首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Fine-Grained Domain Alignment for Face Anti-Spoofing With Asymmetric Pseudo-Labels 非对称伪标签人脸抗欺骗的细粒度域对齐
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/TIFS.2026.3657032
Jing Yang;Xusheng Cui;Yuehai Chen;Shaoyi Du;Badong Chen;Yuewen Liu
As face recognition systems become more prevalent and various presentation attacks continue to surface, the significance of face anti-spoofing (FAS) has escalated. In real-world scenarios, we can utilize the existing labeled sample sets, and we can also obtain a wide range of unlabeled face samples, which are the target samples that we need to classify. However, the existing cross-domain FAS methods do not fully utilize the target domain data. That is, they only align the overall distribution of features shared by the source and target domains, but cannot complete the alignment of live and spoof features relevant to classification within the source and target domains, resulting in not so good generalization performance in cross-domain scenarios, especially when the target domain is more complex compared to the source domain. To address this issue, we propose a novel domain adaptation approach called Fine-Grained Domain Alignment for Face Anti-Spoofing with Asymmetric Pseudo-Labels (FGDA-APL). In this approach, we initially employ traditional domain alignment methods to achieve preliminary domain alignment, which can be considered as coarse-grained domain alignment. Subsequently, we introduce the Multi-Graph Convolutional Network (MGCN) module, which is utilized to generate asymmetric feature spaces and facilitate cross-supervised pseudo-labels for asymmetric pseudo-labels utilization. Within the MGCN module, features extracted by the feature extractor are guided to achieve feature aggregation, resulting in multiple distinct feature spaces. We hypothesize that pseudo-labels with high confidence in these asymmetric feature spaces can be regarded as reliable pseudo-labels. By cross-supervising the pseudo-labels generated by both the classifier and the MGCN, we ultimately achieve alignment and classification of real and spoofing features within both the source and target domains. Consequently, we achieve superior classification performance on target domain data. Our proposed method has demonstrated state-of-the-art performance across multiple public datasets through extensive experiments.
随着人脸识别系统的日益普及和各种表示攻击的不断出现,人脸反欺骗(FAS)的重要性不断提升。在现实场景中,我们既可以利用已有的标记样本集,也可以得到大量未标记的人脸样本,这些样本就是我们需要分类的目标样本。然而,现有的跨域FAS方法并没有充分利用目标域的数据。也就是说,它们只对齐源域和目标域共享的特征的总体分布,而不能完成源域和目标域中与分类相关的活特征和欺骗特征的对齐,导致跨域场景下的泛化性能不太好,特别是当目标域比源域更复杂时。为了解决这个问题,我们提出了一种新的领域自适应方法,称为非对称伪标签面部抗欺骗的细粒度领域对齐(FGDA-APL)。在该方法中,我们首先采用传统的领域对齐方法来实现初步的领域对齐,这可以被认为是粗粒度的领域对齐。随后,我们引入了多图卷积网络(Multi-Graph Convolutional Network, MGCN)模块,利用该模块生成非对称特征空间,并为非对称伪标签的利用提供交叉监督伪标签。在MGCN模块中,引导特征提取器提取的特征进行特征聚合,形成多个不同的特征空间。我们假设在这些非对称特征空间中具有高置信度的伪标签可以视为可靠的伪标签。通过交叉监督由分类器和MGCN生成的伪标签,我们最终实现了源和目标域中真实特征和欺骗特征的对齐和分类。因此,我们在目标域数据上取得了优异的分类性能。通过广泛的实验,我们提出的方法在多个公共数据集上展示了最先进的性能。
{"title":"Fine-Grained Domain Alignment for Face Anti-Spoofing With Asymmetric Pseudo-Labels","authors":"Jing Yang;Xusheng Cui;Yuehai Chen;Shaoyi Du;Badong Chen;Yuewen Liu","doi":"10.1109/TIFS.2026.3657032","DOIUrl":"10.1109/TIFS.2026.3657032","url":null,"abstract":"As face recognition systems become more prevalent and various presentation attacks continue to surface, the significance of face anti-spoofing (FAS) has escalated. In real-world scenarios, we can utilize the existing labeled sample sets, and we can also obtain a wide range of unlabeled face samples, which are the target samples that we need to classify. However, the existing cross-domain FAS methods do not fully utilize the target domain data. That is, they only align the overall distribution of features shared by the source and target domains, but cannot complete the alignment of live and spoof features relevant to classification within the source and target domains, resulting in not so good generalization performance in cross-domain scenarios, especially when the target domain is more complex compared to the source domain. To address this issue, we propose a novel domain adaptation approach called Fine-Grained Domain Alignment for Face Anti-Spoofing with Asymmetric Pseudo-Labels (FGDA-APL). In this approach, we initially employ traditional domain alignment methods to achieve preliminary domain alignment, which can be considered as coarse-grained domain alignment. Subsequently, we introduce the Multi-Graph Convolutional Network (MGCN) module, which is utilized to generate asymmetric feature spaces and facilitate cross-supervised pseudo-labels for asymmetric pseudo-labels utilization. Within the MGCN module, features extracted by the feature extractor are guided to achieve feature aggregation, resulting in multiple distinct feature spaces. We hypothesize that pseudo-labels with high confidence in these asymmetric feature spaces can be regarded as reliable pseudo-labels. By cross-supervising the pseudo-labels generated by both the classifier and the MGCN, we ultimately achieve alignment and classification of real and spoofing features within both the source and target domains. Consequently, we achieve superior classification performance on target domain data. Our proposed method has demonstrated state-of-the-art performance across multiple public datasets through extensive experiments.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1973-1986"},"PeriodicalIF":8.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SALUS: Large-Scale Homomorphic Circuit Synthesis via Logic-Aware LUT Optimization 基于逻辑感知LUT优化的大规模同态电路合成
