首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
Virtual Reinforcement Learning for Defect Prediction in Smart Manufacturing 面向智能制造缺陷预测的虚拟强化学习
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-01 DOI: 10.1109/TETC.2025.3546244
Yi-Cheng Chen;Mu-Ping Chang;Wang-Chien Lee
Recent research has focused on the integration of smart manufacturing and deep learning owing to the widespread application of neural computation. For deep learning, how to construct the architecture of a neural network is a critical issue. Especially on defect prediction or detection, a proper neural architecture could effectively extract features from the given manufacturing data to accomplish the targeted task. In this paper, we introduce a Virtual Space concept to effectively shrink the search space of potential neural network structures, with the aim of downgrading the computation complexity for learning and accuracy derivation. In addition, a novel reinforcement learning model, namely, Virtual Proximal Policy Optimization (Virtu-PPO), is developed to efficiently and effectively discover the optimal neural network structure. We also propose an optimization strategy to enhance the searching process of neural architecture for defect prediction. In addition, the proposed model is applied on several real-world manufacturing datasets to show the performance and practicability of defect prediction.
由于神经计算的广泛应用,智能制造与深度学习的融合成为近年来研究的重点。对于深度学习来说,如何构建神经网络的体系结构是一个关键问题。特别是在缺陷预测或检测方面,适当的神经网络结构可以有效地从给定的制造数据中提取特征来完成目标任务。在本文中,我们引入虚拟空间的概念来有效地缩小潜在神经网络结构的搜索空间,以降低学习和精度推导的计算复杂度。此外,提出了一种新的强化学习模型,即虚拟近端策略优化(Virtual - ppo),以高效有效地发现最优的神经网络结构。我们还提出了一种优化策略,以提高缺陷预测神经结构的搜索过程。此外,将该模型应用于多个实际制造数据集,验证了缺陷预测的性能和实用性。
{"title":"Virtual Reinforcement Learning for Defect Prediction in Smart Manufacturing","authors":"Yi-Cheng Chen;Mu-Ping Chang;Wang-Chien Lee","doi":"10.1109/TETC.2025.3546244","DOIUrl":"https://doi.org/10.1109/TETC.2025.3546244","url":null,"abstract":"Recent research has focused on the integration of smart manufacturing and deep learning owing to the widespread application of neural computation. For deep learning, how to construct the architecture of a neural network is a critical issue. Especially on defect prediction or detection, a proper neural architecture could effectively extract features from the given manufacturing data to accomplish the targeted task. In this paper, we introduce a <italic>Virtual Space</i> concept to effectively shrink the search space of potential neural network structures, with the aim of downgrading the computation complexity for learning and accuracy derivation. In addition, a novel reinforcement learning model, namely, <italic>Virtual Proximal Policy Optimization (Virtu-PPO)</i>, is developed to efficiently and effectively discover the optimal neural network structure. We also propose an optimization strategy to enhance the searching process of neural architecture for defect prediction. In addition, the proposed model is applied on several real-world manufacturing datasets to show the performance and practicability of defect prediction.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"990-1002"},"PeriodicalIF":5.4,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
q-Point: A Numeric Format for Quantum Circuit Simulation Using Polar Form Complex Numbers q点:用极形式复数进行量子电路模拟的数字格式
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-30 DOI: 10.1109/TETC.2025.3572935
Seungwoo Choi;Enhyeok Jang;Youngmin Kim;Sungwoo Ahn;Won Woo Ro
Quantum circuit simulation is playing a critical role in the current era of quantum computing. However, quantum circuit simulation suffers from huge memory requirements that scale exponentially according to the number of qubits. Our observation reveals that the conventional complex number representation using real and imaginary values adds to the memory overhead beyond the intrinsic cost of simulating quantum states. Instead, using the radius and phase value of a complex number better reflects the properties of the complex values used in the quantum circuit simulation providing better memory efficiency. This paper proposes q-Point, a compact numeric format for quantum circuit simulation that utilizes polar form representation instead of rectangular form representation to store complex numbers. The proposed q-Point format consists of three fields: i) exponent bits for radius value ii) mantissa bits for radius value iii) mantissa bits for phase value. However, a naive application of the q-Point format has the potential to cause issues with both simulation accuracy and simulation speed. To preserve simulation accuracy with fewer bits, we use a multi-level encoding scheme that employs different mantissa bits depending on the exponent range. Additionally, to prevent possible slowdown due to the add operation in polar form complex numbers, we use a technique that adaptively applies both polar and rectangular forms. Equipped with these optimizations, the proposed q-Point format demonstrates reasonable simulation accuracy while using only half of the memory requirement using the baseline format. Additionally, the q-Point format enables an average of 1.37× and 1.16× faster simulation for QAOA and VQE benchmark circuits.
