首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
CLOG-CD: Curriculum Learning Based on Oscillating Granularity of Class Decomposed Medical Image Classification CLOG-CD:基于类分解医学图像分类振荡粒度的课程学习
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-25 DOI: 10.1109/TETC.2025.3562620
Asmaa Abbas;Mohamed Medhat Gaber;Mohammed M. Abdelsamea
Curriculum learning strategies have been proven to be effective in various applications and have gained significant interest in the field of machine learning. It has the ability to improve the final model’s performance and accelerate the training process. However, in the medical imaging domain, data irregularities can make the recognition task more challenging and usually result in misclassification between the different classes in the dataset. Class-decomposition approaches have shown promising results in solving such a problem by learning the boundaries within the classes of the data set. In this paper, we present a novel convolutional neural network (CNN) training method based on the curriculum learning strategy and the class decomposition approach, which we call CLOG-CD, to improve the performance of medical image classification. We evaluated our method on four different imbalanced medical image datasets, such as Chest X-ray (CXR), brain tumour, digital knee x-ray, and histopathology colorectal cancer (CRC). CLOG-CD utilises the learnt weights from the decomposition granularity of the classes, and the training is accomplished from descending to ascending order (i.e. anti-curriculum technique). We also investigated the classification performance of our proposed method based on different acceleration factors and pace function curricula. We used two pre-trained networks, ResNet-50 and DenseNet-121, as the backbone for CLOG-CD. The results with ResNet-50 show that CLOG-CD has the ability to improve classification performance with an accuracy of 96.08% for the CXR dataset, 96.91% for the brain tumour dataset, 79.76% for the digital knee x-ray, and 99.17% for the CRC dataset, compared to other training strategies. In addition, with DenseNet-121, CLOG-CD has achieved 94.86%, 94.63%, 76.19%, and 99.45% for CXR, brain tumour, digital knee x-ray, and CRC datasets, respectively.
课程学习策略已被证明在各种应用中是有效的,并在机器学习领域引起了极大的兴趣。它具有提高最终模型性能和加速训练过程的能力。然而,在医学成像领域,数据不规则性会使识别任务更具挑战性,并且通常会导致数据集中不同类别之间的错误分类。类分解方法通过学习数据集类的边界,在解决这类问题方面显示出了有希望的结果。本文提出了一种基于课程学习策略和类分解方法的卷积神经网络(CNN)训练方法,我们称之为CLOG-CD,以提高医学图像分类的性能。我们在四种不同的不平衡医学图像数据集上评估了我们的方法,如胸部x线(CXR)、脑肿瘤、数字膝关节x线和组织病理学结直肠癌(CRC)。CLOG-CD利用从类的分解粒度中学习到的权值,并且从降序到升序完成训练(即反课程技术)。我们还研究了基于不同加速因子和速度功能课程的方法的分类性能。我们使用了两个预训练的网络,ResNet-50和DenseNet-121,作为CLOG-CD的主干。使用ResNet-50的结果表明,与其他训练策略相比,CLOG-CD能够提高分类性能,CXR数据集的准确率为96.08%,脑肿瘤数据集的准确率为96.91%,数字膝关节x射线数据集的准确率为79.76%,CRC数据集的准确率为99.17%。此外,使用DenseNet-121, CLOG-CD在CXR、脑肿瘤、数字膝关节x线和CRC数据集上的准确率分别达到94.86%、94.63%、76.19%和99.45%。
{"title":"CLOG-CD: Curriculum Learning Based on Oscillating Granularity of Class Decomposed Medical Image Classification","authors":"Asmaa Abbas;Mohamed Medhat Gaber;Mohammed M. Abdelsamea","doi":"10.1109/TETC.2025.3562620","DOIUrl":"https://doi.org/10.1109/TETC.2025.3562620","url":null,"abstract":"Curriculum learning strategies have been proven to be effective in various applications and have gained significant interest in the field of machine learning. It has the ability to improve the final model’s performance and accelerate the training process. However, in the medical imaging domain, data irregularities can make the recognition task more challenging and usually result in misclassification between the different classes in the dataset. Class-decomposition approaches have shown promising results in solving such a problem by learning the boundaries within the classes of the data set. In this paper, we present a novel convolutional neural network (CNN) training method based on the curriculum learning strategy and the class decomposition approach, which we call <italic>CLOG-CD</i>, to improve the performance of medical image classification. We evaluated our method on four different imbalanced medical image datasets, such as Chest X-ray (CXR), brain tumour, digital knee x-ray, and histopathology colorectal cancer (CRC). <italic>CLOG-CD</i> utilises the learnt weights from the decomposition granularity of the classes, and the training is accomplished from descending to ascending order (i.e. anti-curriculum technique). We also investigated the classification performance of our proposed method based on different acceleration factors and pace function curricula. We used two pre-trained networks, ResNet-50 and DenseNet-121, as the backbone for <italic>CLOG-CD</i>. The results with ResNet-50 show that <italic>CLOG-CD</i> has the ability to improve classification performance with an accuracy of 96.08% for the CXR dataset, 96.91% for the brain tumour dataset, 79.76% for the digital knee x-ray, and 99.17% for the CRC dataset, compared to other training strategies. In addition, with DenseNet-121, <italic>CLOG-CD</i> has achieved 94.86%, 94.63%, 76.19%, and 99.45% for CXR, brain tumour, digital knee x-ray, and CRC datasets, respectively.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1043-1054"},"PeriodicalIF":5.4,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning 近似编码计算:走向快速、私有和安全的分布式机器学习
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-24 DOI: 10.1109/TETC.2025.3562192
Houming Qiu;Kun Zhu;Nguyen Cong Luong;Dusit Niyato
In a large-scale distributed machine learning system, coded computing has attracted wide-spread attention since it can effectively alleviate the impact of stragglers. However, several emerging problems greatly limit the performance of coded distributed systems. First, an existence of colluding workers who collude results with each other leads to serious privacy leakage issues. Second, there are few existing works considering security issues in data transmission of distributed computing systems/or coded distributed machine learning systems. Third, the number of required results for which need to wait increases with the degree of decoding functions. In this article, we design a secure and private approximated coded distributed computing (SPACDC) scheme that deals with the above-mentioned problems simultaneously. Our SPACDC scheme guarantees data security during the transmission process using a new encryption algorithm based on elliptic curve cryptography. Especially, the SPACDC scheme does not impose strict constraints on the minimum number of results required to be waited for. An extensive performance analysis is conducted to demonstrate the effectiveness of our SPACDC scheme. Furthermore, we present a secure and private distributed learning algorithm based on the SPACDC scheme, which can provide information-theoretic privacy protection for training data. Our experiments show that the SPACDC-based deep learning algorithm achieves a significant speedup over the baseline approaches.
