首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
A Privacy Enforcing Framework for Data Streams on the Edge 边缘数据流隐私保护框架
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-27 DOI: 10.1109/TETC.2023.3315131
Boris Sedlak;Ilir Murturi;Praveen Kumar Donta;Schahram Dustdar
Recent developments in machine learning (ML) allow for efficient data stream processing and also help in meeting various privacy requirements. Traditionally, predefined privacy policies are enforced in resource-rich and homogeneous environments such as in the cloud to protect sensitive information from being exposed. However, large amounts of data streams generated from heterogeneous IoT devices often result in high computational costs, cause network latency, and increase the chance of data interruption as data travels away from the source. Therefore, this article proposes a novel privacy-enforcing framework for transforming data streams by executing various privacy policies close to the data source. To achieve our proposed framework, we enable domain experts to specify high-level privacy policies in a human-readable form. Then, the edge-based runtime system analyzes data streams (i.e., generated from nearby IoT devices), interprets privacy policies (i.e., deployed on edge devices), and transforms data streams if privacy violations occur. Our proposed runtime mechanism uses a Deep Neural Networks (DNN) technique to detect privacy violations within the streamed data. Furthermore, we discuss the framework, processes of the approach, and the experiments carried out on a real-world testbed to validate its feasibility and applicability.
机器学习(ML)的最新发展使高效数据流处理成为可能,同时也有助于满足各种隐私要求。传统上,预定义的隐私策略在资源丰富的同构环境(如云环境)中执行,以保护敏感信息不被暴露。然而,从异构物联网设备生成的大量数据流通常会导致高昂的计算成本,造成网络延迟,并在数据远离源头时增加数据中断的几率。因此,本文提出了一种新颖的隐私强制框架,通过在数据源附近执行各种隐私策略来转换数据流。为了实现我们提出的框架,我们让领域专家以人类可读的形式指定高级隐私策略。然后,基于边缘的运行时系统分析数据流(即从附近的物联网设备生成的数据流),解释隐私策略(即部署在边缘设备上的隐私策略),并在发生隐私侵犯时转换数据流。我们提出的运行时机制使用深度神经网络(DNN)技术检测数据流中的隐私侵犯行为。此外,我们还讨论了该方法的框架、流程以及在真实世界测试平台上进行的实验,以验证其可行性和适用性。
{"title":"A Privacy Enforcing Framework for Data Streams on the Edge","authors":"Boris Sedlak;Ilir Murturi;Praveen Kumar Donta;Schahram Dustdar","doi":"10.1109/TETC.2023.3315131","DOIUrl":"10.1109/TETC.2023.3315131","url":null,"abstract":"Recent developments in machine learning (ML) allow for efficient data stream processing and also help in meeting various privacy requirements. Traditionally, predefined privacy policies are enforced in resource-rich and homogeneous environments such as in the cloud to protect sensitive information from being exposed. However, large amounts of data streams generated from heterogeneous IoT devices often result in high computational costs, cause network latency, and increase the chance of data interruption as data travels away from the source. Therefore, this article proposes a novel privacy-enforcing framework for transforming data streams by executing various privacy policies close to the data source. To achieve our proposed framework, we enable domain experts to specify high-level privacy policies in a human-readable form. Then, the edge-based runtime system analyzes data streams (i.e., generated from nearby IoT devices), interprets privacy policies (i.e., deployed on edge devices), and transforms data streams if privacy violations occur. Our proposed runtime mechanism uses a Deep Neural Networks (DNN) technique to detect privacy violations within the streamed data. Furthermore, we discuss the framework, processes of the approach, and the experiments carried out on a real-world testbed to validate its feasibility and applicability.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"852-863"},"PeriodicalIF":5.1,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135793727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy 基于四叉树的自适应空间分解,用于局部差分隐私下的范围查询
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-26 DOI: 10.1109/TETC.2023.3317393
Huiwei Wang;Yaqian Huang;Huaqing Li
Nowadays, researchers have shown significant interest in geographic location-based spatial data analysis due to its wide range of application scenarios. However, the accuracy of the grid-based quadtree range query (GT-R) algorithm, which utilizes the uniform grid method to divide the data space, is compromised by the excessive noise introduced in the divided area. In addition, the private adaptive grid (PrivAG) algorithm does not adopt any index structure, which leads to inefficient query. To address above issues, this paper presents the Quadtree-based Adaptive Spatial Decomposition (ASDQT) algorithm. ASDQT leverages reservoir sampling technology under local differential privacy (LDP) to extract spatial data as the segmentation object. By setting a reasonable threshold, ASDQT dynamically constructs the tree structure, enabling coarse-grained division of sparse regions and fine-grained division of dense regions. Extensive experiments conducted on two real-world datasets demonstrate the efficacy of ASDQT in handling large-scale spatial datasets with different distributions. The results indicate that ASDQT outperforms existing methods in terms of both accuracy and running efficiency.