量子电路仿真在当前量子计算时代起着至关重要的作用。然而,量子电路模拟面临着巨大的内存需求,根据量子位的数量呈指数级增长。我们的观察表明,使用实值和虚值的传统复数表示增加了内存开销,超出了模拟量子态的固有成本。相反,使用复数的半径和相位值可以更好地反映量子电路模拟中使用的复数值的性质,从而提供更好的存储效率。本文提出了q-Point,一种用于量子电路模拟的紧凑数字格式,它利用极坐标形式表示代替矩形形式表示来存储复数。提出的q点格式由三个字段组成:i)半径值的指数位;ii)半径值的尾数位;iii)相位值的尾数位。然而,对q-Point格式的幼稚应用可能会导致仿真精度和仿真速度的问题。为了使用更少的比特来保持仿真精度,我们使用了一种多级编码方案,该方案根据指数范围使用不同的尾数比特。此外,为了防止由于极坐标形式的复数的加法操作可能导致的速度减慢,我们使用了一种自适应地应用极坐标和矩形形式的技术。有了这些优化,建议的q-Point格式显示出合理的模拟精度,而使用基线格式只使用一半的内存需求。此外,q-Point格式使QAOA和VQE基准电路的模拟速度平均提高1.37倍和1.16倍。
{"title":"q-Point: A Numeric Format for Quantum Circuit Simulation Using Polar Form Complex Numbers","authors":"Seungwoo Choi;Enhyeok Jang;Youngmin Kim;Sungwoo Ahn;Won Woo Ro","doi":"10.1109/TETC.2025.3572935","DOIUrl":"https://doi.org/10.1109/TETC.2025.3572935","url":null,"abstract":"Quantum circuit simulation is playing a critical role in the current era of quantum computing. However, quantum circuit simulation suffers from huge memory requirements that scale exponentially according to the number of qubits. Our observation reveals that the conventional complex number representation using real and imaginary values adds to the memory overhead beyond the intrinsic cost of simulating quantum states. Instead, using the radius and phase value of a complex number better reflects the properties of the complex values used in the quantum circuit simulation providing better memory efficiency. This paper proposes q-Point, a compact numeric format for quantum circuit simulation that utilizes polar form representation instead of rectangular form representation to store complex numbers. The proposed q-Point format consists of three fields: i) exponent bits for radius value ii) mantissa bits for radius value iii) mantissa bits for phase value. However, a naive application of the q-Point format has the potential to cause issues with both simulation accuracy and simulation speed. To preserve simulation accuracy with fewer bits, we use a multi-level encoding scheme that employs different mantissa bits depending on the exponent range. Additionally, to prevent possible slowdown due to the add operation in polar form complex numbers, we use a technique that adaptively applies both polar and rectangular forms. Equipped with these optimizations, the proposed q-Point format demonstrates reasonable simulation accuracy while using only half of the memory requirement using the baseline format. Additionally, the q-Point format enables an average of 1.37× and 1.16× faster simulation for QAOA and VQE benchmark circuits.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1142-1155"},"PeriodicalIF":5.4,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Access Control for Background and Co-Occurrence Image Privacy Protection 背景和共现图像隐私保护的实时访问控制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-28 DOI: 10.1109/TETC.2025.3572396
Chaoquan Cai;Dan Lin;Kannappan Palaniappan;Chris Clifton
In today’s digital age, the proliferation of social networks and advanced camera technology has led to countless images being shared on online social platforms daily, potentially resulting in significant breaches of personal privacy. In recent years, many methods have been proposed to protect image privacy, allowing users to be notified of potential privacy leaks before publishing their photos. However, most existing research primarily addresses the privacy protection of image owners or co-owners, while neglecting the privacy of people who appear in the background of others’ images or who are co-occurring with others in the same image. In this paper, we propose a system capable of conducting real-time access control for protecting privacy of every individual appearing in a photo, as well as the privacy of people who co-occur in the same image. Specifically, we first detect all the faces in the image, then use a facial recognition algorithm to identify the corresponding users’ privacy policies, and finally determine whether the image violates any user’s privacy policy. In order to provide real-time access control, we have designed a facial attribute index tree to speed up the process of user identification. The experimental results show that compared with the method without our proposed index tree, our approach improves the time efficiency by almost two orders of magnitude while maintaining the accuracy of more than 97%.
