首页 > 最新文献

2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)最新文献

英文 中文
Autonomous WiFi Fingerprinting for Indoor Localization 自主WiFi指纹识别室内定位
Pub Date : 2019-11-26 DOI: 10.1109/ICCPS48487.2020.00021
Shilong Dai, Liang He, Xuebo Zhang
WiFi-based indoor localization has received extensive attentions from both academia and industry. However, the overhead of constructing and maintaining the WiFi fingerprint map remains a bottleneck for the wide-deployment of WiFi- based indoor localization systems. Recently, robots are adopted as the professional surveyor to fingerprint the environment autonomously. But the time and energy cost still limit the coverage of the robot surveyor, thus reduce its scalability.To fill this need, we design an Autonomous WiFi Fingerprinting system, called AuF, which autonomously constructs the fingerprint database with improved time and energy efficiency. AuF first conduct an automatic initialization process in the target indoor environment, then constructs the WiFi fingerprint database in two steps: (i) surveying the site without sojourn, (ii) recovering unreliable signals in the database with two methods. We have implemented and evaluated AuF using a Pioneer 3-DX robot, on two sites of our 70 × 90m2 Department building with different structures and deployments of access points (APs). The results show AuF finishes the fingerprint database construction in 43/51 minutes, and consumes 60/82 Wh on the two floors respectively, which is a 64%/71% and 61%/64% reduction when compared to traditional site survey methods, without degrading the localization accuracy.
基于wifi的室内定位受到了学术界和业界的广泛关注。然而,构建和维护WiFi指纹图谱的开销仍然是WiFi室内定位系统广泛部署的瓶颈。最近,机器人被采用作为专业测量员,自动对环境进行指纹采集。但时间和能量成本仍然限制了机器人测量员的覆盖范围,从而降低了其可扩展性。为了满足这一需求,我们设计了一种自主WiFi指纹识别系统,称为AuF,该系统可以自主构建指纹数据库,提高了时间和能量效率。AuF首先在目标室内环境中进行自动初始化过程,然后分两步构建WiFi指纹库:(i)对未逗留的场地进行调查,(ii)通过两种方法恢复数据库中的不可靠信号。我们使用先锋3-DX机器人在我们70 × 90平方米的部门大楼的两个地点实施和评估了AuF,这些地点具有不同的结构和接入点(ap)的部署。结果表明,AuF在不影响定位精度的前提下,在43/51分钟内完成指纹数据库的构建,两层楼的功耗分别为60/82 Wh,与传统的现场调查方法相比,分别降低了64%/71%和61%/64%。
{"title":"Autonomous WiFi Fingerprinting for Indoor Localization","authors":"Shilong Dai, Liang He, Xuebo Zhang","doi":"10.1109/ICCPS48487.2020.00021","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00021","url":null,"abstract":"WiFi-based indoor localization has received extensive attentions from both academia and industry. However, the overhead of constructing and maintaining the WiFi fingerprint map remains a bottleneck for the wide-deployment of WiFi- based indoor localization systems. Recently, robots are adopted as the professional surveyor to fingerprint the environment autonomously. But the time and energy cost still limit the coverage of the robot surveyor, thus reduce its scalability.To fill this need, we design an Autonomous WiFi Fingerprinting system, called AuF, which autonomously constructs the fingerprint database with improved time and energy efficiency. AuF first conduct an automatic initialization process in the target indoor environment, then constructs the WiFi fingerprint database in two steps: (i) surveying the site without sojourn, (ii) recovering unreliable signals in the database with two methods. We have implemented and evaluated AuF using a Pioneer 3-DX robot, on two sites of our 70 × 90m2 Department building with different structures and deployments of access points (APs). The results show AuF finishes the fingerprint database construction in 43/51 minutes, and consumes 60/82 Wh on the two floors respectively, which is a 64%/71% and 61%/64% reduction when compared to traditional site survey methods, without degrading the localization accuracy.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132521421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intermittent Connectivity for Exploration in Communication-Constrained Multi-Agent Systems 通信约束下多智能体系统的间歇性连接探索
Pub Date : 2019-11-19 DOI: 10.1109/ICCPS48487.2020.00031
Filip Klaesson, Petter Nilsson, A. Ames, R. Murray
Motivated by exploration of communication-constrained underground environments using robot teams, we study the problem of planning for intermittent connectivity in multi-agent systems. We propose a novel concept of information-consistency to handle situations where the plan is not initially known by all agents, and suggest an integer linear program for synthesizing information-consistent plans that also achieve auxiliary goals. Furthermore, inspired by network flow problems we propose a novel way to pose connectivity constraints that scales much better than previous methods. In the second part of the paper we apply these results in an exploration setting, and propose a clustering method that separates a large exploration problem into smaller problems that can be solved independently. We demonstrate how the resulting exploration algorithm is able to coordinate a team of ten agents to explore a large environment.
