首页 > 最新文献

IEEE Transactions on Computational Social Systems最新文献

英文 中文
Modeling Information Cocoons in Networked Populations: Insights From Backgrounds and Preferences 网络人群中的信息茧建模:背景和偏好的启示
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-19 DOI: 10.1109/TCSS.2024.3354508
Ming Gu;Tian-Fang Zhao;Liang Yang;Xiao-Kun Wu;Wei-Neng Chen
The formation of information cocoons, driven by limited disclosure and individual preferences, has resulted in the polarization of society. However, the underlying mechanisms and pathways to escape these cocoons remain unresolved. This article aims to solve it by developing an adaptive imitation process. In this process, the measurement of information cocoons across the population is based on Shannon's information entropy, taking into account neighborhood information. Incorporating the Dirac function to formulate information distribution over networks, theoretical results are validated by numerical simulation experiments. Results show that individual backgrounds and preferences are crucial factors in the formation of information cocoons, and the severity of information cocoon production increases with an individual capacity to stick to oneself. Encouraging connections among diverse communities can effectively mitigate the intensity of information cocoons. This research contributes to the advancement of computational communication systems and offers insights toward dismantling informational boundaries.
在有限的信息公开和个人偏好的驱动下,信息茧房的形成导致了社会的两极分化。然而,摆脱这些茧的内在机制和途径仍未得到解决。本文旨在通过开发一种适应性模仿过程来解决这一问题。在这一过程中,对整个群体的信息茧的测量是基于香农信息熵,并考虑到邻域信息。结合狄拉克函数来制定网络上的信息分布,并通过数值模拟实验来验证理论结果。结果表明,个人背景和偏好是信息茧形成的关键因素,信息茧产生的严重程度会随着个人坚持自我的能力而增加。鼓励不同社区之间的联系可以有效减轻信息茧的强度。这项研究有助于推动计算通信系统的发展,并为打破信息界限提供了启示。
{"title":"Modeling Information Cocoons in Networked Populations: Insights From Backgrounds and Preferences","authors":"Ming Gu;Tian-Fang Zhao;Liang Yang;Xiao-Kun Wu;Wei-Neng Chen","doi":"10.1109/TCSS.2024.3354508","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3354508","url":null,"abstract":"The formation of information cocoons, driven by limited disclosure and individual preferences, has resulted in the polarization of society. However, the underlying mechanisms and pathways to escape these cocoons remain unresolved. This article aims to solve it by developing an adaptive imitation process. In this process, the measurement of information cocoons across the population is based on Shannon's information entropy, taking into account neighborhood information. Incorporating the Dirac function to formulate information distribution over networks, theoretical results are validated by numerical simulation experiments. Results show that individual backgrounds and preferences are crucial factors in the formation of information cocoons, and the severity of information cocoon production increases with an individual capacity to stick to oneself. Encouraging connections among diverse communities can effectively mitigate the intensity of information cocoons. This research contributes to the advancement of computational communication systems and offers insights toward dismantling informational boundaries.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TLP-NEGCN: Temporal Link Prediction via Network Embedding and Graph Convolutional Networks TLP-NEGCN:通过网络嵌入和图卷积网络进行时态链接预测
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-18 DOI: 10.1109/TCSS.2024.3367231
Akshi Kumar;Abhishek Mallik;Sanjay Kumar
Temporal link prediction (TLP) is a prominent problem in network analysis that focuses on predicting the existence of future connections or relationships between entities in a dynamic network over time. The predictive capabilities of existing models of TLP are often constrained due to their difficulty in adapting to the changes in dynamic network structures over time. In this article, an improved TLP model, denoted as TLP-NEGCN, is introduced by leveraging network embedding, graph convolutional networks (GCNs), and bidirectional long short-term memory (BiLSTM). This integration provides a robust model of TLP that leverages historical network structures and captures temporal dynamics leading to improved performances. We employ graph embedding with self-clustering (GEMSEC) to create lower dimensional vector representations for all nodes of the network at the initial timestamps. The node embeddings are fed into an iterative training process using GCNs across timestamps in the dataset. This process enhances the node embeddings by capturing the network's temporal dynamics and integrating neighborhood information. We obtain edge embeddings by concatenating the node embeddings of the end nodes of each edge, encapsulating the information about the relationships between nodes in the network. Subsequently, these edge embeddings are processed through a BiLSTM architecture to forecast upcoming links in the network. The performance of the proposed model is compared against several baselines and contemporary TLP models on various real-life temporal datasets. The obtained results based on various evaluation metrics demonstrate the superiority of the proposed work.