在当今的数字时代,社交网络的激增和先进的摄像技术导致无数的图像每天在在线社交平台上被分享,这可能导致严重侵犯个人隐私。近年来,人们提出了许多保护图像隐私的方法,允许用户在发布照片之前收到潜在隐私泄露的通知。然而,现有的大多数研究主要针对图像所有者或共同所有者的隐私保护,而忽略了出现在他人图像背景中的人或与他人共同出现在同一图像中的人的隐私。在本文中,我们提出了一个能够进行实时访问控制的系统,以保护照片中出现的每个人的隐私,以及同一图像中共同出现的人的隐私。具体来说,我们首先检测图像中的所有人脸,然后使用人脸识别算法识别相应的用户隐私政策,最后确定图像是否违反了任何用户的隐私政策。为了提供实时的访问控制,我们设计了人脸属性索引树来加快用户识别的过程。实验结果表明,与没有索引树的方法相比,该方法在保持97%以上的准确率的同时,将时间效率提高了近两个数量级。
{"title":"Real-Time Access Control for Background and Co-Occurrence Image Privacy Protection","authors":"Chaoquan Cai;Dan Lin;Kannappan Palaniappan;Chris Clifton","doi":"10.1109/TETC.2025.3572396","DOIUrl":"https://doi.org/10.1109/TETC.2025.3572396","url":null,"abstract":"In today’s digital age, the proliferation of social networks and advanced camera technology has led to countless images being shared on online social platforms daily, potentially resulting in significant breaches of personal privacy. In recent years, many methods have been proposed to protect image privacy, allowing users to be notified of potential privacy leaks before publishing their photos. However, most existing research primarily addresses the privacy protection of image owners or co-owners, while neglecting the privacy of people who appear in the background of others’ images or who are co-occurring with others in the same image. In this paper, we propose a system capable of conducting real-time access control for protecting privacy of every individual appearing in a photo, as well as the privacy of people who co-occur in the same image. Specifically, we first detect all the faces in the image, then use a facial recognition algorithm to identify the corresponding users’ privacy policies, and finally determine whether the image violates any user’s privacy policy. In order to provide real-time access control, we have designed a facial attribute index tree to speed up the process of user identification. The experimental results show that compared with the method without our proposed index tree, our approach improves the time efficiency by almost two orders of magnitude while maintaining the accuracy of more than 97%.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1130-1141"},"PeriodicalIF":5.4,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Task Replication With Imperfect Fault Detection in Multicore Cyber-Physical Systems 多核信息物理系统中不完全故障检测的动态任务复制
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-28 DOI: 10.1109/TETC.2025.3572277
Hossein Hosseini;Mohsen Ansari;Jörg Henkel
Task replication is a common technique for achieving fault tolerance. However, its effectiveness is limited by the accuracy of the fault detection mechanism; imperfect detection imposes a ceiling on achievable reliability. While perfect fault detection mechanisms offer higher reliability, they introduce significant overhead. To address this, we introduce Dynamic Task Replication, a fault tolerance technique that dynamically determines the number of replicas at runtime to overcome the limitations of imperfect fault detection. Our primary contribution, Reliability-Aware Replica-Efficient Dynamic Task Replication, optimizes this approach by minimizing the expected number of replicas while achieving the desired reliability target. We incorporate actual execution times into the reliability assessment. Additionally, we propose the Energy-Aware Reliability-Guaranteeing scheduling technique, which integrates our optimized replication method into hard real-time systems and leverages Dynamic Voltage and Frequency Scaling to minimize energy consumption while ensuring reliability and system schedulability. Experimental results demonstrate that our method requires 24% fewer replicas on average than the N-Modular Redundancy technique, with the advantage increasing to 58% for tasks with low base reliabilities. Furthermore, our scheduling technique significantly conserves energy and enhances feasibility compared to existing methods across diverse system workloads.
任务复制是实现容错的常用技术。然而,其有效性受到故障检测机制准确性的限制;不完善的检测对可实现的可靠性造成了限制。虽然完美的故障检测机制提供了更高的可靠性,但它们带来了巨大的开销。为了解决这个问题,我们引入了动态任务复制,这是一种容错技术,可以在运行时动态确定副本的数量,以克服不完全故障检测的限制。我们的主要贡献,可靠性感知副本-高效动态任务复制,通过最小化预期副本数量,同时达到期望的可靠性目标,优化了这种方法。我们将实际执行时间纳入可靠性评估。此外,我们提出了能量感知可靠性保证调度技术,该技术将我们优化的复制方法集成到硬实时系统中,并利用动态电压和频率缩放来最大限度地减少能源消耗,同时确保可靠性和系统可调度性。实验结果表明,我们的方法比n模冗余技术平均减少24%的副本,对于低基础可靠性的任务,优势增加到58%。此外,与现有方法相比,我们的调度技术在不同系统工作负载下显着节省了能源并提高了可行性。
{"title":"Dynamic Task Replication With Imperfect Fault Detection in Multicore Cyber-Physical Systems","authors":"Hossein Hosseini;Mohsen Ansari;Jörg Henkel","doi":"10.1109/TETC.2025.3572277","DOIUrl":"https://doi.org/10.1109/TETC.2025.3572277","url":null,"abstract":"Task replication is a common technique for achieving fault tolerance. However, its effectiveness is limited by the accuracy of the fault detection mechanism; imperfect detection imposes a ceiling on achievable reliability. While perfect fault detection mechanisms offer higher reliability, they introduce significant overhead. To address this, we introduce Dynamic Task Replication, a fault tolerance technique that dynamically determines the number of replicas at runtime to overcome the limitations of imperfect fault detection. Our primary contribution, Reliability-Aware Replica-Efficient Dynamic Task Replication, optimizes this approach by minimizing the expected number of replicas while achieving the desired reliability target. We incorporate actual execution times into the reliability assessment. Additionally, we propose the Energy-Aware Reliability-Guaranteeing scheduling technique, which integrates our optimized replication method into hard real-time systems and leverages Dynamic Voltage and Frequency Scaling to minimize energy consumption while ensuring reliability and system schedulability. Experimental results demonstrate that our method requires 24% fewer replicas on average than the N-Modular Redundancy technique, with the advantage increasing to 58% for tasks with low base reliabilities. Furthermore, our scheduling technique significantly conserves energy and enhances feasibility compared to existing methods across diverse system workloads.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1113-1129"},"PeriodicalIF":5.4,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Low-Cost and Security-Enhanced Implementations Against Side-Channel Attacks of NTT for Lattice-Based Cryptography 两种低成本和安全增强的NTT对格密码侧信道攻击的实现
