首页 > 最新文献

Ad Hoc Networks最新文献

英文 中文
Intelligent Computer Networks and Distributed Systems 智能计算机网络和分布式系统
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1016/j.adhoc.2024.103595
{"title":"Intelligent Computer Networks and Distributed Systems","authors":"","doi":"10.1016/j.adhoc.2024.103595","DOIUrl":"10.1016/j.adhoc.2024.103595","url":null,"abstract":"","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141614562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT 用于 IIoT 多用户物理层身份验证的多属性加权卷积注意力神经网络
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.adhoc.2024.103593
Yue Wu , Tao Jing , Qinghe Gao , Jian Mao , Yan Huo , Zhiwei Yang

Compared with upper layer authentication, physical layer authentication (PLA) is essential in unmanned Industrial Internet of Things (IIoT) scenarios, owing to its low complexity and lightweight. However, in dynamic environments, as the amount of users expands, the accuracy of single-attribute-based authentication decreases drastically, which becomes an urgent issue for IIoT. Accordingly, this paper proposes a novel multi-attribute-based convolutional attention neural network (CANN) for multiuser PLA. Using characteristics such as amplitude, phase, and delay, the multiple attributes from a real industrial scene are first constructed into three-dimensional matrices fed into CANN. Then, attention blocks are designed to learn the correlation between attributes and extract the attribute parts that are more instrumental in the CANN to improve authentication accuracy. In addition, to avoid confusing multiple users, a center confidence loss is introduced, which adaptively adjusts the weight of the center loss and works together with the softmax loss to train the CANN. The effectiveness of the proposed CANN-based multiuser PLA and center confidence loss is supported by experimental results. Compared with the recently proposed latent perturbed convolutional neural network (LPCNN), the CANN-based scheme improves the authentication accuracy by 8.11%, which is superior to the existing learning-based approaches. As the CANN is further trained with the loss function that combines center confidence loss, the authentication accuracy can be improved by at least 2.22%.

与上层身份验证相比,物理层身份验证(PLA)因其低复杂性和轻量级而在无人工业物联网(IIoT)场景中至关重要。然而,在动态环境中,随着用户数量的增加,基于单一属性的身份验证的准确性急剧下降,这成为 IIoT 迫切需要解决的问题。因此,本文针对多用户 PLA 提出了一种新颖的基于多属性的卷积注意力神经网络(CANN)。首先,利用振幅、相位和延迟等特征,将真实工业场景中的多个属性构建成三维矩阵并输入 CANN。然后,设计注意力模块来学习属性之间的相关性,并提取 CANN 中更有用的属性部分,以提高认证准确性。此外,为了避免混淆多个用户,还引入了中心置信度损失,自适应地调整中心损失的权重,并与 softmax 损失一起用于训练 CANN。实验结果证明了所提出的基于 CANN 的多用户 PLA 和中心置信度损失的有效性。与最近提出的潜扰卷积神经网络(LPCNN)相比,基于 CANN 的方案提高了 8.11% 的认证准确率,优于现有的基于学习的方法。在结合中心置信度损失的损失函数对 CANN 进行进一步训练后,认证准确率至少提高了 2.22%。
{"title":"Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT","authors":"Yue Wu ,&nbsp;Tao Jing ,&nbsp;Qinghe Gao ,&nbsp;Jian Mao ,&nbsp;Yan Huo ,&nbsp;Zhiwei Yang","doi":"10.1016/j.adhoc.2024.103593","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103593","url":null,"abstract":"<div><p>Compared with upper layer authentication, physical layer authentication (PLA) is essential in unmanned Industrial Internet of Things (IIoT) scenarios, owing to its low complexity and lightweight. However, in dynamic environments, as the amount of users expands, the accuracy of single-attribute-based authentication decreases drastically, which becomes an urgent issue for IIoT. Accordingly, this paper proposes a novel multi-attribute-based convolutional attention neural network (CANN) for multiuser PLA. Using characteristics such as amplitude, phase, and delay, the multiple attributes from a real industrial scene are first constructed into three-dimensional matrices fed into CANN. Then, attention blocks are designed to learn the correlation between attributes and extract the attribute parts that are more instrumental in the CANN to improve authentication accuracy. In addition, to avoid confusing multiple users, a center confidence loss is introduced, which adaptively adjusts the weight of the center loss and works together with the softmax loss to train the CANN. The effectiveness of the proposed CANN-based multiuser PLA and center confidence loss is supported by experimental results. Compared with the recently proposed latent perturbed convolutional neural network (LPCNN), the CANN-based scheme improves the authentication accuracy by 8.11%, which is superior to the existing learning-based approaches. As the CANN is further trained with the loss function that combines center confidence loss, the authentication accuracy can be improved by at least 2.22%.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning iTRPL:基于多代理强化学习的智能可信 RPL 协议
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1016/j.adhoc.2024.103586
Debasmita Dey, Nirnay Ghosh

Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc networks modeled by tree-like destination-oriented direct acyclic graphs (DODAG). Despite its widespread usage in industry and healthcare domains, RPL is susceptible to insider attacks. Although the state-of-the-art RPL ensures that only authenticated nodes participate in DODAG, such hard security measures are still inadequate to prevent insider threats. This entails a need to integrate soft security mechanisms to support decision-making. This paper proposes iTRPL, an intelligent and behavior-based framework that incorporates trust to segregate honest and malicious nodes within a DODAG. It also leverages multi-agent reinforcement learning (MARL) to make autonomous decisions concerning the DODAG. The framework enables a parent node to compute the trust for its child and decide if the latter can join the DODAG. It tracks the behavior of the child node, updates the trust, computes the rewards (or penalties), and shares them with the root. The root aggregates the rewards/penalties of all nodes, computes the overall return, and decides via its ϵ-Greedy MARL module if the DODAG will be retained or modified for the future. A simulation-based performance evaluation demonstrates that iTRPL learns to make optimal decisions with time.

低功耗和低损耗网络路由协议(RPL)是物联网网络中事实上的路由标准。它使节点能够协作并自主构建以树状面向目的地的直接非循环图(DODAG)为模型的 ad-hoc 网络。尽管 RPL 在工业和医疗保健领域得到广泛应用,但它很容易受到内部攻击。尽管最先进的 RPL 可确保只有经过验证的节点才能参与 DODAG,但这种硬性安全措施仍不足以防止内部威胁。这就需要整合软安全机制来支持决策。本文提出的 iTRPL 是一种基于行为的智能框架,它结合了信任来隔离 DODAG 中的诚实节点和恶意节点。它还利用多代理强化学习(MARL)做出有关 DODAG 的自主决策。该框架使父节点能够计算其子节点的信任度,并决定后者是否可以加入 DODAG。父节点跟踪子节点的行为,更新信任度,计算奖励(或惩罚),并与根节点共享。根节点汇总所有节点的奖励/惩罚,计算总回报,并通过其ϵ-贪婪 MARL 模块决定未来是否保留或修改 DODAG。基于模拟的性能评估表明,随着时间的推移,iTRPL 能够学会做出最优决策。
{"title":"iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning","authors":"Debasmita Dey,&nbsp;Nirnay Ghosh","doi":"10.1016/j.adhoc.2024.103586","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103586","url":null,"abstract":"<div><p>Routing Protocol for Low Power and Lossy Networks (RPL) is the de-facto routing standard in IoT networks. It enables nodes to collaborate and autonomously build ad-hoc networks modeled by tree-like destination-oriented direct acyclic graphs (DODAG). Despite its widespread usage in industry and healthcare domains, RPL is susceptible to insider attacks. Although the state-of-the-art RPL ensures that only authenticated nodes participate in DODAG, such hard security measures are still inadequate to prevent insider threats. This entails a need to integrate soft security mechanisms to support decision-making. This paper proposes <em>iTRPL</em>, an intelligent and behavior-based framework that incorporates trust to segregate honest and malicious nodes within a DODAG. It also leverages multi-agent reinforcement learning (MARL) to make autonomous decisions concerning the DODAG. The framework enables a parent node to compute the trust for its child and decide if the latter can join the DODAG. It tracks the behavior of the child node, updates the trust, computes the rewards (or penalties), and shares them with the root. The root aggregates the rewards/penalties of all nodes, computes the overall return, and decides via its <span><math><mi>ϵ</mi></math></span>-Greedy MARL module if the DODAG will be retained or modified for the future. A simulation-based performance evaluation demonstrates that <em>iTRPL</em> learns to make optimal decisions with time.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning IoV-BCFL:基于区块链和联合学习的物联网入侵检测方法
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1016/j.adhoc.2024.103590
Nannan Xie, Chuanxue Zhang, Qizhao Yuan, Jing Kong, Xiaoqiang Di

In recent years, Internet of Vehicles (IoV) is in a booming stage. But at the same time, the methods of attack against IoV such as Denial of Service (DoS) and deception are great threats to personal and social security. Traditional IoV intrusion detection usually adopts a centralized detection model, which has the disadvantages of untimely detection results and is difficult to protect vehicle privacy in practical applications. Meanwhile, centralized computation requires a large amount of vehicle data transmission, which overloads the wireless bandwidth. Combined the distributed computing resources of Federated Learning (FL) and the decentralized features of blockchain, an IoV intrusion detection framework named IoV-BCFL is proposed, which is capable of distributed intrusion detection and reliable logging with privacy protection. FL is used for distributing training on vehicle nodes and aggregating the training models at Road Side Unit (RSU) to reduce data transmission, protect the privacy of training data, and ensure the security of the model. A blockchain-based intrusion logging mechanism is presented, which enhances vehicle privacy protection through Rivest-Shamir-Adleman (RSA) algorithm encryption and uses Inter Planetary File System (IPFS) to store the intrusion logs. The intrusion behavior can be faithfully recorded by logging smart contract after detecting the intrusion, which can be used to track intruders, analyze security vulnerabilities, and collect evidence. Experiments based on different open source datasets show that FL achieves a high detection rates on intrusion data and effectively reduce the communication overhead, the smart contract performs well on evaluation indicators such as sending rate, latency, and throughput.

