Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combinin...Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks.展开更多
Dear Editor,D2This letter presents a node feature similarity preserving graph convolutional framework P G.Graph neural networks(GNNs)have garnered significant attention for their efficacy in learning graph representat...Dear Editor,D2This letter presents a node feature similarity preserving graph convolutional framework P G.Graph neural networks(GNNs)have garnered significant attention for their efficacy in learning graph representations across diverse real-world applications.展开更多
Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)t...Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist.展开更多
In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h...In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services.展开更多
Next-GenerationNetworks(NGNs)demand high resilience,dynamic adaptability,and efficient resource utilization to enable ubiquitous connectivity.In this context,the Space-Air-Ground Integrated Network(SAGIN)architecture ...Next-GenerationNetworks(NGNs)demand high resilience,dynamic adaptability,and efficient resource utilization to enable ubiquitous connectivity.In this context,the Space-Air-Ground Integrated Network(SAGIN)architecture is uniquely positioned to meet these requirements.However,conventional NGN routing algorithms often fail to account for SAGIN’s intrinsic characteristics,such as its heterogeneous structure,dynamic topology,and constrained resources,leading to suboptimal performance under disruptions such as node failures or cyberattacks.To meet these demands for SAGIN,this study proposes a resilience-oriented routing optimization framework featuring dynamic weighting and multi-objective evaluation.Methodologically,we define three core routing performance metrics,quantified through a four-dimensionalmodel,encompassing robustness Rd,resilience Rr,adaptability Ra,and resource utilization efficiency Ru,and integrate them into a comprehensive evaluation metric.In simulated SAGIN environments,the proposed Multi-Indicator Weighted Resilience Evaluation Algorithm(MIW-REA)demonstrates significant improvements in resilience enhancement,recovery acceleration,and resource optimization.It maintains 82.3%service availability even with a 30%node failure rate,reduces Distributed Denial of Service(DDoS)attack recovery time by 43%,decreases bandwidth waste by 23.4%,and lowers energy consumption by 18.9%.By addressing challenges unique to the SAGIN network,this research provides a flexible real-time solution for NGN routing optimization that balances resilience,efficiency,and adaptability,advancing the field.展开更多
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener...The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment.展开更多
Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression...Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression is crucial for deploying deep neural network(DNN)models on resource-constrained embedded devices.展开更多
Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status.However,the presentation of the data lacks structural information.Existing single-netwo...Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status.However,the presentation of the data lacks structural information.Existing single-network description technologies are ineffective in representing the temporal and spatial characteristics simultaneously.Therefore,there is a need for complementary methods to address these deficiencies.To address these limitations,this paper proposes an approach that combines Network Snapshots and Temporal Paths for the scheduled system.A dual information network is constructed to assess the degree of operational deviation considering the planning tasks.To validate the effectiveness,discussions are conducted through a modified cosine similarity calculation on theoretical analysis,delay level description,and the ability to identify abnormal dates.Compared to some state-of-the-art methods,the proposed method achieves an average Spearman delay correlation of 0.847 and a relative distance of 3.477.Furthermore,case analyses are invested in regions of China's Mainland,Europe,and the United States,investigating both the overall and sub-regional network fluctuations.To represent the impact of network fluctuations in sub-regions,a response loss value was developed.The times that are prone to fluctuations are also discussed through the classification of time series data.The research can offer a novel approach to system monitoring,providing a research direction that utilizes individual data combined to represent macroscopic states.Our code will be released at https://github.com/daozhong/STPN.git.展开更多
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so...Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement.展开更多
Over the years,Generative Adversarial Networks(GANs)have revolutionized the medical imaging industry for applications such as image synthesis,denoising,super resolution,data augmentation,and cross-modality translation...Over the years,Generative Adversarial Networks(GANs)have revolutionized the medical imaging industry for applications such as image synthesis,denoising,super resolution,data augmentation,and cross-modality translation.The objective of this review is to evaluate the advances,relevances,and limitations of GANs in medical imaging.An organised literature review was conducted following the guidelines of PRISMA(Preferred Reporting Items for Systematic Reviews and Meta-Analyses).The literature considered included peer-reviewed papers published between 2020 and 2025 across databases including PubMed,IEEE Xplore,and Scopus.The studies related to applications of GAN architectures in medical imaging with reported experimental outcomes and published in English in reputable journals and conferences were considered for