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-27 DOI: 10.1109/TETC.2025.3552941
Yijun Cui;Jiatong Tian;Chuanchao Lu;Yang Li;Ziying Ni;Chenghua Wang;Weiqiang Liu
Lattice-based cryptography is considered secure against quantum computing attacks. However, naive implementations on embedded devices are vulnerable to side-channel attacks (SCAs) with full key recovery possible through power and electromagnetic leakage analysis. This article presents two protection schemes, masking and shuffling, for the baseline Radix-2 multi-path delay commutator (R2MDC) number theoretic transform (NTT) architecture. The proposed masking NTT scheme introduces a random number to protect the secret key during the decryption phase and leverages the linear property of arithmetic transform in NTT polynomial multiplication. By adjusting the comparing decoding threshold, the masking method greatly reduces the ratio of $t$-$test$ value exceeding the threshold of unprotected NTT scheme from 77.38% to 3.91%. An ingenious shuffling transform process is also proposed to disturb the calculation sequence of butterfly transformation, adapting to the high-throughput architecture of R2MDC-NTT. This shuffling NTT scheme does not require operations to remove shuffle or additional operation cycles, reducing the leakage ratio to 13.49% with minimal extra hardware resources and wide applicability. The proposed masking and shuffling techniques effectively suppress side-channel leakage, improving the security of hardware architecture while maintaining a balance between overall performance and additional hardware resources.
基于格子的密码被认为是安全的,可以抵御量子计算攻击。然而,嵌入式设备上的幼稚实现容易受到侧信道攻击(sca)的攻击,通过电源和电磁泄漏分析可以完全恢复密钥。本文提出了基线基数-2多径延迟换向器(R2MDC)数论变换(NTT)体系结构的两种保护方案:屏蔽和变换。提出的掩码NTT方案在解密阶段引入随机数来保护密钥,并利用了NTT多项式乘法中算术变换的线性特性。掩码方法通过调整比较解码阈值,使$t$-$test$值超过无保护NTT方案阈值的比例从77.38%大大降低到3.91%。为了适应R2MDC-NTT的高通量架构,提出了一种巧妙的变换变换过程,打乱了蝴蝶变换的计算顺序。该洗牌NTT方案不需要移除洗牌操作或额外的操作周期,将泄漏率降低至13.49%,额外硬件资源最少,适用性广。所提出的屏蔽和变换技术有效地抑制了侧信道泄漏,提高了硬件架构的安全性,同时保持了整体性能和额外硬件资源之间的平衡。
{"title":"Two Low-Cost and Security-Enhanced Implementations Against Side-Channel Attacks of NTT for Lattice-Based Cryptography","authors":"Yijun Cui;Jiatong Tian;Chuanchao Lu;Yang Li;Ziying Ni;Chenghua Wang;Weiqiang Liu","doi":"10.1109/TETC.2025.3552941","DOIUrl":"https://doi.org/10.1109/TETC.2025.3552941","url":null,"abstract":"Lattice-based cryptography is considered secure against quantum computing attacks. However, naive implementations on embedded devices are vulnerable to side-channel attacks (SCAs) with full key recovery possible through power and electromagnetic leakage analysis. This article presents two protection schemes, masking and shuffling, for the baseline Radix-2 multi-path delay commutator (R2MDC) number theoretic transform (NTT) architecture. The proposed masking NTT scheme introduces a random number to protect the secret key during the decryption phase and leverages the linear property of arithmetic transform in NTT polynomial multiplication. By adjusting the comparing decoding threshold, the masking method greatly reduces the ratio of <inline-formula><tex-math>$t$</tex-math></inline-formula>-<inline-formula><tex-math>$test$</tex-math></inline-formula> value exceeding the threshold of unprotected NTT scheme from 77.38% to 3.91%. An ingenious shuffling transform process is also proposed to disturb the calculation sequence of butterfly transformation, adapting to the high-throughput architecture of R2MDC-NTT. This shuffling NTT scheme does not require operations to remove shuffle or additional operation cycles, reducing the leakage ratio to 13.49% with minimal extra hardware resources and wide applicability. The proposed masking and shuffling techniques effectively suppress side-channel leakage, improving the security of hardware architecture while maintaining a balance between overall performance and additional hardware resources.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"977-989"},"PeriodicalIF":5.4,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Porcelain Fingerprinting Technique 一种新的陶瓷指纹识别技术
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-17 DOI: 10.1109/TETC.2025.3546602
Chengjie Wang;Yuejun Zhang;Ziyu Zhou
Porcelain, as a significant cultural heritage, embodies the wisdom of human civilization. However, existing anti-counterfeiting and authentication technologies for porcelain are often unreliable and costly. This paper proposes a physical unclonable functions (PUF) design based on crack physical feature extraction for the anti-counterfeiting and authentication of Gold-Wire porcelain. The proposed method generates PUF information by extracting inherent physical deviations in the surface cracks of Gold-Wire porcelain. First, a standard crack extraction process is established using digital image processing to obtain crack information from the porcelain surface. Then, a physical feature extraction model based on the chain code encoding technique and the Delaunay triangulation technique is used to derive the physical feature values from the cracks. Subsequently, a PUF encoding algorithm is designed to convert these physical feature values into a PUF response. Finally, the security and reliability of the designed PUF are evaluated, and a PUF-based porcelain authentication protocol is developed. Experimental results show that the proposed PUF exhibits 50.16% uniqueness and 98.85% reliability, and the PUF data successfully passed the NIST randomness test, demonstrating that the proposed technology can effectively achieve low-cost, high-reliability anti-counterfeiting for commercial porcelain.
