首页 > 最新文献

IEEE Transactions on Sustainable Computing最新文献

英文 中文
Data Center Sustainability: Revisits and Outlooks 数据中心的可持续性:回顾与展望
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-31 DOI: 10.1109/TSUSC.2023.3281583
Zhiwei Cao;Xin Zhou;Xiangyu Wu;Zhaomeng Zhu;Tracy Liu;Jeffery Neng;Yonggang Wen
As energy-intensive entities, data centers are associated with significant environmental impacts, making their sustainability a subject of growing interest in recent years. In this article, we revisit data center sustainability and propose a forward-looking vision for improving data center sustainability. We argue that data center sustainability encompasses more than just energy efficiency and must be evaluated and optimized through a multi-faceted approach. To this end, we first present an overview of the sustainability metrics from five aspects. After that, we demonstrate the sustainability status of the latest data centers utilizing publicly available data center sustainability ratings. Furthermore, we examine the evolution of data center sustainability standards in Singapore to highlight several trending features. Based on the analysis, we identify several key elements of sustainable data centers. We then propose the Cognitive Digital Twin (CDT) architecture, which incorporates a digital twin engine for system-wide simulation and a decision engine for optimal control to improve data center sustainability. A case study is performed to optimize the chiller plant efficiency of a production data center in Singapore. The results demonstrate that the CDT can improve chiller plant energy efficiency by 5%, indicating around 140 metric tons of annual carbon emission savings.
作为能源密集型实体,数据中心对环境有重大影响,因此其可持续性近年来日益受到关注。在本文中,我们将重新审视数据中心的可持续发展,并提出改善数据中心可持续发展的前瞻性愿景。我们认为,数据中心的可持续发展不仅包括能源效率,还必须通过多方面的方法进行评估和优化。为此,我们首先从五个方面概述了可持续性指标。然后,我们利用公开的数据中心可持续发展评级来展示最新数据中心的可持续发展状况。此外,我们还研究了新加坡数据中心可持续发展标准的演变,以突出几个趋势特征。根据分析,我们确定了可持续数据中心的几个关键要素。然后,我们提出了认知数字孪生(CDT)架构,该架构集成了用于全系统仿真的数字孪生引擎和用于优化控制的决策引擎,以提高数据中心的可持续性。我们进行了一项案例研究,以优化新加坡一个生产数据中心的冷水机组效率。结果表明,CDT 可以将冷水机组的能效提高 5%,每年可减少碳排放约 140 公吨。
{"title":"Data Center Sustainability: Revisits and Outlooks","authors":"Zhiwei Cao;Xin Zhou;Xiangyu Wu;Zhaomeng Zhu;Tracy Liu;Jeffery Neng;Yonggang Wen","doi":"10.1109/TSUSC.2023.3281583","DOIUrl":"10.1109/TSUSC.2023.3281583","url":null,"abstract":"As energy-intensive entities, data centers are associated with significant environmental impacts, making their sustainability a subject of growing interest in recent years. In this article, we revisit data center sustainability and propose a forward-looking vision for improving data center sustainability. We argue that data center sustainability encompasses more than just energy efficiency and must be evaluated and optimized through a multi-faceted approach. To this end, we first present an overview of the sustainability metrics from five aspects. After that, we demonstrate the sustainability status of the latest data centers utilizing publicly available data center sustainability ratings. Furthermore, we examine the evolution of data center sustainability standards in Singapore to highlight several trending features. Based on the analysis, we identify several key elements of sustainable data centers. We then propose the Cognitive Digital Twin (CDT) architecture, which incorporates a digital twin engine for system-wide simulation and a decision engine for optimal control to improve data center sustainability. A case study is performed to optimize the chiller plant efficiency of a production data center in Singapore. The results demonstrate that the CDT can improve chiller plant energy efficiency by 5%, indicating around 140 metric tons of annual carbon emission savings.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"236-248"},"PeriodicalIF":3.9,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88809223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic-Preserving Adversarial Text Attacks 保留语义的对抗性文本攻击
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-31 DOI: 10.1109/TSUSC.2023.3263510
Xinghao Yang;Yongshun Gong;Weifeng Liu;James Bailey;Dacheng Tao;Wei Liu
Deep learning models are known immensely brittle to adversarial text examples. Existing text adversarial attack strategies can be roughly divided into character-level, word-level, and sentence-level attacks. Despite the success brought by recent text attack methods, how to induce misclassification with minimal text modifications while keeping the lexical correctness, syntactic soundness, and semantic consistency is still a challenge. In this paper, we devise a Bigram and Unigram-based adaptive Semantic Preservation Optimization (BU-SPO) approach which attacks text documents not only at a unigram word level but also at a bigram level to avoid generating meaningless sentences. We also present a hybrid attack strategy that collects substitution words from both synonyms and sememe candidates, to enrich the potential candidate set. Besides, a Semantic Preservation Optimization (SPO) method is devised to determine the word substitution priority and reduce the perturbation cost. Furthermore, we constrain the SPO with a semantic Filter (dubbed SPOF) to improve the semantic similarity. To estimate the effectiveness of our proposed methods, BU-SPO and BU-SPOF, we attack four victim deep learning models trained on three text datasets. Experimental results demonstrate that our approaches accomplish the highest semantics consistency and attack success rates by making minimal word modifications compared with competitive methods.
