首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Systematic survey on artificial intelligence based mobile crowd sensing and sourcing solutions: Applications and security challenges 基于人工智能的移动人群感知和来源解决方案的系统调查:应用和安全挑战
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1016/j.adhoc.2024.103634

Mobile Crowd Sensing/Souring (MCS) is a novel sensing approach that leverages the collective participation of users and their mobile devices to collect sensing data. As large volumes of data get stored and processed by the MCS platform, Artificial Intelligence (AI) techniques are being deployed to make informed decisions that help optimize the system performance. Despite their effectiveness in solving many of the challenges, incorporating AI models in the system introduces many concerns, which could adversely affect its performance. This includes exploiting the vulnerabilities of the models by an adversary to manipulate the data and cause harm to the system. Adversarial Machine Learning (AML) is a field of research that studies attacks and defences against machine learning models. In this study, we conduct a systematic literature review to comprehensively analyze state-of-the-art works that address various aspects of AI-based MCS systems. The review focuses mainly on the applications of AI in different components of MCS, including task allocation and data aggregation, to improve its performance and enhance its security. This work also proposes a novel classification framework that can be adapted to compare works in this domain. This framework can help study AML in the context of MCS, as it facilitates identifying the attack surfaces that adversaries can exploit, and hence highlights the potential vulnerabilities of AI-based MCS systems to adversarial attacks, motivating future research to focus on designing resilient systems.

移动人群传感(MCS)是一种新型传感方法,它利用用户及其移动设备的集体参与来收集传感数据。随着大量数据被 MCS 平台存储和处理,人工智能(AI)技术正被用于做出有助于优化系统性能的明智决策。尽管人工智能技术能有效解决许多挑战,但将人工智能模型纳入系统会带来许多问题,可能会对系统性能产生不利影响。这包括对手利用模型的漏洞来操纵数据并对系统造成伤害。对抗式机器学习(AML)是研究针对机器学习模型的攻击和防御的一个研究领域。在本研究中,我们进行了系统的文献综述,全面分析了解决基于人工智能的监控监系统各方面问题的最新成果。综述主要侧重于人工智能在 MCS 不同组件(包括任务分配和数据聚合)中的应用,以提高其性能并增强其安全性。这项工作还提出了一个新颖的分类框架,可用于比较该领域的工作。这一框架有助于研究反洗钱在监控监听系统中的应用,因为它有助于识别对手可以利用的攻击面,从而突出基于人工智能的监控监听系统在对抗性攻击面前的潜在弱点,促使未来的研究重点放在设计弹性系统上。
{"title":"Systematic survey on artificial intelligence based mobile crowd sensing and sourcing solutions: Applications and security challenges","authors":"","doi":"10.1016/j.adhoc.2024.103634","DOIUrl":"10.1016/j.adhoc.2024.103634","url":null,"abstract":"<div><p>Mobile Crowd Sensing/Souring (MCS) is a novel sensing approach that leverages the collective participation of users and their mobile devices to collect sensing data. As large volumes of data get stored and processed by the MCS platform, Artificial Intelligence (AI) techniques are being deployed to make informed decisions that help optimize the system performance. Despite their effectiveness in solving many of the challenges, incorporating AI models in the system introduces many concerns, which could adversely affect its performance. This includes exploiting the vulnerabilities of the models by an adversary to manipulate the data and cause harm to the system. Adversarial Machine Learning (AML) is a field of research that studies attacks and defences against machine learning models. In this study, we conduct a systematic literature review to comprehensively analyze state-of-the-art works that address various aspects of AI-based MCS systems. The review focuses mainly on the applications of AI in different components of MCS, including task allocation and data aggregation, to improve its performance and enhance its security. This work also proposes a novel classification framework that can be adapted to compare works in this domain. This framework can help study AML in the context of MCS, as it facilitates identifying the attack surfaces that adversaries can exploit, and hence highlights the potential vulnerabilities of AI-based MCS systems to adversarial attacks, motivating future research to focus on designing resilient systems.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APPS: Authentication-enabled privacy protection scheme for secure data transfer in Internet of Things APPS:面向物联网安全数据传输的认证式隐私保护方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1016/j.adhoc.2024.103631

The Internet of Things (IoT) is an emerging field that encompasses several heterogeneous devices and smart objects that are integrated with the network. In open platforms, these objects are deployed to present advanced services in numerous applications. Innumerable security-sensitive data is generated by the IoT device and therefore, the security of these devices is an important task. This work formulates a secure data transfer technique in IoT, named Authentication enabled Privacy Protection (APPS) scheme for resource-constrained IoT devices. The proposed scheme demonstrates resilience against various attacks; such as resisting reply attacks, device anonymity, untracebility, session key establishment, quantum attacks and resisting MITM attacks. For the privacy protection scheme, the secured data transfer is initiated between the entities, like IoT devices, servers, and registration centers, by using various phases, namely registration phase, key generation phase, data encryption, authentication, verification, and data retrieval phase. Here, a mathematical model is designed for protecting data privacy using hashing, encryption, secret keys, etc. Finally, performance of proposed APPS model is analyzed; wherein the outcomes reveal that the proposed APPS model attained the maximum detection rate of 0.85, minimal memory usage of 0.497MB, and minimal computational time of 112. 79 sec and minimal turnaround time 131.91 sec.

