首页 > 最新文献

IEEE journal on selected areas in communications : a publication of the IEEE Communications Society最新文献

英文 中文
Enhancing Federated Feature Selection Through Synthetic Data and Zero Trust Integration 通过合成数据和零信任集成加强联合特征选择
Nisha Thorakkattu Madathil;Saed Alrabaee;Abdelkader Nasreddine Belkacem
Federated Learning (FL) allows healthcare organizations to train models using diverse datasets while maintaining patient confidentiality collaboratively. While promising, FL faces challenges in optimizing model accuracy and communication efficiency. To address these, we propose an algorithm that combines feature selection with synthetic data generation, specifically targeting medical datasets. Our method eliminates irrelevant local features, identifies globally relevant ones, and uses synthetic data to initialize model parameters, improving convergence. It also employs a zero-trust model, ensuring that data remain on local devices and only learned weights are shared with the central server, enhancing security. The algorithm improves accuracy and computational efficiency, achieving communication efficiency gains of 4 to 14 through backward elimination and threshold variation techniques. Tested on a federated diabetic dataset, the approach demonstrates significant improvements in the performance and trustworthiness of FL systems for medical applications.
联邦学习(FL)允许医疗保健组织使用不同的数据集训练模型,同时协作维护患者的机密性。虽然前途光明,但FL在优化模型精度和通信效率方面面临挑战。为了解决这些问题,我们提出了一种将特征选择与合成数据生成相结合的算法,特别是针对医疗数据集。该方法消除不相关的局部特征,识别全局相关特征,并使用合成数据初始化模型参数,提高了收敛性。它还采用了零信任模型,确保数据保留在本地设备上,只与中央服务器共享学习过的权重,从而增强了安全性。该算法通过反向消去和阈值变化技术提高了精度和计算效率,通信效率提高了4 ~ 14倍。在联邦糖尿病数据集上进行的测试表明,该方法在医疗应用的FL系统的性能和可信度方面有了显着改善。
{"title":"Enhancing Federated Feature Selection Through Synthetic Data and Zero Trust Integration","authors":"Nisha Thorakkattu Madathil;Saed Alrabaee;Abdelkader Nasreddine Belkacem","doi":"10.1109/JSAC.2025.3560037","DOIUrl":"10.1109/JSAC.2025.3560037","url":null,"abstract":"Federated Learning (FL) allows healthcare organizations to train models using diverse datasets while maintaining patient confidentiality collaboratively. While promising, FL faces challenges in optimizing model accuracy and communication efficiency. To address these, we propose an algorithm that combines feature selection with synthetic data generation, specifically targeting medical datasets. Our method eliminates irrelevant local features, identifies globally relevant ones, and uses synthetic data to initialize model parameters, improving convergence. It also employs a zero-trust model, ensuring that data remain on local devices and only learned weights are shared with the central server, enhancing security. The algorithm improves accuracy and computational efficiency, achieving communication efficiency gains of 4 to 14 through backward elimination and threshold variation techniques. Tested on a federated diabetic dataset, the approach demonstrates significant improvements in the performance and trustworthiness of FL systems for medical applications.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2126-2140"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary Intrusion Detection Strategy Under Zero Trust Architecture 零信任架构下的进化入侵检测策略
Bin Cao;Xianrui Zhao;Zhihan Lyu
In today’s increasingly complex and dynamic cyber threat environment, Zero Trust Architecture (ZTA) has emerged as a promising solution to address the limitations of traditional intrusion detection methods. While Intrusion Detection Systems (IDS) are essential for safeguarding organizational information assets, traditional methods have the risk of exposing security policies by collecting and utilizing alarm data, potentially revealing attack paths to adversaries. To overcome this challenge, we propose a novel intrusion detection strategy based on ZTA, emphasizing the protection of alarm data privacy. Additionally, we introduce an adaptive sparse connective evolutionary neural architecture search (ASCE-NAS) framework, which enables the automatic evolution of intrusion detection model structures to enhance adaptability and performance in dynamic environments. Notably, ASCE-NAS can also be beneficial for integrated sensing and computing chips and systems, contributing to a more secure and efficient cybersecurity framework to effectively combat evolving threats and attack methods.
