首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection 利用面部关系和特征聚合进行多人脸伪造检测
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-23 DOI: 10.1109/TIFS.2024.3461469
Chenhao Lin;Fangbin Yi;Hang Wang;Jingyi Deng;Zhengyu Zhao;Qian Li;Chao Shen
The emergence of advanced Deepfake technologies has gradually raised concerns in society, prompting significant attention to Deepfake detection. However, in real-world scenarios, Deepfakes often involve multiple faces. Despite this, most existing detection methods still detect these faces individually, overlooking the informative correlation between them and the relationship between the global information of the image and the local information of the faces. In this paper, we address this limitation by proposing FILTER, a novel framework for multi-face forgery detection that explicitly captures underlying correlations. FILTER consists of two main modules: Multi-face Relationship Learning (MRL) and Global Feature Aggregation (GFA). Specifically, MRL learns the correlation of local facial features in multi-face images, and GFA constructs the relationship between image-level labels and individual facial features to enhance performance from a global perspective. In particular, a contrastive learning loss function is used to better discriminate between real and fake faces. Extensive experiments on two publicly available multi-face forgery datasets demonstrate the state-of-the-art performance of FILTER in multi-face forgery detection. For example, on Openforensics Test-Challenge dataset, FILTER outperforms the previous state-of-the-art methods with a higher AUC score (0.980) and higher detection accuracy (92.04%).
先进的 "深度伪造 "技术的出现逐渐引起了社会的关注,促使人们开始重视 "深度伪造 "检测。然而,在现实场景中,Deepfake 往往涉及多张人脸。尽管如此,现有的大多数检测方法仍然是单独检测这些人脸,忽略了他们之间的信息关联性以及图像的全局信息与人脸的局部信息之间的关系。在本文中,我们针对这一局限性提出了 FILTER,这是一种用于多人脸伪造检测的新型框架,能明确捕捉潜在的相关性。FILTER 由两个主要模块组成:多人脸关系学习(MRL)和全局特征聚合(GFA)。具体来说,MRL 学习多面图像中局部面部特征的相关性,而 GFA 则构建图像级标签与单个面部特征之间的关系,以从全局角度提高性能。特别是,对比学习损失函数用于更好地区分真假人脸。在两个公开的多人脸伪造数据集上进行的大量实验证明,FILTER 在多人脸伪造检测方面具有一流的性能。例如,在 Openforensics Test-Challenge 数据集上,FILTER 以更高的 AUC 得分(0.980)和更高的检测准确率(92.04%)超越了之前的先进方法。
{"title":"Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection","authors":"Chenhao Lin;Fangbin Yi;Hang Wang;Jingyi Deng;Zhengyu Zhao;Qian Li;Chao Shen","doi":"10.1109/TIFS.2024.3461469","DOIUrl":"10.1109/TIFS.2024.3461469","url":null,"abstract":"The emergence of advanced Deepfake technologies has gradually raised concerns in society, prompting significant attention to Deepfake detection. However, in real-world scenarios, Deepfakes often involve multiple faces. Despite this, most existing detection methods still detect these faces individually, overlooking the informative correlation between them and the relationship between the global information of the image and the local information of the faces. In this paper, we address this limitation by proposing FILTER, a novel framework for multi-face forgery detection that explicitly captures underlying correlations. FILTER consists of two main modules: Multi-face Relationship Learning (MRL) and Global Feature Aggregation (GFA). Specifically, MRL learns the correlation of local facial features in multi-face images, and GFA constructs the relationship between image-level labels and individual facial features to enhance performance from a global perspective. In particular, a contrastive learning loss function is used to better discriminate between real and fake faces. Extensive experiments on two publicly available multi-face forgery datasets demonstrate the state-of-the-art performance of FILTER in multi-face forgery detection. For example, on Openforensics Test-Challenge dataset, FILTER outperforms the previous state-of-the-art methods with a higher AUC score (0.980) and higher detection accuracy (92.04%).","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"8832-8844"},"PeriodicalIF":6.3,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142313854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IFAST: Weakly Supervised Interpretable Face Anti-Spoofing From Single-Shot Binocular NIR Images IFAST:从单张双目近红外图像中提取弱监督可解释人脸反欺骗图像
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-23 DOI: 10.1109/TIFS.2024.3465930
Jiancheng Huang;Donghao Zhou;Jianzhuang Liu;Linxiao Shi;Shifeng Chen
Single-shot face anti-spoofing (FAS) is a key technique for securing face recognition systems, relying solely on static images as input. However, single-shot FAS remains a challenging and under-explored problem due to two reasons: 1) On the data side, learning FAS from RGB images is largely context-dependent, and single-shot images without additional annotations contain limited semantic information. 2) On the model side, existing single-shot FAS models struggle to provide proper evidence for their decisions, and FAS methods based on depth estimation require expensive per-pixel annotations. To address these issues, we construct and release a large binocular NIR image dataset named BNI-FAS, which contains more than 300,000 real face and plane attack images, and propose an Interpretable FAS Transformer (IFAST) that requires only weak supervision to produce interpretable predictions. Our IFAST generates pixel-wise disparity maps using the proposed disparity estimation Transformer with Dynamic Matching Attention (DMA) blocks. Besides, we design a confidence map generator to work in tandem with a dual-teacher distillation module to obtain the final discriminant results. Comprehensive experiments show that our IFAST achieves state-of-the-art performance on BNI-FAS, verifying its effectiveness of single-shot FAS on binocular NIR images. The project page is available at https://ifast-bni.github.io/.