the review.Thesis,white papers,communication letters,and non-English articles were not included for the same.CLAIM based quality assessment criteria were applied to the included studies to assess the quality.The study classifies diverse GAN architectures,summarizing their clinical applications,technical performances,and their implementation hardships.Key findings reveal the increasing applications of GANs for enhancing diagnostic accuracy,reducing data scarcity through synthetic data generation,and supporting modality translation.However,concerns such as limited generalizability,lack of clinical validation,and regulatory constraints persist.This review provides a comprehensive study of the prevailing scenario of GANs in medical imaging and highlights crucial research gaps and future directions.Though GANs hold transformative capability for medical imaging,their integration into clinical use demands further validation,interpretability,and regulatory alignment.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these netw...Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these networks continue to grow in scale and complexity,the need for energy-efficient,scalable,and robust communication protocols becomes more critical than ever.Metaheuristic algorithms have shown significant promise in addressing these challenges,offering flexible and effective solutions for optimizing WSN performance.Among them,the Grey Wolf Optimizer(GWO)algorithm has attracted growing attention due to its simplicity,fast convergence,and strong global search capabilities.Accordingly,this survey provides an in-depth review of the applications of GWO and its variants for clustering,multi-hop routing,and hybrid cluster-based routing in WSNs.We categorize and analyze the existing GWO-based approaches across these key network optimization tasks,discussing the different problem formulations,decision variables,objective functions,and performance metrics used.In doing so,we examine standard GWO,multi-objective GWO,and hybrid GWO models that incorporate other computational intelligence techniques.Each method is evaluated based on how effectively it addresses the core constraints of WSNs,including energy consumption,communication overhead,and network lifetime.Finally,this survey outlines existing gaps in the literature and proposes potential future research directions aimed at enhancing the effectiveness and real-world applicability of GWO-based techniques for WSN clustering and routing.Our goal is to provide researchers and practitioners with a clear,structured understanding of the current state of GWO in WSNs and inspire further innovation in this evolving field.展开更多
Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning in...Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning into Wi-Fi networks remains challenging,especially in decentralized environments with multiple access points(mAPs).This paper is a short review that summarizes the potential applications of federated reinforcement learning(FRL)across eight key areas of Wi-Fi functionality,including channel access,link adaptation,beamforming,multi-user transmissions,channel bonding,multi-link operation,spatial reuse,and multi-basic servic set(multi-BSS)coordination.FRL is highlighted as a promising framework for enabling decentralized training and decision-making while preserving data privacy.To illustrate its role in practice,we present a case study on link activation in a multi-link operation(MLO)environment with multiple APs.Through theoretical discussion and simulation results,the study demonstrates how FRL can improve performance and reliability,paving the way for more adaptive and collaborative Wi-Fi networks in the era of Wi-Fi 7 and beyond.展开更多
The metal‐reduction‐induced dechlorination coupling(MR-DC)strategy enables the first successful synthesis of an all‐inorganic crosslinked phosphazene network(aPN)from hexachlorocyclotriphosphazene(HCCP)under mild r...The metal‐reduction‐induced dechlorination coupling(MR-DC)strategy enables the first successful synthesis of an all‐inorganic crosslinked phosphazene network(aPN)from hexachlorocyclotriphosphazene(HCCP)under mild reaction conditions.Using Cu as a model,the resulting Cu-aPN(copper‐embedded all‐inorganic phosphazene network)retains the intrinsic N_(3)P_(3)backbone and exhibits an amorphous structure where Cu species are uniformly anchored at dense P/N coordination sites of the network.Time of flight secondary ion mass spectrometry(TOF‐SIMS)and X‐ray diffraction(XRD)reveal a gradual CuCl‐to‐CuO phase conversion during ammonia treatment,which effectively ensures the structural stability of the phosphazene framework.In 1 M KOH,Cu-aPN delivers an overpotential of 280 mV at 10 mA cm^(−2)and a Tafel slope of 48 mV dec^(−1),markedly outperforming Ga-aPN.In situ Raman and density functional theory(DFT)analyses indicate stronger Cu-P/N coordination coupling that lowers the*OH formation barrier(0.39 vs.0.88 eV for Ga).This MR-DC route furnishes a general and versatile pathway for constructing metal‐embedded all‐inorganic phosphazene frameworks with tunable coordination environments for advanced electrocatalytic applications.展开更多