在当今日益复杂和动态的网络威胁环境中,零信任架构(ZTA)已成为解决传统入侵检测方法局限性的一种有前途的解决方案。虽然入侵检测系统(IDS)对于保护组织信息资产至关重要,但传统方法存在通过收集和利用报警数据暴露安全策略的风险,可能会向对手泄露攻击路径。为了克服这一挑战,我们提出了一种新的基于ZTA的入侵检测策略,强调对报警数据隐私的保护。此外,我们还引入了一种自适应稀疏连接进化神经结构搜索(ASCE-NAS)框架,使入侵检测模型结构能够自动进化,以提高在动态环境中的适应性和性能。值得注意的是,ASCE-NAS也有利于集成传感和计算芯片和系统,有助于建立更安全和高效的网络安全框架,以有效地应对不断变化的威胁和攻击方法。
{"title":"Evolutionary Intrusion Detection Strategy Under Zero Trust Architecture","authors":"Bin Cao;Xianrui Zhao;Zhihan Lyu","doi":"10.1109/JSAC.2025.3560001","DOIUrl":"10.1109/JSAC.2025.3560001","url":null,"abstract":"In today’s increasingly complex and dynamic cyber threat environment, Zero Trust Architecture (ZTA) has emerged as a promising solution to address the limitations of traditional intrusion detection methods. While Intrusion Detection Systems (IDS) are essential for safeguarding organizational information assets, traditional methods have the risk of exposing security policies by collecting and utilizing alarm data, potentially revealing attack paths to adversaries. To overcome this challenge, we propose a novel intrusion detection strategy based on ZTA, emphasizing the protection of alarm data privacy. Additionally, we introduce an adaptive sparse connective evolutionary neural architecture search (ASCE-NAS) framework, which enables the automatic evolution of intrusion detection model structures to enhance adaptability and performance in dynamic environments. Notably, ASCE-NAS can also be beneficial for integrated sensing and computing chips and systems, contributing to a more secure and efficient cybersecurity framework to effectively combat evolving threats and attack methods.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2100-2112"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Receiver-Agnostic Radio Frequency Fingerprint Identification for Zero-Trust Wireless Networks 零信任无线网络中与接收机无关的射频指纹识别
Kunling Li;Jiazhong Bao;Xin Xie;Jianan Hong;Cunqing Hua
Zero-trust has emerged as a promising security paradigm for next-generation networks (NGN). However, conventional cryptographic schemes struggle with continuous and dynamic authentication due to their coarse granularity and cumbersome processes. Radio frequency fingerprint identification (RFFI), as a prospective solution, enables physical-layer user-transparent identity authentication. Whereas, facing the dynamic topology and device mobility of NGN, such as Internet of Vehicles (IoV), Drone networks, etc., there exists a current deficiency in addressing the significant performance degradation across different receivers. In this paper, we propose a novel RFFI scheme for zero-trust continuous authentication in dynamic NGN environments, enabling unified high-performance cross-receiver identification. A two-stage unsupervised domain adaptation model is designed to extract receiver-independent transmitter-specific features. The receiver-side impact on RFFI, modeled as domain shift, is addressed through adversarial training for global alignment and local maximum mean discrepancy (LMMD)-based subdomain adaptation for eliminating subdomain confusion. Moreover, we further optimize RFFI through data augmentation to enhance robustness, multi-sample fusion inference to handle dynamic uncertainties, and an adaptive few-sample selection strategy for efficient fine-tuning. Extensive experiments on public datasets demonstrate the excellent performance of our proposed scheme in cross-receiver zero-trust wireless networks.
零信任已成为下一代网络(NGN)的一种有前途的安全范例。然而,传统的加密方案由于其粗粒度和繁琐的过程而难以进行连续和动态认证。射频指纹识别(RFFI)作为一种有前景的解决方案,可以实现物理层用户透明的身份认证。然而,面对下一代网络的动态拓扑和设备移动性,如车联网(IoV)、无人机网络等,目前在解决不同接收器之间的显著性能下降方面存在不足。在本文中,我们提出了一种新的RFFI方案,用于动态NGN环境下的零信任连续认证,实现统一的高性能跨接收方识别。设计了一种两阶段无监督域自适应模型,用于提取与接收机无关的发射机特定特征。接收方对RFFI的影响,建模为域移位,通过对抗性训练来解决全局对齐和基于局部最大平均差异(LMMD)的子域自适应,以消除子域混淆。此外,我们进一步优化RFFI通过数据增强来增强鲁棒性,多样本融合推理来处理动态不确定性,以及自适应的少样本选择策略来进行有效的微调。在公共数据集上的大量实验证明了我们提出的方案在跨接收者零信任无线网络中的优异性能。
{"title":"Receiver-Agnostic Radio Frequency Fingerprint Identification for Zero-Trust Wireless Networks","authors":"Kunling Li;Jiazhong Bao;Xin Xie;Jianan Hong;Cunqing Hua","doi":"10.1109/JSAC.2025.3560002","DOIUrl":"10.1109/JSAC.2025.3560002","url":null,"abstract":"Zero-trust has emerged as a promising security paradigm for next-generation networks (NGN). However, conventional cryptographic schemes struggle with continuous and dynamic authentication due to their coarse granularity and cumbersome processes. Radio frequency fingerprint identification (RFFI), as a prospective solution, enables physical-layer user-transparent identity authentication. Whereas, facing the dynamic topology and device mobility of NGN, such as Internet of Vehicles (IoV), Drone networks, etc., there exists a current deficiency in addressing the significant performance degradation across different receivers. In this paper, we propose a novel RFFI scheme for zero-trust continuous authentication in dynamic NGN environments, enabling unified high-performance cross-receiver identification. A two-stage unsupervised domain adaptation model is designed to extract receiver-independent transmitter-specific features. The receiver-side impact on RFFI, modeled as domain shift, is addressed through adversarial training for global alignment and local maximum mean discrepancy (LMMD)-based subdomain adaptation for eliminating subdomain confusion. Moreover, we further optimize RFFI through data augmentation to enhance robustness, multi-sample fusion inference to handle dynamic uncertainties, and an adaptive few-sample selection strategy for efficient fine-tuning. Extensive experiments on public datasets demonstrate the excellent performance of our proposed scheme in cross-receiver zero-trust wireless networks.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"1981-1997"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enabled Secure, Fair, and Scalable Data Sharing in Zero-Trust Edge-End Environment 零信任边缘环境下区块链支持的安全、公平和可扩展的数据共享
Xiaolong Xu;Ke Meng;Haolong Xiang;Guangming Cui;Xiaoyu Xia;Wanchun Dou