瓷器作为一项重要的文化遗产,凝聚着人类文明的智慧。然而,现有的瓷器防伪和鉴定技术往往是不可靠和昂贵的。提出了一种基于裂纹物理特征提取的金丝瓷防伪认证物理不可克隆功能(PUF)设计。该方法通过提取金丝瓷表面裂纹中固有的物理偏差来生成PUF信息。首先,利用数字图像处理技术建立裂纹提取标准流程,获取裂纹信息;然后,采用基于链码编码技术和Delaunay三角剖分技术的物理特征提取模型,从裂缝中提取物理特征值;然后设计PUF编码算法,将这些物理特征值转换为PUF响应。最后,对所设计的PUF的安全性和可靠性进行了评估,并开发了基于PUF的瓷认证协议。实验结果表明,所提出的PUF具有50.16%的唯一性和98.85%的可靠性,并且PUF数据成功通过了NIST的随机性测试,表明所提出的技术可以有效地实现商品瓷器的低成本、高可靠性防伪。
{"title":"A Novel Porcelain Fingerprinting Technique","authors":"Chengjie Wang;Yuejun Zhang;Ziyu Zhou","doi":"10.1109/TETC.2025.3546602","DOIUrl":"https://doi.org/10.1109/TETC.2025.3546602","url":null,"abstract":"Porcelain, as a significant cultural heritage, embodies the wisdom of human civilization. However, existing anti-counterfeiting and authentication technologies for porcelain are often unreliable and costly. This paper proposes a physical unclonable functions (PUF) design based on crack physical feature extraction for the anti-counterfeiting and authentication of Gold-Wire porcelain. The proposed method generates PUF information by extracting inherent physical deviations in the surface cracks of Gold-Wire porcelain. First, a standard crack extraction process is established using digital image processing to obtain crack information from the porcelain surface. Then, a physical feature extraction model based on the chain code encoding technique and the Delaunay triangulation technique is used to derive the physical feature values from the cracks. Subsequently, a PUF encoding algorithm is designed to convert these physical feature values into a PUF response. Finally, the security and reliability of the designed PUF are evaluated, and a PUF-based porcelain authentication protocol is developed. Experimental results show that the proposed PUF exhibits 50.16% uniqueness and 98.85% reliability, and the PUF data successfully passed the NIST randomness test, demonstrating that the proposed technology can effectively achieve low-cost, high-reliability anti-counterfeiting for commercial porcelain.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"964-976"},"PeriodicalIF":5.4,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing 众包中具有双向偏好的技能导向稳定任务分配
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-13 DOI: 10.1109/TETC.2025.3548672
Riya Samanta;Soumya K. Ghosh;Sajal K. Das
Traditional task assignment approaches in crowdsourcing platforms have focused on optimizing utility for workers or tasks, often neglecting the general utility of the platform and the influence of mutual preference considering skill availability and budget restrictions. This oversight can destabilize task allocation outcomes, diminishing user experience, and, ultimately, the platform’s long-term utility and gives rise to the Worker Task Stable Matching (WTSM) problem. To solve WTSM, we propose the Skill-oriented Stable Task Assignment with a Bi-directional Preference (SoSTA) method based on deferred acceptance strategy. SoSTA aims to generate stable allocations between tasks and workers considering mutually their preferences, optimizing overall utility while following skill and budget constraints. Our study redefines the general utility of the platform as an amalgamation of utilities on both the workers’ and tasks’ sides, incorporating the preference lists of each worker or task based on their respective utility scores for the other party. SoSTA incorporates Multi Skill-oriented Stable Worker Task Mapping (Multi-SoS-WTM) algorithm for contributions with multiple skills per worker. SoSTA is rational, non-wasteful, fair, and hence stable. SoSTA outperformed other approaches in the simulations of the MeetUp dataset. SoSTA improves execution speed by 80%, task completion rate by 60%, and user happiness by 8%.
