the field to leverage mobile edge computing to facilitate LLM deployment, thereby unleashing the potential of LLMs across various privacy- and delay-sensitive applications.
设备上大型语言模型(LLM),指的是在边缘设备上运行LLM,已经引起了相当大的兴趣,因为与云LLM范例相比,它们更具成本效益、延迟效率和隐私保护。尽管如此,与云llm不同,设备上llm的性能本质上受到边缘设备上资源限制的约束。移动边缘智能(MEI)介于云和设备上的人工智能之间,可以通过在移动网络的边缘(例如基站)提供人工智能功能来解决这一难题。本文提供了利用MEI进行LLM部署的当代调查。我们首先说明几个杀手级应用程序,以演示在网络边缘部署llm的迫切需求。接下来,我们介绍了法学硕士,MEI和资源高效法学硕士技术的初步介绍。然后,我们提供了用于LLM的MEI (MEI4LLM)的体系结构概述,概述了其核心组件以及它如何支持LLM部署。随后,我们深入研究了MEI4LLM的各个方面,广泛涵盖边缘LLM缓存和交付,边缘LLM训练和边缘LLM推理。最后,我们确定了未来的研究机会。我们希望本文能够激励该领域的研究人员利用移动边缘计算来促进LLM的部署,从而释放LLM在各种隐私和延迟敏感应用程序中的潜力。
{"title":"Mobile Edge Intelligence for Large Language Models: A Contemporary Survey","authors":"Guanqiao Qu;Qiyuan Chen;Wei Wei;Zheng Lin;Xianhao Chen;Kaibin Huang","doi":"10.1109/COMST.2025.3527641","DOIUrl":"10.1109/COMST.2025.3527641","url":null,"abstract":"On-device large language models (LLMs), referring to running LLMs on edge devices, have raised considerable interest since they are more cost-effective, latency-efficient, and privacy-preserving compared with the cloud LLM paradigm. Nonetheless unlike cloud LLMs, the performance of on-device LLMs is intrinsically constrained by resource limitations on edge devices. Sitting between cloud and on-device AI, mobile edge intelligence (MEI) may address this dilemma by provisioning AI capabilities at the edge of mobile networks, e.g., on base stations. This article provides a contemporary survey on harnessing MEI for LLM deployment. We begin by illustrating several killer applications to demonstrate the urgent need for deploying LLMs at the network edge. Next, we present the preliminaries of LLMs, MEI, and resource-efficient LLM techniques. We then provide an architectural overview of MEI for LLMs (MEI4LLM), outlining its core components and how it supports LLM deployment. Subsequently, we delve into various aspects of MEI4LLM, extensively covering edge LLM caching and delivery, edge LLM training, and edge LLM inference. Finally, we identify future research opportunities. We hope this article inspires researchers in the field to leverage mobile edge computing to facilitate LLM deployment, thereby unleashing the potential of LLMs across various privacy- and delay-sensitive applications.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 6","pages":"3820-3860"},"PeriodicalIF":34.4,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142940129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Graph Intelligence: Reciprocally Empowering Edge Networks With Graph Intelligence 边缘图智能:用图智能相互授权边缘网络
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-09 DOI: 10.1109/COMST.2025.3527561
Liekang Zeng;Shengyuan Ye;Xu Chen;Xiaoxi Zhang;Ju Ren;Jian Tang;Yang Yang;Xuemin Shen
Recent years have witnessed a thriving growth of computing facilities connected at the network edge, cultivating edge networks as a fundamental infrastructure for supporting miscellaneous intelligent services. Meanwhile, Artificial Intelligence (AI) frontiers have extrapolated to the graph domain and promoted Graph Intelligence (GI). Given the inherent relation between graphs and networks, the interdiscipline of graph learning and edge networks, i.e., Edge GI or EGI, has revealed a novel interplay between them – GI aids in optimizing edge networks, while edge networks facilitate GI model deployment. Driven by this delicate closed-loop, EGI is recognized as a promising solution to fully unleash the potential of edge computing power and is garnering growing attention. Nevertheless, research on EGI remains nascent, and there is a soaring demand within both the communications and AI communities for a dedicated venue to share recent advancements. To this end, this paper promotes the concept of EGI, explores its scope and core principles, and conducts a comprehensive survey concerning recent research efforts on this emerging field. Specifically, this paper introduces and discusses: 1) fundamentals of edge computing and graph learning, 2) emerging techniques centering on the closed loop between graph intelligence and edge networks, and 3) open challenges and research opportunities of future EGI. By bridging the gap across communication, networking, and graph learning areas, we believe that this survey can garner increased attention, foster meaningful discussions, and inspire further research ideas in EGI.