如今,基于地理位置的空间数据分析因其广泛的应用场景而备受研究人员关注。然而,利用均匀网格法划分数据空间的基于网格的四叉树范围查询(GT-R)算法,由于划分区域中引入了过多噪声,其准确性大打折扣。此外,私有自适应网格(PrivAG)算法没有采用任何索引结构,导致查询效率低下。为解决上述问题,本文提出了基于四叉树的自适应空间分解(ASDQT)算法。ASDQT 利用局部差分隐私(LDP)下的水库采样技术提取空间数据作为分割对象。通过设置合理的阈值,ASDQT 可动态构建树形结构,实现稀疏区域的粗粒度分割和密集区域的细粒度分割。在两个实际数据集上进行的广泛实验证明了 ASDQT 在处理具有不同分布的大规模空间数据集时的功效。结果表明,ASDQT 在准确性和运行效率方面都优于现有方法。
{"title":"Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy","authors":"Huiwei Wang;Yaqian Huang;Huaqing Li","doi":"10.1109/TETC.2023.3317393","DOIUrl":"10.1109/TETC.2023.3317393","url":null,"abstract":"Nowadays, researchers have shown significant interest in geographic location-based spatial data analysis due to its wide range of application scenarios. However, the accuracy of the grid-based quadtree range query (GT-R) algorithm, which utilizes the uniform grid method to divide the data space, is compromised by the excessive noise introduced in the divided area. In addition, the private adaptive grid (PrivAG) algorithm does not adopt any index structure, which leads to inefficient query. To address above issues, this paper presents the Quadtree-based Adaptive Spatial Decomposition (ASDQT) algorithm. ASDQT leverages reservoir sampling technology under local differential privacy (LDP) to extract spatial data as the segmentation object. By setting a reasonable threshold, ASDQT dynamically constructs the tree structure, enabling coarse-grained division of sparse regions and fine-grained division of dense regions. Extensive experiments conducted on two real-world datasets demonstrate the efficacy of ASDQT in handling large-scale spatial datasets with different distributions. The results indicate that ASDQT outperforms existing methods in terms of both accuracy and running efficiency.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"11 4","pages":"1045-1056"},"PeriodicalIF":5.9,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135755255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications 面向高性能应用的两种双节点升位硬化触发器设计
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-25 DOI: 10.1109/TETC.2023.3317070
Aibin Yan;Aoran Cao;Zhengfeng Huang;Jie Cui;Tianming Ni;Patrick Girard;Xiaoqing Wen;Jiliang Zhang
The continuous advancement of complementary metal-oxide-semiconductor technologies makes flip-flops (FFs) vulnerable to soft errors. Single-node upsets (SNUs), as well as double-node upsets (DNUs), are typical soft errors. This article proposes two radiation-hardened FF designs, namely DNU-tolerant FF (DUT-FF) and DNU-recoverable FF (DUR-FF). First, the DUT-FF which mainly consists of four dual-interlocked-storage-cells (DICEs) and three 2-input C-elements, is proposed. Then, to provide complete self-recovery from DNUs, the DUR-FF which mainly uses six interlocked DICEs is proposed. They have the following advantages: 1) They can completely protect against SNUs as well as DNUs; 2) the DUT-FF is cost-effective but the DUR-FF can provide complete self-recovery from any DNU. Simulations show the complete SNU/DNU tolerance of DUT-FF and the complete SNU/DNU self-recovery of DUR-FF but at the cost of indispensable area overhead when compared to the SNU hardened FFs. Besides, compared to the FFs of the same-type, the proposed FFs achieve a low delay making them suitable for high-performance applications.