近年来,车联网(IoV)正处于蓬勃发展阶段。但与此同时,拒绝服务(DoS)、欺骗等针对车联网的攻击手段也对个人和社会安全造成了极大威胁。传统的物联网入侵检测通常采用集中式检测模式,其缺点是检测结果不及时,在实际应用中难以保护车辆隐私。同时,集中式计算需要传输大量车辆数据,无线带宽不堪重负。结合联邦学习(Federated Learning,FL)的分布式计算资源和区块链的去中心化特性,提出了一种名为IoV-BCFL的物联网入侵检测框架,能够实现分布式入侵检测和可靠的日志记录,并保护隐私。FL 用于在车辆节点上分布式训练,并将训练模型汇聚到路侧单元(RSU),以减少数据传输,保护训练数据的隐私,确保模型的安全性。本文提出了一种基于区块链的入侵日志机制,该机制通过Rivest-Shamir-Adleman(RSA)算法加密加强车辆隐私保护,并使用星际文件系统(IPFS)存储入侵日志。在检测到入侵行为后,可通过记录智能合约忠实记录入侵行为,用于追踪入侵者、分析安全漏洞和收集证据。基于不同开源数据集的实验表明,FL 对入侵数据实现了较高的检测率,并有效降低了通信开销,智能合约在发送率、延迟和吞吐量等评价指标上表现良好。
{"title":"IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning","authors":"Nannan Xie,&nbsp;Chuanxue Zhang,&nbsp;Qizhao Yuan,&nbsp;Jing Kong,&nbsp;Xiaoqiang Di","doi":"10.1016/j.adhoc.2024.103590","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103590","url":null,"abstract":"<div><p>In recent years, Internet of Vehicles (IoV) is in a booming stage. But at the same time, the methods of attack against IoV such as Denial of Service (DoS) and deception are great threats to personal and social security. Traditional IoV intrusion detection usually adopts a centralized detection model, which has the disadvantages of untimely detection results and is difficult to protect vehicle privacy in practical applications. Meanwhile, centralized computation requires a large amount of vehicle data transmission, which overloads the wireless bandwidth. Combined the distributed computing resources of Federated Learning (FL) and the decentralized features of blockchain, an IoV intrusion detection framework named IoV-BCFL is proposed, which is capable of distributed intrusion detection and reliable logging with privacy protection. FL is used for distributing training on vehicle nodes and aggregating the training models at Road Side Unit (RSU) to reduce data transmission, protect the privacy of training data, and ensure the security of the model. A blockchain-based intrusion logging mechanism is presented, which enhances vehicle privacy protection through Rivest-Shamir-Adleman (RSA) algorithm encryption and uses Inter Planetary File System (IPFS) to store the intrusion logs. The intrusion behavior can be faithfully recorded by logging smart contract after detecting the intrusion, which can be used to track intruders, analyze security vulnerabilities, and collect evidence. Experiments based on different open source datasets show that FL achieves a high detection rates on intrusion data and effectively reduce the communication overhead, the smart contract performs well on evaluation indicators such as sending rate, latency, and throughput.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning assisted framework to periodically identify user communities in urban space 联合学习辅助框架,定期识别城市空间中的用户社区
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1016/j.adhoc.2024.103589
Cláudio Diego T. de Souza , José Ferreira de Rezende , Carlos Alberto V. Campos

Identifying individuals with similar behaviors and mobility patterns has become essential to improving the functioning of urban services. However, since these patterns can vary over time, such identification needs to be done periodically. Furthermore, once mobility data expresses the routine of individuals, privacy must be guaranteed. In this work, we propose a framework for periodically detecting and grouping individuals with behavioral similarities into communities. To accomplish this, we built an autoencoder model to extract spatio-temporal mobility features from raw user data at periodic intervals. We used Federated Learning (FL) as a training approach to preserve privacy and alleviate time-consuming training and communication costs. To determine the number of communities without risking an arbitrary number, we compared the choices of two probabilistic methods, the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC). Since the communities are updated periodically, we also analyzed the impact of aged samples on the proposed framework. Finally, we compared the performance of our FL-based solution to a centralized training approach. We analyzed similarity and dissimilarity metrics on mobility samples and the contact time of individuals in three different scenarios. Our results indicate that AIC outperforms BIC when choosing the number of communities, although both satisfy the evaluation metrics. We also found that using older samples benefits more complex spatio-temporal scenarios. Finally, no significant losses were detected when compared to a centralized training approach, reinforcing the advantages of using the FL-based method.