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as frequent data breaches, data misuse, and cyberattacks. However, due to the complexity and diversity of edge environments, ZTSM struggles to meet the security requirements of data sharing frameworks solely through enhanced authentication. Consequently, such frameworks with ZTSM still face challenges in ensuring data integrity, evaluating various node behaviors, and coping with the increasing complexity of node attributes. To address these issues, we propose a blockchain-enabled secure, fair and scalable data sharing framework in a zero-trust edge-end environment in this paper. Specifically, we first propose a Merkle forest-based data storage model for the classified storage of loosely coupled data, consequently enhancing the scalability of the model. Then, we design a node behavior-based reputation assessment mechanism to ensure fairness during data sharing. Moreover, a data sharing protocol supervised by smart contract is proposed, working with the aforementioned storage and assessment schemes, to ensure the security of data sharing. Finally, comprehensive security analysis validates the security, fairness and scalability of the proposed framework. Extensive experimental results show that, as transaction volume grows, the time cost of data traversal in the storage model becomes progressively more efficient. Additionally, when the size of the smart contract is increased tenfold, the maximum time cost of the data sharing protocol rises by only 4.98 times.
在边缘计算中,零信任安全模型(Zero-Trust Security Model, ZTSM)作为下一代网络的关键使能技术,在为解决数据共享问题(如频繁的数据泄露、数据滥用和网络攻击)提供认证方面发挥着至关重要的作用。然而,由于边缘环境的复杂性和多样性,仅通过增强的身份验证,ZTSM很难满足数据共享框架的安全需求。因此,这种带有ZTSM的框架在确保数据完整性、评估各种节点行为以及应对节点属性日益复杂等方面仍然面临挑战。为了解决这些问题,我们在本文中提出了一个零信任边缘环境中支持区块链的安全,公平和可扩展的数据共享框架。具体来说,我们首先提出了一种基于Merkle森林的数据存储模型,用于松散耦合数据的分类存储,从而增强了模型的可扩展性。然后,我们设计了一个基于节点行为的信誉评估机制,以确保数据共享过程中的公平性。提出了一种由智能合约监督的数据共享协议,配合上述存储和评估方案,确保数据共享的安全性。最后,综合安全性分析验证了所提框架的安全性、公平性和可扩展性。大量的实验结果表明,随着交易量的增长,存储模型中数据遍历的时间成本变得越来越高效。此外,当智能合约的规模增加10倍时,数据共享协议的最大时间成本仅增加4.98倍。
{"title":"Blockchain-Enabled Secure, Fair, and Scalable Data Sharing in Zero-Trust Edge-End Environment","authors":"Xiaolong Xu;Ke Meng;Haolong Xiang;Guangming Cui;Xiaoyu Xia;Wanchun Dou","doi":"10.1109/JSAC.2025.3560007","DOIUrl":"10.1109/JSAC.2025.3560007","url":null,"abstract":"In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as frequent data breaches, data misuse, and cyberattacks. However, due to the complexity and diversity of edge environments, ZTSM struggles to meet the security requirements of data sharing frameworks solely through enhanced authentication. Consequently, such frameworks with ZTSM still face challenges in ensuring data integrity, evaluating various node behaviors, and coping with the increasing complexity of node attributes. To address these issues, we propose a blockchain-enabled secure, fair and scalable data sharing framework in a zero-trust edge-end environment in this paper. Specifically, we first propose a Merkle forest-based data storage model for the classified storage of loosely coupled data, consequently enhancing the scalability of the model. Then, we design a node behavior-based reputation assessment mechanism to ensure fairness during data sharing. Moreover, a data sharing protocol supervised by smart contract is proposed, working with the aforementioned storage and assessment schemes, to ensure the security of data sharing. Finally, comprehensive security analysis validates the security, fairness and scalability of the proposed framework. Extensive experimental results show that, as transaction volume grows, the time cost of data traversal in the storage model becomes progressively more efficient. Additionally, when the size of the smart contract is increased tenfold, the maximum time cost of the data sharing protocol rises by only 4.98 times.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2056-2069"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Within Security: Attack Detection Model With Defenses Against Attacks Capability for Zero-Trust Networks 安全中的安全:零信任网络中具有防御攻击能力的攻击检测模型
Tingting Wang;Kai Fang;Jijing Cai;Lina Wang;Jinyu Tian;Hailin Feng;Jianqing Li;Mohsen Guizani;Wei Wang
Traditional traffic anomaly-based attack detection methods in Zero-trust Networks (ZTN) suffer from inherent security vulnerabilities, as they neglect considerations regarding their security defenses. Compromising the attack detection model itself can result in the breakdown of normal attack detection capabilities. Ensuring the security of the attack detection model during runtime presents a novel challenge. To address these shortcomings, we propose a novel attack detection model, termed Security within Security: Attack Detection Model with Defenses Against Attacks Capability for Zero-Trust Networks (SWS), aimed at enhancing the security of ZTN. SWS focuses on achieving attack detection in non-secure detection environments, to maintain its detection capability even when under attack. By employing a soft thresholding method, SWS adapts to the dynamic changes in network traffic, thus reducing the interference of attack signals. The incorporation of an attention mechanism enables SWS to concentrate on analyzing the most indicative traffic features of attack behavior. Additionally, we integrate Residual Networks (ResNet) and Bidirectional Long Short-Term Memory (BiLSTM) to enhance the robustness of identifying complex network attack behaviors. The effectiveness of the SWS is validated through ablation studies, model comparisons, experiments conducted over different training epochs, and experiments conducted on various components of the dataset. Experimental results demonstrate that compared to existing attack detection models, SWS achieves improvements in detection accuracy and recall rate by 13.4% and 10.6%, respectively, while reducing the False Positive Rate (FPR) by 16.9%.