以机器人团队探索通信受限的地下环境为动力,我们研究了多智能体系统中间歇性连接的规划问题。我们提出了一种新的信息一致性概念来处理所有智能体最初不知道计划的情况,并提出了一个整数线性规划来综合信息一致性计划,并实现辅助目标。此外,受网络流问题的启发,我们提出了一种新的方法来提出连接约束,其可扩展性比以前的方法要好得多。在论文的第二部分,我们将这些结果应用于一个勘探环境,并提出了一种聚类方法,将一个大的勘探问题分离成可以独立解决的小问题。我们演示了最终的探索算法如何能够协调一个由十个代理组成的团队来探索一个大的环境。
{"title":"Intermittent Connectivity for Exploration in Communication-Constrained Multi-Agent Systems","authors":"Filip Klaesson, Petter Nilsson, A. Ames, R. Murray","doi":"10.1109/ICCPS48487.2020.00031","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00031","url":null,"abstract":"Motivated by exploration of communication-constrained underground environments using robot teams, we study the problem of planning for intermittent connectivity in multi-agent systems. We propose a novel concept of information-consistency to handle situations where the plan is not initially known by all agents, and suggest an integer linear program for synthesizing information-consistent plans that also achieve auxiliary goals. Furthermore, inspired by network flow problems we propose a novel way to pose connectivity constraints that scales much better than previous methods. In the second part of the paper we apply these results in an exploration setting, and propose a clustering method that separates a large exploration problem into smaller problems that can be solved independently. We demonstrate how the resulting exploration algorithm is able to coordinate a team of ten agents to explore a large environment.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117098368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon 无限视界上演化数据集的时间贴现差分隐私
Pub Date : 2019-08-12 DOI: 10.1109/ICCPS48487.2020.00008
F. Farokhi
We define discounted differential privacy, as an alternative to (conventional) differential privacy, to investigate privacy of evolving datasets, containing time series over an unbounded horizon. We use privacy loss as a measure of the amount of information leaked by the reports at a certain fixed time. We observe that privacy losses are weighted equally across time in the definition of differential privacy, and therefore the magnitude of privacy-preserving additive noise must grow without bound to ensure differential privacy over an infinite horizon. Motivated by the discounted utility theory within the economics literature, we use exponential and hyperbolic discounting of privacy losses across time to relax the definition of differential privacy under continual observations. This implies that privacy losses in distant past are less important than the current ones to an individual. We use discounted differential privacy to investigate privacy of evolving datasets using additive Laplace noise and show that the magnitude of the additive noise can remain bounded under discounted differential privacy. We illustrate the quality of privacy-preserving mechanisms satisfying discounted differential privacy on smart-meter measurement time-series of real households, made publicly available by Ausgrid (an Australian electricity distribution company).