单次人脸防欺骗(FAS)是确保人脸识别系统安全的一项关键技术,它完全依赖于静态图像作为输入。然而,由于以下两个原因,单镜头人脸防欺骗仍然是一个具有挑战性且未得到充分探索的问题:1) 在数据方面,从 RGB 图像学习 FAS 很大程度上取决于上下文,而没有额外注释的单张图像包含的语义信息有限。2) 在模型方面,现有的单张图像图像分析模型很难为其决策提供适当的证据,而基于深度估计的图像分析方法需要昂贵的每像素注释。为了解决这些问题,我们构建并发布了一个名为 BNI-FAS 的大型双目近红外图像数据集,其中包含 30 多万张真实的人脸和平面攻击图像,并提出了一种可解释的 FAS 变换器(IFAST),它只需要弱监督就能生成可解释的预测。我们的 IFAST 利用所提出的带有动态匹配注意(DMA)块的差异估计变换器生成像素级差异图。此外,我们还设计了一个置信度图生成器,与双教师提炼模块协同工作,以获得最终的判别结果。综合实验表明,我们的 IFAST 在 BNI-FAS 上达到了最先进的性能,验证了其在双目近红外图像上单次 FAS 的有效性。项目页面可在 https://ifast-bni.github.io/ 上查阅。
{"title":"IFAST: Weakly Supervised Interpretable Face Anti-Spoofing From Single-Shot Binocular NIR Images","authors":"Jiancheng Huang;Donghao Zhou;Jianzhuang Liu;Linxiao Shi;Shifeng Chen","doi":"10.1109/TIFS.2024.3465930","DOIUrl":"10.1109/TIFS.2024.3465930","url":null,"abstract":"Single-shot face anti-spoofing (FAS) is a key technique for securing face recognition systems, relying solely on static images as input. However, single-shot FAS remains a challenging and under-explored problem due to two reasons: 1) On the data side, learning FAS from RGB images is largely context-dependent, and single-shot images without additional annotations contain limited semantic information. 2) On the model side, existing single-shot FAS models struggle to provide proper evidence for their decisions, and FAS methods based on depth estimation require expensive per-pixel annotations. To address these issues, we construct and release a large binocular NIR image dataset named BNI-FAS, which contains more than 300,000 real face and plane attack images, and propose an Interpretable FAS Transformer (IFAST) that requires only weak supervision to produce interpretable predictions. Our IFAST generates pixel-wise disparity maps using the proposed disparity estimation Transformer with Dynamic Matching Attention (DMA) blocks. Besides, we design a confidence map generator to work in tandem with a dual-teacher distillation module to obtain the final discriminant results. Comprehensive experiments show that our IFAST achieves state-of-the-art performance on BNI-FAS, verifying its effectiveness of single-shot FAS on binocular NIR images. The project page is available at \u0000<uri>https://ifast-bni.github.io/</uri>\u0000.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9270-9284"},"PeriodicalIF":6.3,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142313836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BASUV: A Blockchain-Enabled UAV Authentication Scheme for Internet of Vehicles BASUV:为车联网设计的区块链无人机认证方案
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-23 DOI: 10.1109/TIFS.2024.3465847
Mingyue Xie;Zheng Chang;Hongwei Li;Geyong Min
Unmanned aerial vehicles (UAVs) have emerged as pivotal roles within internet of vehicles (IoV), serving as mobile base stations. However, while expanding coverage and improving mobility, the deployment of UAVs also poses a threat to the integrity and privacy of sensitive data due to open wireless communication channels in IoV. Therefore, preventing unauthorized access and data tampering is critically important between UAVs and vehicles. For the authenticity and legitimacy of the UAV certificate, existing authentication approaches may lead to significant challenges in key management overhead or dependence on a trusted third party. In this paper, a blockchain-based authentication scheme for UAV-assisted IoV system (BASUV) is proposed. This solution enables dependable UAV registration and authentication services, and permits the dynamic addition and removal. Specifically, blockchain is introduced to achieve the decentralized management and distributed trust of the UAV certificate ledger. Furthermore, to prevent information tampering and identity deception, we design CMPES, a novel combined scheme based on multiple public key generators (PKGs) for encryption and signature. Identical key pair in encryption and signature can reduce key generation and management overhead. The security and experimental analysis demonstrates the effectiveness and efficiency of the proposed scheme.
