首页 > 最新文献

Journal of Information and Intelligence最新文献

英文 中文
Unsupervised meta-learning with domain adaptation based on a multi-task reconstruction-classification network for few-shot hyperspectral image classification 基于多任务重建分类网络的域自适应无监督元学习多镜头高光谱图像分类
Pub Date : 2025-03-01 Epub Date: 2024-06-20 DOI: 10.1016/j.jiixd.2024.06.001
Yu Liu , Caihong Mu , Shanjiao Jiang , Yi Liu
Although the deep-learning method has achieved great success for hyperspectral image (HSI) classification, the few-shot HSI classification deserves sufficient study because it is difficult and expensive to acquire labeled samples. In fact, the meta-learning methods can improve the performance for few-shot HSI classification effectively. However, most of the existing meta-learning methods for HSI classification are supervised, which still heavily rely on the labeled data for meta-training. Moreover, there are many cross-scene classification tasks in the real world, and domain adaptation of unsupervised meta-learning has been ignored for HSI classification so far. To address the above issues, this paper proposes an unsupervised meta-learning method with domain adaptation based on a multi-task reconstruction-classification network (MRCN) for few-shot HSI classification. MRCN does not need any labeled data for meta-training, where the pseudo labels are generated by multiple spectral random sampling and data augmentation. The meta-training of MRCN jointly learns a shared encoding representation for two tasks and domains. On the one hand, we design an encoder-classifier to learn the classification task on the source-domain data. On the other hand, we devise an encoder-decoder to learn the reconstruction task on the target-domain data. The experimental results on four HSI datasets demonstrate that MRCN preforms better than several state-of-the-art methods with only two to five labeled samples per class. To the best of our knowledge, the proposed method is the first unsupervised meta-learning method that considers the domain adaptation for few-shot HSI classification.
尽管深度学习方法在高光谱图像(HSI)分类中取得了巨大的成功,但由于获取标记样本的难度和成本较高,少量的高光谱图像分类值得充分研究。事实上,元学习方法可以有效地提高少量HSI分类的性能。然而,现有的用于HSI分类的元学习方法大多是监督式的,仍然严重依赖于标记数据进行元训练。此外,现实世界中存在许多跨场景的分类任务,迄今为止,无监督元学习的领域适应在HSI分类中被忽视。为了解决上述问题,本文提出了一种基于多任务重构分类网络(MRCN)的无监督元学习领域自适应方法,用于小样本HSI分类。MRCN不需要任何标记数据进行元训练,其中伪标签是通过多谱随机采样和数据增强生成的。MRCN的元训练共同学习两个任务和域的共享编码表示。一方面,我们设计了一个编码器分类器来学习对源域数据的分类任务。另一方面,我们设计了一个编码器-解码器来学习目标域数据上的重构任务。在四个HSI数据集上的实验结果表明,MRCN比几个最先进的方法表现得更好,每个类别只有两到五个标记样本。据我们所知,所提出的方法是第一个考虑对少量HSI分类的领域自适应的无监督元学习方法。
{"title":"Unsupervised meta-learning with domain adaptation based on a multi-task reconstruction-classification network for few-shot hyperspectral image classification","authors":"Yu Liu ,&nbsp;Caihong Mu ,&nbsp;Shanjiao Jiang ,&nbsp;Yi Liu","doi":"10.1016/j.jiixd.2024.06.001","DOIUrl":"10.1016/j.jiixd.2024.06.001","url":null,"abstract":"<div><div>Although the deep-learning method has achieved great success for hyperspectral image (HSI) classification, the few-shot HSI classification deserves sufficient study because it is difficult and expensive to acquire labeled samples. In fact, the meta-learning methods can improve the performance for few-shot HSI classification effectively. However, most of the existing meta-learning methods for HSI classification are supervised, which still heavily rely on the labeled data for meta-training. Moreover, there are many cross-scene classification tasks in the real world, and domain adaptation of unsupervised meta-learning has been ignored for HSI classification so far. To address the above issues, this paper proposes an unsupervised meta-learning method with domain adaptation based on a multi-task reconstruction-classification network (MRCN) for few-shot HSI classification. MRCN does not need any labeled data for meta-training, where the pseudo labels are generated by multiple spectral random sampling and data augmentation. The meta-training of MRCN jointly learns a shared encoding representation for two tasks and domains. On the one hand, we design an encoder-classifier to learn the classification task on the source-domain data. On the other hand, we devise an encoder-decoder to learn the reconstruction task on the target-domain data. The experimental results on four HSI datasets demonstrate that MRCN preforms better than several state-of-the-art methods with only two to five labeled samples per class. To the best of our knowledge, the proposed method is the first unsupervised meta-learning method that considers the domain adaptation for few-shot HSI classification.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 2","pages":"Pages 103-112"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143175025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A spatiotemporal graph wavelet neural network for traffic flow prediction 交通流预测的时空图小波神经网络
Pub Date : 2025-03-01 Epub Date: 2023-03-16 DOI: 10.1016/j.jiixd.2023.03.001
Linjie Zhang, Jianfeng Ma
The traffic flow prediction is fast becoming a key instrument in the transportation system, which has achieved impressive performance for traffic management. The graph neural network plays a critical role in the development of the traffic network management. However, it is worthwhile mentioning that the complexity of road networks and traffic conditions makes it unable to obtain sufficient spatiotemporal information. In view of capturing precise environment characteristics, the context could have a precise effect on the prediction results while previous methods rarely took this into account. Besides, the nonlinear characteristics of the graph neural network are hard to quantify with fine granularity and to eliminate overfitting. To stack these challenges, in this paper, we present a spatiotemporal graph wavelet neural network to improve the ability of representations. Specifically, we introduce the wavelet transforms into the deep learning model according to the strong nonlinear optimization ability. Furthermore, we dig the location and time patterns to evaluate the temporal dependence and the spatial proximity correlation. In addition, we introduce a historical context attention mechanism giving fine-grained historical context grade evaluation to ease the phenomenon of over-smoothing. The experimental results on real-world datasets show that our work gets considerable results compared with the baseline and start-of-the-art models. Moreover, our work has better learning performance by employing the connection and interaction of graphs.