在大规模的分布式机器学习系统中,编码计算由于能够有效地缓解掉队者的影响而受到了广泛的关注。然而,一些新出现的问题极大地限制了编码分布式系统的性能。首先,相互串通结果的串通员工的存在导致了严重的隐私泄露问题。其次,考虑分布式计算系统或编码分布式机器学习系统数据传输安全问题的现有工作很少。第三,需要等待的结果数量随着解码功能的程度而增加。本文设计了一种安全、私有的近似编码分布式计算(SPACDC)方案,同时解决了上述问题。我们的SPACDC方案采用了一种新的基于椭圆曲线加密的加密算法,保证了数据在传输过程中的安全性。特别是,SPACDC方案没有对需要等待的最小结果数施加严格的限制。进行了广泛的性能分析,以证明我们的SPACDC方案的有效性。在此基础上,提出了一种安全、私有的分布式学习算法,为训练数据提供信息论的隐私保护。我们的实验表明,基于spacdc的深度学习算法比基线方法实现了显着的加速。
{"title":"Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning","authors":"Houming Qiu;Kun Zhu;Nguyen Cong Luong;Dusit Niyato","doi":"10.1109/TETC.2025.3562192","DOIUrl":"https://doi.org/10.1109/TETC.2025.3562192","url":null,"abstract":"In a large-scale distributed machine learning system, coded computing has attracted wide-spread attention since it can effectively alleviate the impact of stragglers. However, several emerging problems greatly limit the performance of coded distributed systems. First, an existence of colluding workers who collude results with each other leads to serious privacy leakage issues. Second, there are few existing works considering security issues in data transmission of distributed computing systems/or coded distributed machine learning systems. Third, the number of required results for which need to wait increases with the degree of decoding functions. In this article, we design a secure and private approximated coded distributed computing (SPACDC) scheme that deals with the above-mentioned problems simultaneously. Our SPACDC scheme guarantees data security during the transmission process using a new encryption algorithm based on elliptic curve cryptography. Especially, the SPACDC scheme does not impose strict constraints on the minimum number of results required to be waited for. An extensive performance analysis is conducted to demonstrate the effectiveness of our SPACDC scheme. Furthermore, we present a secure and private distributed learning algorithm based on the SPACDC scheme, which can provide information-theoretic privacy protection for training data. Our experiments show that the SPACDC-based deep learning algorithm achieves a significant speedup over the baseline approaches.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1030-1042"},"PeriodicalIF":5.4,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certificateless Sanitizable Signature With Designated Verifier 具有指定验证者的无证书消毒签名
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-24 DOI: 10.1109/TETC.2025.3562050
Qi Sun;Yang Lu;Yinxia Sun;Jiguo Li
As a new type of digital signature, sanitizable signature enables a semi-trusted entity to alter a signed document and re-create a signature of the altered document in the name of original signer. This approach offers an effective solution to sanitize sensitive information in signed documents while ensuring the authenticity of sanitized documents. Most of current sanitizable signature schemes have the complex certificate management issue or the key escrow limitation. Recently, two certificateless sanitizable signature schemes have been proposed to address the above issues. However, they both rely on costly bilinear pairings, which incur high computation costs to create signature, make sanitization and perform verification. In the work, we design a pairing-free certificateless sanitizable signature scheme with a designated verifier. The proposed scheme achieves signature verification through a designated verifier, thereby preventing malicious propagation and illegal abuse of signatures. By eliminating the need for pairing operations, the scheme offers substantial improvements in computational efficiency. Security proofs demonstrate that it satisfies existential unforgeability and immutability against adaptive chosen message attacks. In addition, simulation experiments indicate that our approach reduces the computation costs of signature generation, sanitization, and verification by approximately 88.15%/88.48%, 99.98%/99.01%, and 71.22%/78.64%, respectively, when compared to the most recent two certificateless sanitizable signature schemes.
