首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Event-Triggered Model-Free Adaptive Predictive Control for Networked Wind-Power Microgrids Subject to Aperiodic DoS Attacks 非周期性DoS攻击下的风电微电网自适应预测控制
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-27 DOI: 10.1109/tifs.2026.3657840
Rui Hou, Li Jia, Xuhui Bu, Jianfang Li
{"title":"Event-Triggered Model-Free Adaptive Predictive Control for Networked Wind-Power Microgrids Subject to Aperiodic DoS Attacks","authors":"Rui Hou, Li Jia, Xuhui Bu, Jianfang Li","doi":"10.1109/tifs.2026.3657840","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657840","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"295 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2026-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146056324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation 对话注入攻击:通过上下文操作破解llm
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-27 DOI: 10.1109/tifs.2026.3657898
Wenlong Meng, Fan Zhang, Wendao Yao, Zhenyuan Guo, Yuwei Li, Chengkun Wei, Wenzhi Chen
{"title":"Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation","authors":"Wenlong Meng, Fan Zhang, Wendao Yao, Zhenyuan Guo, Yuwei Li, Chengkun Wei, Wenzhi Chen","doi":"10.1109/tifs.2026.3657898","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657898","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"42 1","pages":"1-1"},"PeriodicalIF":6.8,"publicationDate":"2026-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146056323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustworthy Dataset Proof: Certifying the Authentic Use of Dataset in Training Models for Enhanced Trust 可信数据集证明:证明数据集在增强信任的训练模型中的真实使用
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-26 DOI: 10.1109/TIFS.2026.3657891
Zekun Sun;Liwei Liu;Zhe Li;Tianyu Wang;Zhihao Sui;Na Ruan;Conghui He;Dahua Lin;Jianhua Li
In the realm of deep learning, the veracity and integrity of the training data are pivotal for constructing reliable and transparent models. This study introduces the concept of Trustworthy Dataset Proof (TDP), which tackles the significant challenge of verifying the authenticity of training data as declared by trainers. Existing dataset provenance methods, which primarily aim at ownership verification rather than trust enhancement, often face challenges with usability and integrity. For instance, excessive operational demands and the inability to effectively verify dataset authenticity hinder their practical application. To address these shortcomings, we propose a novel technique termed Data Probe, which diverges from traditional watermarking by utilizing subtle variations in model output distributions to confirm the presence of a specific and small subset of training data. This model-agnostic approach improves usability by minimizing the intervention during the training process and ensures dataset integrity via a mechanism that only permits probe detection when the entire claimed dataset is utilized in training. Our study conducts extensive evaluations to demonstrate the effectiveness of the proposed data-probe-based TDP framework, marking a significant step toward achieving transparency and trustworthiness in the use of training data in deep learning.
在深度学习领域,训练数据的准确性和完整性对于构建可靠和透明的模型至关重要。本研究引入了可信数据集证明(TDP)的概念,该概念解决了验证训练者所声明的训练数据真实性的重大挑战。现有的数据集来源方法主要针对所有权验证而不是信任增强,经常面临可用性和完整性方面的挑战。例如,过度的操作需求和无法有效验证数据集真实性阻碍了它们的实际应用。为了解决这些缺点,我们提出了一种称为数据探测的新技术,它与传统的水印不同,它利用模型输出分布的细微变化来确认特定和小子集的训练数据的存在。这种与模型无关的方法通过最小化训练过程中的干预来提高可用性,并通过一种机制确保数据集的完整性,该机制仅允许在训练中使用整个声称的数据集时进行探针检测。我们的研究进行了广泛的评估,以证明所提出的基于数据探针的TDP框架的有效性,标志着在深度学习中使用训练数据实现透明度和可信度的重要一步。
{"title":"Trustworthy Dataset Proof: Certifying the Authentic Use of Dataset in Training Models for Enhanced Trust","authors":"Zekun Sun;Liwei Liu;Zhe Li;Tianyu Wang;Zhihao Sui;Na Ruan;Conghui He;Dahua Lin;Jianhua Li","doi":"10.1109/TIFS.2026.3657891","DOIUrl":"10.1109/TIFS.2026.3657891","url":null,"abstract":"In the realm of deep learning, the veracity and integrity of the training data are pivotal for constructing reliable and transparent models. This study introduces the concept of Trustworthy Dataset Proof (TDP), which tackles the significant challenge of verifying the authenticity of training data as declared by trainers. Existing dataset provenance methods, which primarily aim at ownership verification rather than trust enhancement, often face challenges with usability and integrity. For