交通流预测正迅速成为交通系统的关键工具,在交通管理方面取得了令人瞩目的成绩。图神经网络在交通网络管理的发展中起着至关重要的作用。然而,值得一提的是,道路网络和交通状况的复杂性使其无法获得足够的时空信息。鉴于捕获精确的环境特征,上下文可以对预测结果产生精确的影响,而以前的方法很少考虑到这一点。此外,图神经网络的非线性特性难以细粒度量化和消除过拟合。为了解决这些问题,本文提出了一种时空图小波神经网络来提高表征能力。具体来说,我们利用小波变换较强的非线性优化能力将其引入深度学习模型。在此基础上,我们进一步挖掘了地理位置和时间模式,以评估其时间依赖性和空间接近相关性。此外,我们还引入了一种历史上下文关注机制,对历史上下文进行细粒度的等级评估,以缓解过度平滑的现象。在真实数据集上的实验结果表明,与基线模型和初始模型相比,我们的工作得到了可观的结果。此外,我们的工作通过使用图的连接和交互具有更好的学习性能。
{"title":"A spatiotemporal graph wavelet neural network for traffic flow prediction","authors":"Linjie Zhang,&nbsp;Jianfeng Ma","doi":"10.1016/j.jiixd.2023.03.001","DOIUrl":"10.1016/j.jiixd.2023.03.001","url":null,"abstract":"<div><div>The traffic flow prediction is fast becoming a key instrument in the transportation system, which has achieved impressive performance for traffic management. The graph neural network plays a critical role in the development of the traffic network management. However, it is worthwhile mentioning that the complexity of road networks and traffic conditions makes it unable to obtain sufficient spatiotemporal information. In view of capturing precise environment characteristics, the context could have a precise effect on the prediction results while previous methods rarely took this into account. Besides, the nonlinear characteristics of the graph neural network are hard to quantify with fine granularity and to eliminate overfitting. To stack these challenges, in this paper, we present a spatiotemporal graph wavelet neural network to improve the ability of representations. Specifically, we introduce the wavelet transforms into the deep learning model according to the strong nonlinear optimization ability. Furthermore, we dig the location and time patterns to evaluate the temporal dependence and the spatial proximity correlation. In addition, we introduce a historical context attention mechanism giving fine-grained historical context grade evaluation to ease the phenomenon of over-smoothing. The experimental results on real-world datasets show that our work gets considerable results compared with the baseline and start-of-the-art models. Moreover, our work has better learning performance by employing the connection and interaction of graphs.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 2","pages":"Pages 173-188"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84523151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative target allocation for heterogeneous agent models using a matrix-encoding genetic algorithm 利用矩阵编码遗传算法实现异构代理模型的合作目标分配
Pub Date : 2025-03-01 Epub Date: 2024-07-15 DOI: 10.1016/j.jiixd.2024.07.002
Shan Gao , Lei Zuo , Xiaofei Lu , Bo Tang
Heterogeneous platforms collaborate to execute tasks through different operational models, resulting in the task allocation problem that incorporates different agent models. In this paper, we address the problem of cooperative target allocation for heterogeneous agent models, where we design the task-agent matching model and the multi-agent routing model. Since the heterogeneity and cooperativity of agent models lead to a coupled allocation problem, we propose a matrix-encoding genetic algorithm (MEGA) to plan reliable allocation schemes. Specifically, an integer matrix encoding is resorted to represent the priority between targets and agents in MEGA and a ranking rule is designed to decode the priority matrix. Based on the proposed encoding-decoding framework, we use the discrete and continuous optimization operators to update the target-agent match pairs and task execution orders. In addition, to adaptively balance the diversity and intensification of the population, a dynamical supplement strategy based on Hamming distance is proposed. This strategy adds individuals with different diversity and fitness at different stages of the optimization process. Finally, simulation experiments show that MEGA algorithm outperforms the conventional target allocation algorithms in the heterogeneous agent scenario.
