首页 > 最新文献

Journal of Information and Intelligence最新文献

英文 中文
An efficient machine learning-enhanced DTCO framework for low-power and high-performance circuit design 一种高效的机器学习增强DTCO框架,用于低功耗和高性能电路设计
Pub Date : 2025-05-01 DOI: 10.1016/j.jiixd.2025.02.001
Mingyang Liu , Zhengguang Tang , Hailong You , Cong Li , Guangxin Guo , Zeyuan Wang , Linying Zhang , Xingming Liu , Yu Wang , Yong Dai , Geng Bai , Xiaoling Lin
The standard design technology co-optimization (DTCO) involves frequent interactions between circuit design and process manufacturing, which requires several months. To assist designers in establishing a bridge between device parameters and circuit metrics efficiently, and provide guidance for parameter optimization in the early stages of circuit design. In this paper, we propose an efficient machine learning (ML)-enhanced DTCO framework. This framework achieves the co-optimization of device parameters and circuit metrics. We select the gate metal work function (WF) as the parameter to validate the effectiveness of our framework. And the ridge regression approach is used to bypass TCAD simulation, compact model extraction and cell library characterization. We reduces time consumption by at least 92% compared to traditional DTCO framework, while ensuring that errors of delay, internal power consumption and leakage power below 4 ps, 0.035 ​mJ, and 0.4 μW, respectively. By adjusting the WF, we achieved a better balance between circuit delay and power consumption. This work contributes to designers exploring a broader design space and achieving a efficient DTCO flow.
标准设计技术协同优化(DTCO)涉及电路设计和工艺制造之间的频繁交互,需要数月的时间。协助设计人员有效地在器件参数和电路指标之间建立桥梁,为电路设计初期的参数优化提供指导。在本文中,我们提出了一个高效的机器学习(ML)增强的DTCO框架。该框架实现了器件参数和电路指标的协同优化。我们选择闸门金属功函数(WF)作为参数来验证框架的有效性。脊回归方法可以绕过TCAD仿真、紧凑模型提取和细胞库表征。与传统的DTCO框架相比,我们将时间消耗降低了至少92%,同时确保延迟、内部功耗和泄漏功率的误差分别低于4 ps、0.035 mJ和0.4 μW。通过调整WF,我们在电路延迟和功耗之间取得了更好的平衡。这项工作有助于设计师探索更广阔的设计空间,实现高效的DTCO流程。
{"title":"An efficient machine learning-enhanced DTCO framework for low-power and high-performance circuit design","authors":"Mingyang Liu ,&nbsp;Zhengguang Tang ,&nbsp;Hailong You ,&nbsp;Cong Li ,&nbsp;Guangxin Guo ,&nbsp;Zeyuan Wang ,&nbsp;Linying Zhang ,&nbsp;Xingming Liu ,&nbsp;Yu Wang ,&nbsp;Yong Dai ,&nbsp;Geng Bai ,&nbsp;Xiaoling Lin","doi":"10.1016/j.jiixd.2025.02.001","DOIUrl":"10.1016/j.jiixd.2025.02.001","url":null,"abstract":"<div><div>The standard design technology co-optimization (DTCO) involves frequent interactions between circuit design and process manufacturing, which requires several months. To assist designers in establishing a bridge between device parameters and circuit metrics efficiently, and provide guidance for parameter optimization in the early stages of circuit design. In this paper, we propose an efficient machine learning (ML)-enhanced DTCO framework. This framework achieves the co-optimization of device parameters and circuit metrics. We select the gate metal work function (WF) as the parameter to validate the effectiveness of our framework. And the ridge regression approach is used to bypass TCAD simulation, compact model extraction and cell library characterization. We reduces time consumption by at least 92% compared to traditional DTCO framework, while ensuring that errors of delay, internal power consumption and leakage power below 4 ps, 0.035 ​mJ, and 0.4 μW, respectively. By adjusting the WF, we achieved a better balance between circuit delay and power consumption. This work contributes to designers exploring a broader design space and achieving a efficient DTCO flow.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 3","pages":"Pages 194-209"},"PeriodicalIF":0.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144490375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource allocation for coexistence of eMBB and bursty URLLC based on queueing with preemption 基于抢占排队的eMBB和突发URLLC共存资源分配
Pub Date : 2025-05-01 DOI: 10.1016/j.jiixd.2025.03.003
Wei Guo , Kai Liang , Yuewen Song , Xiaoli Chu , Gan Zheng , Kai-Kit Wong
Enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) are two critical services in 5G mobile networks. While there has been extensive research on their coexistence, few studies have considered the impact of bursty URLLC on their coexistence performance. In this paper, we propose a method to allocate computing and radio resources for coexisting eMBB and bursty URLLC services by preempting both computing queues in the base station (BS) and time-frequency resources at the air interface. Specifically, we first divide the computing resources at the BS into a shared part for both URLLC and eMBB users and an exclusive part only for eMBB users, and propose a queuing mechanism with preemptive-resume priority for accessing the shared computing resources. Furthermore, we propose a preemptive puncturing method and a threshold-based queuing mechanism in the air interface to enable the multiplexing of eMBB and URLLC on shared time-frequency resources. We analytically derive the average queuing delay, average computation delay, and average transmission delay of eMBB and URLLC packets. Based on this analysis, we formulate a mixed-integer nonlinear programming problem to minimize the average delay of URLLC packets while satisfying the average delay and throughput requirements of eMBB by jointly optimizing the eMBB subcarrier allocation, the URLLC subcarrier scheduling and the computing resource allocation. We decompose this problem into three sub-problems and solve them alternately using a block coordinate descent algorithm. Numerical results show that our proposed method reduces the outage probability and average delay of URLLC compared to the existing works.