消毒签名是一种新型的数字签名,它使半可信实体能够更改已签名的文档,并以原始签名者的名义重新创建更改后的文档的签名。该方法提供了一种有效的解决方案,既可以对签名文档中的敏感信息进行消毒,又可以保证消毒后文档的真实性。目前大多数可消毒签名方案都存在复杂的证书管理问题或密钥托管限制。为了解决上述问题,最近提出了两种无证书消毒签名方案。然而,它们都依赖于昂贵的双线性配对,这导致创建签名,进行消毒和执行验证的计算成本很高。在工作中,我们设计了一个具有指定验证者的无配对无证书可消毒签名方案。该方案通过指定的验证者实现签名验证,从而防止了签名的恶意传播和非法滥用。通过消除对配对操作的需要,该方案大大提高了计算效率。安全性证明表明,该算法满足自适应选择消息攻击的存在不可伪造性和不变性。此外,仿真实验表明,与最新的两种无证书消毒签名方案相比,我们的方法将签名生成、消毒和验证的计算成本分别降低了约88.15%/88.48%、99.98%/99.01%和71.22%/78.64%。
{"title":"Certificateless Sanitizable Signature With Designated Verifier","authors":"Qi Sun;Yang Lu;Yinxia Sun;Jiguo Li","doi":"10.1109/TETC.2025.3562050","DOIUrl":"https://doi.org/10.1109/TETC.2025.3562050","url":null,"abstract":"As a new type of digital signature, sanitizable signature enables a semi-trusted entity to alter a signed document and re-create a signature of the altered document in the name of original signer. This approach offers an effective solution to sanitize sensitive information in signed documents while ensuring the authenticity of sanitized documents. Most of current sanitizable signature schemes have the complex certificate management issue or the key escrow limitation. Recently, two certificateless sanitizable signature schemes have been proposed to address the above issues. However, they both rely on costly bilinear pairings, which incur high computation costs to create signature, make sanitization and perform verification. In the work, we design a pairing-free certificateless sanitizable signature scheme with a designated verifier. The proposed scheme achieves signature verification through a designated verifier, thereby preventing malicious propagation and illegal abuse of signatures. By eliminating the need for pairing operations, the scheme offers substantial improvements in computational efficiency. Security proofs demonstrate that it satisfies existential unforgeability and immutability against adaptive chosen message attacks. In addition, simulation experiments indicate that our approach reduces the computation costs of signature generation, sanitization, and verification by approximately 88.15%/88.48%, 99.98%/99.01%, and 71.22%/78.64%, respectively, when compared to the most recent two certificateless sanitizable signature schemes.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1019-1029"},"PeriodicalIF":5.4,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HyperXArray: Low-Power and Compact Memristive Architecture for In-Memory Encryption on Edge HyperXArray:用于边缘内存加密的低功耗和紧凑记忆架构
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-23 DOI: 10.1109/TETC.2025.3562136
Jack Cai;Mostafa Rahimi Azghadi;Roman Genov;Amirali Amirsoleimani
Encryption on large-scale memristor crossbars proves to be challenging due to the spatial and temporal fluctuations of the signals coming from numerous non-idealities. To address this, we utilize Hyperlock, a memristive vector-matrix multiplication accelerator employing hyperdimensional computing for encryption. We demonstrate that stochasticity generated on TiOx memristor crossbars with passive 0T1R arrangement can be decryptable under the appropriate training of a neural network. We present HyperXArray, an architecture for Hyperlock's encryption scheme, that is capable of weight regeneration, and analog/digital encryption without the need for high-resolution Analog-to-Digital Converters (ADCs) and Digital-to-Analog Converters (DACs). We demonstrate 100% decryption accuracy for digital encryption and show that HyperXArray is capable of encryption during analog to digital conversion that reduces the power consumption of ADC by $50times$. In digital encryption, we show that HyperXArray reduces energy consumption by up to $10times$ and footprint by $10-100times$ compared to Field Programmable Gate Array (FPGA) implementations of Advanced Encryption Standard (AES), while maintaining the same level of throughput. Overall, HyperXArray demonstrates its capability to fill the niche for lightweight, noise-resilient encryption on edge with only $ 0.1{text{ mm}}^{2}$ footprint and $60 {text{ pJ/bit}}$ energy efficiency.