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/TIFS.2026.3657090
Ran Mao;Zhou Zhang;Zian Zhao;Zhenyu Guan;Peng Yin;Song Bian
Recently, growing interests are developed in optimizing fully homomorphic encryption (FHE) circuits to enable Boolean function evaluations over ciphertexts. While existing works utilize functional bootstrapping (FBS) to efficiently evaluate logic gates, the evaluation efficiency for large-scale circuits remains limited. Recent advances introduce a fast ciphertext conversion method, making it feasible to evaluate look-up tables (LUTs) over homomorphic multiplexer operation. In this work, we propose a new circuit synthesis framework, SALUS, which automatically generates and evaluates gate-level graphs over homomorphic LUTs given an input Boolean circuit. We apply the binary decision diagram (BDD) reordering method and multi-value refresh techniques to efficiently evaluate complex LUTs. Additionally, we propose a heuristic algorithm to merge LUTs in a given circuit into multi-output LUTs. In the experiments, we examine the efficiency of SALUS using a wide range of benchmark suites, including the EPFL and ISCAS benchmark circuits. We show that SALUS achieves a maximum reduction of up to $26times $ in computational latency compared to state-of-the-art homomorphic circuit synthesis method. Furthermore, we evaluate real-world applications, e.g., image filtering and matrix multiplication, and achieve an average speedup of $8.6times $ (with a maximum speedup of $24times $ ) compared to the FBS-based method.
近年来,人们对优化完全同态加密(FHE)电路以实现对密文的布尔函数求值越来越感兴趣。虽然现有的工作利用功能自举(FBS)来有效地评估逻辑门,但大规模电路的评估效率仍然有限。最近的进展引入了一种快速的密文转换方法,使得对同态多路复用器操作的查找表(lut)进行评估成为可能。在这项工作中,我们提出了一个新的电路合成框架,SALUS,它在给定输入布尔电路的同态lut上自动生成和评估门级图。我们应用二元决策图(BDD)重排序方法和多值刷新技术对复杂lut进行高效的评估。此外,我们提出了一种启发式算法,将给定电路中的lut合并为多输出lut。在实验中,我们使用广泛的基准套件来检查SALUS的效率,包括EPFL和ISCAS基准电路。我们表明,与最先进的同态电路合成方法相比,SALUS在计算延迟方面最大减少了26倍。此外,我们评估了现实世界的应用,例如图像滤波和矩阵乘法,与基于fbs的方法相比,实现了8.6倍的平均加速(最大加速为24倍)。
{"title":"SALUS: Large-Scale Homomorphic Circuit Synthesis via Logic-Aware LUT Optimization","authors":"Ran Mao;Zhou Zhang;Zian Zhao;Zhenyu Guan;Peng Yin;Song Bian","doi":"10.1109/TIFS.2026.3657090","DOIUrl":"10.1109/TIFS.2026.3657090","url":null,"abstract":"Recently, growing interests are developed in optimizing fully homomorphic encryption (FHE) circuits to enable Boolean function evaluations over ciphertexts. While existing works utilize functional bootstrapping (FBS) to efficiently evaluate logic gates, the evaluation efficiency for large-scale circuits remains limited. Recent advances introduce a fast ciphertext conversion method, making it feasible to evaluate look-up tables (LUTs) over homomorphic multiplexer operation. In this work, we propose a new circuit synthesis framework, SALUS, which automatically generates and evaluates gate-level graphs over homomorphic LUTs given an input Boolean circuit. We apply the binary decision diagram (BDD) reordering method and multi-value refresh techniques to efficiently evaluate complex LUTs. Additionally, we propose a heuristic algorithm to merge LUTs in a given circuit into multi-output LUTs. In the experiments, we examine the efficiency of SALUS using a wide range of benchmark suites, including the EPFL and ISCAS benchmark circuits. We show that SALUS achieves a maximum reduction of up to <inline-formula> <tex-math>$26times $ </tex-math></inline-formula> in computational latency compared to state-of-the-art homomorphic circuit synthesis method. Furthermore, we evaluate real-world applications, e.g., image filtering and matrix multiplication, and achieve an average speedup of <inline-formula> <tex-math>$8.6times $ </tex-math></inline-formula> (with a maximum speedup of <inline-formula> <tex-math>$24times $ </tex-math></inline-formula>) compared to the FBS-based method.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"2002-2016"},"PeriodicalIF":8.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Video Promotion Against Text-to-Video Retrieval 对抗性视频推广对抗文本到视频检索
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1109/tifs.2026.3657094
Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Li, Chao Shen
