首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
Robust Image Hashing With Weighted Saliency Map and Laplacian Eigenmaps 加权显著映射和拉普拉斯特征映射的鲁棒图像哈希
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-16 DOI: 10.1109/TIFS.2024.3516552
Xiaoping Liang;Zhenjun Tang;Xianquan Zhang;Xinpeng Zhang;Ching-Nung Yang
Copy detection is crucial for protecting image copyright. This paper proposes a robust image hashing approach via Weighted Saliency Map (WSM) and Laplacian Eigenmaps (LE) (hereafter WSM-LE approach). An important contribution is the WSM construction via the edge map and the saliency map. As the WSM can indicate the interest regions of image, hash calculation based on WSM can provide robustness of our WSM-LE approach. Another contribution is the low-dimensional feature learning by the LE technique. As the LE technique can effectively learn the internal geometric relationships of image, the extracted low-dimensional features can improve discrimination of our WSM-LE approach. In addition, the low-dimensional features are treated as vectors and the vector distances are used to create a compact and encrypted hash. Numerous experiments and comparisons are conducted to confirm the effectiveness and superiority of our WSM-LE approach. The results indicate that our WSM-LE approach has excellent classification and copy detection performances than some baseline approaches.
拷贝检测是图像版权保护的关键。提出了一种基于加权显著性映射(WSM)和拉普拉斯特征映射(LE)的鲁棒图像哈希方法(以下简称WSM-LE方法)。一个重要的贡献是通过边缘图和显著性图构建WSM。由于WSM可以指示图像的兴趣区域,基于WSM的哈希计算可以提供我们的WSM- le方法的鲁棒性。另一个贡献是LE技术的低维特征学习。由于LE技术可以有效地学习图像的内部几何关系,提取的低维特征可以提高我们的WSM-LE方法的识别能力。此外,将低维特征视为向量,并使用向量距离创建紧凑和加密的哈希。大量的实验和比较证实了我们的WSM-LE方法的有效性和优越性。结果表明,我们的WSM-LE方法比一些基线方法具有更好的分类和副本检测性能。
{"title":"Robust Image Hashing With Weighted Saliency Map and Laplacian Eigenmaps","authors":"Xiaoping Liang;Zhenjun Tang;Xianquan Zhang;Xinpeng Zhang;Ching-Nung Yang","doi":"10.1109/TIFS.2024.3516552","DOIUrl":"10.1109/TIFS.2024.3516552","url":null,"abstract":"Copy detection is crucial for protecting image copyright. This paper proposes a robust image hashing approach via Weighted Saliency Map (WSM) and Laplacian Eigenmaps (LE) (hereafter WSM-LE approach). An important contribution is the WSM construction via the edge map and the saliency map. As the WSM can indicate the interest regions of image, hash calculation based on WSM can provide robustness of our WSM-LE approach. Another contribution is the low-dimensional feature learning by the LE technique. As the LE technique can effectively learn the internal geometric relationships of image, the extracted low-dimensional features can improve discrimination of our WSM-LE approach. In addition, the low-dimensional features are treated as vectors and the vector distances are used to create a compact and encrypted hash. Numerous experiments and comparisons are conducted to confirm the effectiveness and superiority of our WSM-LE approach. The results indicate that our WSM-LE approach has excellent classification and copy detection performances than some baseline approaches.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"665-676"},"PeriodicalIF":6.3,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10802924","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142832516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepReg: A Trustworthy and Privacy-Friendly Ownership Regulatory Framework for Deep Learning Models 深度学习模型的可信赖和隐私友好的所有权监管框架
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-16 DOI: 10.1109/TIFS.2024.3518061
Xirong Zhuang;Lan Zhang;Chen Tang;Yaliang Li
Well-trained deep learning (DL) models are widely recognized as valuable intellectual property (IP) and have been extensively adopted. However, concerns regarding IP infringement emerge when these models are either privately sold to end-users or publicly released online. Unauthorized activities, such as redistributing privately purchased models or exploiting restricted open-source models for commercial gain, pose a significant threat to the interests of model owners. In this paper, we introduce DeepReg, a trustworthy and privacy-friendly regulatory framework designed to address IP infringement within the realm of DL models, thereby nurturing a healthier development ecosystem. DeepReg enables a designated third-party regulator to extract the fingerprint of the original model within a Trusted Execution Environment, as well as to verify suspect models utilizing solely the predicted label without probability. Specifically, we leverage the uniqueness of feature extractors in DL models to craft multiple synthetic inputs for a selected real input. The real input, along with its synthetic inputs, establishes a one-to-many relationship, thereby creating a unique fingerprint for the original model. Furthermore, we propose two distinct methods for suspect detection and piracy judgment. These methods analyze the responses from the model API upon feeding the fingerprint, ensuring a high level of confidence while preventing malicious accusations. Experimental results demonstrate that DeepReg achieves 100% detection accuracy for pirated models, with zero false positives for irrelevant models.