众所周知,深度学习模型在对抗性文本示例时非常脆弱。现有的文本对抗攻击策略大致可分为字符级攻击、词级攻击和句子级攻击。尽管最近的文本攻击方法取得了成功,但如何在保持词法正确性、句法合理性和语义一致性的同时,以最小的文本修改诱导误分类仍是一个挑战。在本文中,我们设计了一种基于大构词法和单构词法的自适应语义保存优化(BU-SPO)方法,该方法不仅能在单构词法层面攻击文本文档,还能在大构词法层面攻击文本文档,以避免生成无意义的句子。我们还提出了一种混合攻击策略,从同义词和词素候选词中收集替换词,以丰富潜在候选词集。此外,我们还设计了一种语义保存优化(SPO)方法来确定词语替换的优先级并降低扰动成本。此外,我们还使用语义过滤器(SPOF)对 SPO 进行约束,以提高语义相似性。为了评估我们提出的 BU-SPO 和 BU-SPOF 方法的有效性,我们攻击了在三个文本数据集上训练的四个受害者深度学习模型。实验结果表明,与其他竞争方法相比,我们的方法只需对单词进行最小程度的修改,就能实现最高的语义一致性和攻击成功率。
{"title":"Semantic-Preserving Adversarial Text Attacks","authors":"Xinghao Yang;Yongshun Gong;Weifeng Liu;James Bailey;Dacheng Tao;Wei Liu","doi":"10.1109/TSUSC.2023.3263510","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3263510","url":null,"abstract":"Deep learning models are known immensely brittle to adversarial text examples. Existing text adversarial attack strategies can be roughly divided into character-level, word-level, and sentence-level attacks. Despite the success brought by recent text attack methods, how to induce misclassification with minimal text modifications while keeping the lexical correctness, syntactic soundness, and semantic consistency is still a challenge. In this paper, we devise a Bigram and Unigram-based adaptive Semantic Preservation Optimization (BU-SPO) approach which attacks text documents not only at a unigram word level but also at a bigram level to avoid generating meaningless sentences. We also present a hybrid attack strategy that collects substitution words from both synonyms and sememe candidates, to enrich the potential candidate set. Besides, a Semantic Preservation Optimization (SPO) method is devised to determine the word substitution priority and reduce the perturbation cost. Furthermore, we constrain the SPO with a semantic Filter (dubbed SPOF) to improve the semantic similarity. To estimate the effectiveness of our proposed methods, BU-SPO and BU-SPOF, we attack four victim deep learning models trained on three text datasets. Experimental results demonstrate that our approaches accomplish the highest semantics consistency and attack success rates by making minimal word modifications compared with competitive methods.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 4","pages":"583-595"},"PeriodicalIF":3.9,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138558208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EAQ: Enabling Authenticated Complex Query Services in Sustainable-Storage Blockchain EAQ:在可持续存储区块链中实现经过身份验证的复杂查询服务
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-30 DOI: 10.1109/TSUSC.2023.3263232
Bo Yin;Weilong Zeng;Peng Zhang;Xuetao Wei
The data query service is urgently required in sustainable-storage blockchain, where full nodes store the entire transaction data while light nodes only store block headers. Queries invariably seek data with multiple attributes. However, no existing method provides a unified authenticated data structure (ADS) to support complex query operators (e.g., range queries and data object queries) on multiattribute blockchain data. In this paper, we propose a framework EAQ that effectively supports both fast data queries on multiple attributes and authentication of the query result. We propose a new ADS, called the MR$^{Bloom}$-tree, based on the Bloom filter (BF) and Merkle R-tree. We prove the decomposability of BFs, which enables the BF to be seamlessly incorporated with the Merkle R-tree. This ADS enables range-level search using multidimensional attribute ranges and object-level search using BFs. This ADS also supports querying and proving inexistent data objects. To reduce storage overhead, we improve the MR$^{Bloom}$-tree using the suppressed BF structure, which constructs only one BF independent of the number of attributes. To manage string attributes, we transform them into discrete numerical attributes using density-based clustering to represent similar items with close numerical values. Experiments show that the proposed framework achieves promising results.
