首页 > 最新文献

Proceedings of the ACM Web Conference 2023最新文献

英文 中文
Recommendation with Causality enhanced Natural Language Explanations 推荐与因果关系增强自然语言解释
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583260
Jingsen Zhang, Xu Chen, Jiakai Tang, Weiqi Shao, Quanyu Dai, Zhenhua Dong, Rui Zhang
Explainable recommendation has recently attracted increasing attention from both academic and industry communities. Among different explainable strategies, generating natural language explanations is an important method, which can deliver more informative, flexible and readable explanations to facilitate better user decisions. Despite the effectiveness, existing models are mostly optimized based on the observed datasets, which can be skewed due to the selection or exposure bias. To alleviate this problem, in this paper, we formulate the task of explainable recommendation with a causal graph, and design a causality enhanced framework to generate unbiased explanations. More specifically, we firstly define an ideal unbiased learning objective, and then derive a tractable loss for the observational data based on the inverse propensity score (IPS), where the key is a sample re-weighting strategy for equalizing the loss and ideal objective in expectation. Considering that the IPS estimated from the sparse and noisy recommendation datasets can be inaccurate, we introduce a fault tolerant mechanism by minimizing the maximum loss induced by the sample weights near the IPS. For more comprehensive modeling, we further analyze and infer the potential latent confounders induced by the complex and diverse user personalities. We conduct extensive experiments by comparing with the state-of-the-art methods based on three real-world datasets to demonstrate the effectiveness of our method.
最近,可解释推荐越来越受到学术界和产业界的关注。在不同的可解释策略中,生成自然语言解释是一种重要的方法,它可以提供更多的信息,灵活和可读的解释,以促进更好的用户决策。尽管有效,但现有模型大多是基于观测数据集进行优化的,这可能由于选择或暴露偏差而产生偏差。为了缓解这一问题,在本文中,我们制定了一个因果图的可解释推荐任务,并设计了一个因果关系增强框架来生成无偏的解释。更具体地说,我们首先定义了一个理想的无偏学习目标,然后基于逆倾向得分(IPS)推导了观测数据的可处理损失,其中关键是平衡损失和理想目标期望的样本重新加权策略。考虑到从稀疏和噪声推荐数据集估计的IPS可能不准确,我们引入了一种容错机制,通过最小化IPS附近样本权值引起的最大损失。为了更全面的建模,我们进一步分析和推断由复杂多样的用户个性引起的潜在混杂因素。通过与基于三个真实世界数据集的最先进方法进行比较,我们进行了广泛的实验,以证明我们的方法的有效性。
{"title":"Recommendation with Causality enhanced Natural Language Explanations","authors":"Jingsen Zhang, Xu Chen, Jiakai Tang, Weiqi Shao, Quanyu Dai, Zhenhua Dong, Rui Zhang","doi":"10.1145/3543507.3583260","DOIUrl":"https://doi.org/10.1145/3543507.3583260","url":null,"abstract":"Explainable recommendation has recently attracted increasing attention from both academic and industry communities. Among different explainable strategies, generating natural language explanations is an important method, which can deliver more informative, flexible and readable explanations to facilitate better user decisions. Despite the effectiveness, existing models are mostly optimized based on the observed datasets, which can be skewed due to the selection or exposure bias. To alleviate this problem, in this paper, we formulate the task of explainable recommendation with a causal graph, and design a causality enhanced framework to generate unbiased explanations. More specifically, we firstly define an ideal unbiased learning objective, and then derive a tractable loss for the observational data based on the inverse propensity score (IPS), where the key is a sample re-weighting strategy for equalizing the loss and ideal objective in expectation. Considering that the IPS estimated from the sparse and noisy recommendation datasets can be inaccurate, we introduce a fault tolerant mechanism by minimizing the maximum loss induced by the sample weights near the IPS. For more comprehensive modeling, we further analyze and infer the potential latent confounders induced by the complex and diverse user personalities. We conduct extensive experiments by comparing with the state-of-the-art methods based on three real-world datasets to demonstrate the effectiveness of our method.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134298381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demystifying Mobile Extended Reality in Web Browsers: How Far Can We Go? 揭秘Web浏览器中的移动扩展现实:我们能走多远?
