首页 > 最新文献

IEEE Transactions on Computational Social Systems最新文献

英文 中文
Temporal Interaction Embedding for Link Prediction in Global News Event Graph 为全球新闻事件图中的链接预测进行时态交互嵌入
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-02-14 DOI: 10.1109/TCSS.2024.3357696
Jing Yang;Laurence T. Yang;Hao Wang;Yuan Gao
Global news events graphs (GNEG) are designed for the noisy and ungrammatical world's news media, aiming at capturing the true insight and providing explanations by incorporating potential dimensions and network structures of global news. This article focuses on the temporal representation learning of GNEG to eliminate misunderstanding or ambiguity caused by missing information. Although some temporal models have been developed, the crossover interactions among entity, relation, and time have not been explicitly discussed. The multidirectional effects between entities, relations, and timestamps matter in predicting the establishment of quadruples. This motivates the proposal of learning temporal interaction embeddings (TIE) to benefit GNEG link prediction performance. Specifically, we propose the following. 1) We propose a crossover convolution layer to learn the two-by-two and common interaction features of entity, relation, and time in GNEG to capture their potential effect patterns in the context of different quadruples. 2) For the learned interaction information, we adopt tensor neural network (TNN) to maintain the multiple order structure and further extract effective features to improve prediction. 3) A tensor temporal consistency constraint (TCC) is proposed to enhance the learning of time-weakly sensitive information and induce the embeddings to have a certain compatibility over time. Finally, we carried out extensive experiments on three benchmark datasets, the results proved that the performance of the proposed TIE model is competitive with the state-of-the-art methods.
全球新闻事件图(Global News Events Graphs,GNEG)是针对嘈杂且无语法可言的世界新闻媒体而设计的,旨在通过纳入全球新闻的潜在维度和网络结构来捕捉真实的洞察力并提供解释。本文重点讨论 GNEG 的时间表示学习,以消除因信息缺失而造成的误解或歧义。虽然已经开发了一些时间模型,但实体、关系和时间之间的交叉互动尚未得到明确讨论。实体、关系和时间戳之间的多向影响对预测四元组的建立非常重要。这就促使我们提出了学习时间交互嵌入(TIE)以提高 GNEG 链接预测性能的建议。具体来说,我们提出以下建议。1) 我们提出了一个交叉卷积层来学习 GNEG 中实体、关系和时间的两两和共同交互特征,以捕捉它们在不同四元组上下文中的潜在影响模式。2) 对于学习到的交互信息,我们采用张量神经网络(TNN)来保持多阶结构,并进一步提取有效特征来改进预测。3) 我们提出了张量时间一致性约束(TCC),以加强对时间弱敏感信息的学习,并促使嵌入在时间上具有一定的兼容性。最后,我们在三个基准数据集上进行了大量实验,结果证明所提出的 TIE 模型的性能与最先进的方法相比具有竞争力。
{"title":"Temporal Interaction Embedding for Link Prediction in Global News Event Graph","authors":"Jing Yang;Laurence T. Yang;Hao Wang;Yuan Gao","doi":"10.1109/TCSS.2024.3357696","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3357696","url":null,"abstract":"Global news events graphs (GNEG) are designed for the noisy and ungrammatical world's news media, aiming at capturing the true insight and providing explanations by incorporating potential dimensions and network structures of global news. This article focuses on the temporal representation learning of GNEG to eliminate misunderstanding or ambiguity caused by missing information. Although some temporal models have been developed, the crossover interactions among entity, relation, and time have not been explicitly discussed. The multidirectional effects between entities, relations, and timestamps matter in predicting the establishment of quadruples. This motivates the proposal of learning temporal interaction embeddings (TIE) to benefit GNEG link prediction performance. Specifically, we propose the following. 1) We propose a crossover convolution layer to learn the two-by-two and common interaction features of entity, relation, and time in GNEG to capture their potential effect patterns in the context of different quadruples. 2) For the learned interaction information, we adopt tensor neural network (TNN) to maintain the multiple order structure and further extract effective features to improve prediction. 3) A tensor temporal consistency constraint (TCC) is proposed to enhance the learning of time-weakly sensitive information and induce the embeddings to have a certain compatibility over time. Finally, we carried out extensive experiments on three benchmark datasets, the results proved that the performance of the proposed TIE model is competitive with the state-of-the-art methods.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-Centric Modeling of Online Hate Through the Lens of Psycholinguistic Patterns and Behaviors in Social Media 通过社交媒体中的心理语言模式和行为,建立以用户为中心的网络仇恨模型
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-13 DOI: 10.1109/TCSS.2024.3359010
Zeinab Noorian;Amira Ghenai;Hadiseh Moradisani;Fattane Zarrinkalam;Soroush Zamani Alavijeh
Hate speech in social media is a growing problem that reinforces racial discrimination and mistrust between people, leading to physical crimes, violence, and fragmentation in world communities. Although previous studies showed the potential of user profiling in hate speech detection in social media, there has not been a thorough analysis of users’ characteristics and dispositions to understand the development of hate attitudes among users. To bridge this gap, we investigate the role of a wide range of psycholinguistic and behavioral traits in characterizing and distinguishing users prone to post hate speech on social media. Considering anti-Asian hate during the COVID-19 pandemic as a case study, we curate a dataset of 5 417 041 tweets from 3001 Twitter users prone to publish hate content (aka hateful-to-be users) and a corresponding matched set of 3001 control users. Our findings reveal significant statistical differences in most dimensions of psycholinguistic attributes and online activities of hateful-to-be users compared to control users. We further develop a classifier and demonstrate that features derived from user timelines are strong indicators for automatically predicting the onset of hateful behavior.