训练有素的深度学习(DL)模型被广泛认为是有价值的知识产权(IP),并被广泛采用。然而,当这些模型私下出售给最终用户或在网上公开发布时,就会出现对知识产权侵权的担忧。未经授权的活动,例如重新分发私人购买的模型或利用受限制的开源模型来获取商业利益,对模型所有者的利益构成重大威胁。在本文中,我们介绍了DeepReg,这是一个值得信赖和隐私友好的监管框架,旨在解决深度学习模型领域内的知识产权侵权问题,从而培育一个更健康的发展生态系统。DeepReg使指定的第三方监管机构能够在可信执行环境中提取原始模型的指纹,并仅利用预测标签验证可疑模型,而无需概率。具体来说,我们利用深度学习模型中特征提取器的唯一性为选定的真实输入制作多个合成输入。真实输入及其合成输入建立了一对多关系,从而为原始模型创建了唯一的指纹。此外,我们提出了两种不同的嫌疑人检测和盗版判断方法。这些方法在输入指纹时分析来自模型API的响应,在确保高置信度的同时防止恶意指责。实验结果表明,DeepReg对盗版模型的检测准确率达到100%,对无关模型的误报为零。
{"title":"DeepReg: A Trustworthy and Privacy-Friendly Ownership Regulatory Framework for Deep Learning Models","authors":"Xirong Zhuang;Lan Zhang;Chen Tang;Yaliang Li","doi":"10.1109/TIFS.2024.3518061","DOIUrl":"10.1109/TIFS.2024.3518061","url":null,"abstract":"Well-trained deep learning (DL) models are widely recognized as valuable intellectual property (IP) and have been extensively adopted. However, concerns regarding IP infringement emerge when these models are either privately sold to end-users or publicly released online. Unauthorized activities, such as redistributing privately purchased models or exploiting restricted open-source models for commercial gain, pose a significant threat to the interests of model owners. In this paper, we introduce D\u0000<sc>eep</small>\u0000R\u0000<sc>eg</small>\u0000, a trustworthy and privacy-friendly regulatory framework designed to address IP infringement within the realm of DL models, thereby nurturing a healthier development ecosystem. D\u0000<sc>eep</small>\u0000R\u0000<sc>eg</small>\u0000 enables a designated third-party regulator to extract the fingerprint of the original model within a Trusted Execution Environment, as well as to verify suspect models utilizing solely the predicted label without probability. Specifically, we leverage the uniqueness of feature extractors in DL models to craft multiple synthetic inputs for a selected real input. The real input, along with its synthetic inputs, establishes a one-to-many relationship, thereby creating a unique fingerprint for the original model. Furthermore, we propose two distinct methods for suspect detection and piracy judgment. These methods analyze the responses from the model API upon feeding the fingerprint, ensuring a high level of confidence while preventing malicious accusations. Experimental results demonstrate that D\u0000<sc>eep</small>\u0000R\u0000<sc>eg</small>\u0000 achieves 100% detection accuracy for pirated models, with zero false positives for irrelevant models.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"854-870"},"PeriodicalIF":6.3,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142832518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration X-DFS:可解释人工智能引导的安全设计解决方案空间探索
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-13 DOI: 10.1109/TIFS.2024.3515855
Tanzim Mahfuz;Swarup Bhunia;Prabuddha Chakraborty
Design and manufacturing of integrated circuits predominantly use a globally distributed semiconductor supply chain involving diverse entities. The modern semiconductor supply chain has been designed to boost production efficiency, but is filled with major security concerns such as malicious modifications (hardware Trojans), reverse engineering (RE), and cloning. While being deployed, digital systems are also subject to a plethora of threats such as power, timing, and electromagnetic (EM) side channel attacks. Many Design-for-Security (DFS) solutions have been proposed to deal with these vulnerabilities, and such solutions (DFS) relays on strategic modifications (e.g., logic locking, side channel resilient masking, and dummy logic insertion) of the digital designs for ensuring a higher level of security. However, most of these DFS strategies lack robust formalism, are often not human-understandable, and require an extensive amount of human expert effort during their development/use. All of these factors make it difficult to keep up with the ever growing number of microelectronic vulnerabilities. In this work, we propose X-DFS, an explainable Artificial Intelligence (AI) guided DFS isolution-space exploration approach that can dramatically cut down the mitigation strategy development/use time while enriching our understanding of the vulnerability by providing human-understandable decision rationale. We implement X-DFS and comprehensively evaluate it for reverse engineering threats (SAIL, SWEEP, and OMLA) and formalize a generalized mechanism for applying X-DFS to defend against other threats such as hardware Trojans, fault attacks, and side channel attacks for seamless future extensions.