识别具有相似行为和流动模式的个人对于改善城市服务功能至关重要。然而,由于这些模式会随着时间的推移而变化,因此需要定期进行识别。此外,一旦移动数据表示了个人的日常行为,就必须保证隐私。在这项工作中,我们提出了一个框架,用于定期检测行为相似的个人并将其归类为社区。为此,我们建立了一个自动编码器模型,定期从原始用户数据中提取时空移动特征。我们使用联盟学习(FL)作为训练方法,以保护隐私并减轻耗时的训练和通信成本。为了确定社区数量而不冒任意数量的风险,我们比较了两种概率方法的选择:阿凯克信息准则(AIC)和贝叶斯信息准则(BIC)。由于社区会定期更新,我们还分析了老化样本对拟议框架的影响。最后,我们比较了基于 FL 的解决方案和集中式训练方法的性能。我们分析了三种不同场景中移动样本和个体接触时间的相似度和不相似度指标。我们的结果表明,在选择社区数量时,AIC 优于 BIC,尽管两者都能满足评估指标。我们还发现,使用较老的样本有利于更复杂的时空场景。最后,与集中式训练方法相比,我们没有发现明显的损失,这加强了使用基于 FL 的方法的优势。
{"title":"Federated Learning assisted framework to periodically identify user communities in urban space","authors":"Cláudio Diego T. de Souza ,&nbsp;José Ferreira de Rezende ,&nbsp;Carlos Alberto V. Campos","doi":"10.1016/j.adhoc.2024.103589","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103589","url":null,"abstract":"<div><p>Identifying individuals with similar behaviors and mobility patterns has become essential to improving the functioning of urban services. However, since these patterns can vary over time, such identification needs to be done periodically. Furthermore, once mobility data expresses the routine of individuals, privacy must be guaranteed. In this work, we propose a framework for periodically detecting and grouping individuals with behavioral similarities into communities. To accomplish this, we built an autoencoder model to extract spatio-temporal mobility features from raw user data at periodic intervals. We used Federated Learning (FL) as a training approach to preserve privacy and alleviate time-consuming training and communication costs. To determine the number of communities without risking an arbitrary number, we compared the choices of two probabilistic methods, the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC). Since the communities are updated periodically, we also analyzed the impact of aged samples on the proposed framework. Finally, we compared the performance of our FL-based solution to a centralized training approach. We analyzed similarity and dissimilarity metrics on mobility samples and the contact time of individuals in three different scenarios. Our results indicate that AIC outperforms BIC when choosing the number of communities, although both satisfy the evaluation metrics. We also found that using older samples benefits more complex spatio-temporal scenarios. Finally, no significant losses were detected when compared to a centralized training approach, reinforcing the advantages of using the FL-based method.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ILLUMINE: Illumination UAVs deployment optimization based on consumer drone ILLUMINE:基于消费级无人机的照明无人机部署优化
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.adhoc.2024.103587
Bo Ma, Yexin Pan, Yong Xu, Zitian Zhang, Chao Chen, Chuanhuang Li

Traditional ground-based illumination equipment is limited in mobility and light source height, making it difficult to adapt to diverse living scenarios such as camping that require quick and flexible illumination solutions. With the rapid development of Unmanned Aerial Vehicle (UAV) technology, particularly in illumination services, UAVs have demonstrated unique advantages. Addressing the inadequacies of conventional illumination, this study proposes a prototype of an autonomously deployed illumination system based on the RoboMaster Tello Talent (Tello) UAV, designed to provide quick and flexible on-site illumination solutions. The system’s design encompasses three complementary modules to enhance its overall functionality and efficiency. Firstly, the illumination module equips the Tello UAV with a specialized illumination extension, ensuring flight stability and effective illumination. Secondly, the addressing module employs iterative algorithms to identify optimal UAV deployment locations and precisely plan flight paths. Lastly, the flight control module, guided by the results from the addressing module, scripts flight commands, integrates with the Tello UAV’s Application Programming Interface (API), and executes flight plans optimized for path efficiency, ensuring the UAV quickly and accurately reaches designated locations, coordinating with the illumination module to deliver effective illumination. Experimental results demonstrate that the proposed illumination system can swiftly respond to various user demands, autonomously deploy UAVs to optimal illumination positions, and provide high-quality service.

