首页 > 最新文献

Science China Information Sciences最新文献

英文 中文
A comprehensive analysis of DAC-SDC FPGA low power object detection challenge 全面分析 DAC-SDC FPGA 的低功耗物体检测挑战
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-24 DOI: 10.1007/s11432-023-3958-4
Jingwei Zhang, Guoqing Li, Meng Zhang, Xinye Cao, Yu Zhang, Xiang Li, Ziyang Chen, Jun Yang

The lower power object detection challenge (LPODC) at the IEEE/ACM Design Automation Conference is a premier contest in low-power object detection and algorithm (software)-hardware co-design for edge artificial intelligence, which has been a success in the past five years. LPODC focused on designing and implementing novel algorithms on the edge platform for object detection in images taken from unmanned aerial vehicles (UAVs), which attracted hundreds of teams from dozens of countries to participate. Our team SEUer has been participating in this competition for three consecutive years from 2020 to 2022 and obtained sixth place respectively in 2020 and 2021. Recently, we achieved the championship in 2022. In this paper, we presented the LPODC for UAV object detection from 2018 to 2022, including the dataset, hardware platform, and evaluation method. In addition, we also introduced and discussed the details of methods proposed by each year’s top three teams from 2018 to 2022 in terms of network, accuracy, quantization method, hardware performance, and total score. Additionally, we conducted an in-depth analysis of the selected entries and results, along with summarizing representative methodologies. This analysis serves as a valuable practical resource for researchers and engineers in deploying the UAV application on edge platforms and enhancing its feasibility and reliability. According to the analysis and discussion, it becomes evident that the adoption of a hardware-algorithm co-design approach is paramount in the context of tiny machine learning (TinyML). This approach surpasses the mere optimization of software and hardware as separate entities, proving to be essential for achieving optimal performance and efficiency in TinyML applications.

IEEE/ACM 设计自动化大会的低功耗物体检测挑战赛(LPODC)是低功耗物体检测和边缘人工智能算法(软件)-硬件协同设计领域的顶级竞赛,在过去五年中取得了巨大成功。LPODC 重点关注在边缘平台上设计和实现新型算法,用于无人机(UAV)拍摄的图像中的物体检测,吸引了来自数十个国家的数百个团队参赛。我校 SEUer 团队自 2020 年至 2022 年连续三年参加该竞赛,并分别于 2020 年和 2021 年获得第六名。最近,我们又在 2022 年取得了冠军。在本文中,我们介绍了2018年至2022年用于无人机物体检测的LPODC,包括数据集、硬件平台和评估方法。此外,我们还从网络、精度、量化方法、硬件性能、总分等方面介绍和讨论了 2018 年至 2022 年每年前三名团队提出的方法细节。此外,我们还对入选作品和结果进行了深入分析,同时总结了具有代表性的方法。该分析为研究人员和工程师在边缘平台上部署无人机应用、提高其可行性和可靠性提供了宝贵的实用资源。根据分析和讨论,可以明显看出,在微型机器学习(TinyML)的背景下,采用硬件-算法协同设计方法至关重要。这种方法超越了单纯将软件和硬件作为独立实体进行优化的做法,对实现 TinyML 应用的最佳性能和效率至关重要。
{"title":"A comprehensive analysis of DAC-SDC FPGA low power object detection challenge","authors":"Jingwei Zhang, Guoqing Li, Meng Zhang, Xinye Cao, Yu Zhang, Xiang Li, Ziyang Chen, Jun Yang","doi":"10.1007/s11432-023-3958-4","DOIUrl":"https://doi.org/10.1007/s11432-023-3958-4","url":null,"abstract":"<p>The lower power object detection challenge (LPODC) at the IEEE/ACM Design Automation Conference is a premier contest in low-power object detection and algorithm (software)-hardware co-design for edge artificial intelligence, which has been a success in the past five years. LPODC focused on designing and implementing novel algorithms on the edge platform for object detection in images taken from unmanned aerial vehicles (UAVs), which attracted hundreds of teams from dozens of countries to participate. Our team SEUer has been participating in this competition for three consecutive years from 2020 to 2022 and obtained sixth place respectively in 2020 and 2021. Recently, we achieved the championship in 2022. In this paper, we presented the LPODC for UAV object detection from 2018 to 2022, including the dataset, hardware platform, and evaluation method. In addition, we also introduced and discussed the details of methods proposed by each year’s top three teams from 2018 to 2022 in terms of network, accuracy, quantization method, hardware performance, and total score. Additionally, we conducted an in-depth analysis of the selected entries and results, along with summarizing representative methodologies. This analysis serves as a valuable practical resource for researchers and engineers in deploying the UAV application on edge platforms and enhancing its feasibility and reliability. According to the analysis and discussion, it becomes evident that the adoption of a hardware-algorithm co-design approach is paramount in the context of tiny machine learning (TinyML). This approach surpasses the mere optimization of software and hardware as separate entities, proving to be essential for achieving optimal performance and efficiency in TinyML applications.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"27 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141784754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder 基于类内一致性增强变异自动编码器识别概念漂移下的恶意流量
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1007/s11432-023-4010-4
Xiang Luo, Chang Liu, Gaopeng Gou, Gang Xiong, Zhen Li, Binxing Fang

