首页 > 最新文献

2021 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
Differentially Private Generative Adversarial Networks with Model Inversion 具有模型反演的差分私有生成对抗网络
Pub Date : 2021-12-01 DOI: 10.1109/WIFS53200.2021.9648378
Dongjie Chen, S. Cheung, C. Chuah, S. Ozonoff
To protect sensitive data in training a Generative Adversarial Network (GAN), the standard approach is to use differentially private (DP) stochastic gradient descent method in which controlled noise is added to the gradients. The quality of the output synthetic samples can be adversely affected and the training of the network may not even converge in the presence of these noises. We propose Differentially Private Model Inversion (DPMI) method where the private data is first mapped to the latent space via a public generator, followed by a lower-dimensional DP-GAN with better convergent properties. Experimental results on standard datasets CIFAR10 and SVHN as well as on a facial landmark dataset for Autism screening show that our approach outperforms the standard DP-GAN method based on Inception Score, Frechet Inception Distance, and classification accuracy under the same privacy guarantee.
为了在生成对抗网络(GAN)训练中保护敏感数据,标准的方法是使用差分私有(DP)随机梯度下降方法,该方法在梯度中加入受控噪声。在这些噪声存在的情况下,输出合成样本的质量会受到不利影响,网络的训练甚至可能无法收敛。我们提出了差分私有模型反演(DPMI)方法,其中私有数据首先通过公共生成器映射到潜在空间,然后是具有更好收敛特性的低维DP-GAN。在标准数据集CIFAR10和SVHN以及用于自闭症筛查的面部地标数据集上的实验结果表明,我们的方法在相同隐私保证下优于基于Inception Score、Frechet Inception Distance和分类精度的标准DP-GAN方法。
{"title":"Differentially Private Generative Adversarial Networks with Model Inversion","authors":"Dongjie Chen, S. Cheung, C. Chuah, S. Ozonoff","doi":"10.1109/WIFS53200.2021.9648378","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648378","url":null,"abstract":"To protect sensitive data in training a Generative Adversarial Network (GAN), the standard approach is to use differentially private (DP) stochastic gradient descent method in which controlled noise is added to the gradients. The quality of the output synthetic samples can be adversely affected and the training of the network may not even converge in the presence of these noises. We propose Differentially Private Model Inversion (DPMI) method where the private data is first mapped to the latent space via a public generator, followed by a lower-dimensional DP-GAN with better convergent properties. Experimental results on standard datasets CIFAR10 and SVHN as well as on a facial landmark dataset for Autism screening show that our approach outperforms the standard DP-GAN method based on Inception Score, Frechet Inception Distance, and classification accuracy under the same privacy guarantee.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121053553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Differential Anomaly Detection for Facial Images 人脸图像的差分异常检测
Pub Date : 2021-10-07 DOI: 10.1109/WIFS53200.2021.9648392
Mathias Ibsen, Lázaro J. González Soler, C. Rathgeb, P. Drozdowski, M. Gomez-Barrero, C. Busch
Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals. Despite recent advances, face recognition systems have shown to be particularly vulnerable to identity attacks (i.e., digital manipulations and attack presentations). Identity attacks pose a big security threat as they can be used to gain unauthorised access and spread misinformation. In this context, most algorithms for detecting identity attacks generalise poorly to attack types that are unknown at training time. To tackle this problem, we introduce a differential anomaly detection framework in which deep face embeddings are first extracted from pairs of images (i.e., reference and probe) and then combined for identity attack detection. The experimental evaluation conducted over several databases shows a high generalisation capability of the proposed method for detecting unknown attacks in both the digital and physical domains.
人脸识别系统由于其方便性和准确性高,被广泛应用于政府和个人安全应用中,以自动识别个人。尽管最近取得了进展,但面部识别系统已被证明特别容易受到身份攻击(即数字操纵和攻击演示)。身份攻击构成了巨大的安全威胁,因为它们可以被用来获得未经授权的访问和传播错误信息。在这种情况下,大多数检测身份攻击的算法对训练时未知的攻击类型泛化得很差。为了解决这个问题,我们引入了一种差分异常检测框架,首先从图像对(即参考和探针)中提取深度人脸嵌入,然后将其组合起来进行身份攻击检测。在多个数据库上进行的实验评估表明,所提出的方法在数字和物理领域检测未知攻击方面具有很高的泛化能力。
{"title":"Differential Anomaly Detection for Facial Images","authors":"Mathias Ibsen, Lázaro J. González Soler, C. Rathgeb, P. Drozdowski, M. Gomez-Barrero, C. Busch","doi":"10.1109/WIFS53200.2021.9648392","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648392","url":null,"abstract":"Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals. Despite recent advances, face recognition systems have shown to be particularly vulnerable to identity attacks (i.e., digital manipulations and attack presentations). Identity attacks pose a big security threat as they can be used to gain unauthorised access and spread misinformation. In this context, most algorithms for detecting identity attacks generalise poorly to attack types that are unknown at training time. To tackle this problem, we introduce a differential anomaly detection framework in which deep face embeddings are first extracted from pairs of images (i.e., reference and probe) and then combined for identity attack detection. The experimental evaluation conducted over several databases shows a high generalisation capability of the proposed method for detecting unknown attacks in both the digital and physical domains.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132543166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Machine learning attack on copy detection patterns: are $1times 1$ patterns cloneable? 复制检测模式的机器学习攻击:$1乘以1$模式是可克隆的吗?