无人驾驶飞行器(UAV)作为移动基站,在车联网(IoV)中发挥着举足轻重的作用。然而,在扩大覆盖范围和提高移动性的同时,由于 IoV 中开放的无线通信信道,无人飞行器的部署也对敏感数据的完整性和隐私构成了威胁。因此,在无人机和车辆之间防止未经授权的访问和数据篡改至关重要。对于无人机证书的真实性和合法性,现有的认证方法可能会在密钥管理开销或对可信第三方的依赖方面带来巨大挑战。本文提出了一种基于区块链的无人机辅助物联网系统(BASUV)认证方案。该方案可实现可靠的无人机注册和认证服务,并允许动态添加和删除。具体而言,引入区块链可实现无人机证书账本的去中心化管理和分布式信任。此外,为防止信息篡改和身份欺骗,我们设计了 CMPES,一种基于多个公钥生成器(PKG)的加密和签名的新型组合方案。加密和签名中的相同密钥对可以减少密钥生成和管理开销。安全性和实验分析证明了所提方案的有效性和效率。
{"title":"BASUV: A Blockchain-Enabled UAV Authentication Scheme for Internet of Vehicles","authors":"Mingyue Xie;Zheng Chang;Hongwei Li;Geyong Min","doi":"10.1109/TIFS.2024.3465847","DOIUrl":"10.1109/TIFS.2024.3465847","url":null,"abstract":"Unmanned aerial vehicles (UAVs) have emerged as pivotal roles within internet of vehicles (IoV), serving as mobile base stations. However, while expanding coverage and improving mobility, the deployment of UAVs also poses a threat to the integrity and privacy of sensitive data due to open wireless communication channels in IoV. Therefore, preventing unauthorized access and data tampering is critically important between UAVs and vehicles. For the authenticity and legitimacy of the UAV certificate, existing authentication approaches may lead to significant challenges in key management overhead or dependence on a trusted third party. In this paper, a blockchain-based authentication scheme for UAV-assisted IoV system (BASUV) is proposed. This solution enables dependable UAV registration and authentication services, and permits the dynamic addition and removal. Specifically, blockchain is introduced to achieve the decentralized management and distributed trust of the UAV certificate ledger. Furthermore, to prevent information tampering and identity deception, we design CMPES, a novel combined scheme based on multiple public key generators (PKGs) for encryption and signature. Identical key pair in encryption and signature can reduce key generation and management overhead. The security and experimental analysis demonstrates the effectiveness and efficiency of the proposed scheme.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9055-9069"},"PeriodicalIF":6.3,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142313834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy 用于实时保护语音隐私的对抗性干扰预测
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-23 DOI: 10.1109/TIFS.2024.3463538
Zhaoyang Zhang;Shen Wang;Guopu Zhu;Dechen Zhan;Jiwu Huang
The widespread collection and analysis of private speech signals have become increasingly prevalent, raising significant privacy concerns. To protect speech signals from unauthorized analysis, adversarial attack methods for deceiving speaker recognition models have been proposed. While a few of these methods are specifically designed for real-time protection of speech signals, they introduce significant delays that can severely impact speech communication when applied to streaming speech data. In this paper, we present a novel approach that aims to offer real-time protection for speech signals without delays. By utilizing observed data only, we generate initial adversarial seed perturbations and refine them to obtain the necessary adversarial perturbations predicted for adjacent unobserved signals. This refinement process is conducted via a proposed model called PAPG. On the basis of perturbation prediction, we develop a streaming audio processing framework that generates perturbations in synchronization with the playback of the original signal, effectively eliminating delays. The experimental results demonstrate that under the proposed attack, the average Top-1 accuracy of various advanced speaker recognition methods is reduced by 89%, and the average equal error rate (EER) increases to 36%. Remarkably, these results are achieved without delays while maintaining superior perceptual quality.
对私人语音信号的广泛收集和分析已变得越来越普遍,这引起了人们对隐私的极大关注。为了保护语音信号免受未经授权的分析,人们提出了欺骗说话者识别模型的对抗性攻击方法。虽然其中有一些方法是专门为实时保护语音信号而设计的,但它们在应用于流式语音数据时会带来严重的延迟,从而严重影响语音通信。在本文中,我们提出了一种新方法,旨在为语音信号提供无延迟的实时保护。通过仅利用观测数据,我们生成了初始对抗种子扰动,并对其进行细化,以获得为相邻未观测信号预测的必要对抗扰动。这一细化过程是通过一个名为 PAPG 的模型进行的。在扰动预测的基础上,我们开发了一种流音频处理框架,它能在播放原始信号时同步生成扰动,从而有效消除延迟。实验结果表明,在所提出的攻击下,各种先进说话人识别方法的平均 Top-1 准确率降低了 89%,平均等错误率 (EER) 增加到 36%。值得注意的是,这些结果是在没有延迟的情况下实现的,同时还保持了卓越的感知质量。
{"title":"Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy","authors":"Zhaoyang Zhang;Shen Wang;Guopu Zhu;Dechen Zhan;Jiwu Huang","doi":"10.1109/TIFS.2024.3463538","DOIUrl":"10.1109/TIFS.2024.3463538","url":null,"abstract":"The widespread collection and analysis of private speech signals have become increasingly prevalent, raising significant privacy concerns. To protect speech signals from unauthorized analysis, adversarial attack methods for deceiving speaker recognition models have been proposed. While a few of these methods are specifically designed for real-time protection of speech signals, they introduce significant delays that can severely impact speech communication when applied to streaming speech data. In this paper, we present a novel approach that aims to offer real-time protection for speech signals without delays. By utilizing observed data only, we generate initial adversarial seed perturbations and refine them to obtain the necessary adversarial perturbations predicted for adjacent unobserved signals. This refinement process is conducted via a proposed model called PAPG. On the basis of perturbation prediction, we develop a streaming audio processing framework that generates perturbations in synchronization with the playback of the original signal, effectively eliminating delays. The experimental results demonstrate that under the proposed attack, the average Top-1 accuracy of various advanced speaker recognition methods is reduced by 89%, and the average equal error rate (EER) increases to 36%. Remarkably, these results are achieved without delays while maintaining superior perceptual quality.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"8701-8716"},"PeriodicalIF":6.3,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142313835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data 基于加密云数据的高效和隐私保护编码范围查询