Accurate identification of malicious traffic is crucial for implementing effective defense counter-measures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversaries have introduced the issues of concept drift, which significantly affects the performance of existing methods. To tackle this challenge, some researchers have focused on improving the separability of malicious traffic representation and designing drift detectors to reduce the number of false positives. Nevertheless, these methods often overlook the importance of enhancing the generalization and intraclass consistency in the representation. Additionally, the detectors are not sufficiently sensitive to the variations among different malicious traffic classes, which results in poor performance and limited robustness. In this paper, we propose intraclass consistency enhanced variational autoencoder with Class-Perception detector (ICE-CP) to identify malicious traffic under concept drift. It comprises two key modules during training: intraclass consistency enhanced (ICE) representation learning and Class-Perception (CP) detector construction. In the first module, we employ a variational autoencoder (VAE) in conjunction with Kullback-Leibler (KL)-divergence and cross-entropy loss to model the distribution of each input malicious traffic flow. This approach simultaneously enhances the generalization, interclass consistency, and intraclass differences in the learned representation. Consequently, we obtain a compact representation and a trained classifier for non-drifting malicious traffic. In the second module, we design the CP detector, which generates a centroid and threshold for each malicious traffic class separately based on the learned representation, depicting the boundaries between drifting and non-drifting malicious traffic. During testing, we utilize the trained classifier to predict malicious traffic classes for the testing samples. Then, we use the CP detector to detect the potential drifting samples using the centroid and threshold defined for each class. We evaluate ICE-CP and some advanced methods on various real-world malicious traffic datasets. The results show that our method outperforms others in identifying malicious traffic and detecting potential drifting samples, demonstrating outstanding robustness among different concept drift settings.

准确识别恶意流量对于实施有效的防御反制措施至关重要,因此相关研究工作十分广泛。然而,敌方采用的技术不断发展,带来了概念漂移问题,严重影响了现有方法的性能。为了应对这一挑战,一些研究人员专注于提高恶意流量表示的可分离性,并设计漂移检测器来减少误报。然而,这些方法往往忽视了增强表征的泛化和类内一致性的重要性。此外,这些检测器对不同恶意流量类别之间的变化不够敏感,导致性能低下,鲁棒性有限。本文提出了类内一致性增强变分自动编码器与类感知检测器(ICE-CP),用于识别概念漂移下的恶意流量。它在训练过程中包括两个关键模块:类内一致性增强(ICE)表示学习和类感知(CP)检测器构建。在第一个模块中,我们将变异自动编码器(VAE)与库尔贝克-莱布勒(KL)-发散和交叉熵损失相结合,对每个输入恶意流量的分布进行建模。这种方法同时增强了所学表示的泛化、类间一致性和类内差异。因此,我们得到了一个紧凑的表示和一个训练有素的非漂移恶意流量分类器。在第二个模块中,我们设计了 CP 检测器,该检测器根据学习到的表示分别为每个恶意流量类别生成中心点和阈值,描绘出漂移和非漂移恶意流量之间的界限。在测试过程中,我们利用训练有素的分类器来预测测试样本的恶意流量类别。然后,我们使用 CP 检测器,利用为每个类别定义的中心点和阈值来检测潜在的漂移样本。我们在各种真实世界的恶意流量数据集上评估了 ICE-CP 和一些高级方法。结果表明,我们的方法在识别恶意流量和检测潜在漂移样本方面优于其他方法,在不同的概念漂移设置中表现出卓越的鲁棒性。
{"title":"Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder","authors":"Xiang Luo, Chang Liu, Gaopeng Gou, Gang Xiong, Zhen Li, Binxing Fang","doi":"10.1007/s11432-023-4010-4","DOIUrl":"https://doi.org/10.1007/s11432-023-4010-4","url":null,"abstract":"<p>Accurate identification of malicious traffic is crucial for implementing effective defense counter-measures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversaries have introduced the issues of concept drift, which significantly affects the performance of existing methods. To tackle this challenge, some researchers have focused on improving the separability of malicious traffic representation and designing drift detectors to reduce the number of false positives. Nevertheless, these methods often overlook the importance of enhancing the generalization and intraclass consistency in the representation. Additionally, the detectors are not sufficiently sensitive to the variations among different malicious traffic classes, which results in poor performance and limited robustness. In this paper, we propose intraclass consistency enhanced variational autoencoder with Class-Perception detector (ICE-CP) to identify malicious traffic under concept drift. It comprises two key modules during training: intraclass consistency enhanced (ICE) representation learning and Class-Perception (CP) detector construction. In the first module, we employ a variational autoencoder (VAE) in conjunction with Kullback-Leibler (KL)-divergence and cross-entropy loss to model the distribution of each input malicious traffic flow. This approach simultaneously enhances the generalization, interclass consistency, and intraclass differences in the learned representation. Consequently, we obtain a compact representation and a trained classifier for non-drifting malicious traffic. In the second module, we design the CP detector, which generates a centroid and threshold for each malicious traffic class separately based on the learned representation, depicting the boundaries between drifting and non-drifting malicious traffic. During testing, we utilize the trained classifier to predict malicious traffic classes for the testing samples. Then, we use the CP detector to detect the potential drifting samples using the centroid and threshold defined for each class. We evaluate ICE-CP and some advanced methods on various real-world malicious traffic datasets. The results show that our method outperforms others in identifying malicious traffic and detecting potential drifting samples, demonstrating outstanding robustness among different concept drift settings.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"86 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141867083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legitimate monitor by proactive guarding for counter covert communications 通过主动防范反隐蔽通信进行合法监控
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1007/s11432-023-4025-2
Manlin Wang, Bin Xia, Jiangzhou Wang