在众包平台中,传统的任务分配方法侧重于优化工人或任务的效用,往往忽略了平台的一般效用以及考虑技能可用性和预算限制的相互偏好的影响。这种疏忽会破坏任务分配结果的稳定性,降低用户体验,最终影响平台的长期效用,并导致工作任务稳定匹配(Worker task stability Matching, WTSM)问题。为了解决WTSM问题,我们提出了基于延迟接受策略的双向偏好(SoSTA)的技能导向稳定任务分配方法。SoSTA的目标是在任务和工人之间产生稳定的分配,考虑他们的相互偏好,在遵循技能和预算约束的同时优化整体效用。我们的研究将平台的一般效用重新定义为工人和任务双方效用的合并,结合每个工人或任务的偏好列表,基于他们各自对另一方的效用得分。SoSTA结合了面向多技能的稳定工人任务映射(Multi- sos - wtm)算法,用于每个工人的多技能贡献。SoSTA是理性的、不浪费的、公平的,因此是稳定的。在MeetUp数据集的模拟中,SoSTA优于其他方法。SoSTA将执行速度提高了80%,任务完成率提高了60%,用户满意度提高了8%。
{"title":"SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing","authors":"Riya Samanta;Soumya K. Ghosh;Sajal K. Das","doi":"10.1109/TETC.2025.3548672","DOIUrl":"https://doi.org/10.1109/TETC.2025.3548672","url":null,"abstract":"Traditional task assignment approaches in crowdsourcing platforms have focused on optimizing utility for workers or tasks, often neglecting the general utility of the platform and the influence of mutual preference considering skill availability and budget restrictions. This oversight can destabilize task allocation outcomes, diminishing user experience, and, ultimately, the platform’s long-term utility and gives rise to the Worker Task Stable Matching (WTSM) problem. To solve WTSM, we propose the Skill-oriented Stable Task Assignment with a Bi-directional Preference (SoSTA) method based on deferred acceptance strategy. SoSTA aims to generate stable allocations between tasks and workers considering mutually their preferences, optimizing overall utility while following skill and budget constraints. Our study redefines the general utility of the platform as an amalgamation of utilities on both the workers’ and tasks’ sides, incorporating the preference lists of each worker or task based on their respective utility scores for the other party. SoSTA incorporates Multi Skill-oriented Stable Worker Task Mapping (Multi-SoS-WTM) algorithm for contributions with multiple skills per worker. SoSTA is rational, non-wasteful, fair, and hence stable. SoSTA outperformed other approaches in the simulations of the MeetUp dataset. SoSTA improves execution speed by 80%, task completion rate by 60%, and user happiness by 8%.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"947-963"},"PeriodicalIF":5.4,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10925570","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Aging Detection and Rejuvenation Assessment in Heterogeneous Virtual Networks 异构虚拟网络中软件老化检测与恢复评估
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-11 DOI: 10.1109/TETC.2025.3547612
Alberto Avritzer;Andrea Janes;Andrea Marin;Catia Trubiani;Andre van Hoorn;Matteo Camilli;Daniel S. Menasché;André B. Bondi
In this article, we report on the application of resiliency enforcement strategies that were applied to a microservices system running on a real-world deployment of a large cluster of heterogeneous Virtual Machines (VMs). We present the evaluation results obtained from measurement and modeling implementations. The measurement infrastructure was composed of 15 large and 15 extra-large VMs. The modeling approach used Markov Decision Processes (MDP). On the measurement testbed, we implemented three different levels of software rejuvenation granularity to achieve software resiliency. We have discovered two threats to resiliency in this environment. The first threat to resiliency was a memory leak that was part of the underlying open-source infrastructure in each VM. The second threat to resiliency was the result of the contention for resources in the physical host, which is dependent on the number and size of VMs deployed to the physical host. In the MDP modeling approach, we evaluated four strategies for assigning tasks to VMs with different configurations and different levels of parallelism. Using the large cluster under study, we compared our approach of using software aging and rejuvenation with the state-of-the-art approach of using a network of VMs deployed to a private cloud without software aging detection and rejuvenation. In summary, we show that in a private cloud with non-elastic resource allocation in the physical hosts, careful performance engineering needs to be performed to optimize the trade-offs between the number of VMs allocated and the total memory allocated to each VM.