互补金属氧化物半导体技术的不断进步使得触发器(FF)很容易受到软误差的影响。单节点中断(SNU)和双节点中断(DNU)是典型的软误差。本文提出了两种抗辐射的 FF 设计,即 DNU 耐受 FF(DUT-FF)和 DNU 可恢复 FF(DUR-FF)。首先,提出了主要由四个双互锁存储单元(DICE)和三个双输入 C 元件组成的 DUT-FF。然后,为了提供 DNU 的完全自我恢复,提出了主要使用六个互锁 DICE 的 DUR-FF。它们具有以下优点1) 它们可以完全防止 SNU 和 DNU;2) DUT-FF 具有成本效益,但 DUR-FF 可以从任何 DNU 中提供完全的自我恢复。仿真结果表明,DUT-FF 具有完全的 SNU/DNU 耐受能力,DUR-FF 具有完全的 SNU/DNU 自我恢复能力,但与 SNU 加固型 FF 相比,DUT-FF 要以不可或缺的面积开销为代价。此外,与同类 FF 相比,所提出的 FF 具有较低的延迟,适合高性能应用。
{"title":"Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications","authors":"Aibin Yan;Aoran Cao;Zhengfeng Huang;Jie Cui;Tianming Ni;Patrick Girard;Xiaoqing Wen;Jiliang Zhang","doi":"10.1109/TETC.2023.3317070","DOIUrl":"10.1109/TETC.2023.3317070","url":null,"abstract":"The continuous advancement of complementary metal-oxide-semiconductor technologies makes flip-flops (FFs) vulnerable to soft errors. Single-node upsets (SNUs), as well as double-node upsets (DNUs), are typical soft errors. This article proposes two radiation-hardened FF designs, namely DNU-tolerant FF (DUT-FF) and DNU-recoverable FF (DUR-FF). First, the DUT-FF which mainly consists of four dual-interlocked-storage-cells (DICEs) and three 2-input C-elements, is proposed. Then, to provide complete self-recovery from DNUs, the DUR-FF which mainly uses six interlocked DICEs is proposed. They have the following advantages: 1) They can completely protect against SNUs as well as DNUs; 2) the DUT-FF is cost-effective but the DUR-FF can provide complete self-recovery from any DNU. Simulations show the complete SNU/DNU tolerance of DUT-FF and the complete SNU/DNU self-recovery of DUR-FF but at the cost of indispensable area overhead when compared to the SNU hardened FFs. Besides, compared to the FFs of the same-type, the proposed FFs achieve a low delay making them suitable for high-performance applications.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"11 4","pages":"1070-1081"},"PeriodicalIF":5.9,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135699691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CiM-BNN:Computing-in-MRAM Architecture for Stochastic Computing Based Bayesian Neural Network 基于随机计算的贝叶斯神经网络的mram结构
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-25 DOI: 10.1109/TETC.2023.3317136
Huiyi Gu;Xiaotao Jia;Yuhao Liu;Jianlei Yang;Xueyan Wang;Youguang Zhang;Sorin Dan Cotofana;Weisheng Zhao
Bayesian neural network (BNN) has gradually attracted researchers’ attention with its uncertainty representation and high robustness. However, high computational complexity, large number of sampling operations, and the von-Neumann architecture make a great limitation for the further deployment of BNN on edge devices. In this article, a new computing-in-MRAM BNN architecture (CiM-BNN) is proposed for stochastic computing (SC)-based BNN to alleviate these problems. In SC domain, neural network parameters are represented in bitstream format. In order to leverage the characteristics of bitstreams, CiM-BNN redesigns the computing-in-memory architecture without complex peripheral circuit requirements and MRAM state flipping. Additionally, real-time Gaussian random number generators are designed using MRAM's stochastic property to further improve energy efficiency. Cadence Virtuoso is used to evaluate the proposed architecture. Simulation results show that energy consumption is reduced more than 93.6% with slight accuracy decrease compared to FPGA implementation with von-Neumann architecture in SC domain.
贝叶斯神经网络(BNN)以其不确定性表征和高鲁棒性逐渐受到研究人员的关注。然而,高计算复杂度、大量采样操作和冯-诺伊曼架构对BNN在边缘设备上的进一步部署造成了很大的限制。本文提出了一种新的基于随机计算(SC)的BNN结构(CiM-BNN)来解决这些问题。在SC域,神经网络参数以比特流的形式表示。为了利用比特流的特性,CiM-BNN重新设计了内存计算架构,没有复杂的外围电路要求和MRAM状态翻转。此外,利用MRAM的随机特性设计了实时高斯随机数生成器,进一步提高了能源效率。Cadence Virtuoso用于评估所提议的架构。仿真结果表明,在SC域,与采用冯-诺伊曼架构的FPGA实现相比,能耗降低了93.6%以上,精度略有下降。
{"title":"CiM-BNN:Computing-in-MRAM Architecture for Stochastic Computing Based Bayesian Neural Network","authors":"Huiyi Gu;Xiaotao Jia;Yuhao Liu;Jianlei Yang;Xueyan Wang;Youguang Zhang;Sorin Dan Cotofana;Weisheng Zhao","doi":"10.1109/TETC.2023.3317136","DOIUrl":"10.1109/TETC.2023.3317136","url":null,"abstract":"Bayesian neural network (BNN) has gradually attracted researchers’ attention with its uncertainty representation and high robustness. However, high computational complexity, large number of sampling operations, and the von-Neumann architecture make a great limitation for the further deployment of BNN on edge devices. In this article, a new computing-in-MRAM BNN architecture (CiM-BNN) is proposed for stochastic computing (SC)-based BNN to alleviate these problems. In SC domain, neural network parameters are represented in bitstream format. In order to leverage the characteristics of bitstreams, CiM-BNN redesigns the computing-in-memory architecture without complex peripheral circuit requirements and MRAM state flipping. Additionally, real-time Gaussian random number generators are designed using MRAM's stochastic property to further improve energy efficiency. Cadence Virtuoso is used to evaluate the proposed architecture. Simulation results show that energy consumption is reduced more than 93.6% with slight accuracy decrease compared to FPGA implementation with von-Neumann architecture in SC domain.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"980-990"},"PeriodicalIF":5.1,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135699678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks 表征学术协作网络的几何深度学习策略
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.1109/TETC.2023.3315954
Daniele Pretolesi;Davide Garbarino;Daniele Giampaoli;Andrea Vian;Annalisa Barla
This paper examines how geometric deep learning techniques may be employed to analyze academic collaboration networks (ACNs) and how using textual information drawn from publications improves the overall performance of the system. The proposed experimental pipeline was used to analyze the collaboration network of the Machine Learning Genoa Center (MaLGa) research group. First, we find the optimal method for embedding the input data graph and extracting meaningful keywords for the available publications. We then use Graph Neural Networks (GNN) for node type and research topic classification. Finally, we explore how the resulting corpus can be used to create a recommender system for optimal navigation of the ACN. Our results show that the GNN-based recommender system achieved high accuracy in suggesting unexplored nodes to users. Overall, this study demonstrates the potential for using geometric deep learning and Natural Language Processing (NLP) to best represent the scientific production of ACNs. In the future, we plan to incorporate the temporal nature of the data and navigation statistics of users exploring the graph as additional input for the recommender system.