由于来自众多非理想状态的信号在空间和时间上的波动,对大规模记忆电阻器横条的加密具有挑战性。为了解决这个问题,我们使用Hyperlock,这是一种利用超维计算进行加密的忆阻向量矩阵乘法加速器。我们证明,在适当的神经网络训练下,无源0T1R排列的TiOx记忆电阻横条上产生的随机性是可以解密的。我们提出了HyperXArray, Hyperlock加密方案的架构,它能够进行权重再生和模拟/数字加密,而不需要高分辨率的模数转换器(adc)和数模转换器(dac)。我们展示了数字加密的100%解密精度,并表明HyperXArray能够在模拟到数字转换期间进行加密,从而将ADC的功耗降低50倍。在数字加密方面,我们表明,与高级加密标准(AES)的现场可编程门阵列(FPGA)实现相比,HyperXArray可将能耗降低高达10美元,占地面积降低10-100美元,同时保持相同的吞吐量水平。总的来说,HyperXArray证明了它能够填补轻量级、抗噪声加密的空白,仅占用$ 0.1{text{mm}}^{2}$的空间和$60 {text{pJ/bit}}$的能源效率。
{"title":"HyperXArray: Low-Power and Compact Memristive Architecture for In-Memory Encryption on Edge","authors":"Jack Cai;Mostafa Rahimi Azghadi;Roman Genov;Amirali Amirsoleimani","doi":"10.1109/TETC.2025.3562136","DOIUrl":"https://doi.org/10.1109/TETC.2025.3562136","url":null,"abstract":"Encryption on large-scale memristor crossbars proves to be challenging due to the spatial and temporal fluctuations of the signals coming from numerous non-idealities. To address this, we utilize Hyperlock, a memristive vector-matrix multiplication accelerator employing hyperdimensional computing for encryption. We demonstrate that stochasticity generated on TiOx memristor crossbars with passive 0T1R arrangement can be decryptable under the appropriate training of a neural network. We present HyperXArray, an architecture for Hyperlock's encryption scheme, that is capable of weight regeneration, and analog/digital encryption without the need for high-resolution Analog-to-Digital Converters (ADCs) and Digital-to-Analog Converters (DACs). We demonstrate 100% decryption accuracy for digital encryption and show that HyperXArray is capable of encryption during analog to digital conversion that reduces the power consumption of ADC by <inline-formula><tex-math>$50times$</tex-math></inline-formula>. In digital encryption, we show that HyperXArray reduces energy consumption by up to <inline-formula><tex-math>$10times$</tex-math></inline-formula> and footprint by <inline-formula><tex-math>$10-100times$</tex-math></inline-formula> compared to Field Programmable Gate Array (FPGA) implementations of Advanced Encryption Standard (AES), while maintaining the same level of throughput. Overall, HyperXArray demonstrates its capability to fill the niche for lightweight, noise-resilient encryption on edge with only <inline-formula><tex-math>$ 0.1{text{ mm}}^{2}$</tex-math></inline-formula> footprint and <inline-formula><tex-math>$60 {text{ pJ/bit}}$</tex-math></inline-formula> energy efficiency.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 4","pages":"1410-1423"},"PeriodicalIF":5.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable and RISC-V Programmable Near-Memory Computing Architectures for Edge Nodes 边缘节点的可扩展和RISC-V可编程近内存计算架构
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-11 DOI: 10.1109/TETC.2025.3555869
Michele Caon;Clément Choné;Pasquale Davide Schiavone;Alexandre Levisse;Guido Masera;Maurizio Martina;David Atienza
The widespread adoption of data-centric algorithms, particularly artificial intelligence (AI) and machine learning (ML), has exposed the limitations of centralized processing infrastructures, driving a shift towards edge computing. This necessitates stringent constraints on energy efficiency, which traditional von Neumann architectures struggle to meet. The compute-in-memory (CIM) paradigm has emerged as a better candidate due to its efficient exploitation of the available memory bandwidth. However, existing CIM solutions require a high implementation effort and lack flexibility from a software integration standpoint. This work proposes a novel, software-friendly, general-purpose, and low-integration-effort near-memory computing (NMC) approach, paving the way for the adoption of CIM-based systems in the next generation of edge computing nodes. Two architectural variants, NM-Caesar and NM-Carus, are proposed and characterized to target different trade-offs in area efficiency, performance, and flexibility, covering a wide range of embedded microcontrollers. Post-layout simulations show up to 28.0 × and 53.9 × lower execution time and 25.0 × and 35.6 × higher energy efficiency at system level, respectively, compared to the execution of the same tasks on a state-of-the-art RISC-V CPU (RV32IMC). NM-Carus achieves a peak energy efficiency of 306.7 GOPS/W in 8-bit matrix multiplications, surpassing recent state-of-the-art in- and near-memory circuits.