集成电路的设计和制造主要使用涉及不同实体的全球分布式半导体供应链。现代半导体供应链旨在提高生产效率,但却充满了恶意修改(硬件木马)、逆向工程(RE)和克隆等重大安全问题。在部署过程中,数字系统也会受到大量威胁,如电源、时序和电磁(EM)侧信道攻击。已经提出了许多安全设计(DFS)解决方案来处理这些漏洞,这些解决方案(DFS)依赖于数字设计的战略修改(例如,逻辑锁定,侧通道弹性屏蔽和虚拟逻辑插入),以确保更高级别的安全性。然而,大多数DFS策略缺乏健壮的形式化,通常不是人类可以理解的,并且在开发/使用过程中需要大量的人类专家的努力。所有这些因素使得我们很难跟上不断增长的微电子漏洞。在这项工作中,我们提出了X-DFS,这是一种可解释的人工智能(AI)指导的DFS隔离空间探索方法,可以大大减少缓解策略的开发/使用时间,同时通过提供人类可理解的决策原理丰富我们对脆弱性的理解。我们实现了X-DFS,并对其进行了逆向工程威胁(SAIL、SWEEP和OMLA)的全面评估,并形式化了一种通用机制,用于应用X-DFS防御其他威胁,如硬件木马、故障攻击和侧通道攻击,以实现未来的无缝扩展。
{"title":"X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration","authors":"Tanzim Mahfuz;Swarup Bhunia;Prabuddha Chakraborty","doi":"10.1109/TIFS.2024.3515855","DOIUrl":"10.1109/TIFS.2024.3515855","url":null,"abstract":"Design and manufacturing of integrated circuits predominantly use a globally distributed semiconductor supply chain involving diverse entities. The modern semiconductor supply chain has been designed to boost production efficiency, but is filled with major security concerns such as malicious modifications (hardware Trojans), reverse engineering (RE), and cloning. While being deployed, digital systems are also subject to a plethora of threats such as power, timing, and electromagnetic (EM) side channel attacks. Many Design-for-Security (DFS) solutions have been proposed to deal with these vulnerabilities, and such solutions (DFS) relays on strategic modifications (e.g., logic locking, side channel resilient masking, and dummy logic insertion) of the digital designs for ensuring a higher level of security. However, most of these DFS strategies lack robust formalism, are often not human-understandable, and require an extensive amount of human expert effort during their development/use. All of these factors make it difficult to keep up with the ever growing number of microelectronic vulnerabilities. In this work, we propose X-DFS, an explainable Artificial Intelligence (AI) guided DFS isolution-space exploration approach that can dramatically cut down the mitigation strategy development/use time while enriching our understanding of the vulnerability by providing human-understandable decision rationale. We implement X-DFS and comprehensively evaluate it for reverse engineering threats (SAIL, SWEEP, and OMLA) and formalize a generalized mechanism for applying X-DFS to defend against other threats such as hardware Trojans, fault attacks, and side channel attacks for seamless future extensions.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"753-766"},"PeriodicalIF":6.3,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142820922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion 博弈论奈曼-皮尔逊检测法对抗战略规避
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-13 DOI: 10.1109/TIFS.2024.3515834
Yinan Hu;Juntao Chen;Quanyan Zhu
The security in networked systems depends greatly on recognizing and identifying adversarial behaviors. Traditional detection methods target specific categories of attacks and have become inadequate against increasingly stealthy and deceptive attacks that are designed to bypass detection strategically. This work proposes game-theoretical frameworks to recognize and combat such evasive attacks. We focus on extending a fundamental class of statistical-based detection methods based on Neyman-Pearson’s (NP) hypothesis testing formulation. We capture the conflicting relationship between a strategic evasive attacker and an evasion-aware NP detector. By analyzing both the equilibrium behaviors of the attacker and the NP detector, we characterize their performance using Equilibrium Receiver-Operational-Characteristic (EROC) curves. We show that the evasion-aware NP detectors outperform the non-strategic ones by allowing them to take advantage of the attacker’s messages to adaptively modify their decision rules to enhance their success rate in detecting anomalies. In addition, we extend our framework to a sequential setting where the user sends out identically distributed messages. We corroborate the analytical results with a case study of an intrusion detection evasion problem.
网络系统的安全性在很大程度上取决于对敌对行为的识别和识别。传统的检测方法针对特定类别的攻击,并且已经不足以应对越来越多的隐形和欺骗性攻击,这些攻击旨在战略性地绕过检测。这项工作提出了博弈论框架来识别和打击这种逃避攻击。我们专注于扩展一类基于内曼-皮尔逊(NP)假设检验公式的基于统计的检测方法。我们捕获了策略规避攻击者和规避感知NP检测器之间的冲突关系。通过分析攻击者和NP检测器的平衡行为,我们使用平衡接受者-操作-特征(EROC)曲线来表征它们的性能。我们表明,逃避感知NP检测器通过允许它们利用攻击者的消息自适应地修改其决策规则以提高检测异常的成功率,从而优于非策略检测器。此外,我们将框架扩展到一个顺序设置,用户在其中发送相同分布的消息。我们用入侵检测逃避问题的案例研究证实了分析结果。
{"title":"Game-Theoretic Neyman-Pearson Detection to Combat Strategic Evasion","authors":"Yinan Hu;Juntao Chen;Quanyan Zhu","doi":"10.1109/TIFS.2024.3515834","DOIUrl":"10.1109/TIFS.2024.3515834","url":null,"abstract":"The security in networked systems depends greatly on recognizing and identifying adversarial behaviors. Traditional detection methods target specific categories of attacks and have become inadequate against increasingly stealthy and deceptive attacks that are designed to bypass detection strategically. This work proposes game-theoretical frameworks to recognize and combat such evasive attacks. We focus on extending a fundamental class of statistical-based detection methods based on Neyman-Pearson’s (NP) hypothesis testing formulation. We capture the conflicting relationship between a strategic evasive attacker and an evasion-aware NP detector. By analyzing both the equilibrium behaviors of the attacker and the NP detector, we characterize their performance using Equilibrium Receiver-Operational-Characteristic (EROC) curves. We show that the evasion-aware NP detectors outperform the non-strategic ones by allowing them to take advantage of the attacker’s messages to adaptively modify their decision rules to enhance their success rate in detecting anomalies. In addition, we extend our framework to a sequential setting where the user sends out identically distributed messages. We corroborate the analytical results with a case study of an intrusion detection evasion problem.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"516-530"},"PeriodicalIF":6.3,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142820923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accountable Decryption Made Formal and Practical 形式化和实用化的可问责解密
