Tsinghua Science and Technology最新文献

筛选
英文 中文
Security Challenges in Internet of Vehicles (IoV) for ITS: A Survey
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010083
Edris Khezri;Hiwa Hassanzadeh;Rebaz Othman Yahya;Mahdi Mir
{"title":"Security Challenges in Internet of Vehicles (IoV) for ITS: A Survey","authors":"Edris Khezri;Hiwa Hassanzadeh;Rebaz Othman Yahya;Mahdi Mir","doi":"10.26599/TST.2024.9010083","DOIUrl":"https://doi.org/10.26599/TST.2024.9010083","url":null,"abstract":"Due to their diverse applications, including safety, welfare, and improving traffic efficiency, inter-vehicle ad-hoc networks have been extensively studied. Globally, road congestion, accidents, fuel consumption, and environmental pollution caused by the large number of vehicles have become serious problems that have caused a lot of human and financial losses. Intelligent transportation systems (ITS) have introduced VANETs in order to overcome these problems. In vehicular ad hoc networks (VANETs), vehicles equipped with wireless interfaces can communicate with other vehicles and with fixed roadside equipment via mobile ad hoc networks (MANETs). Messages are transmitted over open wireless channels in VANETs. Malicious nodes target these networks to protect them from various attacks, such as interference, eavesdropping, spoofing, denial of service, Sybil, black holes, worm holes, gray holes, etc. Security of VANETs is therefore one of the most significant issues. Security issues, attacks, attackers, and secure routing protocols in VANETs are discussed in this article, as well as available solutions to solve security issues.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1700-1723"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908658","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2023.9010096
Dejuan Li;James A. Esquivel
{"title":"Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing","authors":"Dejuan Li;James A. Esquivel","doi":"10.26599/TST.2023.9010096","DOIUrl":"https://doi.org/10.26599/TST.2023.9010096","url":null,"abstract":"This paper introduces a novel trust-aware hybrid recommendation framework that combines Locality-Sensitive Hashing (LSH) with the trust information in social networks, aiming to provide efficient and effective recommendations. Unlike traditional recommender systems which often overlook the critical influence of user trust, our proposed approach infuses trust metrics to better approximate user preferences. The LSH, with its intrinsic advantage in handling high-dimensional data and computational efficiency, is applied to expedite the process of finding similar items or users. We innovatively adapt LSH to form trust-aware buckets, encapsulating both trust and similarity information. These enhancements mitigate the sparsity and scalability issues usually found in existing recommender systems. Experimental results on a real-world dataset confirm the superiority of our approach in terms of recommendation quality and computational performance. The paper further discusses potential applications and future directions of the trust-aware hybrid recommendation with LSH.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1421-1434"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908673","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Medical Report via Joint Probability Graph Reasoning
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010058
Junsan Zhang;Ming Cheng;Xiangyang Li;Xiuxuan Shen;Yuxue Liu;Yao Wan
{"title":"Generating Medical Report via Joint Probability Graph Reasoning","authors":"Junsan Zhang;Ming Cheng;Xiangyang Li;Xiuxuan Shen;Yuxue Liu;Yao Wan","doi":"10.26599/TST.2024.9010058","DOIUrl":"https://doi.org/10.26599/TST.2024.9010058","url":null,"abstract":"In medical X-ray images, multiple abnormalities may occur frequently. However, existing report generation methods cannot efficiently extract all abnormal features, resulting in incomplete disease diagnoses when generating diagnostic reports. In real medical scenarios, there are co-occurrence relations among multiple diseases. If such co-occurrence relations are mined and integrated into the feature extraction process, the issue of missing abnormal features may be addressed. Inspired by this observation, we propose a novel method to improve the extraction of abnormal features in images through joint probability graph reasoning. Specifically, to reveal the co-occurrence relations among multiple diseases, we conduct statistical analyses on the dataset, and extract disease relationships into a probability map. Subsequently, we devise a graph reasoning network for conducting correlation-based reasoning over the features of medical images, which can facilitate the acquisition of more abnormal features. Furthermore, we introduce a gating mechanism focused on cross-modal features fusion into the current text generation model. This optimization substantially improves the model's capabilities to learn and fuse information from two distinct modalities-medical images and texts. Experimental results on the IU-X-Ray and MIMIC-CXR datasets demonstrate that our approach outperforms previous state-of-the-art methods, exhibiting the ability to generate higher quality medical image reports.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1685-1699"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908661","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-Based Thermal Imaging Analysis to Diagnose Abnormalities in Sports Buildings: Smart Cyber-Physical Monitoring Sensors at the Edge