时态链接预测(TLP)是网络分析中的一个突出问题,其重点是预测动态网络中实体之间随着时间推移而存在的未来连接或关系。由于难以适应动态网络结构随时间的变化,现有 TLP 模型的预测能力往往受到限制。本文通过利用网络嵌入、图卷积网络(GCN)和双向长短期记忆(BiLSTM),引入了一种改进的 TLP 模型,称为 TLP-NEGCN。这种整合提供了一种稳健的 TLP 模型,它利用历史网络结构并捕捉时间动态,从而提高了性能。我们采用图嵌入与自聚类(GEMSEC)技术,在初始时间戳为网络的所有节点创建低维向量表示。节点嵌入被输入到使用数据集中跨时间戳的 GCN 的迭代训练过程中。这一过程通过捕捉网络的时间动态和整合邻域信息来增强节点嵌入。我们通过串联每条边的末端节点的节点内嵌来获得边内嵌,从而封装网络中节点间关系的信息。随后,通过 BiLSTM 架构对这些边缘嵌入进行处理,以预测网络中即将出现的链接。在各种真实的时间数据集上,将所提出模型的性能与几种基准模型和当代 TLP 模型进行了比较。基于各种评价指标得出的结果证明了所提工作的优越性。
{"title":"TLP-NEGCN: Temporal Link Prediction via Network Embedding and Graph Convolutional Networks","authors":"Akshi Kumar;Abhishek Mallik;Sanjay Kumar","doi":"10.1109/TCSS.2024.3367231","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3367231","url":null,"abstract":"Temporal link prediction (TLP) is a prominent problem in network analysis that focuses on predicting the existence of future connections or relationships between entities in a dynamic network over time. The predictive capabilities of existing models of TLP are often constrained due to their difficulty in adapting to the changes in dynamic network structures over time. In this article, an improved TLP model, denoted as TLP-NEGCN, is introduced by leveraging network embedding, graph convolutional networks (GCNs), and bidirectional long short-term memory (BiLSTM). This integration provides a robust model of TLP that leverages historical network structures and captures temporal dynamics leading to improved performances. We employ graph embedding with self-clustering (GEMSEC) to create lower dimensional vector representations for all nodes of the network at the initial timestamps. The node embeddings are fed into an iterative training process using GCNs across timestamps in the dataset. This process enhances the node embeddings by capturing the network's temporal dynamics and integrating neighborhood information. We obtain edge embeddings by concatenating the node embeddings of the end nodes of each edge, encapsulating the information about the relationships between nodes in the network. Subsequently, these edge embeddings are processed through a BiLSTM architecture to forecast upcoming links in the network. The performance of the proposed model is compared against several baselines and contemporary TLP models on various real-life temporal datasets. The obtained results based on various evaluation metrics demonstrate the superiority of the proposed work.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UCF-PKS: Unforeseen Consumer Fraud Detection With Prior Knowledge and Semantic Features UCF-PKS:利用先验知识和语义特征检测不可预见的消费者欺诈行为
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-03-18 DOI: 10.1109/TCSS.2024.3372519
Shanyan Lai;Junfang Wu;Chunyang Ye;Zhiwei Ma
The utilization of text classification techniques has demonstrated great promise in the field of detecting consumer fraud based on consumer reviews. However, persistent challenges remain in handling large samples at the borders and identifying unforeseen fraud behaviors. To address these challenges, we propose a novel approach that combines a channel biattention convolutional neural network (CNN) with a pretrained language model. Specifically, we propose a similarity computation module for implicitly learning a metric matrix to characterize the similarity between prior knowledge and consumer reviews in vector space. Through this process, the model is able to learn and understand the relationship between prior knowledge and corresponding samples during training, thereby improving its ability to identify unforeseen fraudulent behaviors. Additionally, we propose a channel biattention CNN module to adaptively emphasize the importance of relevant prior knowledge to enhance the model's ability to accurately classify boundary samples. To ensure effective model training, we expand and organize a real-world dataset, reducing noise and increasing the number of fraud samples available for analysis. Experimental results demonstrate that our approach achieves state-of-the-art performance in fraud detection. Notably, our model is capable of detecting unforeseen fraud cases without the need for retraining or fine-tuning, making it highly adaptable and efficient in practical applications.