Urbanization is a significant driver of the loss of biodiversity and the disruption of ecosystems.Amphibians are especially vulnerable to the negative impact of urbanization as their life cycles and habitat requiremen...Urbanization is a significant driver of the loss of biodiversity and the disruption of ecosystems.Amphibians are especially vulnerable to the negative impact of urbanization as their life cycles and habitat requirements are complex.The present study investigated the effects of urbanization on amphibian predation networks in suburban Kunming in Yunnan,China and aimed to understand how predation network structure and stability vary with urbanization level.We constructed predation networks by analyzing the stomach contents of amphibians from 12d istinct urbanization gradients.We used the bipartite package in R to evaluate network robustness metrics such as modularity,nestedness,connectivity,and average shortest path length(ASPL).We found that urbanization level is negatively correlated with predation network connectivity(R=−0.67,Ρ=0.02),but there were no significant correlations between urbanization level and nestedness,modularity,or ASPL.Removal of the keystone species destabilized the predation networks at certain locations.The present work highlighted that maintaining prey quantity and diversity preserves predation network connectivity and stabilizes the overall network in urbanizing landscapes.It also underscored the critical role that keystone species play in sustaining network robustness.The results of this research provided insights into the ecological consequences of urbanization.They also suggested that conservation measures should protect the key species and habitats of amphibian predation networks and mitigate the negative impact of urban development on them.展开更多
This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,i...This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,in which only one parameter needs to be adjusted in the power-law terms;this greatly decreases the inconvenience of parameter adjustment.Second,several fixed-time passivity criteria with LMI forms are derived by using a Gauss divergence theorem to deal with the spatial diffusion of nodes and by applying the Hölder’s inequality to dispose rigorously the power-law term greater than one in the designed control scheme;this improves the previous theoretical analysis.Additionally,the fixed-time synchronization of spatiotemporal directed networks with multi-weights is addressed as a direct result of fixed-time strict passivity.Finally,a numerical example is presented in order to show the validity of the theoretical analysis.展开更多
Rapid quantification of seismic-induced damage immediately following an earthquake is critical for determining whether a structure is safe for continued occupation or requires evacuation.This study proposes a novel da...Rapid quantification of seismic-induced damage immediately following an earthquake is critical for determining whether a structure is safe for continued occupation or requires evacuation.This study proposes a novel damage identification method that utilizes limited strain data points,significantly reducing installation,maintenance,and data analysis costs compared to traditional distributed sensor networks.The approach integrates finite element(FE)modeling to generate capacity curves through pushover analysis,incorporates noise-augmented datasets for Artificial Neural Network(ANN)training,and classifies structural conditions into four damage levels:Operational(OP),Immediate Occupancy(IO),Life Safety(LS),and Collapse Prevention(CP).To evaluate the method’s accuracy and efficiency,it was applied to two reinforced concrete(RC)frames;a single-story frame tested experimentally under cyclic loading and a three-story frame analyzed under various lateral load patterns.Strain data from selected beam and column ends were used as ANN inputs,while the corresponding damage classes served as outputs.Confusion matrix results demonstrated high true positive rates(>85%for the single-story and>90%for the three-story frame),even with a reduced number of sensors.The model also exhibited strong robustness to White Gaussian Noise(SNR=2.5-5 dB)and generalized effectively to nonlinear time-history analyses under scaled ground motions(PGA=0.1-1.0 g).Feature selection using the MRMR and ANOVA algorithms further enhanced computational efficiency.Overall,the proposed ANN-based framework has strong potential for real-time structural health monitoring applications.展开更多
This paper introduces a fuzzy C-means-based pooling layer for convolutional neural networks that explicitly models local uncertainty and ambiguity.Conventional pooling operations,such as max and average,apply rigid ag...This paper introduces a fuzzy C-means-based pooling layer for convolutional neural networks that explicitly models local uncertainty and ambiguity.Conventional pooling operations,such as max and average,apply rigid aggregation and often discard fine-grained boundary information.In contrast,our method computes soft membershipswithin each receptive field and aggregates cluster-wise responses throughmembership-weighted pooling,thereby preserving informative structure while reducing dimensionality.Being differentiable,the proposed layer operates as standard two-dimensional pooling.We evaluate our approach across various CNN backbones and open datasets,including CIFAR-10/100,STL-10,LFW,and ImageNette,and further probe small training set restrictions on MNIST and Fashion-MNIST.In these settings,the proposed pooling consistently improves accuracy and weighted F1 over conventional baselines,with particularly strong gains when training data are scarce.Even with less than 1%of the training set,ourmethodmaintains reliable performance,indicating improved sample efficiency and robustness to noisy or ambiguous local patterns.Overall,integrating soft memberships into the pooling operator provides a practical and generalizable inductive bias that enhances robustness and generalization in modern CNN pipelines.展开更多