本文探讨了如何利用几何深度学习技术来分析学术协作网络(ACN),以及利用从出版物中提取的文本信息如何提高系统的整体性能。提出的实验管道被用于分析热那亚机器学习中心(MaLGa)研究小组的协作网络。首先,我们找到了嵌入输入数据图并为可用出版物提取有意义关键词的最佳方法。然后,我们使用图神经网络(GNN)进行节点类型和研究主题分类。最后,我们探讨了如何利用由此产生的语料库创建一个推荐系统,以优化 ACN 的导航。我们的研究结果表明,基于 GNN 的推荐系统在向用户推荐未探索节点方面取得了很高的准确率。总之,这项研究展示了使用几何深度学习和自然语言处理(NLP)来最好地表现 ACN 的科学生产的潜力。未来,我们计划将数据的时间性和用户探索图的导航统计作为推荐系统的额外输入。
{"title":"Geometric Deep Learning Strategies for the Characterization of Academic Collaboration Networks","authors":"Daniele Pretolesi;Davide Garbarino;Daniele Giampaoli;Andrea Vian;Annalisa Barla","doi":"10.1109/TETC.2023.3315954","DOIUrl":"10.1109/TETC.2023.3315954","url":null,"abstract":"This paper examines how geometric deep learning techniques may be employed to analyze academic collaboration networks (ACNs) and how using textual information drawn from publications improves the overall performance of the system. The proposed experimental pipeline was used to analyze the collaboration network of the Machine Learning Genoa Center (MaLGa) research group. First, we find the optimal method for embedding the input data graph and extracting meaningful keywords for the available publications. We then use Graph Neural Networks (GNN) for node type and research topic classification. Finally, we explore how the resulting corpus can be used to create a recommender system for optimal navigation of the ACN. Our results show that the GNN-based recommender system achieved high accuracy in suggesting unexplored nodes to users. Overall, this study demonstrates the potential for using geometric deep learning and Natural Language Processing (NLP) to best represent the scientific production of ACNs. In the future, we plan to incorporate the temporal nature of the data and navigation statistics of users exploring the graph as additional input for the recommender system.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"840-851"},"PeriodicalIF":5.1,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135599193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning 通过符号学习评估突出物体检测的对抗性攻击
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.1109/TETC.2023.3316549
Gustavo Olague;Roberto Pineda;Gerardo Ibarra-Vazquez;Matthieu Olague;Axel Martinez;Sambit Bakshi;Jonathan Vargas;Isnardo Reducindo
Machine learning is at the center of mainstream technology and outperforms classical approaches to handcrafted feature design. Aside from its learning process for artificial feature extraction, it has an end-to-end paradigm from input to output, reaching outstandingly accurate results. However, security concerns about its robustness to malicious and imperceptible perturbations have drawn attention since its prediction can be changed entirely. Salient object detection is a research area where deep convolutional neural networks have proven effective but whose trustworthiness represents a significant issue requiring analysis and solutions to hackers’ attacks. Brain programming is a kind of symbolic learning in the vein of good old-fashioned artificial intelligence. This work provides evidence that symbolic learning robustness is crucial in designing reliable visual attention systems since it can withstand even the most intense perturbations. We test this evolutionary computation methodology against several adversarial attacks and noise perturbations using standard databases and a real-world problem of a shorebird called the Snowy Plover portraying a visual attention task. We compare our methodology with five different deep learning approaches, proving that they do not match the symbolic paradigm regarding robustness. All neural networks suffer significant performance losses, while brain programming stands its ground and remains unaffected. Also, by studying the Snowy Plover, we remark on the importance of security in surveillance activities regarding wildlife protection and conservation.