近年来,在网络边缘连接的计算设施蓬勃发展,边缘网络已成为支持各种智能服务的基础设施。同时,人工智能(AI)的前沿已经外推到图域,促进了图智能(GI)的发展。鉴于图和网络之间的内在联系,图学习和边缘网络的交叉学科,即边缘GI或EGI,揭示了它们之间的一种新的相互作用- GI有助于优化边缘网络,而边缘网络则有助于GI模型的部署。在这种微妙的闭环驱动下,EGI被认为是一种有前途的解决方案,可以充分释放边缘计算能力的潜力,并受到越来越多的关注。尽管如此,对EGI的研究仍处于起步阶段,通信和人工智能社区对专门场所分享最新进展的需求都在飙升。为此,本文推广了EGI的概念,探讨了其范围和核心原则,并对这一新兴领域的最新研究成果进行了全面的综述。具体而言,本文介绍和讨论了:1)边缘计算和图学习的基础知识,2)以图智能和边缘网络之间闭环为中心的新兴技术,以及3)未来EGI的开放式挑战和研究机会。通过弥合沟通、网络和图形学习领域之间的差距,我们相信这项调查可以吸引更多的关注,促进有意义的讨论,并激发EGI的进一步研究思路。
{"title":"Edge Graph Intelligence: Reciprocally Empowering Edge Networks With Graph Intelligence","authors":"Liekang Zeng;Shengyuan Ye;Xu Chen;Xiaoxi Zhang;Ju Ren;Jian Tang;Yang Yang;Xuemin Shen","doi":"10.1109/COMST.2025.3527561","DOIUrl":"10.1109/COMST.2025.3527561","url":null,"abstract":"Recent years have witnessed a thriving growth of computing facilities connected at the network edge, cultivating edge networks as a fundamental infrastructure for supporting miscellaneous intelligent services. Meanwhile, Artificial Intelligence (AI) frontiers have extrapolated to the graph domain and promoted Graph Intelligence (GI). Given the inherent relation between graphs and networks, the interdiscipline of graph learning and edge networks, i.e., Edge GI or EGI, has revealed a novel interplay between them – GI aids in optimizing edge networks, while edge networks facilitate GI model deployment. Driven by this delicate closed-loop, EGI is recognized as a promising solution to fully unleash the potential of edge computing power and is garnering growing attention. Nevertheless, research on EGI remains nascent, and there is a soaring demand within both the communications and AI communities for a dedicated venue to share recent advancements. To this end, this paper promotes the concept of EGI, explores its scope and core principles, and conducts a comprehensive survey concerning recent research efforts on this emerging field. Specifically, this paper introduces and discusses: 1) fundamentals of edge computing and graph learning, 2) emerging techniques centering on the closed loop between graph intelligence and edge networks, and 3) open challenges and research opportunities of future EGI. By bridging the gap across communication, networking, and graph learning areas, we believe that this survey can garner increased attention, foster meaningful discussions, and inspire further research ideas in EGI.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 6","pages":"3417-3454"},"PeriodicalIF":34.4,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142940131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Emergence of Multi-Functional and Hybrid Reconfigurable Intelligent Surfaces for Integrated Sensing and Communications - A Survey 集成传感与通信中多功能混合可重构智能曲面的出现——综述
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-08 DOI: 10.1109/COMST.2024.3519785
Anton Tishchenko;Mohsen Khalily;Arman Shojaeifard;Fraser Burton;Emil Björnson;Marco Di Renzo;Rahim Tafazolli
Reconfigurable intelligent surfaces (RIS) are positioned as one of the key enabling technologies for 6G networks as they can provide ubiquitous coverage for areas with blocked line-of-sight (LOS) links. However, to be successfully integrated into functional networks such structures will require the addition of sensors and other radio network elements, thereby resulting in a multi-functional RIS (MF-RIS). These structures are expected to be deployed for integrated sensing and communications (ISAC) and radar and communication coexistence (RCC) in 6G, which will enhance the performance of radio communication and enable a smart wireless environment (SWE) that is programmable and self-reconfigurable. This survey provides an up-to-date summary of the state of the art. It considers applications for MF-RISs and the challenges associated with their deployment.