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2023.9010130
Tengfei Fan;Wenmin Lin
{"title":"Deep Learning-Based Thermal Imaging Analysis to Diagnose Abnormalities in Sports Buildings: Smart Cyber-Physical Monitoring Sensors at the Edge","authors":"Tengfei Fan;Wenmin Lin","doi":"10.26599/TST.2023.9010130","DOIUrl":"https://doi.org/10.26599/TST.2023.9010130","url":null,"abstract":"A joint green-edge computing idea is now realized in practice with the help of intelligent infrastructure for modern sport venues, based on Internet of Things (IoT) platforms and Cyber-Physical Systems (CPS). To monitor their sports actions, athletes need smart environments. Using edge-enabled low-cost and low-power sensors, such as infrared monitoring systems that analyze thermal information, this environment should alert to possible physical damages. Early recognition of sports injuries and joint injuries can usually prevent athletes from pain and missing exercise. One of the most efficient methods for identifying pain and movement problems is to monitor the energy emitted by lower limb injuries. By analyzing thermal images of the lower body parts, this research attempts to automatically identify sports injuries. The thermal image is first isolated from the region of interest. Convolutional structures are applied to identify lesions using a newly developed and optimized method. The performance of the classifier is performed with the possibility of deep learning by pruning the features, to reduce the computational complexity and improve the accuracy, and a model has been developed based on the classification of sports injuries in binary mode (i.e., whether the lesions are present or not) and multiclass mode (i.e., the severity of sports injuries) resulted in optimal results. Thermal images show the different states of joints, including lesions caused by various sports in the lower limbs. This model could provide the ability of solving uncertainty of answers, repeatability, and convergence towards minimum error. As compared to conventional feature extraction and classification approaches, the outputs are more acceptable. By taking advantage of the K-fold cross-validation method, the average error of the proposed method to detect the severity of damage is less than 2.22%.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1457-1473"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908671","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Traffic Monitoring System in Congested Regions with Prioritization for Emergency Vehicle Using UAV Networks
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2023.9010078
V. D. Ambeth Kumar;Venkatesan Ramachandran;Mamoon Rashid;Abdul Rehman Javed;Shayla Islam;Abdullah Al Hejaili
{"title":"An Intelligent Traffic Monitoring System in Congested Regions with Prioritization for Emergency Vehicle Using UAV Networks","authors":"V. D. Ambeth Kumar;Venkatesan Ramachandran;Mamoon Rashid;Abdul Rehman Javed;Shayla Islam;Abdullah Al Hejaili","doi":"10.26599/TST.2023.9010078","DOIUrl":"https://doi.org/10.26599/TST.2023.9010078","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are enabled to be fast and flexible in managing traffic compared to the conventional methods. However, in emergencies, this system takes more time to identify and clear the traffic because of fixed time control. To overcome this problem, an automated intelligent traffic monitoring and controlling system is designed using YOLO V3 neural architecture and implemented to detect the emergency vehicles from video stream data from UAVs using deep Convolution Neural Network (CNN) along with rerouting algorithm to provide the safest alternate route from current position to destination, in a heavy traffic environment. The real-time visual data collected through UAV video cameras are trained using machine learning algorithms to produce statistical profiles that are used continuously as updated inputs to the existing traffic simulation models for improving predictions. The proposed automated system performs exemplary in recognizing emergency vehicles and diverting them to an alternate route for quick transportation in various scenarios.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1387-1400"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908597","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight and Privacy-Preserving IoT Service Recommendation Based on Learning to Hash