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583329
Weichen Bi, Yun Ma, Deyu Tian, Qi Yang, Mingtao Zhang, Xiang Jing
Mobile extended reality (XR) has developed rapidly in recent years. Compared with the app-based XR, XR in web browsers has the advantages of being lightweight and cross-platform, providing users with a pervasive experience. Therefore, many frameworks are emerging to support the development of XR in web browsers. However, little has been known about how well these frameworks perform and how complex XR apps modern web browsers can support on mobile devices. To fill the knowledge gap, in this paper, we conduct an empirical study of mobile XR in web browsers. We select seven most popular web-based XR frameworks and investigate their runtime performance, including 3D rendering, camera capturing, and real-world understanding. We find that current frameworks have the potential to further enhance their performance by increasing GPU utilization or improving computing parallelism. Besides, for 3D scenes with good rendering performance, developers can feel free to add camera capturing with little influence on performance to support augmented reality (AR) and mixed reality (MR) applications. Based on our findings, we draw several practical implications to provide better XR support in web browsers.
移动扩展现实技术(XR)近年来发展迅速。与基于应用程序的XR相比,web浏览器中的XR具有轻量级和跨平台的优势,可以为用户提供无处不在的体验。因此,出现了许多支持在web浏览器中开发XR的框架。然而,对于这些框架的性能如何,以及现代web浏览器在移动设备上能支持多复杂的XR应用程序,人们知之甚少。为了填补这一知识空白,本文对web浏览器中的移动XR进行了实证研究。我们选择了七个最流行的基于web的XR框架,并调查了它们的运行时性能,包括3D渲染、相机捕捉和现实世界的理解。我们发现当前的框架有潜力通过增加GPU利用率或提高计算并行性来进一步提高其性能。此外,对于渲染性能较好的3D场景,开发者可以随意添加对性能影响较小的摄像头捕捉,以支持增强现实(AR)和混合现实(MR)应用。根据我们的发现,我们得出了在web浏览器中提供更好的XR支持的几个实际含义。
{"title":"Demystifying Mobile Extended Reality in Web Browsers: How Far Can We Go?","authors":"Weichen Bi, Yun Ma, Deyu Tian, Qi Yang, Mingtao Zhang, Xiang Jing","doi":"10.1145/3543507.3583329","DOIUrl":"https://doi.org/10.1145/3543507.3583329","url":null,"abstract":"Mobile extended reality (XR) has developed rapidly in recent years. Compared with the app-based XR, XR in web browsers has the advantages of being lightweight and cross-platform, providing users with a pervasive experience. Therefore, many frameworks are emerging to support the development of XR in web browsers. However, little has been known about how well these frameworks perform and how complex XR apps modern web browsers can support on mobile devices. To fill the knowledge gap, in this paper, we conduct an empirical study of mobile XR in web browsers. We select seven most popular web-based XR frameworks and investigate their runtime performance, including 3D rendering, camera capturing, and real-world understanding. We find that current frameworks have the potential to further enhance their performance by increasing GPU utilization or improving computing parallelism. Besides, for 3D scenes with good rendering performance, developers can feel free to add camera capturing with little influence on performance to support augmented reality (AR) and mixed reality (MR) applications. Based on our findings, we draw several practical implications to provide better XR support in web browsers.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133900868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms 你所有的商店都属于我们:电子商务平台的安全弱点
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583319
Rohan Pagey, Mohammad Mannan, Amr M. Youssef
Software as a Service (SaaS) e-commerce platforms for merchants allow individual business owners to set up their online stores almost instantly. Prior work has shown that the checkout flows and payment integration of some e-commerce applications are vulnerable to logic bugs with serious financial consequences, e.g., allowing “shopping for free”. Apart from checkout and payment integration, vulnerabilities in other e-commerce operations have remained largely unexplored, even though they can have far more serious consequences, e.g., enabling “store takeover”. In this work, we design and implement a security evaluation framework to uncover security vulnerabilities in e-commerce operations beyond checkout/payment integration. We use this framework to analyze 32 representative e-commerce platforms, including web services of 24 commercial SaaS platforms and 15 associated Android apps, and 8 open source platforms; these platforms host over 10 million stores as approximated through Google dorks. We uncover several new vulnerabilities with serious consequences, e.g., allowing an attacker to take over all stores under a platform, and listing illegal products at a victim’s store—in addition to “shopping for free” bugs, without exploiting the checkout/payment process. We found 12 platforms vulnerable to store takeover (affecting 41000+ stores) and 6 platforms vulnerable to shopping for free (affecting 19000+ stores, approximated via Google dorks on Oct. 8, 2022). We have responsibly disclosed the vulnerabilities to all affected parties, and requested four CVEs (three assigned, and one is pending review).