以数据为中心的算法,特别是人工智能(AI)和机器学习(ML)的广泛采用,暴露了集中式处理基础设施的局限性,推动了向边缘计算的转变。这就需要对能源效率进行严格的限制,而传统的冯·诺伊曼架构很难满足这一要求。内存中计算(CIM)范式由于其对可用内存带宽的有效利用而成为更好的备选方案。然而,从软件集成的角度来看,现有的CIM解决方案需要大量的实现工作,并且缺乏灵活性。这项工作提出了一种新颖的、软件友好的、通用的、低集成度的近内存计算(NMC)方法,为下一代边缘计算节点采用基于cim的系统铺平了道路。提出了两种架构变体NM-Caesar和NM-Carus,并对其进行了描述,以针对面积效率,性能和灵活性的不同权衡,涵盖了广泛的嵌入式微控制器。布局后仿真显示,与在最先进的RISC-V CPU (RV32IMC)上执行相同的任务相比,在系统级别上,执行时间分别降低28.0倍和53.9倍,能效分别提高25.0倍和35.6倍。NM-Carus在8位矩阵乘法中实现了306.7 GOPS/W的峰值能量效率,超过了最近最先进的内存和近内存电路。
{"title":"Scalable and RISC-V Programmable Near-Memory Computing Architectures for Edge Nodes","authors":"Michele Caon;Clément Choné;Pasquale Davide Schiavone;Alexandre Levisse;Guido Masera;Maurizio Martina;David Atienza","doi":"10.1109/TETC.2025.3555869","DOIUrl":"https://doi.org/10.1109/TETC.2025.3555869","url":null,"abstract":"The widespread adoption of data-centric algorithms, particularly artificial intelligence (AI) and machine learning (ML), has exposed the limitations of centralized processing infrastructures, driving a shift towards edge computing. This necessitates stringent constraints on energy efficiency, which traditional von Neumann architectures struggle to meet. The compute-in-memory (CIM) paradigm has emerged as a better candidate due to its efficient exploitation of the available memory bandwidth. However, existing CIM solutions require a high implementation effort and lack flexibility from a software integration standpoint. This work proposes a novel, software-friendly, general-purpose, and low-integration-effort near-memory computing (NMC) approach, paving the way for the adoption of CIM-based systems in the next generation of edge computing nodes. Two architectural variants, NM-Caesar and NM-Carus, are proposed and characterized to target different trade-offs in area efficiency, performance, and flexibility, covering a wide range of embedded microcontrollers. Post-layout simulations show up to 28.0 × and 53.9 × lower execution time and 25.0 × and 35.6 × higher energy efficiency at system level, respectively, compared to the execution of the same tasks on a state-of-the-art RISC-V CPU (RV32IMC). NM-Carus achieves a peak energy efficiency of 306.7 GOPS/W in 8-bit matrix multiplications, surpassing recent state-of-the-art in- and near-memory circuits.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1003-1018"},"PeriodicalIF":5.4,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Reinforcement Learning for Defect Prediction in Smart Manufacturing 面向智能制造缺陷预测的虚拟强化学习
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-01 DOI: 10.1109/TETC.2025.3546244
Yi-Cheng Chen;Mu-Ping Chang;Wang-Chien Lee
Recent research has focused on the integration of smart manufacturing and deep learning owing to the widespread application of neural computation. For deep learning, how to construct the architecture of a neural network is a critical issue. Especially on defect prediction or detection, a proper neural architecture could effectively extract features from the given manufacturing data to accomplish the targeted task. In this paper, we introduce a Virtual Space concept to effectively shrink the search space of potential neural network structures, with the aim of downgrading the computation complexity for learning and accuracy derivation. In addition, a novel reinforcement learning model, namely, Virtual Proximal Policy Optimization (Virtu-PPO), is developed to efficiently and effectively discover the optimal neural network structure. We also propose an optimization strategy to enhance the searching process of neural architecture for defect prediction. In addition, the proposed model is applied on several real-world manufacturing datasets to show the performance and practicability of defect prediction.
由于神经计算的广泛应用,智能制造与深度学习的融合成为近年来研究的重点。对于深度学习来说,如何构建神经网络的体系结构是一个关键问题。特别是在缺陷预测或检测方面,适当的神经网络结构可以有效地从给定的制造数据中提取特征来完成目标任务。在本文中,我们引入虚拟空间的概念来有效地缩小潜在神经网络结构的搜索空间,以降低学习和精度推导的计算复杂度。此外,提出了一种新的强化学习模型,即虚拟近端策略优化(Virtual - ppo),以高效有效地发现最优的神经网络结构。我们还提出了一种优化策略,以提高缺陷预测神经结构的搜索过程。此外,将该模型应用于多个实际制造数据集,验证了缺陷预测的性能和实用性。
{"title":"Virtual Reinforcement Learning for Defect Prediction in Smart Manufacturing","authors":"Yi-Cheng Chen;Mu-Ping Chang;Wang-Chien Lee","doi":"10.1109/TETC.2025.3546244","DOIUrl":"https://doi.org/10.1109/TETC.2025.3546244","url":null,"abstract":"Recent research has focused on the integration of smart manufacturing and deep learning owing to the widespread application of neural computation. For deep learning, how to construct the architecture of a neural network is a critical issue. Especially on defect prediction or detection, a proper neural architecture could effectively extract features from the given manufacturing data to accomplish the targeted task. In this paper, we introduce a <italic>Virtual Space</i> concept to effectively shrink the search space of potential neural network structures, with the aim of downgrading the computation complexity for learning and accuracy derivation. In addition, a novel reinforcement learning model, namely, <italic>Virtual Proximal Policy Optimization (Virtu-PPO)</i>, is developed to efficiently and effectively discover the optimal neural network structure. We also propose an optimization strategy to enhance the searching process of neural architecture for defect prediction. In addition, the proposed model is applied on several real-world manufacturing datasets to show the performance and practicability of defect prediction.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"990-1002"},"PeriodicalIF":5.4,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
q-Point: A Numeric Format for Quantum Circuit Simulation Using Polar Form Complex Numbers q点:用极形式复数进行量子电路模拟的数字格式
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-30 DOI: 10.1109/TETC.2025.3572935
Seungwoo Choi;Enhyeok Jang;Youngmin Kim;Sungwoo Ahn;Won Woo Ro
Quantum circuit simulation is playing a critical role in the current era of quantum computing. However, quantum circuit simulation suffers from huge memory requirements that scale exponentially according to the number of qubits. Our observation reveals that the conventional complex number representation using real and imaginary values adds to the memory overhead beyond the intrinsic cost of simulating quantum states. Instead, using the radius and phase value of a complex number better reflects the properties of the complex values used in the quantum circuit simulation providing better memory efficiency. This paper proposes q-Point, a compact numeric format for quantum circuit simulation that utilizes polar form representation instead of rectangular form representation to store complex numbers. The proposed q-Point format consists of three fields: i) exponent bits for radius value ii) mantissa bits for radius value iii) mantissa bits for phase value. However, a naive application of the q-Point format has the potential to cause issues with both simulation accuracy and simulation speed. To preserve simulation accuracy with fewer bits, we use a multi-level encoding scheme that employs different mantissa bits depending on the exponent range. Additionally, to prevent possible slowdown due to the add operation in polar form complex numbers, we use a technique that adaptively applies both polar and rectangular forms. Equipped with these optimizations, the proposed q-Point format demonstrates reasonable simulation accuracy while using only half of the memory requirement using the baseline format. Additionally, the q-Point format enables an average of 1.37× and 1.16× faster simulation for QAOA and VQE benchmark circuits.