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010064
Haoyang Wan;Yanping Wu;Yihong Yang;Chao Yan;Xiaoxiao Chi;Xuyun Zhang;Shigen Shen
{"title":"Lightweight and Privacy-Preserving IoT Service Recommendation Based on Learning to Hash","authors":"Haoyang Wan;Yanping Wu;Yihong Yang;Chao Yan;Xiaoxiao Chi;Xuyun Zhang;Shigen Shen","doi":"10.26599/TST.2024.9010064","DOIUrl":"https://doi.org/10.26599/TST.2024.9010064","url":null,"abstract":"In the Internet of Things (IoT) environment, user-service interaction data are often stored in multiple distributed platforms. In this situation, recommender systems need to integrate the distributed user-service interaction data across different platforms for making a comprehensive recommendation decision, during which user privacy is probably disclosed. Moreover, as user-service interaction records accumulate over time, they significantly reduce the efficiency of recommendations. To tackle these issues, we propose a lightweight and privacy-preserving service recommendation approach named SerRec<inf>L2H</inf>. In SerRec<inf>L2H</inf>, we employ Learning to Hash (L2H) to encapsulate sensitive user-service interaction data into less-sensitive user indices, which facilitates identifying users with similar preferences efficiently for accurate recommendations. We then validate the feasibility of our proposed SerRec<inf>L2H</inf> approach through massive experiments conducted on the popular WS-DREAM dataset. The comparative analysis with other competitive approaches demonstrates that our proposal surpasses other approaches in terms of recommendation accuracy and efficiency while protecting user privacy.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1793-1807"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908664","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143535437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Maritime Autoencoder Communication System Based on Attention Mechanisms and DenseBlock
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2023.9010150
Xiaoling Han;Bin Lin;Shuai Shao;Nan Wu;Haocheng Wang;Liping Qian;Yuan Wu
{"title":"Design of a Maritime Autoencoder Communication System Based on Attention Mechanisms and DenseBlock","authors":"Xiaoling Han;Bin Lin;Shuai Shao;Nan Wu;Haocheng Wang;Liping Qian;Yuan Wu","doi":"10.26599/TST.2023.9010150","DOIUrl":"https://doi.org/10.26599/TST.2023.9010150","url":null,"abstract":"As the maritime industry continues to thrive and maritime services diversify, the demand for highly reliable maritime communication systems has become increasingly prominent. However, harsh marine conditions pose significant challenges to communication systems. In this work, we propose a Maritime AutoEncoder (MAE) communication system based on Attention Mechanisms (AMs) and DenseBlock (namely AM-Dense-MAE). AM-Dense-MAE utilizes DenseBlock and long short-term memory to extract deep features and capture spatio-temporal relationships, addressing the issue of “long-term dependency”. Furthermore, the decoder incorporates spatial attention modules and convolutional block attention module to enhance the preservation of crucial information and suppress irrelevant data. We employ the Rician fading channel model to simulate maritime communication channels. A substantial volume of data is utilized for model training and parameter optimization. Simulation results demonstrate that, in comparison to the benchmarks, the proposed AM-Dense-MAE exhibits better block error rate performance under various signal-to-noise ratio conditions and showcases generalization capabilities across diverse parameter settings.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1496-1510"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908674","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Speed Control and Reduction of Torque Ripple in Switched Reluctance Motors Using Metaheuristic Algorithms Based PID and FOPID Controllers at the Edge
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010021
Mostafa Jabari;Amin Rad
{"title":"Optimization of Speed Control and Reduction of Torque Ripple in Switched Reluctance Motors Using Metaheuristic Algorithms Based PID and FOPID Controllers at the Edge","authors":"Mostafa Jabari;Amin Rad","doi":"10.26599/TST.2024.9010021","DOIUrl":"https://doi.org/10.26599/TST.2024.9010021","url":null,"abstract":"This paper demonstrates the application of optimization techniques, namely the Dung Beetle Optimizer (DBO) and the Ant-Lion Optimizer (ALO), to enhance the performance of cascaded Proportional Integral Derivative (PID) and Fractional Order PID (FOPID) controllers at the edge of an industrial network for Switched Reluctance Motor (SRM) speed control and torque ripple reduction. These techniques present notable advantages in terms of faster convergence and reduced computational complexity compared to existing optimization methods. Our research employs PID and FOPID