可持续存储区块链迫切需要数据查询服务,全节点存储整个交易数据,而轻节点只存储块头。查询总是查找具有多个属性的数据。然而,没有现有的方法提供统一的认证数据结构(ADS)来支持多属性区块链数据上的复杂查询运算符(例如,范围查询和数据对象查询)。在本文中,我们提出了一个EAQ框架,该框架有效地支持对多个属性的快速数据查询和查询结果的身份验证。基于Bloom滤波器(BF)和Merkle R树,我们提出了一种新的ADS,称为MR$^{Bloom}$树。我们证明了BF的可分解性,这使得BF能够与Merkle R-树无缝结合。该ADS支持使用多维属性范围的范围级搜索和使用BF的对象级搜索。该ADS还支持查询和证明不存在的数据对象。为了减少存储开销,我们使用抑制BF结构改进了MR$^{Bloom}$树,该结构仅构造一个与属性数量无关的BF。为了管理字符串属性,我们使用基于密度的聚类将它们转换为离散的数字属性,以表示具有相近数值的相似项。实验表明,该框架取得了良好的效果。
{"title":"EAQ: Enabling Authenticated Complex Query Services in Sustainable-Storage Blockchain","authors":"Bo Yin;Weilong Zeng;Peng Zhang;Xuetao Wei","doi":"10.1109/TSUSC.2023.3263232","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3263232","url":null,"abstract":"The data query service is urgently required in sustainable-storage blockchain, where full nodes store the entire transaction data while light nodes only store block headers. Queries invariably seek data with multiple attributes. However, no existing method provides a unified authenticated data structure (ADS) to support complex query operators (e.g., range queries and data object queries) on multiattribute blockchain data. In this paper, we propose a framework EAQ that effectively supports both fast data queries on multiple attributes and authentication of the query result. We propose a new ADS, called the MR\u0000<inline-formula><tex-math>$^{Bloom}$</tex-math></inline-formula>\u0000-tree, based on the Bloom filter (BF) and Merkle R-tree. We prove the decomposability of BFs, which enables the BF to be seamlessly incorporated with the Merkle R-tree. This ADS enables range-level search using multidimensional attribute ranges and object-level search using BFs. This ADS also supports querying and proving inexistent data objects. To reduce storage overhead, we improve the MR\u0000<inline-formula><tex-math>$^{Bloom}$</tex-math></inline-formula>\u0000-tree using the suppressed BF structure, which constructs only one BF independent of the number of attributes. To manage string attributes, we transform them into discrete numerical attributes using density-based clustering to represent similar items with close numerical values. Experiments show that the proposed framework achieves promising results.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 3","pages":"435-447"},"PeriodicalIF":3.9,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50400595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Optimal Economic Sustainable Clean Energy Solution With Reduced Carbon Capturing/Carbon Utilization/ Carbon Footprint for Grid Integrated Hybrid System 一种有效的经济可持续的清洁能源解决方案,用于电网集成混合系统,减少碳捕获/碳利用/碳足迹
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-29 DOI: 10.1109/TSUSC.2023.3262982
Abhinav Saxena;Aseem Chandel;Amit Kumar Dash;Shailendra Kumar Gupta;Sampath Kumar V;J. P. Pandey
The integration of conventional sources with the grid has many challenges, like carbon emission, optimal cost of the system, and power quality issues. All these shortcomings create a non-sustainability in the environment, which is of great concern. In order to overcome such issues, a hybrid system is designed that is composed of various components or sources like wind energy, solar photovoltaic energy, thermal energy, and battery energy storage with the purpose of providing an environmentally friendly, economically viable, sustainable, and reliable solution. The objective is to reduce the carbon capture, carbon utilization, and carbon footprint. The carbon footprint is measured as the optimal difference between carbon capture (CC) and its utilization (CU), and carbon emission is represented as loss of carbon emission (LCE). Another objective is to reduce the optimal size of components, the distortion level, and the optimal cost in terms of loss of cost of energy (LCOE) for the various values of loss of power supply probability (LPSP). All the above objectives are accomplished by designing a nonlinear multi-objective problem. The designed nonlinear multi-objective function is based on a hybrid hysteresis fuzzy algorithm. The proposed algorithm is a combination of both fuzzy logic controllers and the hysteresis band method. The effectiveness of the proposed topology is tested on an IEEE standard 9 bus system. It is observed that a nonlinear hybrid hysteresis fuzzy algorithm provides a reliable and sustainable solution for optimal cost with a reduced effective carbon footprint and minimal distortion by maintaining the proper balance between carbon capturing and carbon utilization. The average values of LCOE,LCE, CU, and CC with the proposed method for various LPSP are found to be 0.5926 $/KWh, 70.64 g CO2/kWh, 89 g CO2/kWh, and 159 g CO2/kWh, which are the least among all methods.