Pub Date : 2021-10-05 DOI: 10.1109/WIFS53200.2021.9648387
Roman Chaban, O. Taran, Joakim Tutt, T. Holotyak, Slavi Bonev, S. Voloshynovskiy
Nowadays, the modern economy critically requires reliable yet cheap protection solutions against product counterfeiting for the mass market. Copy detection patterns (CDP) are considered as such a solution in several applications. It is assumed that being printed at the maximum achievable limit of a printing resolution of an industrial printer with the smallest symbol size $1times 1$, the CDP cannot be copied with sufficient accuracy and thus are unclonable. In this paper, we challenge this hypothesis and consider a copy attack against the CDP based on machine learning. The experimental results based on samples produced on two industrial printers demonstrate that simple detection metrics used in the CDP authentication cannot reliably distinguish the original CDP from their fakes under certain printing conditions. Thus, the paper calls for a need of careful reconsideration of CDP cloneability and search for new authentication techniques and CDP optimization facing the current attack.
如今,现代经济迫切需要可靠而廉价的保护解决方案,以防止大众市场的产品假冒。拷贝检测模式(CDP)在一些应用中被认为是这样一种解决方案。假设以最小符号尺寸$1 × 1$的工业打印机打印分辨率的最大可实现限制进行打印,CDP不能以足够的精度复制,因此是不可克隆的。在本文中,我们挑战了这一假设,并考虑了一种基于机器学习的针对CDP的复制攻击。基于两台工业打印机样品的实验结果表明,在一定的打印条件下,用于CDP认证的简单检测指标不能可靠地区分真假CDP。因此,面对当前的攻击,需要认真考虑CDP的可克隆性,寻找新的认证技术和CDP优化。
{"title":"Machine learning attack on copy detection patterns: are $1times 1$ patterns cloneable?","authors":"Roman Chaban, O. Taran, Joakim Tutt, T. Holotyak, Slavi Bonev, S. Voloshynovskiy","doi":"10.1109/WIFS53200.2021.9648387","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648387","url":null,"abstract":"Nowadays, the modern economy critically requires reliable yet cheap protection solutions against product counterfeiting for the mass market. Copy detection patterns (CDP) are considered as such a solution in several applications. It is assumed that being printed at the maximum achievable limit of a printing resolution of an industrial printer with the smallest symbol size $1times 1$, the CDP cannot be copied with sufficient accuracy and thus are unclonable. In this paper, we challenge this hypothesis and consider a copy attack against the CDP based on machine learning. The experimental results based on samples produced on two industrial printers demonstrate that simple detection metrics used in the CDP authentication cannot reliably distinguish the original CDP from their fakes under certain printing conditions. Thus, the paper calls for a need of careful reconsideration of CDP cloneability and search for new authentication techniques and CDP optimization facing the current attack.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125747436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Scalable Fact-checking with Human-in-the-Loop 使用Human-in-the-Loop进行可扩展的事实核查
Pub Date : 2021-09-22 DOI: 10.1109/WIFS53200.2021.9648388
Jing Yang, D. Vega-Oliveros, Taís Seibt, Anderson Rocha
Researchers have been investigating automated solutions for fact-checking in various fronts. However, current approaches often overlook the fact that information released every day is escalating, and a large amount of them overlap. Intending to accelerate fact-checking, we bridge this gap by proposing a new pipeline – grouping similar messages and summarizing them into aggregated claims. Specifically, we first clean a set of social media posts (e.g., tweets) and build a graph of all posts based on their semantics; Then, we perform two clustering methods to group the messages for further claim summarization. We evaluate the summaries both quantitatively with ROUGE scores and qualitatively with human evaluation. We also generate a graph of summaries to verify that there is no significant overlap among them. The results reduced 28,818 original messages to 700 summary claims, showing the potential to speed up the fact-checking process by organizing and selecting representative claims from massive disorganized and redundant messages.