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-23 DOI: 10.1109/TIFS.2024.3465928
Yanrong Liang;Jianfeng Ma;Yinbin Miao;Yuan Su;Robert H. Deng
Privacy-preserving range query, which allows the server to implement secure and efficient range query on encrypted data, has been widely studied in recent years. Existing privacy-preserving range query schemes can realize effective range query, but usually suffer from the low efficiency and security. In order to solve the above issues, we propose an Efficient and Privacy-preserving encode-based Range Query over encrypted cloud data (namely basic EPRQ), which encodes the data and range by using Range Encode (REncoder), and then encrypts the codes via Additional Symmetric-Key Hidden Vector Encryption (ASHVE) technology. The basic EPRQ can achieve effective range query while ensuring privacy protection. Then, we split the codes to reduce the storage cost. We further propose an improved scheme, EPRQ+, which constructs a binary tree-based index to achieve faster-than-linear retrieval. Finally, our formal security analysis proves that our schemes are secure against Indistinguishability under Chosen-Plaintext Attack (IND-CPA), and extensive experiments demonstrate that our schemes are feasible in practice, where EPRQ+ scheme improves the storage efficiency by about 4 times and the query efficiency by about 8 times compared to the basic EPRQ.
隐私保护范围查询允许服务器在加密数据上实现安全高效的范围查询,近年来已被广泛研究。现有的隐私保护范围查询方案可以实现有效的范围查询,但通常存在效率和安全性较低的问题。为了解决上述问题,我们提出了一种基于编码的加密云数据高效和隐私保护范围查询(即基本 EPRQ),它通过使用范围编码器(REncoder)对数据和范围进行编码,然后通过附加对称密钥隐藏矢量加密(ASHVE)技术对编码进行加密。基本的 EPRQ 可以实现有效的范围查询,同时确保隐私保护。然后,我们对代码进行拆分,以降低存储成本。我们进一步提出了一种改进方案--EPRQ+,它构建了一个基于二叉树的索引,以实现比线性检索更快的速度。最后,我们的形式安全性分析证明,我们的方案可以安全地抵御 "选择纯文本攻击"(IND-CPA),大量实验证明我们的方案在实践中是可行的,与基本 EPRQ 相比,EPRQ+ 方案的存储效率提高了约 4 倍,查询效率提高了约 8 倍。
{"title":"Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data","authors":"Yanrong Liang;Jianfeng Ma;Yinbin Miao;Yuan Su;Robert H. Deng","doi":"10.1109/TIFS.2024.3465928","DOIUrl":"10.1109/TIFS.2024.3465928","url":null,"abstract":"Privacy-preserving range query, which allows the server to implement secure and efficient range query on encrypted data, has been widely studied in recent years. Existing privacy-preserving range query schemes can realize effective range query, but usually suffer from the low efficiency and security. In order to solve the above issues, we propose an Efficient and Privacy-preserving encode-based Range Query over encrypted cloud data (namely basic EPRQ), which encodes the data and range by using Range Encode (REncoder), and then encrypts the codes via Additional Symmetric-Key Hidden Vector Encryption (ASHVE) technology. The basic EPRQ can achieve effective range query while ensuring privacy protection. Then, we split the codes to reduce the storage cost. We further propose an improved scheme, EPRQ+, which constructs a binary tree-based index to achieve faster-than-linear retrieval. Finally, our formal security analysis proves that our schemes are secure against Indistinguishability under Chosen-Plaintext Attack (IND-CPA), and extensive experiments demonstrate that our schemes are feasible in practice, where EPRQ+ scheme improves the storage efficiency by about 4 times and the query efficiency by about 8 times compared to the basic EPRQ.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9085-9099"},"PeriodicalIF":6.3,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142313833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables VR 设备充电背后的危险:通过充电电缆的隐藏侧通道攻击
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-20 DOI: 10.1109/TIFS.2024.3465026
Jiachun Li;Yan Meng;Yuxia Zhan;Le Zhang;Haojin Zhu
Virtual reality (VR), offering 3D visuals and stereophonic sounds, significantly enhances users’ immersive experiences and has become a milestone in the era of the metaverse. However, due to the limited battery capacity of VR devices, it is common for users to rely on charging cables, which serve the dual purpose of power supply and audio output, to recharge their VR devices while in use. In this study, we propose an inconspicuous and stealthy side channel attack, coined as LineTalker, which can unveil visual-related and audio-related activities from VR devices during the charging process. The insight behind LineTalker is rooted in the observation that visual-related activities (e.g., 3D image rendering) are power-intensive and result in fluctuations in the current strength of the cable’s power supply line, which can be leveraged as side channel information. Similarly, audio-related activities (e.g., playing music) leave traces on the cable’s audio output line. Rather than providing a user with a compromised charging cable (i.e., embedding a current sensor) to measure the current strength, to make the attack less conspicuous, LineTalker employs the Hall effect to indirectly access side channel information. This is achieved by capturing magnetic signals using a Hall sensor placed near the target cable in a contactless manner. Experimental results demonstrate that LineTalker achieves an overall accuracy of 94.60% and 64.38% in inferring user activities in VR devices with intrusive and non-intrusive attack manners, respectively.