社交媒体中的仇恨言论是一个日益严重的问题,它强化了种族歧视和人与人之间的不信任,导致人身犯罪、暴力和世界社区的分裂。尽管之前的研究显示了用户特征分析在社交媒体仇恨言论检测中的潜力,但还没有对用户的特征和倾向进行透彻的分析,以了解用户仇恨态度的发展。为了弥补这一不足,我们研究了一系列心理语言和行为特征在表征和区分易在社交媒体上发表仇恨言论的用户方面的作用。以 COVID-19 大流行期间的反亚裔仇恨为案例,我们从 3001 名易发布仇恨内容的 Twitter 用户(又称 "仇恨用户")和相应的 3001 名对照用户中,整理出了一个包含 5 417 041 条推文的数据集。我们的研究结果表明,与对照用户相比,"怀恨在心 "用户在心理语言属性和网络活动的大部分维度上都存在明显的统计差异。我们进一步开发了一个分类器,并证明了从用户时间轴中提取的特征是自动预测仇恨行为发生的有力指标。
{"title":"User-Centric Modeling of Online Hate Through the Lens of Psycholinguistic Patterns and Behaviors in Social Media","authors":"Zeinab Noorian;Amira Ghenai;Hadiseh Moradisani;Fattane Zarrinkalam;Soroush Zamani Alavijeh","doi":"10.1109/TCSS.2024.3359010","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3359010","url":null,"abstract":"Hate speech in social media is a growing problem that reinforces racial discrimination and mistrust between people, leading to physical crimes, violence, and fragmentation in world communities. Although previous studies showed the potential of user profiling in hate speech detection in social media, there has not been a thorough analysis of users’ characteristics and dispositions to understand the development of hate attitudes among users. To bridge this gap, we investigate the role of a wide range of psycholinguistic and behavioral traits in characterizing and distinguishing users prone to post hate speech on social media. Considering anti-Asian hate during the COVID-19 pandemic as a case study, we curate a dataset of 5 417 041 tweets from 3001 Twitter users prone to publish hate content (aka hateful-to-be users) and a corresponding matched set of 3001 control users. Our findings reveal significant statistical differences in most dimensions of psycholinguistic attributes and online activities of hateful-to-be users compared to control users. We further develop a classifier and demonstrate that features derived from user timelines are strong indicators for automatically predicting the onset of hateful behavior.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Nodes Evaluation Method Based on Combination Weighting VIKOR in Social Networks 社交网络中基于组合加权 VIKOR 的关键节点评估方法
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-02-13 DOI: 10.1109/TCSS.2024.3360618
Jian Shu;Yao Liang;Wanli Ma;Linlan Liu
Evaluation of key nodes is a hot issue in social networks. Existing research primarily evaluates the importance of nodes in social networks based on centrality metrics, neglecting the node’s own attributes. After analyzing the topology attributes and the basic attributes of nodes, this article proposes a key nodes evaluation method for social networks, which is based on analytic hierarchy process (AHP) and improved Vise Kriterijumska Optimizacija I Kompromisno Resenje (VIKOR), termed AE-VIKOR. Considering global attributes, local attributes, and positional attributes of nodes, three evaluation metrics are constructed. The subjective and objective weights are computed by AHP and entropy weight method, respectively. The comprehensive weights of metrics are determined by combination weighting method based on square sums of distance. Due to the excessive weight of specific metrics and excessive difference in data distribution, the computation of individual regret value depends too much on a single metric in VIKOR method, individual regret value is optimized by weighted sum of closeness between the scheme to be evaluated and the negative ideal scheme. Multimetric evaluation schemes are ranked to achieve the evaluation of key nodes. Experiments on two real social network datasets show that the key nodes evaluated by AE-VIKOR have stronger information spread ability and more fans than the ones of the existing methods. In addition, the validity of the three metrics and the two improvements on the VIKOR method are verified by ablation experiments.