传统的基于流量异常的攻击检测方法在零信任网络(Zero-trust Networks,简称ZTN)中存在固有的安全漏洞,忽略了对自身安全防御的考虑。破坏攻击检测模型本身可能导致正常攻击检测功能的崩溃。确保攻击检测模型在运行时的安全性是一个新的挑战。为了解决这些缺点,我们提出了一种新的攻击检测模型,称为安全中的安全:具有零信任网络(SWS)攻击防御能力的攻击检测模型,旨在提高ZTN的安全性。SWS专注于在非安全的检测环境中实现攻击检测,即使受到攻击也能保持检测能力。SWS采用软阈值方法,能够适应网络流量的动态变化,从而减少攻击信号的干扰。注意机制的结合使SWS能够集中精力分析攻击行为中最具指示性的流量特征。此外,我们整合了残余网络(ResNet)和双向长短期记忆(BiLSTM),以增强识别复杂网络攻击行为的鲁棒性。通过消融研究、模型比较、在不同训练时期进行的实验以及在数据集的不同组成部分进行的实验,验证了SWS的有效性。实验结果表明,与现有的攻击检测模型相比,SWS的检测准确率和召回率分别提高了13.4%和10.6%,误报率(False Positive rate, FPR)降低了16.9%。
{"title":"Security Within Security: Attack Detection Model With Defenses Against Attacks Capability for Zero-Trust Networks","authors":"Tingting Wang;Kai Fang;Jijing Cai;Lina Wang;Jinyu Tian;Hailin Feng;Jianqing Li;Mohsen Guizani;Wei Wang","doi":"10.1109/JSAC.2025.3560011","DOIUrl":"10.1109/JSAC.2025.3560011","url":null,"abstract":"Traditional traffic anomaly-based attack detection methods in Zero-trust Networks (ZTN) suffer from inherent security vulnerabilities, as they neglect considerations regarding their security defenses. Compromising the attack detection model itself can result in the breakdown of normal attack detection capabilities. Ensuring the security of the attack detection model during runtime presents a novel challenge. To address these shortcomings, we propose a novel attack detection model, termed Security within Security: Attack Detection Model with Defenses Against Attacks Capability for Zero-Trust Networks (SWS), aimed at enhancing the security of ZTN. SWS focuses on achieving attack detection in non-secure detection environments, to maintain its detection capability even when under attack. By employing a soft thresholding method, SWS adapts to the dynamic changes in network traffic, thus reducing the interference of attack signals. The incorporation of an attention mechanism enables SWS to concentrate on analyzing the most indicative traffic features of attack behavior. Additionally, we integrate Residual Networks (ResNet) and Bidirectional Long Short-Term Memory (BiLSTM) to enhance the robustness of identifying complex network attack behaviors. The effectiveness of the SWS is validated through ablation studies, model comparisons, experiments conducted over different training epochs, and experiments conducted on various components of the dataset. Experimental results demonstrate that compared to existing attack detection models, SWS achieves improvements in detection accuracy and recall rate by 13.4% and 10.6%, respectively, while reducing the False Positive Rate (FPR) by 16.9%.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2312-2327"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143898247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Federated Learning-Based Zero-Trust Model With Secure Dynamic Trust Evaluation and Knowledge Transfer 基于联邦学习的安全动态信任评估和知识转移零信任模型
Le Sun;Shunqi Liu;Zhiguo Qu;Yanchun Zhang
In next-generation networks, the increasing diversity of devices and connections, explosive data growth, and complex network threats render traditional security measures inadequate. This calls for robust, adaptive security frameworks. Zero-trust security offers robust protection through continuous verification and strict access control, while federated learning enhances data privacy and resource efficiency. Integrating these two approaches creates a resilient, adaptive, and secure network environment, meeting the intricate demands of future communication systems. In this paper, we propose FedKCSS—a Federated Learning-based zero-trust model combining Knowledge Distillation (KD) and Client Selection Strategy (CSS). FedKCSS comprises three components: Optimized Client Selection Strategy (OptCSS), Auxiliary Generator Training (AGT), and Data-free Federated Distillation (DfFD). In OptCSS, we design a dynamic trust evaluation method that continuously evaluates and adjusts client selection to enhance defense against untrusted clients. AGT involves designing a generator by using local model logits for data synthesis. DfFD is a data-free KD method that facilitates global-local model knowledge transfer, and lowering client information leakage risk without local data reliance. Experiments show that FedKCSS effectively minimizes malicious client participation in global training through dynamic trust evaluation, and improves the convergence rate by $mathbf {8.85%}$ and the accuracy by $mathbf {7.09%}$ compared with existing methods.