Physics-informed neural networks(PINNs)have emerged as a promising class of scientific machine learning techniques that integrate governing physical laws into neural network training.Their ability to enforce different...Physics-informed neural networks(PINNs)have emerged as a promising class of scientific machine learning techniques that integrate governing physical laws into neural network training.Their ability to enforce differential equations,constitutive relations,and boundary conditions within the loss function provides a physically grounded alternative to traditional data-driven models,particularly for solid and structural mechanics,where data are often limited or noisy.This review offers a comprehensive assessment of recent developments in PINNs,combining bibliometric analysis,theoretical foundations,application-oriented insights,and methodological innovations.A biblio-metric survey indicates a rapid increase in publications on PINNs since 2018,with prominent research clusters focused on numerical methods,structural analysis,and forecasting.Building upon this trend,the review consolidates advance-ments across five principal application domains,including forward structural analysis,inverse modeling and parameter identification,structural and topology optimization,assessment of structural integrity,and manufacturing processes.These applications are propelled by substantial methodological advancements,encompassing rigorous enforcement of boundary conditions,modified loss functions,adaptive training,domain decomposition strategies,multi-fidelity and transfer learning approaches,as well as hybrid finite element–PINN integration.These advances address recurring challenges in solid mechanics,such as high-order governing equations,material heterogeneity,complex geometries,localized phenomena,and limited experimental data.Despite remaining challenges in computational cost,scalability,and experimental validation,PINNs are increasingly evolving into specialized,physics-aware tools for practical solid and structural mechanics applications.展开更多
In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their ...In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their safe operation,robust verificationmethods are required to ensure their correctness.As one of the formalmethods,symbolic execution offers a viable approach for verifying programmable networks by systematically exploring all possible paths within a program.However,its application in this field encounters scalability issues due to path explosion and complex constraint-solving.Therefore,in this paper,we propose NetVerifier,a scalable verification system for programmable networks.Tomitigate the path explosion issue,we developmultiple pruning strategies that strategically eliminate irrelevant execution paths while preserving verification integrity by precisely identifying the execution paths related to the verification purpose.To address the complex constraint-solving problem,we introduce an execution results reuse solution to avoid redundant computation of the same constraints.To apply these solutions intelligently,a matching algorithm is implemented to automatically select appropriate solutions based on the characteristics of the verification requirement.Moreover,Language Aided Verification(LAV),an assertion language,is designed to express verification intentions in a concise form.Experimental results on diverse open-source programs of varying scales demonstrate NetVerifier’s improvement in scalability and effectiveness in identifying potential network errors.In the best scenario,compared with ASSERT-P4,NetVerifier reduced the execution path,verification time,and memory occupation of the verification process by 99.92%,94.76%,and 65.19%,respectively.展开更多
文摘Optimizing routing and resource allocation in decentralized unmanned aerial vehicle(UAV)networks remains challenging due to interference and rapidly changing topologies.The authors introduce a novel framework combining double deep Q-networks(DDQNs)and graph neural networks(GNNs)for joint routing and resource allocation.The framework uses GNNs to model the network topology and DDQNs to adaptively control routing and resource allocation,addressing interference and improving network performance.Simulation results show that the proposed approach outperforms traditional methods such as Closest-to-Destination(c2Dst),Max-SINR(mSINR),and Multi-Layer Perceptron(MLP)-based models,achieving approximately 23.5% improvement in throughput,50% increase in connection probability,and 17.6% reduction in number of hops,demonstrating its effectiveness in dynamic UAV networks.
基金supported by the National Natural Science Foundation of China(62402399)the New Chongqing Youth Innovation Talent Project(CSTB2024NSCQ-QCXMX0035)。
文摘Dear Editor,D2This letter presents a node feature similarity preserving graph convolutional framework P G.Graph neural networks(GNNs)have garnered significant attention for their efficacy in learning graph representations across diverse real-world applications.
文摘Distributed Denial of Service(DDoS)attacks are one of the severe threats to network infrastructure,sometimes bypassing traditional diagnosis algorithms because of their evolving complexity.PresentMachine Learning(ML)techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times.However,such techniques sometimes fail to capture complicated relations among various traffic flows.In this paper,we present a new multi-scale ensemble strategy given the Graph Neural Networks(GNNs)for improving DDoS detection.Our technique divides traffic into macro-and micro-level elements,letting various GNN models to get the two corase-scale anomalies and subtle,stealthy attack models.Through modeling network traffic as graph-structured data,GNNs efficiently learn intricate relations among network entities.The proposed ensemble learning algorithm combines the results of several GNNs to improve generalization,robustness,and scalability.Extensive experiments on three benchmark datasets—UNSW-NB15,CICIDS2017,and CICDDoS2019—show that our approach outperforms traditional machine learning and deep learning models in detecting both high-rate and low-rate(stealthy)DDoS attacks,with significant improvements in accuracy and recall.These findings demonstrate the suggested method’s applicability and robustness for real-world implementation in contexts where several DDoS patterns coexist.