instance, excessive operational demands and the inability to effectively verify dataset authenticity hinder their practical application. To address these shortcomings, we propose a novel technique termed Data Probe, which diverges from traditional watermarking by utilizing subtle variations in model output distributions to confirm the presence of a specific and small subset of training data. This model-agnostic approach improves usability by minimizing the intervention during the training process and ensures dataset integrity via a mechanism that only permits probe detection when the entire claimed dataset is utilized in training. Our study conducts extensive evaluations to demonstrate the effectiveness of the proposed data-probe-based TDP framework, marking a significant step toward achieving transparency and trustworthiness in the use of training data in deep learning.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1902-1913"},"PeriodicalIF":8.0,"publicationDate":"2026-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146056326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Updatable PSI from Asymmetric PSI and PSU 从非对称PSI和PSU有效更新PSI
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/tifs.2026.3657051
Guowei Ling, Peng Tang, Shi-Feng Sun, Weidong Qiu
{"title":"Efficient Updatable PSI from Asymmetric PSI and PSU","authors":"Guowei Ling, Peng Tang, Shi-Feng Sun, Weidong Qiu","doi":"10.1109/tifs.2026.3657051","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657051","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"11226 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PQ-ABS: Post-Quantum Aggregate Blind Signature-Based Anonymous Authentication for Blockchain-Enabled IoMT PQ-ABS:基于后量子聚合盲签名的区块链IoMT匿名认证
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/TIFS.2026.3657031
Arman Ahmad;S. Jagatheswari
Blockchain-enabled Internet of Medical Things (BIoMT) systems require secure and anonymous authentication. However, existing mechanisms rely on classical cryptography, which becomes vulnerable to quantum attacks. This creates a critical need for post-quantum secure authentication that can preserve anonymity while remaining lightweight for large-scale deployments. To address this gap, we propose a module-lattice based Post-Quantum Aggregate Blind Signature (PQ-ABS) scheme that combines message blindness, signature aggregation, and Module-LWE hardness to achieve anonymous and quantum-resistant authentication. The scheme integrates with a lightweight blockchain architecture in which multiple signatures from distributed medical entities are aggregated into a single compact proof, significantly reducing verification overhead as the number of nodes increases. Formal analysis demonstrates resistance against correctness, unforgeability, blindness, unlinkability, and its resilience against quantum polynomial-time (QPT) adversaries under Module-SIS and Module-LWE assumptions. A full implementation on Hyperledger Fabric shows that, under growing network size, proposed PQ-ABS framework reduces verification latency by up to 71%, improves throughput by 62%, and maintains stable performance as the blockchain scales, confirming both its security and efficiency for real-time BIoMT environments.
支持区块链的医疗物联网(BIoMT)系统需要安全和匿名的身份验证。然而,现有的机制依赖于经典的密码学,这变得容易受到量子攻击。这就产生了对后量子安全身份验证的迫切需求,这种身份验证既可以保持匿名性,又可以在大规模部署中保持轻量级。为了解决这一差距,我们提出了一种基于模块-晶格的后量子聚合盲签名(PQ-ABS)方案,该方案结合了消息盲性、签名聚合和模块- lwe硬度来实现匿名和抗量子认证。该方案集成了一个轻量级的区块链架构,该架构将来自分布式医疗实体的多个签名聚合到一个紧凑的证明中,随着节点数量的增加,大大降低了验证开销。形式分析证明了在Module-SIS和Module-LWE假设下对正确性、不可伪造性、盲目性、不可链接性的抵抗,以及它对量子多项式时间(QPT)对手的弹性。在Hyperledger Fabric上的全面实现表明,在不断增长的网络规模下,PQ-ABS框架将验证延迟降低了71%,吞吐量提高了62%,并且随着区块链的扩展保持稳定的性能,验证了其在实时生物技术环境中的安全性和效率。
{"title":"PQ-ABS: Post-Quantum Aggregate Blind Signature-Based Anonymous Authentication for Blockchain-Enabled IoMT","authors":"Arman Ahmad;S. Jagatheswari","doi":"10.1109/TIFS.2026.3657031","DOIUrl":"10.1109/TIFS.2026.3657031","url":null,"abstract":"Blockchain-enabled Internet of Medical Things (BIoMT) systems require secure and anonymous authentication. However, existing mechanisms rely on classical cryptography, which becomes vulnerable to quantum attacks. This creates a critical need for post-quantum secure authentication that can preserve anonymity while remaining lightweight for large-scale deployments. To address this gap, we propose a module-lattice based Post-Quantum