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-13 DOI: 10.1109/TIFS.2024.3515808
Rujia Li;Yuanzhao Li;Qin Wang;Sisi Duan;Qi Wang;Mark Ryan
With the increasing scale and complexity of online activities, accountability, as an after-the-fact mechanism, has become an effective complementary approach to ensure system security. Decades of research have delved into the connotation of accountability. They fail, however, to achieve practical accountability of decryption. This paper seeks to address this gap. We consider the scenario where a client (called encryptor, her) encrypts her data and then chooses a delegate (a.k.a. decryptor, him) that stores data for her. If the decryptor initiates an illegitimate decryption on the encrypted data, there is a non-negligible probability that this behavior will be detected, thereby holding the decryptor accountable for his decryption. We make three contributions. First, we review key definitions of accountability known so far. Based on extensive investigations, we formalize new definitions of accountability specifically targeting the decryption process, denoted as accountable decryption, and discuss the (im)possibilities when capturing this concept. We also define the security goals in correspondence. Second, we present a novel Trusted Execution Environment(TEE)-assisted solution aligning with definitions. Instead of fully trusting TEE, we take a further step, making TEE work in the “trust, but verify” model where we trust TEE and use its service, but empower users (i.e., decryptors) to detect the potentially compromised state of TEEs. Third, we implement a full-fledged system and conduct a series of evaluations. The results demonstrate that our solution is efficient. Even in a scenario involving $300,000$ log entries, the decryption process concludes in approximately 5.5ms, and malicious decryptors can be identified within 69ms.
随着网络活动规模和复杂性的增加,问责制作为事后机制已成为保障系统安全的有效补充手段。数十年的研究深入探讨了问责制的内涵。然而,它们无法实现实际的解密责任。本文试图解决这一差距。我们考虑这样一个场景:客户机(称为加密器,她)加密她的数据,然后选择为她存储数据的委托(又称解密器,他)。如果解密者对加密的数据发起非法解密,那么这种行为被检测到的概率是不可忽略的,从而使解密者对他的解密负责。我们有三个贡献。首先,我们回顾了迄今为止已知的问责制的关键定义。基于广泛的调查,我们形式化了专门针对解密过程的问责制的新定义,表示为可问责解密,并讨论了捕获此概念时的(im)可能性。我们还定义了相应的安全目标。其次,我们提出了一种新的可信执行环境(TEE)辅助解决方案,该解决方案与定义保持一致。我们没有完全信任TEE,而是更进一步,使TEE在“信任,但验证”模型中工作,我们信任TEE并使用其服务,但授权用户(即解密者)检测TEE的潜在损害状态。第三,我们实行了一套完整的制度,并进行了一系列评估。结果表明,该方法是有效的。即使在涉及$300,000$日志条目的场景中,解密过程也可以在大约5.5ms内完成,并且可以在69ms内识别出恶意解密者。
{"title":"Accountable Decryption Made Formal and Practical","authors":"Rujia Li;Yuanzhao Li;Qin Wang;Sisi Duan;Qi Wang;Mark Ryan","doi":"10.1109/TIFS.2024.3515808","DOIUrl":"10.1109/TIFS.2024.3515808","url":null,"abstract":"With the increasing scale and complexity of online activities, accountability, as an after-the-fact mechanism, has become an effective complementary approach to ensure system security. Decades of research have delved into the connotation of accountability. They fail, however, to achieve practical accountability of decryption. This paper seeks to address this gap. We consider the scenario where a client (called encryptor, her) encrypts her data and then chooses a delegate (a.k.a. decryptor, him) that stores data for her. If the decryptor initiates an illegitimate decryption on the encrypted data, there is a non-negligible probability that this behavior will be detected, thereby holding the decryptor accountable for his decryption. We make three contributions. First, we review key definitions of accountability known so far. Based on extensive investigations, we formalize new definitions of accountability specifically targeting the decryption process, denoted as accountable decryption, and discuss the (im)possibilities when capturing this concept. We also define the security goals in correspondence. Second, we present a novel Trusted Execution Environment(TEE)-assisted solution aligning with definitions. Instead of fully trusting TEE, we take a further step, making TEE work in the “trust, but verify” model where we trust TEE and use its service, but empower users (i.e., decryptors) to detect the potentially compromised state of TEEs. Third, we implement a full-fledged system and conduct a series of evaluations. The results demonstrate that our solution is efficient. Even in a scenario involving \u0000<inline-formula> <tex-math>$300,000$ </tex-math></inline-formula>\u0000 log entries, the decryption process concludes in approximately 5.5ms, and malicious decryptors can be identified within 69ms.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"620-635"},"PeriodicalIF":6.3,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142820926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Finger Valley Points-Free ROI Detection and Recurrent Layer Aggregation for Palmprint Recognition in Open Environment 联合指谷无点 ROI 检测和递归层聚合技术用于开放环境中的掌纹识别
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-12 DOI: 10.1109/TIFS.2024.3516539
Tingting Chai;Xin Wang;Ru Li;Wei Jia;Xiangqian Wu