在新一代网络中,设备和连接的日益多样化、数据的爆炸式增长、网络威胁的复杂化,使得传统的安全措施难以满足需求。这就需要健壮的、自适应的安全框架。零信任安全通过持续验证和严格的访问控制提供了强大的保护,而联邦学习增强了数据隐私和资源效率。集成这两种方法可以创建一个有弹性、自适应和安全的网络环境,满足未来通信系统的复杂需求。本文提出了一种结合知识蒸馏(KD)和客户端选择策略(CSS)的基于联邦学习的零信任模型fedkcss。FedKCSS包括三个部分:优化客户端选择策略(OptCSS),辅助发电机培训(AGT)和无数据联邦蒸馏(DfFD)。在OptCSS中,我们设计了一种动态信任评估方法,持续评估和调整客户端选择,以增强对不可信客户端的防御。AGT包括通过使用局部模型逻辑来设计一个生成器来进行数据合成。DfFD是一种无数据的KD方法,有利于全局-局部模型知识转移,降低客户端信息泄露风险,无需依赖局部数据。实验表明,FedKCSS通过动态信任评估有效地减少了恶意客户端参与全局训练,与现有方法相比,收敛率提高$mathbf{8.85%}$,准确率提高$mathbf{7.09%}$。
{"title":"A Federated Learning-Based Zero-Trust Model With Secure Dynamic Trust Evaluation and Knowledge Transfer","authors":"Le Sun;Shunqi Liu;Zhiguo Qu;Yanchun Zhang","doi":"10.1109/JSAC.2025.3560041","DOIUrl":"10.1109/JSAC.2025.3560041","url":null,"abstract":"In next-generation networks, the increasing diversity of devices and connections, explosive data growth, and complex network threats render traditional security measures inadequate. This calls for robust, adaptive security frameworks. Zero-trust security offers robust protection through continuous verification and strict access control, while federated learning enhances data privacy and resource efficiency. Integrating these two approaches creates a resilient, adaptive, and secure network environment, meeting the intricate demands of future communication systems. In this paper, we propose FedKCSS—a Federated Learning-based zero-trust model combining Knowledge Distillation (KD) and Client Selection Strategy (CSS). FedKCSS comprises three components: Optimized Client Selection Strategy (OptCSS), Auxiliary Generator Training (AGT), and Data-free Federated Distillation (DfFD). In OptCSS, we design a dynamic trust evaluation method that continuously evaluates and adjusts client selection to enhance defense against untrusted clients. AGT involves designing a generator by using local model logits for data synthesis. DfFD is a data-free KD method that facilitates global-local model knowledge transfer, and lowering client information leakage risk without local data reliance. Experiments show that FedKCSS effectively minimizes malicious client participation in global training through dynamic trust evaluation, and improves the convergence rate by <inline-formula> <tex-math>$mathbf {8.85%}$ </tex-math></inline-formula> and the accuracy by <inline-formula> <tex-math>$mathbf {7.09%}$ </tex-math></inline-formula> compared with existing methods.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2087-2099"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Enabled Cold Start Aggregation Scheme for Federated Reinforcement Learning-Based Task Offloading in Zero Trust LEO Satellite Networks 零信任LEO卫星网络中基于联邦强化学习的冷启动聚合方案
Bomin Mao;Yangbo Liu;Zixiang Wei;Hongzhi Guo;Yijie Xun;Jiadai Wang;Jiajia Liu;Nei Kato
The development of 6G enable users in remote and harsh areas to enjoy computation-intensive services including metaverse entertainment, intelligent transportation, and immersive communications. Low Earth Orbit (LEO) satellite constellations widely constructed in recent years have been recognized as an efficient solution to complement the terrestrial infrastructure with seamless coverage and decreasing expenses for both communication and computation services. However, the widely studied Federated Reinforcement Learning (FRL) based task offloading strategies neglect the potential trust concerns like malicious satellites and buffer pollution, while 6G service providers may rent the LEO satellites belonging to different companies to minimize the expense. To address these issues, blockchain has been considered in the Zero Trust (ZT) scenario, with the group consensus mechanism through the smart contract. Moreover, we propose a Constrained Correction Voting Mechanism (CCVM) to give punishing correction to the aggregation weight of malicious voting satellites. Furthermore, a Cold Start Reputation Aggregation (CSRA) scheme is adopted to first severely degrade and then gradually recover the weight of Federated Learning (FL) sub-models trained by malicious satellites. Thus, the Blockchain-enabled Cold Start Aggregation FRL (BCSA-FRL) scheme is proposed to make effective and secure offloading decisions in the ZT LEO satellite Networks. The numerical results illustrate the advantages of our proposal.