量子电路仿真在当前量子计算时代起着至关重要的作用。然而,量子电路模拟面临着巨大的内存需求,根据量子位的数量呈指数级增长。我们的观察表明,使用实值和虚值的传统复数表示增加了内存开销,超出了模拟量子态的固有成本。相反,使用复数的半径和相位值可以更好地反映量子电路模拟中使用的复数值的性质,从而提供更好的存储效率。本文提出了q-Point,一种用于量子电路模拟的紧凑数字格式,它利用极坐标形式表示代替矩形形式表示来存储复数。提出的q点格式由三个字段组成:i)半径值的指数位;ii)半径值的尾数位;iii)相位值的尾数位。然而,对q-Point格式的幼稚应用可能会导致仿真精度和仿真速度的问题。为了使用更少的比特来保持仿真精度,我们使用了一种多级编码方案,该方案根据指数范围使用不同的尾数比特。此外,为了防止由于极坐标形式的复数的加法操作可能导致的速度减慢,我们使用了一种自适应地应用极坐标和矩形形式的技术。有了这些优化,建议的q-Point格式显示出合理的模拟精度,而使用基线格式只使用一半的内存需求。此外,q-Point格式使QAOA和VQE基准电路的模拟速度平均提高1.37倍和1.16倍。
{"title":"q-Point: A Numeric Format for Quantum Circuit Simulation Using Polar Form Complex Numbers","authors":"Seungwoo Choi;Enhyeok Jang;Youngmin Kim;Sungwoo Ahn;Won Woo Ro","doi":"10.1109/TETC.2025.3572935","DOIUrl":"https://doi.org/10.1109/TETC.2025.3572935","url":null,"abstract":"Quantum circuit simulation is playing a critical role in the current era of quantum computing. However, quantum circuit simulation suffers from huge memory requirements that scale exponentially according to the number of qubits. Our observation reveals that the conventional complex number representation using real and imaginary values adds to the memory overhead beyond the intrinsic cost of simulating quantum states. Instead, using the radius and phase value of a complex number better reflects the properties of the complex values used in the quantum circuit simulation providing better memory efficiency. This paper proposes q-Point, a compact numeric format for quantum circuit simulation that utilizes polar form representation instead of rectangular form representation to store complex numbers. The proposed q-Point format consists of three fields: i) exponent bits for radius value ii) mantissa bits for radius value iii) mantissa bits for phase value. However, a naive application of the q-Point format has the potential to cause issues with both simulation accuracy and simulation speed. To preserve simulation accuracy with fewer bits, we use a multi-level encoding scheme that employs different mantissa bits depending on the exponent range. Additionally, to prevent possible slowdown due to the add operation in polar form complex numbers, we use a technique that adaptively applies both polar and rectangular forms. Equipped with these optimizations, the proposed q-Point format demonstrates reasonable simulation accuracy while using only half of the memory requirement using the baseline format. Additionally, the q-Point format enables an average of 1.37× and 1.16× faster simulation for QAOA and VQE benchmark circuits.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1142-1155"},"PeriodicalIF":5.4,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Access Control for Background and Co-Occurrence Image Privacy Protection 背景和共现图像隐私保护的实时访问控制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-28 DOI: 10.1109/TETC.2025.3572396
Chaoquan Cai;Dan Lin;Kannappan Palaniappan;Chris Clifton
In today’s digital age, the proliferation of social networks and advanced camera technology has led to countless images being shared on online social platforms daily, potentially resulting in significant breaches of personal privacy. In recent years, many methods have been proposed to protect image privacy, allowing users to be notified of potential privacy leaks before publishing their photos. However, most existing research primarily addresses the privacy protection of image owners or co-owners, while neglecting the privacy of people who appear in the background of others’ images or who are co-occurring with others in the same image. In this paper, we propose a system capable of conducting real-time access control for protecting privacy of every individual appearing in a photo, as well as the privacy of people who co-occur in the same image. Specifically, we first detect all the faces in the image, then use a facial recognition algorithm to identify the corresponding users’ privacy policies, and finally determine whether the image violates any user’s privacy policy. In order to provide real-time access control, we have designed a facial attribute index tree to speed up the process of user identification. The experimental results show that compared with the method without our proposed index tree, our approach improves the time efficiency by almost two orders of magnitude while maintaining the accuracy of more than 97%.