可重构智能表面(RIS)被定位为6G网络的关键使能技术之一,因为它们可以为视线(LOS)受阻的区域提供无处不在的覆盖。然而,要成功地集成到功能网络中,这种结构将需要添加传感器和其他无线电网络元件,从而形成多功能RIS (MF-RIS)。这些结构预计将用于6G的集成传感和通信(ISAC)以及雷达和通信共存(RCC),这将增强无线电通信的性能,并实现可编程和自重构的智能无线环境(SWE)。这项调查提供了最新的技术状况摘要。它考虑了MF-RISs的应用以及与部署相关的挑战。
{"title":"The Emergence of Multi-Functional and Hybrid Reconfigurable Intelligent Surfaces for Integrated Sensing and Communications - A Survey","authors":"Anton Tishchenko;Mohsen Khalily;Arman Shojaeifard;Fraser Burton;Emil Björnson;Marco Di Renzo;Rahim Tafazolli","doi":"10.1109/COMST.2024.3519785","DOIUrl":"10.1109/COMST.2024.3519785","url":null,"abstract":"Reconfigurable intelligent surfaces (RIS) are positioned as one of the key enabling technologies for 6G networks as they can provide ubiquitous coverage for areas with blocked line-of-sight (LOS) links. However, to be successfully integrated into functional networks such structures will require the addition of sensors and other radio network elements, thereby resulting in a multi-functional RIS (MF-RIS). These structures are expected to be deployed for integrated sensing and communications (ISAC) and radar and communication coexistence (RCC) in 6G, which will enhance the performance of radio communication and enable a smart wireless environment (SWE) that is programmable and self-reconfigurable. This survey provides an up-to-date summary of the state of the art. It considers applications for MF-RISs and the challenges associated with their deployment.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2895-2936"},"PeriodicalIF":34.4,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10833623","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142937474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Intelligent Network Operations and Performance Optimization Based on Large Language Models 基于大语言模型的智能网络运行与性能优化研究综述
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-07 DOI: 10.1109/COMST.2025.3526606
Sifan Long;Jingjing Tan;Bomin Mao;Fengxiao Tang;Yangfan Li;Ming Zhao;Nei Kato
As Large Language Models (LLMs) have achieved significant success in handling multi-modal tasks such as text, images, videos, and sounds, particularly showcasing emergent capabilities in natural language tasks, they hold great potential for network operations that similarly involve vast amounts of text data, fault data, and log files. This paper focuses on the development of LLMs, detailing their fundamental principles and application scenarios across different domains. It highlights the remarkable capabilities of LLMs in tasks such as fault diagnosis, causal inference, and intelligent question answering, and applies these abilities to the field of network operations. Moreover, the paper reviews some of the key issues and technical barriers faced by intelligent networks, such as efficiently monitoring networks in real-time and providing timely alerts when necessary. In addition to examining the utilization of LLM in network operations, this paper introduces a framework for intelligent network operations and performance optimization, leveraging LLM. The objective of this framework is to bolster network robustness and furnish users with exceptional, personalized network services. Ultimately, we conclude by delineating the challenges encountered in LLM-based intelligent network operations and performance optimization, while presenting potential solutions to overcome these hurdles and propel the comprehensive deployment of LLM-driven network intelligence.
由于大型语言模型(llm)在处理文本、图像、视频和声音等多模态任务方面取得了重大成功,特别是在自然语言任务中展示了紧急功能,因此它们在涉及大量文本数据、故障数据和日志文件的网络操作方面具有巨大潜力。本文重点介绍了法学硕士的发展,详细介绍了法学硕士的基本原理和不同领域的应用场景。它突出了法学硕士在诸如故障诊断、因果推理和智能问答等任务中的卓越能力,并将这些能力应用于网络运营领域。此外,本文还综述了智能网络面临的一些关键问题和技术障碍,如有效地实时监控网络,并在必要时提供及时的警报。除了研究LLM在网络运营中的应用外,本文还介绍了一个利用LLM进行智能网络运营和性能优化的框架。该框架的目标是增强网络的健壮性,并为用户提供卓越的、个性化的网络服务。最后,我们总结了基于llm的智能网络运营和性能优化所遇到的挑战,同时提出了克服这些障碍的潜在解决方案,并推动了llm驱动的网络智能的全面部署。
{"title":"A Survey on Intelligent Network Operations and Performance Optimization Based on Large Language Models","authors":"Sifan Long;Jingjing Tan;Bomin Mao;Fengxiao Tang;Yangfan Li;Ming Zhao;Nei Kato","doi":"10.1109/COMST.2025.3526606","DOIUrl":"10.1109/COMST.2025.3526606","url":null,"abstract":"As Large Language Models (LLMs) have achieved significant success in handling multi-modal tasks such as text, images, videos, and sounds, particularly showcasing emergent capabilities in natural language tasks, they hold great potential for network operations that similarly involve vast amounts of text data, fault data, and log files. This paper focuses on the development of LLMs, detailing their fundamental principles and application scenarios across different domains. It highlights the remarkable capabilities of LLMs in tasks such as fault diagnosis, causal inference, and intelligent question answering, and applies these abilities to the field of network operations. Moreover, the paper reviews some of the key issues and technical barriers faced by intelligent networks, such as efficiently monitoring networks in real-time and providing timely alerts when necessary. In addition to examining the utilization of LLM in network operations, this paper introduces a framework for intelligent network operations and performance optimization, leveraging LLM. The objective of this framework is to bolster network robustness and furnish users with exceptional, personalized network services. Ultimately, we conclude by delineating the challenges encountered in LLM-based intelligent network operations and performance optimization, while presenting potential solutions to overcome these hurdles and propel the comprehensive deployment of LLM-driven network intelligence.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 6","pages":"3915-3949"},"PeriodicalIF":34.4,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142936172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities 探索加密算法和网络协议:威胁和漏洞的综合调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-06 DOI: 10.1109/COMST.2025.3526605
Jemin Ahn;Rasheed Hussain;Kyungtae Kang;Junggab Son
Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers’ methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain.