面向商家的软件即服务(SaaS)电子商务平台允许个体企业主几乎立即建立自己的在线商店。先前的工作表明,一些电子商务应用程序的结帐流程和支付集成容易受到逻辑错误的影响,从而导致严重的财务后果,例如,允许“免费购物”。除了结帐和支付集成之外,其他电子商务业务的漏洞在很大程度上仍未被探索,尽管它们可能会产生更严重的后果,例如导致“商店接管”。在这项工作中,我们设计并实现了一个安全评估框架,以发现电子商务操作中结帐/支付集成之外的安全漏洞。我们用这个框架分析了32个有代表性的电子商务平台,包括24个商业SaaS平台的web服务和15个关联的Android应用,以及8个开源平台;根据Google的统计,这些平台拥有超过1000万家商店。我们发现了几个具有严重后果的新漏洞,例如,允许攻击者接管平台下的所有商店,并在受害者的商店中列出非法产品-除了“免费购物”漏洞之外,还没有利用结帐/支付过程。我们发现12个平台容易受到商店接管的影响(影响41000多家商店),6个平台容易受到免费购物的影响(影响19000多家商店,根据谷歌呆子在2022年10月8日的估计)。我们负责任地向所有受影响方披露了漏洞,并请求了四个cve(三个已分配,一个正在审查中)。
{"title":"All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms","authors":"Rohan Pagey, Mohammad Mannan, Amr M. Youssef","doi":"10.1145/3543507.3583319","DOIUrl":"https://doi.org/10.1145/3543507.3583319","url":null,"abstract":"Software as a Service (SaaS) e-commerce platforms for merchants allow individual business owners to set up their online stores almost instantly. Prior work has shown that the checkout flows and payment integration of some e-commerce applications are vulnerable to logic bugs with serious financial consequences, e.g., allowing “shopping for free”. Apart from checkout and payment integration, vulnerabilities in other e-commerce operations have remained largely unexplored, even though they can have far more serious consequences, e.g., enabling “store takeover”. In this work, we design and implement a security evaluation framework to uncover security vulnerabilities in e-commerce operations beyond checkout/payment integration. We use this framework to analyze 32 representative e-commerce platforms, including web services of 24 commercial SaaS platforms and 15 associated Android apps, and 8 open source platforms; these platforms host over 10 million stores as approximated through Google dorks. We uncover several new vulnerabilities with serious consequences, e.g., allowing an attacker to take over all stores under a platform, and listing illegal products at a victim’s store—in addition to “shopping for free” bugs, without exploiting the checkout/payment process. We found 12 platforms vulnerable to store takeover (affecting 41000+ stores) and 6 platforms vulnerable to shopping for free (affecting 19000+ stores, approximated via Google dorks on Oct. 8, 2022). We have responsibly disclosed the vulnerabilities to all affected parties, and requested four CVEs (three assigned, and one is pending review).","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123848384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-head Variational Graph Autoencoder Constrained by Sum-product Networks 和积网络约束的多头变分图自编码器
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583517
Riting Xia, Yan Zhang, Chunxu Zhang, Xueyan Liu, Bo Yang
Variational graph autoencoder (VGAE) is a promising deep probabilistic model in graph representation learning. However, most existing VGAEs adopt the mean-field assumption, and cannot characterize the graphs with noise well. In this paper, we propose a novel deep probabilistic model for graph analysis, termed Multi-head Variational Graph Autoencoder Constrained by Sum-product Networks (named SPN-MVGAE), which helps to relax the mean-field assumption and learns better latent representation with fault tolerance. Our proposed model SPN-MVGAE uses conditional sum-product networks as constraints to learn the dependencies between latent factors in an end-to-end manner. Furthermore, we introduce the superposition of the latent representations learned by multiple variational networks to represent the final latent representations of nodes. Our model is the first use sum-product networks for graph representation learning, extending the scope of sum-product networks applications. Experimental results show that compared with other baseline methods, our model has competitive advantages in link prediction, fault tolerance, node classification, and graph visualization on real datasets.