在根据消费者评论检测欺诈行为的领域,文本分类技术的应用前景广阔。然而,在边界处理大量样本和识别不可预见的欺诈行为方面仍然存在挑战。为了应对这些挑战,我们提出了一种新方法,将通道偏注意力卷积神经网络(CNN)与预训练语言模型相结合。具体来说,我们提出了一个相似性计算模块,用于隐式学习度量矩阵,以描述向量空间中先验知识与消费者评论之间的相似性。通过这一过程,该模型能够在训练过程中学习和理解先验知识与相应样本之间的关系,从而提高其识别不可预见的欺诈行为的能力。此外,我们还提出了一个通道偏注意力 CNN 模块,以自适应地强调相关先验知识的重要性,从而提高模型准确分类边界样本的能力。为了确保有效的模型训练,我们扩展并整理了真实世界的数据集,减少了噪音,增加了可用于分析的欺诈样本数量。实验结果表明,我们的方法在欺诈检测方面达到了最先进的性能。值得注意的是,我们的模型无需重新训练或微调,就能检测到不可预见的欺诈案例,因此在实际应用中具有很强的适应性和高效性。
{"title":"UCF-PKS: Unforeseen Consumer Fraud Detection With Prior Knowledge and Semantic Features","authors":"Shanyan Lai;Junfang Wu;Chunyang Ye;Zhiwei Ma","doi":"10.1109/TCSS.2024.3372519","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3372519","url":null,"abstract":"The utilization of text classification techniques has demonstrated great promise in the field of detecting consumer fraud based on consumer reviews. However, persistent challenges remain in handling large samples at the borders and identifying unforeseen fraud behaviors. To address these challenges, we propose a novel approach that combines a channel biattention convolutional neural network (CNN) with a pretrained language model. Specifically, we propose a similarity computation module for implicitly learning a metric matrix to characterize the similarity between prior knowledge and consumer reviews in vector space. Through this process, the model is able to learn and understand the relationship between prior knowledge and corresponding samples during training, thereby improving its ability to identify unforeseen fraudulent behaviors. Additionally, we propose a channel biattention CNN module to adaptively emphasize the importance of relevant prior knowledge to enhance the model's ability to accurately classify boundary samples. To ensure effective model training, we expand and organize a real-world dataset, reducing noise and increasing the number of fraud samples available for analysis. Experimental results demonstrate that our approach achieves state-of-the-art performance in fraud detection. Notably, our model is capable of detecting unforeseen fraud cases without the need for retraining or fine-tuning, making it highly adaptable and efficient in practical applications.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141994015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HGRec: Group Recommendation With Hypergraph Convolutional Networks HGRec:利用超图卷积网络进行分组推荐
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-18 DOI: 10.1109/TCSS.2024.3363843
Nan Wang;Dan Liu;Jin Zeng;Lijin Mu;Jinbao Li
Recommendation systems have shifted from personalization for individual users to consensus for groups as a result of people's growing tendency to join groups to participate in various everyday activities, like family meals and workplace reunions. This is because social networks have made it easier for people to participate in these kinds of events. Group recommendation is the process of suggesting items to groups. To derive group preferences, the majority of current approaches combine the individual preferences of group members utilizing heuristic or attention mechanism-based techniques. These approaches, however, have three issues. First, these approaches ignore the complex high-order interactions that occur both inside and outside of groups, just modeling the preferences of individual groups of users. Second, a group's ultimate decision is not always determined by the members’ preferences. Nevertheless, current approaches are not adequate to represent such preferences across groups. Last, data sparsity affects group recommendations due to the sparsity of group–item interactions. To overcome the aforementioned constraints, we propose employing hypergraph convolutional networks for group recommendation. Specifically, our design aims to achieve excellent group preferences by establishing a high-order preference extraction view represented by the hypergraph, a consistent preference extraction view represented by the overlap graph, and a conventional preference extraction view represented by the bipartite graph. The linkages between the three various views are then established by using cross-view contrastive learning, and the information between different views can be complementary, thereby improving each other. Comprehensive experiments on three publicly available datasets show that our method performs better than the state-of-the-art baseline.
由于人们越来越倾向于加入群体来参与各种日常活动,如家庭聚餐和职场团聚,推荐系统已经从针对个人用户的个性化服务转向针对群体的共识服务。这是因为社交网络让人们更容易参与这类活动。群体推荐是向群体推荐物品的过程。为了得出群体偏好,目前的大多数方法都是利用启发式或基于注意机制的技术将群体成员的个人偏好结合起来。然而,这些方法存在三个问题。首先,这些方法忽略了群体内外发生的复杂的高阶互动,只是对单个用户群体的偏好进行建模。其次,群体的最终决定并不总是由成员的偏好决定的。尽管如此,目前的方法还不足以代表不同群体的这种偏好。最后,由于群体与项目之间的交互稀少,数据稀疏性会影响群体推荐。为了克服上述限制,我们建议采用超图卷积网络来进行群组推荐。具体来说,我们的设计旨在通过建立以超图为代表的高阶偏好提取视图、以重叠图为代表的一致偏好提取视图和以双向图为代表的传统偏好提取视图,实现出色的分组偏好。然后通过跨视图对比学习建立三种不同视图之间的联系,不同视图之间的信息可以互补,从而相互促进。在三个公开数据集上进行的综合实验表明,我们的方法比最先进的基线方法表现更好。
{"title":"HGRec: Group Recommendation With Hypergraph Convolutional Networks","authors":"Nan Wang;Dan Liu;Jin Zeng;Lijin Mu;Jinbao Li","doi":"10.1109/TCSS.2024.3363843","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3363843","url":null,"abstract":"Recommendation systems have shifted from personalization for individual users to consensus for groups as a result of people's growing tendency to join groups to participate in various everyday activities, like family meals and workplace reunions. This is because social networks have made it easier for people to participate in these kinds of events. Group recommendation is the process of suggesting items to groups. To derive group preferences, the majority of current approaches combine the individual preferences of group members utilizing heuristic or attention mechanism-based techniques. These approaches, however, have three issues. First, these approaches ignore the complex high-order interactions that occur both inside and outside of groups, just modeling the preferences of individual groups of users. Second, a group's ultimate decision is not always determined by the members’ preferences. Nevertheless, current approaches are not adequate to represent such preferences across groups. Last, data sparsity affects group recommendations due to the sparsity of group–item interactions. To overcome the aforementioned constraints, we propose employing hypergraph convolutional networks for group recommendation. Specifically, our design aims to achieve excellent group preferences by establishing a high-order preference extraction view represented by the hypergraph, a consistent preference extraction view represented by the overlap graph, and a conventional preference extraction view represented by the bipartite graph. The linkages between the three various views are then established by using cross-view contrastive learning, and the information between different views can be complementary, thereby improving each other. Comprehensive experiments on three publicly available datasets show that our method performs better than the state-of-the-art baseline.