Covert communication has been widely investigated to avoid the transmission behavior being overheard by the warder. However, covert communication may be illegitimately utilized by unauthorized parties to evade the supervision of authorized agencies, which leads to great challenges to information security. To meet the need for authorized parties to monitor and prevent illegitimate transmission between unauthorized nodes, a novel paradigm, called legitimate monitor, is proposed for counter covert communications. In the preceding covert communication system, the covert transmission rate is the focus. Differently, the core concern of the legitimate monitor system is the outage probability of the transmission between unauthorized nodes, which should be maximized to interrupt the potential but undetectable transmission. To achieve these goals effectively, a proactive guarding approach is proposed, where the authorized warder detects the transmission behavior and emits jamming signals to interfere with the potential transmission, simultaneously. In particular, the jamming power at the warder is optimized under cases where the instantaneous/statistical channel state information is available. Besides, the corresponding outage probability is derived to evaluate the system performance, which can also be simplified to scenarios with a passive warder. Numerical results demonstrate that proactive guarding outperforms the passive one, especially when the warder is not proximal to the unauthorized transmitter. In addition, the proposed jamming power allocation scheme also outperforms other benchmark schemes.

为了避免传输行为被狱警窃听,人们对隐蔽通信进行了广泛研究。然而,隐蔽通信可能被未授权方非法利用,以逃避授权机构的监管,这给信息安全带来了巨大挑战。为了满足授权方监控和防止非授权节点之间非法传输的需求,我们提出了一种新型的反隐蔽通信范式,即合法监控器。在以往的隐蔽通信系统中,隐蔽传输速率是重点。不同的是,合法监控系统的核心关注点是未经授权节点之间传输的中断概率,应最大限度地提高该概率,以中断潜在但无法检测的传输。为了有效地实现这些目标,我们提出了一种主动防护方法,即授权看守者在检测传输行为的同时,发射干扰信号来干扰潜在的传输。特别是在可获得瞬时/统计信道状态信息的情况下,狱警的干扰功率将得到优化。此外,还得出了相应的中断概率,以评估系统性能,这也可简化为具有被动式看守器的情况。数值结果表明,主动防护优于被动防护,尤其是当防护员不靠近未经授权的发射机时。此外,所提出的干扰功率分配方案也优于其他基准方案。
{"title":"Legitimate monitor by proactive guarding for counter covert communications","authors":"Manlin Wang, Bin Xia, Jiangzhou Wang","doi":"10.1007/s11432-023-4025-2","DOIUrl":"https://doi.org/10.1007/s11432-023-4025-2","url":null,"abstract":"<p>Covert communication has been widely investigated to avoid the transmission behavior being overheard by the warder. However, covert communication may be illegitimately utilized by unauthorized parties to evade the supervision of authorized agencies, which leads to great challenges to information security. To meet the need for authorized parties to monitor and prevent illegitimate transmission between unauthorized nodes, a novel paradigm, called legitimate monitor, is proposed for counter covert communications. In the preceding covert communication system, the covert transmission rate is the focus. Differently, the core concern of the legitimate monitor system is the outage probability of the transmission between unauthorized nodes, which should be maximized to interrupt the potential but undetectable transmission. To achieve these goals effectively, a proactive guarding approach is proposed, where the authorized warder detects the transmission behavior and emits jamming signals to interfere with the potential transmission, simultaneously. In particular, the jamming power at the warder is optimized under cases where the instantaneous/statistical channel state information is available. Besides, the corresponding outage probability is derived to evaluate the system performance, which can also be simplified to scenarios with a passive warder. Numerical results demonstrate that proactive guarding outperforms the passive one, especially when the warder is not proximal to the unauthorized transmitter. In addition, the proposed jamming power allocation scheme also outperforms other benchmark schemes.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"46 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141784757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-party privacy-preserving decision tree training with a privileged party 有特权方参与的多方隐私保护决策树训练
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1007/s11432-023-4013-x
Yiwen Tong, Qi Feng, Min Luo, Debiao He

Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in these studies often have shortcomings in terms of data privacy breach or efficiency. Additionally, these methods typically only apply to symmetric frameworks, which consist of two or more parties with equal privilege, and are not suitable for asymmetric scenarios where parties have unequal privilege. In this paper, we propose SecureCART, a three-party privacy-preserving decision tree training scheme with a privileged party. We adopt the existing pMPL framework and design novel secure interactive protocols for division, comparison, and asymmetric multiplication. Compared to similar schemes, our division protocol is 93.5–560.4 × faster, with the communication overhead reduced by over 90%; further, our multiplication protocol is approximately 1.5× faster, with the communication overhead reduced by around 20%. Our comparison protocol based on function secret sharing maintains good performance when adapted to pMPL. Based on the proposed secure protocols, we implement SecureCART in C++ and analyze its performance using three real-world datasets in both LAN and WAN environments. he experimental results indicate that SecureCART is significantly faster than similar schemes proposed in past studies, and that the loss of accuracy while using SecureCART remains within an acceptable range.

目前,决策树是分类任务中最常用的数据挖掘算法。虽然有大量研究对保护隐私的决策树进行了调查,但这些研究中提出的方法往往在数据隐私泄露或效率方面存在缺陷。此外,这些方法通常只适用于对称框架,即由具有同等权限的两方或多方组成,而不适用于各方权限不平等的非对称场景。在本文中,我们提出了 SecureCART,这是一种有特权方的三方隐私保护决策树训练方案。我们采用了现有的 pMPL 框架,并为除法、比较和非对称乘法设计了新颖的安全交互协议。与类似方案相比,我们的除法协议快 93.5-560.4 倍,通信开销减少 90% 以上;此外,我们的乘法协议快约 1.5 倍,通信开销减少约 20%。我们基于函数秘密共享的比较协议在适用于 pMPL 时保持了良好的性能。基于所提出的安全协议,我们用 C++ 实现了 SecureCART,并使用局域网和广域网环境中的三个真实数据集分析了其性能。实验结果表明,SecureCART 比过去研究中提出的类似方案快得多,而且使用 SecureCART 时的精度损失仍在可接受的范围内。
{"title":"Multi-party privacy-preserving decision tree training with a privileged party","authors":"Yiwen Tong, Qi Feng, Min Luo, Debiao He","doi":"10.1007/s11432-023-4013-x","DOIUrl":"https://doi.org/10.1007/s11432-023-4013-x","url":null,"abstract":"<p>Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in these studies often have shortcomings in terms of data privacy breach or efficiency. Additionally, these methods typically only apply to symmetric frameworks, which consist of two or more parties with equal privilege, and are not suitable for asymmetric scenarios where parties have unequal privilege. In this paper, we propose SecureCART, a three-party privacy-preserving decision tree training scheme with a privileged party. We adopt the existing pMPL framework and design novel secure interactive protocols for division, comparison, and asymmetric multiplication. Compared to similar schemes, our division protocol is 93.5–560.4 × faster, with the communication overhead reduced by over 90%; further, our multiplication protocol is approximately 1.5× faster, with the communication overhead reduced by around 20%. Our comparison protocol based on function secret sharing maintains good performance when adapted to pMPL. Based on the proposed secure protocols, we implement SecureCART in C++ and analyze its performance using three real-world datasets in both LAN and WAN environments. he experimental results indicate that SecureCART is significantly faster than similar schemes proposed in past studies, and that the loss of accuracy while using SecureCART remains within an acceptable range.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"43 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141784825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High precision current mirror circuit based on two-dimensional material transistors 基于二维材料晶体管的高精度电流镜电路
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1007/s11432-024-4083-6
Shiping Gao, Chen Pan, Pincheng Su, Xing-Jian Yangdong, Wentao Yu, Zhoujie Zeng, Yu Shen, Jingwen Shi, Yanwei Cui, Pengfei Wang, Yuekun Yang, Cong Wang, Bing Cheng, Shi-Jun Liang, Feng Miao

We first report a 2D material-based P-FET with excellent output current saturation characteristics and demonstrate the highest small-signal output impedance characteristics among all previously published 2D-FETs. Further, we utilize the excellent performance of the device to demonstrate a current mirror circuit, which has better high precision current replication performance than silicon-based devices. This work provides a possible technical approach for the development of high-performance analog circuit devices based on 2D materials.

