Digital Communications and Networks最新文献

筛选
英文 中文
Certificateless threshold signature from lattice 来自晶格的无证书阈值签名
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2022.11.009
{"title":"Certificateless threshold signature from lattice","authors":"","doi":"10.1016/j.dcan.2022.11.009","DOIUrl":"10.1016/j.dcan.2022.11.009","url":null,"abstract":"<div><p>Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory, so they cannot resist quantum computing attacks. In view of this, we combine the advantages of lattice-based cryptosystem and certificateless cryptosystem to construct a certificateless threshold signature from lattice (LCLTS) that is efficient and resistant to quantum algorithm attacks. LCLTS has the threshold characteristics and can resist the quantum computing attacks, and the analysis shows that it is unforgeable against the adaptive Chosen-Message Attacks (UF-CMA) with the difficulty of Inhomogeneous Small Integer Solution (ISIS) problem. In addition, LCLTS solves the problems of the certificate management through key escrow.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002504/pdfft?md5=fade8c6d8a613e69c35603a2c22345a1&pid=1-s2.0-S2352864822002504-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49496076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-based co-operative routing for secure communication in mobile ad hoc networks 基于信任的移动自组网安全通信协同路由
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2023.01.005
{"title":"Trust-based co-operative routing for secure communication in mobile ad hoc networks","authors":"","doi":"10.1016/j.dcan.2023.01.005","DOIUrl":"10.1016/j.dcan.2023.01.005","url":null,"abstract":"<div><p>The working of a Mobile Ad hoc NETwork (MANET) relies on the supportive cooperation among the network nodes. But due to its intrinsic features, a misbehaving node can easily lead to a routing disorder. This paper presents two trust-based routing schemes, namely Trust-based Self-Detection Routing (TSDR) and Trust-based Co-operative Routing (TCOR) designed with an Ad hoc On-demand Distance Vector (AODV) protocol. The proposed work covers a wide range of security challenges, including malicious node identification and prevention, accurate trust quantification, secure trust data sharing, and trusted route maintenance. This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET. It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust (ESCT) scheme, Generalized Trust Model (GTM), and the conventional AODV protocol. The extensive simulations are conducted against three different varying network scenarios. The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes. Among the two proposed works, TCOR is more suitable for highly scalable networks; TSDR suits, however, the MANET application better with its small size. This work thus makes a significant contribution to the research community, in contrast to many previous works focusing solely on specific security aspects, and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000184/pdfft?md5=c06eac16b7894ba4a0fe09ccf5d48431&pid=1-s2.0-S2352864823000184-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47240168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unmanned aerial vehicles towards future Industrial Internet: Roles and opportunities 面向未来工业互联网的无人驾驶飞行器:角色与机遇
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2023.09.003
{"title":"Unmanned aerial vehicles towards future Industrial Internet: Roles and opportunities","authors":"","doi":"10.1016/j.dcan.2023.09.003","DOIUrl":"10.1016/j.dcan.2023.09.003","url":null,"abstract":"<div><p>Unmanned Aerial Vehicles (UAVs) are gaining increasing attention in many fields, such as military, logistics, and hazardous site mapping. Utilizing UAVs to assist communications is one of the promising applications and research directions. The future Industrial Internet places higher demands on communication quality. The easy deployment, dynamic mobility, and low cost of UAVs make them a viable tool for wireless communication in the Industrial Internet. Therefore, UAVs are considered as an integral part of Industry 4.0. In this article, three typical use cases of UAVs-assisted communications in Industrial Internet are first summarized. Then, the state-of-the-art technologies for drone-assisted communication in support of the Industrial Internet are presented. According to the current research, it can be assumed that UAV-assisted communication can support the future Industrial Internet to a certain extent. Finally, the potential research directions and open challenges in UAV-assisted communications in the upcoming future Industrial Internet are discussed.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823001414/pdfft?md5=727616bd600e0c87a6d7f7166dc5033f&pid=1-s2.0-S2352864823001414-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135388502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening network slicing for Industrial Internet with deep reinforcement learning 用深度强化学习加强工业互联网的网络切片
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2023.06.009
{"title":"Strengthening network slicing for Industrial Internet with deep reinforcement learning","authors":"","doi":"10.1016/j.dcan.2023.06.009","DOIUrl":"10.1016/j.dcan.2023.06.009","url":null,"abstract":"<div><p>Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain. Its highly heterogeneous network structure and diversified application requirements call for the applying of network slicing technology. Guaranteeing robust network slicing is essential for Industrial Internet, but it faces the challenge of complex slice topologies caused by the intricate interaction relationships among Network Functions (NFs) composing the slice. Existing works have not concerned the strengthening problem of industrial network slicing regarding its complex network properties. Towards this end, we aim to study this issue by intelligently selecting a subset of most valuable NFs with the minimum cost to satisfy the strengthening requirements. State-of-the-art AlphaGo series of algorithms and the advanced graph neural network technology are combined to build the solution. Simulation results demonstrate the superior performance of our scheme compared to the benchmark schemes.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823001153/pdfft?md5=9caf0e49b3bb245707180b54bcf4caac&pid=1-s2.0-S2352864823001153-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43168756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving throughput in SWIPT-based wireless multirelay networks with relay selection and rateless codes 利用中继选择和无速率码提高基于swipt的无线多中继网络的吞吐量