在现代网络环境中,加密网络协议在实现不安全介质上的安全数据交换方面起着至关重要的作用。然而,即使是很小的漏洞也可能使协议成为网络攻击者的容易目标。因此,研究来自加密网络协议的威胁和漏洞是必要的。此外,有必要全面研究使用加密原语的网络协议的弱点,以告知用户和开发人员潜在的攻击点。这份全面的调查研究了加密方案和网络协议之间的关系,并对相关的威胁和漏洞进行了深入的回顾。鉴于大多数加密协议在传输控制协议/互联网协议(TCP/IP)协议栈的传输层和应用层中运行,我们的研究主要集中在代表性和著名的加密网络协议(如传输层安全(TLS)和安全壳(SSH))使用的加密算法上。此外,我们深入研究了攻击者利用已识别和现有漏洞的方法,试图了解用于破坏这些协议的机制。通过这项调查,我们旨在为读者提供对与现代加密协议相关的现有和新漏洞的深入了解,并为有效保护它们提供有价值的见解。讨论了该领域存在的挑战和未来的研究方向。
{"title":"Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities","authors":"Jemin Ahn;Rasheed Hussain;Kyungtae Kang;Junggab Son","doi":"10.1109/COMST.2025.3526605","DOIUrl":"10.1109/COMST.2025.3526605","url":null,"abstract":"Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor vulnerabilities can make protocols an easy target for cyber attackers. Therefore, it is essential to investigate the threats and vulnerabilities stemming from the cryptographic network protocols. Furthermore, it is necessary to comprehensively investigate the weaknesses of network protocols that use cryptographic primitives to inform users and developers about potential attack points. This comprehensive survey examines the relationship between encryption schemes and network protocols and presents an in-depth review of associated threats and vulnerabilities. Given that most cryptographic protocols operate in the Transport and Application layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack, our investigation primarily centers around encryption algorithms used by representative and notable cryptographic network protocols such as Transport Layer Security (TLS) and Secure Shell (SSH). Furthermore, we delve into the attackers’ methods to exploit the already identified and existing vulnerabilities, seeking to understand the mechanisms employed to compromise these protocols. Through this survey, we aim to provide the readership with an in-depth understanding of the existing and new vulnerabilities associated with modern cryptographic protocols and provide valuable insights into securing them effectively. We also discuss the existing challenges and future research directions in this domain.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 6","pages":"3587-3614"},"PeriodicalIF":34.4,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10829860","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142934436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
6G Communication New Paradigm: The Integration of Autonomous Aerial Vehicles and Intelligent Reflecting Surfaces 6G通信新范式:无人机与智能反射面的融合
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-06 DOI: 10.1109/COMST.2025.3526251
Zhaolong Ning;Tengfeng Li;Yu Wu;Xiaojie Wang;Qingqing Wu;Fei Richard Yu;Song Guo
With the continuous development of Intelligent Reflecting Surfaces (IRSs) and autonomous aerial vehicles (AAVs), their combination has become foundational technologies to complement the terrestrial network by providing communication enhancement services for large-scale users. This article provides a comprehensive overview of IRS-assisted AAV communications for 6th-Generation (6G) networks. First, the applications supported by IRS-assisted AAV communications for 6G networks are introduced, and key issues originated from applications supported by IRSs and AAVs for 6G networks are summarized and analyzed. Then, prototypes and main technologies related to the integration of IRSs and AAVs are introduced. Driven by applications and technologies of IRS-assisted AAV communications, existing solutions in the realms of energy-constrained communications, secure communications, and enhanced communications are summarized, and corresponding empirical lessons are provided. Finally, we discuss some research challenges and open issues in IRS-assisted AAV communications, offering directions for the future development.