在本文中,我们将报告弹性实施策略的应用,这些策略应用于运行在大型异构虚拟机(vm)集群的实际部署上的微服务系统。我们给出了从测量和建模实现中获得的评估结果。测量基础设施由15个大型vm和15个超大型vm组成。建模方法采用马尔可夫决策过程(MDP)。在测量测试平台上,我们实现了三个不同级别的软件恢复粒度来实现软件弹性。在这种环境下,我们发现了对弹性的两大威胁。对弹性的第一个威胁是内存泄漏,这是每个VM中底层开源基础设施的一部分。对弹性的第二个威胁是物理主机上资源争用的结果,这取决于部署到物理主机上的虚拟机的数量和大小。在MDP建模方法中,我们评估了将任务分配给具有不同配置和不同并行度级别的vm的四种策略。使用所研究的大型集群,我们将使用软件老化和恢复的方法与使用部署到私有云的虚拟机网络的最先进方法进行了比较,而不进行软件老化检测和恢复。总之,我们展示了在物理主机中使用非弹性资源分配的私有云中,需要执行仔细的性能工程来优化分配给每个VM的VM数量和分配给每个VM的总内存之间的权衡。
{"title":"Software Aging Detection and Rejuvenation Assessment in Heterogeneous Virtual Networks","authors":"Alberto Avritzer;Andrea Janes;Andrea Marin;Catia Trubiani;Andre van Hoorn;Matteo Camilli;Daniel S. Menasché;André B. Bondi","doi":"10.1109/TETC.2025.3547612","DOIUrl":"https://doi.org/10.1109/TETC.2025.3547612","url":null,"abstract":"In this article, we report on the application of resiliency enforcement strategies that were applied to a microservices system running on a real-world deployment of a large cluster of heterogeneous Virtual Machines (VMs). We present the evaluation results obtained from measurement and modeling implementations. The measurement infrastructure was composed of 15 large and 15 extra-large VMs. The modeling approach used Markov Decision Processes (MDP). On the measurement testbed, we implemented three different levels of software rejuvenation granularity to achieve software resiliency. We have discovered two threats to resiliency in this environment. The first threat to resiliency was a memory leak that was part of the underlying open-source infrastructure in each VM. The second threat to resiliency was the result of the contention for resources in the physical host, which is dependent on the number and size of VMs deployed to the physical host. In the MDP modeling approach, we evaluated four strategies for assigning tasks to VMs with different configurations and different levels of parallelism. Using the large cluster under study, we compared our approach of using software aging and rejuvenation with the state-of-the-art approach of using a network of VMs deployed to a private cloud without software aging detection and rejuvenation. In summary, we show that in a private cloud with non-elastic resource allocation in the physical hosts, careful performance engineering needs to be performed to optimize the trade-offs between the number of VMs allocated and the total memory allocated to each VM.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 2","pages":"299-313"},"PeriodicalIF":5.1,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10923615","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144323162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FLCL: Feature-Level Contrastive Learning for Few-Shot Image Classification FLCL:基于特征级对比学习的少镜头图像分类
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-10 DOI: 10.1109/TETC.2025.3546366
Wenming Cao;Jiewen Zeng;Qifan Liu
Few-shot classification is the task of recognizing unseen classes using a limited number of samples. In this paper, we propose a new contrastive learning method called Feature-Level Contrastive Learning (FLCL). FLCL conducts contrastive learning at the feature level and leverages the subtle relationships between positive and negative samples to achieve more effective classification. Additionally, we address the challenges of requiring a large number of negative samples and the difficulty of selecting high-quality negative samples in traditional contrastive learning methods. For feature learning, we design a Feature Enhancement Coding (FEC) module to analyze the interactions and correlations between nonlinear features, enhancing the quality of feature representations. In the metric stage, we propose a centered hypersphere projection metric to map feature vectors onto the hypersphere, improving the comparison between the support and query sets. Experimental results on four few-shot classification benchmark datasets demonstrate that our method, while simple in design, outperforms previous methods and achieves state-of-the-art performance. A detailed ablation study further confirms the effectiveness of each component of our model.
少射分类是使用有限数量的样本识别未见类的任务。本文提出了一种新的对比学习方法——特征级对比学习(FLCL)。FLCL在特征层面进行对比学习,利用正样本和负样本之间的微妙关系来实现更有效的分类。此外,我们还解决了传统对比学习方法中需要大量负样本和难以选择高质量负样本的挑战。对于特征学习,我们设计了一个特征增强编码(FEC)模块来分析非线性特征之间的相互作用和相关性,提高特征表示的质量。在度量阶段,我们提出了一个中心超球投影度量,将特征向量映射到超球上,提高了支持集和查询集之间的可比性。在4个小样本分类基准数据集上的实验结果表明,该方法设计简单,但性能优于现有方法。详细的消融研究进一步证实了我们模型的每个组成部分的有效性。
{"title":"FLCL: Feature-Level Contrastive Learning for Few-Shot Image Classification","authors":"Wenming Cao;Jiewen Zeng;Qifan Liu","doi":"10.1109/TETC.2025.3546366","DOIUrl":"https://doi.org/10.1109/TETC.2025.3546366","url":null,"abstract":"Few-shot classification is the task of recognizing unseen classes using a limited number of samples. In this paper, we propose a new contrastive learning method called Feature-Level Contrastive Learning (FLCL). FLCL conducts contrastive learning at the feature level and leverages the subtle relationships between positive and negative samples to achieve more effective classification. Additionally, we address the challenges of requiring a large number of negative samples and the difficulty of selecting high-quality negative samples in traditional contrastive learning methods. For feature learning, we design a Feature Enhancement Coding (FEC) module to analyze the interactions and correlations between nonlinear features, enhancing the quality of feature representations. In the metric stage, we propose a centered hypersphere projection metric to map feature vectors onto the hypersphere, improving the comparison between the support and query sets. Experimental results on four few-shot classification benchmark datasets demonstrate that our method, while simple in design, outperforms previous methods and achieves state-of-the-art performance. A detailed ablation study further confirms the effectiveness of each component of our model.