传统电源与电网的集成面临许多挑战,如碳排放、系统的最佳成本和电能质量问题。所有这些缺点造成了环境的不可持续性,这引起了人们的极大关注。为了克服这些问题,设计了一种由风能、太阳能光伏、热能和电池储能等各种组件或来源组成的混合系统,目的是提供一种环境友好、经济可行、可持续和可靠的解决方案。目标是减少碳捕获、碳利用和碳足迹。碳足迹被测量为碳捕获(CC)和碳利用(CU)之间的最佳差异,碳排放被表示为碳排放损失(LCE)。另一个目标是针对不同的电源损耗概率(LPSP)值,降低组件的最佳尺寸、失真水平和能量损耗(LCOE)方面的最佳成本。所有上述目标都是通过设计一个非线性多目标问题来实现的。所设计的非线性多目标函数基于混合滞后模糊算法。所提出的算法是模糊逻辑控制器和滞后带方法的结合。所提出的拓扑结构的有效性在IEEE标准9总线系统上进行了测试。观察到,非线性混合滞后模糊算法通过保持碳捕获和碳利用之间的适当平衡,为优化成本提供了可靠和可持续的解决方案,同时减少了有效碳足迹,并将失真降至最低。对于各种LPSP,采用所提出的方法的LCOE、LCE、CU和CC的平均值分别为0.5926$/KWh、70.64 g CO2/KWh、89 g CO2/Wh和159 g CO2/kW,这是所有方法中最小的。
{"title":"An Effective Optimal Economic Sustainable Clean Energy Solution With Reduced Carbon Capturing/Carbon Utilization/ Carbon Footprint for Grid Integrated Hybrid System","authors":"Abhinav Saxena;Aseem Chandel;Amit Kumar Dash;Shailendra Kumar Gupta;Sampath Kumar V;J. P. Pandey","doi":"10.1109/TSUSC.2023.3262982","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3262982","url":null,"abstract":"The integration of conventional sources with the grid has many challenges, like carbon emission, optimal cost of the system, and power quality issues. All these shortcomings create a non-sustainability in the environment, which is of great concern. In order to overcome such issues, a hybrid system is designed that is composed of various components or sources like wind energy, solar photovoltaic energy, thermal energy, and battery energy storage with the purpose of providing an environmentally friendly, economically viable, sustainable, and reliable solution. The objective is to reduce the carbon capture, carbon utilization, and carbon footprint. The carbon footprint is measured as the optimal difference between carbon capture (CC) and its utilization (CU), and carbon emission is represented as loss of carbon emission (LCE). Another objective is to reduce the optimal size of components, the distortion level, and the optimal cost in terms of loss of cost of energy (LCOE) for the various values of loss of power supply probability (LPSP). All the above objectives are accomplished by designing a nonlinear multi-objective problem. The designed nonlinear multi-objective function is based on a hybrid hysteresis fuzzy algorithm. The proposed algorithm is a combination of both fuzzy logic controllers and the hysteresis band method. The effectiveness of the proposed topology is tested on an IEEE standard 9 bus system. It is observed that a nonlinear hybrid hysteresis fuzzy algorithm provides a reliable and sustainable solution for optimal cost with a reduced effective carbon footprint and minimal distortion by maintaining the proper balance between carbon capturing and carbon utilization. The average values of LCOE,LCE, CU, and CC with the proposed method for various LPSP are found to be 0.5926 $/KWh, 70.64 g CO2/kWh, 89 g CO2/kWh, and 159 g CO2/kWh, which are the least among all methods.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 3","pages":"385-399"},"PeriodicalIF":3.9,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50400596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependency-Aware Task Scheduling in TrustZone Empowered Edge Clouds for Makespan Minimization 基于TrustZone的边缘云中的依赖感知任务调度
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-29 DOI: 10.1109/TSUSC.2023.3278655
Yuepeng Li;Deze Zeng
Task offloading to edge servers has become a promising solution to tackle the computation resource poverty of the end devices. However, the zero-trust edge computing platform is highly challenged by the growing concern on security and privacy. Thus, Trust Execution Environment (TEE), like TrustZone, is advocated to empower edge clouds to enable secure task offloading. To explore TrustZone, the inevitable involvement of data encryption and decryption operations makes existing offloading strategies not applicable any more, especially when the task dependency is considered. In addition, TrustZone has distinguishable task scheduling paradigm as one CPU core does not allow multitask coexist at the same time. Taking the above issues into consideration, we investigate a dependency-aware task offloading problem for makespan minimization in TrustZone empowered edge clouds. By inventing an extended graph to describe the task execution process, we provide a formal statement to the problem and prove its NP-hardness. We then propose a Customized List Scheduling (CLS) based approximate algorithm and theoretically analyze its achievable performance. Extensive testbed based experiment results show that our approximation algorithm can effectively reduce the makespan and significantly outperforms existing state-of-the-art offloading approaches in TrustZone empowered edge clouds.
将任务卸载到边缘服务器已成为解决终端设备计算资源匮乏问题的一种很有前途的解决方案。然而,由于对安全和隐私的日益关注,零信任边缘计算平台受到了极大的挑战。因此,信任执行环境(TEE)与TrustZone一样,被提倡为边缘云提供功能,以实现安全的任务卸载。为了探索TrustZone,不可避免地涉及数据加密和解密操作,使得现有的卸载策略不再适用,尤其是在考虑任务依赖性时。此外,TrustZone具有可区分的任务调度模式,因为一个CPU核心不允许同时存在多任务。考虑到上述问题,我们研究了一个在TrustZone授权的边缘云中实现最大化的依赖感知任务卸载问题。通过发明一个扩展图来描述任务执行过程,我们为这个问题提供了一个形式化的陈述,并证明了它的NP硬度。然后,我们提出了一种基于定制列表调度(CLS)的近似算法,并从理论上分析了其可实现的性能。大量基于试验台的实验结果表明,我们的近似算法可以有效地缩短完工时间,并显著优于TrustZone授权边缘云中现有的最先进的卸载方法。