虚拟现实(VR)提供三维视觉效果和立体声音效,极大地增强了用户的沉浸式体验,已成为元宇宙时代的一个里程碑。然而,由于 VR 设备的电池容量有限,用户在使用 VR 设备时通常需要依赖充电线缆为其充电,而充电线缆具有供电和音频输出的双重功能。在本研究中,我们提出了一种不显眼且隐蔽的侧信道攻击(称为 LineTalker),它可以揭示 VR 设备在充电过程中与视觉和音频相关的活动。LineTalker 背后的洞察力源于这样一种观察:与视觉相关的活动(如 3D 图像渲染)是耗电的,会导致电缆供电线路的电流强度波动,而这些波动可以作为侧信道信息加以利用。同样,与音频相关的活动(如播放音乐)也会在电缆的音频输出线路上留下痕迹。为了使攻击不那么显眼,LineTalker 没有向用户提供被破坏的充电线(即嵌入电流传感器)来测量电流强度,而是利用霍尔效应来间接获取侧信道信息。为此,LineTalker 采用了霍尔效应来间接获取侧信道信息,具体方法是利用放置在目标电缆附近的霍尔传感器,以非接触方式捕捉磁信号。实验结果表明,LineTalker 在以侵入式和非侵入式攻击方式推断 VR 设备中的用户活动时,总体准确率分别达到 94.60% 和 64.38%。
{"title":"Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables","authors":"Jiachun Li;Yan Meng;Yuxia Zhan;Le Zhang;Haojin Zhu","doi":"10.1109/TIFS.2024.3465026","DOIUrl":"10.1109/TIFS.2024.3465026","url":null,"abstract":"Virtual reality (VR), offering 3D visuals and stereophonic sounds, significantly enhances users’ immersive experiences and has become a milestone in the era of the metaverse. However, due to the limited battery capacity of VR devices, it is common for users to rely on charging cables, which serve the dual purpose of power supply and audio output, to recharge their VR devices while in use. In this study, we propose an inconspicuous and stealthy side channel attack, coined as LineTalker, which can unveil visual-related and audio-related activities from VR devices during the charging process. The insight behind LineTalker is rooted in the observation that visual-related activities (e.g., 3D image rendering) are power-intensive and result in fluctuations in the current strength of the cable’s power supply line, which can be leveraged as side channel information. Similarly, audio-related activities (e.g., playing music) leave traces on the cable’s audio output line. Rather than providing a user with a compromised charging cable (i.e., embedding a current sensor) to measure the current strength, to make the attack less conspicuous, LineTalker employs the Hall effect to indirectly access side channel information. This is achieved by capturing magnetic signals using a Hall sensor placed near the target cable in a contactless manner. Experimental results demonstrate that LineTalker achieves an overall accuracy of 94.60% and 64.38% in inferring user activities in VR devices with intrusive and non-intrusive attack manners, respectively.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"8892-8907"},"PeriodicalIF":6.3,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142275529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Adversarial Transferability via Logits Mixup With Dominant Decomposed Feature 通过具有优势分解特征的 Logits 混合来提高对抗性可转移性
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-20 DOI: 10.1109/TIFS.2024.3465212
Juanjuan Weng;Zhiming Luo;Shaozi Li;Dazhen Lin;Zhun Zhong
Recent research has shown that adversarial samples are highly transferable and can be used to attack other unknown black-box Deep Neural Networks (DNNs). To improve the transferability of adversarial samples, several feature-based adversarial attack methods have been proposed to disrupt neuron activation in the middle layers. However, current state-of-the-art feature-based attack methods typically require additional computation costs for estimating the importance of neurons. To address this challenge, we propose a Singular Value Decomposition (SVD)-based feature-level attack method. Our approach is inspired by the discovery that eigenvectors associated with the larger singular values decomposed from the middle layer features exhibit superior generalization and attention properties. Specifically, we conduct the attack by retaining the dominant decomposed feature that corresponds to the largest singular value (i.e., Rank-1 decomposed feature) for computing the output logits before the final softmax. These logits are later integrated with the original logits to optimize adversarial examples. Our extensive experimental results verify the effectiveness of our proposed method, which can be easily integrated into various baselines to significantly enhance the transferability of adversarial samples for disturbing normally trained CNNs and advanced defense strategies. The source code is available at Link.