物联网(IoT)是一个新兴领域,它包含了多个与网络集成的异构设备和智能物体。在开放平台中,这些物体被部署到众多应用中,提供先进的服务。物联网设备会产生无数对安全敏感的数据,因此,这些设备的安全性是一项重要任务。这项工作为资源受限的物联网设备制定了一种安全的物联网数据传输技术,名为 "认证启用隐私保护(APPS)"方案。所提出的方案能抵御各种攻击,如抵御回复攻击、设备匿名性、不可追踪性、会话密钥建立、量子攻击和抵御 MITM 攻击。在隐私保护方案中,物联网设备、服务器和注册中心等实体之间通过不同阶段(即注册阶段、密钥生成阶段、数据加密、身份验证、验证和数据检索阶段)启动安全数据传输。在此,设计了一个数学模型,利用散列、加密、秘钥等方法保护数据隐私。最后,对所提出的 APPS 模型的性能进行了分析;结果表明,所提出的 APPS 模型的最高检测率为 0.85,内存使用量最小为 0.497MB,计算时间最短为 112.79 秒,最短周转时间为 131.91 秒。
{"title":"APPS: Authentication-enabled privacy protection scheme for secure data transfer in Internet of Things","authors":"","doi":"10.1016/j.adhoc.2024.103631","DOIUrl":"10.1016/j.adhoc.2024.103631","url":null,"abstract":"<div><p>The Internet of Things (IoT) is an emerging field that encompasses several heterogeneous devices and smart objects that are integrated with the network. In open platforms, these objects are deployed to present advanced services in numerous applications. Innumerable security-sensitive data is generated by the IoT device and therefore, the security of these devices is an important task. This work formulates a secure data transfer technique in IoT, named Authentication enabled Privacy Protection (APPS) scheme for resource-constrained IoT devices. The proposed scheme demonstrates resilience against various attacks; such as resisting reply attacks, device anonymity, untracebility, session key establishment, quantum attacks and resisting MITM attacks. For the privacy protection scheme, the secured data transfer is initiated between the entities, like IoT devices, servers, and registration centers, by using various phases, namely registration phase, key generation phase, data encryption, authentication, verification, and data retrieval phase. Here, a mathematical model is designed for protecting data privacy using hashing, encryption, secret keys, etc. Finally, performance of proposed APPS model is analyzed; wherein the outcomes reveal that the proposed APPS model attained the maximum detection rate of 0.85, minimal memory usage of 0.497MB, and minimal computational time of 112. 79 sec and minimal turnaround time 131.91 sec.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-objective Roadside Units deployment strategy based on reliable coverage analysis in Internet of Vehicles 基于可靠覆盖分析的车联网多目标路边装置部署策略
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1016/j.adhoc.2024.103630

The deployment of Roadside Units (RSUs) in the Cellular-Vehicle to Everything enabled Internet of Vehicles is crucial for the transition from individual intelligence of vehicles to collective intelligence of vehicle-road collaboration. In this paper, we focus on improving the adaptability of RSU deployment to real scenarios, and optimizing deployment costs and vehicle-oriented service performance. The RSU deployment problem is modeled as a Multi-objective Optimization Problem (MOP), with a cost model integrating the purchase and installation costs, and a service-oriented Quality of Service (QoS) model adopting the total time the RSUs cover the vehicles as the evaluation metric. Specifically, we propose an RSU reliable coverage analysis method based on Packet Delivery Ratio model to estimate the coverage distances in different scenarios, which will be used in QoS calculation. Then, an evolutionary RSU deployment algorithm is designed to solve the MOP. The performance of the proposed method is simulated and discussed in real road network and dynamic scenarios. The results prove that our method outperforms the baseline method in terms of significant cost reduction and total coverage time improvement.