{"title":"Dependency-Aware Task Scheduling in TrustZone Empowered Edge Clouds for Makespan Minimization","authors":"Yuepeng Li;Deze Zeng","doi":"10.1109/TSUSC.2023.3278655","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3278655","url":null,"abstract":"Task offloading to edge servers has become a promising solution to tackle the computation resource poverty of the end devices. However, the zero-trust edge computing platform is highly challenged by the growing concern on security and privacy. Thus, Trust Execution Environment (TEE), like TrustZone, is advocated to empower edge clouds to enable secure task offloading. To explore TrustZone, the inevitable involvement of data encryption and decryption operations makes existing offloading strategies not applicable any more, especially when the task dependency is considered. In addition, TrustZone has distinguishable task scheduling paradigm as one CPU core does not allow multitask coexist at the same time. Taking the above issues into consideration, we investigate a dependency-aware task offloading problem for makespan minimization in TrustZone empowered edge clouds. By inventing an extended graph to describe the task execution process, we provide a formal statement to the problem and prove its NP-hardness. We then propose a Customized List Scheduling (CLS) based approximate algorithm and theoretically analyze its achievable performance. Extensive testbed based experiment results show that our approximation algorithm can effectively reduce the makespan and significantly outperforms existing state-of-the-art offloading approaches in TrustZone empowered edge clouds.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 3","pages":"423-434"},"PeriodicalIF":3.9,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50280161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Personalized Federated Learning for Internet of Medical Things 基于区块链的医疗物联网个性化联合学习
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-23 DOI: 10.1109/TSUSC.2023.3279111
Zhuotao Lian;Weizheng Wang;Zhaoyang Han;Chunhua Su
The rapid growth of artificial intelligence (AI), blockchain technology, and edge computing services have enabled the Internet of Medical Things (IoMT) to provide various healthcare services to patients, including neural network-based disease diagnosis, heart rate monitoring, and fall detection. Generally, end devices should transmit the collected patient data to a centralized server for further model training, but at the same time, the patient's privacy may be at risk. In addition, due to the diversity of patient conditions, a one-size-fits-all model cannot meet personalized healthcare needs. To address the above challenges, we propose a blockchain-based personalized federated learning (FL) system that enables clients to participate in personalized model training without directly uploading private data. We further realize the decentralized FL by combining blockchain technology, which improves the security level of the system. Finally, we verify the reliable performance of our system on different datasets through simulation experiments.
人工智能(AI)、区块链技术和边缘计算服务的快速发展使医疗物联网(IoMT)能够为患者提供各种医疗服务,包括基于神经网络的疾病诊断、心率监测和跌倒检测。一般来说,终端设备应将收集到的患者数据传输到集中式服务器以进一步训练模型,但与此同时,患者的隐私可能会受到威胁。此外,由于患者病情的多样性,"一刀切 "的模式无法满足个性化医疗需求。为了应对上述挑战,我们提出了一种基于区块链的个性化联合学习(FL)系统,使客户能够参与个性化模型训练,而无需直接上传私人数据。我们结合区块链技术进一步实现了去中心化的联合学习,从而提高了系统的安全级别。最后,我们通过模拟实验验证了系统在不同数据集上的可靠性能。
{"title":"Blockchain-Based Personalized Federated Learning for Internet of Medical Things","authors":"Zhuotao Lian;Weizheng Wang;Zhaoyang Han;Chunhua Su","doi":"10.1109/TSUSC.2023.3279111","DOIUrl":"10.1109/TSUSC.2023.3279111","url":null,"abstract":"The rapid growth of artificial intelligence (AI), blockchain technology, and edge computing services have enabled the Internet of Medical Things (IoMT) to provide various healthcare services to patients, including neural network-based disease diagnosis, heart rate monitoring, and fall detection. Generally, end devices should transmit the collected patient data to a centralized server for further model training, but at the same time, the patient's privacy may be at risk. In addition, due to the diversity of patient conditions, a one-size-fits-all model cannot meet personalized healthcare needs. To address the above challenges, we propose a blockchain-based personalized federated learning (FL) system that enables clients to participate in personalized model training without directly uploading private data. We further realize the decentralized FL by combining blockchain technology, which improves the security level of the system. Finally, we verify the reliable performance of our system on different datasets through simulation experiments.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 4","pages":"694-702"},"PeriodicalIF":3.9,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76181749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism 基于完全同构 CNN 模型的保护隐私的电力数据分类方案
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-22 DOI: 10.1109/TSUSC.2023.3278464
Zhuoqun Xia;Dan Yin;Ke Gu;Xiong Li
Data classification of users’ electricity consumption provides an in-depth analysis for users’ electricity consumption status, which plays a vital role in the management and distribution of electric energy. So, some data classification methods have been proposed to solve the classification problem of electricity consumption data. However, plaintext-based data classification may bring about the privacy leakage of electricity consumption data. In this paper, we propose a privacy-preserving classification scheme for electricity consumption data under fog computing-based smart metering system, which is based on convolutional neural network (CNN) model with fully homomorphic method (CKKS). The target of our proposed scheme is to solve the leakage problem of private electricity consumption data during the classification procedure. In our scheme, an improved K-means-based labeling algorithm is constructed to process historical electricity consumption data, which is used as the sample data to train the CNN classification model by cloud server. Also, the fog nodes are only permitted to obtain the related ciphertext parameters of the trained CNN model, and perform the classification of ciphertext-based electricity consumption data generated by fully homomorphic method. Based on the classical testing data, the experimental results show that our proposed classification scheme can provide the high classification accuracy of electricity data while protecting the privacy of electricity data.