最近的研究表明,对抗样本具有很强的可转移性,可用于攻击其他未知的黑盒深度神经网络(DNN)。为了提高对抗样本的可转移性,人们提出了几种基于特征的对抗攻击方法,以破坏中间层的神经元激活。然而,目前最先进的基于特征的攻击方法通常需要额外的计算成本来估计神经元的重要性。为了应对这一挑战,我们提出了一种基于奇异值分解(SVD)的特征层攻击方法。我们的方法受到了以下发现的启发:从中间层特征分解出的与较大奇异值相关的特征向量表现出卓越的泛化和注意力特性。具体来说,我们通过保留与最大奇异值相对应的主要分解特征(即 Rank-1 分解特征)来进行攻击,以便在最终软最大值之前计算输出对数。随后,这些对数将与原始对数进行整合,以优化对抗示例。我们的大量实验结果验证了我们提出的方法的有效性,该方法可轻松集成到各种基线中,从而显著提高对抗样本的可转移性,以干扰正常训练的 CNN 和高级防御策略。源代码请见链接。
{"title":"Boosting Adversarial Transferability via Logits Mixup With Dominant Decomposed Feature","authors":"Juanjuan Weng;Zhiming Luo;Shaozi Li;Dazhen Lin;Zhun Zhong","doi":"10.1109/TIFS.2024.3465212","DOIUrl":"10.1109/TIFS.2024.3465212","url":null,"abstract":"Recent research has shown that adversarial samples are highly transferable and can be used to attack other unknown black-box Deep Neural Networks (DNNs). To improve the transferability of adversarial samples, several feature-based adversarial attack methods have been proposed to disrupt neuron activation in the middle layers. However, current state-of-the-art feature-based attack methods typically require additional computation costs for estimating the importance of neurons. To address this challenge, we propose a Singular Value Decomposition (SVD)-based feature-level attack method. Our approach is inspired by the discovery that eigenvectors associated with the larger singular values decomposed from the middle layer features exhibit superior generalization and attention properties. Specifically, we conduct the attack by retaining the dominant decomposed feature that corresponds to the largest singular value (i.e., Rank-1 decomposed feature) for computing the output logits before the final softmax. These logits are later integrated with the original logits to optimize adversarial examples. Our extensive experimental results verify the effectiveness of our proposed method, which can be easily integrated into various baselines to significantly enhance the transferability of adversarial samples for disturbing normally trained CNNs and advanced defense strategies. The source code is available at Link.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"8939-8951"},"PeriodicalIF":6.3,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142275530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neighbor Consistency and Global-Local Interaction: A Novel Pseudo-Label Refinement Approach for Unsupervised Person Re-Identification 邻居一致性与全局-局部互动:用于无监督人员再识别的新型伪标签完善方法
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-20 DOI: 10.1109/TIFS.2024.3465037
De Cheng;Haichun Tai;Nannan Wang;Chaowei Fang;Xinbo Gao
Unsupervised person re-identification (ReID) aims at learning discriminative identity features for person retrieval without any annotations. Recent advances accomplish this task by leveraging clustering-based pseudo labels, but these pseudo labels are inevitably noisy, which deteriorates model performance. In this paper, we propose a Neighbour Consistency guided Pseudo Label Refinement (NCPLR) framework, which can be regarded as a transductive form of label propagation under the assumption that the prediction of each example should be similar to its nearest neighbours’. Specifically, the refined label for each training instance can be obtained from the original clustering result and a weighted ensemble of its neighbours’ predictions, with weights determined according to their similarities in the feature space. Furthermore, we also explore building a unified global-local NCPLR mechanism through a global-local label interaction module to achieve mutual label refinement. Such a strategy promotes efficient complementary learning while mitigating some unreliable information, finally improving the quality of the refined pseudo labels for each global-local region. Extensive experimental results demonstrate the effectiveness of the proposed method, showing superior performance to state-of-the-art methods by a large margin. Our source code is released in https://github.com/haichuntai/NCPLR-ReID.
无监督人员再识别(ReID)旨在学习辨别身份的特征,以便在没有任何注释的情况下进行人员检索。最近的进展是利用基于聚类的伪标签来完成这一任务,但这些伪标签不可避免地会产生噪声,从而降低模型性能。在本文中,我们提出了一种 "近邻一致性引导的伪标签提炼(NCPLR)"框架,它可以被视为一种标签传播的转导形式,其假设是每个实例的预测都应与其近邻的预测相似。具体来说,每个训练实例的精炼标签可以从原始聚类结果及其相邻预测的加权集合中获得,加权值根据它们在特征空间中的相似性确定。此外,我们还探索通过全局-本地标签交互模块建立统一的全局-本地 NCPLR 机制,以实现相互标签完善。这种策略既能促进高效的互补学习,又能减少一些不可靠的信息,最终提高每个全局-本地区域的精炼伪标签的质量。广泛的实验结果证明了所提方法的有效性,其性能远远优于最先进的方法。我们的源代码发布于 https://github.com/haichuntai/NCPLR-ReID。