传统的地面照明设备在移动性和光源高度方面受到限制,难以适应露营等需要快速灵活照明解决方案的多样化生活场景。随着无人机(UAV)技术的快速发展,尤其是在照明服务方面,无人机已显示出独特的优势。针对传统照明的不足,本研究提出了一种基于 RoboMaster Tello Talent(Tello)无人机的自主部署照明系统原型,旨在提供快速灵活的现场照明解决方案。该系统的设计包括三个互补模块,以增强其整体功能和效率。首先,照明模块为 Tello 无人机配备了专门的照明扩展装置,确保飞行稳定性和有效照明。其次,寻址模块采用迭代算法确定无人机的最佳部署位置,并精确规划飞行路径。最后,飞行控制模块在寻址模块结果的指导下,编写飞行指令脚本,与 Tello 无人机的应用程序接口(API)集成,执行优化路径效率的飞行计划,确保无人机快速、准确地到达指定地点,并与照明模块协调,提供有效的照明。实验结果表明,拟议的照明系统能够迅速响应各种用户需求,自主将无人机部署到最佳照明位置,并提供高质量的服务。
{"title":"ILLUMINE: Illumination UAVs deployment optimization based on consumer drone","authors":"Bo Ma,&nbsp;Yexin Pan,&nbsp;Yong Xu,&nbsp;Zitian Zhang,&nbsp;Chao Chen,&nbsp;Chuanhuang Li","doi":"10.1016/j.adhoc.2024.103587","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103587","url":null,"abstract":"<div><p>Traditional ground-based illumination equipment is limited in mobility and light source height, making it difficult to adapt to diverse living scenarios such as camping that require quick and flexible illumination solutions. With the rapid development of Unmanned Aerial Vehicle (UAV) technology, particularly in illumination services, UAVs have demonstrated unique advantages. Addressing the inadequacies of conventional illumination, this study proposes a prototype of an autonomously deployed illumination system based on the RoboMaster Tello Talent (Tello) UAV, designed to provide quick and flexible on-site illumination solutions. The system’s design encompasses three complementary modules to enhance its overall functionality and efficiency. Firstly, the illumination module equips the Tello UAV with a specialized illumination extension, ensuring flight stability and effective illumination. Secondly, the addressing module employs iterative algorithms to identify optimal UAV deployment locations and precisely plan flight paths. Lastly, the flight control module, guided by the results from the addressing module, scripts flight commands, integrates with the Tello UAV’s Application Programming Interface (API), and executes flight plans optimized for path efficiency, ensuring the UAV quickly and accurately reaches designated locations, coordinating with the illumination module to deliver effective illumination. Experimental results demonstrate that the proposed illumination system can swiftly respond to various user demands, autonomously deploy UAVs to optimal illumination positions, and provide high-quality service.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An innovative multi-agent approach for robust cyber–physical systems using vertical federated learning 利用垂直联合学习的创新多代理方法,实现稳健的网络物理系统
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1016/j.adhoc.2024.103578
Shivani Gaba , Ishan Budhiraja , Vimal Kumar , Sahil Garg , Mohammad Mehedi Hassan

Federated learning presents a compelling approach to training artificial intelligence systems in decentralized settings, prioritizing data safety over traditional centralized training methods. Understanding correlations among higher-level threats exhibiting abnormal behavior in the data stream becomes paramount to developing cyber–physical systems resilient to diverse attacks within a continuous data exchange framework. This work introduces a novel vertical federated multi-agent learning framework to address the challenges of modeling attacker and defender agents in stationary and non-stationary vertical federated learning environments. Our approach uniquely applies synchronous Deep Q-Network (DQN) based agents in stationary environments, facilitating convergence towards optimal strategies. Conversely, in non-stationary contexts, we employ synchronous Advantage Actor–Critic (A2C) based agents, adapting to the dynamic nature of multi-agent vertical federated reinforcement learning (VFRL) environments. This methodology enables us to simulate and analyze the adversarial interplay between attacker and defender agents, ensuring robust policy development. Our exhaustive analysis demonstrates the effectiveness of our approach, showcasing its capability to learn optimal policies in both static and dynamic setups, thus significantly advancing the field of cyber-security in federated learning contexts. To evaluate the effectiveness of our approach, we have done a comparative analysis with its baseline schemes. The findings of our study show significant enhancements compared to the standard methods, confirming the efficacy of our methodology. This progress dramatically enhances the area of cyber-security in the context of federated learning by facilitating the formulation of substantial policies. The proposed scheme attains 15.93%, 32.91%, 31.02%, and 47.26% higher results as compared to the A3C, DDQN, DQN, and Reinforce, respectively.

联合学习是在分散环境中训练人工智能系统的一种引人注目的方法,与传统的集中式训练方法相比,它优先考虑数据安全。要在持续数据交换框架内开发出能抵御各种攻击的网络物理系统,了解数据流中表现出异常行为的高层威胁之间的关联性至关重要。这项工作引入了一个新颖的垂直联合多代理学习框架,以应对在静态和非静态垂直联合学习环境中对攻击者和防御者代理建模的挑战。在静态环境中,我们的方法独特地应用了基于同步深度 Q 网络(DQN)的代理,促进了向最优策略的收敛。相反,在非静态环境中,我们采用基于同步优势行动者批判者(A2C)的代理,以适应多代理垂直联合强化学习(VFRL)环境的动态特性。这种方法使我们能够模拟和分析攻击方和防御方代理之间的对抗性相互作用,确保政策制定的稳健性。我们的详尽分析证明了我们方法的有效性,展示了它在静态和动态设置中学习最优策略的能力,从而极大地推动了联合学习环境下的网络安全领域。为了评估我们方法的有效性,我们对其与基准方案进行了比较分析。我们的研究结果表明,与标准方法相比,我们的方法有了显著提高,证实了我们方法的有效性。这一进展通过促进实质性政策的制定,极大地增强了联合学习背景下的网络安全领域。与 A3C、DDQN、DQN 和 Reinforce 相比,拟议方案分别提高了 15.93%、32.91%、31.02% 和 47.26%。
{"title":"An innovative multi-agent approach for robust cyber–physical systems using vertical federated learning","authors":"Shivani Gaba ,&nbsp;Ishan Budhiraja ,&nbsp;Vimal Kumar ,&nbsp;Sahil Garg ,&nbsp;Mohammad Mehedi Hassan","doi":"10.1016/j.adhoc.2024.103578","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103578","url":null,"abstract":"<div><p>Federated learning presents a compelling approach to training artificial intelligence systems in decentralized settings, prioritizing data safety over traditional centralized training methods. Understanding correlations among higher-level threats exhibiting abnormal behavior in the data stream becomes paramount to developing cyber–physical systems resilient to diverse attacks within a continuous data exchange framework. This work introduces a novel vertical federated multi-agent learning framework to address the challenges of modeling attacker and defender agents in stationary and non-stationary vertical federated learning environments. Our approach uniquely applies synchronous Deep Q-Network (DQN) based agents in stationary environments, facilitating convergence towards optimal strategies. Conversely, in non-stationary contexts, we employ synchronous Advantage Actor–Critic (A2C) based agents, adapting to the dynamic nature of multi-agent vertical federated reinforcement learning (VFRL) environments. This methodology enables us to simulate and analyze the adversarial interplay between attacker and defender agents, ensuring robust policy development. Our exhaustive analysis demonstrates the effectiveness of our approach, showcasing its capability to learn optimal policies in both static and dynamic setups, thus significantly advancing the field of cyber-security in federated learning contexts. To evaluate the effectiveness of our approach, we have done a comparative analysis with its baseline schemes. The findings of our study show significant enhancements compared to the standard methods, confirming the efficacy of our methodology. This progress dramatically enhances the area of cyber-security in the context of federated learning by facilitating the formulation of substantial policies. The proposed scheme attains 15.93%, 32.91%, 31.02%, and 47.26% higher results as compared to the A3C, DDQN, DQN, and Reinforce, respectively.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic deployment of RSUs in urban settings: Optimizing IEEE 802.11p infrastructure 在城市环境中战略性部署 RSU:优化 IEEE 802.11p 基础设施
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-26 DOI: 10.1016/j.adhoc.2024.103585
Juan Pablo Astudillo León , Anthony Busson , Luis J. de la Cruz Llopis , Thomas Begin , Azzedine Boukerche