在当今的数字时代,社交网络的激增和先进的摄像技术导致无数的图像每天在在线社交平台上被分享,这可能导致严重侵犯个人隐私。近年来,人们提出了许多保护图像隐私的方法,允许用户在发布照片之前收到潜在隐私泄露的通知。然而,现有的大多数研究主要针对图像所有者或共同所有者的隐私保护,而忽略了出现在他人图像背景中的人或与他人共同出现在同一图像中的人的隐私。在本文中,我们提出了一个能够进行实时访问控制的系统,以保护照片中出现的每个人的隐私,以及同一图像中共同出现的人的隐私。具体来说,我们首先检测图像中的所有人脸,然后使用人脸识别算法识别相应的用户隐私政策,最后确定图像是否违反了任何用户的隐私政策。为了提供实时的访问控制,我们设计了人脸属性索引树来加快用户识别的过程。实验结果表明,与没有索引树的方法相比,该方法在保持97%以上的准确率的同时,将时间效率提高了近两个数量级。
{"title":"Real-Time Access Control for Background and Co-Occurrence Image Privacy Protection","authors":"Chaoquan Cai;Dan Lin;Kannappan Palaniappan;Chris Clifton","doi":"10.1109/TETC.2025.3572396","DOIUrl":"https://doi.org/10.1109/TETC.2025.3572396","url":null,"abstract":"In today’s digital age, the proliferation of social networks and advanced camera technology has led to countless images being shared on online social platforms daily, potentially resulting in significant breaches of personal privacy. In recent years, many methods have been proposed to protect image privacy, allowing users to be notified of potential privacy leaks before publishing their photos. However, most existing research primarily addresses the privacy protection of image owners or co-owners, while neglecting the privacy of people who appear in the background of others’ images or who are co-occurring with others in the same image. In this paper, we propose a system capable of conducting real-time access control for protecting privacy of every individual appearing in a photo, as well as the privacy of people who co-occur in the same image. Specifically, we first detect all the faces in the image, then use a facial recognition algorithm to identify the corresponding users’ privacy policies, and finally determine whether the image violates any user’s privacy policy. In order to provide real-time access control, we have designed a facial attribute index tree to speed up the process of user identification. The experimental results show that compared with the method without our proposed index tree, our approach improves the time efficiency by almost two orders of magnitude while maintaining the accuracy of more than 97%.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1130-1141"},"PeriodicalIF":5.4,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Task Replication With Imperfect Fault Detection in Multicore Cyber-Physical Systems 多核信息物理系统中不完全故障检测的动态任务复制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-28 DOI: 10.1109/TETC.2025.3572277
Hossein Hosseini;Mohsen Ansari;Jörg Henkel
Task replication is a common technique for achieving fault tolerance. However, its effectiveness is limited by the accuracy of the fault detection mechanism; imperfect detection imposes a ceiling on achievable reliability. While perfect fault detection mechanisms offer higher reliability, they introduce significant overhead. To address this, we introduce Dynamic Task Replication, a fault tolerance technique that dynamically determines the number of replicas at runtime to overcome the limitations of imperfect fault detection. Our primary contribution, Reliability-Aware Replica-Efficient Dynamic Task Replication, optimizes this approach by minimizing the expected number of replicas while achieving the desired reliability target. We incorporate actual execution times into the reliability assessment. Additionally, we propose the Energy-Aware Reliability-Guaranteeing scheduling technique, which integrates our optimized replication method into hard real-time systems and leverages Dynamic Voltage and Frequency Scaling to minimize energy consumption while ensuring reliability and system schedulability. Experimental results demonstrate that our method requires 24% fewer replicas on average than the N-Modular Redundancy technique, with the advantage increasing to 58% for tasks with low base reliabilities. Furthermore, our scheduling technique significantly conserves energy and enhances feasibility compared to existing methods across diverse system workloads.
任务复制是实现容错的常用技术。然而,其有效性受到故障检测机制准确性的限制;不完善的检测对可实现的可靠性造成了限制。虽然完美的故障检测机制提供了更高的可靠性,但它们带来了巨大的开销。为了解决这个问题,我们引入了动态任务复制,这是一种容错技术,可以在运行时动态确定副本的数量,以克服不完全故障检测的限制。我们的主要贡献,可靠性感知副本-高效动态任务复制,通过最小化预期副本数量,同时达到期望的可靠性目标,优化了这种方法。我们将实际执行时间纳入可靠性评估。此外,我们提出了能量感知可靠性保证调度技术,该技术将我们优化的复制方法集成到硬实时系统中,并利用动态电压和频率缩放来最大限度地减少能源消耗,同时确保可靠性和系统可调度性。实验结果表明,我们的方法比n模冗余技术平均减少24%的副本,对于低基础可靠性的任务,优势增加到58%。此外,与现有方法相比,我们的调度技术在不同系统工作负载下显着节省了能源并提高了可行性。
{"title":"Dynamic Task Replication With Imperfect Fault Detection in Multicore Cyber-Physical Systems","authors":"Hossein Hosseini;Mohsen Ansari;Jörg Henkel","doi":"10.1109/TETC.2025.3572277","DOIUrl":"https://doi.org/10.1109/TETC.2025.3572277","url":null,"abstract":"Task replication is a common technique for achieving fault tolerance. However, its effectiveness is limited by the accuracy of the fault detection mechanism; imperfect detection imposes a ceiling on achievable reliability. While perfect fault detection mechanisms offer higher reliability, they introduce significant overhead. To address this, we introduce Dynamic Task Replication, a fault tolerance technique that dynamically determines the number of replicas at runtime to overcome the limitations of imperfect fault detection. Our primary contribution, Reliability-Aware