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2023.01.012
{"title":"Improving throughput in SWIPT-based wireless multirelay networks with relay selection and rateless codes","authors":"","doi":"10.1016/j.dcan.2023.01.012","DOIUrl":"10.1016/j.dcan.2023.01.012","url":null,"abstract":"<div><p>This paper studies a dual-hop Simultaneous Wireless Information and Power Transfer (SWIPT)-based multi-relay network with a direct link. To achieve high throughput in the network, a novel protocol is first developed, in which the network can switch between a direct transmission mode and a Single-Relay-Selection-based Cooperative Transmission (SRS-CT) mode that employs dynamic decode-and-forward relaying accomplished with Rateless Codes (RCs). Then, under this protocol, an optimization problem is formulated to jointly optimize the network operation mode and the resource allocation in the SRS-CT mode. The formulated problem is difficult to solve because not only does the noncausal Channel State Information (CSI) cause the problem to be stochastic, but also the energy state evolution at each relay is complicated by network operation mode decision and resource allocation. Assuming that noncausal CSI is available, the stochastic optimization issue is first to be addressed by solving an involved deterministic optimization problem via dynamic programming, where the complicated energy state evolution issue is addressed by a layered optimization method. Then, based on a finite-state Markov channel model and assuming that CSI statistical properties are known, the stochastic optimization problem is solved by extending the result derived for the noncausal CSI case to the causal CSI case. Finally, a myopic strategy is proposed to achieve a tradeoff between complexity and performance without the knowledge of CSI statistical properties. The simulation results verify that our proposed SRS-and-RC-based design can achieve a maximum of approximately 40% throughput gain over a simple SRS-and-RC-based baseline scheme in SWIPT-based multi-relay networks.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000251/pdfft?md5=10270a4aa813f9e8456f57d85ffd5e90&pid=1-s2.0-S2352864823000251-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48267253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic segmentation-based semantic communication system for image transmission 基于语义分割的图像传输语义通信系统
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-06-01 DOI: 10.1016/j.dcan.2023.02.006
Jiale Wu , Celimuge Wu , Yangfei Lin , Tsutomu Yoshinaga , Lei Zhong , Xianfu Chen , Yusheng Ji
{"title":"Semantic segmentation-based semantic communication system for image transmission","authors":"Jiale Wu ,&nbsp;Celimuge Wu ,&nbsp;Yangfei Lin ,&nbsp;Tsutomu Yoshinaga ,&nbsp;Lei Zhong ,&nbsp;Xianfu Chen ,&nbsp;Yusheng Ji","doi":"10.1016/j.dcan.2023.02.006","DOIUrl":"10.1016/j.dcan.2023.02.006","url":null,"abstract":"<div><p>With the rapid development of artificial intelligence and the widespread use of the Internet of Things, semantic communication, as an emerging communication paradigm, has been attracting great interest. Taking image transmission as an example, from the semantic communication's view, not all pixels in the images are equally important for certain receivers. The existing semantic communication systems directly perform semantic encoding and decoding on the whole image, in which the region of interest cannot be identified. In this paper, we propose a novel semantic communication system for image transmission that can distinguish between Regions Of Interest (ROI) and Regions Of Non-Interest (RONI) based on semantic segmentation, where a semantic segmentation algorithm is used to classify each pixel of the image and distinguish ROI and RONI. The system also enables high-quality transmission of ROI with lower communication overheads by transmissions through different semantic communication networks with different bandwidth requirements. An improved metric <em>θPSNR</em> is proposed to evaluate the transmission accuracy of the novel semantic transmission network. Experimental results show that our proposed system achieves a significant performance improvement compared with existing approaches, namely, existing semantic communication approaches and the conventional approach without semantics.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S235286482300041X/pdfft?md5=6ea8db461421a527154a550182023bd7&pid=1-s2.0-S235286482300041X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43214248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BLS-identification: A device fingerprint classification mechanism based on broad learning for Internet of Things BLS识别:一种基于广义学习的物联网设备指纹分类机制
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-06-01 DOI: 10.1016/j.dcan.2022.10.003
Yu Zhang , Bei Gong , Qian Wang