随着智能反射面(IRSs)和自主飞行器(aav)的不断发展,它们的结合已经成为补充地面网络的基础技术,为大规模用户提供通信增强服务。本文提供了第6代(6G)网络中irs辅助AAV通信的全面概述。首先,介绍了irs辅助AAV通信支持的6G网络应用,总结分析了irs和AAV支持6G网络应用的关键问题。然后,介绍了irs与aav集成的样机及相关主要技术。在irs辅助AAV通信应用和技术的驱动下,总结了能源约束通信、安全通信和增强通信领域的现有解决方案,并提供了相应的经验教训。最后,我们讨论了irs辅助AAV通信的一些研究挑战和有待解决的问题,为未来的发展提供了方向。
{"title":"6G Communication New Paradigm: The Integration of Autonomous Aerial Vehicles and Intelligent Reflecting Surfaces","authors":"Zhaolong Ning;Tengfeng Li;Yu Wu;Xiaojie Wang;Qingqing Wu;Fei Richard Yu;Song Guo","doi":"10.1109/COMST.2025.3526251","DOIUrl":"10.1109/COMST.2025.3526251","url":null,"abstract":"With the continuous development of Intelligent Reflecting Surfaces (IRSs) and autonomous aerial vehicles (AAVs), their combination has become foundational technologies to complement the terrestrial network by providing communication enhancement services for large-scale users. This article provides a comprehensive overview of IRS-assisted AAV communications for 6th-Generation (6G) networks. First, the applications supported by IRS-assisted AAV communications for 6G networks are introduced, and key issues originated from applications supported by IRSs and AAVs for 6G networks are summarized and analyzed. Then, prototypes and main technologies related to the integration of IRSs and AAVs are introduced. Driven by applications and technologies of IRS-assisted AAV communications, existing solutions in the realms of energy-constrained communications, secure communications, and enhanced communications are summarized, and corresponding empirical lessons are provided. Finally, we discuss some research challenges and open issues in IRS-assisted AAV communications, offering directions for the future development.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 6","pages":"3382-3416"},"PeriodicalIF":34.4,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142934676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Federated Learning and AI-Generated Content: A Survey of Overview, Opportunities, Challenges, and Solutions 联邦学习和人工智能生成内容的集成:概述、机遇、挑战和解决方案的调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-27 DOI: 10.1109/COMST.2024.3523350
Ying Liu;Jianhui Yin;Weiting Zhang;Changming An;Yu Xia;Hongke Zhang
Artificial intelligence generated content (AIGC) relies on advanced AI algorithms supported by extensive datasets and substantial computing power to generate precise and pertinent content. Federated learning (FL) enables the aggregation of large volumes of data and computing resources from various sources, all while safeguarding privacy. As a result, FL has emerged as a critical enabler in the realm of AIGC. This survey paper provides a comprehensive overview of the integration of FL and AIGC, namely federated AIGC models. First, we introduce the fundamental concepts of FL and AIGC. Next, we summarize four typical types of federated AIGC models. Subsequently, We highlight the threats to centralized federated AIGC models regarding data confidentiality, integrity, and availability and discuss the unique advantages of blockchain technology in decentralized federated AIGC models in addressing these issues. Finally, we look at potential emerging application scenarios and explore open issues and future directions for federated AIGC models.
人工智能生成内容(AIGC)依赖于由广泛的数据集和强大的计算能力支持的先进人工智能算法来生成精确和相关的内容。联邦学习(FL)可以聚合来自不同来源的大量数据和计算资源,同时保护隐私。因此,FL已成为AIGC领域的关键推动者。本文全面概述了FL和AIGC的集成,即联邦AIGC模型。首先介绍了FL和AIGC的基本概念。接下来,我们总结了联邦AIGC模型的四种典型类型。随后,我们强调了集中式联邦AIGC模型在数据机密性、完整性和可用性方面面临的威胁,并讨论了区块链技术在分散联邦AIGC模型中解决这些问题的独特优势。最后,我们将研究潜在的新兴应用场景,并探索联邦AIGC模型的开放问题和未来方向。
{"title":"Integration of Federated Learning and AI-Generated Content: A Survey of Overview, Opportunities, Challenges, and Solutions","authors":"Ying Liu;Jianhui Yin;Weiting Zhang;Changming An;Yu Xia;Hongke Zhang","doi":"10.1109/COMST.2024.3523350","DOIUrl":"10.1109/COMST.2024.3523350","url":null,"abstract":"Artificial intelligence generated content (AIGC) relies on advanced AI algorithms supported by extensive datasets and substantial computing power to generate precise and pertinent content. Federated learning (FL) enables the aggregation of large volumes of data and computing resources from various sources, all while safeguarding privacy. As a result, FL has emerged as a critical enabler in the realm of AIGC. This survey paper provides a comprehensive overview of the integration of FL and AIGC, namely federated AIGC models. First, we introduce the fundamental concepts of FL and AIGC. Next, we summarize four typical types of federated AIGC models. Subsequently, We highlight the threats to centralized federated AIGC models regarding data confidentiality, integrity, and availability and discuss the unique advantages of blockchain technology in decentralized federated AIGC models in addressing these issues. Finally, we look at potential emerging application scenarios and explore open issues and future directions for federated AIGC models.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3308-3338"},"PeriodicalIF":34.4,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling the Potential of NOMA: A Journey to Next-Generation Multiple Access 揭示NOMA的潜力:通往下一代多址的旅程