6G的发展使偏远和恶劣地区的用户能够享受到超宇宙娱乐、智能交通、沉浸式通信等计算密集型服务。近年来广泛建设的低地球轨道卫星星座已被认为是一种有效的解决方案,可以无缝覆盖地面基础设施,并降低通信和计算服务的费用。然而,广泛研究的基于联邦强化学习(FRL)的任务卸载策略忽略了潜在的信任问题,如恶意卫星和缓冲区污染,而6G服务提供商可能会租用属于不同公司的LEO卫星,以尽量减少费用。为了解决这些问题,在零信任(ZT)场景中考虑了区块链,通过智能合约采用群体共识机制。此外,我们提出了一种约束修正投票机制(CCVM),对恶意投票卫星的聚合权值进行惩罚性修正。此外,采用冷启动信誉聚合(CSRA)方案,对恶意卫星训练的联邦学习(FL)子模型先进行严重降级,然后逐步恢复权重。因此,提出了基于区块链的冷启动聚合FRL (BCSA-FRL)方案,以便在ZT LEO卫星网络中做出有效和安全的卸载决策。数值结果说明了本文所提方法的优越性。
{"title":"A Blockchain-Enabled Cold Start Aggregation Scheme for Federated Reinforcement Learning-Based Task Offloading in Zero Trust LEO Satellite Networks","authors":"Bomin Mao;Yangbo Liu;Zixiang Wei;Hongzhi Guo;Yijie Xun;Jiadai Wang;Jiajia Liu;Nei Kato","doi":"10.1109/JSAC.2025.3560003","DOIUrl":"10.1109/JSAC.2025.3560003","url":null,"abstract":"The development of 6G enable users in remote and harsh areas to enjoy computation-intensive services including metaverse entertainment, intelligent transportation, and immersive communications. Low Earth Orbit (LEO) satellite constellations widely constructed in recent years have been recognized as an efficient solution to complement the terrestrial infrastructure with seamless coverage and decreasing expenses for both communication and computation services. However, the widely studied Federated Reinforcement Learning (FRL) based task offloading strategies neglect the potential trust concerns like malicious satellites and buffer pollution, while 6G service providers may rent the LEO satellites belonging to different companies to minimize the expense. To address these issues, blockchain has been considered in the Zero Trust (ZT) scenario, with the group consensus mechanism through the smart contract. Moreover, we propose a Constrained Correction Voting Mechanism (CCVM) to give punishing correction to the aggregation weight of malicious voting satellites. Furthermore, a Cold Start Reputation Aggregation (CSRA) scheme is adopted to first severely degrade and then gradually recover the weight of Federated Learning (FL) sub-models trained by malicious satellites. Thus, the Blockchain-enabled Cold Start Aggregation FRL (BCSA-FRL) scheme is proposed to make effective and secure offloading decisions in the ZT LEO satellite Networks. The numerical results illustrate the advantages of our proposal.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2172-2182"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPDZ: A Credibility-Aware and Privacy-Preserving Data Collection Scheme With Zero-Trust in Next-Generation Crowdsensing Networks CPDZ:下一代众感网络中的零信任可信度和隐私保护数据收集方案
Jianheng Tang;Kejia Fan;Shihao Yang;Anfeng Liu;Neal N. Xiong;Houbing Herbert Song;Victor C. M. Leung
Next-Generation Crowdsensing Networks (NGCNs) have become increasingly critical for smart cities, where data privacy and quality are pivotal concerns. Traditional trust mechanisms in crowdsensing mainly rely on static trust models, which are insufficient for dynamic security requirements. Zero-Trust security represents a promising opportunity, yet coming with notable challenges in NGCNs, including Unknown Workers Online Recruitment (UWOR), Information Elicitation Without Verification (IEWV), Privacy Preserving Data Evaluation (PPDE), and Dynamic Trust Abrupt Shift (DTAS). To address these challenges, we propose a Credibility-aware and Privacy-preserving Data collection scheme with Zero-trust (CPDZ) for secure and quality data collection in NGCNs. First, our CPDZ scheme encompasses a quality worker recruitment strategy with combinatorial multi-armed bandit models, utilizing Thompson Sampling for the secure and efficient resolution of the UWOR. Second, an active dispatching scheme for uncrewed aerial vehicles is crafted to collect data as a gold standard to assist in overcoming the IEWV challenge. Third, as for the PPDE challenge, we propose a lightweight privacy-preserving scheme for dependable truth discovery and secure trust verification. Fourth, the DTAS challenge is managed by a dual verification scheme that integrates short-term and long-term trust assessments, ensuring stability and adaptability of the zero-trust security in our CPDZ scheme. Experiments confirm the superiority of our CPDZ scheme, showing a 12.5% increase in recruitment revenue and a 57.8% reduction in relative error compared to existing approaches