增强型移动宽带(eMBB)和超可靠低延迟通信(URLLC)是5G移动网络中的两项关键业务。虽然对它们的共存进行了大量的研究,但很少有研究考虑突发URLLC对它们共存性能的影响。本文提出了一种通过抢占基站(BS)的计算队列和空中接口的时频资源,为同时存在的eMBB和突发URLLC业务分配计算和无线电资源的方法。具体而言,我们首先将BS的计算资源划分为URLLC和eMBB用户共享的部分和eMBB用户独占的部分,并提出了一种具有抢占-恢复优先级的访问共享计算资源的排队机制。此外,我们提出了一种先发制人的穿刺方法和基于阈值的空中接口排队机制,以实现eMBB和URLLC在共享时频资源上的复用。分析了eMBB和URLLC包的平均排队延迟、平均计算延迟和平均传输延迟。在此基础上,通过对eMBB子载波分配、URLLC子载波调度和计算资源分配进行联合优化,提出了在满足eMBB平均时延和吞吐量要求的同时最小化URLLC数据包平均时延的混合整数非线性规划问题。我们将该问题分解为三个子问题,并使用块坐标下降算法交替求解。数值计算结果表明,与现有工程相比,该方法降低了URLLC的中断概率和平均延迟。
{"title":"Resource allocation for coexistence of eMBB and bursty URLLC based on queueing with preemption","authors":"Wei Guo ,&nbsp;Kai Liang ,&nbsp;Yuewen Song ,&nbsp;Xiaoli Chu ,&nbsp;Gan Zheng ,&nbsp;Kai-Kit Wong","doi":"10.1016/j.jiixd.2025.03.003","DOIUrl":"10.1016/j.jiixd.2025.03.003","url":null,"abstract":"<div><div>Enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) are two critical services in 5G mobile networks. While there has been extensive research on their coexistence, few studies have considered the impact of bursty URLLC on their coexistence performance. In this paper, we propose a method to allocate computing and radio resources for coexisting eMBB and bursty URLLC services by preempting both computing queues in the base station (BS) and time-frequency resources at the air interface. Specifically, we first divide the computing resources at the BS into a shared part for both URLLC and eMBB users and an exclusive part only for eMBB users, and propose a queuing mechanism with preemptive-resume priority for accessing the shared computing resources. Furthermore, we propose a preemptive puncturing method and a threshold-based queuing mechanism in the air interface to enable the multiplexing of eMBB and URLLC on shared time-frequency resources. We analytically derive the average queuing delay, average computation delay, and average transmission delay of eMBB and URLLC packets. Based on this analysis, we formulate a mixed-integer nonlinear programming problem to minimize the average delay of URLLC packets while satisfying the average delay and throughput requirements of eMBB by jointly optimizing the eMBB subcarrier allocation, the URLLC subcarrier scheduling and the computing resource allocation. We decompose this problem into three sub-problems and solve them alternately using a block coordinate descent algorithm. Numerical results show that our proposed method reduces the outage probability and average delay of URLLC compared to the existing works.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 3","pages":"Pages 223-241"},"PeriodicalIF":0.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144490377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal emotion recognition method in complex dynamic scenes 复杂动态场景中的多模态情感识别方法
Pub Date : 2025-05-01 DOI: 10.1016/j.jiixd.2025.02.004
Long Liu , Qingquan Luo , Wenbo Zhang , Mengxuan Zhang , Bowen Zhai
Multimodal emotion recognition technology leverages the power of deep learning to address advanced visual and emotional tasks. While generic deep networks can handle simple emotion recognition tasks, their generalization capability in complex and noisy environments, such as multi-scene outdoor settings, remains limited. To overcome these challenges, this paper proposes a novel multimodal emotion recognition framework. First, we develop a robust network architecture based on the T5-small model, designed for dynamic-static fusion in complex scenarios, effectively mitigating the impact of noise. Second, we introduce a dynamic-static cross fusion network (D-SCFN) to enhance the integration and extraction of dynamic and static information, embedding it seamlessly within the T5 framework. Finally, we design and evaluate three distinct multi-task analysis frameworks to explore dependencies among tasks. The experimental results demonstrate that our model significantly outperforms other existing models, showcasing exceptional stability and remarkable adaptability to complex and dynamic scenarios.