Cooperative palmprint recognition, pivotal for civilian and commercial uses, stands as the most essential and broadly demanded branch in biometrics. These applications, often tied to financial transactions, require high accuracy in recognition. Currently, research in palmprint recognition primarily aims to enhance accuracy, with relatively few studies addressing the automatic and flexible palm region of interest (ROI) extraction (PROIE) suitable for complex scenes. Particularly, the intricate conditions of open environment, alongside the constraint of human finger skeletal extension limiting the visibility of Finger Valley Points (FVPs), render conventional FVPs-based PROIE methods ineffective. In response to this challenge, we propose an FVPs-Free Adaptive ROI Detection (FFARD) approach, which utilizes cross-dataset hand shape semantic transfer (CHSST) combined with the constrained palm inscribed circle search, delivering exceptional hand segmentation and precise PROIE. Furthermore, a Recurrent Layer Aggregation-based Neural Network (RLANN) is proposed to learn discriminative feature representation for high recognition accuracy in both open-set and closed-set modes. The Angular Center Proximity Loss (ACPLoss) is designed to enhance intra-class compactness and inter-class discrepancy between learned palmprint features. Overall, the combined FFARD and RLANN methods are proposed to address the challenges of palmprint recognition in open environment, collectively referred to as RDRLA. Experimental results on four palmprint benchmarks HIT-NIST-V1, IITD, MPD and BJTU_PalmV2 show the superiority of the proposed method RDRLA over the state-of-the-art (SOTA) competitors. The code of the proposed method is available at https://github.com/godfatherwang2/ RDRLA.
协作掌纹识别是生物识别技术中最重要、应用最广泛的一个分支,对民用和商用都具有重要意义。这些应用程序通常与金融交易有关,要求识别的准确性很高。目前,掌纹识别的研究主要是为了提高掌纹识别的准确性,而针对复杂场景下自动、灵活的掌纹感兴趣区域(ROI)提取(PROIE)的研究相对较少。特别是,开放环境的复杂条件,以及人类手指骨骼延伸的限制,限制了手指谷点(FVPs)的可见性,使得传统的基于FVPs的PROIE方法无效。为了应对这一挑战,我们提出了一种无fvps的自适应ROI检测(FFARD)方法,该方法利用交叉数据集手部形状语义转移(CHSST)和受限手掌内切圆搜索相结合,提供了出色的手部分割和精确的PROIE。在此基础上,提出了一种基于递归层聚合的神经网络(RLANN)来学习特征的判别表示,以提高开集和闭集模式下的识别精度。角中心接近损失(ACPLoss)是为了增强类内紧凑性和类间差异而设计的。总的来说,提出了FFARD和RLANN相结合的方法来解决开放环境下掌纹识别的挑战,统称为RDRLA。在HIT-NIST-V1、IITD、MPD和BJTU_PalmV2四个掌纹基准测试上的实验结果表明,所提出的方法RDRLA优于最先进的(SOTA)竞争对手。所提出的方法的代码可在https://github.com/godfatherwang2/ RDRLA获得。
{"title":"Joint Finger Valley Points-Free ROI Detection and Recurrent Layer Aggregation for Palmprint Recognition in Open Environment","authors":"Tingting Chai;Xin Wang;Ru Li;Wei Jia;Xiangqian Wu","doi":"10.1109/TIFS.2024.3516539","DOIUrl":"10.1109/TIFS.2024.3516539","url":null,"abstract":"Cooperative palmprint recognition, pivotal for civilian and commercial uses, stands as the most essential and broadly demanded branch in biometrics. These applications, often tied to financial transactions, require high accuracy in recognition. Currently, research in palmprint recognition primarily aims to enhance accuracy, with relatively few studies addressing the automatic and flexible palm region of interest (ROI) extraction (PROIE) suitable for complex scenes. Particularly, the intricate conditions of open environment, alongside the constraint of human finger skeletal extension limiting the visibility of Finger Valley Points (FVPs), render conventional FVPs-based PROIE methods ineffective. In response to this challenge, we propose an FVPs-Free Adaptive ROI Detection (FFARD) approach, which utilizes cross-dataset hand shape semantic transfer (CHSST) combined with the constrained palm inscribed circle search, delivering exceptional hand segmentation and precise PROIE. Furthermore, a Recurrent Layer Aggregation-based Neural Network (RLANN) is proposed to learn discriminative feature representation for high recognition accuracy in both open-set and closed-set modes. The Angular Center Proximity Loss (ACPLoss) is designed to enhance intra-class compactness and inter-class discrepancy between learned palmprint features. Overall, the combined FFARD and RLANN methods are proposed to address the challenges of palmprint recognition in open environment, collectively referred to as RDRLA. Experimental results on four palmprint benchmarks HIT-NIST-V1, IITD, MPD and BJTU_PalmV2 show the superiority of the proposed method RDRLA over the state-of-the-art (SOTA) competitors. The code of the proposed method is available at \u0000<uri>https://github.com/godfatherwang2/</uri>\u0000 RDRLA.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"421-435"},"PeriodicalIF":6.3,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142815910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Byzantine Fault Tolerance With Non-Determinism, Revisited 拜占庭容错与非确定性再探讨
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-12 DOI: 10.1109/TIFS.2024.3516541
Yue Huang;Huizhong Li;Yi Sun;Sisi Duan
Conventional Byzantine fault tolerance (BFT) requires replicated state machines to execute deterministic operations only. In practice, numerous applications and scenarios, especially in the era of blockchains, contain various sources of non-determinism. Meanwhile, it is even sometimes desirable to support non-determinism, and replicas still agree on the execution results. Despite decades of research on BFT, we still lack an efficient and easy-to-deploy solution for BFT with non-determinism—BFT-ND, especially in the asynchronous setting. We revisit the problem of BFT-ND and provide a formal and asynchronous treatment of BFT-ND. In particular, we design and implement Block-ND that insightfully separates the task of agreeing on the order of transactions from the task of agreement on the state: Block-ND allows reusing existing BFT implementations; on top of BFT, we reduce the agreement on the state to multivalued Byzantine agreement (MBA), a somewhat neglected primitive by practical systems. Block-ND is completely asynchronous as long as the underlying BFT is asynchronous. We provide a new MBA construction that is significantly faster than existing MBA constructions. We instantiate Block-ND in both the partially synchronous setting (with PBFT, OSDI 1999) and the purely asynchronous setting (with PACE, CCS 2022). Via a 91-instance WAN deployment on Amazon EC2, we show that Block-ND has only marginal performance degradation compared to conventional BFT.