机器学习是主流技术的核心,它优于传统的手工特征设计方法。除了人工特征提取的学习过程外,机器学习还具有从输入到输出的端到端范式,可获得出色的精确结果。然而,由于它的预测可以完全改变,因此它对恶意和不易察觉的扰动的鲁棒性引起了安全方面的关注。突出物体检测是深度卷积神经网络已被证明有效的一个研究领域,但其可信度是一个重大问题,需要分析和解决黑客攻击。大脑编程是一种与传统人工智能一脉相承的符号学习。这项研究证明,符号学习的鲁棒性对设计可靠的视觉注意力系统至关重要,因为它甚至可以承受最强烈的干扰。我们使用标准数据库和现实世界中描绘视觉注意力任务的雪鸻岸鸟问题,测试了这种进化计算方法是否能抵御几种对抗性攻击和噪声扰动。我们将我们的方法与五种不同的深度学习方法进行了比较,证明它们在鲁棒性方面与符号范式并不匹配。所有神经网络的性能都有明显下降,而大脑编程却能站稳脚跟,不受影响。此外,通过研究雪鸻,我们还指出了野生动物保护和保育监控活动中安全的重要性。
{"title":"Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning","authors":"Gustavo Olague;Roberto Pineda;Gerardo Ibarra-Vazquez;Matthieu Olague;Axel Martinez;Sambit Bakshi;Jonathan Vargas;Isnardo Reducindo","doi":"10.1109/TETC.2023.3316549","DOIUrl":"10.1109/TETC.2023.3316549","url":null,"abstract":"Machine learning is at the center of mainstream technology and outperforms classical approaches to handcrafted feature design. Aside from its learning process for artificial feature extraction, it has an end-to-end paradigm from input to output, reaching outstandingly accurate results. However, security concerns about its robustness to malicious and imperceptible perturbations have drawn attention since its prediction can be changed entirely. Salient object detection is a research area where deep convolutional neural networks have proven effective but whose trustworthiness represents a significant issue requiring analysis and solutions to hackers’ attacks. Brain programming is a kind of symbolic learning in the vein of good old-fashioned artificial intelligence. This work provides evidence that symbolic learning robustness is crucial in designing reliable visual attention systems since it can withstand even the most intense perturbations. We test this evolutionary computation methodology against several adversarial attacks and noise perturbations using standard databases and a real-world problem of a shorebird called the Snowy Plover portraying a visual attention task. We compare our methodology with five different deep learning approaches, proving that they do not match the symbolic paradigm regarding robustness. All neural networks suffer significant performance losses, while brain programming stands its ground and remains unaffected. Also, by studying the Snowy Plover, we remark on the importance of security in surveillance activities regarding wildlife protection and conservation.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"11 4","pages":"1018-1030"},"PeriodicalIF":5.9,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135650408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Always on Voting: A Framework for Repetitive Voting on the Blockchain 永远投票:区块链上的重复投票框架
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.1109/TETC.2023.3315748
Sarad Venugopalan;Ivana Stančíková;Ivan Homoliak
Elections repeat commonly after a fixed time interval, ranging from months to years. This results in limitations on governance since elected candidates or policies are difficult to remove before the next elections, if needed, and allowed by the corresponding law. Participants may decide (through a public deliberation) to change their choices but have no opportunity to vote for these choices before the next elections. Another issue is the peak-end effect, where the judgment of voters is based on how they felt a short time before the elections. To address these issues, we propose Always on Voting (AoV) – a repetitive voting framework that allows participants to vote and change elected candidates or policies without waiting for the next elections. Participants are permitted to privately change their vote at any point in time, while the effect of their change is manifested at the end of each epoch, whose duration is shorter than the time between two main elections. To thwart the problem of peak-end effect in epochs, the ends of epochs are randomized and made unpredictable, while preserved within soft bounds. These goals are achieved using the synergy between a Bitcoin puzzle oracle, verifiable delay function, and smart contracts.