用户用电数据分类可以深入分析用户的用电状况,对电能的管理和分配起着至关重要的作用。因此,人们提出了一些数据分类方法来解决用电数据的分类问题。然而,基于明文的数据分类可能会带来用电数据的隐私泄露。本文提出了一种基于雾计算的智能计量系统下的用电数据隐私保护分类方案,该方案基于卷积神经网络(CNN)模型和全同态方法(CKKS)。我们提出的方案旨在解决分类过程中私人用电数据的泄漏问题。在我们的方案中,构建了一种改进的基于 K-means 的标记算法来处理历史用电数据,并将其作为样本数据,由云服务器训练 CNN 分类模型。同时,雾节点只允许获取训练好的 CNN 模型的相关密文参数,并通过全同态方法对生成的基于密文的用电数据进行分类。基于经典测试数据的实验结果表明,我们提出的分类方案在保护用电数据隐私的同时,还能提供较高的用电数据分类精度。
{"title":"Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism","authors":"Zhuoqun Xia;Dan Yin;Ke Gu;Xiong Li","doi":"10.1109/TSUSC.2023.3278464","DOIUrl":"10.1109/TSUSC.2023.3278464","url":null,"abstract":"Data classification of users’ electricity consumption provides an in-depth analysis for users’ electricity consumption status, which plays a vital role in the management and distribution of electric energy. So, some data classification methods have been proposed to solve the classification problem of electricity consumption data. However, plaintext-based data classification may bring about the privacy leakage of electricity consumption data. In this paper, we propose a privacy-preserving classification scheme for electricity consumption data under fog computing-based smart metering system, which is based on convolutional neural network (CNN) model with fully homomorphic method (CKKS). The target of our proposed scheme is to solve the leakage problem of private electricity consumption data during the classification procedure. In our scheme, an improved K-means-based labeling algorithm is constructed to process historical electricity consumption data, which is used as the sample data to train the CNN classification model by cloud server. Also, the fog nodes are only permitted to obtain the related ciphertext parameters of the trained CNN model, and perform the classification of ciphertext-based electricity consumption data generated by fully homomorphic method. Based on the classical testing data, the experimental results show that our proposed classification scheme can provide the high classification accuracy of electricity data while protecting the privacy of electricity data.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 4","pages":"652-669"},"PeriodicalIF":3.9,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84551622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate Prediction of Workloads and Resources With Multi-Head Attention and Hybrid LSTM for Cloud Data Centers 基于多源注意力和混合LSTM的云数据中心工作量和资源的精确预测
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-20 DOI: 10.1109/TSUSC.2023.3259522
Jing Bi;Haisen Ma;Haitao Yuan;Jia Zhang
Currently, cloud computing service providers face big challenges in predicting large-scale workload and resource usage time series. Due to the difficulty in capturing nonlinear features, traditional forecasting methods usually fail to achieve high prediction performance for resource usage and workload sequences. Besides, there is much noise in original time series of resources and workloads. If these time series are not de-noised by smoothing algorithms, the prediction results can fail to meet the providers’ requirements. To do so, this work proposes a hybrid prediction model named VAMBiG that integrates Variational mode decomposition, an Adaptive Savitzky-Golay (SG) filter, a Multi-head attention mechanism, Bidirectional and Grid versions of Long and Short Term Memory (LSTM) networks. VAMBiG adopts a signal decomposition method named variational mode decomposition to decompose complex and non-linear original time series into low-frequency intrinsic mode functions. Then, it adopts an adaptive SG filter as a data pre-processing tool to eliminate noise and extreme points in such functions. Afterwards, it adopts bidirectional and grid LSTM networks to capture bidirectional features and dimension ones, respectively. Finally, it adopts a multi-head attention mechanism to explore importance of different data dimensions. VAMBiG aims to predict resource usage and workloads in highly variable traces in clouds. Extensive experimental results demonstrate that it achieves higher-accuracy prediction than several advanced prediction approaches with datasets from Google and Alibaba cluster traces.
目前,云计算服务提供商在预测大规模工作负载和资源使用时间序列方面面临巨大挑战。由于难以捕捉非线性特征,传统的预测方法通常无法实现对资源使用和工作负载序列的高预测性能。此外,在资源和工作负载的原始时间序列中存在大量噪声。如果这些时间序列没有通过平滑算法去噪,预测结果可能无法满足提供者的要求。为此,本文提出了一个名为VAMBiG的混合预测模型,该模型集成了变分模式分解、自适应Savitzky Golay(SG)滤波器、多头注意力机制、双向和网格版本的长短期记忆(LSTM)网络。VAMBiG采用变分模分解的信号分解方法,将复杂非线性的原始时间序列分解为低频本征模函数。然后,它采用自适应SG滤波器作为数据预处理工具,以消除此类函数中的噪声和极值点。然后,它采用双向和网格LSTM网络分别捕获双向特征和维度特征。最后,采用多头注意力机制来探究不同数据维度的重要性。VAMBiG旨在预测云中高度可变轨迹中的资源使用情况和工作负载。大量的实验结果表明,与谷歌和阿里巴巴聚类轨迹数据集的几种先进预测方法相比,该方法实现了更高的预测精度。
