首页 > 最新文献

2012 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
Partially supervised learning for radical opinion identification in hate group web forums 仇恨团体论坛中激进观点识别的部分监督学习
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284099
Ming Yang, Hsinchun Chen
Web forums are frequently used as platforms for the exchange of information and opinions, as well as propaganda dissemination. But online content can be misused when the information being distributed, such as radical opinions, is unsolicited or inappropriate. However, radical opinion is highly hidden and distributed in Web forums, while non-radical content is unspecific and topically more diverse. It is costly and time consuming to label a large amount of radical content (positive examples) and non-radical content (negative examples) for training classification systems. Nevertheless, it is easy to obtain large volumes of unlabeled content in Web forums. In this paper, we propose and develop a topic-sensitive partially supervised learning approach to address the difficulties in radical opinion identification in hate group Web forums. Specifically, we design a labeling heuristic to extract high quality positive examples and negative examples from unlabeled datasets. The empirical evaluation results from two large hate group Web forums suggest that our proposed approach generally outperforms the benchmark techniques and exhibits more stable performance than its counterparts.
网络论坛经常被用作交流信息和意见以及宣传传播的平台。但是,当被传播的信息,如激进的观点,是未经请求或不适当的,在线内容可能被滥用。然而,激进的观点是高度隐藏和分布在网络论坛,而非激进的内容是不具体的,话题更多样化。对于训练分类系统来说,对大量激进内容(正例)和非激进内容(反例)进行标注成本高、耗时长。然而,在Web论坛中很容易获得大量未标记的内容。在本文中,我们提出并开发了一种主题敏感的部分监督学习方法,以解决仇恨小组网络论坛中激进意见识别的困难。具体来说,我们设计了一个标记启发式算法来从未标记的数据集中提取高质量的正例和负例。来自两个大型仇恨组织Web论坛的实证评估结果表明,我们提出的方法通常优于基准技术,并且表现出比同类方法更稳定的性能。
{"title":"Partially supervised learning for radical opinion identification in hate group web forums","authors":"Ming Yang, Hsinchun Chen","doi":"10.1109/ISI.2012.6284099","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284099","url":null,"abstract":"Web forums are frequently used as platforms for the exchange of information and opinions, as well as propaganda dissemination. But online content can be misused when the information being distributed, such as radical opinions, is unsolicited or inappropriate. However, radical opinion is highly hidden and distributed in Web forums, while non-radical content is unspecific and topically more diverse. It is costly and time consuming to label a large amount of radical content (positive examples) and non-radical content (negative examples) for training classification systems. Nevertheless, it is easy to obtain large volumes of unlabeled content in Web forums. In this paper, we propose and develop a topic-sensitive partially supervised learning approach to address the difficulties in radical opinion identification in hate group Web forums. Specifically, we design a labeling heuristic to extract high quality positive examples and negative examples from unlabeled datasets. The empirical evaluation results from two large hate group Web forums suggest that our proposed approach generally outperforms the benchmark techniques and exhibits more stable performance than its counterparts.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Extracting semantic information structures from free text law enforcement data 从自由文本执法数据中提取语义信息结构
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284291
James R. Johnson, Anita Miller, L. Khan, B. Thuraisingham
A detective distributes information on a current case to his law enforcement peers. He quickly receives a computer generated response with leads identified within hundreds of thousands of previously distributed free text documents from thousands of other detectives. The challenges lie in the nature of free text - unstructured formats, confusing word usage, cut-andpaste additions, abbreviations, inserted html/xml tags, multimedia content, and domain-specific terminology. This research proposes a new data structure, the semantic information structure, which encapsulates the extracted content information on classes of information such as people, vehicles, events, organizations, objects, and locations as well as the contextual information about the connections and measures to enable prioritization of files containing related pieces of content. The structure is organized to be a result of automated natural language processing methods that extract entities, expanded entity phrases and their links which are driven by ontologies, DLSafe rules, abductive hypotheses and semantic composition. Importance and significance measures aid in prioritization.