多模态情感识别技术利用深度学习的力量来解决高级视觉和情感任务。虽然通用深度网络可以处理简单的情绪识别任务,但它们在复杂和嘈杂环境(如多场景户外环境)中的泛化能力仍然有限。为了克服这些挑战,本文提出了一种新的多模态情感识别框架。首先,我们开发了基于T5-small模型的鲁棒网络架构,设计用于复杂场景下的动态-静态融合,有效减轻噪声的影响。其次,我们引入了一种动态-静态交叉融合网络(D-SCFN)来增强动态和静态信息的集成和提取,并将其无缝嵌入到T5框架中。最后,我们设计并评估了三个不同的多任务分析框架,以探索任务之间的依赖关系。实验结果表明,我们的模型明显优于其他现有模型,表现出优异的稳定性和对复杂和动态场景的卓越适应性。
{"title":"Multimodal emotion recognition method in complex dynamic scenes","authors":"Long Liu ,&nbsp;Qingquan Luo ,&nbsp;Wenbo Zhang ,&nbsp;Mengxuan Zhang ,&nbsp;Bowen Zhai","doi":"10.1016/j.jiixd.2025.02.004","DOIUrl":"10.1016/j.jiixd.2025.02.004","url":null,"abstract":"<div><div>Multimodal emotion recognition technology leverages the power of deep learning to address advanced visual and emotional tasks. While generic deep networks can handle simple emotion recognition tasks, their generalization capability in complex and noisy environments, such as multi-scene outdoor settings, remains limited. To overcome these challenges, this paper proposes a novel multimodal emotion recognition framework. First, we develop a robust network architecture based on the T5-small model, designed for dynamic-static fusion in complex scenarios, effectively mitigating the impact of noise. Second, we introduce a dynamic-static cross fusion network (D-SCFN) to enhance the integration and extraction of dynamic and static information, embedding it seamlessly within the T5 framework. Finally, we design and evaluate three distinct multi-task analysis frameworks to explore dependencies among tasks. The experimental results demonstrate that our model significantly outperforms other existing models, showcasing exceptional stability and remarkable adaptability to complex and dynamic scenarios.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 3","pages":"Pages 257-274"},"PeriodicalIF":0.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144490379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks 双重防御:结合先发制人的成员排除和知识蒸馏来减轻成员推理攻击
Pub Date : 2025-01-01 DOI: 10.1016/j.jiixd.2024.06.002
Jun Niu , Peng Liu , Chunhui Huang , Yangming Zhang , Moxuan Zeng , Kuo Shen , Yangzhong Wang , Suyu An , Yulong Shen , Xiaohong Jiang , Jianfeng Ma , He Wang , Gaofei Wu , Anmin Fu , Chunjie Cao , Xiaoyan Zhu , Yuqing Zhang
Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. Existing MI defenses protect the membership privacy through preemptive exclusion of members techniques and knowledge distillation. Unfortunately, using either of these two defenses alone, the defense effect can still offers an unsatisfactory trade-off between membership privacy and utility.
Given that the defense method that directly combines these two defenses is still very limited (e.g., the test accuracy of the target model is decreased by about 40% (in our experiments)), in this work, we propose a dual defense (DD) method that includes the preemptive exclusion of high-risk member samples module and the knowledge distillation module, which thwarts the access of the resulting models to the private training data twice to mitigate MI attacks. Our defense method can be divided into two steps: the preemptive exclusion of high-risk member samples (Step 1) and the knowledge distillation to obtain the protected student model (Step 2). We propose three types of exclusions: existing MI attacks-based exclusions, sample distances of members and nonmembers-based exclusions, and mutual information value-based exclusions, to preemptively exclude the high-risk member samples. During the knowledge distillation phase, we add ground-truth labeled data to the reference dataset to decrease the protected student model's dependency on soft labels, aiming to maintain or improve its test accuracy. Extensive evaluation shows that DD significantly outperforms state-of-the-art defenses and offers a better privacy-utility trade-off. For example, DD achieves ∼100% test accuracy improvement over the distillation for membership privacy (DMP) defense for ResNet50 trained on CIFAR100. DD simultaneously achieves the reductions in the attack effectiveness (e.g., the [email protected]%FPR of enhanced MI attacks decreased by 2.10% on the ImageNet dataset, the membership advantage (MA) of risk score-based attacks decreased by 56.30%) and improvements of the target models' test accuracies (e.g., by 42.80% on CIFAR100).