关键节点的评估是社交网络中的一个热点问题。现有研究主要基于中心度指标评价节点在社交网络中的重要性,忽略了节点自身的属性。本文在分析了节点的拓扑属性和基本属性后,提出了一种基于层次分析法(AHP)和改进型 Vise Kriterijumska Optimizacija I Kompromisno Resenje(VIKOR)的社交网络关键节点评价方法,称为 AE-VIKOR。考虑到节点的全局属性、局部属性和位置属性,构建了三个评价指标。主观权重和客观权重分别采用 AHP 和熵权法计算。指标的综合权重由基于距离平方和的组合权重法确定。由于具体指标权重过大,数据分布差异过大,VIKOR 方法中个体遗憾值的计算过于依赖单一指标,因此采用待评价方案与负理想方案的接近度加权和来优化个体遗憾值。多指标评价方案通过排序实现对关键节点的评价。在两个真实社交网络数据集上的实验表明,AE-VIKOR 评估的关键节点与现有方法相比具有更强的信息传播能力和更多的粉丝。此外,三种度量方法的有效性和对 VIKOR 方法的两种改进也通过消融实验得到了验证。
{"title":"Key Nodes Evaluation Method Based on Combination Weighting VIKOR in Social Networks","authors":"Jian Shu;Yao Liang;Wanli Ma;Linlan Liu","doi":"10.1109/TCSS.2024.3360618","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3360618","url":null,"abstract":"Evaluation of key nodes is a hot issue in social networks. Existing research primarily evaluates the importance of nodes in social networks based on centrality metrics, neglecting the node’s own attributes. After analyzing the topology attributes and the basic attributes of nodes, this article proposes a key nodes evaluation method for social networks, which is based on analytic hierarchy process (AHP) and improved Vise Kriterijumska Optimizacija I Kompromisno Resenje (VIKOR), termed AE-VIKOR. Considering global attributes, local attributes, and positional attributes of nodes, three evaluation metrics are constructed. The subjective and objective weights are computed by AHP and entropy weight method, respectively. The comprehensive weights of metrics are determined by combination weighting method based on square sums of distance. Due to the excessive weight of specific metrics and excessive difference in data distribution, the computation of individual regret value depends too much on a single metric in VIKOR method, individual regret value is optimized by weighted sum of closeness between the scheme to be evaluated and the negative ideal scheme. Multimetric evaluation schemes are ranked to achieve the evaluation of key nodes. Experiments on two real social network datasets show that the key nodes evaluated by AE-VIKOR have stronger information spread ability and more fans than the ones of the existing methods. In addition, the validity of the three metrics and the two improvements on the VIKOR method are verified by ablation experiments.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation STIDNet:利用时空知识提炼进行身份识别型人脸伪造检测
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-02-12 DOI: 10.1109/TCSS.2024.3356549
Mingqi Fang;Lingyun Yu;Hongtao Xie;Qingfeng Tan;Zhiyuan Tan;Amir Hussain;Zezheng Wang;Jiahong Li;Zhihong Tian
The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are seen as one of promising face forgery detection approaches with additional reference video. However, without in-depth observation of fake video's characteristics, most existing identity-aware algorithms are just naive imitation of face verification model and fail to exploit discriminative information. In this article, we argue that it is necessary to take both spatial and temporal perspectives into consideration for adequate inconsistency clues and propose a novel forgery detector named SpatioTemporal IDentity network (STIDNet). To effectively capture heterogeneous spatiotemporal information in a unified formulation, our STIDNet is following a knowledge distillation architecture that the student identity extractor receives supervision from a spatial information encoder (SIE) and a temporal information encoder (TIE) through multiteacher training. Specifically, a regional sensitive identity modeling paradigm is proposed in SIE by introducing facial blending augmentation but with uniform identity label, thus encourage model to focus on spatial discriminative region like outer face. Meanwhile, considering the strong temporal correlation between audio and talking face video, our TIE is devised in a cross-modal pattern that the audio information is introduced to supervise model exploiting temporal personalized movements. Benefit from knowledge transfer from SIE and TIE, STIDNet is able to capture individual's essential spatiotemporal identity attributes and sensitive to even subtle identity deviation caused by manipulation. Extensive experiments indicate the superiority of our STIDNet compared with previous works. Moreover, we also demonstrate STIDNet is more suitable for real-world implementation in terms of model complexity and reference set size.