The efficient deployment of Roadside Units (RSUs) in an infrastructure based on IEEE 802.11p is essential for delivering Internet-based services to vehicles. In this paper, we introduce novel strategies that, in contrast to prior works, exclusively rely on the average vehicular density within specific urban areas, and these strategies depend on a performance model of IEEE 802.11p for guidance and decision-making regarding RSU placement. This minimal upfront information contributes to the practicality and ease of implementation of our strategies. We apply our strategies to three real-world urban scenarios, utilizing the ns-3 and sumo simulators for validation. This study contributes to three fundamental aspects. First, we establish that any efficient deployment of RSUs is closely linked to the unique characteristics of the city under consideration such as the street layout and spatial density of vehicles. In other words, the characteristics of an efficient RSU deployment are unique to each city. Second, we show that the optimal strategy is not to place the RSUs at the locations with the highest traffic density. Instead, with the help of an analytical performance model of IEEE 802.11, we propose a more efficient strategy wherein the location of each RSU is determined to maximize the number of vehicles receiving the target QoS. This can lead to a significant drop in the number of RSUs required to equip a city. Finally, we demonstrate that, by preventing the use of the lowest transmission rate of IEEE 802.11p at each RSU, a collective benefit can be achieved, even though each RSU experiences a shorter radio range.

在基于 IEEE 802.11p 的基础设施中高效部署路侧设备 (RSU),对于向车辆提供基于互联网的服务至关重要。在本文中,我们引入了新颖的策略,与之前的工作不同,这些策略完全依赖于特定城市区域内的平均车辆密度,并且这些策略依赖于 IEEE 802.11p 的性能模型来指导和决策 RSU 的部署。这种最低限度的前期信息有助于提高我们策略的实用性和易实施性。我们利用 ns-3 和 sumo 模拟器进行验证,将我们的策略应用到三个真实世界的城市场景中。这项研究在三个基本方面做出了贡献。首先,我们确定了 RSU 的有效部署与所考虑城市的独特特征(如街道布局和车辆空间密度)密切相关。换句话说,有效部署 RSU 的特征是每个城市独有的。其次,我们表明,最佳策略并不是将 RSU 部署在交通密度最高的地点。相反,在 IEEE 802.11 性能分析模型的帮助下,我们提出了一种更有效的策略,即确定每个 RSU 的位置,使获得目标服务质量的车辆数量最大化。这将大大减少一个城市所需的 RSU 数量。最后,我们证明,通过防止每个 RSU 使用 IEEE 802.11p 的最低传输速率,即使每个 RSU 的射程较短,也能实现集体利益。
{"title":"Strategic deployment of RSUs in urban settings: Optimizing IEEE 802.11p infrastructure","authors":"Juan Pablo Astudillo León ,&nbsp;Anthony Busson ,&nbsp;Luis J. de la Cruz Llopis ,&nbsp;Thomas Begin ,&nbsp;Azzedine Boukerche","doi":"10.1016/j.adhoc.2024.103585","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103585","url":null,"abstract":"<div><p>The efficient deployment of Roadside Units (RSUs) in an infrastructure based on IEEE 802.11p is essential for delivering Internet-based services to vehicles. In this paper, we introduce novel strategies that, in contrast to prior works, exclusively rely on the average vehicular density within specific urban areas, and these strategies depend on a performance model of IEEE 802.11p for guidance and decision-making regarding RSU placement. This minimal upfront information contributes to the practicality and ease of implementation of our strategies. We apply our strategies to three real-world urban scenarios, utilizing the ns-3 and <span>sumo</span> simulators for validation. This study contributes to three fundamental aspects. First, we establish that any efficient deployment of RSUs is closely linked to the unique characteristics of the city under consideration such as the street layout and spatial density of vehicles. In other words, the characteristics of an efficient RSU deployment are unique to each city. Second, we show that the optimal strategy is not to place the RSUs at the locations with the highest traffic density. Instead, with the help of an analytical performance model of IEEE 802.11, we propose a more efficient strategy wherein the location of each RSU is determined to maximize the number of vehicles receiving the target QoS. This can lead to a significant drop in the number of RSUs required to equip a city. Finally, we demonstrate that, by preventing the use of the lowest transmission rate of IEEE 802.11p at each RSU, a collective benefit can be achieved, even though each RSU experiences a shorter radio range.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141486944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous data sharing scheme for resource-constrained internet of things environments 针对资源有限的物联网环境的匿名数据共享方案
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-25 DOI: 10.1016/j.adhoc.2024.103588
Zetian Zhang , Jingyu Wang , Lixin Liu , Yongfeng Li , Yun Hao , Hanqing Yang