成员推理(MI)攻击通过确定给定数据示例是否已用于训练目标模型来威胁用户隐私。现有的信息交换防御通过先发制人的成员排除技术和知识蒸馏来保护成员隐私。不幸的是,单独使用这两种防御中的任何一种,防御效果仍然可能在成员隐私和效用之间提供令人不满意的权衡。鉴于直接结合这两种防御的防御方法仍然非常有限(例如,目标模型的测试精度降低了约40%(在我们的实验中)),在这项工作中,我们提出了一种双重防御(DD)方法,该方法包括抢先排除高风险成员样本模块和知识蒸馏模块,该方法阻止了结果模型对私有训练数据的两次访问,以缓解MI攻击。我们的防御方法分为两步:首先是对高风险成员样本的先发制人排除(步骤1),其次是对受保护学生模型的知识提炼(步骤2)。我们提出了基于现有MI攻击的排除、基于成员和非成员样本距离的排除和基于相互信息价值的排除三种类型的排除,以先发制人地排除高风险成员样本。在知识蒸馏阶段,我们在参考数据集中添加了真实标记数据,以减少受保护学生模型对软标签的依赖,以保持或提高其测试精度。广泛的评估表明,DD显著优于最先进的防御,并提供了更好的隐私效用权衡。例如,对于在CIFAR100上训练的ResNet50, DD在成员隐私(DMP)防御的蒸馏上实现了~ 100%的测试精度提高。DD同时实现了攻击有效性的降低(例如,增强MI攻击的[email protected]%FPR在ImageNet数据集上降低了2.10%,基于风险评分的攻击的隶属度优势(MA)降低了56.30%)和目标模型测试准确性的提高(例如,在CIFAR100上提高了42.80%)。
{"title":"Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks","authors":"Jun Niu ,&nbsp;Peng Liu ,&nbsp;Chunhui Huang ,&nbsp;Yangming Zhang ,&nbsp;Moxuan Zeng ,&nbsp;Kuo Shen ,&nbsp;Yangzhong Wang ,&nbsp;Suyu An ,&nbsp;Yulong Shen ,&nbsp;Xiaohong Jiang ,&nbsp;Jianfeng Ma ,&nbsp;He Wang ,&nbsp;Gaofei Wu ,&nbsp;Anmin Fu ,&nbsp;Chunjie Cao ,&nbsp;Xiaoyan Zhu ,&nbsp;Yuqing Zhang","doi":"10.1016/j.jiixd.2024.06.002","DOIUrl":"10.1016/j.jiixd.2024.06.002","url":null,"abstract":"<div><div>Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. Existing MI defenses protect the membership privacy through preemptive exclusion of members techniques and knowledge distillation. Unfortunately, using either of these two defenses alone, the defense effect can still offers an unsatisfactory trade-off between membership privacy and utility.</div><div>Given that the defense method that directly combines these two defenses is still very limited (e.g., the test accuracy of the target model is decreased by about 40% (in our experiments)), in this work, we propose a dual defense (DD) method that includes the preemptive exclusion of high-risk member samples module and the knowledge distillation module, which thwarts the access of the resulting models to the private training data twice to mitigate MI attacks. Our defense method can be divided into two steps: the preemptive exclusion of high-risk member samples (Step 1) and the knowledge distillation to obtain the protected student model (Step 2). We propose three types of exclusions: existing MI attacks-based exclusions, sample distances of members and nonmembers-based exclusions, and mutual information value-based exclusions, to preemptively exclude the high-risk member samples. During the knowledge distillation phase, we add ground-truth labeled data to the reference dataset to decrease the protected student model's dependency on soft labels, aiming to maintain or improve its test accuracy. Extensive evaluation shows that DD significantly outperforms state-of-the-art defenses and offers a better privacy-utility trade-off. For example, DD achieves ∼100% test accuracy improvement over the distillation for membership privacy (DMP) defense for ResNet50 trained on CIFAR100. DD simultaneously achieves the reductions in the attack effectiveness (e.g., the [email protected]%FPR of enhanced MI attacks decreased by 2.10% on the ImageNet dataset, the membership advantage (MA) of risk score-based attacks decreased by 56.30%) and improvements of the target models' test accuracies (e.g., by 42.80% on CIFAR100).</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 68-92"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143148335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting brain-computer interface performance through cognitive training: A brain-centric approach 通过认知训练提升脑机接口性能:一种以大脑为中心的方法。
Pub Date : 2025-01-01 DOI: 10.1016/j.jiixd.2024.06.003
Ziyuan Zhang , Ziyu Wang , Kaitai Guo , Yang Zheng , Minghao Dong , Jimin Liang
Previous efforts to boost the performance of brain-computer interfaces (BCIs) have predominantly focused on optimizing algorithms for decoding brain signals. However, the untapped potential of leveraging brain plasticity for optimization remains underexplored. In this study, we enhanced the temporal resolution of the human brain in discriminating visual stimuli by eliminating the attentional blink (AB) through color-salient cognitive training, and we confirmed that the mechanism was an attention-based improvement. Using the rapid serial visual presentation (RSVP)-based BCI, we evaluated the behavioral and electroencephalogram (EEG) decoding performance of subjects before and after cognitive training in high target percentage (with AB) and low target percentage (without AB) surveillance tasks, respectively. The results consistently demonstrated significant improvements in the trained subjects. Further analysis indicated that this improvement was attributed to the cognitively trained brain producing more discriminative EEG. Our work highlights the feasibility of cognitive training as a means of brain enhancement to boost BCI performance.