我们定义了折扣差分隐私,作为(传统)差分隐私的替代方案,以研究包含无界范围内时间序列的不断发展的数据集的隐私。我们用隐私损失来衡量某一固定时间内报告泄露的信息量。我们观察到,在差分隐私的定义中,隐私损失在时间上的权重是相等的,因此保护隐私的加性噪声的大小必须无限制地增长,以确保在无限视界上的差分隐私。在经济学文献中的效用折现理论的激励下,我们使用隐私损失随时间的指数折现和双曲折现来放宽连续观察下差异隐私的定义。这意味着,对一个人来说,过去的隐私损失没有现在的隐私损失重要。我们使用微分隐私折扣研究了使用加性拉普拉斯噪声的演化数据集的隐私性,并证明了加性噪声的大小在微分隐私折扣下可以保持有界。我们说明了隐私保护机制的质量,满足真实家庭的智能电表测量时间序列的贴现差分隐私,由Ausgrid(一家澳大利亚配电公司)公开提供。
{"title":"Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon","authors":"F. Farokhi","doi":"10.1109/ICCPS48487.2020.00008","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00008","url":null,"abstract":"We define discounted differential privacy, as an alternative to (conventional) differential privacy, to investigate privacy of evolving datasets, containing time series over an unbounded horizon. We use privacy loss as a measure of the amount of information leaked by the reports at a certain fixed time. We observe that privacy losses are weighted equally across time in the definition of differential privacy, and therefore the magnitude of privacy-preserving additive noise must grow without bound to ensure differential privacy over an infinite horizon. Motivated by the discounted utility theory within the economics literature, we use exponential and hyperbolic discounting of privacy losses across time to relax the definition of differential privacy under continual observations. This implies that privacy losses in distant past are less important than the current ones to an individual. We use discounted differential privacy to investigate privacy of evolving datasets using additive Laplace noise and show that the magnitude of the additive noise can remain bounded under discounted differential privacy. We illustrate the quality of privacy-preserving mechanisms satisfying discounted differential privacy on smart-meter measurement time-series of real households, made publicly available by Ausgrid (an Australian electricity distribution company).","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131889068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SaSTL: Spatial Aggregation Signal Temporal Logic for Runtime Monitoring in Smart Cities 面向智慧城市运行监控的空间聚合信号时序逻辑
Pub Date : 2019-08-06 DOI: 10.1109/ICCPS48487.2020.00013
Meiyi Ma, E. Bartocci, Eli Lifland, J. Stankovic, Lu Feng
We present SaSTL—a novel Spatial Aggregation Signal Temporal Logic—for the efficient runtime monitoring of safety and performance requirements in smart cities. We first describe a study of over 1,000 smart city requirements, some of which can not be specified using existing logic such as Signal Temporal Logic (STL) and its variants. To tackle this limitation, we develop two new logical operators in SaSTL to augment STL for expressing spatial aggregation and spatial counting characteristics that are commonly found in real city requirements. We also develop efficient monitoring algorithms that can check a SaSTL requirement in parallel over multiple data streams (e.g., generated by multiple sensors distributed spatially in a city). We evaluate our SaSTL monitor by applying to two case studies with large-scale real city sensing data (e.g., up to 10,000 sensors in one requirement). The results show that SaSTL has a much higher coverage expressiveness than other spatial-temporal logics, and with a significant reduction of computation time for monitoring requirements. We also demonstrate that the SaSTL monitor can help improve the safety and performance of smart cities via simulated experiments.