在支持 "蜂窝-车辆-万物互联 "的车联网中部署路侧装置(RSU),对于从车辆的个体智能过渡到车路协同的集体智能至关重要。本文的重点是提高 RSU 部署对实际场景的适应性,优化部署成本和面向车辆的服务性能。RSU 部署问题被建模为多目标优化问题(MOP),其成本模型包括购买和安装成本,而面向服务的服务质量(QoS)模型则采用 RSU 覆盖车辆的总时间作为评估指标。具体来说,我们提出了一种基于数据包传送比模型的 RSU 可靠性覆盖分析方法,以估算不同场景下的覆盖距离,并将其用于 QoS 计算。然后,设计了一种进化式 RSU 部署算法来解决澳门威尼斯人官网作。在真实路网和动态场景中模拟并讨论了所提方法的性能。结果证明,我们的方法在显著降低成本和改善总覆盖时间方面优于基线方法。
{"title":"A multi-objective Roadside Units deployment strategy based on reliable coverage analysis in Internet of Vehicles","authors":"","doi":"10.1016/j.adhoc.2024.103630","DOIUrl":"10.1016/j.adhoc.2024.103630","url":null,"abstract":"<div><p>The deployment of Roadside Units (RSUs) in the Cellular-Vehicle to Everything enabled Internet of Vehicles is crucial for the transition from individual intelligence of vehicles to collective intelligence of vehicle-road collaboration. In this paper, we focus on improving the adaptability of RSU deployment to real scenarios, and optimizing deployment costs and vehicle-oriented service performance. The RSU deployment problem is modeled as a Multi-objective Optimization Problem (MOP), with a cost model integrating the purchase and installation costs, and a service-oriented Quality of Service (QoS) model adopting the total time the RSUs cover the vehicles as the evaluation metric. Specifically, we propose an RSU reliable coverage analysis method based on Packet Delivery Ratio model to estimate the coverage distances in different scenarios, which will be used in QoS calculation. Then, an evolutionary RSU deployment algorithm is designed to solve the MOP. The performance of the proposed method is simulated and discussed in real road network and dynamic scenarios. The results prove that our method outperforms the baseline method in terms of significant cost reduction and total coverage time improvement.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting stream scheduling in QUIC: Performance assessment over wireless connectivity scenarios 利用 QUIC 中的流调度:无线连接情况下的性能评估
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-12 DOI: 10.1016/j.adhoc.2024.103599

The advent of wireless technologies has led to the development of novel services for end-users, with stringent needs and requirements. High availability, very high throughput, low latency, and reliability are all of them crucial performance parameters. To address these demands, emerging technologies, such as non-terrestrial networks or millimeter wave (mmWave), are being included in 5G and Beyond 5G (B5G) specifications. mmWave enables massive data transmissions, at the expense of a more hostile propagation, typical for high frequency bands. Consequently, the inherent instability of the physical channel significantly affects the upper layers of the protocol stack, resulting in congestion and data losses, which might strongly hinder the overall communication performance. These challenges can be addressed not only at the link layer, but at any affected layer. QUIC is a new transport protocol designed to reduce communications latency in many ways. Among other features, it enables the use of multiple streams to effectively manage data flows sent through its underlying UDP socket. This paper introduces an implementation of priority-based stream schedulers along with the design of a flexible interface. Exploiting the proposed approach, applications are able to set the required scheduling scheme, as well as the stream priorities. The feasibility of the proposed approach is validated through an extensive experiment campaign, which combines Docker containers, the ns-3 simulator and the Mahimahi framework, which is exploited to introduce realistic mmWave channel traces. The results evince that an appropriate stream scheduler can indeed yield lower delays for time-sensitive applications by up to 36% under unreliable conditions.

无线技术的出现促使为终端用户开发新的服务,并提出了严格的需求和要求。高可用性、极高吞吐量、低延迟和可靠性都是至关重要的性能参数。为满足这些需求,非地面网络或毫米波(mmWave)等新兴技术正被纳入 5G 和超越 5G(B5G)技术规范。毫米波可实现海量数据传输,但传播环境更为恶劣,是高频段的典型特征。因此,物理信道固有的不稳定性会严重影响协议栈的上层,导致拥塞和数据丢失,从而严重影响整体通信性能。这些挑战不仅可以在链路层解决,也可以在任何受影响的层上解决。QUIC 是一种新的传输协议,旨在以多种方式减少通信延迟。除其他功能外,它还能使用多数据流来有效管理通过其底层 UDP 套接字发送的数据流。本文介绍了基于优先级的流调度器的实现方法以及灵活接口的设计。利用所提出的方法,应用程序能够设置所需的调度方案以及流优先级。通过广泛的实验活动,结合 Docker 容器、ns-3 模拟器和 Mahimahi 框架,验证了所提方法的可行性。结果表明,在不可靠的条件下,适当的流调度器确实可以将时间敏感型应用的延迟降低 36%。
{"title":"Exploiting stream scheduling in QUIC: Performance assessment over wireless connectivity scenarios","authors":"","doi":"10.1016/j.adhoc.2024.103599","DOIUrl":"10.1016/j.adhoc.2024.103599","url":null,"abstract":"<div><p>The advent of wireless technologies has led to the development of novel services for end-users, with stringent needs and requirements. High availability, very high throughput, low latency, and reliability are all of them crucial performance parameters. To address these demands, emerging technologies, such as non-terrestrial networks or millimeter wave (mmWave), are being included in 5G and Beyond 5G (B5G) specifications. mmWave enables massive data transmissions, at the expense of a more hostile propagation, typical for high frequency bands. Consequently, the inherent instability of the physical channel significantly affects the upper layers of the protocol stack, resulting in congestion and data losses, which might strongly hinder the overall communication performance. These challenges can be addressed not only at the link layer, but at any affected layer. QUIC is a new transport protocol designed to reduce communications latency in many ways. Among other features, it enables the use of multiple streams to effectively manage data flows sent through its underlying UDP socket. This paper introduces an implementation of priority-based stream schedulers along with the design of a flexible interface. Exploiting the proposed approach, applications are able to set the required scheduling scheme, as well as the stream priorities. The feasibility of the proposed approach is validated through an extensive experiment campaign, which combines Docker containers, the ns-3 simulator and the Mahimahi framework, which is exploited to introduce realistic mmWave channel traces. The results evince that an appropriate stream scheduler can indeed yield lower delays for time-sensitive applications by up to 36% under unreliable conditions.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002105/pdfft?md5=460c9f73b298581eb5c0a0504f183755&pid=1-s2.0-S1570870524002105-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECMSH: An Energy-efficient and Cost-effective data harvesting protocol for Mobile Sink-based Heterogeneous WSNs using PSO-TVAC ECMSH:利用 PSO-TVAC 为基于移动 Sink 的异构 WSN 制定的高能效、低成本数据采集协议
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-10 DOI: 10.1016/j.adhoc.2024.103629