我们首次报道了一种基于二维材料的 P-FET,它具有出色的输出电流饱和特性,并在之前发表的所有二维 FET 中展示了最高的小信号输出阻抗特性。此外,我们还利用该器件的优异性能演示了一种电流镜电路,它比硅基器件具有更好的高精度电流复制性能。这项工作为开发基于二维材料的高性能模拟电路器件提供了一种可行的技术方法。
{"title":"High precision current mirror circuit based on two-dimensional material transistors","authors":"Shiping Gao, Chen Pan, Pincheng Su, Xing-Jian Yangdong, Wentao Yu, Zhoujie Zeng, Yu Shen, Jingwen Shi, Yanwei Cui, Pengfei Wang, Yuekun Yang, Cong Wang, Bing Cheng, Shi-Jun Liang, Feng Miao","doi":"10.1007/s11432-024-4083-6","DOIUrl":"https://doi.org/10.1007/s11432-024-4083-6","url":null,"abstract":"<p>We first report a 2D material-based P-FET with excellent output current saturation characteristics and demonstrate the highest small-signal output impedance characteristics among all previously published 2D-FETs. Further, we utilize the excellent performance of the device to demonstrate a current mirror circuit, which has better high precision current replication performance than silicon-based devices. This work provides a possible technical approach for the development of high-performance analog circuit devices based on 2D materials.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"1 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141784832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SeeMore: a spatiotemporal predictive model with bidirectional distillation and level-specific meta-adaptation SeeMore:具有双向蒸馏和特定级别元适应功能的时空预测模型
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1007/s11432-022-3859-8
Yuqing Ma, Wei Liu, Yajun Gao, Yang Yuan, Shihao Bai, Haotong Qin, Xianglong Liu

Predicting future frames using historical spatiotemporal data sequences is challenging and critical, and it is receiving a lot of attention these days from academic and industrial scholars. Most spatiotemporal predictive algorithms ignore the valuable backward reasoning ability and the disparate learning complexities among different layers and hence, cannot build good long-term dependencies and spatial correlations, resulting in suboptimal solutions. To address the aforementioned issues, we propose a two-stage coarse-to-fine spatiotemporal predictive model with bidirectional distillation and level-specific meta-adaptation (SeeMore) in this paper, which includes a bidirectional distillation network (BDN) and a level-specific meta-adapter (LMA), to gain bidirectional multilevel reasoning. In the first stage, BDN concentrates on bidirectional dynamics modeling and coarsely constructs spatial correlations of different layers, while LMA is introduced in the second fine-tuning stage to refine the multilevel spatial correlations from a meta-learning perspective. In particular, BDN mimics the forward and backward reasoning abilities of humans in a distillation manner, which aids in the development of long-term dependencies. The LMA views learning of different layers as disparate but related tasks and guides the transfer of learning experiences among these tasks through learning complexities. Thus, each layer could be closer to its solutions and could extract more informative spatial correlations. By capturing the enhanced short-term spatial correlations and long-term temporal dependencies, the proposed model could extract adequate knowledge from sequential historical observations and accurately predict future frames whose backtracking preconditions are consistent with the historical sequence. Our work is general and robust enough to be integrated into most spatiotemporal predictive models without requiring additional computation or memory cost during inference. Extensive experiments on four widely used predictive learning benchmarks validated the proposed model’s effectiveness in comparison to state-of-the-art approaches (e.g., 10.6% improvement of Mean Squared Error on the Moving MNIST dataset).