Replica-Efficient Dynamic Task Replication, optimizes this approach by minimizing the expected number of replicas while achieving the desired reliability target. We incorporate actual execution times into the reliability assessment. Additionally, we propose the Energy-Aware Reliability-Guaranteeing scheduling technique, which integrates our optimized replication method into hard real-time systems and leverages Dynamic Voltage and Frequency Scaling to minimize energy consumption while ensuring reliability and system schedulability. Experimental results demonstrate that our method requires 24% fewer replicas on average than the N-Modular Redundancy technique, with the advantage increasing to 58% for tasks with low base reliabilities. Furthermore, our scheduling technique significantly conserves energy and enhances feasibility compared to existing methods across diverse system workloads.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1113-1129"},"PeriodicalIF":5.4,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Low-Cost and Security-Enhanced Implementations Against Side-Channel Attacks of NTT for Lattice-Based Cryptography 两种低成本和安全增强的NTT对格密码侧信道攻击的实现
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-27 DOI: 10.1109/TETC.2025.3552941
Yijun Cui;Jiatong Tian;Chuanchao Lu;Yang Li;Ziying Ni;Chenghua Wang;Weiqiang Liu
Lattice-based cryptography is considered secure against quantum computing attacks. However, naive implementations on embedded devices are vulnerable to side-channel attacks (SCAs) with full key recovery possible through power and electromagnetic leakage analysis. This article presents two protection schemes, masking and shuffling, for the baseline Radix-2 multi-path delay commutator (R2MDC) number theoretic transform (NTT) architecture. The proposed masking NTT scheme introduces a random number to protect the secret key during the decryption phase and leverages the linear property of arithmetic transform in NTT polynomial multiplication. By adjusting the comparing decoding threshold, the masking method greatly reduces the ratio of $t$-$test$ value exceeding the threshold of unprotected NTT scheme from 77.38% to 3.91%. An ingenious shuffling transform process is also proposed to disturb the calculation sequence of butterfly transformation, adapting to the high-throughput architecture of R2MDC-NTT. This shuffling NTT scheme does not require operations to remove shuffle or additional operation cycles, reducing the leakage ratio to 13.49% with minimal extra hardware resources and wide applicability. The proposed masking and shuffling techniques effectively suppress side-channel leakage, improving the security of hardware architecture while maintaining a balance between overall performance and additional hardware resources.
基于格子的密码被认为是安全的,可以抵御量子计算攻击。然而,嵌入式设备上的幼稚实现容易受到侧信道攻击(sca)的攻击,通过电源和电磁泄漏分析可以完全恢复密钥。本文提出了基线基数-2多径延迟换向器(R2MDC)数论变换(NTT)体系结构的两种保护方案:屏蔽和变换。提出的掩码NTT方案在解密阶段引入随机数来保护密钥,并利用了NTT多项式乘法中算术变换的线性特性。掩码方法通过调整比较解码阈值,使$t$-$test$值超过无保护NTT方案阈值的比例从77.38%大大降低到3.91%。为了适应R2MDC-NTT的高通量架构,提出了一种巧妙的变换变换过程,打乱了蝴蝶变换的计算顺序。该洗牌NTT方案不需要移除洗牌操作或额外的操作周期,将泄漏率降低至13.49%,额外硬件资源最少,适用性广。所提出的屏蔽和变换技术有效地抑制了侧信道泄漏,提高了硬件架构的安全性,同时保持了整体性能和额外硬件资源之间的平衡。
{"title":"Two Low-Cost and Security-Enhanced Implementations Against Side-Channel Attacks of NTT for Lattice-Based Cryptography","authors":"Yijun Cui;Jiatong Tian;Chuanchao Lu;Yang Li;Ziying Ni;Chenghua Wang;Weiqiang Liu","doi":"10.1109/TETC.2025.3552941","DOIUrl":"https://doi.org/10.1109/TETC.2025.3552941","url":null,"abstract":"Lattice-based cryptography is considered secure against quantum computing attacks. However, naive implementations on embedded devices are vulnerable to side-channel attacks (SCAs) with full key recovery possible through power and electromagnetic leakage analysis. This article presents two protection schemes, masking and shuffling, for the baseline Radix-2 multi-path delay commutator (R2MDC) number theoretic transform (NTT) architecture. The proposed masking NTT scheme introduces a random number to protect the secret key during the decryption phase and leverages the linear property of arithmetic transform in NTT polynomial multiplication. By adjusting the comparing decoding threshold, the masking method greatly reduces the ratio of <inline-formula><tex-math>$t$</tex-math></inline-formula>-<inline-formula><tex-math>$test$</tex-math></inline-formula> value exceeding the threshold of unprotected NTT scheme from 77.38% to 3.91%. An ingenious shuffling transform process is also proposed to disturb the calculation sequence of butterfly transformation, adapting to the high-throughput architecture of R2MDC-NTT. This shuffling NTT scheme does not require operations to remove shuffle or additional operation cycles, reducing the leakage ratio to 13.49% with minimal extra hardware resources and wide applicability. The proposed masking and shuffling techniques effectively suppress side-channel leakage, improving the security of hardware architecture while maintaining a balance between overall performance and additional hardware resources.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"977-989"},"PeriodicalIF":5.4,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1