Efficient energy consumption is crucial in Wireless Sensor Networks (WSNs). Uncontrolled energy usage can lead to the hotspot issue, hindering network lifetime and successful packet delivery. Sink mobility has been suggested as a solution, but it comes with challenges such as high data gathering delay and poor packet reception. These problems stem from the short contact time of nodes with the Mobile Sink (MS). To tackle these issues, we present an MS-based heterogeneous WSN with super and normal nodes. Most previous studies only considered the energy heterogeneity of sensors. These methods also suffered from different issues such as fixed MS tours, including inappropriate criteria in cluster construction, proposing greedy schemes, and employing basic metaheuristic algorithms. In our proposed model, super nodes are richer in initial energy and transmission range than normal sensors. In each round, the nodes are organized into clusters, and the MS visits the Cluster Heads (CHs) to gather data packets. Super nodes, owing to their elevated initial energy, are more adept at executing energy-sensitive tasks compared to normal sensors. Additionally, as CH, super nodes extend the contact time with the MS due to their longer transmission range, delivering more packets. The clusters are constructed using a variant of Particle Swarm Optimization (PSO), namely PSO-TVAC. We empower this method with effective initialization and decoding methods. Furthermore, we propose a heuristic intra-cluster multi-hop routing algorithm to enhance network lifetime. Our other contribution is to propose an efficient algorithm to determine the time to reconfigure the network, while the other algorithms mainly reconfigure the WSN periodically. Simulation results demonstrate superior performance compared to state-of-the-art algorithms, showcasing lower energy consumption, higher energy efficiency, higher lifetime, reduced packet delivery delay, and higher number of received packets by 30%, 38.2%, four times, 20.6%, and 22.6%, respectively.