利用历史时空数据序列预测未来帧是一项极具挑战性的重要工作,近年来受到学术界和工业界学者的广泛关注。大多数时空预测算法都忽视了宝贵的后向推理能力和不同层之间的学习复杂性,因此无法建立良好的长期依赖关系和空间相关性,导致解决方案不尽人意。针对上述问题,我们在本文中提出了一种具有双向蒸馏和特定层元适配(SeeMore)的两阶段粗到细时空预测模型,其中包括一个双向蒸馏网络(BDN)和一个特定层元适配器(LMA),以获得双向多层次推理。在第一阶段,BDN 专注于双向动力学建模,粗略构建不同层次的空间相关性,而 LMA 则在第二阶段引入微调,从元学习的角度完善多层次空间相关性。其中,BDN 以提炼的方式模仿了人类的前向和后向推理能力,有助于发展长期依赖关系。LMA将不同层次的学习视为不同但相关的任务,并通过学习复杂性引导学习经验在这些任务之间转移。因此,每一层都能更接近其解决方案,并能提取更多的空间关联信息。通过捕捉增强的短期空间相关性和长期时间依赖性,所提出的模型可以从连续的历史观测中提取足够的知识,并准确预测未来帧的回溯前提条件与历史序列一致。我们的工作具有足够的通用性和鲁棒性,可以集成到大多数时空预测模型中,在推理过程中无需额外的计算或内存成本。在四个广泛使用的预测学习基准上进行的大量实验验证了所提出模型与最先进方法相比的有效性(例如,在移动 MNIST 数据集上平均平方误差提高了 10.6%)。
{"title":"SeeMore: a spatiotemporal predictive model with bidirectional distillation and level-specific meta-adaptation","authors":"Yuqing Ma, Wei Liu, Yajun Gao, Yang Yuan, Shihao Bai, Haotong Qin, Xianglong Liu","doi":"10.1007/s11432-022-3859-8","DOIUrl":"https://doi.org/10.1007/s11432-022-3859-8","url":null,"abstract":"<p>Predicting future frames using historical spatiotemporal data sequences is challenging and critical, and it is receiving a lot of attention these days from academic and industrial scholars. Most spatiotemporal predictive algorithms ignore the valuable backward reasoning ability and the disparate learning complexities among different layers and hence, cannot build good long-term dependencies and spatial correlations, resulting in suboptimal solutions. To address the aforementioned issues, we propose a two-stage coarse-to-fine spatiotemporal predictive model with bidirectional distillation and level-specific meta-adaptation (SeeMore) in this paper, which includes a bidirectional distillation network (BDN) and a level-specific meta-adapter (LMA), to gain bidirectional multilevel reasoning. In the first stage, BDN concentrates on bidirectional dynamics modeling and coarsely constructs spatial correlations of different layers, while LMA is introduced in the second fine-tuning stage to refine the multilevel spatial correlations from a meta-learning perspective. In particular, BDN mimics the forward and backward reasoning abilities of humans in a distillation manner, which aids in the development of long-term dependencies. The LMA views learning of different layers as disparate but related tasks and guides the transfer of learning experiences among these tasks through learning complexities. Thus, each layer could be closer to its solutions and could extract more informative spatial correlations. By capturing the enhanced short-term spatial correlations and long-term temporal dependencies, the proposed model could extract adequate knowledge from sequential historical observations and accurately predict future frames whose backtracking preconditions are consistent with the historical sequence. Our work is general and robust enough to be integrated into most spatiotemporal predictive models without requiring additional computation or memory cost during inference. Extensive experiments on four widely used predictive learning benchmarks validated the proposed model’s effectiveness in comparison to state-of-the-art approaches (e.g., 10.6% improvement of Mean Squared Error on the Moving MNIST dataset).</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"41 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141784752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BioKG-CMI: a multi-source feature fusion model based on biological knowledge graph for predicting circRNA-miRNA interactions BioKG-CMI:基于生物知识图谱的多源特征融合模型,用于预测 circRNA-miRNA 相互作用
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1007/s11432-024-4098-3
Mengmeng Wei, Lei Wang, Yang Li, Zhengwei Li, Bowei Zhao, Xiaorui Su, Yu Wei, Zhuhong You

This study proposes a model named BioKG-CMI to predict CMIs based on a biological knowledge graph. Faced with limited data, we employ subcellular localization to generate negative samples that align more closely with biological logic. To mine semantic information in circRNA and miRNA sequences, we introduce the pre-trained model BERT to learn sequence feature representation. Guided by the hypothesis that adjacent molecules have similar functions, we calculate spatial proximity between nodes of the same class. The DisMult algorithm is applied to extract the potential logical rules of the knowledge graph and learn entity and relationship representations. Subsequently, the integration of multi-feature successfully addresses the challenge of expressing the complex biological knowledge graph and overcoming the limitation of single-feature inadequacy. Multiple comparative experiments and case studies demonstrate the robustness of the proposed model.

本研究提出了一个名为 BioKG-CMI 的模型,用于基于生物知识图谱预测 CMI。面对有限的数据,我们利用亚细胞定位来生成更符合生物逻辑的阴性样本。为了挖掘 circRNA 和 miRNA 序列中的语义信息,我们引入了预训练模型 BERT 来学习序列特征表征。在相邻分子具有相似功能的假设指导下,我们计算同类节点之间的空间接近度。应用 DisMult 算法提取知识图谱的潜在逻辑规则,并学习实体和关系表征。随后,多特征的整合成功地解决了复杂生物知识图谱的表达难题,并克服了单一特征不足的局限性。多个对比实验和案例研究证明了所提模型的稳健性。
{"title":"BioKG-CMI: a multi-source feature fusion model based on biological knowledge graph for predicting circRNA-miRNA interactions","authors":"Mengmeng Wei, Lei Wang, Yang Li, Zhengwei Li, Bowei Zhao, Xiaorui Su, Yu Wei, Zhuhong You","doi":"10.1007/s11432-024-4098-3","DOIUrl":"https://doi.org/10.1007/s11432-024-4098-3","url":null,"abstract":"<p>This study proposes a model named BioKG-CMI to predict CMIs based on a biological knowledge graph. Faced with limited data, we employ subcellular localization to generate negative samples that align more closely with biological logic. To mine semantic information in circRNA and miRNA sequences, we introduce the pre-trained model BERT to learn sequence feature representation. Guided by the hypothesis that adjacent molecules have similar functions, we calculate spatial proximity between nodes of the same class. The DisMult algorithm is applied to extract the potential logical rules of the knowledge graph and learn entity and relationship representations. Subsequently, the integration of multi-feature successfully addresses the challenge of expressing the complex biological knowledge graph and overcoming the limitation of single-feature inadequacy. Multiple comparative experiments and case studies demonstrate the robustness of the proposed model.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"167 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141784824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Skill enhancement learning with knowledge distillation 通过知识提炼提高技能
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1007/s11432-023-4016-0
Naijun Liu, Fuchun Sun, Bin Fang, Huaping Liu