controllers to regulate the speed and torque of the SRM, with a comparative analysis of other optimization approaches. In the domain of SRM control, we highlight the significance of the hysteresis band block in mitigating sudden state transitions, especially crucial for ensuring stable operation in the presence of noisy or slightly variable input signals requiring precise control. The results underscore the superior performance of the proposed optimization strategies, particularly showcasing the DBO-based cascaded PID and FOPID controllers, which exhibit reduced torque and current ripples along with improved speed response. Our investigation encompasses diverse loading conditions and is substantiated through time-domain simulations performed using MATLAB/SIMULINK.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1526-1538"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908595","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Enabled Metaverse: Development and Applications
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010054
Haoling Meng;Jianguo Ding;Hongmei Wang;Zhimin Zhang;Xuanxia Yao;Huansheng Ning
{"title":"Blockchain Enabled Metaverse: Development and Applications","authors":"Haoling Meng;Jianguo Ding;Hongmei Wang;Zhimin Zhang;Xuanxia Yao;Huansheng Ning","doi":"10.26599/TST.2024.9010054","DOIUrl":"https://doi.org/10.26599/TST.2024.9010054","url":null,"abstract":"The metaverse has gradually come into the public eye and has become a hotspot in cyberspace, but it still faces many technical difficulties to be solved. Blockchain is a key component of the metaverse, enhancing the development of the metaverse by connecting the real and virtual worlds seamlessly and solving some of the difficulties faced by the metaverse. Our paper comprehensively studies the development and application of blockchain technology in the metaverse. First, there is an introduction to blockchain and the metaverse, followed by a discussion of why blockchain should be integrated into the metaverse. Second, an overview of the main blockchain technologies is provided to evaluate blockchain's role in the metaverse and the value is summarized. Third, the development of future integration of blockchain and metaverse is presented from the perspective of social life and technology. For social life, how to use blockchain in the metaverse to enhance and improve social life is discussed. Then, from the technical perspective, it discusses how blockchain shapes the metaverse. Finally, challenges associated with the integration of blockchain into metaverses are analyzed and some promising research directions and solutions are proposed.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1552-1582"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908672","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HEDMGame: Fragmentation-Aware Mitigation of Heterogeneous Edge DoS Attacks
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010061
Jie Pan;Qiang He;Guangming Cui;Yiwen Zhang;Yun Yang
{"title":"HEDMGame: Fragmentation-Aware Mitigation of Heterogeneous Edge DoS Attacks","authors":"Jie Pan;Qiang He;Guangming Cui;Yiwen Zhang;Yun Yang","doi":"10.26599/TST.2024.9010061","DOIUrl":"https://doi.org/10.26599/TST.2024.9010061","url":null,"abstract":"Mobile Edge Computing (MEC) is a pivotal technology that provides agile-response services by deploying computation and storage resources in proximity to end-users. However, resource-constrained edge servers fall victim to Denial-of-Service (DoS) attacks easily. Failures to mitigate DoS attacks effectively hinder the delivery of reliable and sustainable edge services. Conventional DoS mitigation solutions in cloud computing environments are not directly applicable in MEC environments because their design did not factor in the unique characteristics of MEC environments, e.g., constrained resources on edge servers and requirements for low service latency. Existing solutions mitigate edge DoS attacks by transferring user requests from edge servers under attacks to others for processing. Furthermore, the heterogeneity in end-users' resource demands can cause resource fragmentation on edge servers and undermine the ability of these solutions to mitigate DoS attacks effectively. User requests often have to be transferred far away for processing, which increases the service latency. To tackle this challenge, this paper presents a fragmentation-aware gaming approach called HEDMGame that attempts to minimize service latency by matching user requests to edge servers' remaining resources while making request-transferring decisions. Through theoretical analysis and experimental evaluation, we validate the effectiveness and efficiency of HEDMGame, and demonstrate its superiority over the state-of-the-art solution.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1724-1743"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908668","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信