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"935-946"},"PeriodicalIF":5.4,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MALITE: Lightweight Malware Detection and Classification for Constrained Devices MALITE:用于受限设备的轻量级恶意软件检测和分类
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-08 DOI: 10.1109/TETC.2025.3566370
Sidharth Anand;Barsha Mitra;Soumyadeep Dey;Abhinav Rao;Rupsha Dhar;Jaideep Vaidya
Today, malware is one of the primary cyber threats to organizations, pervading all types of computing devices, including resource constrained devices such as mobile phones, tablets and embedded devices like Internet-of-Things (IoT) devices. In recent years, researchers have leveraged machine learning based strategies for malware detection and classification. However, malware analysis approaches can only be employed in resource constrained environments if the methods are lightweight in nature. In this paper, we present MALITE, a lightweight malware analysis system, that can distinguish between benign and malicious binaries and classify various malware families. MALITE converts a binary into a grayscale or an RGB image requiring low memory and battery power consumption and uses computationally inexpensive malware analysis strategies. We have designed MALITE-MN, a lightweight neural network based architecture and MALITE-HRF, an ultra lightweight random forest based method that uses histogram features extracted by a sliding window. An extensive empirical evaluation is conducted on seven publicly available datasets (Malimg, Microsoft BIG, Dumpware10, MOTIF, Drebin, CICAndMal2017 and MalNet), and performance is compared to four state-of-the-art baselines. The results show that MALITE-MN and MALITE-HRF not only accurately identify and classify malware but also respectively consume several orders of magnitude lower resources (in terms of both memory as well as computation capabilities), making them much more suitable for resource constrained environments.
如今,恶意软件是企业面临的主要网络威胁之一,它渗透到所有类型的计算设备中,包括资源受限的设备,如移动电话、平板电脑和物联网(IoT)设备等嵌入式设备。近年来,研究人员利用基于机器学习的策略进行恶意软件检测和分类。然而,恶意软件分析方法只能在资源受限的环境中使用,如果这些方法本质上是轻量级的。在本文中,我们提出了一个轻量级的恶意软件分析系统MALITE,它可以区分良性和恶意二进制文件,并对各种恶意软件进行分类。MALITE将二进制转换为灰度或RGB图像,需要低内存和电池功耗,并使用计算廉价的恶意软件分析策略。我们设计了基于轻量级神经网络的架构MALITE-MN和基于超轻量级随机森林的方法MALITE-HRF,该方法利用滑动窗口提取直方图特征。对七个公开可用的数据集(Malimg、Microsoft BIG、Dumpware10、MOTIF、Drebin、CICAndMal2017和MalNet)进行了广泛的实证评估,并与四个最先进的基线进行了比较。结果表明,MALITE-MN和MALITE-HRF不仅可以准确地识别和分类恶意软件,而且消耗的资源(在内存和计算能力方面)分别降低了几个数量级,使它们更适合资源受限的环境。
{"title":"MALITE: Lightweight Malware Detection and Classification for Constrained Devices","authors":"Sidharth Anand;Barsha Mitra;Soumyadeep Dey;Abhinav Rao;Rupsha Dhar;Jaideep Vaidya","doi":"10.1109/TETC.2025.3566370","DOIUrl":"https://doi.org/10.1109/TETC.2025.3566370","url":null,"abstract":"Today, malware is one of the primary cyber threats to organizations, pervading all types of computing devices, including resource constrained devices such as mobile phones, tablets and embedded devices like Internet-of-Things (IoT) devices. In recent years, researchers have leveraged machine learning based strategies for malware detection and classification. However, malware analysis approaches can only be employed in resource constrained environments if the methods are lightweight in nature. In this paper, we present MALITE, a lightweight malware analysis system, that can distinguish between benign and malicious binaries and classify various malware families. MALITE converts a binary into a grayscale or an RGB image requiring low memory and battery power consumption and uses computationally inexpensive malware analysis strategies. We have designed MALITE-MN, a lightweight neural network based architecture and MALITE-HRF, an ultra lightweight random forest based method that uses histogram features extracted by a sliding window. An extensive empirical evaluation is conducted on seven publicly available datasets (Malimg, Microsoft BIG, Dumpware10, MOTIF, Drebin, CICAndMal2017 and MalNet), and performance is compared to four state-of-the-art baselines. The results show that MALITE-MN and MALITE-HRF not only accurately identify and classify malware but also respectively consume several orders of magnitude lower resources (in terms of both memory as well as computation capabilities), making them much more suitable for resource constrained environments.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"13 3","pages":"1099-1112"},"PeriodicalIF":5.4,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145057467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1