高效的能源消耗在无线传感器网络(WSN)中至关重要。不加控制地使用能源会导致热点问题,影响网络寿命和数据包的成功传送。有人建议将 Sink 移动作为一种解决方案,但它也带来了数据收集延迟高和数据包接收不佳等挑战。这些问题源于节点与移动 Sink(MS)的接触时间较短。为了解决这些问题,我们提出了一种基于 MS 的超级节点和普通节点的异构 WSN。以前的研究大多只考虑了传感器的能量异质性。这些方法也存在不同的问题,如固定的 MS 行程、在集群构建中采用不恰当的标准、提出贪婪方案以及采用基本的元启发式算法。在我们提出的模型中,超级节点的初始能量和传输距离都比普通传感器丰富。在每一轮中,节点被组织成簇群,MS 访问簇头(CHs)收集数据包。与普通传感器相比,超级节点由于初始能量较高,更善于执行对能量敏感的任务。此外,作为 CH,超级节点由于传输距离更远,可以延长与 MS 的接触时间,从而传送更多数据包。簇的构建采用了粒子群优化(PSO)的一种变体,即 PSO-TVAC。我们通过有效的初始化和解码方法增强了这种方法的能力。此外,我们还提出了一种启发式簇内多跳路由算法,以提高网络寿命。我们的另一个贡献是提出了一种高效算法来确定重新配置网络的时间,而其他算法主要是周期性地重新配置 WSN。仿真结果表明,与最先进的算法相比,该算法性能优越,能耗更低、能效更高、寿命更长、数据包传送延迟更短、接收到的数据包数量更多,分别增加了 30%、38.2%、4 倍、20.6% 和 22.6%。
{"title":"ECMSH: An Energy-efficient and Cost-effective data harvesting protocol for Mobile Sink-based Heterogeneous WSNs using PSO-TVAC","authors":"","doi":"10.1016/j.adhoc.2024.103629","DOIUrl":"10.1016/j.adhoc.2024.103629","url":null,"abstract":"<div><p>Efficient energy consumption is crucial in Wireless Sensor Networks (WSNs). Uncontrolled energy usage can lead to the hotspot issue, hindering network lifetime and successful packet delivery. Sink mobility has been suggested as a solution, but it comes with challenges such as high data gathering delay and poor packet reception. These problems stem from the short contact time of nodes with the Mobile Sink (MS). To tackle these issues, we present an MS-based heterogeneous WSN with super and normal nodes. Most previous studies only considered the energy heterogeneity of sensors. These methods also suffered from different issues such as fixed MS tours, including inappropriate criteria in cluster construction, proposing greedy schemes, and employing basic metaheuristic algorithms. In our proposed model, super nodes are richer in initial energy and transmission range than normal sensors. In each round, the nodes are organized into clusters, and the MS visits the Cluster Heads (CHs) to gather data packets. Super nodes, owing to their elevated initial energy, are more adept at executing energy-sensitive tasks compared to normal sensors. Additionally, as CH, super nodes extend the contact time with the MS due to their longer transmission range, delivering more packets. The clusters are constructed using a variant of Particle Swarm Optimization (PSO), namely PSO-TVAC. We empower this method with effective initialization and decoding methods. Furthermore, we propose a heuristic intra-cluster multi-hop routing algorithm to enhance network lifetime. Our other contribution is to propose an efficient algorithm to determine the time to reconfigure the network, while the other algorithms mainly reconfigure the WSN periodically. Simulation results demonstrate superior performance compared to state-of-the-art algorithms, showcasing lower energy consumption, higher energy efficiency, higher lifetime, reduced packet delivery delay, and higher number of received packets by 30%, 38.2%, four times, 20.6%, and 22.6%, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141990906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Federated Learning assisted framework to periodically identify user communities in urban space” [Ad Hoc Networks 163 (2024) pp. 1-21/103589] 定期识别城市空间用户社区的联合学习辅助框架》[Ad Hoc Networks 163 (2024) pp.]
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-10 DOI: 10.1016/j.adhoc.2024.103624
{"title":"Corrigendum to “Federated Learning assisted framework to periodically identify user communities in urban space” [Ad Hoc Networks 163 (2024) pp. 1-21/103589]","authors":"","doi":"10.1016/j.adhoc.2024.103624","DOIUrl":"10.1016/j.adhoc.2024.103624","url":null,"abstract":"","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157087052400235X/pdfft?md5=770a0dc2de0a497c0572d54beb2b7660&pid=1-s2.0-S157087052400235X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142167575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring model transferability in ML-integrated RPL routing for smart grid communication: A comparative analysis across urban scenarios 探索智能电网通信中集成 ML 的 RPL 路由的模型可转移性:跨城市场景的比较分析
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.adhoc.2024.103626

Machine learning (ML) techniques have demonstrated considerable effectiveness when integrated into routing protocols to enhance the performance of Smart Grid Networks. However, their performance across diverse real-world scenarios remains a topic of exploration. In this study, we evaluate the performance and transferability of four ML models—Long Short-Term Memory (LSTM), Feedforward Neural Network (FF), Decision Trees, and Naive Bayes—across three distinct scenarios: Barcelona, Montreal, and Rome. Through rigorous experimentation and analysis, we analyze the varying efficacy of these models in different scenarios. Our results demonstrate that LSTM outperforms other models in the Montreal and Rome scenarios, highlighting its effectiveness in predicting the optimal forwarding node for packet transmission. In contrast, Ensemble of Bagged Decision Trees emerge as the optimal model for the Barcelona scenario, exhibiting strong performance in selecting the most suitable forwarding node for packet transmission. However, the transferability of these models to scenarios where they were not trained is notably limited, as evidenced by their decreased performance on datasets from other scenarios. This observation underscores the importance of considering the data characteristics when selecting ML models for real-world applications. Furthermore, we identify that the distribution of nodes within datasets significantly influences model performance, highlighting its critical role in determining model efficacy. These insights contribute to a deeper understanding of the challenges inherent in transferring ML models between real-world scenarios, providing valuable guidance for practitioners and researchers alike in optimizing ML applications in Smart Grid Networks.