以前提高脑机接口(bci)性能的努力主要集中在优化解码大脑信号的算法。然而,利用大脑可塑性进行优化的未开发潜力仍未得到充分探索。在本研究中,我们通过色彩显著性认知训练来消除注意眨眼(attention blink, AB),从而提高了人类大脑辨别视觉刺激的时间分辨率,并证实了这一机制是一种基于注意的改进。采用基于快速串行视觉呈现(RSVP)的脑机接口(BCI),分别评价了受试者在高目标百分比(有AB)和低目标百分比(无AB)监测任务中认知训练前后的行为和脑电图(EEG)解码表现。结果一致表明,受过训练的受试者取得了显著的进步。进一步的分析表明,这种改善归因于经过认知训练的大脑产生了更多的鉴别脑电图。我们的工作强调了认知训练作为大脑增强手段提高脑机接口性能的可行性。
{"title":"Boosting brain-computer interface performance through cognitive training: A brain-centric approach","authors":"Ziyuan Zhang ,&nbsp;Ziyu Wang ,&nbsp;Kaitai Guo ,&nbsp;Yang Zheng ,&nbsp;Minghao Dong ,&nbsp;Jimin Liang","doi":"10.1016/j.jiixd.2024.06.003","DOIUrl":"10.1016/j.jiixd.2024.06.003","url":null,"abstract":"<div><div>Previous efforts to boost the performance of brain-computer interfaces (BCIs) have predominantly focused on optimizing algorithms for decoding brain signals. However, the untapped potential of leveraging brain plasticity for optimization remains underexplored. In this study, we enhanced the temporal resolution of the human brain in discriminating visual stimuli by eliminating the attentional blink (AB) through color-salient cognitive training, and we confirmed that the mechanism was an attention-based improvement. Using the rapid serial visual presentation (RSVP)-based BCI, we evaluated the behavioral and electroencephalogram (EEG) decoding performance of subjects before and after cognitive training in high target percentage (with AB) and low target percentage (without AB) surveillance tasks, respectively. The results consistently demonstrated significant improvements in the trained subjects. Further analysis indicated that this improvement was attributed to the cognitively trained brain producing more discriminative EEG. Our work highlights the feasibility of cognitive training as a means of brain enhancement to boost BCI performance.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 19-35"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hand-aware graph convolution network for skeleton-based sign language recognition 基于骨架的手语识别的手感图卷积网络
Pub Date : 2025-01-01 DOI: 10.1016/j.jiixd.2024.08.001
Juan Song , Huixuechun Wang , Jianan Li , Jian Zheng , Zhifu Zhao , Qingshan Li
Skeleton-based sign language recognition (SLR) is a challenging research area mainly due to the fast and complex hand movement. Currently, graph convolution networks (GCNs) have been employed in skeleton-based SLR and achieved remarkable performance. However, existing GCN-based SLR methods suffer from a lack of explicit attention to hand topology which plays an important role in the sign language representation. To address this issue, we propose a novel hand-aware graph convolution network (HA-GCN) to focus on hand topological relationships of skeleton graph. Specifically, a hand-aware graph convolution layer is designed to capture both global body and local hand information, in which two sub-graphs are defined and incorporated to represent hand topology information. In addition, in order to eliminate the over-fitting problem, an adaptive DropGraph is designed in construction of hand-aware graph convolution block to remove the spatial and temporal redundancy in the sign language representation. With the aim to further improve the performance, the joints information, bones, together with their motion information are simultaneously modeled in a multi-stream framework. Extensive experiments on the two open-source datasets, AUTSL and INCLUDE, demonstrate that our proposed algorithm outperforms the state-of-the-art with a significant margin. Our code is available at https://github.com/snorlaxse/HA-SLR-GCN.
基于骨骼的手语识别是一个具有挑战性的研究领域,主要是由于手部运动的快速和复杂。目前,图卷积网络(GCNs)已被应用于基于骨架的单反中,并取得了显著的性能。然而,现有的基于gcn的单反方法缺乏对手部拓扑的明确关注,而手部拓扑在手语表征中起着重要作用。为了解决这一问题,我们提出了一种新的手感知图卷积网络(HA-GCN)来关注骨架图的手拓扑关系。具体而言,设计了一个手感知图卷积层来捕获全局和局部的手信息,其中定义并合并了两个子图来表示手的拓扑信息。此外,为了消除过拟合问题,在构建手感图卷积块时设计了自适应DropGraph,以消除手语表示中的时空冗余。为了进一步提高性能,关节信息、骨骼及其运动信息在多流框架中同时建模。在两个开源数据集(AUTSL和INCLUDE)上进行的大量实验表明,我们提出的算法在很大程度上优于最先进的算法。我们的代码可在https://github.com/snorlaxse/HA-SLR-GCN上获得。
{"title":"Hand-aware graph convolution network for skeleton-based sign language recognition","authors":"Juan Song ,&nbsp;Huixuechun Wang ,&nbsp;Jianan Li ,&nbsp;Jian Zheng ,&nbsp;Zhifu Zhao ,&nbsp;Qingshan Li","doi":"10.1016/j.jiixd.2024.08.001","DOIUrl":"10.1016/j.jiixd.2024.08.001","url":null,"abstract":"<div><div>Skeleton-based sign language recognition (SLR) is a challenging research area mainly due to the fast and complex hand movement. Currently, graph convolution networks (GCNs) have been employed in skeleton-based SLR and achieved remarkable performance. However, existing GCN-based SLR methods suffer from a lack of explicit attention to hand topology which plays an important role in the sign language representation. To address this issue, we propose a novel hand-aware graph convolution network (HA-GCN) to focus on hand topological relationships of skeleton graph. Specifically, a hand-aware graph convolution layer is designed to capture both global body and local hand information, in which two sub-graphs are defined and incorporated to represent hand topology information. In addition, in order to eliminate the over-fitting problem, an adaptive DropGraph is designed in construction of hand-aware graph convolution block to remove the spatial and temporal redundancy in the sign language representation. With the aim to further improve the performance, the joints information, bones, together with their motion information are simultaneously modeled in a multi-stream framework. Extensive experiments on the two open-source datasets, AUTSL and INCLUDE, demonstrate that our proposed algorithm outperforms the state-of-the-art with a significant margin. Our code is available at <span><span>https://github.com/snorlaxse/HA-SLR-GCN</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 36-50"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143148333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIFi: Robust and iterative indoor localization based on Wi-Fi RSS fingerprints RIFi:基于Wi-Fi RSS指纹的鲁棒迭代室内定位
Pub Date : 2025-01-01 DOI: 10.1016/j.jiixd.2024.07.003
Wei Liu , Meng Niu , Yunghsiang S. Han
RSS fingerprint based indoor localization consists of two phases: offline phase and online phase. A RSS fingerprint database constructed at the offline phase may be outdated for online phase, which may significantly degrade the localization performance. Furthermore, maintaining an RSS fingerprint database is a labor intensive and time-consuming task. In this paper, we proposes a robust and iterative indoor localization algorithm based on Wi-Fi RSS fingerprints, referred to as RIFi, which does not need to update the RSS fingerprint database and perform well even if the RSS fingerprint database is outdated. Specifically, we demonstrate that smaller localization area can provides better performance for outdated fingerprint database. Furthermore, we propose an iterative algorithm to determine the smaller localization area. Finally, the K-nearest neighbors (KNN) algorithm is invoked for the determined smaller localization area. Simulation results show that the proposed RIFi algorithm can significantly outperforms the traditional KNN algorithm for outdated RSS fingerprint database, and is more robust.