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Synthetic-to-Real Ensemble Dehazing Algorithm With the Intermediate Domain 使用中间域的鲁棒合成到真实集合去毛刺算法
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-03-14 DOI: 10.1109/TCSS.2024.3392288
Yingxu Qiao;Xing Wang;Hongmin Liu;Zhanqiang Huo
Learning-based dehazing methods using synthetic datasets cannot generalize well on real-world hazy images due to the large domain discrepancy. To tackle this issue, we propose a robust synthetic-to-real dehazing framework with the construction of an intermediate domain and ensemble learning strategy. First, by mapping all examples to the intermediate domain, the bidirectional match strategy with adversarial training and the constraint of intermediated results is proposed to suppress the rich domain-specific information, which can facilitate the adaptation and perform image dehazing simultaneously. Furthermore, an ensemble dehazing algorithm based on the intermediate domain is proposed in a semisupervised manner. The reconstruction constraint and the enhanced ground-truths are employed to keep the visual fidelity and remove the dim artifacts of unsupervised dehazing results. Finally, we propose the domain-aware residual groups to deal with the distribution discrepancy between the synthetic and real hazy images. Extensive experiments of various real-world hazy images demonstrate that the proposed method outperforms the state-of-the-art dehazing methods and significantly improves the generalization in the real world.
由于领域差异较大,使用合成数据集的基于学习的去毛刺方法不能很好地泛化到真实世界的雾霾图像上。为了解决这个问题,我们提出了一种稳健的合成到真实去毛刺框架,即构建中间域和集合学习策略。首先,通过将所有实例映射到中间域,提出了具有对抗训练和中间结果约束的双向匹配策略,以抑制丰富的特定域信息,从而促进适应并同时执行图像去毛刺。此外,还提出了一种基于中间域的半监督式集合去毛刺算法。利用重构约束和增强的地面真实来保持视觉保真度,并消除无监督去毛刺结果的暗淡伪影。最后,我们提出了领域感知残差组来处理合成与真实灰度图像之间的分布差异。对各种真实世界的灰度图像进行的大量实验表明,所提出的方法优于最先进的去噪方法,并显著提高了在真实世界中的泛化能力。
{"title":"Robust Synthetic-to-Real Ensemble Dehazing Algorithm With the Intermediate Domain","authors":"Yingxu Qiao;Xing Wang;Hongmin Liu;Zhanqiang Huo","doi":"10.1109/TCSS.2024.3392288","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3392288","url":null,"abstract":"Learning-based dehazing methods using synthetic datasets cannot generalize well on real-world hazy images due to the large domain discrepancy. To tackle this issue, we propose a robust synthetic-to-real dehazing framework with the construction of an intermediate domain and ensemble learning strategy. First, by mapping all examples to the intermediate domain, the bidirectional match strategy with adversarial training and the constraint of intermediated results is proposed to suppress the rich domain-specific information, which can facilitate the adaptation and perform image dehazing simultaneously. Furthermore, an ensemble dehazing algorithm based on the intermediate domain is proposed in a semisupervised manner. The reconstruction constraint and the enhanced ground-truths are employed to keep the visual fidelity and remove the dim artifacts of unsupervised dehazing results. Finally, we propose the domain-aware residual groups to deal with the distribution discrepancy between the synthetic and real hazy images. Extensive experiments of various real-world hazy images demonstrate that the proposed method outperforms the state-of-the-art dehazing methods and significantly improves the generalization in the real world.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Density Subgraph Clustering 自适应密度子图聚类
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-03-13 DOI: 10.1109/TCSS.2024.3370669
Hongjie Jia;Yuhao Wu;Qirong Mao;Yang Li;Heping Song
Density peak clustering (DPC) has garnered growing interest over recent decades due to its capability to identify clusters with diverse shapes and its resilience to the presence of noisy data. Most DPC-based methods exhibit high computational complexity. One approach to mitigate this issue involves utilizing density subgraphs. Nevertheless, the utilization of density subgraphs may impose restrictions on cluster sizes and potentially lead to an excessive number of small clusters. Furthermore, effectively handling these small clusters, whether through merging or separation, to derive accurate results poses a significant challenge, particularly in scenarios where the number of clusters is unknown. To address these challenges, we propose an adaptive density subgraph clustering algorithm (ADSC). ADSC follows a systematic three-step procedure. First, the high-density regions in the dataset are recognized as density subgraphs based on k-nearest neighbor (KNN) density. Second, the initial clustering is carried out by utilizing an automated mechanism to identify the important density subgraphs and allocate outliers. Last, the obtained initial clustering results are further refined in an adaptive manner using the cluster self-ensemble technique, ultimately yielding the final clustering outcomes. The clustering performance of the proposed ADSC algorithm is evaluated on nineteen benchmark datasets. The experimental results demonstrate that ADSC possesses the ability to automatically determine the optimal number of clusters from intricate density data, all while maintaining high clustering efficiency. Comparative analysis against other well-known density clustering algorithms that require prior knowledge of cluster numbers reveals that ADSC consistently achieves comparable or superior clustering results.