将机器学习(ML)技术集成到路由协议中以提高智能电网网络的性能,已显示出相当大的功效。然而,它们在不同现实世界场景中的表现仍是一个有待探索的课题。在本研究中,我们评估了四种 ML 模型--长短期记忆 (LSTM)、前馈神经网络 (FF)、决策树和 Naive Bayes--在三种不同场景下的性能和可移植性:巴塞罗那、蒙特利尔和罗马。通过严格的实验和分析,我们分析了这些模型在不同场景中的不同功效。我们的结果表明,在蒙特利尔和罗马场景中,LSTM 的表现优于其他模型,突出了它在预测数据包传输的最佳转发节点方面的有效性。相比之下,在巴塞罗那场景中,袋装决策树集合成为最佳模型,在为数据包传输选择最合适的转发节点方面表现出色。然而,这些模型在没有经过训练的场景中的可移植性明显受到限制,它们在其他场景的数据集上的性能下降就证明了这一点。这一观察结果强调了在为实际应用选择 ML 模型时考虑数据特征的重要性。此外,我们还发现数据集内节点的分布对模型性能有显著影响,突出了节点在决定模型功效方面的关键作用。这些见解有助于深入理解在真实世界场景之间转移 ML 模型所固有的挑战,为从业人员和研究人员优化智能电网网络中的 ML 应用提供有价值的指导。
{"title":"Exploring model transferability in ML-integrated RPL routing for smart grid communication: A comparative analysis across urban scenarios","authors":"","doi":"10.1016/j.adhoc.2024.103626","DOIUrl":"10.1016/j.adhoc.2024.103626","url":null,"abstract":"<div><p>Machine learning (ML) techniques have demonstrated considerable effectiveness when integrated into routing protocols to enhance the performance of Smart Grid Networks. However, their performance across diverse real-world scenarios remains a topic of exploration. In this study, we evaluate the performance and transferability of four ML models—Long Short-Term Memory (LSTM), Feedforward Neural Network (FF), Decision Trees, and Naive Bayes—across three distinct scenarios: Barcelona, Montreal, and Rome. Through rigorous experimentation and analysis, we analyze the varying efficacy of these models in different scenarios. Our results demonstrate that LSTM outperforms other models in the Montreal and Rome scenarios, highlighting its effectiveness in predicting the optimal forwarding node for packet transmission. In contrast, Ensemble of Bagged Decision Trees emerge as the optimal model for the Barcelona scenario, exhibiting strong performance in selecting the most suitable forwarding node for packet transmission. However, the transferability of these models to scenarios where they were not trained is notably limited, as evidenced by their decreased performance on datasets from other scenarios. This observation underscores the importance of considering the data characteristics when selecting ML models for real-world applications. Furthermore, we identify that the distribution of nodes within datasets significantly influences model performance, highlighting its critical role in determining model efficacy. These insights contribute to a deeper understanding of the challenges inherent in transferring ML models between real-world scenarios, providing valuable guidance for practitioners and researchers alike in optimizing ML applications in Smart Grid Networks.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141954046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-enhanced multi-stage learning-to-learning approach for secure smart cities load management in IoT networks 用于物联网网络中安全智慧城市负载管理的人工智能增强型多阶段 "从学习到学习 "方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-07 DOI: 10.1016/j.adhoc.2024.103628

In the context of rapidly urbanizing smart cities reliant on IoT networks, efficient load management is critical for sustainable energy use. This paper proposes an AI-enhanced Multi-Stage Learning-to-Learning (MSLL) approach tailored for secure load management in IoT networks. The proposed approach leverages MMStransformer, a transformer-based model designed to handle multivariate, correlated data, and to capture long-range dependencies inherent in load forecasting. MMStransformer employs a multi-mask learning-to-learning strategy, optimizing computational efficiency without compromising prediction accuracy. The study addresses the dynamic and complex nature of smart city data by integrating diverse environmental and operational variables. Security and privacy concerns inherent in IoT networks are also addressed, ensuring secure data handling and communication. Experimental results demonstrate the efficacy of the proposed approach, achieving competitive performance compared to traditional methods and baseline models. The findings highlight the potential of AI-driven solutions in enhancing load forecasting accuracy while ensuring robust security measures in smart city infrastructures. This research contributes to advancing the state-of-the-art in AI applications for sustainable urban development and energy management.