传统的拜占庭容错(BFT)要求复制状态机只执行确定性操作。在实践中,许多应用程序和场景,特别是在区块链时代,包含各种不确定性的来源。同时,有时甚至需要支持非确定性,并且副本仍然同意执行结果。尽管对BFT进行了数十年的研究,但我们仍然缺乏一种高效且易于部署的非确定性BFT- nd解决方案,特别是在异步环境下。我们重新审视了BFT-ND的问题,并提供了BFT-ND的正式和异步治疗。特别是,我们设计和实现了Block-ND,它深刻地将交易顺序协议任务与状态协议任务分离开来:Block-ND允许重用现有的BFT实现;在BFT的基础上,我们将状态协议简化为多值拜占庭协议(MBA),这是一种被实际系统忽略的原始协议。只要底层BFT是异步的,Block-ND就是完全异步的。我们提供了一种新的MBA结构,比现有的MBA结构要快得多。我们在部分同步设置(PBFT, OSDI 1999)和纯异步设置(PACE, CCS 2022)中实例化了Block-ND。通过在Amazon EC2上部署91个WAN实例,我们发现与传统BFT相比,Block-ND的性能下降很小。
{"title":"Byzantine Fault Tolerance With Non-Determinism, Revisited","authors":"Yue Huang;Huizhong Li;Yi Sun;Sisi Duan","doi":"10.1109/TIFS.2024.3516541","DOIUrl":"10.1109/TIFS.2024.3516541","url":null,"abstract":"Conventional Byzantine fault tolerance (BFT) requires replicated state machines to execute deterministic operations only. In practice, numerous applications and scenarios, especially in the era of blockchains, contain various sources of non-determinism. Meanwhile, it is even sometimes desirable to support non-determinism, and replicas still agree on the execution results. Despite decades of research on BFT, we still lack an efficient and easy-to-deploy solution for BFT with non-determinism—BFT-ND, especially in the asynchronous setting. We revisit the problem of BFT-ND and provide a formal and asynchronous treatment of BFT-ND. In particular, we design and implement Block-ND that insightfully separates the task of agreeing on the order of transactions from the task of agreement on the state: Block-ND allows reusing existing BFT implementations; on top of BFT, we reduce the agreement on the state to multivalued Byzantine agreement (MBA), a somewhat neglected primitive by practical systems. Block-ND is completely asynchronous as long as the underlying BFT is asynchronous. We provide a new MBA construction that is significantly faster than existing MBA constructions. We instantiate Block-ND in both the partially synchronous setting (with PBFT, OSDI 1999) and the purely asynchronous setting (with PACE, CCS 2022). Via a 91-instance WAN deployment on Amazon EC2, we show that Block-ND has only marginal performance degradation compared to conventional BFT.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"309-322"},"PeriodicalIF":6.3,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142815905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NMFAD: Neighbor-Aware Mask-Filling Attributed Network Anomaly Detection NMFAD:邻居感知掩码填充归因网络异常现象检测
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-12 DOI: 10.1109/TIFS.2024.3516570
Liang Xi;Runze Li;Menghan Li;Dehua Miao;Ruidong Wang;Zygmunt J. Haas
As a widely adopted protocol for anomaly detection in attributed networks, reconstruction error prioritizes comprehensive feature extraction to detect anomalies over interrogating the differential representation between normal and abnormal nodes. Intuitively, in attributed networks, normal nodes and their neighbors often exhibit similarities, whereas abnormal nodes demonstrate behaviors distinct from their neighbors. Hence, normal nodes can be accurately represented through their neighbors and effectively reconstructed. As opposed to normal nodes, abnormal nodes represented by their neighbors may be erroneously reconstructed as normal, resulting in increased reconstruction error. Leveraging from this observation, we propose a novel anomaly detection protocol called Neighbor-aware Mask-Filling Anomaly Detection (NMFAD) for attributed networks, aiming to maximize the variability between original and reconstructed features of abnormal nodes filled with information from their neighbors. Specifically, we utilize random-mask on nodes and integrate them into the backbone Graph Neural Networks (GNNs) to map nodes into a latent space. Subsequently, we fill the masked nodes with embeddings from their neighbors and smooth the abnormal nodes closer to the distribution of normal nodes. This optimization improves the likelihood of the decoder to reconstructing abnormal nodes as normal, thereby maximizing the reconstruction error of abnormal nodes. Experimental results demonstrate that, compared to the existing models, NMFAD exhibits superior performance.in attributed networks.