近几十年来,密度峰聚类(DPC)因其能够识别形状各异的聚类以及对噪声数据的适应能力而受到越来越多的关注。大多数基于 DPC 的方法都表现出较高的计算复杂性。缓解这一问题的方法之一是利用密度子图。然而,利用密度子图可能会对簇的大小造成限制,并可能导致过多的小簇。此外,无论是通过合并还是分离,有效处理这些小簇以得出准确的结果都是一个巨大的挑战,尤其是在簇的数量未知的情况下。为了应对这些挑战,我们提出了一种自适应密度子图聚类算法(ADSC)。ADSC 采用系统化的三步程序。首先,根据 k-nearest neighbor(KNN)密度将数据集中的高密度区域识别为密度子图。其次,利用自动机制识别重要的密度子图并分配异常值,从而进行初始聚类。最后,利用聚类自组装技术,以自适应性的方式进一步完善获得的初始聚类结果,最终产生最终的聚类结果。在 19 个基准数据集上对所提出的 ADSC 算法的聚类性能进行了评估。实验结果表明,ADSC 有能力从错综复杂的密度数据中自动确定最佳聚类数量,同时保持较高的聚类效率。与其他需要事先了解聚类数目的著名密度聚类算法进行比较分析后发现,ADSC 始终能获得相当或更优的聚类结果。
{"title":"Adaptive Density Subgraph Clustering","authors":"Hongjie Jia;Yuhao Wu;Qirong Mao;Yang Li;Heping Song","doi":"10.1109/TCSS.2024.3370669","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3370669","url":null,"abstract":"Density peak clustering (DPC) has garnered growing interest over recent decades due to its capability to identify clusters with diverse shapes and its resilience to the presence of noisy data. Most DPC-based methods exhibit high computational complexity. One approach to mitigate this issue involves utilizing density subgraphs. Nevertheless, the utilization of density subgraphs may impose restrictions on cluster sizes and potentially lead to an excessive number of small clusters. Furthermore, effectively handling these small clusters, whether through merging or separation, to derive accurate results poses a significant challenge, particularly in scenarios where the number of clusters is unknown. To address these challenges, we propose an adaptive density subgraph clustering algorithm (ADSC). ADSC follows a systematic three-step procedure. First, the high-density regions in the dataset are recognized as density subgraphs based on k-nearest neighbor (KNN) density. Second, the initial clustering is carried out by utilizing an automated mechanism to identify the important density subgraphs and allocate outliers. Last, the obtained initial clustering results are further refined in an adaptive manner using the cluster self-ensemble technique, ultimately yielding the final clustering outcomes. The clustering performance of the proposed ADSC algorithm is evaluated on nineteen benchmark datasets. The experimental results demonstrate that ADSC possesses the ability to automatically determine the optimal number of clusters from intricate density data, all while maintaining high clustering efficiency. Comparative analysis against other well-known density clustering algorithms that require prior knowledge of cluster numbers reveals that ADSC consistently achieves comparable or superior clustering results.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Summarization of Microblog Data: An Aid in Handling Disaster Situations 微博数据的在线汇总:灾难情况处理辅助工具
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-12 DOI: 10.1109/TCSS.2023.3347520
Dipanjyoti Paul;Shivani Rana;Sriparna Saha;Jimson Mathew
During any natural disaster or unfortunate accident, both civilians and responders need information on an urgent basis. In such events, microblogging sites particularly Twitter plays an important role in providing real-time information. The raw form of microblog tweets is prodigiously informative but massive in size. The end-users and data analysts have to go through millions of tweets before extraction of any information. To ease the process and extract only relevant information, artificial intelligence (AI)-based techniques can be incorporated to generate summaries from the incoming information. Moreover, tweets keep on arriving continuously in a streaming manner, and therefore in ideal cases, the summaries also need to be updated continuously. In this work, we have proposed a clustering-based summary generation approach that takes multiviewed representations of data and utilizes a new variant of generative adversarial network (GAN) named triple-GAN to perform clustering. Triple-GAN consists of three networks, a generator, a discriminator, and a separator. Maintaining equilibrium among these networks requires proper parameter tuning which makes training of GAN difficult. In the literature, GAN-based techniques have been extensively applied to image datasets. In the proposed method, we have explored the usage of GAN for text data in an unsupervised manner and the analysis of the training of GAN has also been reported. The developed method opens up a new direction in utilizing GAN for solving clustering problem of text data. The proposed method is applied to two versions of four disaster-based microblog datasets and obtained results are compared with many existing and a few baseline methods. The comparative study illustrates the superiority and efficacy of the developed method.