Skill learning through reinforcement learning has significantly progressed in recent years. However, it often struggles to efficiently find optimal or near-optimal policies due to the inherent trial-and-error exploration in reinforcement learning. Although algorithms have been proposed to enhance skill learning efficacy, there is still much room for improvement in terms of skill learning performance and training stability. In this paper, we propose an algorithm called skill enhancement learning with knowledge distillation (SELKD), which integrates multiple actors and multiple critics for skill learning. SELKD employs knowledge distillation to establish a mutual learning mechanism among actors. To mitigate critic overestimation bias, we introduce a novel target value calculation method. We also perform theoretical analysis to ensure the convergence of SELKD. Finally, experiments are conducted on several continuous control tasks, illustrating the effectiveness of the proposed algorithm.

近年来,通过强化学习进行技能学习取得了显著进展。然而,由于强化学习中固有的试错探索,它往往难以有效地找到最优或接近最优的策略。虽然已有算法被提出来提高技能学习效率,但在技能学习性能和训练稳定性方面仍有很大的改进空间。在本文中,我们提出了一种名为 "知识提炼下的技能强化学习(SELKD)"的算法,该算法整合了多个角色和多个批评者来进行技能学习。SELKD 采用知识蒸馏法建立参与者之间的相互学习机制。为了减少批评者的高估偏差,我们引入了一种新颖的目标值计算方法。我们还进行了理论分析,以确保 SELKD 的收敛性。最后,我们在几个连续控制任务上进行了实验,说明了所提算法的有效性。
{"title":"Skill enhancement learning with knowledge distillation","authors":"Naijun Liu, Fuchun Sun, Bin Fang, Huaping Liu","doi":"10.1007/s11432-023-4016-0","DOIUrl":"https://doi.org/10.1007/s11432-023-4016-0","url":null,"abstract":"<p>Skill learning through reinforcement learning has significantly progressed in recent years. However, it often struggles to efficiently find optimal or near-optimal policies due to the inherent trial-and-error exploration in reinforcement learning. Although algorithms have been proposed to enhance skill learning efficacy, there is still much room for improvement in terms of skill learning performance and training stability. In this paper, we propose an algorithm called skill enhancement learning with knowledge distillation (SELKD), which integrates multiple actors and multiple critics for skill learning. SELKD employs knowledge distillation to establish a mutual learning mechanism among actors. To mitigate critic overestimation bias, we introduce a novel target value calculation method. We also perform theoretical analysis to ensure the convergence of SELKD. Finally, experiments are conducted on several continuous control tasks, illustrating the effectiveness of the proposed algorithm.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"35 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141784835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agent policy transfer via task relationship modeling 通过任务关系建模实现多代理策略转移
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1007/s11432-023-3862-1
Rongjun Qin, Feng Chen, Tonghan Wang, Lei Yuan, Xiaoran Wu, Yipeng Kang, Zongzhang Zhang, Chongjie Zhang, Yang Yu

Team adaptation to new cooperative tasks is a hallmark of human intelligence, which has yet to be fully realized in learning agents. Previous studies on multi-agent transfer learning have accommodated teams of different sizes but heavily relied on the generalization ability of neural networks for adapting to unseen tasks. We posit that the relationship among tasks provides key information for policy adaptation. We utilize this relationship for efficient transfer by attempting to discover and exploit the knowledge among tasks from different teams, proposing to learn an effect-based task representation as a common latent space among tasks, and using it to build an alternatively fixed training scheme. Herein, we demonstrate that task representation can capture the relationship among teams and generalize to unseen tasks. Thus, the proposed method helps transfer the learned cooperation knowledge to new tasks after training on a few source tasks. Furthermore, the learned transferred policies help solve tasks that are difficult to learn from scratch.