面部伪造技术的迅猛发展引起了公众的严重关切。身份感知方法,尤其是适用于保护名人的身份感知方法,被认为是一种通过附加参考视频进行人脸伪造检测的有前途的方法。然而,由于缺乏对伪造视频特征的深入观察,大多数现有的身份感知算法只是对人脸验证模型的天真模仿,无法利用鉴别信息。在这篇文章中,我们认为有必要从空间和时间两个角度来获取足够的不一致线索,并提出了一种名为 "时空身份识别网络(STIDNet)"的新型伪造检测器。为了以统一的表述有效捕捉异构时空信息,我们的 STIDNet 采用了知识提炼架构,即学生身份提取器通过多教师训练接受空间信息编码器(SIE)和时间信息编码器(TIE)的监督。具体来说,在 SIE 中提出了一种区域敏感的身份建模范式,即通过引入面部混合增强但统一身份标签,从而鼓励模型将注意力集中在外侧面部等空间分辨区域。同时,考虑到音频和人脸视频之间存在很强的时间相关性,我们的 TIE 采用了跨模态模式,即引入音频信息来监督利用时间个性化运动的模型。得益于 SIE 和 TIE 的知识转移,STIDNet 能够捕捉个人的基本时空身份属性,并对操纵造成的细微身份偏差保持敏感。大量实验表明,与之前的研究相比,我们的 STIDNet 更具优势。此外,我们还证明 STIDNet 在模型复杂度和参考集大小方面更适合实际应用。
{"title":"STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation","authors":"Mingqi Fang;Lingyun Yu;Hongtao Xie;Qingfeng Tan;Zhiyuan Tan;Amir Hussain;Zezheng Wang;Jiahong Li;Zhihong Tian","doi":"10.1109/TCSS.2024.3356549","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3356549","url":null,"abstract":"The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are seen as one of promising face forgery detection approaches with additional reference video. However, without in-depth observation of fake video's characteristics, most existing identity-aware algorithms are just naive imitation of face verification model and fail to exploit discriminative information. In this article, we argue that it is necessary to take both spatial and temporal perspectives into consideration for adequate inconsistency clues and propose a novel forgery detector named SpatioTemporal IDentity network (STIDNet). To effectively capture heterogeneous spatiotemporal information in a unified formulation, our STIDNet is following a knowledge distillation architecture that the student identity extractor receives supervision from a spatial information encoder (SIE) and a temporal information encoder (TIE) through multiteacher training. Specifically, a regional sensitive identity modeling paradigm is proposed in SIE by introducing facial blending augmentation but with uniform identity label, thus encourage model to focus on spatial discriminative region like outer face. Meanwhile, considering the strong temporal correlation between audio and talking face video, our TIE is devised in a cross-modal pattern that the audio information is introduced to supervise model exploiting temporal personalized movements. Benefit from knowledge transfer from SIE and TIE, STIDNet is able to capture individual's essential spatiotemporal identity attributes and sensitive to even subtle identity deviation caused by manipulation. Extensive experiments indicate the superiority of our STIDNet compared with previous works. Moreover, we also demonstrate STIDNet is more suitable for real-world implementation in terms of model complexity and reference set size.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks 基于进化博弈论的反隐私推断攻击合作框架
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-12 DOI: 10.1109/TCSS.2024.3359254
Yuzi Yi;Nafei Zhu;Jingsha He;Anca Delia Jurcut;Xiangjun Ma;Yehong Luo
Privacy inference poses a significant threat to users of online social networks (OSNs). To deal with this issue, a number of privacy-enhancing technologies have been proposed with the goal of achieving a balance between the protection of privacy and the utility of data. Previous studies, however, failed to take into consideration the impact of the interdependency of privacy (IoP), which dictates that privacy decisions made by some users may affect the privacy of some other users. The implication of IoP is that too much privacy may be disclosed when multiple individuals share data with the same data accessor because privacy conflicts resulting from independent privacy decisions would make it possible for adversaries to infer the privacy of the target user. Ideally, cooperation that preserves privacy should allow OSN users to respect each other’s privacy specifications so as to resolve such privacy conflicts caused by independent privacy decisions of individuals. To facilitate the design, we propose a privacy-preserving cooperation framework based on the evolutionary game theory to facilitate such cooperation. Based on the framework, the dynamics of user strategies regarding whether to participate in the cooperation are analyzed and an evolutionary stable state is derived to serve as the basis for incentivizing users to participate in cooperative privacy protection. Experiments based on real OSN data show that the proposed cooperation framework is effective in modeling the behaviors of users and that the proposed incentive allocation method can incentivize users to participate in the cooperation. The proposed cooperation framework can not only helps lower the threat to user privacy resulting from privacy inference by data accessors but also allows OSN service providers to design effective privacy protection policies.
隐私推断对在线社交网络(OSN)用户构成了重大威胁。为了解决这个问题,人们提出了许多隐私增强技术,目的是在保护隐私和数据实用性之间实现平衡。然而,以往的研究没有考虑到隐私相互依赖(IoP)的影响,即一些用户做出的隐私决定可能会影响到其他一些用户的隐私。IoP 的含义是,当多人与同一数据访问者共享数据时,可能会泄露过多隐私,因为独立隐私决策导致的隐私冲突会使对手有可能推断出目标用户的隐私。理想情况下,保护隐私的合作应允许 OSN 用户相互尊重对方的隐私规范,以解决因个人独立隐私决策而产生的隐私冲突。为了便于设计,我们提出了一个基于进化博弈论的隐私保护合作框架,以促进这种合作。基于该框架,我们分析了用户是否参与合作的策略动态,并得出了一种进化稳定状态,作为激励用户参与合作保护隐私的基础。基于真实 OSN 数据的实验表明,所提出的合作框架能有效地模拟用户行为,所提出的激励分配方法能激励用户参与合作。所提出的合作框架不仅有助于降低数据访问者的隐私推断对用户隐私造成的威胁,还能让 OSN 服务提供商设计出有效的隐私保护政策。
{"title":"An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks","authors":"Yuzi Yi;Nafei Zhu;Jingsha He;Anca Delia Jurcut;Xiangjun Ma;Yehong Luo","doi":"10.1109/TCSS.2024.3359254","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3359254","url":null,"abstract":"Privacy inference poses a significant threat to users of online social networks (OSNs). To deal with this issue, a number of privacy-enhancing technologies have been proposed with the goal of achieving a balance between the protection of privacy and the utility of data. Previous studies, however, failed to take into consideration the impact of the interdependency of privacy (IoP), which dictates that privacy decisions made by some users may affect the privacy of some other users. The implication of IoP is that too much privacy may be disclosed when multiple individuals share data with the same data accessor because privacy conflicts resulting from independent privacy decisions would make it possible for adversaries to infer the privacy of the target user. Ideally, cooperation