异构平台通过不同的操作模型协作执行任务,导致了包含不同代理模型的任务分配问题。本文针对异构智能体模型的协同目标分配问题,设计了任务-智能体匹配模型和多智能体路由模型。针对智能体模型的异质性和协同性导致的耦合分配问题,提出了一种矩阵编码遗传算法(MEGA)来规划可靠的分配方案。具体而言,采用整数矩阵编码表示MEGA中目标与智能体之间的优先级,并设计排序规则对优先级矩阵进行解码。基于所提出的编解码框架,我们使用离散和连续优化算子来更新目标-代理匹配对和任务执行顺序。此外,为了自适应平衡种群的多样性和集约化,提出了一种基于汉明距离的动态补充策略。该策略在优化过程的不同阶段加入不同多样性和适应度的个体。最后,仿真实验表明,在异构agent场景下,MEGA算法优于传统的目标分配算法。
{"title":"Cooperative target allocation for heterogeneous agent models using a matrix-encoding genetic algorithm","authors":"Shan Gao ,&nbsp;Lei Zuo ,&nbsp;Xiaofei Lu ,&nbsp;Bo Tang","doi":"10.1016/j.jiixd.2024.07.002","DOIUrl":"10.1016/j.jiixd.2024.07.002","url":null,"abstract":"<div><div>Heterogeneous platforms collaborate to execute tasks through different operational models, resulting in the task allocation problem that incorporates different agent models. In this paper, we address the problem of cooperative target allocation for heterogeneous agent models, where we design the task-agent matching model and the multi-agent routing model. Since the heterogeneity and cooperativity of agent models lead to a coupled allocation problem, we propose a matrix-encoding genetic algorithm (MEGA) to plan reliable allocation schemes. Specifically, an integer matrix encoding is resorted to represent the priority between targets and agents in MEGA and a ranking rule is designed to decode the priority matrix. Based on the proposed encoding-decoding framework, we use the discrete and continuous optimization operators to update the target-agent match pairs and task execution orders. In addition, to adaptively balance the diversity and intensification of the population, a dynamical supplement strategy based on Hamming distance is proposed. This strategy adds individuals with different diversity and fitness at different stages of the optimization process. Finally, simulation experiments show that MEGA algorithm outperforms the conventional target allocation algorithms in the heterogeneous agent scenario.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 2","pages":"Pages 154-172"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141698757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DLE-YOLO: An efficient object detection algorithm with dual-branch lightweight excitation network 基于双支路轻量级激励网络的高效目标检测算法le - yolo
Pub Date : 2025-03-01 Epub Date: 2024-08-27 DOI: 10.1016/j.jiixd.2024.08.002
Peitao Cheng , Xuanjiao Lei , Haoran Chen , Xiumei Wang
As a computer vision task, object detection algorithms can be applied to various real-world scenarios. However, efficient algorithms often come with a large number of parameters and high computational complexity. To meet the demand for high-performance object detection algorithms on mobile devices and embedded devices with limited computational resources, we propose a new lightweight object detection algorithm called DLE-YOLO. Firstly, we design a novel backbone called dual-branch lightweight excitation network (DLEN) for feature extraction, which is mainly constructed by dual-branch lightweight excitation units (DLEU). DLEU is stacked with different numbers of dual-branch lightweight excitation blocks (DLEB), which can extract comprehensive features and integrate information between different channels of features. Secondly, in order to enhance the network to capture key feature information in the regions of interest, the attention model HS-coordinate attention (HS-CA) is introduced into the network. Thirdly, the localization loss utilizes SIoU loss to further optimize the accuracy of the bounding box. Our method achieves a mAP value of 46.0% on the MS-COCO dataset, which is a 2% mAP improvement compared to the baseline YOLOv5-m, while bringing a 19.3% reduction in parameter count and a 12.9% decrease in GFLOPs. Furthermore, our method outperforms some advanced lightweight object detection algorithms, validating the effectiveness of our approach.
作为一项计算机视觉任务,目标检测算法可以应用于各种现实场景。然而,高效的算法往往伴随着大量的参数和高的计算复杂度。为了满足计算资源有限的移动设备和嵌入式设备对高性能目标检测算法的需求,我们提出了一种新的轻量级目标检测算法,称为DLE-YOLO。首先,设计了一种以双支路轻量化激励单元(DLEU)为主体的新型主干网络——双支路轻量化激励网络(DLEN),用于特征提取;DLEU由不同数量的双支路轻量级激励块(DLEB)堆叠而成,可以提取综合特征,并在不同通道的特征之间进行信息整合。其次,为了增强网络捕获感兴趣区域关键特征信息的能力,在网络中引入了hs -坐标注意模型(HS-CA)。第三,定位损失利用SIoU损失进一步优化包围盒的精度。我们的方法在MS-COCO数据集上实现了46.0%的mAP值,与基线YOLOv5-m相比,mAP提高了2%,同时参数计数减少了19.3%,GFLOPs降低了12.9%。此外,我们的方法优于一些先进的轻量级目标检测算法,验证了我们方法的有效性。
{"title":"DLE-YOLO: An efficient object detection algorithm with dual-branch lightweight excitation network","authors":"Peitao Cheng ,&nbsp;Xuanjiao Lei ,&nbsp;Haoran Chen ,&nbsp;Xiumei Wang","doi":"10.1016/j.jiixd.2024.08.002","DOIUrl":"10.1016/j.jiixd.2024.08.002","url":null,"abstract":"<div><div>As a computer vision task, object detection algorithms can be applied to various real-world scenarios. However, efficient algorithms often come with a large number of parameters and high computational complexity. To meet the demand for high-performance object detection algorithms on mobile devices and embedded devices with limited computational resources, we propose a new lightweight object detection algorithm called DLE-YOLO. Firstly, we design a novel backbone called dual-branch lightweight excitation network (DLEN) for feature extraction, which is mainly constructed