基金funding from the European Commission by the Ruralities project(grant agreement no.101060876).
文摘In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services.
基金supported by the Beijing Natural Science Foundation under Grant 9242003partially supported by the Natural Science Foundation of Chongqing,China under Grant CSTB2023NSCQ-MSX0391+3 种基金partially supported by the National Natural Science Foundation of China under Grant 62471493partially supported by the Natural Science Foundation of Shandong Province under Grants ZR2023LZH017,ZR2024MF066supported by the Key Laboratory of Public Opinion Governance and Computational Communication under Grant YQKFYB202501The Research Project on the Development of Social Sciences in Hebei Province in 2024(No.202403150).
文摘Next-GenerationNetworks(NGNs)demand high resilience,dynamic adaptability,and efficient resource utilization to enable ubiquitous connectivity.In this context,the Space-Air-Ground Integrated Network(SAGIN)architecture is uniquely positioned to meet these requirements.However,conventional NGN routing algorithms often fail to account for SAGIN’s intrinsic characteristics,such as its heterogeneous structure,dynamic topology,and constrained resources,leading to suboptimal performance under disruptions such as node failures or cyberattacks.To meet these demands for SAGIN,this study proposes a resilience-oriented routing optimization framework featuring dynamic weighting and multi-objective evaluation.Methodologically,we define three core routing performance metrics,quantified through a four-dimensionalmodel,encompassing robustness Rd,resilience Rr,adaptability Ra,and resource utilization efficiency Ru,and integrate them into a comprehensive evaluation metric.In simulated SAGIN environments,the proposed Multi-Indicator Weighted Resilience Evaluation Algorithm(MIW-REA)demonstrates significant improvements in resilience enhancement,recovery acceleration,and resource optimization.It maintains 82.3%service availability even with a 30%node failure rate,reduces Distributed Denial of Service(DDoS)attack recovery time by 43%,decreases bandwidth waste by 23.4%,and lowers energy consumption by 18.9%.By addressing challenges unique to the SAGIN network,this research provides a flexible real-time solution for NGN routing optimization that balances resilience,efficiency,and adaptability,advancing the field.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(RS-2025-00559546)supported by the IITP(Institute of Information&Coummunications Technology Planning&Evaluation)-ITRC(Information Technology Research Center)grant funded by the Korea government(Ministry of Science and ICT)(IITP-2025-RS-2023-00259004).
文摘The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment.
基金supported by the Science and Technology Innovation Key R&D Program of Chongqing(CSTB2025TIAD-STX0032)National Key Research and Development Program of China(2024YFF0908200)+1 种基金the Chongqing Technology Innovation and Application Development Special Key Project(CSTB2024TIAD-KPX0018)the Southwest University Graduate Student Research Innovation(SWUB24051)。
文摘Dear Editor,The letter proposes a tensor low-rank orthogonal compression(TLOC)model for a convolutional neural network(CNN),which facilitates its efficient and highly-accurate low-rank representation.Model compression is crucial for deploying deep neural network(DNN)models on resource-constrained embedded devices.
文摘Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status.However,the presentation of the data lacks structural information.Existing single-network description technologies are ineffective in representing the temporal and spatial characteristics simultaneously.Therefore,there is a need for complementary methods to address these deficiencies.To address these limitations,this paper proposes an approach that combines Network Snapshots and Temporal Paths for the scheduled system.A dual information network is constructed to assess the degree of operational deviation considering the planning tasks.To validate the effectiveness,discussions are conducted through a modified cosine similarity calculation on theoretical analysis,delay level description,and the ability to identify abnormal dates.Compared to some state-of-the-art methods,the proposed method achieves an average Spearman delay correlation of 0.847 and a relative distance of 3.477.Furthermore,case analyses are invested in regions of China's Mainland,Europe,and the United States,investigating both the overall and sub-regional network fluctuations.To represent the impact of network fluctuations in sub-regions,a response loss value was developed.The times that are prone to fluctuations are also discussed through the classification of time series data.The research can offer a novel approach to system monitoring,providing a research direction that utilizes individual data combined to represent macroscopic states.Our code will be released at https://github.com/daozhong/STPN.git.