基于RSS指纹的室内定位分为离线阶段和在线阶段。在离线阶段构建的RSS指纹数据库在在线阶段可能已经过时,这可能会严重降低定位性能。此外,维护RSS指纹数据库是一项劳动密集型且耗时的任务。本文提出了一种基于Wi-Fi RSS指纹的鲁棒迭代室内定位算法(RIFi),该算法不需要更新RSS指纹库,即使RSS指纹库过时也能保持良好的性能。具体来说,我们证明了较小的定位区域可以为过时的指纹数据库提供更好的性能。此外,我们提出了一种迭代算法来确定较小的定位区域。最后,对确定的较小的定位区域调用k近邻(KNN)算法。仿真结果表明,对于过时的RSS指纹库,本文提出的RIFi算法可以显著优于传统的KNN算法,并且具有更强的鲁棒性。
{"title":"RIFi: Robust and iterative indoor localization based on Wi-Fi RSS fingerprints","authors":"Wei Liu ,&nbsp;Meng Niu ,&nbsp;Yunghsiang S. Han","doi":"10.1016/j.jiixd.2024.07.003","DOIUrl":"10.1016/j.jiixd.2024.07.003","url":null,"abstract":"<div><div>RSS fingerprint based indoor localization consists of two phases: offline phase and online phase. A RSS fingerprint database constructed at the offline phase may be outdated for online phase, which may significantly degrade the localization performance. Furthermore, maintaining an RSS fingerprint database is a labor intensive and time-consuming task. In this paper, we proposes a robust and iterative indoor localization algorithm based on Wi-Fi RSS fingerprints, referred to as RIFi, which does not need to update the RSS fingerprint database and perform well even if the RSS fingerprint database is outdated. Specifically, we demonstrate that smaller localization area can provides better performance for outdated fingerprint database. Furthermore, we propose an iterative algorithm to determine the smaller localization area. Finally, the K-nearest neighbors (KNN) algorithm is invoked for the determined smaller localization area. Simulation results show that the proposed RIFi algorithm can significantly outperforms the traditional KNN algorithm for outdated RSS fingerprint database, and is more robust.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 1-18"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143149201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Composite fixed-length ordered features with index-of-max transformation for high-performing and secure palmprint template protection 具有最大索引变换的复合定长有序特征,用于高性能和安全的掌纹模板保护
Pub Date : 2025-01-01 DOI: 10.1016/j.jiixd.2024.09.002
Zhicheng Cao , Weiqiang Zhao , Heng Zhao, Liaojun Pang
Palmprint recognition has attracted considerable attention due to its advantages over other biometric modalities such as fingerprints, in that it is larger in area, richer in information and able to work at a distance. However, the issue of palmprint privacy and security (especially palmprint template protection) remains under-studied. Among the very few research works, most of them only use orientational features of the palmprint with transformation processing, yielding unsatisfactory recognition and protection performance. Thus, this research work proposes a palmprint feature extraction method for palmprint template protection that is fixed-length and ordered in nature, by fusing point features and orientational features. Firstly, dual orientations are extracted and encoded with more accuracy based on the modified finite Radon transform (MFRAT). Then, SURF feature points are extracted and converted to be fixed-length and ordered features. Finally, composite fixed-length ordered features that fuse up the dual orientations and SURF points are transformed using the irreversible transformation of index-of-max (IoM) to generate the revocable palmprint templates. Experiments show that the matching accuracy of the proposed method of fixed-length and ordered point features are superior to all other feature extraction methods on the PolyU and CASIA datasets. It is also demonstrated that the EERs before and after IoM transformation are better than all other representative template protection methods. A thorough security and privacy analysis including brute-force attack, false accept attack, birthday attack, attack via record multiplicity, irreversibility, unlinkability and revocability is also given, which proves that our proposed method has both high performance and security.