that preserves privacy should allow OSN users to respect each other’s privacy specifications so as to resolve such privacy conflicts caused by independent privacy decisions of individuals. To facilitate the design, we propose a privacy-preserving cooperation framework based on the evolutionary game theory to facilitate such cooperation. Based on the framework, the dynamics of user strategies regarding whether to participate in the cooperation are analyzed and an evolutionary stable state is derived to serve as the basis for incentivizing users to participate in cooperative privacy protection. Experiments based on real OSN data show that the proposed cooperation framework is effective in modeling the behaviors of users and that the proposed incentive allocation method can incentivize users to participate in the cooperation. The proposed cooperation framework can not only helps lower the threat to user privacy resulting from privacy inference by data accessors but also allows OSN service providers to design effective privacy protection policies.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolution of Credit Scores of Enterprises in a Social Network: A Perspective Based on Opinion Dynamics 社交网络中企业信用评分的演变:基于舆论动态的视角
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-09 DOI: 10.1109/TCSS.2023.3324558
Haiming Liang;Weijun Xu;Francisco Chiclana;Shui Yu;Yucheng Dong;Enrique Enrique Herrera-Viedma
The use of social network to model the evolution of credit scores of networked enterprises is still a challenging task. This article develops an opinion dynamics model of the evolution of credit scores of enterprises in a social network. Firstly, based on the number of potential cooperated enterprises and the initial credit scores, the leader and follower enterprises are identified. Then, taking into consideration the cooperated benefit and discrimination cost, the cooperated utility between any two enterprises is calculated, which is used to compute the weights that one enterprise assigns to other enterprises. An opinion dynamics model on the evolution of credit scores of enterprises, inspired on the classical Friedkin–Johnsen’s social network model, is developed. Some desirable properties of the proposed opinion dynamics model are theoretically stated and proved. Finally, a numerical example is provided to illustrate the feasibility of the proposed opinion dynamics model, while a simulation analysis to investigate the joint influences of the connection probabilities and the network structure on the evolution of credit scores of enterprises is reported.
利用社会网络建立网络企业信用评分演变模型仍是一项具有挑战性的任务。本文建立了社会网络中企业信用评分演变的舆情动态模型。首先,根据潜在合作企业的数量和初始信用评分,确定领导者和追随者企业。然后,考虑合作收益和歧视成本,计算任意两家企业之间的合作效用,并以此计算一家企业赋予其他企业的权重。在弗里德金-约翰逊经典社会网络模型的启发下,建立了企业信用评分演变的舆情动态模型。从理论上阐述并证明了所提出的舆情动态模型的一些理想特性。最后,提供了一个数值示例来说明所提出的舆情动态模型的可行性,并报告了一项模拟分析,以研究连接概率和网络结构对企业信用评分演变的共同影响。
{"title":"Evolution of Credit Scores of Enterprises in a Social Network: A Perspective Based on Opinion Dynamics","authors":"Haiming Liang;Weijun Xu;Francisco Chiclana;Shui Yu;Yucheng Dong;Enrique Enrique Herrera-Viedma","doi":"10.1109/TCSS.2023.3324558","DOIUrl":"https://doi.org/10.1109/TCSS.2023.3324558","url":null,"abstract":"The use of social network to model the evolution of credit scores of networked enterprises is still a challenging task. This article develops an opinion dynamics model of the evolution of credit scores of enterprises in a social network. Firstly, based on the number of potential cooperated enterprises and the initial credit scores, the leader and follower enterprises are identified. Then, taking into consideration the cooperated benefit and discrimination cost, the cooperated utility between any two enterprises is calculated, which is used to compute the weights that one enterprise assigns to other enterprises. An opinion dynamics model on the evolution of credit scores of enterprises, inspired on the classical Friedkin–Johnsen’s social network model, is developed. Some desirable properties of the proposed opinion dynamics model are theoretically stated and proved. Finally, a numerical example is provided to illustrate the feasibility of the proposed opinion dynamics model, while a simulation analysis to investigate the joint influences of the connection probabilities and the network structure on the evolution of credit scores of enterprises is reported.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Entity Ontology-Based Knowledge Graph Embedding Approach to News Credibility Assessment 基于实体本体的知识图谱嵌入式新闻可信度评估方法
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-02-09 DOI: 10.1109/TCSS.2023.3342873
Qi Liu;Yuanyuan Jin;Xuefei Cao;Xiaodong Liu;Xiaokang Zhou;Yonghong Zhang;Xiaolong Xu;Lianyong Qi
Fake news is a prevalent issue in modern society, leading to misinformation, and societal harm. News credibility assessment is a crucial approach for evaluating the accuracy and authenticity of news. It plays a significant role in enhancing public awareness and understanding of news, while also effectively mitigating the dissemination of fake news. However, news credibility assessment meets challenges when processing large-scale and constantly growing data, due to insufficient and unreliable labels and standards, and diversity and semantic ambiguity of news contents. Recently, machine learning models have been well developed to address these issues, but suffer from limited effectiveness. A unified framework is also required for them to represent various entities and relationships involved in news stories. This article proposes an entity ontology-based knowledge graph network (EKNet) to leverage knowledge graphs and entity frameworks for news credibility assessment. The model utilizes the information from knowledge graphs by combining entities and relationships from news and knowledge graphs. Experimental results show that the EKNet has advantages in evaluating news credibility over existing methods. Specifically, compared to several strong baselines, the model demonstrates a significant performance improvement in scores across various tasks. Which indicates that using the EKNet to address the challenges in news credibility assessment is highly effective and can conduct better performance for the problem of fake news in the social media environment.