文摘Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement.
基金supported by Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/540/46.
文摘Over the years,Generative Adversarial Networks(GANs)have revolutionized the medical imaging industry for applications such as image synthesis,denoising,super resolution,data augmentation,and cross-modality translation.The objective of this review is to evaluate the advances,relevances,and limitations of GANs in medical imaging.An organised literature review was conducted following the guidelines of PRISMA(Preferred Reporting Items for Systematic Reviews and Meta-Analyses).The literature considered included peer-reviewed papers published between 2020 and 2025 across databases including PubMed,IEEE Xplore,and Scopus.The studies related to applications of GAN architectures in medical imaging with reported experimental outcomes and published in English in reputable journals and conferences were considered for the review.Thesis,white papers,communication letters,and non-English articles were not included for the same.CLAIM based quality assessment criteria were applied to the included studies to assess the quality.The study classifies diverse GAN architectures,summarizing their clinical applications,technical performances,and their implementation hardships.Key findings reveal the increasing applications of GANs for enhancing diagnostic accuracy,reducing data scarcity through synthetic data generation,and supporting modality translation.However,concerns such as limited generalizability,lack of clinical validation,and regulatory constraints persist.This review provides a comprehensive study of the prevailing scenario of GANs in medical imaging and highlights crucial research gaps and future directions.Though GANs hold transformative capability for medical imaging,their integration into clinical use demands further validation,interpretability,and regulatory alignment.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
文摘Wireless Sensor Networks(WSNs)have become foundational in numerous real-world applications,ranging from environmental monitoring and industrial automation to healthcare systems and smart city development.As these networks continue to grow in scale and complexity,the need for energy-efficient,scalable,and robust communication protocols becomes more critical than ever.Metaheuristic algorithms have shown significant promise in addressing these challenges,offering flexible and effective solutions for optimizing WSN performance.Among them,the Grey Wolf Optimizer(GWO)algorithm has attracted growing attention due to its simplicity,fast convergence,and strong global search capabilities.Accordingly,this survey provides an in-depth review of the applications of GWO and its variants for clustering,multi-hop routing,and hybrid cluster-based routing in WSNs.We categorize and analyze the existing GWO-based approaches across these key network optimization tasks,discussing the different problem formulations,decision variables,objective functions,and performance metrics used.In doing so,we examine standard GWO,multi-objective GWO,and hybrid GWO models that incorporate other computational intelligence techniques.Each method is evaluated based on how effectively it addresses the core constraints of WSNs,including energy consumption,communication overhead,and network lifetime.Finally,this survey outlines existing gaps in the literature and proposes potential future research directions aimed at enhancing the effectiveness and real-world applicability of GWO-based techniques for WSN clustering and routing.Our goal is to provide researchers and practitioners with a clear,structured understanding of the current state of GWO in WSNs and inspire further innovation in this evolving field.
基金funded by the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,Saudi Arabia,grant number RG-2-611-42(A.O.A.).
文摘Wi-Fi technology has evolved significantly since its introduction in 1997,advancing to Wi-Fi 6 as the latest standard,with Wi-Fi 7 currently under development.Despite these advancements,integrating machine learning into Wi-Fi networks remains challenging,especially in decentralized environments with multiple access points(mAPs).This paper is a short review that summarizes the potential applications of federated reinforcement learning(FRL)across eight key areas of Wi-Fi functionality,including channel access,link adaptation,beamforming,multi-user transmissions,channel bonding,multi-link operation,spatial reuse,and multi-basic servic set(multi-BSS)coordination.FRL is highlighted as a promising framework for enabling decentralized training and decision-making while preserving data privacy.To illustrate its role in practice,we present a case study on link activation in a multi-link operation(MLO)environment with multiple APs.Through theoretical discussion and simulation results,the study demonstrates how FRL can improve performance and reliability,paving the way for more adaptive and collaborative Wi-Fi networks in the era of Wi-Fi 7 and beyond.