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-25 DOI: 10.1109/COMST.2024.3521647
Adeel Ahmed;Xingfu Wang;Ammar Hawbani;Weijie Yuan;Hina Tabassum;Yuanwei Liu;Muhammad Umar Farooq Qaisar;Zhiguo Ding;Naofal Al-Dhahir;Arumugam Nallanathan;Derrick Wing Kwan Ng
The revolutionary sixth-generation wireless communications technologies and applications, notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air-ground integrated networks (SAGINs), zero-touch networks, industry 5.0, healthcare 5.0, agriculture 5.0, and more, are driving the evolution of next-generation wireless networks (NGWNs). These innovative technologies and groundbreaking innovative applications will generate a sheer volume of data that requires the swift transmission of massive data across wireless networks and the capability to connect trillions of devices, thereby fueling the use of sophisticated next-generation multiple access (NGMA) schemes. In particular, NGMA strives to cater to the massive connectivity in the 6G era, enabling the smooth and optimized operations of NGWNs compared to existing multiple access (MA) schemes. This survey showcases non-orthogonal multiple access (NOMA) as the frontrunner for NGMA, spotlighting its novel contributions within the existing literature in terms of “What has NOMA delivered?”, “What is NOMA currently providing?” and “What lies ahead for NOMA?”. We present different variants of NOMA in this comprehensive survey, detailing their fundamental operations. In addition, this survey highlights NOMA’s applicability in a broad range of wireless communications technologies such as multi-antenna systems, machine learning, reconfigurable intelligent surfaces (RIS), cognitive radio networks (CRN), integrated sensing and communications (ISAC), terahertz networks, autonomous aerial vehicles (AAVs), etc. This survey delves deeper by providing a comprehensive literature review of NOMA’s interplay with various state-of-the-art wireless technologies. Furthermore, despite the numerous perks and advantages of NOMA, we also highlight several technical challenges of NOMA, which NOMA-assisted NGWNs may encounter. Next, we unveil the research trends of NOMA in the 6G era, offering reliable, robust, and swift communications. Finally, we offer design recommendations and insights along with the future perspectives of NOMA as the leading choice for NGMA within the realm of NGWNs.
革命性的第六代无线通信技术和应用,特别是数字孪生网络(DTN)、联网自动驾驶汽车(cav)、空-空-地集成网络(SAGINs)、零接触网络、工业5.0、医疗5.0、农业5.0等,正在推动下一代无线网络(NGWNs)的发展。这些创新技术和突破性的创新应用将产生大量数据,需要通过无线网络快速传输海量数据,并具备连接数万亿设备的能力,从而推动复杂的下一代多址(NGMA)方案的使用。特别是NGMA致力于满足6G时代的海量连接需求,与现有的多址接入(multiple access, MA)方案相比,使NGWNs的运行更加流畅和优化。这项调查显示了非正交多址(NOMA)作为NGMA的领跑者,突出了它在现有文献中的新贡献,即“NOMA带来了什么?”、“NOMA目前提供什么?”和“NOMA的未来是什么?”在这个全面的调查中,我们提出了NOMA的不同变体,详细介绍了它们的基本操作。此外,该调查还强调了NOMA在广泛的无线通信技术中的适用性,如多天线系统、机器学习、可重构智能表面(RIS)、认知无线电网络(CRN)、集成传感和通信(ISAC)、太赫兹网络、自主飞行器(aav)等。本调查通过提供NOMA与各种最先进的无线技术相互作用的全面文献综述,进行了更深入的研究。此外,尽管NOMA有许多好处和优势,但我们也强调了NOMA辅助NGWNs可能遇到的一些技术挑战。接下来,我们将揭示6G时代NOMA的研究趋势,提供可靠、稳健、快速的通信。最后,我们提供了设计建议和见解,以及NOMA作为ngnn领域中NGMA的主要选择的未来前景。
{"title":"Unveiling the Potential of NOMA: A Journey to Next-Generation Multiple Access","authors":"Adeel Ahmed;Xingfu Wang;Ammar Hawbani;Weijie Yuan;Hina Tabassum;Yuanwei Liu;Muhammad Umar Farooq Qaisar;Zhiguo Ding;Naofal Al-Dhahir;Arumugam Nallanathan;Derrick Wing Kwan Ng","doi":"10.1109/COMST.2024.3521647","DOIUrl":"10.1109/COMST.2024.3521647","url":null,"abstract":"The revolutionary sixth-generation wireless communications technologies and applications, notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air-ground integrated networks (SAGINs), zero-touch networks, industry 5.0, healthcare 5.0, agriculture 5.0, and more, are driving the evolution of next-generation wireless networks (NGWNs). These innovative technologies and groundbreaking innovative applications will generate a sheer volume of data that requires the swift transmission of massive data across wireless networks and the capability to connect trillions of devices, thereby fueling the use of sophisticated next-generation multiple access (NGMA) schemes. In particular, NGMA strives to cater to the massive connectivity in the 6G era, enabling the smooth and optimized operations of NGWNs compared to existing multiple access (MA) schemes. This survey showcases non-orthogonal multiple access (NOMA) as the frontrunner for NGMA, spotlighting its novel contributions within the existing literature in terms of “What has NOMA delivered?”, “What is NOMA currently providing?” and “What lies ahead for NOMA?”