选举通常在固定的时间间隔后重复进行,间隔时间从数月到数年不等。这就造成了对治理的限制,因为当选的候选人或政策很难在下次选举前(如果需要)被撤换,而且相应的法律也允许这样做。参与者可以(通过公开讨论)决定改变他们的选择,但没有机会在下次选举前对这些选择进行投票。另一个问题是峰末效应,即选民的判断是基于选举前不久的感受。为了解决这些问题,我们提出了 "随时投票"(Always on Voting,AoV)--一种重复投票框架,允许参与者投票并改变当选的候选人或政策,而无需等待下一次选举。参与者可以在任何时间点私下更改投票,而更改的效果会在每个纪元结束时体现出来,每个纪元的持续时间比两次主要选举之间的时间短。为了避免历时峰值效应的问题,历时的结束时间是随机的,不可预测,同时保持在软约束范围内。这些目标是通过比特币谜题甲骨文、可验证延迟函数和智能合约之间的协同作用来实现的。
{"title":"Always on Voting: A Framework for Repetitive Voting on the Blockchain","authors":"Sarad Venugopalan;Ivana Stančíková;Ivan Homoliak","doi":"10.1109/TETC.2023.3315748","DOIUrl":"https://doi.org/10.1109/TETC.2023.3315748","url":null,"abstract":"Elections repeat commonly after a fixed time interval, ranging from months to years. This results in limitations on governance since elected candidates or policies are difficult to remove before the next elections, if needed, and allowed by the corresponding law. Participants may decide (through a public deliberation) to change their choices but have no opportunity to vote for these choices before the next elections. Another issue is the peak-end effect, where the judgment of voters is based on how they felt a short time before the elections. To address these issues, we propose Always on Voting (AoV) – a repetitive voting framework that allows participants to vote and change elected candidates or policies without waiting for the next elections. Participants are permitted to privately change their vote at any point in time, while the effect of their change is manifested at the end of each epoch, whose duration is shorter than the time between two main elections. To thwart the problem of peak-end effect in epochs, the ends of epochs are randomized and made unpredictable, while preserved within soft bounds. These goals are achieved using the synergy between a Bitcoin puzzle oracle, verifiable delay function, and smart contracts.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"11 4","pages":"1082-1092"},"PeriodicalIF":5.9,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138558040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks 针对尖峰神经网络的无 ADC 内存计算硬件的硬件/软件协同设计
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-22 DOI: 10.1109/TETC.2023.3316121
Marco Paul E. Apolinario;Adarsh Kumar Kosta;Utkarsh Saxena;Kaushik Roy
Spiking Neural Networks (SNNs) are bio-plausible models that hold great potential for realizing energy-efficient implementations of sequential tasks on resource-constrained edge devices. However, commercial edge platforms based on standard GPUs are not optimized to deploy SNNs, resulting in high energy and latency. While analog In-Memory Computing (IMC) platforms can serve as energy-efficient inference engines, they are accursed by the immense energy, latency, and area requirements of high-precision ADCs (HP-ADC), overshadowing the benefits of in-memory computations. We propose a hardware/software co-design methodology to deploy SNNs into an ADC-Less IMC architecture using sense-amplifiers as 1-bit ADCs replacing conventional HP-ADCs and alleviating the above issues. Our proposed framework incurs minimal accuracy degradation by performing hardware-aware training and is able to scale beyond simple image classification tasks to more complex sequential regression tasks. Experiments on complex tasks of optical flow estimation and gesture recognition show that progressively increasing the hardware awareness during SNN training allows the model to adapt and learn the errors due to the non-idealities associated with ADC-Less IMC. Also, the proposed ADC-Less IMC offers significant energy and latency improvements, $2-7times$ and $8.9-24.6times$, respectively, depending on the SNN model and the workload, compared to HP-ADC IMC.
尖峰神经网络(SNN)是一种生物仿真模型,在资源受限的边缘设备上实现高能效的连续任务实施方面具有巨大潜力。然而,基于标准 GPU 的商用边缘平台并未针对部署 SNN 进行优化,从而导致高能耗和高延迟。虽然模拟内存计算(IMC)平台可以作为高能效推理引擎,但高精度模数转换器(HP-ADC)对能耗、延迟和面积的要求使其不堪重负,从而掩盖了内存计算的优势。我们提出了一种硬件/软件协同设计方法,将 SNN 部署到无 ADC IMC 架构中,使用感测放大器作为 1 位 ADC,取代传统的 HP-ADC,从而缓解上述问题。我们提出的框架通过执行硬件感知训练,将准确性降低到最低程度,并且能够从简单的图像分类任务扩展到更复杂的连续回归任务。光流估计和手势识别等复杂任务的实验表明,在 SNN 训练过程中逐步提高硬件感知能力,可使模型适应并学习与无 ADC IMC 相关的非理想性所造成的错误。此外,与 HP-ADC IMC 相比,根据 SNN 模型和工作负载的不同,拟议的无 ADC IMC 能显著改善能耗和延迟,分别为 2-7 美元/次和 8.9-24.6 美元/次。