在任何自然灾害或不幸事故中,平民和救援人员都需要紧急信息。在此类事件中,微博网站尤其是 Twitter 在提供实时信息方面发挥了重要作用。微博推文的原始形式信息量巨大,但体积庞大。终端用户和数据分析师在提取任何信息之前,都必须浏览数百万条微博。为了简化这一过程并只提取相关信息,可以采用基于人工智能(AI)的技术,从接收到的信息中生成摘要。此外,推文以流式方式不断到达,因此在理想情况下,摘要也需要不断更新。在这项工作中,我们提出了一种基于聚类的摘要生成方法,该方法采用多视图数据表示,并利用生成式对抗网络(GAN)的一种新变体(名为三重-GAN)来执行聚类。三重对抗网络由生成器、判别器和分离器三个网络组成。要保持这些网络之间的平衡,需要对参数进行适当调整,这给 GAN 的训练带来了困难。在文献中,基于 GAN 的技术已被广泛应用于图像数据集。在所提出的方法中,我们以无监督的方式探索了 GAN 在文本数据中的应用,并对 GAN 的训练进行了分析。所开发的方法为利用 GAN 解决文本数据聚类问题开辟了一个新方向。将所提出的方法应用于四个基于灾难的微博数据集的两个版本,并将所获得的结果与许多现有方法和一些基线方法进行了比较。比较研究说明了所开发方法的优越性和有效性。
{"title":"Online Summarization of Microblog Data: An Aid in Handling Disaster Situations","authors":"Dipanjyoti Paul;Shivani Rana;Sriparna Saha;Jimson Mathew","doi":"10.1109/TCSS.2023.3347520","DOIUrl":"https://doi.org/10.1109/TCSS.2023.3347520","url":null,"abstract":"During any natural disaster or unfortunate accident, both civilians and responders need information on an urgent basis. In such events, microblogging sites particularly Twitter plays an important role in providing real-time information. The raw form of microblog tweets is prodigiously informative but massive in size. The end-users and data analysts have to go through millions of tweets before extraction of any information. To ease the process and extract only relevant information, artificial intelligence (AI)-based techniques can be incorporated to generate summaries from the incoming information. Moreover, tweets keep on arriving continuously in a streaming manner, and therefore in ideal cases, the summaries also need to be updated continuously. In this work, we have proposed a clustering-based summary generation approach that takes multiviewed representations of data and utilizes a new variant of generative adversarial network (GAN) named triple-GAN to perform clustering. Triple-GAN consists of three networks, a generator, a discriminator, and a separator. Maintaining equilibrium among these networks requires proper parameter tuning which makes training of GAN difficult. In the literature, GAN-based techniques have been extensively applied to image datasets. In the proposed method, we have explored the usage of GAN for text data in an unsupervised manner and the analysis of the training of GAN has also been reported. The developed method opens up a new direction in utilizing GAN for solving clustering problem of text data. The proposed method is applied to two versions of four disaster-based microblog datasets and obtained results are compared with many existing and a few baseline methods. The comparative study illustrates the superiority and efficacy of the developed method.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Stage Information Spreading Evolution on the Control Role of Announcements 关于公告控制作用的两阶段信息传播演化
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-12 DOI: 10.1109/TCSS.2024.3367385
Jinhu Ren;Fuzhong Nian;Xiaochen Yang
Modern social media networks have become an important platform for information competition among countries, regions, companies, and other parties. This article utilizes the research method of spread dynamics to investigate the influence of the control role of announcements in social networks on the spreading process. This article distinguishes two spreading phases using the authentication intervention as a boundary: the unconfirmed spreading phase and the confirmed spreading phase. Based on the actual rules of spreading in online social networks, two kinds of verification results are defined: true information and false information. The two-stage information spreading dynamics model is developed to analyze the changes in spreading effects due to different validation results. The impact of the intervention time on the overall spread process is analyzed by combining important control factors such as response cost and time sensitivity. The validity of the model is verified by comparing the model simulation results with real cases and the adaptive capacity experiments. This work is analyzed and visualized from multiple perspectives, providing more quantitative results. The research content will provide a scientific basis for the intervention behavior of information management control by relevant departments or authorities.