With the rapid development of Internet of Things (IoT) technology in industrial, agricultural, medical and other fields, IoT terminal devices face security and privacy challenges when sharing data. Among them, ensuring data confidentiality, achieving dual-side privacy protection, and performing reliable data integrity verification are basic requirements. Especially in resource-constrained environments, limitations in the storage, computing, and communication capabilities of devices increase the difficulty of implementing these security safeguards. To address this problem, this paper proposes a resource-constrained anonymous data-sharing scheme (ADS-RC) for the IoT. In ADS-RC, we use elliptic curve operations to replace computation-intensive bilinear pairing operations, thereby reducing the computational and communication burden on end devices. We combine an anonymous verifiable algorithm and an attribute encryption algorithm to ensure double anonymity and data confidentiality during the data-sharing process. To deal with potential dishonest behavior, this solution supports the revocation of malicious user permissions. In addition, we designed a batch data integrity verification algorithm and stored verification evidence on the blockchain to ensure the security and traceability of data during transmission and storage. Through experimental verification, the ADS-RC scheme achieves reasonable efficiency in correctness, security and efficiency, providing a new solution for data sharing in resource-constrained IoT environments.

随着物联网(IoT)技术在工业、农业、医疗等领域的快速发展,物联网终端设备在共享数据时面临着安全和隐私方面的挑战。其中,确保数据保密性、实现双侧隐私保护以及执行可靠的数据完整性验证是基本要求。特别是在资源有限的环境中,设备在存储、计算和通信能力方面的限制增加了实施这些安全保障措施的难度。为解决这一问题,本文提出了一种适用于物联网的资源受限匿名数据共享方案(ADS-RC)。在 ADS-RC 中,我们使用椭圆曲线运算取代计算密集型的双线性配对运算,从而减轻了终端设备的计算和通信负担。我们结合了匿名可验证算法和属性加密算法,以确保数据共享过程中的双重匿名性和数据保密性。为应对潜在的不诚实行为,该解决方案支持撤销恶意用户权限。此外,我们还设计了批量数据完整性验证算法,并将验证证据存储在区块链上,以确保数据在传输和存储过程中的安全性和可追溯性。通过实验验证,ADS-RC 方案在正确性、安全性和效率方面都达到了合理的效率,为资源受限的物联网环境下的数据共享提供了一种新的解决方案。
{"title":"Anonymous data sharing scheme for resource-constrained internet of things environments","authors":"Zetian Zhang ,&nbsp;Jingyu Wang ,&nbsp;Lixin Liu ,&nbsp;Yongfeng Li ,&nbsp;Yun Hao ,&nbsp;Hanqing Yang","doi":"10.1016/j.adhoc.2024.103588","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103588","url":null,"abstract":"<div><p>With the rapid development of Internet of Things (IoT) technology in industrial, agricultural, medical and other fields, IoT terminal devices face security and privacy challenges when sharing data. Among them, ensuring data confidentiality, achieving dual-side privacy protection, and performing reliable data integrity verification are basic requirements. Especially in resource-constrained environments, limitations in the storage, computing, and communication capabilities of devices increase the difficulty of implementing these security safeguards. To address this problem, this paper proposes a resource-constrained anonymous data-sharing scheme (ADS-RC) for the IoT. In ADS-RC, we use elliptic curve operations to replace computation-intensive bilinear pairing operations, thereby reducing the computational and communication burden on end devices. We combine an anonymous verifiable algorithm and an attribute encryption algorithm to ensure double anonymity and data confidentiality during the data-sharing process. To deal with potential dishonest behavior, this solution supports the revocation of malicious user permissions. In addition, we designed a batch data integrity verification algorithm and stored verification evidence on the blockchain to ensure the security and traceability of data during transmission and storage. Through experimental verification, the ADS-RC scheme achieves reasonable efficiency in correctness, security and efficiency, providing a new solution for data sharing in resource-constrained IoT environments.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141539962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing longevity: Sustainable channel modeling for wireless-powered implantable BANs 延长使用寿命:无线供电植入式 BAN 的可持续信道建模
IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-25 DOI: 10.1016/j.adhoc.2024.103584
Sameeksha Chaudhary , Anirudh Agarwal , Deepak Mishra , Santosh Shah