一名侦探将当前案件的信息分发给他的执法同僚。他很快就收到了计算机生成的回复,其中包含从数千名其他侦探先前分发的数十万份免费文本文件中识别出的线索。挑战在于自由文本的本质——非结构化格式、令人困惑的单词用法、剪切和粘贴添加、缩写、插入的html/xml标记、多媒体内容和特定于领域的术语。本研究提出了一种新的数据结构,即语义信息结构,它将提取的内容信息封装在诸如人、车辆、事件、组织、对象和位置等信息类别上,以及关于连接和度量的上下文信息,从而能够对包含相关内容的文件进行优先级排序。该结构被组织为自动自然语言处理方法的结果,这些方法提取实体、扩展实体短语及其链接,这些链接由本体、DLSafe规则、溯因假设和语义组合驱动。重要性和意义度量有助于确定优先级。
{"title":"Extracting semantic information structures from free text law enforcement data","authors":"James R. Johnson, Anita Miller, L. Khan, B. Thuraisingham","doi":"10.1109/ISI.2012.6284291","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284291","url":null,"abstract":"A detective distributes information on a current case to his law enforcement peers. He quickly receives a computer generated response with leads identified within hundreds of thousands of previously distributed free text documents from thousands of other detectives. The challenges lie in the nature of free text - unstructured formats, confusing word usage, cut-andpaste additions, abbreviations, inserted html/xml tags, multimedia content, and domain-specific terminology. This research proposes a new data structure, the semantic information structure, which encapsulates the extracted content information on classes of information such as people, vehicles, events, organizations, objects, and locations as well as the contextual information about the connections and measures to enable prioritization of files containing related pieces of content. The structure is organized to be a result of automated natural language processing methods that extract entities, expanded entity phrases and their links which are driven by ontologies, DLSafe rules, abductive hypotheses and semantic composition. Importance and significance measures aid in prioritization.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126368722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Evaluating source trustability with data provenance: A research note 用数据来源评估来源的可信度:一份研究报告
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284145
A. Badia
One of the main challenges in intelligence work is to assess the trustworthiness of data sources. In an adversarial setting, in which the subjects under study actively try to disturb the data gathering process, trustworthiness is one of the most important properties of a source. The recent increase in usage of open source data has exacerbated the problem, due to the proliferation of sources. In this paper we propose computerized methods to help analysts evaluate the truthfulness of data sources (open or not). We apply methods developed in database and Semantic Web research to determine data quality (which includes truthfulness but also other related aspects like accuracy, timeliness, etc.). Research on data quality has made frequent use of provenance metadata. This is metadata related to the origin of the data: where it comes from, how and when it was obtained, and any relevant conditions that might help determine how it came to be in its current form. We study the application of similar methods to the particular situation of the Intelligence analyst, focusing on trust. This paper describes ongoing research; what is explained here is a first attempt at tackling this complex but very important problem. Due to lack of space, relevant work in the research literature is not discussed, and several technical considerations are omitted; finally, further research directions are only sketched.
情报工作的主要挑战之一是评估数据源的可信度。在对抗性环境中,研究对象积极地试图干扰数据收集过程,可信度是信息源最重要的属性之一。由于数据源的激增,最近开源数据使用量的增加加剧了这个问题。在本文中,我们提出了计算机化的方法来帮助分析人员评估数据源(开放或不开放)的真实性。我们应用数据库和语义网研究中开发的方法来确定数据质量(包括真实性,以及其他相关方面,如准确性,及时性等)。在数据质量的研究中,经常使用来源元数据。这是与数据来源相关的元数据:数据来自何处、如何以及何时获得,以及可能有助于确定数据如何以当前形式出现的任何相关条件。我们研究了类似方法在情报分析员的特殊情况下的应用,重点是信任。本文描述了正在进行的研究;这里解释的是解决这个复杂但非常重要的问题的第一次尝试。由于篇幅所限,没有对研究文献中的相关工作进行讨论,并省略了一些技术考虑;最后,对进一步的研究方向进行了概述。
{"title":"Evaluating source trustability with data provenance: A research note","authors":"A. Badia","doi":"10.1109/ISI.2012.6284145","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284145","url":null,"abstract":"One of the main challenges in intelligence work is to assess the trustworthiness of data sources. In an adversarial setting, in which the subjects under study actively try to disturb the data gathering process, trustworthiness is one of the most important properties of a source. The recent increase in usage of open source data has exacerbated the problem, due to the proliferation of sources. In this paper we propose computerized methods to help analysts evaluate the truthfulness of data sources (open or not). We apply methods developed in database and Semantic Web research to determine data quality (which includes truthfulness but also other related aspects like accuracy, timeliness, etc.). Research on data quality has made frequent use of provenance metadata. This is metadata related to the origin of the data: where it comes from, how and when it was obtained, and any relevant conditions that might help determine how it came to be in its current form. We study the application of similar methods to the particular situation of the Intelligence analyst, focusing on trust. This paper describes ongoing research; what is explained here is a first attempt at tackling this complex but very important problem. Due to lack of space, relevant work in the research literature is not discussed, and several technical considerations are omitted; finally, further research directions are only sketched.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128696535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation method for node importance based on node condensation in terrorism networks 恐怖主义网络中基于节点凝聚的节点重要性评价方法
Pub Date : 2012-06-01 DOI: 10.1109/ISI.2012.6284301
Ben-xian Li, Meng-jun Li, Duoyong Sun, Jiang Li, Wenju Li
It is important for us to estimate centrality degree of terrorist networks. In this paper, a novel method was presented by us to evaluate terrorism network centrality nodes. The algorithm is based on network cohesion degree measures used in social network analysis. The advantage of this method is to be considered both degree and position of a node. The experimental results show that this method of efficiency has some advantage over betweenness centrality method.