现代社交媒体网络已成为国家、地区、企业等各方信息竞争的重要平台。本文运用传播动力学的研究方法,探讨社交网络中公告的控制作用对传播过程的影响。本文以认证干预为界,将传播分为两个阶段:未确认传播阶段和已确认传播阶段。根据在线社交网络的实际传播规则,定义了两种验证结果:真实信息和虚假信息。建立两阶段信息传播动力学模型,分析不同验证结果导致的传播效果变化。结合响应成本和时间敏感性等重要控制因素,分析了干预时间对整个传播过程的影响。通过将模型模拟结果与实际案例和自适应能力实验进行比较,验证了模型的有效性。这项工作从多个角度进行分析和可视化,提供了更多量化结果。研究内容将为相关部门或权威机构的信息管理控制干预行为提供科学依据。
{"title":"Two-Stage Information Spreading Evolution on the Control Role of Announcements","authors":"Jinhu Ren;Fuzhong Nian;Xiaochen Yang","doi":"10.1109/TCSS.2024.3367385","DOIUrl":"10.1109/TCSS.2024.3367385","url":null,"abstract":"Modern social media networks have become an important platform for information competition among countries, regions, companies, and other parties. This article utilizes the research method of spread dynamics to investigate the influence of the control role of announcements in social networks on the spreading process. This article distinguishes two spreading phases using the authentication intervention as a boundary: the unconfirmed spreading phase and the confirmed spreading phase. Based on the actual rules of spreading in online social networks, two kinds of verification results are defined: true information and false information. The two-stage information spreading dynamics model is developed to analyze the changes in spreading effects due to different validation results. The impact of the intervention time on the overall spread process is analyzed by combining important control factors such as response cost and time sensitivity. The validity of the model is verified by comparing the model simulation results with real cases and the adaptive capacity experiments. This work is analyzed and visualized from multiple perspectives, providing more quantitative results. The research content will provide a scientific basis for the intervention behavior of information management control by relevant departments or authorities.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140428970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Steganography via Live Comments on Streaming Video Frames 通过对流媒体视频帧的实时评论生成隐写术
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-03-12 DOI: 10.1109/TCSS.2024.3352979
Yuling Liu;Cuilin Wang;Jie Wang;Bo Ou;Xin Liao
Generative text steganography has received considerable attention in the covert communication community for the benefit of sending secret messages without the need to modify carriers. Existing methods typically choose the next word when generating a stego-text based on conditional probability encoding of candidates, which may lead to generating inadequate words for the underlying secret message. How to generate a semantically controllable stego-text with a high capacity on secure embedding of a secret message is a main challenge. We address this challenge by proposing a new paradigm to generative text steganography that takes advantage of certain social media through apparently normal behaviors from the sender. In particular, we make use of the live commenting feature provided by public video sharing platforms (PVSPs), which allow viewers to make comments on video scenes that will fly on screens when the scenes are shown. We show that this feature can be used to construct a generative steganographic system. The sender generates at random a number of distracting words and a certain invertible matrix called W-$d$ matrix based on the total number of message words and distracting words. The sender then transforms a sequence of indexes of these words to a sequence, selects one or more videos with a sufficiently large number of total frames, and generates a comment on each frame in the sequence. The receiver extracts commented frame indexes, uses the shared stego-key to generate the same W-$d$ matrix as the sender, and obtains the secret message using the inverse of the matrix. The stego-key consists of a vocabulary generator and a W-$d$ matrix generator (WMG) based on pseudorandomly generated numbers. To generate comments on frames that conform to comments made by viewers, we devise a neural ResNet-LSTM model to generate a comment for an input image based on its content. Theoretical analysis shows that commented video frames (CVF) is covert, secure, efficient, and feasible to conceal any message of arbitrary length. We implement CVF and present evaluation results from multiple aspects that our work outperforms the existing stego-methods.
生成式文本隐写术无需修改载体即可发送秘密信息,因此在隐蔽通信领域受到广泛关注。现有方法在生成隐写文本时,通常根据候选词的条件概率编码来选择下一个词,这可能会导致生成的词不适合底层密文。如何在安全嵌入密文的基础上生成高容量、语义可控的隐去文本是一个主要挑战。为了应对这一挑战,我们提出了一种新的生成文本隐写术范式,即通过发送者表面上的正常行为来利用某些社交媒体。特别是,我们利用了公共视频共享平台(PVSP)提供的实时评论功能,该功能允许观众对视频场景发表评论,这些评论会在场景播放时出现在屏幕上。我们证明,这一功能可用于构建生成式隐写系统。发送者根据信息字词和干扰字词的总数随机生成一定数量的干扰字词和称为 W-$d$ 矩阵的可逆矩阵。然后,发送方将这些词的索引序列转换为序列,选择一个或多个总帧数足够多的视频,并为序列中的每个帧生成注释。接收方提取注释帧索引,使用共享的隐密密钥生成与发送方相同的 W-$d$ 矩阵,并利用矩阵的逆变换获取密文。隐密密钥由词汇生成器和基于伪随机生成数字的 W-$d$ 矩阵生成器 (WMG) 组成。为了生成符合观众评论的帧评论,我们设计了一个 ResNet-LSTM 神经模型,根据输入图像的内容生成评论。理论分析表明,评论视频帧(CVF)具有隐蔽性、安全性、高效性和可行性,可以隐藏任意长度的信息。我们实现了 CVF,并从多个方面给出了评估结果,证明我们的工作优于现有的偷窃方法。