{"title":"Neighbor Consistency and Global-Local Interaction: A Novel Pseudo-Label Refinement Approach for Unsupervised Person Re-Identification","authors":"De Cheng;Haichun Tai;Nannan Wang;Chaowei Fang;Xinbo Gao","doi":"10.1109/TIFS.2024.3465037","DOIUrl":"10.1109/TIFS.2024.3465037","url":null,"abstract":"Unsupervised person re-identification (ReID) aims at learning discriminative identity features for person retrieval without any annotations. Recent advances accomplish this task by leveraging clustering-based pseudo labels, but these pseudo labels are inevitably noisy, which deteriorates model performance. In this paper, we propose a Neighbour Consistency guided Pseudo Label Refinement (NCPLR) framework, which can be regarded as a transductive form of label propagation under the assumption that the prediction of each example should be similar to its nearest neighbours’. Specifically, the refined label for each training instance can be obtained from the original clustering result and a weighted ensemble of its neighbours’ predictions, with weights determined according to their similarities in the feature space. Furthermore, we also explore building a unified global-local NCPLR mechanism through a global-local label interaction module to achieve mutual label refinement. Such a strategy promotes efficient complementary learning while mitigating some unreliable information, finally improving the quality of the refined pseudo labels for each global-local region. Extensive experimental results demonstrate the effectiveness of the proposed method, showing superior performance to state-of-the-art methods by a large margin. Our source code is released in \u0000<uri>https://github.com/haichuntai/NCPLR-ReID</uri>\u0000.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9070-9084"},"PeriodicalIF":6.3,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142275548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Set Learning for RF-Based Drone Recognition via Signal Semantics 通过信号语义进行基于射频的无人机识别的开放集学习
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-20 DOI: 10.1109/TIFS.2024.3463535
Ningning Yu;Jiajun Wu;Chengwei Zhou;Zhiguo Shi;Jiming Chen
The abuse of drones has raised critical concerns about public security and personal privacy, bringing an urgent requirement for drone recognition. Existing radio frequency (RF)-based recognition methods follow the assumption of the closed set, resulting in the unknown signals being misclassified as known classes. To address this problem, we propose a Signal Semantic-based open Set Recognition (S3R) method in this paper. First, the short-time Fourier transform is introduced to construct the signal spectra, decoupling the drone signals with other interference signals. Then, we design a texture extractor and a position extractor to extract the texture features and position features from the spectra, respectively. The extracted features are further fused and structurally optimized to construct distinguishable signal semantics. Based on the structural characteristics of signal semantics, an outlier analysis-based semantic classifier is proposed, which searches the outliers of each known class in the closed set as the bounding thresholds to detect unknown instances. Finally, the detected unknown instances are further classified into their exact classes by implementing clustering in a new semantic space, where semantics are augmented by introducing basic features from the intermediate layers of the texture extractor. Besides, a real-world spectrogram dataset of commonly-used drones is released, which includes 24 classes and covers 7 brands. Extensive experiments demonstrate that the proposed S3R method outperforms the state-of-the-art methods in terms of accuracy and generalizability for both the closed set and the open set.
无人机的滥用引发了对公共安全和个人隐私的严重关切,从而对无人机识别提出了迫切要求。现有的基于射频(RF)的识别方法遵循封闭集假设,导致未知信号被误判为已知类。针对这一问题,我们在本文中提出了一种基于信号语义的开放集识别(S3R)方法。首先,引入短时傅里叶变换来构建信号频谱,将无人机信号与其他干扰信号解耦。然后,我们设计了纹理提取器和位置提取器,分别从频谱中提取纹理特征和位置特征。对提取的特征进行进一步融合和结构优化,以构建可区分的信号语义。根据信号语义的结构特征,提出了一种基于离群值分析的语义分类器,该分类器在闭合集合中搜索每个已知类别的离群值作为边界阈值来检测未知实例。最后,通过在新的语义空间中实施聚类,将检测到的未知实例进一步分类到其确切的类别中,其中语义是通过引入纹理提取器中间层的基本特征来增强的。此外,还发布了一个常用无人机的真实频谱图数据集,其中包括 24 个类别,涵盖 7 个品牌。广泛的实验证明,无论是在封闭集还是开放集上,所提出的 S3R 方法在准确性和普适性方面都优于最先进的方法。
{"title":"Open Set Learning for RF-Based Drone Recognition via Signal Semantics","authors":"Ningning Yu;Jiajun Wu;Chengwei Zhou;Zhiguo Shi;Jiming Chen","doi":"10.1109/TIFS.2024.3463535","DOIUrl":"10.1109/TIFS.2024.3463535","url":null,"abstract":"The abuse of drones has raised critical concerns about public security and personal privacy, bringing an urgent requirement for drone recognition. Existing radio frequency (RF)-based recognition methods follow the assumption of the closed set, resulting in the unknown signals being misclassified as known classes. To address this problem, we propose a Signal Semantic-based open Set Recognition (S3R) method in this paper. First, the short-time Fourier transform is introduced to construct the signal spectra, decoupling the drone signals with other interference signals. Then, we design a texture extractor and a position extractor to extract the texture features and position features from the spectra, respectively. The extracted features are further fused and structurally optimized to construct distinguishable signal semantics. Based on the structural characteristics of signal semantics, an outlier analysis-based semantic classifier is proposed, which searches the outliers of each known class in the closed set as the bounding thresholds to detect unknown instances. Finally, the detected unknown instances are further classified into their exact classes by implementing clustering in a new semantic space, where semantics are augmented by introducing basic features from the intermediate layers of the texture extractor. Besides, a real-world spectrogram dataset of commonly-used drones is released, which includes 24 classes and covers 7 brands. Extensive experiments demonstrate that the proposed S3R method outperforms the state-of-the-art methods in terms of accuracy and generalizability for both the closed set and the open set.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"9894-9909"},"PeriodicalIF":6.3,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142275533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption Themis:鲁棒性和轻客户端动态可搜索对称加密