{"title":"BLS-identification: A device fingerprint classification mechanism based on broad learning for Internet of Things","authors":"Yu Zhang ,&nbsp;Bei Gong ,&nbsp;Qian Wang","doi":"10.1016/j.dcan.2022.10.003","DOIUrl":"10.1016/j.dcan.2022.10.003","url":null,"abstract":"<div><p>The popularity of the Internet of Things (IoT) has enabled a large number of vulnerable devices to connect to the Internet, bringing huge security risks. As a network-level security authentication method, device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases. However, flexible and diversified IoT devices with limited resources increase difficulty of the device fingerprint authentication method executed in IoT, because it needs to retrain the model network to deal with incremental features or types. To address this problem, a device fingerprinting mechanism based on a Broad Learning System (BLS) is proposed in this paper. The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices, and extracts feature parameters of the traffic packets. A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset. The complexity of the dataset is reduced using Principal Component Analysis (PCA) and the device type is identified by training weights using BLS. The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002127/pdfft?md5=70bdbf56069c296296ec3c3722248761&pid=1-s2.0-S2352864822002127-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48076306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource management at the network edge for federated learning 用于联合学习的网络边缘资源管理
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-06-01 DOI: 10.1016/j.dcan.2022.10.015
Silvana Trindade, Luiz F. Bittencourt, Nelson L.S. da Fonseca
{"title":"Resource management at the network edge for federated learning","authors":"Silvana Trindade,&nbsp;Luiz F. Bittencourt,&nbsp;Nelson L.S. da Fonseca","doi":"10.1016/j.dcan.2022.10.015","DOIUrl":"10.1016/j.dcan.2022.10.015","url":null,"abstract":"<div><p>Federated learning has been explored as a promising solution for training machine learning models at the network edge, without sharing private user data. With limited resources at the edge, new solutions must be developed to leverage the software and hardware resources as the existing solutions did not focus on resource management for network edge, specially for federated learning. In this paper, we describe the recent work on resource management at the edge and explore the challenges and future directions to allow the execution of federated learning at the edge. Problems such as the discovery of resources, deployment, load balancing, migration, and energy efficiency are discussed in the paper.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002243/pdfft?md5=71fc59ba6668222d24b1b387a27b565f&pid=1-s2.0-S2352864822002243-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49369858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations 近地轨道卫星星座交通工程分段路由与有效恢复
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-06-01 DOI: 10.1016/j.dcan.2022.09.022
Shengyu Zhang , Xiaoqian Li , Kwan Lawrence Yeung
{"title":"Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations","authors":"Shengyu Zhang ,&nbsp;Xiaoqian Li ,&nbsp;Kwan Lawrence Yeung","doi":"10.1016/j.dcan.2022.09.022","DOIUrl":"10.1016/j.dcan.2022.09.022","url":null,"abstract":"<div><p>Low-Earth Orbit Satellite Constellations (LEO-SCs) provide global, high-speed, and low latency Internet access services, which bridges the digital divide in the remote areas. As inter-satellite links are not supported in initial deployment (i.e. the Starlink), the communication between satellites is based on ground stations with radio frequency signals. Due to the rapid movement of satellites, this hybrid topology of LEO-SCs and ground stations is time-varying, which imposes a major challenge to uninterrupted service provisioning and network management. In this paper, we focus on solving two notable problems in such a ground station-assisted LEO-SC topology, i.e., traffic engineering and fast reroute, to guarantee that the packets are forwarded in a balanced and uninterrupted manner. Specifically, we employ segment routing to support the arbitrary path routing in LEO-SCs. To solve the traffic engineering problem, we proposed two source routings with traffic splitting algorithms, Delay-Bounded Traffic Splitting (DBTS) and DBTS+, where DBTS equally splits a flow and DBTS ​+ ​favors shorter paths. Simulation results show that DBTS ​+ ​can achieve about 30% lower maximum satellite load at the cost of about 10% more delay. To guarantee the fast recovery of failures, two <em>fast reroute</em> mechanisms, Loop-Free Alternate (LFA) and LFA+, are studied, where LFA pre-computes an alternate next-hop as a backup while LFA ​+ ​finds a 2-segment backup path. We show that LFA ​+ ​can increase the percentage of protection coverage by about 15%.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822001973/pdfft?md5=3cab94277d0032420ddb2a1be88ba75f&pid=1-s2.0-S2352864822001973-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46065571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Starlet: Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT Starlet:物联网云边缘人群感知的多武装匪徒网络防御资源分配
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-06-01 DOI: 10.1016/j.dcan.2023.03.009
Hui Xia , Ning Huang , Xuecai Feng, Rui Zhang, Chao Liu
{"title":"Starlet: Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT","authors":"Hui Xia ,&nbsp;Ning Huang ,&nbsp;Xuecai Feng,&nbsp;Rui Zhang,&nbsp;Chao Liu","doi":"10.1016/j.dcan.2023.03.009","DOIUrl":"10.1016/j.dcan.2023.03.009","url":null,"abstract":"<div><p>The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of Things. To guarantee the network's overall security, we present a network defense resource allocation with multi-armed bandits to maximize the network's overall benefit. Firstly, we propose the method for dynamic setting of node defense resource thresholds to obtain the defender (attacker) benefit function of edge servers (nodes) and distribution. Secondly, we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of nodes. Subsequently, we use the decomposability and Lipschitz continuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference theoretically. Finally, experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000652/pdfft?md5=dcb6831ac9748b7247a471afe3426498&pid=1-s2.0-S2352864823000652-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48371191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信