首页 > 最新文献

2019 2nd International Conference on Data Intelligence and Security (ICDIS)最新文献

英文 中文
An Immersive VR Interactive Learning System for Tenon Structure Training 一种用于榫卯结构训练的沉浸式VR交互学习系统
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00025
Liang Chen, Lingling Wu, Xuwei Li, Jin Xu
Tenons are typical wood structures in Chinese ancient architecture, but it is difficult to understand the structures and connection principles because it is impossible to disassemble ancient buildings. In this paper, we present an immersive interactive learning system for tenon structure training with virtual reality (VR) technology and motion detection technology. This VR learning system includes four modules, model database, software environment, hardware environment, and human-computer interaction module. We provide immersive learning experience, the integrated interactive feedback and natural gesture interaction in this system. The survey results after usability test show that student's learning interest and efficient are promoted significantly by using this immersive VR interactive learning method.
榫卯是中国古建筑中典型的木结构,但由于古建筑无法拆卸,因此很难理解其结构和连接原理。本文采用虚拟现实技术和运动检测技术,设计了一种用于榫卯结构训练的沉浸式交互学习系统。该虚拟现实学习系统包括模型数据库、软件环境、硬件环境和人机交互四个模块。我们在这个系统中提供了沉浸式的学习体验、集成的交互反馈和自然的手势交互。可用性测试后的调查结果表明,使用这种沉浸式VR交互学习方法,学生的学习兴趣和学习效率都得到了显著的提升。
{"title":"An Immersive VR Interactive Learning System for Tenon Structure Training","authors":"Liang Chen, Lingling Wu, Xuwei Li, Jin Xu","doi":"10.1109/ICDIS.2019.00025","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00025","url":null,"abstract":"Tenons are typical wood structures in Chinese ancient architecture, but it is difficult to understand the structures and connection principles because it is impossible to disassemble ancient buildings. In this paper, we present an immersive interactive learning system for tenon structure training with virtual reality (VR) technology and motion detection technology. This VR learning system includes four modules, model database, software environment, hardware environment, and human-computer interaction module. We provide immersive learning experience, the integrated interactive feedback and natural gesture interaction in this system. The survey results after usability test show that student's learning interest and efficient are promoted significantly by using this immersive VR interactive learning method.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126314541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Detection Using Power Consumption and Network Traffic Data 利用功耗和网络流量数据进行恶意软件检测
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00016
J. Jiménez, K. Goseva-Popstojanova
Even though malware detection is an active area of research, not many works have used features extracted from physical properties, such as power consumption. This paper is focused on malware detection using power consumption and network traffic data collected using our experimental testbed. Seven power-based and eighteen network traffic-based features were extracted and ten supervised machine learning algorithms were used for classification. The main findings include: (1) Among the best performing learners, Random Forest had the highest F-score and close to the highest G-score. (2) Power data extracted from the +12V CPU rails led to better performance than power data from the other three voltage rails. (3) Using only power-based features provided better performance than using only network traffic-based features; using both types of features had the best performance. (4) Feature selection based on information gain was used to identify the smallest numbers of features sufficient to successfully distinguish malware from non-malicious software. The top eleven features provided the same performance as using all 25 features. Five out of seven power-based features were among the top eleven features.
尽管恶意软件检测是一个活跃的研究领域,但很少有工作使用从物理属性中提取的特征,比如功耗。本文的重点是利用我们的实验测试平台收集的功耗和网络流量数据进行恶意软件检测。提取了7个基于功率的特征和18个基于网络流量的特征,并使用了10种监督机器学习算法进行分类。主要发现包括:(1)在表现最好的学习者中,随机森林的f分最高,并且接近最高的g分。(2)从+12V CPU轨中提取的功率数据优于从其他三个电压轨中提取的功率数据。(3)仅使用基于功率的特性比仅使用基于网络流量的特性提供更好的性能;使用这两种类型的功能具有最佳性能。(4)采用基于信息增益的特征选择,识别出最小数量的特征,足以成功区分恶意软件和非恶意软件。前11个特性提供了与使用全部25个特性相同的性能。7个基于动力的功能中有5个位列前11名。
{"title":"Malware Detection Using Power Consumption and Network Traffic Data","authors":"J. Jiménez, K. Goseva-Popstojanova","doi":"10.1109/ICDIS.2019.00016","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00016","url":null,"abstract":"Even though malware detection is an active area of research, not many works have used features extracted from physical properties, such as power consumption. This paper is focused on malware detection using power consumption and network traffic data collected using our experimental testbed. Seven power-based and eighteen network traffic-based features were extracted and ten supervised machine learning algorithms were used for classification. The main findings include: (1) Among the best performing learners, Random Forest had the highest F-score and close to the highest G-score. (2) Power data extracted from the +12V CPU rails led to better performance than power data from the other three voltage rails. (3) Using only power-based features provided better performance than using only network traffic-based features; using both types of features had the best performance. (4) Feature selection based on information gain was used to identify the smallest numbers of features sufficient to successfully distinguish malware from non-malicious software. The top eleven features provided the same performance as using all 25 features. Five out of seven power-based features were among the top eleven features.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Concurrency Strategies for Attack Graph Generation 攻击图生成的并发策略
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00033
Ming Li, P. Hawrylak, J. Hale
The network attack graph is a powerful tool for analyzing network security, but the generation of a large-scale graph is non-trivial. The main challenge is from the explosion of network state space, which greatly increases time and storage costs. In this paper, three parallel algorithms are proposed to generate scalable attack graphs. An OpenMP-based programming implementation is used to test their performance. Compared with the serial algorithm, the best performance from the proposed algorithms provides a 10X speedup.
