首页 > 最新文献

2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

英文 中文
Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier 提出了基于线性判别分析和最近邻分类器的手掌静脉识别方案
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013096
Selma Elnasir, S. Shamsuddin
Palm vein recognition is a new promising field in biometrics. The palm vein pattern provides highly discriminating features that are difficult to forge because it resides underneath the palmar skin. However, the issues of extracting the palm vein features and the high dimension of the feature space are still open. Therefore, in this paper, we propose an improved scheme of palm vein recognition method based on the Linear Discrimination Analysis (LDA) to extract the discriminative features with low dimension. LDA is later followed by the matching procedure using cosine distance nearest neighbor classifier. The performance of the proposed scheme produced 99.50% for identification rate, 100% for verification rate and 0.0% of Equal Error Rate (EER). The experiments prove that the proposed method has a better performance compared with Principal Component Analysis and Gabor filter methods.
手掌静脉识别是生物识别技术中一个很有前途的新领域。手掌静脉模式提供了高度区分的特征,很难伪造,因为它位于手掌皮肤下面。然而,掌静脉特征的提取和特征空间的高维化问题仍然是一个有待解决的问题。因此,本文提出了一种改进的基于线性判别分析(LDA)的手掌静脉识别方法,提取低维的判别特征。LDA之后是使用余弦距离最近邻分类器的匹配过程。该方案的识别率为99.50%,验证率为100%,等效错误率(EER)为0.0%。实验证明,与主成分分析和Gabor滤波方法相比,该方法具有更好的性能。
{"title":"Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier","authors":"Selma Elnasir, S. Shamsuddin","doi":"10.1109/ISBAST.2014.7013096","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013096","url":null,"abstract":"Palm vein recognition is a new promising field in biometrics. The palm vein pattern provides highly discriminating features that are difficult to forge because it resides underneath the palmar skin. However, the issues of extracting the palm vein features and the high dimension of the feature space are still open. Therefore, in this paper, we propose an improved scheme of palm vein recognition method based on the Linear Discrimination Analysis (LDA) to extract the discriminative features with low dimension. LDA is later followed by the matching procedure using cosine distance nearest neighbor classifier. The performance of the proposed scheme produced 99.50% for identification rate, 100% for verification rate and 0.0% of Equal Error Rate (EER). The experiments prove that the proposed method has a better performance compared with Principal Component Analysis and Gabor filter methods.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123451367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Cross-band ear recognition in low or variant illumination environments 低照度或变照度环境下的跨波段耳识别
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013100
Syed Mohd Zahid Syed Zainal Ariffin, N. Jamil
Ear biometric is slowly gaining its position in biometric studies. Just like fingerprint and iris, the ears are unique and have other advantages over current regular biometric methods. Besides those advantages, there are some issues arising for ear recognition. One of those is regarding the illumination. Low illumination may result in low quality image acquired resulting in low recognition rate. Based on this situation, we proposed a cross-band ear recognition to overcome the variant illumination problem. This method starts by measuring the environments illumination which will determine which type of images (i.e.: thermal or visible) acquired to be processed. Once determined, the images will undergo pre-processing before the ear region is being localized using Viola-Jones approach with Haar-like feature. The ear features will be extracted using local binary patterns operator. Euclidean distance of the feature of test image and database images will be calculated. The lowest Euclidean value will determine the individual identity (intra- and inter-variance).