下一代众感网络(NGCNs)对智慧城市越来越重要,数据隐私和质量是关键问题。传统的众感信任机制主要依赖于静态信任模型,不足以满足动态安全需求。零信任安全代表了一个有希望的机会,但在NGCNs中也面临着显著的挑战,包括未知工人在线招聘(UWOR)、未经验证的信息引出(IEWV)、隐私保护数据评估(PPDE)和动态信任突变(DTAS)。为了应对这些挑战,我们提出了一种基于零信任(CPDZ)的可信和隐私保护数据收集方案,用于ngcn中安全、高质量的数据收集。首先,我们的CPDZ方案包含一个具有组合多臂强盗模型的优质工人招聘策略,利用汤普森采样安全有效地解决UWOR问题。其次,为无人驾驶飞行器制定了一个主动调度方案,以收集数据作为黄金标准,以帮助克服IEWV的挑战。第三,针对PPDE的挑战,我们提出了一种轻量级的隐私保护方案,用于可靠的事实发现和安全的信任验证。第四,通过集成了短期和长期信任评估的双重验证方案来管理DTAS挑战,确保了CPDZ方案中零信任安全的稳定性和适应性。实验证实了我们的CPDZ方案的优越性,与现有方法相比,招聘收入增加了12.5%,相对误差减少了57.8%
{"title":"CPDZ: A Credibility-Aware and Privacy-Preserving Data Collection Scheme With Zero-Trust in Next-Generation Crowdsensing Networks","authors":"Jianheng Tang;Kejia Fan;Shihao Yang;Anfeng Liu;Neal N. Xiong;Houbing Herbert Song;Victor C. M. Leung","doi":"10.1109/JSAC.2025.3560038","DOIUrl":"10.1109/JSAC.2025.3560038","url":null,"abstract":"Next-Generation Crowdsensing Networks (NGCNs) have become increasingly critical for smart cities, where data privacy and quality are pivotal concerns. Traditional trust mechanisms in crowdsensing mainly rely on static trust models, which are insufficient for dynamic security requirements. Zero-Trust security represents a promising opportunity, yet coming with notable challenges in NGCNs, including Unknown Workers Online Recruitment (UWOR), Information Elicitation Without Verification (IEWV), Privacy Preserving Data Evaluation (PPDE), and Dynamic Trust Abrupt Shift (DTAS). To address these challenges, we propose a Credibility-aware and Privacy-preserving Data collection scheme with Zero-trust (CPDZ) for secure and quality data collection in NGCNs. First, our CPDZ scheme encompasses a quality worker recruitment strategy with combinatorial multi-armed bandit models, utilizing Thompson Sampling for the secure and efficient resolution of the UWOR. Second, an active dispatching scheme for uncrewed aerial vehicles is crafted to collect data as a gold standard to assist in overcoming the IEWV challenge. Third, as for the PPDE challenge, we propose a lightweight privacy-preserving scheme for dependable truth discovery and secure trust verification. Fourth, the DTAS challenge is managed by a dual verification scheme that integrates short-term and long-term trust assessments, ensuring stability and adaptability of the zero-trust security in our CPDZ scheme. Experiments confirm the superiority of our CPDZ scheme, showing a 12.5% increase in recruitment revenue and a 57.8% reduction in relative error compared to existing approaches","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2183-2199"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-Trust Federated Learning via 6G URLLC for Vehicular Communications 基于6G URLLC的车载通信零信任联合学习
Muhammad Asad;Safa Otoum;Bassem Ouni
The transition towards intelligent transportation systems is increasingly dependent on advancements in vehicular communications to support data-intensive tasks like Federated Learning (FL). This paper delves into the capabilities of sixth-generation (6G) Ultra-Reliable Low-Latency Communication (URLLC) in elevating the performance of FL within vehicular networks, with a focus on integrating Zero-Trust security principles. By employing real-world vehicular trajectory data from the HighD dataset within an NS-3 simulated network environment, our study rigorously evaluates the combined impact of 6G URLLC and Zero-Trust mechanisms on FL. The findings highlight not only substantial improvements in latency, achieving reductions of up to 81%-83% compared to existing FL models, but also enhancements in throughput, reliability, and model accuracy, alongside a significant increase in security compliance rate. These improvements are pivotal for FL models, promising to optimize the data exchange process, enhance overall learning efficiency, and ensure robust security against evolving cyber threats. Our research indicates that the synergistic integration of 6G URLLC with FL, fortified by Zero-Trust security, could be instrumental in the advancement of intelligent transportation systems, ensuring enhanced vehicular safety, operational efficacy, and data security.