by dual-branch lightweight excitation units (DLEU). DLEU is stacked with different numbers of dual-branch lightweight excitation blocks (DLEB), which can extract comprehensive features and integrate information between different channels of features. Secondly, in order to enhance the network to capture key feature information in the regions of interest, the attention model HS-coordinate attention (HS-CA) is introduced into the network. Thirdly, the localization loss utilizes SIoU loss to further optimize the accuracy of the bounding box. Our method achieves a mAP value of 46.0% on the MS-COCO dataset, which is a 2% mAP improvement compared to the baseline YOLOv5-m, while bringing a 19.3% reduction in parameter count and a 12.9% decrease in GFLOPs. Furthermore, our method outperforms some advanced lightweight object detection algorithms, validating the effectiveness of our approach.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 2","pages":"Pages 91-102"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143175026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks 双重防御:结合先发制人的成员排除和知识蒸馏来减轻成员推理攻击
Pub Date : 2025-01-01 Epub Date: 2024-06-27 DOI: 10.1016/j.jiixd.2024.06.002
Jun Niu , Peng Liu , Chunhui Huang , Yangming Zhang , Moxuan Zeng , Kuo Shen , Yangzhong Wang , Suyu An , Yulong Shen , Xiaohong Jiang , Jianfeng Ma , He Wang , Gaofei Wu , Anmin Fu , Chunjie Cao , Xiaoyan Zhu , Yuqing Zhang
Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. Existing MI defenses protect the membership privacy through preemptive exclusion of members techniques and knowledge distillation. Unfortunately, using either of these two defenses alone, the defense effect can still offers an unsatisfactory trade-off between membership privacy and utility.
Given that the defense method that directly combines these two defenses is still very limited (e.g., the test accuracy of the target model is decreased by about 40% (in our experiments)), in this work, we propose a dual defense (DD) method that includes the preemptive exclusion of high-risk member samples module and the knowledge distillation module, which thwarts the access of the resulting models to the private training data twice to mitigate MI attacks. Our defense method can be divided into two steps: the preemptive exclusion of high-risk member samples (Step 1) and the knowledge distillation to obtain the protected student model (Step 2). We propose three types of exclusions: existing MI attacks-based exclusions, sample distances of members and nonmembers-based exclusions, and mutual information value-based exclusions, to preemptively exclude the high-risk member samples. During the knowledge distillation phase, we add ground-truth labeled data to the reference dataset to decrease the protected student model's dependency on soft labels, aiming to maintain or improve its test accuracy. Extensive evaluation shows that DD significantly outperforms state-of-the-art defenses and offers a better privacy-utility trade-off. For example, DD achieves ∼100% test accuracy improvement over the distillation for membership privacy (DMP) defense for ResNet50 trained on CIFAR100. DD simultaneously achieves the reductions in the attack effectiveness (e.g., the [email protected]%FPR of enhanced MI attacks decreased by 2.10% on the ImageNet dataset, the membership advantage (MA) of risk score-based attacks decreased by 56.30%) and improvements of the target models' test accuracies (e.g., by 42.80% on CIFAR100).
成员推理(MI)攻击通过确定给定数据示例是否已用于训练目标模型来威胁用户隐私。现有的信息交换防御通过先发制人的成员排除技术和知识蒸馏来保护成员隐私。不幸的是,单独使用这两种防御中的任何一种,防御效果仍然可能在成员隐私和效用之间提供令人不满意的权衡。鉴于直接结合这两种防御的防御方法仍然非常有限(例如,目标模型的测试精度降低了约40%(在我们的实验中)),在这项工作中,我们提出了一种双重防御(DD)方法,该方法包括抢先排除高风险成员样本模块和知识蒸馏模块,该方法阻止了结果模型对私有训练数据的两次访问,以缓解MI攻击。我们的防御方法分为两步:首先是对高风险成员样本的先发制人排除(步骤1),其次是对受保护学生模型的知识提炼(步骤2)。我们提出了基于现有MI攻击的排除、基于成员和非成员样本距离的排除和基于相互信息价值的排除三种类型的排除,以先发制人地排除高风险成员样本。在知识蒸馏阶段,我们在参考数据集中添加了真实标记数据,以减少受保护学生模型对软标签的依赖,以保持或提高其测试精度。广泛的评估表明,DD显著优于最先进的防御,并提供了更好的隐私效用权衡。例如,对于在CIFAR100上训练的ResNet50, DD在成员隐私(DMP)防御的蒸馏上实现了~ 100%的测试精度提高。DD同时实现了攻击有效性的降低(例如,增强MI攻击的[email protected]%FPR在ImageNet数据集上降低了2.10%,基于风险评分的攻击的隶属度优势(MA)降低了56.30%)和目标模型测试准确性的提高(例如,在CIFAR100上提高了42.80%)。
{"title":"Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks","authors":"Jun Niu ,&nbsp;Peng Liu ,&nbsp;Chunhui Huang ,&nbsp;Yangming Zhang ,&nbsp;Moxuan Zeng ,&nbsp;Kuo Shen ,&nbsp;Yangzhong Wang ,&nbsp;Suyu An ,&nbsp;Yulong Shen ,&nbsp;Xiaohong Jiang ,&nbsp;Jianfeng Ma ,&nbsp;He Wang ,&nbsp;Gaofei Wu ,&nbsp;Anmin Fu ,&nbsp;Chunjie Cao ,&nbsp;Xiaoyan Zhu ,&nbsp;Yuqing Zhang","doi":"10.1016/j.jiixd.2024.06.002","DOIUrl":"10.1016/j.jiixd.2024.06.002","url":null,"abstract":"<div><div>Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. Existing MI defenses protect the membership privacy through preemptive exclusion of members techniques and knowledge distillation. Unfortunately, using either of these two defenses alone, the defense effect can still offers an unsatisfactory trade-off between membership privacy and utility.