研究人员一直在研究各个方面的事实核查自动化解决方案。然而,目前的方法往往忽略了这样一个事实,即每天发布的信息都在不断升级,而且大量信息重叠。为了加速事实核查,我们提出了一种新的渠道来弥补这一差距——将类似的信息分组,并将它们汇总为汇总的声明。具体来说,我们首先清理一组社交媒体帖子(例如推文),并根据其语义构建所有帖子的图;然后,我们使用两种聚类方法对消息进行分组,以便进行进一步的索赔汇总。我们用ROUGE评分定量地评价总结,用人的评价定性地评价总结。我们还生成了一个总结图,以验证它们之间没有明显的重叠。结果将28,818条原始信息减少到700条摘要索赔,显示出通过从大量杂乱无章和冗余的信息中组织和选择具有代表性的索赔来加快事实核查过程的潜力。
{"title":"Scalable Fact-checking with Human-in-the-Loop","authors":"Jing Yang, D. Vega-Oliveros, Taís Seibt, Anderson Rocha","doi":"10.1109/WIFS53200.2021.9648388","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648388","url":null,"abstract":"Researchers have been investigating automated solutions for fact-checking in various fronts. However, current approaches often overlook the fact that information released every day is escalating, and a large amount of them overlap. Intending to accelerate fact-checking, we bridge this gap by proposing a new pipeline – grouping similar messages and summarizing them into aggregated claims. Specifically, we first clean a set of social media posts (e.g., tweets) and build a graph of all posts based on their semantics; Then, we perform two clustering methods to group the messages for further claim summarization. We evaluate the summaries both quantitatively with ROUGE scores and qualitatively with human evaluation. We also generate a graph of summaries to verify that there is no significant overlap among them. The results reduced 28,818 original messages to 700 summary claims, showing the potential to speed up the fact-checking process by organizing and selecting representative claims from massive disorganized and redundant messages.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125475193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Structural Watermarking to Deep Neural Networks via Network Channel Pruning 基于网络通道剪枝的深度神经网络结构水印
Pub Date : 2021-07-19 DOI: 10.1109/WIFS53200.2021.9648376
Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu, Xinpeng Zhang
In order to protect the intellectual property (IP) of deep neural networks (DNNs), many existing DNN watermarking techniques either embed watermarks directly into the DNN parameters or insert backdoor watermarks by fine-tuning the DNN parameters, which, however, cannot resist against various attack methods that remove watermarks by altering DNN parameters. In this paper, we bypass such attacks by introducing a structural watermarking scheme that utilizes channel pruning to embed the watermark into the host DNN architecture instead of crafting the DNN parameters. To be specific, during watermark embedding, we prune the internal channels of the host DNN with the channel pruning rates controlled by the watermark. During watermark extraction, the watermark is retrieved by identifying the channel pruning rates from the architecture of the target DNN model. Due to the superiority of pruning mechanism, the performance of the DNN model on its original task is reserved during watermark embedding. Experimental results have shown that, the proposed work enables the embedded watermark to be reliably recovered and provides a sufficient payload, without sacrificing the usability of the DNN model. It is also demonstrated that the proposed work is robust against common transforms and attacks designed for conventional watermarking approaches.
为了保护深度神经网络(DNN)的知识产权,现有的许多DNN水印技术要么直接将水印嵌入到DNN参数中,要么通过微调DNN参数插入后门水印,但无法抵御各种通过改变DNN参数来去除水印的攻击方法。在本文中,我们通过引入一种结构性水印方案来绕过这种攻击,该方案利用通道修剪将水印嵌入到主机DNN架构中,而不是制作DNN参数。具体来说,在水印嵌入过程中,我们对主机DNN的内部通道进行剪枝,由水印控制通道剪枝速率。在水印提取过程中,通过识别目标DNN模型的通道剪枝率来检索水印。由于修剪机制的优越性,在水印嵌入过程中,DNN模型保留了原有任务的性能。实验结果表明,在不牺牲深度神经网络模型可用性的前提下,该方法能够可靠地恢复嵌入的水印并提供足够的有效载荷。研究还表明,该方法对传统水印方法设计的常见变换和攻击具有鲁棒性。
{"title":"Structural Watermarking to Deep Neural Networks via Network Channel Pruning","authors":"Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu, Xinpeng Zhang","doi":"10.1109/WIFS53200.2021.9648376","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648376","url":null,"abstract":"In order to protect the intellectual property (IP) of deep neural networks (DNNs), many existing DNN watermarking techniques either embed watermarks directly into the DNN parameters or insert backdoor watermarks by fine-tuning the DNN parameters, which, however, cannot resist against various attack methods that remove watermarks by altering DNN parameters. In this paper, we bypass such attacks by introducing a structural watermarking scheme that utilizes channel pruning to embed the watermark into the host DNN architecture instead of crafting the DNN parameters. To be specific, during watermark embedding, we prune the internal channels of the host DNN with the channel pruning rates controlled by the watermark. During watermark extraction, the watermark is retrieved by identifying the channel pruning rates from the architecture of the target DNN model. Due to the superiority of pruning mechanism, the performance of the DNN model on its original task is reserved during watermark embedding. Experimental results have shown that, the proposed work enables the embedded watermark to be reliably recovered and provides a sufficient payload, without sacrificing the usability of the DNN model. It is also demonstrated that the proposed work is robust against common transforms and attacks designed for conventional watermarking approaches.