网络攻击图是分析网络安全的有力工具,但大规模攻击图的生成是一项艰巨的任务。主要的挑战来自于网络状态空间的爆炸式增长,这大大增加了时间和存储成本。本文提出了三种生成可伸缩攻击图的并行算法。使用基于openmp的编程实现来测试它们的性能。与串行算法相比,所提算法的最佳性能提供了10倍的加速。
{"title":"Concurrency Strategies for Attack Graph Generation","authors":"Ming Li, P. Hawrylak, J. Hale","doi":"10.1109/ICDIS.2019.00033","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00033","url":null,"abstract":"The network attack graph is a powerful tool for analyzing network security, but the generation of a large-scale graph is non-trivial. The main challenge is from the explosion of network state space, which greatly increases time and storage costs. In this paper, three parallel algorithms are proposed to generate scalable attack graphs. An OpenMP-based programming implementation is used to test their performance. Compared with the serial algorithm, the best performance from the proposed algorithms provides a 10X speedup.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"699 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Accelerated Hierarchical Approach for Object Shape Extraction and Recognition 一种快速分层的物体形状提取与识别方法
Pub Date : 2019-06-01 DOI: 10.1109/ICDIS.2019.00030
M. Quweider, Bassam Arshad, Hansheng Lei, Liyu Zhang, Fitratullah Khan
We present a novel automatic supervised object recognition algorithm based on a scale and rotation invariant Fourier descriptors algorithm. The algorithm is hierarchical in nature allowing it to capture the inherent intra-contour spatial relationships between the parent and child contours of an object by building a tree-structure of the top-level contours that make the distinctive features of the object to be recognized. A set of distance metrics are combined to measure the similarity between two objects under the hierarchical model. To test the algorithm, a diverse database of shapes is created and used to train standard classification algorithms, for shape-labeling. The implemented algorithm takes advantage of the multi-threaded architecture and GPU efficient image-processing functions present in OpenCV wherever possible, speeding up the running time and making it efficient for use in real-time applications. The technique is successfully tested on common traffic and road signs of real-world images, with excellent overall performance that is robust to low-to-moderate noise levels.
提出了一种基于尺度和旋转不变傅里叶描述子算法的自动监督目标识别算法。该算法本质上是分层的,允许它通过构建顶层轮廓的树状结构来捕获对象的父轮廓和子轮廓之间固有的轮廓内部空间关系,从而使目标的独特特征得到识别。在层次模型下,结合一组距离度量来度量两个对象之间的相似性。为了测试该算法,创建了一个不同形状的数据库,并用于训练用于形状标记的标准分类算法。实现的算法尽可能地利用了OpenCV中存在的多线程架构和GPU高效图像处理功能,加快了运行时间,使其在实时应用程序中使用效率更高。该技术已成功地在现实世界的普通交通和道路标志图像上进行了测试,具有出色的整体性能,对低至中等噪声水平具有鲁棒性。
{"title":"An Accelerated Hierarchical Approach for Object Shape Extraction and Recognition","authors":"M. Quweider, Bassam Arshad, Hansheng Lei, Liyu Zhang, Fitratullah Khan","doi":"10.1109/ICDIS.2019.00030","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00030","url":null,"abstract":"We present a novel automatic supervised object recognition algorithm based on a scale and rotation invariant Fourier descriptors algorithm. The algorithm is hierarchical in nature allowing it to capture the inherent intra-contour spatial relationships between the parent and child contours of an object by building a tree-structure of the top-level contours that make the distinctive features of the object to be recognized. A set of distance metrics are combined to measure the similarity between two objects under the hierarchical model. To test the algorithm, a diverse database of shapes is created and used to train standard classification algorithms, for shape-labeling. The implemented algorithm takes advantage of the multi-threaded architecture and GPU efficient image-processing functions present in OpenCV wherever possible, speeding up the running time and making it efficient for use in real-time applications. The technique is successfully tested on common traffic and road signs of real-world images, with excellent overall performance that is robust to low-to-moderate noise levels.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128923203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter 一个端到端框架来识别Twitter上的致病社交媒体账户
Pub Date : 2019-05-04 DOI: 10.1109/ICDIS.2019.00027
Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, P. Shakarian
Pathogenic Social Media (PSM) accounts such as terrorist supporter accounts and fake news writers have the capability of spreading disinformation to viral proportions. Early detection of PSM accounts is crucial as they are likely to be key users to make malicious information "viral". In this paper, we adopt the causal inference framework along with graph-based metrics in order to distinguish PSMs from normal users within a short time of their activities. We propose both supervised and semi-supervised approaches without taking the network information and content into account. Results on a real-world the dataset from Twitter accentuates the advantage of our proposed frameworks. We show our approach achieves 0.28 improvement in F1 score over existing approaches with the precision of 0.90 and F1 score of 0.63.