耳部生物识别技术在生物识别领域的地位正在逐渐上升。就像指纹和虹膜一样,耳朵是独一无二的,与目前常规的生物识别方法相比,它还有其他优势。除了这些优点之外,耳朵识别也存在一些问题。其中之一是关于照明。低照度会导致获取的图像质量低,从而导致识别率低。基于这种情况,我们提出了一种跨波段的耳朵识别方法来克服光照变化的问题。该方法首先测量环境照明,这将决定要处理哪种类型的图像(即:热或可见)。一旦确定,图像将进行预处理,然后使用具有Haar-like特征的Viola-Jones方法对耳朵区域进行定位。利用局部二值模式算子提取耳朵特征。计算测试图像和数据库图像特征的欧氏距离。最低欧几里得值将决定个体同一性(内部和内部变异)。
{"title":"Cross-band ear recognition in low or variant illumination environments","authors":"Syed Mohd Zahid Syed Zainal Ariffin, N. Jamil","doi":"10.1109/ISBAST.2014.7013100","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013100","url":null,"abstract":"Ear biometric is slowly gaining its position in biometric studies. Just like fingerprint and iris, the ears are unique and have other advantages over current regular biometric methods. Besides those advantages, there are some issues arising for ear recognition. One of those is regarding the illumination. Low illumination may result in low quality image acquired resulting in low recognition rate. Based on this situation, we proposed a cross-band ear recognition to overcome the variant illumination problem. This method starts by measuring the environments illumination which will determine which type of images (i.e.: thermal or visible) acquired to be processed. Once determined, the images will undergo pre-processing before the ear region is being localized using Viola-Jones approach with Haar-like feature. The ear features will be extracted using local binary patterns operator. Euclidean distance of the feature of test image and database images will be calculated. The lowest Euclidean value will determine the individual identity (intra- and inter-variance).","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fractional low-order independent component analysis for face recognition robust to partial occlusion 分数阶独立分量分析对部分遮挡的鲁棒性人脸识别
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013084
X. Chen, Wen Li, Zengli Liu, Zaihong Zhou
As biometric vector may not follow the Gaussian distribution under complex light, pose and accessories, systems often yield unacceptable performance when subjected to impulsive, non-Gaussian noise. This paper adopts signal symmetric alpha stable distribution theory to construct fractional low-order independent component analysis algorithm (FLOD-ICA) and applied FLOD-ICA to solve the partial occlusion face recognition problem. Experiments verified that our proposed scheme is effective for face recognition under partial occlusion.
由于生物特征向量在复杂的光线、姿态和附件下可能不遵循高斯分布,系统在受到脉冲非高斯噪声时往往产生不可接受的性能。本文采用信号对称α稳定分布理论构造分数阶低阶独立分量分析算法(FLOD-ICA),并应用FLOD-ICA解决部分遮挡人脸识别问题。实验验证了该方法对局部遮挡下的人脸识别是有效的。
{"title":"Fractional low-order independent component analysis for face recognition robust to partial occlusion","authors":"X. Chen, Wen Li, Zengli Liu, Zaihong Zhou","doi":"10.1109/ISBAST.2014.7013084","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013084","url":null,"abstract":"As biometric vector may not follow the Gaussian distribution under complex light, pose and accessories, systems often yield unacceptable performance when subjected to impulsive, non-Gaussian noise. This paper adopts signal symmetric alpha stable distribution theory to construct fractional low-order independent component analysis algorithm (FLOD-ICA) and applied FLOD-ICA to solve the partial occlusion face recognition problem. Experiments verified that our proposed scheme is effective for face recognition under partial occlusion.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"577 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-preserving biometrics using matrix random low-rank approximation approach 基于矩阵随机低秩逼近方法的隐私保护生物特征识别
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013085
X. Chen, Luping Zheng, Zengli Liu, Jiashu Zhang
In this paper, we propose a matrix random low-rank approximation (MRLRA) approach to generate cancelable biometric templates for privacy-preserving. MRLRA constructs a random low-rank matrix to approximate the hybridization of biometric feature and a random matrix. Theoretically analysis shows the distance between one cancelable low-rank biometric template by MRLRA and its original template is very small, which results to the verification and authentication performance by MRLRA is near that of original templates. Cancelable biometric templates by MRLRA conquer the weakness of random projection based cancelable biometric templates, in which the performance will deteriorate much under the same tokens. Experiments have verified that (i) cancelable biometric templates by MRLRA are sensitive to the user-specific tokens which are used for constructing the random matrix in MRLRA; (ii) MRLRA can reduce the noise of biometric templates; (iii)Even under the condition of same tokens, the performance of cancelable biometric templates by MRLRA doesn't deteriorate much.