Aggregate Blind Signature (PQ-ABS) scheme that combines message blindness, signature aggregation, and Module-LWE hardness to achieve anonymous and quantum-resistant authentication. The scheme integrates with a lightweight blockchain architecture in which multiple signatures from distributed medical entities are aggregated into a single compact proof, significantly reducing verification overhead as the number of nodes increases. Formal analysis demonstrates resistance against correctness, unforgeability, blindness, unlinkability, and its resilience against quantum polynomial-time (QPT) adversaries under Module-SIS and Module-LWE assumptions. A full implementation on Hyperledger Fabric shows that, under growing network size, proposed PQ-ABS framework reduces verification latency by up to 71%, improves throughput by 62%, and maintains stable performance as the blockchain scales, confirming both its security and efficiency for real-time BIoMT environments.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1542-1551"},"PeriodicalIF":8.0,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAA: Toward Camouflaged and Transferable Adversarial Examples CAA:朝向伪装和可转移的对抗性例子
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/tifs.2026.3657036
Yipeng Zou, Qin Liu, Jie Wu, Tian Wang, Guo Chen, Tao Peng, Guojun Wang
{"title":"CAA: Toward Camouflaged and Transferable Adversarial Examples","authors":"Yipeng Zou, Qin Liu, Jie Wu, Tian Wang, Guo Chen, Tao Peng, Guojun Wang","doi":"10.1109/tifs.2026.3657036","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657036","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"50 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Revocable Conditional Anonymous Authentication with Verifiable Self-Generated Pseudonyms for VANETs 基于可验证自生成假名的高效可撤销条件匿名认证
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/tifs.2026.3657109
Shuqin Luo, Xuelin Cao, Xinghua Li, Zhe Ren, Yunwei Wang, Yinbin Miao
{"title":"Efficient Revocable Conditional Anonymous Authentication with Verifiable Self-Generated Pseudonyms for VANETs","authors":"Shuqin Luo, Xuelin Cao, Xinghua Li, Zhe Ren, Yunwei Wang, Yinbin Miao","doi":"10.1109/tifs.2026.3657109","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657109","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"287 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHANTOM: Power Hammering Attack and Countermeasure on Multi-Tenant ReRAM Compute-in-Memory Accelerators 幻影:多租户ReRAM内存计算加速器的功率锤击攻击与对策
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/tifs.2026.3657612
Ashish Reddy Bommana, Rajendra Bishnoi, Naghmeh Karimi, Farshad Firouzi, Krishnendu Chakrabarty
{"title":"PHANTOM: Power Hammering Attack and Countermeasure on Multi-Tenant ReRAM Compute-in-Memory Accelerators","authors":"Ashish Reddy Bommana, Rajendra Bishnoi, Naghmeh Karimi, Farshad Firouzi, Krishnendu Chakrabarty","doi":"10.1109/tifs.2026.3657612","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657612","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"57 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Region Feature Reformer with Semantic Preservation for Adversarial Malware Detection 基于语义保留的跨区域特征重构对抗性恶意软件检测
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1109/tifs.2026.3657117
Qian Li, Di Wu, Chenhao Lin, Shuai Liu, Cong Wang, Chao Shen
{"title":"Cross-Region Feature Reformer with Semantic Preservation for Adversarial Malware Detection","authors":"Qian Li, Di Wu, Chenhao Lin, Shuai Liu, Cong Wang, Chao Shen","doi":"10.1109/tifs.2026.3657117","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657117","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"40 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Axial-View-Oriented Contrastive Adversarial Training for Robust Point Cloud Recognition 面向轴向视角的鲁棒点云识别对比对抗训练
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657043
Jie Gui, Yu-Xin Zhang, Xiaofeng Cong, Baosheng Yu, Zhipeng Gui, Yuan Yan Tang, James Tin-Yau Kwok
{"title":"Axial-View-Oriented Contrastive Adversarial Training for Robust Point Cloud Recognition","authors":"Jie Gui, Yu-Xin Zhang, Xiaofeng Cong, Baosheng Yu, Zhipeng Gui, Yuan Yan Tang, James Tin-Yau Kwok","doi":"10.1109/tifs.2026.3657043","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657043","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"40 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1