相对于指纹等其他生物识别方式,掌纹识别具有面积更大、信息更丰富、能够远距离工作等优点,因此受到了广泛的关注。然而,掌纹隐私和安全问题(特别是掌纹模板保护)仍未得到充分研究。在为数不多的研究工作中,大多数只利用掌纹的方向特征进行变换处理,识别和保护效果不理想。因此,本研究提出了一种融合点特征和方向特征的定长有序掌纹模板保护掌纹特征提取方法。首先,基于改进有限Radon变换(MFRAT)对对偶取向进行提取和编码,提高了对偶取向的精度;然后,提取SURF特征点并将其转换为定长有序特征。最后,利用最大索引(index-of-max, IoM)的不可逆变换,对融合双方向点和SURF点的复合定长有序特征进行变换,生成可撤销掌纹模板。实验结果表明,该方法在PolyU和CASIA数据集上对固定长度和有序点特征的匹配精度优于所有其他特征提取方法。结果表明,IoM变换前后的EERs优于其他所有代表性模板保护方法。对该方法进行了全面的安全性和隐私性分析,包括暴力攻击、虚假接受攻击、生日攻击、记录多重性攻击、不可逆性、不可链接性和可撤销性,证明了该方法具有高性能和安全性。
{"title":"Composite fixed-length ordered features with index-of-max transformation for high-performing and secure palmprint template protection","authors":"Zhicheng Cao ,&nbsp;Weiqiang Zhao ,&nbsp;Heng Zhao,&nbsp;Liaojun Pang","doi":"10.1016/j.jiixd.2024.09.002","DOIUrl":"10.1016/j.jiixd.2024.09.002","url":null,"abstract":"<div><div>Palmprint recognition has attracted considerable attention due to its advantages over other biometric modalities such as fingerprints, in that it is larger in area, richer in information and able to work at a distance. However, the issue of palmprint privacy and security (especially palmprint template protection) remains under-studied. Among the very few research works, most of them only use orientational features of the palmprint with transformation processing, yielding unsatisfactory recognition and protection performance. Thus, this research work proposes a palmprint feature extraction method for palmprint template protection that is fixed-length and ordered in nature, by fusing point features and orientational features. Firstly, dual orientations are extracted and encoded with more accuracy based on the modified finite Radon transform (MFRAT). Then, SURF feature points are extracted and converted to be fixed-length and ordered features. Finally, composite fixed-length ordered features that fuse up the dual orientations and SURF points are transformed using the irreversible transformation of index-of-max (IoM) to generate the revocable palmprint templates. Experiments show that the matching accuracy of the proposed method of fixed-length and ordered point features are superior to all other feature extraction methods on the PolyU and CASIA datasets. It is also demonstrated that the EERs before and after IoM transformation are better than all other representative template protection methods. A thorough security and privacy analysis including brute-force attack, false accept attack, birthday attack, attack via record multiplicity, irreversibility, unlinkability and revocability is also given, which proves that our proposed method has both high performance and security.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 51-67"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143148334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DLE-YOLO: An efficient object detection algorithm with dual-branch lightweight excitation network 基于双支路轻量级激励网络的高效目标检测算法le - yolo
Pub Date : 2024-08-27 DOI: 10.1016/j.jiixd.2024.08.002
Peitao Cheng , Xuanjiao Lei , Haoran Chen , Xiumei Wang
As a computer vision task, object detection algorithms can be applied to various real-world scenarios. However, efficient algorithms often come with a large number of parameters and high computational complexity. To meet the demand for high-performance object detection algorithms on mobile devices and embedded devices with limited computational resources, we propose a new lightweight object detection algorithm called DLE-YOLO. Firstly, we design a novel backbone called dual-branch lightweight excitation network (DLEN) for feature extraction, which is mainly constructed by dual-branch lightweight excitation units (DLEU). DLEU is stacked with different numbers of dual-branch lightweight excitation blocks (DLEB), which can extract comprehensive features and integrate information between different channels of features. Secondly, in order to enhance the network to capture key feature information in the regions of interest, the attention model HS-coordinate attention (HS-CA) is introduced into the network. Thirdly, the localization loss utilizes SIoU loss to further optimize the accuracy of the bounding box. Our method achieves a mAP value of 46.0% on the MS-COCO dataset, which is a 2% mAP improvement compared to the baseline YOLOv5-m, while bringing a 19.3% reduction in parameter count and a 12.9% decrease in GFLOPs. Furthermore, our method outperforms some advanced lightweight object detection algorithms, validating the effectiveness of our approach.