. We present different variants of NOMA in this comprehensive survey, detailing their fundamental operations. In addition, this survey highlights NOMA’s applicability in a broad range of wireless communications technologies such as multi-antenna systems, machine learning, reconfigurable intelligent surfaces (RIS), cognitive radio networks (CRN), integrated sensing and communications (ISAC), terahertz networks, autonomous aerial vehicles (AAVs), etc. This survey delves deeper by providing a comprehensive literature review of NOMA’s interplay with various state-of-the-art wireless technologies. Furthermore, despite the numerous perks and advantages of NOMA, we also highlight several technical challenges of NOMA, which NOMA-assisted NGWNs may encounter. Next, we unveil the research trends of NOMA in the 6G era, offering reliable, robust, and swift communications. Finally, we offer design recommendations and insights along with the future perspectives of NOMA as the leading choice for NGMA within the realm of NGWNs.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3099-3164"},"PeriodicalIF":34.4,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142888810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Integrated Sensing, Communication, and Computation 传感、通信与计算集成研究综述
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-23 DOI: 10.1109/COMST.2024.3521498
Dingzhu Wen;Yong Zhou;Xiaoyang Li;Yuanming Shi;Kaibin Huang;Khaled B. Letaief
The forthcoming generation of wireless technology, 6G, promises a revolutionary leap beyond traditional data-centric services. It aims to usher in an era of ubiquitous intelligent services, where everything is interconnected and intelligent. This vision requires the seamless integration of three fundamental modules: Sensing for information acquisition, communication for information sharing, and computation for information processing and decision-making. These modules are intricately linked, especially in complex tasks such as edge learning and inference. However, the performance of these modules is interdependent, creating a resource competition for time, energy, and bandwidth. Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge, but they fall short of meeting the extreme performance requirements. To overcome these limitations, it is essential to develop new techniques that comprehensively integrate sensing, communication, and computation. This integrated approach, known as Integrated Sensing, Communication, and Computation (ISCC), offers a systematic perspective for enhancing task performance. This paper begins with a comprehensive survey of historic and related techniques such as ICC, ISC, and ISAC, highlighting their strengths and limitations. It then discusses the benefits, functions, and challenges of ISCC. Subsequently, the state-of-the-art signal designs for ISCC, along with network resource management strategies specifically tailored for ISCC are explored. Furthermore, this paper discusses the exciting research opportunities that lie ahead for implementing ISCC in future advanced networks, and the unresolved issues requiring further investigation. ISCC is expected to unlock the full potential of intelligent connectivity, paving the way for groundbreaking applications and services.
即将到来的新一代无线技术6G有望实现超越传统数据中心服务的革命性飞跃。它的目标是开创一个无处不在的智能服务时代,在这个时代,一切都是互联和智能的。这一愿景需要三个基本模块的无缝集成:用于信息获取的感知,用于信息共享的通信,以及用于信息处理和决策的计算。这些模块错综复杂地联系在一起,特别是在边缘学习和推理等复杂任务中。然而,这些模块的性能是相互依赖的,造成了时间、精力和带宽的资源竞争。现有的集成通信与计算(ICC)、集成传感与计算(ISC)和集成传感与通信(ISAC)等技术在解决这一挑战方面取得了部分进展,但它们无法满足极端的性能要求。为了克服这些限制,必须开发综合集成传感、通信和计算的新技术。这种集成的方法,被称为集成传感、通信和计算(ISCC),为提高任务性能提供了系统的视角。本文首先对历史和相关技术如ICC、ISC和ISAC进行了全面的调查,突出了它们的优势和局限性。然后讨论了ISCC的好处、功能和挑战。随后,探索了最先进的ISCC信号设计,以及专门为ISCC量身定制的网络资源管理策略。此外,本文还讨论了在未来先进网络中实现ISCC的令人兴奋的研究机会,以及需要进一步研究的未解决问题。ISCC有望释放智能连接的全部潜力,为突破性的应用和服务铺平道路。
{"title":"A Survey on Integrated Sensing, Communication, and Computation","authors":"Dingzhu Wen;Yong Zhou;Xiaoyang Li;Yuanming Shi;Kaibin Huang;Khaled B. Letaief","doi":"10.1109/COMST.2024.3521498","DOIUrl":"10.1109/COMST.2024.3521498","url":null,"abstract":"The forthcoming generation of wireless technology, 6G, promises a revolutionary leap beyond traditional data-centric services. It aims to usher in an era of ubiquitous intelligent services, where everything is interconnected and intelligent. This vision requires the seamless integration of three fundamental modules: Sensing for information acquisition, communication for information sharing, and computation for information processing and decision-making. These modules are intricately linked, especially in complex tasks such as edge learning and inference. However, the performance of these modules is interdependent, creating a resource competition for time, energy, and bandwidth. Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge, but they fall short of meeting the extreme performance requirements. To overcome these limitations, it is essential to develop new techniques that comprehensively integrate sensing, communication, and computation. This integrated approach, known as Integrated Sensing, Communication, and Computation (ISCC), offers a systematic perspective for enhancing task performance. This paper begins with a comprehensive survey of historic and related techniques such as ICC, ISC, and ISAC, highlighting their strengths and limitations. It then discusses the benefits, functions, and challenges of ISCC. Subsequently, the state-of-the-art signal designs for ISCC, along with network resource management strategies specifically tailored for ISCC are explored. Furthermore, this paper discusses the exciting research opportunities that lie ahead for implementing ISCC in future advanced networks, and the unresolved issues requiring further investigation. ISCC is expected to unlock the full potential of intelligent connectivity, paving the way for groundbreaking applications and services.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"3058-3098"},"PeriodicalIF":34.4,"publicationDate":"2024-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10812728","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142879804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum-Inspired Resource Optimization for 6G Networks: A Survey 量子启发的 6G 网络资源优化:调查
IF 34.4 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-18 DOI: 10.1109/COMST.2024.3519865
Muhammad Omair Butt;Nazar Waheed;Trung Q. Duong;Waleed Ejaz
The Internet of Things (IoT) drives an exponential surge in computing and communication devices. Consequently, it triggers capacity, coverage, interference, latency, and security issues in the existing communication networks. The forthcoming sixth-generation (6G) networks will address these issues by providing comprehensive solutions. In particular, quantum communication technology can potentially address the challenges of 6G networks. However, its implementation requires substantial infrastructure upgrades. Therefore, the quantum-inspired (QI) techniques offer an intermediate resort due to their ability to utilize the classical communication infrastructure for design and implementation. Hence, we review QI techniques in this survey that address radio resource optimization challenges across various communication aspects, including channel assignment, reconfigurable intelligent surfaces, spectrum sensing, uncrewed aerial vehicle-assisted networks, and related areas. The analysis explores diverse aspects, including objectives, constraints, problem characterization, proposed solutions, and lessons learnt. Research indicates that QI techniques offer advantages such as faster convergence and reduced complexity, providing promising solutions to complex optimization problems in communication networks. Furthermore, we identify the future directions, research gaps, and ongoing challenges from the QI radio resource optimization dataset.
物联网(IoT)推动了计算和通信设备的指数级增长。因此,它会引发现有通信网络中的容量、覆盖范围、干扰、延迟和安全问题。即将到来的第六代(6G)网络将通过提供全面的解决方案来解决这些问题。特别是,量子通信技术可以潜在地解决6G网络的挑战。然而,它的实施需要大量的基础设施升级。因此,量子启发(QI)技术提供了一种中间手段,因为它们能够利用经典通信基础设施进行设计和实现。因此,我们在本调查中回顾了QI技术,这些技术解决了各种通信方面的无线电资源优化挑战,包括信道分配、可重构智能表面、频谱传感、无人驾驶飞行器辅助网络和相关领域。分析探讨了不同的方面,包括目标、约束、问题特征、建议的解决方案和吸取的教训。研究表明,QI技术具有更快的收敛速度和降低复杂性等优点,为通信网络中的复杂优化问题提供了有希望的解决方案。此外,我们从QI无线电资源优化数据集确定了未来的方向、研究差距和正在面临的挑战。
{"title":"Quantum-Inspired Resource Optimization for 6G Networks: A Survey","authors":"Muhammad Omair Butt;Nazar Waheed;Trung Q. Duong;Waleed Ejaz","doi":"10.1109/COMST.2024.3519865","DOIUrl":"10.1109/COMST.2024.3519865","url":null,"abstract":"The Internet of Things (IoT) drives an exponential surge in computing and communication devices. Consequently, it triggers capacity, coverage, interference, latency, and security issues in the existing communication networks. The forthcoming sixth-generation (6G) networks will address these issues by providing comprehensive solutions. In particular, quantum communication technology can potentially address the challenges of 6G networks. However, its implementation requires substantial infrastructure upgrades. Therefore, the quantum-inspired (QI) techniques offer an intermediate resort due to their ability to utilize the classical communication infrastructure for design and implementation. Hence, we review QI techniques in this survey that address radio resource optimization challenges across various communication aspects, including channel assignment, reconfigurable intelligent surfaces, spectrum sensing, uncrewed aerial vehicle-assisted networks, and related areas. The analysis explores diverse aspects, including objectives, constraints, problem characterization, proposed solutions, and lessons learnt. Research indicates that QI techniques offer advantages such as faster convergence and reduced complexity, providing promising solutions to complex optimization problems in communication networks. Furthermore, we identify the future directions, research gaps, and ongoing challenges from the QI radio resource optimization dataset.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 5","pages":"2973-3019"},"PeriodicalIF":34.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1