假新闻是现代社会的一个普遍问题,它导致错误信息和社会危害。新闻可信度评估是评价新闻准确性和真实性的重要方法。它在提高公众对新闻的认识和理解方面发挥着重要作用,同时还能有效减少假新闻的传播。然而,由于标签和标准不充分、不可靠,以及新闻内容的多样性和语义模糊性,新闻可信度评估在处理大规模且持续增长的数据时遇到了挑战。最近,为解决这些问题,机器学习模型得到了很好的发展,但效果有限。它们还需要一个统一的框架来表示新闻报道中涉及的各种实体和关系。本文提出了一种基于实体本体的知识图谱网络(EKNet),利用知识图谱和实体框架进行新闻可信度评估。该模型通过结合新闻和知识图谱中的实体和关系,利用了知识图谱中的信息。实验结果表明,与现有方法相比,EKNet 在评估新闻可信度方面具有优势。具体来说,与几种强大的基线相比,该模型在各种任务中的得分都有显著提高。这表明,使用 EKNet 来应对新闻可信度评估中的挑战是非常有效的,可以为解决社交媒体环境中的假新闻问题提供更好的性能。
{"title":"An Entity Ontology-Based Knowledge Graph Embedding Approach to News Credibility Assessment","authors":"Qi Liu;Yuanyuan Jin;Xuefei Cao;Xiaodong Liu;Xiaokang Zhou;Yonghong Zhang;Xiaolong Xu;Lianyong Qi","doi":"10.1109/TCSS.2023.3342873","DOIUrl":"https://doi.org/10.1109/TCSS.2023.3342873","url":null,"abstract":"Fake news is a prevalent issue in modern society, leading to misinformation, and societal harm. News credibility assessment is a crucial approach for evaluating the accuracy and authenticity of news. It plays a significant role in enhancing public awareness and understanding of news, while also effectively mitigating the dissemination of fake news. However, news credibility assessment meets challenges when processing large-scale and constantly growing data, due to insufficient and unreliable labels and standards, and diversity and semantic ambiguity of news contents. Recently, machine learning models have been well developed to address these issues, but suffer from limited effectiveness. A unified framework is also required for them to represent various entities and relationships involved in news stories. This article proposes an entity ontology-based knowledge graph network (EKNet) to leverage knowledge graphs and entity frameworks for news credibility assessment. The model utilizes the information from knowledge graphs by combining entities and relationships from news and knowledge graphs. Experimental results show that the EKNet has advantages in evaluating news credibility over existing methods. Specifically, compared to several strong baselines, the model demonstrates a significant performance improvement in scores across various tasks. Which indicates that using the EKNet to address the challenges in news credibility assessment is highly effective and can conduct better performance for the problem of fake news in the social media environment.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MEFaND: A Multimodel Framework for Early Fake News Detection MEFaND:用于早期假新闻检测的多模型框架
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, CYBERNETICS Pub Date : 2024-02-09 DOI: 10.1109/TCSS.2024.3355300
Asma Sormeily;Sajjad Dadkhah;Xichen Zhang;Ali A. Ghorbani
Alongside social media platforms’ rise in popularity, fake news circulation has increased, highlighting the need for more practical methods to detect this phenomenon. The constantly evolving format of fake news makes it difficult for approaches that rely on a single modality of news to generalize the different types of false news. Furthermore, earlier approaches require extensive propagation data to determine the veracity of news, which can be challenging to collect in the early stages of news dissemination. Thus, we propose a multimodal early fake news detection approach that leverages latent insights into both news content and propagation knowledge. We design a multimodule architecture using graph neural networks (GNNs) to represent edge-enhanced and node-enhanced propagation graphs and bidirectional encoder representations from transformers (BERTs) to generate contextualized representations of news content. Our approach tackles the challenge of early detection in a more realistic scenario, accessing early propagation data in a single social media post and short-length news content. Moreover, we conduct comprehensive studies on user characteristics using statistical techniques to identify attributes with strong discriminative capability for identifying false news. We also analyze temporal and structural properties of fake news propagation graphs to demonstrate distinguishable patterns of false and real news behavior. Our model outperforms several state-of-the-art methods, achieving an impressive F1-score of 99% and 96% on two public datasets. The individual contribution of various components in our model to the final performance is also measured, which can be insightful for future research on multimodal false news detection.