在依赖物联网网络的快速城市化智能城市中,高效的负载管理对于可持续能源利用至关重要。本文提出了一种人工智能增强型多阶段学习(Multi-Stage Learning-to-Learning,MSLL)方法,专门用于物联网网络中的安全负载管理。所提出的方法利用了 MMStransformer,这是一种基于变压器的模型,旨在处理多变量相关数据,并捕捉负荷预测中固有的长距离依赖关系。MMStransformer 采用多任务学习对学习策略,在不影响预测准确性的前提下优化了计算效率。该研究通过整合各种环境和运行变量,解决了智慧城市数据的动态性和复杂性问题。研究还解决了物联网网络固有的安全和隐私问题,确保了数据处理和通信的安全性。实验结果证明了所提方法的有效性,与传统方法和基线模型相比,该方法取得了极具竞争力的性能。研究结果凸显了人工智能驱动的解决方案在提高负荷预测准确性方面的潜力,同时确保了智能城市基础设施的稳健安全措施。这项研究有助于推动人工智能在可持续城市发展和能源管理中的应用。
{"title":"AI-enhanced multi-stage learning-to-learning approach for secure smart cities load management in IoT networks","authors":"","doi":"10.1016/j.adhoc.2024.103628","DOIUrl":"10.1016/j.adhoc.2024.103628","url":null,"abstract":"<div><p>In the context of rapidly urbanizing smart cities reliant on IoT networks, efficient load management is critical for sustainable energy use. This paper proposes an AI-enhanced Multi-Stage Learning-to-Learning (MSLL) approach tailored for secure load management in IoT networks. The proposed approach leverages MMStransformer, a transformer-based model designed to handle multivariate, correlated data, and to capture long-range dependencies inherent in load forecasting. MMStransformer employs a multi-mask learning-to-learning strategy, optimizing computational efficiency without compromising prediction accuracy. The study addresses the dynamic and complex nature of smart city data by integrating diverse environmental and operational variables. Security and privacy concerns inherent in IoT networks are also addressed, ensuring secure data handling and communication. Experimental results demonstrate the efficacy of the proposed approach, achieving competitive performance compared to traditional methods and baseline models. The findings highlight the potential of AI-driven solutions in enhancing load forecasting accuracy while ensuring robust security measures in smart city infrastructures. This research contributes to advancing the state-of-the-art in AI applications for sustainable urban development and energy management.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141998142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mobile data collection method for balancing energy consumption and delay in strip-shaped wireless sensor networks with branches 带分支的条形无线传感器网络中平衡能耗和延迟的移动数据采集方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-04 DOI: 10.1016/j.adhoc.2024.103627

Strip-shaped Wireless Sensor Networks (WSNs) with branches are commonly used in various long and narrow applications, such as mines, factories, subways, and pipelines, and they face serious energy hole problems caused by multi-hop communication. The Mobile Data Collector (MDC) can alleviate the energy hole problem. Current solutions have two limitations: one is the balance between energy consumption and delay, and the other is the overly ideal network model, e.g., the square region or circular area. This paper focuses on strip-shaped networks and proposes a novel mobile data collection method to find a trade-off between energy preservation and data delivery delay. Firstly, the MDC path is planned by solving the diameter of the tree in the network, resulting in reduced delay. Secondly, the network energy consumption is further reduced by clustering and optimal transmission distance adjustment. Then, a network lifetime balancing mechanism is designed to balance network energy between backbone and branches. Finally, the performance of the algorithm proposed in this paper has been studied in four types of strip-shaped WSNs and compared with four existing MDC methods with evaluation metrics of maximum node energy consumption, network delay and weighted sum of both. The simulation results demonstrate that the proposed algorithm is applicable to different types of strip-shaped WSNs with branches and achieves excellent network performance, which can effectively balance network energy consumption and data collection delay.

带分支的条状无线传感器网络(WSN)通常用于矿井、工厂、地铁和管道等各种狭长的应用场合,它们面临着多跳通信造成的严重的能量漏洞问题。移动数据收集器(MDC)可以缓解能量漏洞问题。目前的解决方案有两个局限:一是能耗和延迟之间的平衡,二是过于理想的网络模型,如方形区域或圆形区域。本文以条形网络为研究对象,提出了一种新颖的移动数据采集方法,以寻求能量保存和数据传输延迟之间的权衡。首先,通过求解网络中树的直径来规划 MDC 路径,从而减少延迟。其次,通过聚类和优化传输距离调整进一步降低网络能耗。然后,设计了一种网络寿命平衡机制,以平衡主干和分支之间的网络能量。最后,本文提出的算法在四种条状 WSN 中进行了性能研究,并与现有的四种 MDC 方法进行了比较,评价指标为最大节点能耗、网络延迟和两者的加权和。仿真结果表明,本文提出的算法适用于不同类型的带分支的条形 WSN,并取得了优异的网络性能,能有效平衡网络能耗和数据采集延迟。
{"title":"A mobile data collection method for balancing energy consumption and delay in strip-shaped wireless sensor networks with branches","authors":"","doi":"10.1016/j.adhoc.2024.103627","DOIUrl":"10.1016/j.adhoc.2024.103627","url":null,"abstract":"<div><p>Strip-shaped Wireless Sensor Networks (WSNs) with branches are commonly used in various long and narrow applications, such as mines, factories, subways, and pipelines, and they face serious energy hole problems caused by multi-hop communication. The Mobile Data Collector (MDC) can alleviate the energy hole problem. Current solutions have two limitations: one is the balance between energy consumption and delay, and the other is the overly ideal network model, e.g., the square region or circular area. This paper focuses on strip-shaped networks and proposes a novel mobile data collection method to find a trade-off between energy preservation and data delivery delay. Firstly, the MDC path is planned by solving the diameter of the tree in the network, resulting in reduced delay. Secondly, the network energy consumption is further reduced by clustering and optimal transmission distance adjustment. Then, a network lifetime balancing mechanism is designed to balance network energy between backbone and branches. Finally, the performance of the algorithm proposed in this paper has been studied in four types of strip-shaped WSNs and compared with four existing MDC methods with evaluation metrics of maximum node energy consumption, network delay and weighted sum of both. The simulation results demonstrate that the proposed algorithm is applicable to different types of strip-shaped WSNs with branches and achieves excellent network performance, which can effectively balance network energy consumption and data collection delay.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142012354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bleach: From WiFi probe-request signatures to MAC association 漂白剂从 WiFi 探测请求签名到 MAC 关联
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-03 DOI: 10.1016/j.adhoc.2024.103623