在本文中,我们提出了一种矩阵随机低秩近似(MRLRA)方法来生成可取消的生物特征模板以保护隐私。MRLRA构造一个随机低秩矩阵来近似生物特征与随机矩阵的杂交。理论分析表明,MRLRA的一个可取消的低秩生物特征模板与原始模板之间的距离非常小,使得MRLRA的验证和认证性能接近原始模板。基于MRLRA的可取消生物特征模板克服了基于随机投影的可取消生物特征模板在相同令牌下性能下降较大的缺点。实验验证了(1)MRLRA可取消的生物特征模板对用于构建随机矩阵的用户特定令牌敏感;(ii) MRLRA可以降低生物特征模板的噪声;(iii)即使在相同令牌的情况下,MRLRA对可取消生物特征模板的性能也不会下降太多。
{"title":"Privacy-preserving biometrics using matrix random low-rank approximation approach","authors":"X. Chen, Luping Zheng, Zengli Liu, Jiashu Zhang","doi":"10.1109/ISBAST.2014.7013085","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013085","url":null,"abstract":"In this paper, we propose a matrix random low-rank approximation (MRLRA) approach to generate cancelable biometric templates for privacy-preserving. MRLRA constructs a random low-rank matrix to approximate the hybridization of biometric feature and a random matrix. Theoretically analysis shows the distance between one cancelable low-rank biometric template by MRLRA and its original template is very small, which results to the verification and authentication performance by MRLRA is near that of original templates. Cancelable biometric templates by MRLRA conquer the weakness of random projection based cancelable biometric templates, in which the performance will deteriorate much under the same tokens. Experiments have verified that (i) cancelable biometric templates by MRLRA are sensitive to the user-specific tokens which are used for constructing the random matrix in MRLRA; (ii) MRLRA can reduce the noise of biometric templates; (iii)Even under the condition of same tokens, the performance of cancelable biometric templates by MRLRA doesn't deteriorate much.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115798944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of effective hough transform-based fingerprint alignment approaches 基于霍夫变换的有效指纹比对方法的比较
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013099
Cynthia S. Mlambo, F. Nelwamondo, M. E. Mathekga
In this paper, two effective and mostly used Hough Transform (HT) based fingerprint alignment approaches are compared, namely; Local Match Based Alignment (LMBA) and Discretized Rotation Based Alignment (DRBA). The comparison was performed by considering different conditions of minutiae points, which are rotation, translation and the number of minutiae points. In addition, this research reports the advantages of understanding the quality and relationships between the wide varieties of existing HT based fingerprint alignment methods. Minutiae points extracted from fingerprints of FVC2000 database were used on the experiments to compare these approaches. The results revealed that LMBA approach performs better than the DRBA approach on minutiae points set with larger rotation and small number of points. The DRBA approach was found to perform better with minutiae points with large amount of translation, and the computational time was less than that of LMBA approach. However, the memory usage required in DRBA is greater than memory required in LMBA.
本文比较了基于霍夫变换(Hough Transform, HT)的两种有效且最常用的指纹对准方法,即;局部匹配对齐(LMBA)和离散旋转对齐(DRBA)。通过考虑不同的分点条件(旋转、平移和分点个数)进行比较。此外,本研究报告了了解现有各种基于HT的指纹定位方法之间的质量和关系的优势。利用FVC2000数据库中提取的指纹特征点进行实验比较。结果表明,在旋转较大、点数较少的细节点集上,LMBA方法优于DRBA方法。结果表明,DRBA方法在处理平移量较大的细节点时表现较好,且计算时间小于LMBA方法。但是,DRBA中所需的内存使用量大于LMBA中所需的内存。
{"title":"Comparison of effective hough transform-based fingerprint alignment approaches","authors":"Cynthia S. Mlambo, F. Nelwamondo, M. E. Mathekga","doi":"10.1109/ISBAST.2014.7013099","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013099","url":null,"abstract":"In this paper, two effective and mostly used Hough Transform (HT) based fingerprint alignment approaches are compared, namely; Local Match Based Alignment (LMBA) and Discretized Rotation Based Alignment (DRBA). The comparison was performed by considering different conditions of minutiae points, which are rotation, translation and the number of minutiae points. In addition, this research reports the advantages of understanding the quality and relationships between the wide varieties of existing HT based fingerprint alignment methods. Minutiae points extracted from fingerprints of FVC2000 database were used on the experiments to compare these approaches. The results revealed that LMBA approach performs better than the DRBA approach on minutiae points set with larger rotation and small number of points. The DRBA approach was found to perform better with minutiae points with large amount of translation, and the computational time was less than that of LMBA approach. However, the memory usage required in DRBA is greater than memory required in LMBA.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"67 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration 有点同态密码的矩阵乘法使用GPU加速
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013115
Yuan Tian, Mznah Al-Rodhaan, Biao Song, A. Al-Dhelaan, Tinghuai Ma
Homomorphic encryption has become a popular research topic since the cloud computing paradigm emerged. This paper discusses the design of a GPU-assisted homomorphic cryptograph for matrix operation. Our proposed scheme is based on an n*n matrix multiplication which are computationally homomorphic. We use more efficient GPU programming scheme with the extension of DGHV homomorphism, which prove the result of verification does not leak any information about the inputs or the output during the encryption and decryption. The performance results are obtained from the executions on a machine equipped with a GeForce GTX 765M GPU. We use three basic parallel algorithms to form efficient solutions which accelerate the speed of encryption and evaluation. Although fully homomorphic encryption is still not practical for real world applications in current stage, this work shows the possibility to improve the performance of homomorphic encryption and achieve this target one step closer.