{"title":"Hardware/Software Co-Design With ADC-Less In-Memory Computing Hardware for Spiking Neural Networks","authors":"Marco Paul E. Apolinario;Adarsh Kumar Kosta;Utkarsh Saxena;Kaushik Roy","doi":"10.1109/TETC.2023.3316121","DOIUrl":"10.1109/TETC.2023.3316121","url":null,"abstract":"Spiking Neural Networks (SNNs) are bio-plausible models that hold great potential for realizing energy-efficient implementations of sequential tasks on resource-constrained edge devices. However, commercial edge platforms based on standard GPUs are not optimized to deploy SNNs, resulting in high energy and latency. While analog In-Memory Computing (IMC) platforms can serve as energy-efficient inference engines, they are accursed by the immense energy, latency, and area requirements of high-precision ADCs (HP-ADC), overshadowing the benefits of in-memory computations. We propose a hardware/software co-design methodology to deploy SNNs into an ADC-Less IMC architecture using sense-amplifiers as 1-bit ADCs replacing conventional HP-ADCs and alleviating the above issues. Our proposed framework incurs minimal accuracy degradation by performing hardware-aware training and is able to scale beyond simple image classification tasks to more complex sequential regression tasks. Experiments on complex tasks of optical flow estimation and gesture recognition show that progressively increasing the hardware awareness during SNN training allows the model to adapt and learn the errors due to the non-idealities associated with ADC-Less IMC. Also, the proposed ADC-Less IMC offers significant energy and latency improvements, \u0000<inline-formula><tex-math>$2-7times$</tex-math></inline-formula>\u0000 and \u0000<inline-formula><tex-math>$8.9-24.6times$</tex-math></inline-formula>\u0000, respectively, depending on the SNN model and the workload, compared to HP-ADC IMC.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 1","pages":"35-47"},"PeriodicalIF":5.9,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135599176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate MAC Unit Using Static Segmentation 近似MAC单位使用静态分割
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-20 DOI: 10.1109/TETC.2023.3315301
Gennaro Di Meo;Gerardo Saggese;Antonio G. M. Strollo;Davide De Caro
In this paper we investigate a novel approximate multiply-and-accumulate (MAC) unit, that computes Y = A × B + C using static segmentation. The proposed architecture uses a unique carry-propagate adder and performs segmentation on the three operands A, B, and C, to reduce hardware cost. The circuit can be configured at design-time by two parameters. The first one controls the segmentation on A and B, while the second one controls the segmentation on C and the adder length. An error compensation technique is also employed, to reduce the approximation error. Error analysis and implementation results in 28nm CMOS for 8-bits multiplier with 20-bits and 24-bits addition are presented. The proposed approximate MACs outperform the state of the art, showing the largest power saving when the mean relative error distance (MRED) is larger than 2 × 10−3 and 4 × 10−5 for 20 and 24-bits addition, respectively. For MRED of about 6 × 10−3 the proposed approximate MAC with 20-bits addition exhibits a power reduction larger than 60% compared to the exact MAC and larger than 27% compared to the state-of-the-art approximate MACs. Application examples to image filtering and template matching show that proposed approximate circuits are good candidates in applications where their error performances are acceptable.
本文研究了一种新的近似乘累加(MAC)单元,它使用静态分割计算Y = a × B + C。该架构采用唯一的进位传播加法器,并对a、B和C三个操作数进行分割,以降低硬件成本。电路可以在设计时通过两个参数进行配置。第一个控制A和B上的分割,第二个控制C上的分割和加法器长度。为了减小逼近误差,采用了误差补偿技术。给出了8位乘法器的误差分析和在28nm CMOS上的实现结果。所提出的近似mac性能优于目前的技术水平,当平均相对误差距离(MRED)分别大于2 × 10−3和4 × 10−5时,对20位和24位的加法显示最大的省电。对于MRED约为6 × 10−3的近似MAC,与精确MAC相比,所提出的带有20位加法的近似MAC的功耗降低大于60%,与最先进的近似MAC相比,功耗降低大于27%。在图像滤波和模板匹配中的应用实例表明,所提出的近似电路在误差性能可接受的情况下是很好的候选电路。
{"title":"Approximate MAC Unit Using Static Segmentation","authors":"Gennaro Di Meo;Gerardo Saggese;Antonio G. M. Strollo;Davide De Caro","doi":"10.1109/TETC.2023.3315301","DOIUrl":"10.1109/TETC.2023.3315301","url":null,"abstract":"In this paper we investigate a novel approximate multiply-and-accumulate (MAC) unit, that computes \u0000<italic>Y</i>\u0000 = \u0000<italic>A</i>\u0000 × \u0000<italic>B</i>\u0000 + \u0000<italic>C</i>\u0000 using static segmentation. The proposed architecture uses a unique carry-propagate adder and performs segmentation on the three operands \u0000<italic>A</i>\u0000, \u0000<italic>B</i>\u0000, and \u0000<italic>C</i>\u0000, to reduce hardware cost. The circuit can be configured at design-time by two parameters. The first one controls the segmentation on \u0000<italic>A</i>\u0000 and \u0000<italic>B</i>\u0000, while the second one controls the segmentation on \u0000<italic>C</i>\u0000 and the adder length. An error compensation technique is also employed, to reduce the approximation error. Error analysis and implementation results in 28nm CMOS for 8-bits multiplier with 20-bits and 24-bits addition are presented. The proposed approximate MACs outperform the state of the art, showing the largest power saving when the mean relative error distance (\u0000<italic>MRED</i>\u0000) is larger than 2 × 10\u0000<sup>−3</sup>\u0000 and 4 × 10\u0000<sup>−5</sup>\u0000 for 20 and 24-bits addition, respectively. For \u0000<italic>MRED</i>\u0000 of about 6 × 10\u0000<sup>−3</sup>\u0000 the proposed approximate MAC with 20-bits addition exhibits a power reduction larger than 60% compared to the exact MAC and larger than 27% compared to the state-of-the-art approximate MACs. Application examples to image filtering and template matching show that proposed approximate circuits are good candidates in applications where their error performances are acceptable.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"968-979"},"PeriodicalIF":5.1,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10258016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135555775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept Stability Entropy: A Novel Group Cohesion Measure in Social Networks 概念稳定性熵:社交网络中一种新的群体凝聚力测量方法