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117087203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Quality of Service Guarantees for Physical Unclonable Functions 物理不可克隆功能的服务质量保证
Pub Date : 2021-07-12 DOI: 10.1109/WIFS53200.2021.9648377
O. Günlü, R. Schaefer, H. Poor
We consider a secret key agreement problem in which noisy physical unclonable function (PUF) outputs facilitate reliable, secure, and private key agreement with the help of public, noiseless, and authenticated storage. PUF outputs are highly correlated, so transform coding methods have been combined with scalar quantizers to extract uncorrelated bit sequences with reliability guarantees. For PUF circuits with continuous-valued outputs, the models for transformed outputs are made more realistic by replacing the fitted distributions with corresponding truncated ones. The state-of-the-art PUF methods that provide reliability guarantees to each extracted bit are shown to be inadequate to guarantee the same reliability level for all PUF outputs. Thus, a quality of service parameter is introduced to control the percentage of PUF outputs for which a target reliability level can be guaranteed. A public ring oscillator (RO) output dataset is used to illustrate that a truncated Gaussian distribution can be fitted to transformed RO outputs that are inputs to uniform scalar quantizers such that reliability guarantees can be provided for each bit extracted from any PUF device under additive Gaussian noise components by eliminating a small subset of PUF outputs. Furthermore, we conversely show that it is not possible to provide such reliability guarantees without eliminating any PUF output if no extra secrecy and privacy leakage is allowed.
我们考虑一个密钥协议问题,其中有噪声的物理不可克隆函数(PUF)输出在公共、无噪声和经过身份验证的存储的帮助下促进可靠、安全和私钥协议。由于PUF输出高度相关,因此将变换编码方法与标量量化相结合,在可靠性保证的情况下提取不相关的位序列。对于连续输出的PUF电路,用相应的截断分布代替拟合分布,使变换后的输出模型更加真实。最先进的PUF方法为每个提取的比特提供可靠性保证,但不足以保证所有PUF输出的相同可靠性水平。因此,引入服务质量参数来控制可保证目标可靠性水平的PUF输出的百分比。公共环振荡器(RO)输出数据集用于说明截断的高斯分布可以拟合到作为均匀标量量化器输入的转换RO输出,这样通过消除PUF输出的一小部分,可以为在加性高斯噪声分量下从任何PUF设备提取的每个比特提供可靠性保证。此外,我们反过来表明,如果不允许额外的保密和隐私泄露,则不可能在不消除任何PUF输出的情况下提供这种可靠性保证。
{"title":"Quality of Service Guarantees for Physical Unclonable Functions","authors":"O. Günlü, R. Schaefer, H. Poor","doi":"10.1109/WIFS53200.2021.9648377","DOIUrl":"https://doi.org/10.1109/WIFS53200.2021.9648377","url":null,"abstract":"We consider a secret key agreement problem in which noisy physical unclonable function (PUF) outputs facilitate reliable, secure, and private key agreement with the help of public, noiseless, and authenticated storage. PUF outputs are highly correlated, so transform coding methods have been combined with scalar quantizers to extract uncorrelated bit sequences with reliability guarantees. For PUF circuits with continuous-valued outputs, the models for transformed outputs are made more realistic by replacing the fitted distributions with corresponding truncated ones. The state-of-the-art PUF methods that provide reliability guarantees to each extracted bit are shown to be inadequate to guarantee the same reliability level for all PUF outputs. Thus, a quality of service parameter is introduced to control the percentage of PUF outputs for which a target reliability level can be guaranteed. A public ring oscillator (RO) output dataset is used to illustrate that a truncated Gaussian distribution can be fitted to transformed RO outputs that are inputs to uniform scalar quantizers such that reliability guarantees can be provided for each bit extracted from any PUF device under additive Gaussian noise components by eliminating a small subset of PUF outputs. Furthermore, we conversely show that it is not possible to provide such reliability guarantees without eliminating any PUF output if no extra secrecy and privacy leakage is allowed.","PeriodicalId":196985,"journal":{"name":"2021 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128157691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1