随着社交媒体平台的普及,虚假新闻的传播量也在不断增加,这就凸显出我们需要更实用的方法来检测这一现象。由于假新闻的形式不断变化,依赖于单一新闻模式的方法很难归纳出不同类型的假新闻。此外,早期的方法需要大量的传播数据来确定新闻的真实性,而在新闻传播的早期阶段收集这些数据具有挑战性。因此,我们提出了一种多模态早期假新闻检测方法,利用对新闻内容和传播知识的潜在洞察力。我们设计了一种多模块架构,利用图神经网络(GNN)来表示边缘增强和节点增强的传播图,并利用变压器的双向编码器表示法(BERT)来生成新闻内容的上下文表示法。我们的方法在更现实的场景中应对早期检测的挑战,在单个社交媒体帖子和短篇新闻内容中获取早期传播数据。此外,我们还利用统计技术对用户特征进行了全面研究,以确定在识别虚假新闻方面具有较强鉴别能力的属性。我们还分析了虚假新闻传播图的时间和结构属性,以展示虚假新闻和真实新闻行为的可区分模式。我们的模型优于几种最先进的方法,在两个公共数据集上分别取得了 99% 和 96% 的惊人 F1 分数。我们还测量了模型中各个组成部分对最终性能的贡献,这对未来多模态虚假新闻检测的研究很有启发。
{"title":"MEFaND: A Multimodel Framework for Early Fake News Detection","authors":"Asma Sormeily;Sajjad Dadkhah;Xichen Zhang;Ali A. Ghorbani","doi":"10.1109/TCSS.2024.3355300","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3355300","url":null,"abstract":"Alongside social media platforms’ rise in popularity, fake news circulation has increased, highlighting the need for more practical methods to detect this phenomenon. The constantly evolving format of fake news makes it difficult for approaches that rely on a single modality of news to generalize the different types of false news. Furthermore, earlier approaches require extensive propagation data to determine the veracity of news, which can be challenging to collect in the early stages of news dissemination. Thus, we propose a multimodal early fake news detection approach that leverages latent insights into both news content and propagation knowledge. We design a multimodule architecture using graph neural networks (GNNs) to represent edge-enhanced and node-enhanced propagation graphs and bidirectional encoder representations from transformers (BERTs) to generate contextualized representations of news content. Our approach tackles the challenge of early detection in a more realistic scenario, accessing early propagation data in a single social media post and short-length news content. Moreover, we conduct comprehensive studies on user characteristics using statistical techniques to identify attributes with strong discriminative capability for identifying false news. We also analyze temporal and structural properties of fake news propagation graphs to demonstrate distinguishable patterns of false and real news behavior. Our model outperforms several state-of-the-art methods, achieving an impressive F1-score of 99% and 96% on two public datasets. The individual contribution of various components in our model to the final performance is also measured, which can be insightful for future research on multimodal false news detection.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":4.5,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Blockchain Meets Auction: A Comprehensive Survey 当区块链遇上拍卖:全面调查
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-08 DOI: 10.1109/TCSS.2024.3358176
Xuan Liu;Lu Liu;Yong Yuan;Yong-Hong Long;San-Xi Li;Fei-Yue Wang
Recent years have witnessed remarkable developments and increasingly deepened integrations between blockchain as a decentralized computing architecture and auction as an efficient resource allocation approach. Typically, blockchain can help provide a secured and trusted distributed environment for various auction scenarios, while auction is particularly suitable for designing resource allocation and pricing mechanisms in blockchain systems. As such, integrative research on blockchain and auction developed rapidly and attracted widespread attention in various fields ranging from academia to financial, industrial, and social services. However, a comprehensive survey on this interdisciplinary topic is still nonexistent, which motivates our work. In this article, we aim to fill this important research gap by reviewing the related literature. We first conducted a brief overview of blockchain technology and auction theory, and then systematically discussed the research progress on the existing blockchain research based on auction theory as well as auction research enabled by blockchain. Toward the end, we presented several open research issues and directions, aiming to provide useful guidance and reference for future research efforts.