对恐怖主义网络的中心性程度进行评估对我们的研究具有重要意义。本文提出了一种评估恐怖主义网络中心性节点的新方法。该算法基于社会网络分析中使用的网络内聚度度量。该方法的优点是可以同时考虑节点的度和位置。实验结果表明,该方法的效率优于中间中心法。
{"title":"Evaluation method for node importance based on node condensation in terrorism networks","authors":"Ben-xian Li, Meng-jun Li, Duoyong Sun, Jiang Li, Wenju Li","doi":"10.1109/ISI.2012.6284301","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284301","url":null,"abstract":"It is important for us to estimate centrality degree of terrorist networks. In this paper, a novel method was presented by us to evaluate terrorism network centrality nodes. The algorithm is based on network cohesion degree measures used in social network analysis. The advantage of this method is to be considered both degree and position of a node. The experimental results show that this method of efficiency has some advantage over betweenness centrality method.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131092094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of SNODSOC: Novel class detection for social network analysis SNODSOC的设计与实现:用于社会网络分析的新型类检测
Pub Date : 2012-06-01 DOI: 10.1109/ISI.2012.6284312
Satyen Abrol, L. Khan, V. Khadilkar, B. Thuraisingham, Tyrone Cadenhead
This paper describes a framework, SNODSOC (Stream based novel class detection for social network analysis), that detects evolving patterns and trends in social microblogs. SNODSOC extends our powerful data mining system, SNOD (Stream-based Novel Class Detection) for now detecting novel patterns and trends within microblogs.
本文描述了一个框架,SNODSOC(基于流的社交网络分析新类检测),用于检测社交微博的演变模式和趋势。SNODSOC扩展了我们强大的数据挖掘系统,SNOD(基于流的新颖类检测),现在可以检测微博中的新颖模式和趋势。
{"title":"Design and implementation of SNODSOC: Novel class detection for social network analysis","authors":"Satyen Abrol, L. Khan, V. Khadilkar, B. Thuraisingham, Tyrone Cadenhead","doi":"10.1109/ISI.2012.6284312","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284312","url":null,"abstract":"This paper describes a framework, SNODSOC (Stream based novel class detection for social network analysis), that detects evolving patterns and trends in social microblogs. SNODSOC extends our powerful data mining system, SNOD (Stream-based Novel Class Detection) for now detecting novel patterns and trends within microblogs.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129556652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rebel with many causes: A computational model of insurgency 多种原因的反叛:叛乱的计算模型
Pub Date : 2012-06-01 DOI: 10.1109/ISI.2012.6284097
S. Pratt, P. Giabbanelli, Piper J. Jackson, Vijay Mago
Attempts to model insurgency have suffered from several obstacles. Qualitative research may be vague and conflicting, while quantitative research is limited due to the difficulties of collecting sufficient data in war and inferring complex relationships. We propose an innovative combination of Fuzzy Cognitive Maps and Cellular Automata to capture this complexity. Our approach is computational, thus it can be used to develop a simulation platform in which military and political analysts can test scenarios. We take a step-by-step approach to illustrate the potential of our approach in a population-centric war, similar to the on-going campaign in Afghanistan. While the project still requires validation and improvement of the knowledge base by domain experts as well as construction of accurate simulation scenarios, this example fully specifies the general problem definition and the technical structure of the model.