恐怖分子支持者账户和假新闻作者等致病性社交媒体账户具有将虚假信息传播到病毒式传播的能力。PSM账户的早期检测至关重要,因为它们很可能是恶意信息“病毒式传播”的关键用户。在本文中,我们采用因果推理框架以及基于图形的指标,以便在短时间内将psm与正常用户区分开来。我们提出了监督和半监督两种方法,但不考虑网络信息和内容。在真实世界的Twitter数据集上的结果强调了我们提出的框架的优势。我们表明,我们的方法比现有方法的F1分数提高了0.28,精度为0.90,F1分数为0.63。
{"title":"An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter","authors":"Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, P. Shakarian","doi":"10.1109/ICDIS.2019.00027","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00027","url":null,"abstract":"Pathogenic Social Media (PSM) accounts such as terrorist supporter accounts and fake news writers have the capability of spreading disinformation to viral proportions. Early detection of PSM accounts is crucial as they are likely to be key users to make malicious information \"viral\". In this paper, we adopt the causal inference framework along with graph-based metrics in order to distinguish PSMs from normal users within a short time of their activities. We propose both supervised and semi-supervised approaches without taking the network information and content into account. Results on a real-world the dataset from Twitter accentuates the advantage of our proposed frameworks. We show our approach achieves 0.28 improvement in F1 score over existing approaches with the precision of 0.90 and F1 score of 0.63.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128410155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection of Violent Extremists in Social Media 发现社交媒体中的暴力极端分子
Pub Date : 2019-02-05 DOI: 10.1109/ICDIS.2019.00014
Hamidreza Alvari, Soumajyoti Sarkar, P. Shakarian
The ease of use of the Internet has enabled violent extremists such as the Islamic State of Iraq and Syria (ISIS) to easily reach large audience, build personal relationships and increase recruitment. Social media are primarily based on the reports they receive from their own users to mitigate the problem. Despite efforts of social media in suspending many accounts, this solution is not guaranteed to be effective, because not all extremists are caught this way, or they can simply return with another account or migrate to other social networks. In this paper, we design an automatic detection scheme that using as little as three groups of information related to usernames, profile, and textual content of users, determines whether or not a given username belongs to an extremist user. We first demonstrate that extremists are inclined to adopt usernames that are similar to the ones that their like-minded have adopted in the past. We then propose a detection framework that deploys features which are highly indicative of potential online extremism. Results on a real-world ISIS-related dataset from Twitter demonstrate the effectiveness of the methodology in identifying extremist users.