团队适应新的合作任务是人类智能的一个标志,而这一点尚未在学习型代理中完全实现。以往关于多代理迁移学习的研究已经适应了不同规模的团队,但主要依赖神经网络的泛化能力来适应未见任务。我们认为,任务之间的关系为策略适应提供了关键信息。我们试图发现并利用来自不同团队的任务之间的知识,提出学习基于效果的任务表示法作为任务之间的共同潜空间,并利用它建立替代固定训练方案,从而利用这种关系实现高效迁移。在这里,我们证明了任务表示法可以捕捉团队之间的关系,并推广到未见过的任务中。因此,在对少数源任务进行训练后,所提出的方法有助于将学到的合作知识迁移到新任务中。此外,学习到的转移策略还能帮助解决难以从头开始学习的任务。
{"title":"Multi-agent policy transfer via task relationship modeling","authors":"Rongjun Qin, Feng Chen, Tonghan Wang, Lei Yuan, Xiaoran Wu, Yipeng Kang, Zongzhang Zhang, Chongjie Zhang, Yang Yu","doi":"10.1007/s11432-023-3862-1","DOIUrl":"https://doi.org/10.1007/s11432-023-3862-1","url":null,"abstract":"<p>Team adaptation to new cooperative tasks is a hallmark of human intelligence, which has yet to be fully realized in learning agents. Previous studies on multi-agent transfer learning have accommodated teams of different sizes but heavily relied on the generalization ability of neural networks for adapting to unseen tasks. We posit that the relationship among tasks provides key information for policy adaptation. We utilize this relationship for efficient transfer by attempting to discover and exploit the knowledge among tasks from different teams, proposing to learn an effect-based task representation as a common latent space among tasks, and using it to build an alternatively fixed training scheme. Herein, we demonstrate that task representation can capture the relationship among teams and generalize to unseen tasks. Thus, the proposed method helps transfer the learned cooperation knowledge to new tasks after training on a few source tasks. Furthermore, the learned transferred policies help solve tasks that are difficult to learn from scratch.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"5 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141786023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of chiplet-based design: system architecture and interconnection 基于芯片组的设计回顾:系统架构和互连
IF 8.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-19 DOI: 10.1007/s11432-023-3926-8
Yafei Liu, Xiangyu Li, Shouyi Yin

Chiplet-based design, which breaks a system into multiple smaller dice (or “chiplets”) and reassembles them into a new system chip through advanced packaging, has received extensive attention in the post Moore’s law era due to its advantages in terms of cost, performance, and agility. However, significant challenges arise in this implementation approach, including the mapping of functional components onto chiplets, co-optimization of package and architecture, handling the increased latency of communication across functions in different dies, the uncertainty problems of fragment communication subsystems, such as maintaining deadlock-free when independently designed chiplets are combined. Despite various design approaches that attempt to address these challenges, surveying these approaches one-after-another is not the most helpful way to offer a comparative viewpoint. Accordingly, in this paper, we present a more comprehensive and systematic strategy to survey the various approaches. First, we divide them into chiplet-based system architecture design and interconnection design, and further classify them based on different architectures and building blocks of interconnection. Then, we analyze and cross-compare each classification separately, and in addition, we present a topical discussion on the evolution of memory architectures, design automation, and other relevant topics in chiplet-based designs. Finally, some discussions on important topics are presented, emphasizing future needs and challenges in this rapidly evolving field.

基于芯片的设计将一个系统分解成多个较小的芯片(或 "芯片"),并通过先进的封装将它们重新组装成一个新的系统芯片,这种设计因其在成本、性能和灵活性方面的优势而在后摩尔定律时代受到广泛关注。然而,这种实现方法也面临着巨大的挑战,包括将功能组件映射到芯片上、封装和架构的共同优化、处理不同芯片中功能间通信延迟的增加、片段通信子系统的不确定性问题,例如当独立设计的芯片组合在一起时如何保持无死锁。尽管有各种设计方法试图应对这些挑战,但逐一考察这些方法并不能提供最有帮助的比较观点。因此,在本文中,我们提出了一种更全面、更系统的策略来研究各种方法。首先,我们将它们分为基于芯片组的系统架构设计和互连设计,并根据不同的架构和互连构件对它们进行进一步分类。然后,我们分别对每种分类方法进行了分析和交叉比较,此外,我们还对基于芯片组设计的内存架构演变、设计自动化和其他相关主题进行了专题讨论。最后,我们就一些重要议题进行了讨论,强调了这一快速发展领域的未来需求和挑战。
{"title":"Review of chiplet-based design: system architecture and interconnection","authors":"Yafei Liu, Xiangyu Li, Shouyi Yin","doi":"10.1007/s11432-023-3926-8","DOIUrl":"https://doi.org/10.1007/s11432-023-3926-8","url":null,"abstract":"<p>Chiplet-based design, which breaks a system into multiple smaller dice (or “chiplets”) and reassembles them into a new system chip through advanced packaging, has received extensive attention in the post Moore’s law era due to its advantages in terms of cost, performance, and agility. However, significant challenges arise in this implementation approach, including the mapping of functional components onto chiplets, co-optimization of package and architecture, handling the increased latency of communication across functions in different dies, the uncertainty problems of fragment communication subsystems, such as maintaining deadlock-free when independently designed chiplets are combined. Despite various design approaches that attempt to address these challenges, surveying these approaches one-after-another is not the most helpful way to offer a comparative viewpoint. Accordingly, in this paper, we present a more comprehensive and systematic strategy to survey the various approaches. First, we divide them into chiplet-based system architecture design and interconnection design, and further classify them based on different architectures and building blocks of interconnection. Then, we analyze and cross-compare each classification separately, and in addition, we present a topical discussion on the evolution of memory architectures, design automation, and other relevant topics in chiplet-based designs. Finally, some discussions on important topics are presented, emphasizing future needs and challenges in this rapidly evolving field.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"47 1","pages":""},"PeriodicalIF":8.8,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141786024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Science China Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1