我们提出了一种新的空间聚合信号时间逻辑,用于智能城市安全和性能要求的有效运行时监控。我们首先描述了一项针对1000多个智慧城市需求的研究,其中一些需求无法使用现有逻辑(如信号时序逻辑(STL)及其变体)来指定。为了解决这一限制,我们在SaSTL中开发了两个新的逻辑运算符来增强STL,以表达在实际城市需求中常见的空间聚合和空间计数特征。我们还开发了有效的监控算法,可以在多个数据流(例如,由分布在城市空间中的多个传感器生成)上并行检查SaSTL要求。我们通过应用两个具有大规模真实城市传感数据的案例研究来评估我们的SaSTL监视器(例如,在一个需求中多达10,000个传感器)。结果表明,SaSTL具有比其他时空逻辑更高的覆盖表达能力,并且显著减少了监测需求的计算时间。我们还通过模拟实验证明了SaSTL监测器可以帮助提高智慧城市的安全性和性能。
{"title":"SaSTL: Spatial Aggregation Signal Temporal Logic for Runtime Monitoring in Smart Cities","authors":"Meiyi Ma, E. Bartocci, Eli Lifland, J. Stankovic, Lu Feng","doi":"10.1109/ICCPS48487.2020.00013","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00013","url":null,"abstract":"We present SaSTL—a novel Spatial Aggregation Signal Temporal Logic—for the efficient runtime monitoring of safety and performance requirements in smart cities. We first describe a study of over 1,000 smart city requirements, some of which can not be specified using existing logic such as Signal Temporal Logic (STL) and its variants. To tackle this limitation, we develop two new logical operators in SaSTL to augment STL for expressing spatial aggregation and spatial counting characteristics that are commonly found in real city requirements. We also develop efficient monitoring algorithms that can check a SaSTL requirement in parallel over multiple data streams (e.g., generated by multiple sensors distributed spatially in a city). We evaluate our SaSTL monitor by applying to two case studies with large-scale real city sensing data (e.g., up to 10,000 sensors in one requirement). The results show that SaSTL has a much higher coverage expressiveness than other spatial-temporal logics, and with a significant reduction of computation time for monitoring requirements. We also demonstrate that the SaSTL monitor can help improve the safety and performance of smart cities via simulated experiments.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130740846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Control Behavior Integrity for Distributed Cyber-Physical Systems 分布式信息物理系统控制行为完整性
Pub Date : 2018-12-20 DOI: 10.1109/ICCPS48487.2020.00011
Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, A. Sadeghi, S. Zonouz
Cyber-physical control systems, such as industrial control systems (ICS), are increasingly targeted by cyberattacks. Such attacks can potentially cause tremendous damage, affect critical infrastructure or even jeopardize human life when the system does not behave as intended. Cyberattacks, however, are not new and decades of security research have developed plenty of solutions to thwart them. Unfortunately, many of these solutions cannot be easily applied to safety-critical cyber-physical systems. Further, the attack surface of ICS is quite different from what can be commonly assumed in classical IT systems.We present Scadman, a novel control-logic aware anomaly detection system for distributed cyber-physical systems. By observing the system-wide behavior, the correctness of individual controllers (like programmable logic controllers–PLCs) in ICS can be verified. This allows Scadman to detect a wide range of attacks, including malware attacks, code-reuse and dataonly attacks, as well as sensor attacks. We implemented and evaluated Scadman based on a real-world water treatment testbed for ICS security research and training. Our results show that we can detect a wide range of attacks–including attacks that have previously been undetectable by typical state estimation techniques–while causing no false-positive warning for nominal threshold values.
网络物理控制系统,如工业控制系统(ICS),越来越多地成为网络攻击的目标。这种攻击可能会造成巨大的破坏,影响关键的基础设施,甚至在系统不按预期运行时危及人类生命。然而,网络攻击并不新鲜,几十年的安全研究已经开发出了许多解决方案来阻止它们。不幸的是,这些解决方案中的许多都不能轻易应用于安全关键的网络物理系统。此外,ICS的攻击面与传统IT系统中通常假设的攻击面有很大不同。我们提出了Scadman,一个新的控制逻辑感知的分布式网络物理系统异常检测系统。通过观察系统范围的行为,可以验证ICS中单个控制器(如可编程逻辑控制器- plc)的正确性。这使得Scadman能够检测到广泛的攻击,包括恶意软件攻击,代码重用和数据攻击,以及传感器攻击。我们基于ICS安全研究和培训的真实水处理测试平台实施并评估了Scadman。我们的结果表明,我们可以检测到广泛的攻击——包括以前通过典型的状态估计技术无法检测到的攻击——同时不会对名义阈值产生误报警告。