变分图自编码器(VGAE)是图表示学习中一个很有前途的深度概率模型。然而,现有的VGAEs大多采用平均场假设,不能很好地表征带有噪声的图。在本文中,我们提出了一种新的深度概率图分析模型,称为和积网络约束的多头变分图自编码器(SPN-MVGAE),它有助于放松平均场假设并学习更好的容错潜在表示。我们提出的模型SPN-MVGAE使用条件和积网络作为约束,以端到端方式学习潜在因素之间的依赖关系。此外,我们引入了由多个变分网络学习的潜在表征的叠加来表示节点的最终潜在表征。我们的模型是第一个使用和积网络进行图表示学习,扩展了和积网络的应用范围。实验结果表明,与其他基线方法相比,我们的模型在真实数据集上的链路预测、容错、节点分类和图形可视化等方面具有竞争优势。
{"title":"Multi-head Variational Graph Autoencoder Constrained by Sum-product Networks","authors":"Riting Xia, Yan Zhang, Chunxu Zhang, Xueyan Liu, Bo Yang","doi":"10.1145/3543507.3583517","DOIUrl":"https://doi.org/10.1145/3543507.3583517","url":null,"abstract":"Variational graph autoencoder (VGAE) is a promising deep probabilistic model in graph representation learning. However, most existing VGAEs adopt the mean-field assumption, and cannot characterize the graphs with noise well. In this paper, we propose a novel deep probabilistic model for graph analysis, termed Multi-head Variational Graph Autoencoder Constrained by Sum-product Networks (named SPN-MVGAE), which helps to relax the mean-field assumption and learns better latent representation with fault tolerance. Our proposed model SPN-MVGAE uses conditional sum-product networks as constraints to learn the dependencies between latent factors in an end-to-end manner. Furthermore, we introduce the superposition of the latent representations learned by multiple variational networks to represent the final latent representations of nodes. Our model is the first use sum-product networks for graph representation learning, extending the scope of sum-product networks applications. Experimental results show that compared with other baseline methods, our model has competitive advantages in link prediction, fault tolerance, node classification, and graph visualization on real datasets.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127903408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ColdNAS: Search to Modulate for User Cold-Start Recommendation ColdNAS:搜索调节用户冷启动推荐
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583344
Shiguang Wu, Yaqing Wang, Qinghe Jing, Daxiang Dong, D. Dou, Quanming Yao
Making personalized recommendation for cold-start users, who only have a few interaction histories, is a challenging problem in recommendation systems. Recent works leverage hypernetworks to directly map user interaction histories to user-specific parameters, which are then used to modulate predictor by feature-wise linear modulation function. These works obtain the state-of-the-art performance. However, the physical meaning of scaling and shifting in recommendation data is unclear. Instead of using a fixed modulation function and deciding modulation position by expertise, we propose a modulation framework called ColdNAS for user cold-start problem, where we look for proper modulation structure, including function and position, via neural architecture search. We design a search space which covers broad models and theoretically prove that this search space can be transformed to a much smaller space, enabling an efficient and robust one-shot search algorithm. Extensive experimental results on benchmark datasets show that ColdNAS consistently performs the best. We observe that different modulation functions lead to the best performance on different datasets, which validates the necessity of designing a searching-based method. Codes are available at https://github.com/LARS-research/ColdNAS.