{"title":"Accurate Prediction of Workloads and Resources With Multi-Head Attention and Hybrid LSTM for Cloud Data Centers","authors":"Jing Bi;Haisen Ma;Haitao Yuan;Jia Zhang","doi":"10.1109/TSUSC.2023.3259522","DOIUrl":"https://doi.org/10.1109/TSUSC.2023.3259522","url":null,"abstract":"Currently, cloud computing service providers face big challenges in predicting large-scale workload and resource usage time series. Due to the difficulty in capturing nonlinear features, traditional forecasting methods usually fail to achieve high prediction performance for resource usage and workload sequences. Besides, there is much noise in original time series of resources and workloads. If these time series are not de-noised by smoothing algorithms, the prediction results can fail to meet the providers’ requirements. To do so, this work proposes a hybrid prediction model named VAMBiG that integrates \u0000<underline>V</u>\u0000ariational mode decomposition, an \u0000<underline>A</u>\u0000daptive Savitzky-Golay (SG) filter, a \u0000<underline>M</u>\u0000ulti-head attention mechanism, \u0000<underline>Bi</u>\u0000directional and \u0000<underline>G</u>\u0000rid versions of Long and Short Term Memory (LSTM) networks. VAMBiG adopts a signal decomposition method named variational mode decomposition to decompose complex and non-linear original time series into low-frequency intrinsic mode functions. Then, it adopts an adaptive SG filter as a data pre-processing tool to eliminate noise and extreme points in such functions. Afterwards, it adopts bidirectional and grid LSTM networks to capture bidirectional features and dimension ones, respectively. Finally, it adopts a multi-head attention mechanism to explore importance of different data dimensions. VAMBiG aims to predict resource usage and workloads in highly variable traces in clouds. Extensive experimental results demonstrate that it achieves higher-accuracy prediction than several advanced prediction approaches with datasets from Google and Alibaba cluster traces.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 3","pages":"375-384"},"PeriodicalIF":3.9,"publicationDate":"2023-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50280164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Interactive DSSE for Medical Data Sharing With Forward and Backward Privacy 用于医疗数据共享的非交互式前向和后向隐私 DSSE
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-19 DOI: 10.1109/TSUSC.2023.3277876
Hanqi Zhang;Chang Xu;Liehuang Zhu;Chuan Zhang;Rongxing Lu;Yunguo Guan;Kashif Sharif
In medical cloud computing, more medical data owners are preferred to outsource their sensitive data to the cloud after encryption. Meanwhile, dynamic searchable symmetric encryption (DSSE) provides the capability for data users to query over the dynamically-updated encrypted database. To reduce update leakage, a secure DSSE scheme usually requires forward and backward privacy. However, existing multi-client DSSE schemes with forward and backward privacy require the data owner to keep online to respond to per-query interaction from data users. To address this issue, we propose a multi-client non-interactive DSSE scheme with forward and backward privacy, namely MCNI. The core design of MCNI is leveraging time range queries to achieve non-interactive forward privacy since the past queries cannot be used to search the newly-added timestamps. To enable efficient time range queries, we convert the timestamp and time range into the boolean wildcard form and develop Boolean Wildcard Matching (BWM) algorithm that formulates the match as a dot product calculation problem. Finally, we combine the polynomial fitting technique, time range query, and random matrix multiplication technique to achieve efficient keyword searches without revealing sensitive information. Theoretical analysis and extensive experiments demonstrate the security and effectiveness of our proposed scheme, respectively.
在医疗云计算中,越来越多的医疗数据所有者倾向于将敏感数据加密后外包到云中。同时,动态可搜索对称加密(DSSE)为数据用户提供了查询动态更新加密数据库的能力。为了减少更新泄漏,安全的 DSSE 方案通常需要前向和后向隐私。然而,现有的具有前向和后向隐私的多客户端 DSSE 方案要求数据所有者保持在线,以响应数据用户的每次查询交互。为了解决这个问题,我们提出了一种具有前向和后向隐私的多客户端非交互式 DSSE 方案,即 MCNI。MCNI 的核心设计是利用时间范围查询来实现非交互式前向隐私,因为过去的查询不能用于搜索新添加的时间戳。为了实现高效的时间范围查询,我们将时间戳和时间范围转换成布尔通配符形式,并开发了布尔通配符匹配(BWM)算法,该算法将匹配问题表述为点乘计算问题。最后,我们将多项式拟合技术、时间范围查询和随机矩阵乘法技术相结合,在不泄露敏感信息的情况下实现了高效的关键词搜索。理论分析和大量实验分别证明了我们所提方案的安全性和有效性。
{"title":"Non-Interactive DSSE for Medical Data Sharing With Forward and Backward Privacy","authors":"Hanqi Zhang;Chang Xu;Liehuang Zhu;Chuan Zhang;Rongxing Lu;Yunguo Guan;Kashif Sharif","doi":"10.1109/TSUSC.2023.3277876","DOIUrl":"10.1109/TSUSC.2023.3277876","url":null,"abstract":"In medical cloud computing, more medical data owners are preferred to outsource their sensitive data to the cloud after encryption. Meanwhile, dynamic searchable symmetric encryption (DSSE) provides the capability for data users to query over the dynamically-updated encrypted database. To reduce update leakage, a secure DSSE scheme usually requires forward and backward privacy. However, existing multi-client DSSE schemes with forward and backward privacy require the data owner to keep online to respond to per-query interaction from data users. To address this issue, we propose a multi-client non-interactive DSSE scheme with forward and backward privacy, namely MCNI. The core design of MCNI is leveraging time range queries to achieve non-interactive forward privacy since the past queries cannot be used to search the newly-added timestamps. To enable efficient time range queries, we convert the timestamp and time range into the boolean wildcard form and develop Boolean Wildcard Matching (BWM) algorithm that formulates the match as a dot product calculation problem. Finally, we combine the polynomial fitting technique, time range query, and random matrix multiplication technique to achieve efficient keyword searches without revealing sensitive information. Theoretical analysis and extensive experiments demonstrate the security and effectiveness of our proposed scheme, respectively.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"8 4","pages":"682-693"},"PeriodicalIF":3.9,"publicationDate":"2023-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78460915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LPPCM: A Low-Cost Package Pickup Covering Mechanism for Cooperative Express Services LPPCM:合作快递服务的低成本包裹取件覆盖机制