</div><div>Given that the defense method that directly combines these two defenses is still very limited (e.g., the test accuracy of the target model is decreased by about 40% (in our experiments)), in this work, we propose a dual defense (DD) method that includes the preemptive exclusion of high-risk member samples module and the knowledge distillation module, which thwarts the access of the resulting models to the private training data twice to mitigate MI attacks. Our defense method can be divided into two steps: the preemptive exclusion of high-risk member samples (Step 1) and the knowledge distillation to obtain the protected student model (Step 2). We propose three types of exclusions: existing MI attacks-based exclusions, sample distances of members and nonmembers-based exclusions, and mutual information value-based exclusions, to preemptively exclude the high-risk member samples. During the knowledge distillation phase, we add ground-truth labeled data to the reference dataset to decrease the protected student model's dependency on soft labels, aiming to maintain or improve its test accuracy. Extensive evaluation shows that DD significantly outperforms state-of-the-art defenses and offers a better privacy-utility trade-off. For example, DD achieves ∼100% test accuracy improvement over the distillation for membership privacy (DMP) defense for ResNet50 trained on CIFAR100. DD simultaneously achieves the reductions in the attack effectiveness (e.g., the [email protected]%FPR of enhanced MI attacks decreased by 2.10% on the ImageNet dataset, the membership advantage (MA) of risk score-based attacks decreased by 56.30%) and improvements of the target models' test accuracies (e.g., by 42.80% on CIFAR100).</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 68-92"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143148335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIFi: Robust and iterative indoor localization based on Wi-Fi RSS fingerprints RIFi:基于Wi-Fi RSS指纹的鲁棒迭代室内定位
Pub Date : 2025-01-01 Epub Date: 2024-07-31 DOI: 10.1016/j.jiixd.2024.07.003
Wei Liu , Meng Niu , Yunghsiang S. Han
RSS fingerprint based indoor localization consists of two phases: offline phase and online phase. A RSS fingerprint database constructed at the offline phase may be outdated for online phase, which may significantly degrade the localization performance. Furthermore, maintaining an RSS fingerprint database is a labor intensive and time-consuming task. In this paper, we proposes a robust and iterative indoor localization algorithm based on Wi-Fi RSS fingerprints, referred to as RIFi, which does not need to update the RSS fingerprint database and perform well even if the RSS fingerprint database is outdated. Specifically, we demonstrate that smaller localization area can provides better performance for outdated fingerprint database. Furthermore, we propose an iterative algorithm to determine the smaller localization area. Finally, the K-nearest neighbors (KNN) algorithm is invoked for the determined smaller localization area. Simulation results show that the proposed RIFi algorithm can significantly outperforms the traditional KNN algorithm for outdated RSS fingerprint database, and is more robust.
基于RSS指纹的室内定位分为离线阶段和在线阶段。在离线阶段构建的RSS指纹数据库在在线阶段可能已经过时,这可能会严重降低定位性能。此外,维护RSS指纹数据库是一项劳动密集型且耗时的任务。本文提出了一种基于Wi-Fi RSS指纹的鲁棒迭代室内定位算法(RIFi),该算法不需要更新RSS指纹库,即使RSS指纹库过时也能保持良好的性能。具体来说,我们证明了较小的定位区域可以为过时的指纹数据库提供更好的性能。此外,我们提出了一种迭代算法来确定较小的定位区域。最后,对确定的较小的定位区域调用k近邻(KNN)算法。仿真结果表明,对于过时的RSS指纹库,本文提出的RIFi算法可以显著优于传统的KNN算法,并且具有更强的鲁棒性。
{"title":"RIFi: Robust and iterative indoor localization based on Wi-Fi RSS fingerprints","authors":"Wei Liu ,&nbsp;Meng Niu ,&nbsp;Yunghsiang S. Han","doi":"10.1016/j.jiixd.2024.07.003","DOIUrl":"10.1016/j.jiixd.2024.07.003","url":null,"abstract":"<div><div>RSS fingerprint based indoor localization consists of two phases: offline phase and online phase. A RSS fingerprint database constructed at the offline phase may be outdated for online phase, which may significantly degrade the localization performance. Furthermore, maintaining an RSS fingerprint database is a labor intensive and time-consuming task. In this paper, we proposes a robust and iterative indoor localization algorithm based on Wi-Fi RSS fingerprints, referred to as RIFi, which does not need to update the RSS fingerprint database and perform well even if the RSS fingerprint database is outdated. Specifically, we demonstrate that smaller localization area can provides better performance for outdated fingerprint database. Furthermore, we propose an iterative algorithm to determine the smaller localization area. Finally, the K-nearest neighbors (KNN) algorithm is invoked for the determined smaller localization area. Simulation results show that the proposed RIFi algorithm can significantly outperforms the traditional KNN algorithm for outdated RSS fingerprint database, and is more robust.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 1-18"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143149201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hand-aware graph convolution network for skeleton-based sign language recognition 基于骨架的手语识别的手感图卷积网络
Pub Date : 2025-01-01 Epub Date: 2024-08-30 DOI: 10.1016/j.jiixd.2024.08.001
Juan Song , Huixuechun Wang , Jianan Li , Jian Zheng , Zhifu Zhao , Qingshan Li