互联网的易用性使伊拉克和叙利亚伊斯兰国(ISIS)等暴力极端分子能够轻松地接触到大量受众,建立个人关系并增加招募。社交媒体主要是基于他们从自己的用户那里收到的报告来缓解这个问题。尽管社交媒体努力封禁许多账号,但这种解决办法并不能保证有效,因为并不是所有的极端分子都是以这种方式被抓住的,或者他们可以简单地用另一个账号回去,或者转移到其他社交网络。在本文中,我们设计了一种自动检测方案,该方案使用与用户名,配置文件和用户文本内容相关的三组信息来确定给定用户名是否属于极端用户。我们首先证明,极端分子倾向于使用与他们志同道合的人过去使用过的用户名相似的用户名。然后,我们提出了一个检测框架,该框架部署了高度指示潜在在线极端主义的特征。来自Twitter的真实世界isis相关数据集的结果证明了该方法在识别极端主义用户方面的有效性。
{"title":"Detection of Violent Extremists in Social Media","authors":"Hamidreza Alvari, Soumajyoti Sarkar, P. Shakarian","doi":"10.1109/ICDIS.2019.00014","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00014","url":null,"abstract":"The ease of use of the Internet has enabled violent extremists such as the Islamic State of Iraq and Syria (ISIS) to easily reach large audience, build personal relationships and increase recruitment. Social media are primarily based on the reports they receive from their own users to mitigate the problem. Despite efforts of social media in suspending many accounts, this solution is not guaranteed to be effective, because not all extremists are caught this way, or they can simply return with another account or migrate to other social networks. In this paper, we design an automatic detection scheme that using as little as three groups of information related to usernames, profile, and textual content of users, determines whether or not a given username belongs to an extremist user. We first demonstrate that extremists are inclined to adopt usernames that are similar to the ones that their like-minded have adopted in the past. We then propose a detection framework that deploys features which are highly indicative of potential online extremism. Results on a real-world ISIS-related dataset from Twitter demonstrate the effectiveness of the methodology in identifying extremist users.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130189350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts 霍克斯理解致病社交媒体账户影响的过程
Pub Date : 2019-02-05 DOI: 10.1109/ICDIS.2019.00013
Hamidreza Alvari, P. Shakarian
Over the past years, political events and public opinion on the Web have been allegedly manipulated by accounts dedicated to spreading disinformation and performing malicious activities on social media. These accounts hereafter referred to as "Pathogenic Social Media (PSM)" accounts, are often controlled by terrorist supporters, water armies or fake news writers and hence can pose threats to social media and general public. Understanding and analyzing PSMs could help social media firms devise sophisticated and automated techniques that could be deployed to stop them from reaching their audience and consequently reduce their threat. In this paper, we leverage the well-known statistical technique "Hawkes Process" to quantify the influence of PSM accounts on the dissemination of malicious information on social media platforms. Our findings on a real world ISIS-related dataset from Twitter indicate that PSMs are significantly different from regular users in making a message viral. Specifically, we observed that PSMs do not usually post URLs from mainstream news sources. Instead, their tweets usually receive large impact on audience, if contained URLs from Facebook and alternative news outlets. In contrary, tweets posted by regular users receive nearly equal impression regardless of the posted URLs and their sources. Our findings can further shed light on understanding and detecting PSM accounts.
在过去的几年里,网络上的政治事件和公众舆论据称被专门在社交媒体上传播虚假信息和进行恶意活动的账户操纵。这些账户后来被称为“致病社交媒体(PSM)”账户,通常由恐怖分子支持者、水军或假新闻作者控制,因此可能对社交媒体和公众构成威胁。理解和分析psm可以帮助社交媒体公司设计复杂和自动化的技术,可以用来阻止他们接触到他们的受众,从而减少他们的威胁。在本文中,我们利用著名的统计技术“霍克斯过程”来量化PSM账户对社交媒体平台上恶意信息传播的影响。我们对来自Twitter的真实世界isis相关数据集的研究结果表明,psm在传播消息方面与普通用户有很大不同。具体来说,我们观察到psm通常不会发布来自主流新闻来源的url。相反,如果包含来自Facebook和其他新闻媒体的url,他们的推文通常会对受众产生很大的影响。相反,普通用户发布的tweet无论发布的url和来源如何,都会获得几乎相同的印象。我们的发现可以进一步阐明理解和检测PSM帐户。
{"title":"Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts","authors":"Hamidreza Alvari, P. Shakarian","doi":"10.1109/ICDIS.2019.00013","DOIUrl":"https://doi.org/10.1109/ICDIS.2019.00013","url":null,"abstract":"Over the past years, political events and public opinion on the Web have been allegedly manipulated by accounts dedicated to spreading disinformation and performing malicious activities on social media. These accounts hereafter referred to as \"Pathogenic Social Media (PSM)\" accounts, are often controlled by terrorist supporters, water armies or fake news writers and hence can pose threats to social media and general public. Understanding and analyzing PSMs could help social media firms devise sophisticated and automated techniques that could be deployed to stop them from reaching their audience and consequently reduce their threat. In this paper, we leverage the well-known statistical technique \"Hawkes Process\" to quantify the influence of PSM accounts on the dissemination of malicious information on social media platforms. Our findings on a real world ISIS-related dataset from Twitter indicate that PSMs are significantly different from regular users in making a message viral. Specifically, we observed that PSMs do not usually post URLs from mainstream news sources. Instead, their tweets usually receive large impact on audience, if contained URLs from Facebook and alternative news outlets. In contrary, tweets posted by regular users receive nearly equal impression regardless of the posted URLs and their sources. Our findings can further shed light on understanding and detecting PSM accounts.","PeriodicalId":181673,"journal":{"name":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2019 2nd International Conference on Data Intelligence and Security (ICDIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1