向智能交通系统的过渡越来越依赖于车载通信的进步,以支持联邦学习(FL)等数据密集型任务。本文深入研究了第六代(6G)超可靠低延迟通信(URLLC)在提升车载网络中FL性能方面的能力,重点是集成零信任安全原则。通过在NS-3模拟网络环境中使用来自HighD数据集的真实车辆轨迹数据,我们的研究严格评估了6G URLLC和零信任机制对FL的综合影响。研究结果强调,与现有FL模型相比,延迟大幅改善,实现了高达81%-83%的降低,而且在吞吐量、可靠性和模型准确性方面得到了增强,同时安全符合率也得到了显著提高。这些改进对FL模型至关重要,有望优化数据交换过程,提高整体学习效率,并确保针对不断变化的网络威胁的强大安全性。我们的研究表明,6G URLLC与FL的协同集成,通过零信任安全加强,可以在智能交通系统的进步中发挥重要作用,确保提高车辆安全性,运行效率和数据安全性。
{"title":"Zero-Trust Federated Learning via 6G URLLC for Vehicular Communications","authors":"Muhammad Asad;Safa Otoum;Bassem Ouni","doi":"10.1109/JSAC.2025.3560009","DOIUrl":"10.1109/JSAC.2025.3560009","url":null,"abstract":"The transition towards intelligent transportation systems is increasingly dependent on advancements in vehicular communications to support data-intensive tasks like Federated Learning (FL). This paper delves into the capabilities of sixth-generation (6G) Ultra-Reliable Low-Latency Communication (URLLC) in elevating the performance of FL within vehicular networks, with a focus on integrating Zero-Trust security principles. By employing real-world vehicular trajectory data from the HighD dataset within an NS-3 simulated network environment, our study rigorously evaluates the combined impact of 6G URLLC and Zero-Trust mechanisms on FL. The findings highlight not only substantial improvements in latency, achieving reductions of up to 81%-83% compared to existing FL models, but also enhancements in throughput, reliability, and model accuracy, alongside a significant increase in security compliance rate. These improvements are pivotal for FL models, promising to optimize the data exchange process, enhance overall learning efficiency, and ensure robust security against evolving cyber threats. Our research indicates that the synergistic integration of 6G URLLC with FL, fortified by Zero-Trust security, could be instrumental in the advancement of intelligent transportation systems, ensuring enhanced vehicular safety, operational efficacy, and data security.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"1970-1980"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecT: A Zero-Trust Framework for Secure Remote Access in Next-Generation Industrial Networks 第二节:下一代工业网络中安全远程访问的零信任框架
Muhammad Asim;Noshina Tariq;Ali Ismail Awad;Fahad Waheed;Ubaid Ullah;Ghulam Murtaza
Next-generation industrial networks are designed to integrate a wide range of devices, services, and applications spanning multiple technologies, such as cloud platforms, edge computing, and the Internet of Things. With the growing adoption of applications such as “Industry 4.0,” high security and low latency are becoming unavoidable requirements for these networks. Traditional virtual private networks (VPNs) generally experience performance, latency, and security issues, especially when supporting secure remote access for Industry 4.0 and e-health applications. To address these issues, this study introduces a novel zero-trust network-access framework for next-generation industrial networks called Secure Transmission (SecT). SecT is a User Datagram Protocol (UDP)-based solution, ensuring speed and effectiveness, with role-based access control. It uses a centralized management interface that can adapt to various network environments, providing secure access to mission-critical applications and increasing operational agility. SecT aims to meet the emerging demands of modern industrial networks, offering secure access with improved performance. The results of a comparative analysis show that SecT outperforms traditional VPNs in both capability and flexibility, adapting well to new network conditions.
下一代工业网络旨在集成各种设备、服务和应用,涵盖多种技术,如云平台、边缘计算和物联网。随着“工业4.0”等应用的日益普及,高安全性和低延迟成为这些网络不可避免的要求。传统的虚拟专用网络(vpn)通常会遇到性能、延迟和安全问题,特别是在支持工业4.0和电子医疗应用程序的安全远程访问时。为了解决这些问题,本研究为下一代工业网络引入了一种新的零信任网络访问框架,称为安全传输(SecT)。SecT是一种基于用户数据报协议(UDP)的解决方案,具有基于角色的访问控制,确保了速度和有效性。它使用可以适应各种网络环境的集中管理接口,提供对关键任务应用程序的安全访问并提高操作灵活性。SecT旨在满足现代工业网络的新兴需求,提供具有改进性能的安全访问。对比分析结果表明,SecT在性能和灵活性上都优于传统vpn,能够很好地适应新的网络环境。
{"title":"SecT: A Zero-Trust Framework for Secure Remote Access in Next-Generation Industrial Networks","authors":"Muhammad Asim;Noshina Tariq;Ali Ismail Awad;Fahad Waheed;Ubaid Ullah;Ghulam Murtaza","doi":"10.1109/JSAC.2025.3560015","DOIUrl":"10.1109/JSAC.2025.3560015","url":null,"abstract":"Next-generation industrial networks are designed to integrate a wide range of devices, services, and applications spanning multiple technologies, such as cloud platforms, edge computing, and the Internet of Things. With the growing adoption of applications such as “Industry 4.0,” high security and low latency are becoming unavoidable requirements for these networks. Traditional virtual private networks (VPNs) generally experience performance, latency, and security issues, especially when supporting secure remote access for Industry 4.0 and e-health applications. To address these issues, this study introduces a novel zero-trust network-access framework for next-generation industrial networks called Secure Transmission (SecT). SecT is a User Datagram Protocol (UDP)-based solution, ensuring speed and effectiveness, with role-based access control. It uses a centralized management interface that can adapt to various network environments, providing secure access to mission-critical applications and increasing operational agility. SecT aims to meet the emerging demands of modern industrial networks, offering secure access with improved performance. The results of a comparative analysis show that SecT outperforms traditional VPNs in both capability and flexibility, adapting well to new network conditions.","PeriodicalId":73294,"journal":{"name":"IEEE journal on selected areas in communications : a publication of the IEEE Communications Society","volume":"43 6","pages":"2293-2311"},"PeriodicalIF":0.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143822675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE journal on selected areas in communications : a publication of the IEEE Communications Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1