Skeleton-based sign language recognition (SLR) is a challenging research area mainly due to the fast and complex hand movement. Currently, graph convolution networks (GCNs) have been employed in skeleton-based SLR and achieved remarkable performance. However, existing GCN-based SLR methods suffer from a lack of explicit attention to hand topology which plays an important role in the sign language representation. To address this issue, we propose a novel hand-aware graph convolution network (HA-GCN) to focus on hand topological relationships of skeleton graph. Specifically, a hand-aware graph convolution layer is designed to capture both global body and local hand information, in which two sub-graphs are defined and incorporated to represent hand topology information. In addition, in order to eliminate the over-fitting problem, an adaptive DropGraph is designed in construction of hand-aware graph convolution block to remove the spatial and temporal redundancy in the sign language representation. With the aim to further improve the performance, the joints information, bones, together with their motion information are simultaneously modeled in a multi-stream framework. Extensive experiments on the two open-source datasets, AUTSL and INCLUDE, demonstrate that our proposed algorithm outperforms the state-of-the-art with a significant margin. Our code is available at https://github.com/snorlaxse/HA-SLR-GCN.
基于骨骼的手语识别是一个具有挑战性的研究领域,主要是由于手部运动的快速和复杂。目前,图卷积网络(GCNs)已被应用于基于骨架的单反中,并取得了显著的性能。然而,现有的基于gcn的单反方法缺乏对手部拓扑的明确关注,而手部拓扑在手语表征中起着重要作用。为了解决这一问题,我们提出了一种新的手感知图卷积网络(HA-GCN)来关注骨架图的手拓扑关系。具体而言,设计了一个手感知图卷积层来捕获全局和局部的手信息,其中定义并合并了两个子图来表示手的拓扑信息。此外,为了消除过拟合问题,在构建手感图卷积块时设计了自适应DropGraph,以消除手语表示中的时空冗余。为了进一步提高性能,关节信息、骨骼及其运动信息在多流框架中同时建模。在两个开源数据集(AUTSL和INCLUDE)上进行的大量实验表明,我们提出的算法在很大程度上优于最先进的算法。我们的代码可在https://github.com/snorlaxse/HA-SLR-GCN上获得。
{"title":"Hand-aware graph convolution network for skeleton-based sign language recognition","authors":"Juan Song ,&nbsp;Huixuechun Wang ,&nbsp;Jianan Li ,&nbsp;Jian Zheng ,&nbsp;Zhifu Zhao ,&nbsp;Qingshan Li","doi":"10.1016/j.jiixd.2024.08.001","DOIUrl":"10.1016/j.jiixd.2024.08.001","url":null,"abstract":"<div><div>Skeleton-based sign language recognition (SLR) is a challenging research area mainly due to the fast and complex hand movement. Currently, graph convolution networks (GCNs) have been employed in skeleton-based SLR and achieved remarkable performance. However, existing GCN-based SLR methods suffer from a lack of explicit attention to hand topology which plays an important role in the sign language representation. To address this issue, we propose a novel hand-aware graph convolution network (HA-GCN) to focus on hand topological relationships of skeleton graph. Specifically, a hand-aware graph convolution layer is designed to capture both global body and local hand information, in which two sub-graphs are defined and incorporated to represent hand topology information. In addition, in order to eliminate the over-fitting problem, an adaptive DropGraph is designed in construction of hand-aware graph convolution block to remove the spatial and temporal redundancy in the sign language representation. With the aim to further improve the performance, the joints information, bones, together with their motion information are simultaneously modeled in a multi-stream framework. Extensive experiments on the two open-source datasets, AUTSL and INCLUDE, demonstrate that our proposed algorithm outperforms the state-of-the-art with a significant margin. Our code is available at <span><span>https://github.com/snorlaxse/HA-SLR-GCN</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 36-50"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143148333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting brain-computer interface performance through cognitive training: A brain-centric approach 通过认知训练提升脑机接口性能:一种以大脑为中心的方法。
Pub Date : 2025-01-01 Epub Date: 2024-07-02 DOI: 10.1016/j.jiixd.2024.06.003
Ziyuan Zhang , Ziyu Wang , Kaitai Guo , Yang Zheng , Minghao Dong , Jimin Liang
Previous efforts to boost the performance of brain-computer interfaces (BCIs) have predominantly focused on optimizing algorithms for decoding brain signals. However, the untapped potential of leveraging brain plasticity for optimization remains underexplored. In this study, we enhanced the temporal resolution of the human brain in discriminating visual stimuli by eliminating the attentional blink (AB) through color-salient cognitive training, and we confirmed that the mechanism was an attention-based improvement. Using the rapid serial visual presentation (RSVP)-based BCI, we evaluated the behavioral and electroencephalogram (EEG) decoding performance of subjects before and after cognitive training in high target percentage (with AB) and low target percentage (without AB) surveillance tasks, respectively. The results consistently demonstrated significant improvements in the trained subjects. Further analysis indicated that this improvement was attributed to the cognitively trained brain producing more discriminative EEG. Our work highlights the feasibility of cognitive training as a means of brain enhancement to boost BCI performance.