自云计算范式出现以来,同态加密已成为一个热门的研究课题。本文讨论了一种基于gpu辅助的矩阵运算同态密码系统的设计。我们提出的方案是基于计算同态的n*n矩阵乘法。通过扩展DGHV同态,我们采用了更高效的GPU编程方案,证明了验证结果在加解密过程中不会泄露输入和输出的任何信息。性能结果是在配备GeForce GTX 765M GPU的机器上执行的。我们使用三种基本的并行算法来形成有效的解决方案,从而加快了加密和评估的速度。虽然在目前阶段,完全同态加密在现实世界的应用中仍然不实用,但这项工作显示了提高同态加密性能并实现这一目标的可能性。
{"title":"Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration","authors":"Yuan Tian, Mznah Al-Rodhaan, Biao Song, A. Al-Dhelaan, Tinghuai Ma","doi":"10.1109/ISBAST.2014.7013115","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013115","url":null,"abstract":"Homomorphic encryption has become a popular research topic since the cloud computing paradigm emerged. This paper discusses the design of a GPU-assisted homomorphic cryptograph for matrix operation. Our proposed scheme is based on an n*n matrix multiplication which are computationally homomorphic. We use more efficient GPU programming scheme with the extension of DGHV homomorphism, which prove the result of verification does not leak any information about the inputs or the output during the encryption and decryption. The performance results are obtained from the executions on a machine equipped with a GeForce GTX 765M GPU. We use three basic parallel algorithms to form efficient solutions which accelerate the speed of encryption and evaluation. Although fully homomorphic encryption is still not practical for real world applications in current stage, this work shows the possibility to improve the performance of homomorphic encryption and achieve this target one step closer.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129654084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survey of anti-phishing tools with detection capabilities 具有检测功能的反网络钓鱼工具的调查
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013124
Hiba Zuhair Zeydan, A. Selamat, M. Salleh
Phishers have been continually changed their tricks and emerged novel variants for more security violations and causes of monetary losses in business organizations. The lack of existing anti-phishing solutions considered as an optimum anti-phishing is because of detection incapability specifically against novel phishes. This paper classifies the existing anti-phishing tools, identifies their detection incapability against several kinds of novel phishes and underscores the issues behind this problem. Further it suggests next wave of research to solve it. Targeting academic and industry researchers, this paper provide a valuable source of information to contribute the cyberspace with new products and fulfill the security flaws.
网络钓鱼者不断改变他们的技巧,并出现新的变体,以更多地违反安全并导致商业组织的经济损失。现有的反网络钓鱼解决方案缺乏被认为是最优的反网络钓鱼解决方案,因为对新网络钓鱼的检测能力不足。本文对现有的反网络钓鱼工具进行了分类,指出了它们对几种新型网络钓鱼的检测能力不足,并强调了这一问题背后的问题。此外,它还提出了解决这一问题的下一波研究。本文针对学术界和工业界的研究人员,为网络空间的新产品和填补安全漏洞提供了有价值的信息来源。
{"title":"Survey of anti-phishing tools with detection capabilities","authors":"Hiba Zuhair Zeydan, A. Selamat, M. Salleh","doi":"10.1109/ISBAST.2014.7013124","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013124","url":null,"abstract":"Phishers have been continually changed their tricks and emerged novel variants for more security violations and causes of monetary losses in business organizations. The lack of existing anti-phishing solutions considered as an optimum anti-phishing is because of detection incapability specifically against novel phishes. This paper classifies the existing anti-phishing tools, identifies their detection incapability against several kinds of novel phishes and underscores the issues behind this problem. Further it suggests next wave of research to solve it. Targeting academic and industry researchers, this paper provide a valuable source of information to contribute the cyberspace with new products and fulfill the security flaws.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1