IF 3.9 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-15 DOI: 10.1109/TSUSC.2023.3276206
Pengfei Sun;Leixiao Li;Jianxiong Wan
With the swift development of express delivery industry, the increasingly attention has been shifted to express delivery mechanism design. Generally, the revenue of the courier is the difference between the users’ express fee and the courier's pickup cost. In order to improve the revenue of courier without increasing the user's express fee, this paper presents a low-cost package pickup covering system to find an optimal Hamiltonian pickup tour for the courier over a subset of packages, where packages who are not on the tour should be covered exactly by one package on the tour. A billing rule discounting the express fee to incentivize users to deliver their packages is also proposed. We formulate Low-cost Package Pickup Covering (LPPC) problem to maximize the revenue of the courier. Considering the complexity of LPPC, we propose a Low-cost Package Pickup Covering Mechanism (LPPCM) to solve the LPPC problem including problem transformation, hardness analyzing, Attention Model based on Encoder-Decoder Architecture (AMEDA) model design and model training. AMEDA is trained by a deep reinforcement learning algorithm in an unsupervised manner and it can directly output the solution based on the given instances. Through extensive simulations, we demonstrate that the average revenue of courier for AMEDA is at least 10.1% higher than the traditional heuristic local search and is 18.5% lower than the optimal solution on average. AMEDA provides a desired trade-off between the execution time and solution quality, which is well suited for the large-scale tasks which require quick decisions.
随着快递业的迅速发展,人们越来越关注快递机制的设计。一般来说,快递员的收入是用户快递费与快递员取件成本之间的差额。为了在不增加用户快递费的情况下提高快递员的收入,本文提出了一种低成本包裹取件覆盖系统,为快递员在包裹子集上寻找一个最优哈密顿取件游程,其中不在游程上的包裹应正好被游程上的一个包裹覆盖。此外,我们还提出了快递费打折的计费规则,以激励用户投递包裹。我们提出了低成本包裹取件覆盖(LPPC)问题,以实现快递员收入的最大化。考虑到低成本包裹取件覆盖问题的复杂性,我们提出了一种低成本包裹取件覆盖机制(LPPCM)来解决低成本包裹取件覆盖问题,包括问题转换、硬度分析、基于编码器-解码器架构的注意力模型(AMEDA)模型设计和模型训练。AMEDA 采用深度强化学习算法进行无监督训练,可根据给定实例直接输出解。通过大量仿真,我们证明 AMEDA 的快递平均收入比传统启发式局部搜索至少高 10.1%,比最优解平均低 18.5%。AMEDA 在执行时间和解决方案质量之间实现了理想的权衡,非常适合需要快速决策的大规模任务。
{"title":"LPPCM: A Low-Cost Package Pickup Covering Mechanism for Cooperative Express Services","authors":"Pengfei Sun;Leixiao Li;Jianxiong Wan","doi":"10.1109/TSUSC.2023.3276206","DOIUrl":"10.1109/TSUSC.2023.3276206","url":null,"abstract":"With the swift development of express delivery industry, the increasingly attention has been shifted to express delivery mechanism design. Generally, the revenue of the courier is the difference between the users’ express fee and the courier's pickup cost. In order to improve the revenue of courier without increasing the user's express fee, this paper presents a low-cost package pickup covering system to find an optimal Hamiltonian pickup tour for the courier over a subset of packages, where packages who are not on the tour should be covered exactly by one package on the tour. A billing rule discounting the express fee to incentivize users to deliver their packages is also proposed. We formulate \u0000<italic>Low-cost Package Pickup Covering (LPPC)</i>\u0000 problem to maximize the revenue of the courier. Considering the complexity of \u0000<italic>LPPC</i>\u0000, we propose a \u0000<italic>Low-cost Package Pickup Covering Mechanism (LPPCM)</i>\u0000 to solve the \u0000<italic>LPPC</i>\u0000 problem including problem transformation, hardness analyzing, \u0000<italic>Attention Model based on Encoder-Decoder Architecture (AMEDA)</i>\u0000 model design and model training. \u0000<italic>AMEDA</i>\u0000 is trained by a deep reinforcement learning algorithm in an unsupervised manner and it can directly output the solution based on the given instances. Through extensive simulations, we demonstrate that the average revenue of courier for \u0000<italic>AMEDA</i>\u0000 is at least 10.1% higher than the traditional heuristic local search and is 18.5% lower than the optimal solution on average. \u0000<italic>AMEDA</i>\u0000 provides a desired trade-off between the execution time and solution quality, which is well suited for the large-scale tasks which require quick decisions.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 3","pages":"386-395"},"PeriodicalIF":3.9,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84759466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Sustainable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1