{"title":"Control Behavior Integrity for Distributed Cyber-Physical Systems","authors":"Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, A. Sadeghi, S. Zonouz","doi":"10.1109/ICCPS48487.2020.00011","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00011","url":null,"abstract":"Cyber-physical control systems, such as industrial control systems (ICS), are increasingly targeted by cyberattacks. Such attacks can potentially cause tremendous damage, affect critical infrastructure or even jeopardize human life when the system does not behave as intended. Cyberattacks, however, are not new and decades of security research have developed plenty of solutions to thwart them. Unfortunately, many of these solutions cannot be easily applied to safety-critical cyber-physical systems. Further, the attack surface of ICS is quite different from what can be commonly assumed in classical IT systems.We present Scadman, a novel control-logic aware anomaly detection system for distributed cyber-physical systems. By observing the system-wide behavior, the correctness of individual controllers (like programmable logic controllers–PLCs) in ICS can be verified. This allows Scadman to detect a wide range of attacks, including malware attacks, code-reuse and dataonly attacks, as well as sensor attacks. We implemented and evaluated Scadman based on a real-world water treatment testbed for ICS security research and training. Our results show that we can detect a wide range of attacks–including attacks that have previously been undetectable by typical state estimation techniques–while causing no false-positive warning for nominal threshold values.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Event-Triggered Diffusion Kalman Filters 事件触发扩散卡尔曼滤波器
Pub Date : 2017-11-01 DOI: 10.1109/ICCPS48487.2020.00032
Amr Alanwar, Hazem Said, Ankur M. Mehta, M. Althoff
Distributed state estimation strongly depends on collaborative signal processing, which often requires excessive communication and computation to be executed on resource-constrained sensor nodes. To address this problem, we propose an event-triggered diffusion Kalman filter, which collects measurements and exchanges messages between nodes based on a local signal indicating the estimation error. On this basis, we develop an energy-aware state estimation algorithm that regulates the resource consumption in wireless networks and ensures the effectiveness of every consumed resource. The proposed algorithm does not require the nodes to share its local covariance matrices, and thereby allows considerably reducing the number of transmission messages. To confirm its efficiency, we apply the proposed algorithm to the distributed simultaneous localization and time synchronization problem and evaluate it on a physical testbed of a mobile quadrotor node and stationary custom ultra-wideband wireless devices. The obtained experimental results indicate that the proposed algorithm allows saving 86% of the communication overhead associated with the original diffusion Kalman filter while causing deterioration of performance by 16% only. We make the Matlab code and the real testing data available online1.
分布式状态估计严重依赖于协同信号处理,这往往需要在资源受限的传感器节点上执行过多的通信和计算。为了解决这个问题,我们提出了一种事件触发的扩散卡尔曼滤波器,它根据指示估计误差的本地信号收集测量值并在节点之间交换消息。在此基础上,我们开发了一种能量感知的状态估计算法,以调节无线网络中的资源消耗,并确保每个消耗的资源的有效性。该算法不需要节点共享其局部协方差矩阵,从而大大减少了传输消息的数量。为了验证该算法的有效性,我们将该算法应用于分布式同时定位和时间同步问题,并在移动四旋翼节点和固定定制超宽带无线设备的物理测试平台上进行了评估。实验结果表明,该算法可以节省原始扩散卡尔曼滤波器86%的通信开销,而性能仅下降16%。我们在网上提供了Matlab代码和实际测试数据1。
{"title":"Event-Triggered Diffusion Kalman Filters","authors":"Amr Alanwar, Hazem Said, Ankur M. Mehta, M. Althoff","doi":"10.1109/ICCPS48487.2020.00032","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00032","url":null,"abstract":"Distributed state estimation strongly depends on collaborative signal processing, which often requires excessive communication and computation to be executed on resource-constrained sensor nodes. To address this problem, we propose an event-triggered diffusion Kalman filter, which collects measurements and exchanges messages between nodes based on a local signal indicating the estimation error. On this basis, we develop an energy-aware state estimation algorithm that regulates the resource consumption in wireless networks and ensures the effectiveness of every consumed resource. The proposed algorithm does not require the nodes to share its local covariance matrices, and thereby allows considerably reducing the number of transmission messages. To confirm its efficiency, we apply the proposed algorithm to the distributed simultaneous localization and time synchronization problem and evaluate it on a physical testbed of a mobile quadrotor node and stationary custom ultra-wideband wireless devices. The obtained experimental results indicate that the proposed algorithm allows saving 86% of the communication overhead associated with the original diffusion Kalman filter while causing deterioration of performance by 16% only. We make the Matlab code and the real testing data available online1.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1