基金financially supported by the National Natural Science Foundation of China(Grant 22205173)the Innovation Capability Support Program of Shaanxi(Grant 2024CX‐GXPT‐12)。
文摘The metal‐reduction‐induced dechlorination coupling(MR-DC)strategy enables the first successful synthesis of an all‐inorganic crosslinked phosphazene network(aPN)from hexachlorocyclotriphosphazene(HCCP)under mild reaction conditions.Using Cu as a model,the resulting Cu-aPN(copper‐embedded all‐inorganic phosphazene network)retains the intrinsic N_(3)P_(3)backbone and exhibits an amorphous structure where Cu species are uniformly anchored at dense P/N coordination sites of the network.Time of flight secondary ion mass spectrometry(TOF‐SIMS)and X‐ray diffraction(XRD)reveal a gradual CuCl‐to‐CuO phase conversion during ammonia treatment,which effectively ensures the structural stability of the phosphazene framework.In 1 M KOH,Cu-aPN delivers an overpotential of 280 mV at 10 mA cm^(−2)and a Tafel slope of 48 mV dec^(−1),markedly outperforming Ga-aPN.In situ Raman and density functional theory(DFT)analyses indicate stronger Cu-P/N coordination coupling that lowers the*OH formation barrier(0.39 vs.0.88 eV for Ga).This MR-DC route furnishes a general and versatile pathway for constructing metal‐embedded all‐inorganic phosphazene frameworks with tunable coordination environments for advanced electrocatalytic applications.
基金supported by Yunnan Fundamental Research Projects(202501BD070001-081).
文摘Urbanization is a significant driver of the loss of biodiversity and the disruption of ecosystems.Amphibians are especially vulnerable to the negative impact of urbanization as their life cycles and habitat requirements are complex.The present study investigated the effects of urbanization on amphibian predation networks in suburban Kunming in Yunnan,China and aimed to understand how predation network structure and stability vary with urbanization level.We constructed predation networks by analyzing the stomach contents of amphibians from 12d istinct urbanization gradients.We used the bipartite package in R to evaluate network robustness metrics such as modularity,nestedness,connectivity,and average shortest path length(ASPL).We found that urbanization level is negatively correlated with predation network connectivity(R=−0.67,Ρ=0.02),but there were no significant correlations between urbanization level and nestedness,modularity,or ASPL.Removal of the keystone species destabilized the predation networks at certain locations.The present work highlighted that maintaining prey quantity and diversity preserves predation network connectivity and stabilizes the overall network in urbanizing landscapes.It also underscored the critical role that keystone species play in sustaining network robustness.The results of this research provided insights into the ecological consequences of urbanization.They also suggested that conservation measures should protect the key species and habitats of amphibian predation networks and mitigate the negative impact of urban development on them.
基金supported by the National Natural Science Foundation of China(62373317)the Tianshan Talent Training Program(2022TSYCCX0013)+3 种基金the Key Project of Natural Science Foundation of Xinjiang(2021D01D10)the Basic Research Foundation for Universities of Xinjiang(XJEDU2023P023)the Xinjiang Key Laboratory of Applied Mathematics(XJDX1401)the Intelligent Control and Optimization Research Platform in Xinjiang University.
文摘This paper is dedicated to fixed-time passivity and synchronization for multi-weighted spatiotemporal directed networks.First,to achieve fixed-time passivity,a type of decentralized power-law controller is developed,in which only one parameter needs to be adjusted in the power-law terms;this greatly decreases the inconvenience of parameter adjustment.Second,several fixed-time passivity criteria with LMI forms are derived by using a Gauss divergence theorem to deal with the spatial diffusion of nodes and by applying the Hölder’s inequality to dispose rigorously the power-law term greater than one in the designed control scheme;this improves the previous theoretical analysis.Additionally,the fixed-time synchronization of spatiotemporal directed networks with multi-weights is addressed as a direct result of fixed-time strict passivity.Finally,a numerical example is presented in order to show the validity of the theoretical analysis.
基金funded by UTM Fundamental Research Grant(PY/2024/01221,Cost centre no.:Q.J130000.3822.23H73)HiCoE Grant Scheme(Cost centre no.:R.J130000.7822.4J738)。
文摘Rapid quantification of seismic-induced damage immediately following an earthquake is critical for determining whether a structure is safe for continued occupation or requires evacuation.This study proposes a novel damage identification method that utilizes limited strain data points,significantly reducing installation,maintenance,and data analysis costs compared to traditional distributed sensor networks.The approach integrates finite element(FE)modeling to generate capacity curves through pushover analysis,incorporates noise-augmented datasets for Artificial Neural Network(ANN)training,and classifies structural conditions into four damage levels:Operational(OP),Immediate Occupancy(IO),Life Safety(LS),and Collapse Prevention(CP).To evaluate the method’s accuracy and efficiency,it was applied to two reinforced concrete(RC)frames;a single-story frame tested experimentally under cyclic loading and a three-story frame analyzed under various lateral load patterns.Strain data from selected beam and column ends were used as ANN inputs,while the corresponding damage classes served as outputs.Confusion matrix results demonstrated high true positive rates(>85%for the single-story and>90%for the three-story frame),even with a reduced number of sensors.The model also exhibited strong robustness to White Gaussian Noise(SNR=2.5-5 dB)and generalized effectively to nonlinear time-history analyses under scaled ground motions(PGA=0.1-1.0 g).Feature selection using the MRMR and ANOVA algorithms further enhanced computational efficiency.Overall,the proposed ANN-based framework has strong potential for real-time structural health monitoring applications.