Wireless body area network (WBAN) has revolutionized the healthcare sector by enabling remote monitoring and control of wearable and implantable devices, providing freedom of mobility to patients. However, wireless channel modeling in BAN is a crucial aspect for designing an efficient off-body, on-body and in-body communication. Due to the unique characteristics of the human body, it aims to characterize the signal propagation through skin, tissues, internal organs and biological fluids of a patient’s body. Moreover, it is important to enhance the battery life of the low-powered devices for a sustainable BAN. In this work, we provide a hybrid communication channel model for wireless power transfer in a BAN including both off-body and in-body communication channels. An indoor room scenario is considered in which a movable patient having an implant inside its body is present along with an RF power source (for example, a Wi-Fi access point) situated in a ceiling corner. Implant is assumed to inhibit energy harvesting capability. For practicability, we have considered the effect of path loss, partition walls, floor attenuation factor along with other important body parameters. Specifically, we aim to statistically characterize this hybrid communication system, for which unique closed-form expressions of the probability distribution functions of the received power have been derived, thereby first calculating the instantaneous power at different layers of human body and then obtaining the closed-form expression for average received power. All the derived mathematical expressions have been verified via numerical simulations. Further, for elongating the lifespan of implants, we investigated the average power harvested by an implant and its power outage probability for analyzing the sustainability of implants. The results are numerically validated, considering different types of indoor room scenarios, in addition to providing key design insights.

无线体域网(WBAN)实现了对可穿戴和植入式设备的远程监测和控制,为患者提供了移动自由,从而给医疗保健领域带来了革命性的变化。然而,无线体域网中的无线信道建模是设计高效的体外、体内和体内通信的关键环节。由于人体的独特特性,其目的是描述信号通过患者身体的皮肤、组织、内脏和生物液体传播的特征。此外,提高低功率设备的电池寿命对于实现可持续的 BAN 也很重要。在这项工作中,我们为 BAN 中的无线电力传输提供了一种混合通信信道模型,包括体外和体内通信信道。我们考虑了一个室内房间场景,在这个场景中,一个体内植入了植入物的可移动病人和一个位于天花板角落的射频电源(例如 Wi-Fi 接入点)同时存在。假定植入物会抑制能量收集能力。为了切实可行,我们考虑了路径损耗、隔墙、地板衰减系数以及其他重要人体参数的影响。具体来说,我们旨在从统计学角度描述这种混合通信系统,并为此推导出接收功率概率分布函数的独特闭式表达式,从而首先计算人体不同层的瞬时功率,然后获得平均接收功率的闭式表达式。所有推导出的数学表达式都已通过数值模拟得到验证。此外,为了延长植入物的使用寿命,我们还研究了植入物的平均接收功率及其断电概率,以分析植入物的可持续性。考虑到不同类型的室内空间场景,我们对结果进行了数值验证,并提供了关键的设计见解。
{"title":"Enhancing longevity: Sustainable channel modeling for wireless-powered implantable BANs","authors":"Sameeksha Chaudhary ,&nbsp;Anirudh Agarwal ,&nbsp;Deepak Mishra ,&nbsp;Santosh Shah","doi":"10.1016/j.adhoc.2024.103584","DOIUrl":"https://doi.org/10.1016/j.adhoc.2024.103584","url":null,"abstract":"<div><p>Wireless body area network (WBAN) has revolutionized the healthcare sector by enabling remote monitoring and control of wearable and implantable devices, providing freedom of mobility to patients. However, wireless channel modeling in BAN is a crucial aspect for designing an efficient off-body, on-body and in-body communication. Due to the unique characteristics of the human body, it aims to characterize the signal propagation through skin, tissues, internal organs and biological fluids of a patient’s body. Moreover, it is important to enhance the battery life of the low-powered devices for a sustainable BAN. In this work, we provide a hybrid communication channel model for wireless power transfer in a BAN including both off-body and in-body communication channels. An indoor room scenario is considered in which a movable patient having an implant inside its body is present along with an RF power source (for example, a Wi-Fi access point) situated in a ceiling corner. Implant is assumed to inhibit energy harvesting capability. For practicability, we have considered the effect of path loss, partition walls, floor attenuation factor along with other important body parameters. Specifically, we aim to statistically characterize this hybrid communication system, for which unique closed-form expressions of the probability distribution functions of the received power have been derived, thereby first calculating the instantaneous power at different layers of human body and then obtaining the closed-form expression for average received power. All the derived mathematical expressions have been verified via numerical simulations. Further, for elongating the lifespan of implants, we investigated the average power harvested by an implant and its power outage probability for analyzing the sustainability of implants. The results are numerically validated, considering different types of indoor room scenarios, in addition to providing key design insights.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141486943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Ad Hoc Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1