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-20 DOI: 10.1109/TETC.2023.3315335
Fei Hao;Jie Gao;Yaguang Lin;Yulei Wu;Jiaxing Shang
Group cohesion is regarded as a central group property across both social psychology and sociology. It facilities the understanding of the organizational behavior of users, and in turn guides the users to work well together in order to achieve goals within a social network. Therefore, group cohesion assessment is a crucial research issue for social network analysis. Group cohesion is often viewed as network density in the current state-of-the-art. Due to the advantages of characterizing the cohesion of a network with concept stability, this article presents a novel group cohesion measure, called concept stability entropy inspired by Shannon Entropy. Particularly, the scale of concept stability entropy is investigated. Considering the dynamic nature of social networks, an incremental algorithm for concept stability entropy computation is devised. In addition, we explore the correlation between concept stability entropy and other related metrics, i.e., network density, average degree, and average clustering coefficient. Extensive experimental results first validate that the concept stability entropy falls into the range of $[0, log(k)]$ ($k$ is the number of formal concepts), and then demonstrate that the concept stability entropy has a positive correlation with the average degree and a negative correlation with the network density and average clustering coefficient. Practically, a case study on the COVID-2019 virus network is conducted for illustrating the usefulness of our proposed group cohesion assessment approach.
在社会心理学和社会学中,群体凝聚力都被视为群体的核心属性。它有助于理解用户的组织行为,进而引导用户在社会网络中为实现目标而通力合作。因此,群体凝聚力评估是社会网络分析的一个重要研究课题。在当前最先进的技术中,群体凝聚力通常被视为网络密度。鉴于用概念稳定性来表征网络凝聚力的优势,本文受香农熵(Shannon Entropy)的启发,提出了一种新的群体凝聚力测量方法--概念稳定性熵。本文特别研究了概念稳定熵的尺度。考虑到社交网络的动态性质,我们设计了一种概念稳定熵计算的增量算法。此外,我们还探讨了概念稳定熵与其他相关指标(即网络密度、平均度和平均聚类系数)之间的相关性。大量实验结果首先验证了概念稳定熵的范围为 $[0,log(k)]$($k$ 为正式概念的个数),然后证明了概念稳定熵与平均度呈正相关,而与网络密度和平均聚类系数呈负相关。在实践中,我们对 COVID-2019 病毒网络进行了案例研究,以说明我们提出的群体凝聚力评估方法的实用性。
{"title":"Concept Stability Entropy: A Novel Group Cohesion Measure in Social Networks","authors":"Fei Hao;Jie Gao;Yaguang Lin;Yulei Wu;Jiaxing Shang","doi":"10.1109/TETC.2023.3315335","DOIUrl":"10.1109/TETC.2023.3315335","url":null,"abstract":"Group cohesion is regarded as a central group property across both social psychology and sociology. It facilities the understanding of the organizational behavior of users, and in turn guides the users to work well together in order to achieve goals within a social network. Therefore, group cohesion assessment is a crucial research issue for social network analysis. Group cohesion is often viewed as network density in the current state-of-the-art. Due to the advantages of characterizing the cohesion of a network with concept stability, this article presents a novel group cohesion measure, called concept stability entropy inspired by Shannon Entropy. Particularly, the scale of concept stability entropy is investigated. Considering the dynamic nature of social networks, an incremental algorithm for concept stability entropy computation is devised. In addition, we explore the correlation between concept stability entropy and other related metrics, i.e., network density, average degree, and average clustering coefficient. Extensive experimental results first validate that the concept stability entropy falls into the range of \u0000<inline-formula><tex-math>$[0, log(k)]$</tex-math></inline-formula>\u0000 (\u0000<inline-formula><tex-math>$k$</tex-math></inline-formula>\u0000 is the number of formal concepts), and then demonstrate that the concept stability entropy has a positive correlation with the average degree and a negative correlation with the network density and average clustering coefficient. Practically, a case study on the COVID-2019 virus network is conducted for illustrating the usefulness of our proposed group cohesion assessment approach.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 3","pages":"715-726"},"PeriodicalIF":5.1,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135556035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1