以前提高脑机接口(bci)性能的努力主要集中在优化解码大脑信号的算法。然而,利用大脑可塑性进行优化的未开发潜力仍未得到充分探索。在本研究中,我们通过色彩显著性认知训练来消除注意眨眼(attention blink, AB),从而提高了人类大脑辨别视觉刺激的时间分辨率,并证实了这一机制是一种基于注意的改进。采用基于快速串行视觉呈现(RSVP)的脑机接口(BCI),分别评价了受试者在高目标百分比(有AB)和低目标百分比(无AB)监测任务中认知训练前后的行为和脑电图(EEG)解码表现。结果一致表明,受过训练的受试者取得了显著的进步。进一步的分析表明,这种改善归因于经过认知训练的大脑产生了更多的鉴别脑电图。我们的工作强调了认知训练作为大脑增强手段提高脑机接口性能的可行性。
{"title":"Boosting brain-computer interface performance through cognitive training: A brain-centric approach","authors":"Ziyuan Zhang ,&nbsp;Ziyu Wang ,&nbsp;Kaitai Guo ,&nbsp;Yang Zheng ,&nbsp;Minghao Dong ,&nbsp;Jimin Liang","doi":"10.1016/j.jiixd.2024.06.003","DOIUrl":"10.1016/j.jiixd.2024.06.003","url":null,"abstract":"<div><div>Previous efforts to boost the performance of brain-computer interfaces (BCIs) have predominantly focused on optimizing algorithms for decoding brain signals. However, the untapped potential of leveraging brain plasticity for optimization remains underexplored. In this study, we enhanced the temporal resolution of the human brain in discriminating visual stimuli by eliminating the attentional blink (AB) through color-salient cognitive training, and we confirmed that the mechanism was an attention-based improvement. Using the rapid serial visual presentation (RSVP)-based BCI, we evaluated the behavioral and electroencephalogram (EEG) decoding performance of subjects before and after cognitive training in high target percentage (with AB) and low target percentage (without AB) surveillance tasks, respectively. The results consistently demonstrated significant improvements in the trained subjects. Further analysis indicated that this improvement was attributed to the cognitively trained brain producing more discriminative EEG. Our work highlights the feasibility of cognitive training as a means of brain enhancement to boost BCI performance.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 19-35"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Composite fixed-length ordered features with index-of-max transformation for high-performing and secure palmprint template protection 具有最大索引变换的复合定长有序特征,用于高性能和安全的掌纹模板保护
Pub Date : 2025-01-01 Epub Date: 2024-09-18 DOI: 10.1016/j.jiixd.2024.09.002
Zhicheng Cao , Weiqiang Zhao , Heng Zhao, Liaojun Pang
Palmprint recognition has attracted considerable attention due to its advantages over other biometric modalities such as fingerprints, in that it is larger in area, richer in information and able to work at a distance. However, the issue of palmprint privacy and security (especially palmprint template protection) remains under-studied. Among the very few research works, most of them only use orientational features of the palmprint with transformation processing, yielding unsatisfactory recognition and protection performance. Thus, this research work proposes a palmprint feature extraction method for palmprint template protection that is fixed-length and ordered in nature, by fusing point features and orientational features. Firstly, dual orientations are extracted and encoded with more accuracy based on the modified finite Radon transform (MFRAT). Then, SURF feature points are extracted and converted to be fixed-length and ordered features. Finally, composite fixed-length ordered features that fuse up the dual orientations and SURF points are transformed using the irreversible transformation of index-of-max (IoM) to generate the revocable palmprint templates. Experiments show that the matching accuracy of the proposed method of fixed-length and ordered point features are superior to all other feature extraction methods on the PolyU and CASIA datasets. It is also demonstrated that the EERs before and after IoM transformation are better than all other representative template protection methods. A thorough security and privacy analysis including brute-force attack, false accept attack, birthday attack, attack via record multiplicity, irreversibility, unlinkability and revocability is also given, which proves that our proposed method has both high performance and security.