重构误差作为一种被广泛采用的属性网络异常检测协议,优先考虑综合特征提取来检测异常,而不是询问正常和异常节点之间的差异表示。直观地说,在属性网络中,正常节点与其邻居往往表现出相似性,而异常节点则表现出与其邻居不同的行为。因此,正常节点可以通过其邻居准确地表示并有效地重建。与正常节点相反,由其邻居表示的异常节点可能会被错误地重构为正常节点,从而增加重构误差。利用这一观察结果,我们提出了一种新的异常检测协议,称为邻居感知掩码填充异常检测(NMFAD),用于属性网络,旨在最大限度地提高充满邻居信息的异常节点的原始特征和重建特征之间的可变性。具体来说,我们在节点上使用随机掩码,并将它们集成到骨干图神经网络(gnn)中,将节点映射到潜在空间。随后,我们用相邻节点的嵌入来填充被屏蔽节点,并平滑异常节点,使其更接近正常节点的分布。这种优化提高了解码器将异常节点重构为正常节点的可能性,从而使异常节点的重构误差最大化。实验结果表明,与现有模型相比,NMFAD具有更好的性能。在属性网络中。
{"title":"NMFAD: Neighbor-Aware Mask-Filling Attributed Network Anomaly Detection","authors":"Liang Xi;Runze Li;Menghan Li;Dehua Miao;Ruidong Wang;Zygmunt J. Haas","doi":"10.1109/TIFS.2024.3516570","DOIUrl":"10.1109/TIFS.2024.3516570","url":null,"abstract":"As a widely adopted protocol for anomaly detection in attributed networks, reconstruction error prioritizes comprehensive feature extraction to detect anomalies over interrogating the differential representation between normal and abnormal nodes. Intuitively, in attributed networks, normal nodes and their neighbors often exhibit similarities, whereas abnormal nodes demonstrate behaviors distinct from their neighbors. Hence, normal nodes can be accurately represented through their neighbors and effectively reconstructed. As opposed to normal nodes, abnormal nodes represented by their neighbors may be erroneously reconstructed as normal, resulting in increased reconstruction error. Leveraging from this observation, we propose a novel anomaly detection protocol called Neighbor-aware Mask-Filling Anomaly Detection (NMFAD) for attributed networks, aiming to maximize the variability between original and reconstructed features of abnormal nodes filled with information from their neighbors. Specifically, we utilize random-mask on nodes and integrate them into the backbone Graph Neural Networks (GNNs) to map nodes into a latent space. Subsequently, we fill the masked nodes with embeddings from their neighbors and smooth the abnormal nodes closer to the distribution of normal nodes. This optimization improves the likelihood of the decoder to reconstructing abnormal nodes as normal, thereby maximizing the reconstruction error of abnormal nodes. Experimental results demonstrate that, compared to the existing models, NMFAD exhibits superior performance.in attributed networks.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"364-374"},"PeriodicalIF":6.3,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142815898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global or Local Adaptation? Client-Sampled Federated Meta-Learning for Personalized IoT Intrusion Detection 全球适应还是局部适应?个性化物联网入侵检测的客户端抽样联邦元学习
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-12 DOI: 10.1109/TIFS.2024.3516548
Haorui Yan;Xi Lin;Shenghong Li;Hao Peng;Bo Zhang
With the increasing size of Internet of Things (IoT) devices, cyber threats to IoT systems have increased. Federated learning (FL) has been implemented in an anomaly-based intrusion detection system (NIDS) to detect malicious traffic in IoT devices and counter the threat. However, current FL-based NIDS mainly focuses on global model performance and lacks personalized performance improvement for local data. To address this issue, we propose a novel personalized federated meta-learning intrusion detection approach (PerFLID), which allows multiple participants to personalize their local detection models for local adaptation. PerFLID shifts the goal of the personalized detection task to training a local model suitable for the client’s specific data, rather than a global model. To meet the real-time requirements of NIDS, PerFLID further refines the client selection strategy by clustering the local gradient similarities to find the nodes that contribute the most to the global model per global round. PerFLID can select the nodes that accelerate the convergence of the model, and we theoretically analyze the improvement in the convergence speed of this strategy over the personalized federated learning algorithm. We experimentally evaluate six existing FL-NIDS approaches on three real network traffic datasets and show that our PerFLID approach outperforms all baselines in detecting local adaptation accuracy by 10.11% over the state-of-the-art scheme, accelerating the convergence speed under various parameter combinations.