{"title":"Adversarial Video Promotion Against Text-to-Video Retrieval","authors":"Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Shuai Liu, Qian Li, Chao Shen","doi":"10.1109/tifs.2026.3657094","DOIUrl":"https://doi.org/10.1109/tifs.2026.3657094","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"57 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146043076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Transferable Anonymous Tokens with Decentralized Issuance by Blind Multisignatures 通过盲多重签名分散发行的不可转让匿名令牌
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3655949
Jingyuan Shen, Jianting Ning, Qi Feng, Debiao He, Xinyi Huang
{"title":"Non-Transferable Anonymous Tokens with Decentralized Issuance by Blind Multisignatures","authors":"Jingyuan Shen, Jianting Ning, Qi Feng, Debiao He, Xinyi Huang","doi":"10.1109/tifs.2026.3655949","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655949","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"30 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contextual Masking Distillation for Network Traffic Anomaly Detection 网络流量异常检测的上下文掩蔽蒸馏
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3655514
Xinglin Lian, Yu Zheng, Yan Liu, Fan Zhou, Chunlei Peng, Xinbo Gao
{"title":"Contextual Masking Distillation for Network Traffic Anomaly Detection","authors":"Xinglin Lian, Yu Zheng, Yan Liu, Fan Zhou, Chunlei Peng, Xinbo Gao","doi":"10.1109/tifs.2026.3655514","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655514","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"181 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LFS: A Locally Private Framework for Degree Statistic Estimation with Laplace Mechanism 基于拉普拉斯机制的度统计估计的局部私有框架
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3655155
Jiayu Li, Yuke Hu, Xiaoguang Li, Shiqi Zhou, Yuxiang Wang, Fenghua Li, Ben Niu
{"title":"LFS: A Locally Private Framework for Degree Statistic Estimation with Laplace Mechanism","authors":"Jiayu Li, Yuke Hu, Xiaoguang Li, Shiqi Zhou, Yuxiang Wang, Fenghua Li, Ben Niu","doi":"10.1109/tifs.2026.3655155","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655155","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"41 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EndPCA: Ensemble Defense with Provably Convergent Aggregation Against Poisoning Attacks in Federated Learning 基于可证明收敛聚合的联邦学习中毒攻击集成防御
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3655513
Mingyue Zhang, Chenyu Hu, Xuelian Cao, Atul Sajjanhar, Zheng Yang, Muneeb Ul Hassan, Zhi Jin, Jialong Li
{"title":"EndPCA: Ensemble Defense with Provably Convergent Aggregation Against Poisoning Attacks in Federated Learning","authors":"Mingyue Zhang, Chenyu Hu, Xuelian Cao, Atul Sajjanhar, Zheng Yang, Muneeb Ul Hassan, Zhi Jin, Jialong Li","doi":"10.1109/tifs.2026.3655513","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655513","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"28 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backdoor Detection in Federated Learning with Feature Map: A Multi-Task Learning Perspective 基于特征映射的联邦学习中的后门检测:多任务学习视角
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3655920
Yifan Sui, Yongqi Sun, Naiyue Chen, Yingying Zhao, Hongbo Cao, Baomin Xu
{"title":"Backdoor Detection in Federated Learning with Feature Map: A Multi-Task Learning Perspective","authors":"Yifan Sui, Yongqi Sun, Naiyue Chen, Yingying Zhao, Hongbo Cao, Baomin Xu","doi":"10.1109/tifs.2026.3655920","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655920","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"26 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bilevel Cyber-Induced Overloads Mechanism for False Data Injection Attacks Considering Post-Attack Economic Dispatch 考虑攻击后经济调度的虚假数据注入攻击双层网络过载机制
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3654445
Min Du, Xin Zhang, Jinning Zhang, Siqi Bu
{"title":"Bilevel Cyber-Induced Overloads Mechanism for False Data Injection Attacks Considering Post-Attack Economic Dispatch","authors":"Min Du, Xin Zhang, Jinning Zhang, Siqi Bu","doi":"10.1109/tifs.2026.3654445","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654445","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"61 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Domain Generalization via Prompt Learning and Aggregation 基于快速学习和聚合的联邦领域泛化
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-19 DOI: 10.1109/tifs.2026.3655520
Shuai Gong, Chaoran Cui, Chunyun Zhang, Wenna Wang, Xiushan Nie, Lei Zhu
{"title":"Federated Domain Generalization via Prompt Learning and Aggregation","authors":"Shuai Gong, Chaoran Cui, Chunyun Zhang, Wenna Wang, Xiushan Nie, Lei Zhu","doi":"10.1109/tifs.2026.3655520","DOIUrl":"https://doi.org/10.1109/tifs.2026.3655520","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"50 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146001315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1