{"title":"Generative Steganography via Live Comments on Streaming Video Frames","authors":"Yuling Liu;Cuilin Wang;Jie Wang;Bo Ou;Xin Liao","doi":"10.1109/TCSS.2024.3352979","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3352979","url":null,"abstract":"Generative text steganography has received considerable attention in the covert communication community for the benefit of sending secret messages without the need to modify carriers. Existing methods typically choose the next word when generating a stego-text based on conditional probability encoding of candidates, which may lead to generating inadequate words for the underlying secret message. How to generate a semantically controllable stego-text with a high capacity on secure embedding of a secret message is a main challenge. We address this challenge by proposing a new paradigm to generative text steganography that takes advantage of certain social media through apparently normal behaviors from the sender. In particular, we make use of the live commenting feature provided by public video sharing platforms (PVSPs), which allow viewers to make comments on video scenes that will fly on screens when the scenes are shown. We show that this feature can be used to construct a generative steganographic system. The sender generates at random a number of distracting words and a certain invertible matrix called W-\u0000<inline-formula><tex-math>$d$</tex-math></inline-formula>\u0000 matrix based on the total number of message words and distracting words. The sender then transforms a sequence of indexes of these words to a sequence, selects one or more videos with a sufficiently large number of total frames, and generates a comment on each frame in the sequence. The receiver extracts commented frame indexes, uses the shared stego-key to generate the same W-\u0000<inline-formula><tex-math>$d$</tex-math></inline-formula>\u0000 matrix as the sender, and obtains the secret message using the inverse of the matrix. The stego-key consists of a vocabulary generator and a W-\u0000<inline-formula><tex-math>$d$</tex-math></inline-formula>\u0000 matrix generator (WMG) based on pseudorandomly generated numbers. To generate comments on frames that conform to comments made by viewers, we devise a neural ResNet-LSTM model to generate a comment for an input image based on its content. Theoretical analysis shows that commented video frames (CVF) is covert, secure, efficient, and feasible to conceal any message of arbitrary length. We implement CVF and present evaluation results from multiple aspects that our work outperforms the existing stego-methods.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Discovery and Mining System of Blockchain Extractable Value for Decentralized Finance Protocol Optimization 用于去中心化金融协议优化的区块链可提取价值实时发现和挖掘系统
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-03-07 DOI: 10.1109/TCSS.2024.3386716
Fangzhou Tang;Yuhang Liu;Qian Zhao;Yayun Cheng
The adoption of blockchain technology has catalyzed the expansion of decentralized finance (DeFi), leading to the harnessing of blockchain platforms. However, the decentralization of blockchain has given rise to blockchain extractable value (BEV) activities, influenced by consensus mechanisms. This study centers on BEV, unveiling a real-time discovery and mining system (RDMS) tailored for arbitrage-based DeFi activities. The system employs innovative methodologies for localized computation and execution. It establishes a comprehensive monitoring system for arbitrage and liquidation activities, contributing positively to the DeFi ecosystem. Leveraging round-the-clock on-chain data indexing and event-driven parsing methods, the RDMS enables automated and periodic analysis of BEV activities. This system provides valuable insights for BEV research, particularly in the context of arbitrage and liquidation activities. And we are able to consistently extract value using arbitrage strategies on blockchains, using RDMS that monitors the chain in real time and applies gas cost reduction mechanisms. Experimental testing and comparative analysis validate the RDMS's effectiveness, showcasing minimal latency and remarkable gas optimization capabilities.
区块链技术的采用催化了去中心化金融(DeFi)的扩张,导致了区块链平台的利用。然而,受共识机制的影响,区块链的去中心化催生了区块链可提取价值(BEV)活动。本研究以区块链可提取价值(BEV)为中心,揭示了一个专为基于套利的区块链可提取价值(DeFi)活动定制的实时发现和挖掘系统(RDMS)。该系统采用创新方法进行本地化计算和执行。它为套利和清算活动建立了一个全面的监控系统,为 DeFi 生态系统做出了积极贡献。利用全天候链上数据索引和事件驱动解析方法,RDMS 可对 BEV 活动进行自动和定期分析。该系统为 BEV 研究提供了宝贵的见解,尤其是在套利和清算活动方面。利用实时监控区块链并应用气体成本降低机制的 RDMS,我们能够利用区块链上的套利策略持续提取价值。实验测试和对比分析验证了 RDMS 的有效性,展示了最小延迟和卓越的气体优化能力。
{"title":"Real-Time Discovery and Mining System of Blockchain Extractable Value for Decentralized Finance Protocol Optimization","authors":"Fangzhou Tang;Yuhang Liu;Qian Zhao;Yayun Cheng","doi":"10.1109/TCSS.2024.3386716","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3386716","url":null,"abstract":"The adoption of blockchain technology has catalyzed the expansion of decentralized finance (DeFi), leading to the harnessing of blockchain platforms. However, the decentralization of blockchain has given rise to blockchain extractable value (BEV) activities, influenced by consensus mechanisms. This study centers on BEV, unveiling a real-time discovery and mining system (RDMS) tailored for arbitrage-based DeFi activities. The system employs innovative methodologies for localized computation and execution. It establishes a comprehensive monitoring system for arbitrage and liquidation activities, contributing positively to the DeFi ecosystem. Leveraging round-the-clock on-chain data indexing and event-driven parsing methods, the RDMS enables automated and periodic analysis of BEV activities. This system provides valuable insights for BEV research, particularly in the context of arbitrage and liquidation activities. And we are able to consistently extract value using arbitrage strategies on blockchains, using RDMS that monitors the chain in real time and applies gas cost reduction mechanisms. Experimental testing and comparative analysis validate the RDMS's effectiveness, showcasing minimal latency and remarkable gas optimization capabilities.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Computational Social Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1