随着物联网(IoT)设备规模的不断扩大,对物联网系统的网络威胁也在增加。联邦学习(FL)已在基于异常的入侵检测系统(NIDS)中实现,用于检测物联网设备中的恶意流量并应对威胁。然而,目前基于fl的NIDS主要关注全局模型性能,缺乏针对局部数据的个性化性能提升。为了解决这个问题,我们提出了一种新的个性化联邦元学习入侵检测方法(PerFLID),该方法允许多个参与者个性化他们的本地检测模型以适应本地。PerFLID将个性化检测任务的目标转移到训练适合客户特定数据的局部模型,而不是全局模型。为了满足NIDS的实时性要求,PerFLID进一步细化客户端选择策略,通过对局部梯度相似度进行聚类,找到每全局轮对全局模型贡献最大的节点。PerFLID可以选择加速模型收敛的节点,并从理论上分析了该策略相对于个性化联邦学习算法在收敛速度上的改进。我们在三个真实网络流量数据集上对六种现有的FL-NIDS方法进行了实验评估,结果表明,我们的PerFLID方法在检测局部自适应精度方面优于所有基线,比最先进的方案提高了10.11%,加快了各种参数组合下的收敛速度。
{"title":"Global or Local Adaptation? Client-Sampled Federated Meta-Learning for Personalized IoT Intrusion Detection","authors":"Haorui Yan;Xi Lin;Shenghong Li;Hao Peng;Bo Zhang","doi":"10.1109/TIFS.2024.3516548","DOIUrl":"10.1109/TIFS.2024.3516548","url":null,"abstract":"With the increasing size of Internet of Things (IoT) devices, cyber threats to IoT systems have increased. Federated learning (FL) has been implemented in an anomaly-based intrusion detection system (NIDS) to detect malicious traffic in IoT devices and counter the threat. However, current FL-based NIDS mainly focuses on global model performance and lacks personalized performance improvement for local data. To address this issue, we propose a novel personalized federated meta-learning intrusion detection approach (PerFLID), which allows multiple participants to personalize their local detection models for local adaptation. PerFLID shifts the goal of the personalized detection task to training a local model suitable for the client’s specific data, rather than a global model. To meet the real-time requirements of NIDS, PerFLID further refines the client selection strategy by clustering the local gradient similarities to find the nodes that contribute the most to the global model per global round. PerFLID can select the nodes that accelerate the convergence of the model, and we theoretically analyze the improvement in the convergence speed of this strategy over the personalized federated learning algorithm. We experimentally evaluate six existing FL-NIDS approaches on three real network traffic datasets and show that our PerFLID approach outperforms all baselines in detecting local adaptation accuracy by 10.11% over the state-of-the-art scheme, accelerating the convergence speed under various parameter combinations.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"279-293"},"PeriodicalIF":6.3,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142815915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems Based on Integrated Control Decision 基于综合控制决策的电力网络物理系统安全跟踪控制与攻击检测
IF 6.3 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-12 DOI: 10.1109/TIFS.2024.3516557
Chaowei Sun;Qingyu Su;Jian Li
In this article, the problems of attack detection and secure tracking control for the power cyber-physical system are investigated. Considering the critical role of cyber networks in influencing decision-making for power grid optimization, a multiobjective optimization problem is introduced to determine the output power of generators. This optimization problem is solved based on the improved particle swarm optimization algorithm. The power system is modelled with dynamic characteristics taken into account. Furthermore, a resilient state-feedback tracking control strategy, that exploits a sliding mode observer, is introduced to ensure the reference value generated by the cyber network is tracked even under attacks. In addition, by using the reconstructed attack signals, an attack detection scheme is proposed. Some sufficient conditions are then obtained for the solvability of the tracking control problem. Finally, a simulation example and the experimental validation built into the StarSim hardware-in-the-loop simulation platform are introduced to illustrate the effectiveness of the proposed method.
本文研究了电力网络物理系统的攻击检测和安全跟踪控制问题。考虑到网络对电网优化决策的重要影响,引入了确定发电机输出功率的多目标优化问题。基于改进的粒子群优化算法解决了这一优化问题。建立了考虑动态特性的电力系统模型。此外,引入了一种利用滑模观测器的弹性状态反馈跟踪控制策略,以确保即使受到攻击,网络产生的参考值也能被跟踪。此外,利用重构的攻击信号,提出了一种攻击检测方案。得到了跟踪控制问题可解的几个充分条件。最后,通过仿真实例和StarSim半实物仿真平台的实验验证,验证了所提方法的有效性。
{"title":"Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems Based on Integrated Control Decision","authors":"Chaowei Sun;Qingyu Su;Jian Li","doi":"10.1109/TIFS.2024.3516557","DOIUrl":"10.1109/TIFS.2024.3516557","url":null,"abstract":"In this article, the problems of attack detection and secure tracking control for the power cyber-physical system are investigated. Considering the critical role of cyber networks in influencing decision-making for power grid optimization, a multiobjective optimization problem is introduced to determine the output power of generators. This optimization problem is solved based on the improved particle swarm optimization algorithm. The power system is modelled with dynamic characteristics taken into account. Furthermore, a resilient state-feedback tracking control strategy, that exploits a sliding mode observer, is introduced to ensure the reference value generated by the cyber network is tracked even under attacks. In addition, by using the reconstructed attack signals, an attack detection scheme is proposed. Some sufficient conditions are then obtained for the solvability of the tracking control problem. Finally, a simulation example and the experimental validation built into the StarSim hardware-in-the-loop simulation platform are introduced to illustrate the effectiveness of the proposed method.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"968-979"},"PeriodicalIF":6.3,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142815912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1