作为一项计算机视觉任务,目标检测算法可以应用于各种现实场景。然而,高效的算法往往伴随着大量的参数和高的计算复杂度。为了满足计算资源有限的移动设备和嵌入式设备对高性能目标检测算法的需求,我们提出了一种新的轻量级目标检测算法,称为DLE-YOLO。首先,设计了一种以双支路轻量化激励单元(DLEU)为主体的新型主干网络——双支路轻量化激励网络(DLEN),用于特征提取;DLEU由不同数量的双支路轻量级激励块(DLEB)堆叠而成,可以提取综合特征,并在不同通道的特征之间进行信息整合。其次,为了增强网络捕获感兴趣区域关键特征信息的能力,在网络中引入了hs -坐标注意模型(HS-CA)。第三,定位损失利用SIoU损失进一步优化包围盒的精度。我们的方法在MS-COCO数据集上实现了46.0%的mAP值,与基线YOLOv5-m相比,mAP提高了2%,同时参数计数减少了19.3%,GFLOPs降低了12.9%。此外,我们的方法优于一些先进的轻量级目标检测算法,验证了我们方法的有效性。
{"title":"DLE-YOLO: An efficient object detection algorithm with dual-branch lightweight excitation network","authors":"Peitao Cheng ,&nbsp;Xuanjiao Lei ,&nbsp;Haoran Chen ,&nbsp;Xiumei Wang","doi":"10.1016/j.jiixd.2024.08.002","DOIUrl":"10.1016/j.jiixd.2024.08.002","url":null,"abstract":"<div><div>As a computer vision task, object detection algorithms can be applied to various real-world scenarios. However, efficient algorithms often come with a large number of parameters and high computational complexity. To meet the demand for high-performance object detection algorithms on mobile devices and embedded devices with limited computational resources, we propose a new lightweight object detection algorithm called DLE-YOLO. Firstly, we design a novel backbone called dual-branch lightweight excitation network (DLEN) for feature extraction, which is mainly constructed by dual-branch lightweight excitation units (DLEU). DLEU is stacked with different numbers of dual-branch lightweight excitation blocks (DLEB), which can extract comprehensive features and integrate information between different channels of features. Secondly, in order to enhance the network to capture key feature information in the regions of interest, the attention model HS-coordinate attention (HS-CA) is introduced into the network. Thirdly, the localization loss utilizes SIoU loss to further optimize the accuracy of the bounding box. Our method achieves a mAP value of 46.0% on the MS-COCO dataset, which is a 2% mAP improvement compared to the baseline YOLOv5-m, while bringing a 19.3% reduction in parameter count and a 12.9% decrease in GFLOPs. Furthermore, our method outperforms some advanced lightweight object detection algorithms, validating the effectiveness of our approach.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 2","pages":"Pages 91-102"},"PeriodicalIF":0.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143175026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure performance comparison for NOMA: Reconfigurable intelligent surface or amplify-and-forward relay? NOMA 的安全性能比较:可重构智能表面还是放大-前向中继?
Pub Date : 2024-07-18 DOI: 10.1016/j.jiixd.2024.07.001
Chengjun Jiang , Chensi Zhang , Chongwen Huang , Jiaying He , Zhe Zhang , Jianhua Ge
The amplify-and-forward (AF) relay is widely employed owing to its simplicity, while reconfigurable intelligent surface (RIS) technology is envisioned as the next generation of relay technology due to its high energy efficiency. This paper compares these two technologies at the physical layer security (PLS) level for non-orthogonal multiple access (NOMA) with an internal near-end eavesdropper. Specifically, for a fair comparison, both the number of RIS elements and AF relay antennas are set to N, and similar secure transport strategies are utilized for both models to maximize the secrecy rate. Analytical results demonstrate that the PLS performance of RIS-assisted NOMA is better than that of AF relay-assisted NOMA if N reaches a certain threshold. Simulation results verify the correctness of the theoretical analysis.
放大-前向(AF)中继因其简单而被广泛采用,而可重构智能表面(RIS)技术因其高能效而被视为下一代中继技术。本文在物理层安全(PLS)层面对这两种技术进行了比较,它们适用于带有内部近端窃听器的非正交多址接入(NOMA)。具体来说,为了进行公平比较,RIS 元素和 AF 中继天线的数量都设为 N,并且两种模型都采用了类似的安全传输策略,以最大限度地提高保密率。分析结果表明,当 N 达到一定阈值时,RIS 辅助 NOMA 的 PLS 性能优于 AF 中继辅助 NOMA。仿真结果验证了理论分析的正确性。
{"title":"Secure performance comparison for NOMA: Reconfigurable intelligent surface or amplify-and-forward relay?","authors":"Chengjun Jiang ,&nbsp;Chensi Zhang ,&nbsp;Chongwen Huang ,&nbsp;Jiaying He ,&nbsp;Zhe Zhang ,&nbsp;Jianhua Ge","doi":"10.1016/j.jiixd.2024.07.001","DOIUrl":"10.1016/j.jiixd.2024.07.001","url":null,"abstract":"<div><div>The amplify-and-forward (AF) relay is widely employed owing to its simplicity, while reconfigurable intelligent surface (RIS) technology is envisioned as the next generation of relay technology due to its high energy efficiency. This paper compares these two technologies at the physical layer security (PLS) level for non-orthogonal multiple access (NOMA) with an internal near-end eavesdropper. Specifically, for a fair comparison, both the number of RIS elements and AF relay antennas are set to <em>N</em>, and similar secure transport strategies are utilized for both models to maximize the secrecy rate. Analytical results demonstrate that the PLS performance of RIS-assisted NOMA is better than that of AF relay-assisted NOMA if <em>N</em> reaches a certain threshold. Simulation results verify the correctness of the theoretical analysis.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 6","pages":"Pages 514-524"},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141851257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information and Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1