模拟叛乱的尝试遇到了一些障碍。定性研究可能是模糊和矛盾的,而定量研究是有限的,因为在战争中收集足够的数据和推断复杂的关系的困难。我们提出了模糊认知地图和元胞自动机的创新组合来捕捉这种复杂性。我们的方法是计算的,因此它可以用来开发一个模拟平台,军事和政治分析人员可以在其中测试场景。我们采取一步一步的方法来说明我们的方法在以人口为中心的战争中的潜力,类似于正在进行的阿富汗战役。虽然该项目仍需要领域专家对知识库进行验证和改进,并构建准确的仿真场景,但本例充分说明了一般问题定义和模型的技术结构。
{"title":"Rebel with many causes: A computational model of insurgency","authors":"S. Pratt, P. Giabbanelli, Piper J. Jackson, Vijay Mago","doi":"10.1109/ISI.2012.6284097","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284097","url":null,"abstract":"Attempts to model insurgency have suffered from several obstacles. Qualitative research may be vague and conflicting, while quantitative research is limited due to the difficulties of collecting sufficient data in war and inferring complex relationships. We propose an innovative combination of Fuzzy Cognitive Maps and Cellular Automata to capture this complexity. Our approach is computational, thus it can be used to develop a simulation platform in which military and political analysts can test scenarios. We take a step-by-step approach to illustrate the potential of our approach in a population-centric war, similar to the on-going campaign in Afghanistan. While the project still requires validation and improvement of the knowledge base by domain experts as well as construction of accurate simulation scenarios, this example fully specifies the general problem definition and the technical structure of the model.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"19 9-10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Research note: Concept to develop a software-based counter-terrorism campaign decision support tool 研究说明:开发基于软件的反恐运动决策支持工具的概念
Pub Date : 2010-07-25 DOI: 10.1145/1938606.1938612
Joshua Sinai
In the public policy community, a need exists for a software tool that comprehensively applies leading concepts of counterterrorism (CT) analysis and planning to systematically display, track, operationalize and update on an analyst's computer all the decisions and processes involved in countering an on-going terrorist insurgency facing a targeted adversary. Initially, such a prototype would be employed for analytical and training purposes, with a more advanced version used in a government's actual CT campaign. No such comprehensive software tool exists at present (based on the author's knowledge) to address any of these requirements. This research note, which is of a preliminary nature, is primarily descriptive and does not include a discussion of how such a tool would be operationalized into a software program, since that would involve releasing proprietary intellectual property that is intended for commercial purposes. Hopefully, this preliminary research note will generate interest in a collaborative effort with other researchers and software developers to create and operationalize such a software tool kit.
在公共政策领域,需要一种软件工具,全面应用反恐(CT)分析和计划的领先概念,系统地显示、跟踪、操作和更新分析人员的计算机上的所有决策和过程,这些决策和过程涉及打击正在进行的恐怖主义叛乱,面对目标对手。最初,这种原型机将用于分析和培训目的,更先进的版本将用于政府实际的CT活动。目前还没有这样全面的软件工具(基于作者的知识)来满足这些需求。这份研究报告是初步性质的,主要是描述性的,不包括如何将这种工具操作到软件程序中的讨论,因为这将涉及发布用于商业目的的专有知识产权。希望这份初步的研究报告能够引起与其他研究人员和软件开发人员合作的兴趣,以创建和操作这样一个软件工具包。
{"title":"Research note: Concept to develop a software-based counter-terrorism campaign decision support tool","authors":"Joshua Sinai","doi":"10.1145/1938606.1938612","DOIUrl":"https://doi.org/10.1145/1938606.1938612","url":null,"abstract":"In the public policy community, a need exists for a software tool that comprehensively applies leading concepts of counterterrorism (CT) analysis and planning to systematically display, track, operationalize and update on an analyst's computer all the decisions and processes involved in countering an on-going terrorist insurgency facing a targeted adversary. Initially, such a prototype would be employed for analytical and training purposes, with a more advanced version used in a government's actual CT campaign. No such comprehensive software tool exists at present (based on the author's knowledge) to address any of these requirements. This research note, which is of a preliminary nature, is primarily descriptive and does not include a discussion of how such a tool would be operationalized into a software program, since that would involve releasing proprietary intellectual property that is intended for commercial purposes. Hopefully, this preliminary research note will generate interest in a collaborative effort with other researchers and software developers to create and operationalize such a software tool kit.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1