Smartphones or similar WiFi-enabled devices regularly discover nearby access points by broadcasting management frames known as probe-requests. Probe-request frames relay, as information, the MAC addresses of sending devices, which act as the device identifiers. To protect the user’s privacy and location, probe-requests use a randomized MAC address generated according to the MAC address randomization protocol. Unfortunately, MAC randomization greatly limits any studies on trajectory inference, flow estimation, crowd counting, etc. To overcome this limitation while respecting users’ privacy, we propose Bleach, a novel, efficient, and comprehensive approach allowing randomized MAC addresses to device association from probe-requests. Bleach models the frame association as a resolution of MAC conflicts in small time intervals. We use time and frame content-based signatures to resolve and associate MACs inside a conflict. We propose a novel MAC association algorithm involving logistic regression using signatures and our introduced time metric. To the best of our knowledge, this is the first work that formulates the probe-request association problem as a generic resolution of conflicts and benchmarks the association concerning several datasets. Our results show that Bleach outperforms the state-of-the-art schemes in terms of accuracy (as high as 99%) and robustness to a wide range of input probe-request datasets.

智能手机或类似的 WiFi 设备会定期通过广播管理帧(即探针请求)来发现附近的接入点。探测请求帧转发发送设备的 MAC 地址(作为设备标识符)作为信息。为了保护用户的隐私和位置,探测请求使用根据 MAC 地址随机化协议生成的随机 MAC 地址。遗憾的是,MAC 随机化极大地限制了有关轨迹推断、流量估计、人群计数等方面的研究。为了在尊重用户隐私的同时克服这一限制,我们提出了一种新颖、高效、全面的方法,允许随机 MAC 地址与探测请求中的设备关联。我们使用基于时间和帧内容的签名来解决和关联冲突中的 MAC。我们提出了一种新颖的 MAC 关联算法,该算法涉及使用签名和我们引入的时间度量的逻辑回归。据我们所知,这是第一项将探针-请求关联问题表述为通用冲突解决方法的研究,并对多个数据集的关联进行了基准测试。我们的研究结果表明,就准确率(高达 99%)和对各种输入探针请求数据集的鲁棒性而言,我们的方案优于最先进的方案。
{"title":"Bleach: From WiFi probe-request signatures to MAC association","authors":"","doi":"10.1016/j.adhoc.2024.103623","DOIUrl":"10.1016/j.adhoc.2024.103623","url":null,"abstract":"<div><p>Smartphones or similar WiFi-enabled devices regularly discover nearby access points by broadcasting management frames known as probe-requests. Probe-request frames relay, as information, the MAC addresses of sending devices, which act as the device identifiers. To protect the user’s privacy and location, probe-requests use a randomized MAC address generated according to the MAC address randomization protocol. Unfortunately, MAC randomization greatly limits any studies on trajectory inference, flow estimation, crowd counting, etc. To overcome this limitation while respecting users’ privacy, we propose <span>Bleach</span>, a novel, efficient, and comprehensive approach allowing randomized MAC addresses to device association from probe-requests. <span>Bleach</span> models the frame association as a resolution of MAC conflicts in small time intervals. We use time and frame content-based signatures to resolve and associate MACs inside a conflict. We propose a novel MAC association algorithm involving logistic regression using signatures and our introduced time metric. To the best of our knowledge, this is the first work that formulates the probe-request association problem as a generic resolution of conflicts and benchmarks the association concerning several datasets. Our results show that <span>Bleach</span> outperforms the state-of-the-art schemes in terms of accuracy (as high as 99%) and robustness to a wide range of input probe-request datasets.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1570870524002348/pdfft?md5=02e4cd50b7a3e4de4614a97c87b80c13&pid=1-s2.0-S1570870524002348-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1