相对于指纹等其他生物识别方式,掌纹识别具有面积更大、信息更丰富、能够远距离工作等优点,因此受到了广泛的关注。然而,掌纹隐私和安全问题(特别是掌纹模板保护)仍未得到充分研究。在为数不多的研究工作中,大多数只利用掌纹的方向特征进行变换处理,识别和保护效果不理想。因此,本研究提出了一种融合点特征和方向特征的定长有序掌纹模板保护掌纹特征提取方法。首先,基于改进有限Radon变换(MFRAT)对对偶取向进行提取和编码,提高了对偶取向的精度;然后,提取SURF特征点并将其转换为定长有序特征。最后,利用最大索引(index-of-max, IoM)的不可逆变换,对融合双方向点和SURF点的复合定长有序特征进行变换,生成可撤销掌纹模板。实验结果表明,该方法在PolyU和CASIA数据集上对固定长度和有序点特征的匹配精度优于所有其他特征提取方法。结果表明,IoM变换前后的EERs优于其他所有代表性模板保护方法。对该方法进行了全面的安全性和隐私性分析,包括暴力攻击、虚假接受攻击、生日攻击、记录多重性攻击、不可逆性、不可链接性和可撤销性,证明了该方法具有高性能和安全性。
{"title":"Composite fixed-length ordered features with index-of-max transformation for high-performing and secure palmprint template protection","authors":"Zhicheng Cao ,&nbsp;Weiqiang Zhao ,&nbsp;Heng Zhao,&nbsp;Liaojun Pang","doi":"10.1016/j.jiixd.2024.09.002","DOIUrl":"10.1016/j.jiixd.2024.09.002","url":null,"abstract":"<div><div>Palmprint recognition has attracted considerable attention due to its advantages over other biometric modalities such as fingerprints, in that it is larger in area, richer in information and able to work at a distance. However, the issue of palmprint privacy and security (especially palmprint template protection) remains under-studied. Among the very few research works, most of them only use orientational features of the palmprint with transformation processing, yielding unsatisfactory recognition and protection performance. Thus, this research work proposes a palmprint feature extraction method for palmprint template protection that is fixed-length and ordered in nature, by fusing point features and orientational features. Firstly, dual orientations are extracted and encoded with more accuracy based on the modified finite Radon transform (MFRAT). Then, SURF feature points are extracted and converted to be fixed-length and ordered features. Finally, composite fixed-length ordered features that fuse up the dual orientations and SURF points are transformed using the irreversible transformation of index-of-max (IoM) to generate the revocable palmprint templates. Experiments show that the matching accuracy of the proposed method of fixed-length and ordered point features are superior to all other feature extraction methods on the PolyU and CASIA datasets. It is also demonstrated that the EERs before and after IoM transformation are better than all other representative template protection methods. A thorough security and privacy analysis including brute-force attack, false accept attack, birthday attack, attack via record multiplicity, irreversibility, unlinkability and revocability is also given, which proves that our proposed method has both high performance and security.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"3 1","pages":"Pages 51-67"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143148334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure performance comparison for NOMA: Reconfigurable intelligent surface or amplify-and-forward relay? NOMA 的安全性能比较:可重构智能表面还是放大-前向中继?
Pub Date : 2024-11-01 Epub Date: 2024-07-18 DOI: 10.1016/j.jiixd.2024.07.001
Chengjun Jiang , Chensi Zhang , Chongwen Huang , Jiaying He , Zhe Zhang , Jianhua Ge
The amplify-and-forward (AF) relay is widely employed owing to its simplicity, while reconfigurable intelligent surface (RIS) technology is envisioned as the next generation of relay technology due to its high energy efficiency. This paper compares these two technologies at the physical layer security (PLS) level for non-orthogonal multiple access (NOMA) with an internal near-end eavesdropper. Specifically, for a fair comparison, both the number of RIS elements and AF relay antennas are set to N, and similar secure transport strategies are utilized for both models to maximize the secrecy rate. Analytical results demonstrate that the PLS performance of RIS-assisted NOMA is better than that of AF relay-assisted NOMA if N reaches a certain threshold. Simulation results verify the correctness of the theoretical analysis.
放大-前向(AF)中继因其简单而被广泛采用,而可重构智能表面(RIS)技术因其高能效而被视为下一代中继技术。本文在物理层安全(PLS)层面对这两种技术进行了比较,它们适用于带有内部近端窃听器的非正交多址接入(NOMA)。具体来说,为了进行公平比较,RIS 元素和 AF 中继天线的数量都设为 N,并且两种模型都采用了类似的安全传输策略,以最大限度地提高保密率。分析结果表明,当 N 达到一定阈值时,RIS 辅助 NOMA 的 PLS 性能优于 AF 中继辅助 NOMA。仿真结果验证了理论分析的正确性。
{"title":"Secure performance comparison for NOMA: Reconfigurable intelligent surface or amplify-and-forward relay?","authors":"Chengjun Jiang ,&nbsp;Chensi Zhang ,&nbsp;Chongwen Huang ,&nbsp;Jiaying He ,&nbsp;Zhe Zhang ,&nbsp;Jianhua Ge","doi":"10.1016/j.jiixd.2024.07.001","DOIUrl":"10.1016/j.jiixd.2024.07.001","url":null,"abstract":"<div><div>The amplify-and-forward (AF) relay is widely employed owing to its simplicity, while reconfigurable intelligent surface (RIS) technology is envisioned as the next generation of relay technology due to its high energy efficiency. This paper compares these two technologies at the physical layer security (PLS) level for non-orthogonal multiple access (NOMA) with an internal near-end eavesdropper. Specifically, for a fair comparison, both the number of RIS elements and AF relay antennas are set to <em>N</em>, and similar secure transport strategies are utilized for both models to maximize the secrecy rate. Analytical results demonstrate that the PLS performance of RIS-assisted NOMA is better than that of AF relay-assisted NOMA if <em>N</em> reaches a certain threshold. Simulation results verify the correctness of the theoretical analysis.</div></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 6","pages":"Pages 514-524"},"PeriodicalIF":0.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141851257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information and Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1