文摘This paper introduces a fuzzy C-means-based pooling layer for convolutional neural networks that explicitly models local uncertainty and ambiguity.Conventional pooling operations,such as max and average,apply rigid aggregation and often discard fine-grained boundary information.In contrast,our method computes soft membershipswithin each receptive field and aggregates cluster-wise responses throughmembership-weighted pooling,thereby preserving informative structure while reducing dimensionality.Being differentiable,the proposed layer operates as standard two-dimensional pooling.We evaluate our approach across various CNN backbones and open datasets,including CIFAR-10/100,STL-10,LFW,and ImageNette,and further probe small training set restrictions on MNIST and Fashion-MNIST.In these settings,the proposed pooling consistently improves accuracy and weighted F1 over conventional baselines,with particularly strong gains when training data are scarce.Even with less than 1%of the training set,ourmethodmaintains reliable performance,indicating improved sample efficiency and robustness to noisy or ambiguous local patterns.Overall,integrating soft memberships into the pooling operator provides a practical and generalizable inductive bias that enhances robustness and generalization in modern CNN pipelines.
基金funded by National Research Council of Thailand(contract No.N42A671047).
文摘Physics-informed neural networks(PINNs)have emerged as a promising class of scientific machine learning techniques that integrate governing physical laws into neural network training.Their ability to enforce differential equations,constitutive relations,and boundary conditions within the loss function provides a physically grounded alternative to traditional data-driven models,particularly for solid and structural mechanics,where data are often limited or noisy.This review offers a comprehensive assessment of recent developments in PINNs,combining bibliometric analysis,theoretical foundations,application-oriented insights,and methodological innovations.A biblio-metric survey indicates a rapid increase in publications on PINNs since 2018,with prominent research clusters focused on numerical methods,structural analysis,and forecasting.Building upon this trend,the review consolidates advance-ments across five principal application domains,including forward structural analysis,inverse modeling and parameter identification,structural and topology optimization,assessment of structural integrity,and manufacturing processes.These applications are propelled by substantial methodological advancements,encompassing rigorous enforcement of boundary conditions,modified loss functions,adaptive training,domain decomposition strategies,multi-fidelity and transfer learning approaches,as well as hybrid finite element–PINN integration.These advances address recurring challenges in solid mechanics,such as high-order governing equations,material heterogeneity,complex geometries,localized phenomena,and limited experimental data.Despite remaining challenges in computational cost,scalability,and experimental validation,PINNs are increasingly evolving into specialized,physics-aware tools for practical solid and structural mechanics applications.
基金supported by the National Key Research and Development Program of China under Grant 2023YFB2903902in part by the Science and Technology Innovation Leading Talents Subsidy Project of Central Plains under Grant 244200510038.
文摘In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their safe operation,robust verificationmethods are required to ensure their correctness.As one of the formalmethods,symbolic execution offers a viable approach for verifying programmable networks by systematically exploring all possible paths within a program.However,its application in this field encounters scalability issues due to path explosion and complex constraint-solving.Therefore,in this paper,we propose NetVerifier,a scalable verification system for programmable networks.Tomitigate the path explosion issue,we developmultiple pruning strategies that strategically eliminate irrelevant execution paths while preserving verification integrity by precisely identifying the execution paths related to the verification purpose.To address the complex constraint-solving problem,we introduce an execution results reuse solution to avoid redundant computation of the same constraints.To apply these solutions intelligently,a matching algorithm is implemented to automatically select appropriate solutions based on the characteristics of the verification requirement.Moreover,Language Aided Verification(LAV),an assertion language,is designed to express verification intentions in a concise form.Experimental results on diverse open-source programs of varying scales demonstrate NetVerifier’s improvement in scalability and effectiveness in identifying potential network errors.In the best scenario,compared with ASSERT-P4,NetVerifier reduced the execution path,verification time,and memory occupation of the verification process by 99.92%,94.76%,and 65.19%,respectively.