近年来,作为一种去中心化计算架构的区块链与作为一种高效资源分配方法的拍卖之间的融合取得了显著发展,并日益加深。通常情况下,区块链有助于为各种拍卖场景提供安全可信的分布式环境,而拍卖则特别适合在区块链系统中设计资源分配和定价机制。因此,有关区块链和拍卖的综合研究发展迅速,并引起了从学术界到金融、工业和社会服务等各个领域的广泛关注。然而,关于这一跨学科课题的全面调查仍不存在,这也是我们工作的动力。在本文中,我们旨在通过回顾相关文献来填补这一重要的研究空白。我们首先对区块链技术和拍卖理论进行了简要概述,然后系统地讨论了基于拍卖理论的现有区块链研究以及区块链支持的拍卖研究的研究进展。最后,我们提出了几个有待解决的研究问题和方向,旨在为未来的研究工作提供有益的指导和参考。
{"title":"When Blockchain Meets Auction: A Comprehensive Survey","authors":"Xuan Liu;Lu Liu;Yong Yuan;Yong-Hong Long;San-Xi Li;Fei-Yue Wang","doi":"10.1109/TCSS.2024.3358176","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3358176","url":null,"abstract":"Recent years have witnessed remarkable developments and increasingly deepened integrations between blockchain as a decentralized computing architecture and auction as an efficient resource allocation approach. Typically, blockchain can help provide a secured and trusted distributed environment for various auction scenarios, while auction is particularly suitable for designing resource allocation and pricing mechanisms in blockchain systems. As such, integrative research on blockchain and auction developed rapidly and attracted widespread attention in various fields ranging from academia to financial, industrial, and social services. However, a comprehensive survey on this interdisciplinary topic is still nonexistent, which motivates our work. In this article, we aim to fill this important research gap by reviewing the related literature. We first conducted a brief overview of blockchain technology and auction theory, and then systematically discussed the research progress on the existing blockchain research based on auction theory as well as auction research enabled by blockchain. Toward the end, we presented several open research issues and directions, aiming to provide useful guidance and reference for future research efforts.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DCL: Diversified Graph Recommendation With Contrastive Learning DCL:利用对比学习的多样化图表推荐
IF 5 2区 计算机科学 Q1 Social Sciences Pub Date : 2024-02-07 DOI: 10.1109/TCSS.2024.3355780
Daohan Su;Bowen Fan;Zhi Zhang;Haoyan Fu;Zhida Qin
Diversified recommendation systems have gained increasing popularity in recent years. Nowadays, the emerged graph neural networks (GNNs) have been used to improve the diversity performance. Although some progresses have been made, existing works purely focus on the user–item interactions and overlook the category information, which limits the capability to capture complex diversification among users or items and leads to poor performance. In this article, our target is to integrate full category information into user and item embeddings. To this end, we propose a diversified GNN-based recommendation systems diversified graph recommendation with contrastive learning (DCL). Specifically, we design three key components in our model: 1) the user–item interaction with category-related sampling enhances the interaction of unpopular items; 2) contrastive learning between users and categories shortens the distance of representations between users and their uninteracted categories; and 3) contrastive learning between items and categories diverges the distance of representations between items and their corresponding categories. By applying these three modules, we build a multitask training framework to achieve a balance between accuracy and diversity. Experiments on real-world datasets show that our proposed DCL achieves optimal diversity while paying a little price for accuracy.
近年来,多元化推荐系统越来越受欢迎。如今,新兴的图神经网络(GNN)已被用于提高多样性性能。虽然已经取得了一些进展,但现有的研究仅仅关注用户与物品之间的交互,而忽略了类别信息,这限制了捕捉用户或物品之间复杂多样化的能力,导致性能不佳。在本文中,我们的目标是将完整的类别信息整合到用户和项目嵌入中。为此,我们提出了一种基于 GNN 的多样化推荐系统--具有对比学习功能的多样化图推荐(DCL)。具体来说,我们在模型中设计了三个关键组件:1)与类别相关采样的用户-物品交互增强了不受欢迎物品的交互;2)用户与类别之间的对比学习缩短了用户与其未交互类别之间的表征距离;3)物品与类别之间的对比学习发散了物品与其相应类别之间的表征距离。通过应用这三个模块,我们建立了一个多任务训练框架,以实现准确性和多样性之间的平衡。在真实世界数据集上的实验表明,我们提出的 DCL 在实现最佳多样性的同时,也为准确性付出了一点代价。
{"title":"DCL: Diversified Graph Recommendation With Contrastive Learning","authors":"Daohan Su;Bowen Fan;Zhi Zhang;Haoyan Fu;Zhida Qin","doi":"10.1109/TCSS.2024.3355780","DOIUrl":"https://doi.org/10.1109/TCSS.2024.3355780","url":null,"abstract":"Diversified recommendation systems have gained increasing popularity in recent years. Nowadays, the emerged graph neural networks (GNNs) have been used to improve the diversity performance. Although some progresses have been made, existing works purely focus on the user–item interactions and overlook the category information, which limits the capability to capture complex diversification among users or items and leads to poor performance. In this article, our target is to integrate full category information into user and item embeddings. To this end, we propose a diversified GNN-based recommendation systems diversified graph recommendation with contrastive learning (DCL). Specifically, we design three key components in our model: 1) the user–item interaction with category-related sampling enhances the interaction of unpopular items; 2) contrastive learning between users and categories shortens the distance of representations between users and their uninteracted categories; and 3) contrastive learning between items and categories diverges the distance of representations between items and their corresponding categories. By applying these three modules, we build a multitask training framework to achieve a balance between accuracy and diversity. Experiments on real-world datasets show that our proposed DCL achieves optimal diversity while paying a little price for accuracy.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Computational Social Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1