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-19 DOI: 10.1109/TIFS.2024.3463971
Yubo Zheng;Peng Xu;Miao Wang;Wanying Xu;Wei Wang;Tianyang Chen;Hai Jin
Dynamic searchable symmetric encryption (DSSE), as one of the promising cryptographic tools in cloud-based services, faces two crying needs at the age of multi-device. One is a lightweight client, and the other is robustness. A lightweight client facilitates seamless synchronization among multiple devices allowing users to feel as if they are operating on a single device, even on resource-constrained devices. Robustness ensures a reliable system that can tolerate misoperations. DSSE requires both of them to achieve a leap in practicability. However, to our best knowledge, lightweight client and robustness have not been effectively combined thus far. Most existing DSSE schemes maintain a substantial amount of state information on the client for sub-linear search efficiency, but they fail to guarantee security even correctness, after executing the client’s misoperations (e.g., duplicate addition or deletion operation and deleting non-existent targets). The seminal work on robustness, ROSE (TIFS’22), leverages a heavy primitive to preserve security and correctness during post-processing and requires a heavy client storage burden. To guarantee robustness and constant client storage simultaneously, we devise a novel method to preserve robustness timely in the process of misoperations. Specifically, we introduce an alarm mechanism to promptly eliminate the effects of misoperations. Based on the misoperation alarm mechanism and the vORAM+HIRB oblivious map (S&P’16), we propose a new DSSE scheme Themis. In addition to satisfying robustness and constant client storage, it has competitive search and update performance compared to prior representative DSSE schemes. Moreover, it is superior to existing robust schemes in search.
动态可搜索对称加密(DSSE)作为云服务中前景广阔的加密工具之一,在多设备时代面临着两个迫切的需求。一个是轻量级客户端,另一个是稳健性。轻量级客户端可促进多设备之间的无缝同步,让用户感觉就像在单个设备上操作一样,即使在资源有限的设备上也是如此。鲁棒性则确保系统可靠,能够容忍误操作。DSSE 需要同时具备这两点,才能实现实用性的飞跃。然而,据我们所知,迄今为止,轻量级客户端和鲁棒性尚未有效地结合起来。大多数现有的 DSSE 方案都会在客户端保留大量状态信息,以提高亚线性搜索效率,但在执行客户端的错误操作(如重复添加或删除操作以及删除不存在的目标)后,它们甚至无法保证安全性和正确性。关于稳健性的开创性工作 ROSE(TIFS'22)利用了一个重型基元来保持后处理期间的安全性和正确性,并要求承担沉重的客户端存储负担。为了同时保证稳健性和恒定的客户端存储,我们设计了一种新方法,在误操作过程中及时保持稳健性。具体来说,我们引入了一种报警机制,以及时消除误操作的影响。基于误操作报警机制和 vORAM+HIRB 遗忘映射(S&P'16),我们提出了一种新的 DSSE 方案 Themis。除了满足鲁棒性和恒定客户端存储外,与之前的代表性 DSSE 方案相比,它还具有极具竞争力的搜索和更新性能。此外,它在搜索方面也优于现有的鲁棒方案。
{"title":"Themis: Robust and Light-Client Dynamic Searchable Symmetric Encryption","authors":"Yubo Zheng;Peng Xu;Miao Wang;Wanying Xu;Wei Wang;Tianyang Chen;Hai Jin","doi":"10.1109/TIFS.2024.3463971","DOIUrl":"10.1109/TIFS.2024.3463971","url":null,"abstract":"Dynamic searchable symmetric encryption (DSSE), as one of the promising cryptographic tools in cloud-based services, faces two crying needs at the age of multi-device. One is a lightweight client, and the other is robustness. A lightweight client facilitates seamless synchronization among multiple devices allowing users to feel as if they are operating on a single device, even on resource-constrained devices. Robustness ensures a reliable system that can tolerate misoperations. DSSE requires both of them to achieve a leap in practicability. However, to our best knowledge, lightweight client and robustness have not been effectively combined thus far. Most existing DSSE schemes maintain a substantial amount of state information on the client for sub-linear search efficiency, but they fail to guarantee security even correctness, after executing the client’s misoperations (e.g., duplicate addition or deletion operation and deleting non-existent targets). The seminal work on robustness, ROSE (TIFS’22), leverages a heavy primitive to preserve security and correctness during post-processing and requires a heavy client storage burden. To guarantee robustness and constant client storage simultaneously, we devise a novel method to preserve robustness timely in the process of misoperations. Specifically, we introduce an alarm mechanism to promptly eliminate the effects of misoperations. Based on the misoperation alarm mechanism and the \u0000<monospace>vORAM+HIRB</monospace>\u0000 oblivious map (S&P’16), we propose a new DSSE scheme \u0000<monospace>Themis</monospace>\u0000. In addition to satisfying robustness and constant client storage, it has competitive search and update performance compared to prior representative DSSE schemes. Moreover, it is superior to existing robust schemes in search.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 ","pages":"8802-8816"},"PeriodicalIF":6.3,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142275543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1