在推荐系统中,对那些只有少量交互历史的冷启动用户进行个性化推荐是一个具有挑战性的问题。最近的工作利用超网络直接将用户交互历史映射到用户特定的参数,然后使用特征线性调制函数来调制预测器。这些作品获得了最先进的表现。然而,推荐数据中缩放和移动的物理含义尚不清楚。我们提出了一个名为ColdNAS的调制框架,以解决用户冷启动问题,而不是使用固定的调制函数和由专业知识决定调制位置,我们通过神经结构搜索来寻找适当的调制结构,包括功能和位置。我们设计了一个涵盖广泛模型的搜索空间,并从理论上证明了该搜索空间可以转换到更小的空间,从而实现了高效、鲁棒的一次性搜索算法。在基准数据集上的大量实验结果表明,ColdNAS始终表现最佳。我们观察到不同的调制函数在不同的数据集上产生最佳的性能,这验证了设计基于搜索的方法的必要性。代码可在https://github.com/LARS-research/ColdNAS上获得。
{"title":"ColdNAS: Search to Modulate for User Cold-Start Recommendation","authors":"Shiguang Wu, Yaqing Wang, Qinghe Jing, Daxiang Dong, D. Dou, Quanming Yao","doi":"10.1145/3543507.3583344","DOIUrl":"https://doi.org/10.1145/3543507.3583344","url":null,"abstract":"Making personalized recommendation for cold-start users, who only have a few interaction histories, is a challenging problem in recommendation systems. Recent works leverage hypernetworks to directly map user interaction histories to user-specific parameters, which are then used to modulate predictor by feature-wise linear modulation function. These works obtain the state-of-the-art performance. However, the physical meaning of scaling and shifting in recommendation data is unclear. Instead of using a fixed modulation function and deciding modulation position by expertise, we propose a modulation framework called ColdNAS for user cold-start problem, where we look for proper modulation structure, including function and position, via neural architecture search. We design a search space which covers broad models and theoretically prove that this search space can be transformed to a much smaller space, enabling an efficient and robust one-shot search algorithm. Extensive experimental results on benchmark datasets show that ColdNAS consistently performs the best. We observe that different modulation functions lead to the best performance on different datasets, which validates the necessity of designing a searching-based method. Codes are available at https://github.com/LARS-research/ColdNAS.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121442178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency of Non-Truthful Auctions in Auto-bidding: The Power of Randomization 自动竞价中非真实拍卖的效率:随机化的力量
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583492
Christopher Liaw, Aranyak Mehta, Andres Perlroth
Auto-bidding is now widely adopted as an interface between advertisers and internet advertising as it allows advertisers to specify high-level goals, such as maximizing value subject to a value-per-spend constraint. Prior research has mainly focused on auctions that are truthful (such as a second-price auction) because these auctions admit simple (uniform) bidding strategies and are thus simpler to analyze. The main contribution of this paper is to characterize the efficiency across the spectrum of all auctions, including non-truthful auctions for which optimal bidding may be complex. For deterministic auctions, we show a dominance result: any uniform bidding equilibrium of a second-price auction (SPA) can be mapped to an equilibrium of any other auction – for example, first price auction (FPA) – with identical outcomes. In this sense, SPA with uniform bidding is an instance-wise optimal deterministic auction. Consequently, the price of anarchy (PoA) of any deterministic auction is at least the PoA of SPA with uniform bidding, which is known to be 2. We complement this by showing that the PoA of FPA without uniform bidding is 2. Next, we show, surprisingly, that truthful pricing is not dominant in the randomized setting. There is a randomized version of FPA that achieves a strictly smaller price of anarchy than its truthful counterpart when there are two bidders per query. Furthermore, this randomized FPA achieves the best-known PoA for two bidders, thus showing the power of non-truthfulness when combined with randomization. Finally, we show that no prior-free auction (even randomized, non-truthful) can improve on a PoA bound of 2 when there are a large number of advertisers per auction. These results should be interpreted qualitatively as follows. When the auction pressure is low, randomization and non-truthfulness is beneficial. On the other hand, if the auction pressure is intense, the benefits diminishes and it is optimal to implement a second-price auction.
自动竞价现在被广泛采用为广告商和互联网广告之间的接口,因为它允许广告商指定高级目标,例如最大化受每支出价值约束的价值。先前的研究主要集中在真实的拍卖(如二次价格拍卖),因为这些拍卖采用简单(统一)的出价策略,因此更容易分析。本文的主要贡献是描述了所有拍卖的效率,包括最优出价可能很复杂的非真实拍卖。对于确定性拍卖,我们展示了一个支配性结果:第二价格拍卖(SPA)的任何统一竞价均衡都可以映射到具有相同结果的任何其他拍卖(例如,第一价格拍卖(FPA))的均衡。从这个意义上说,统一竞价的SPA是一种基于实例的最优确定性拍卖。因此,任何确定性拍卖的无政府状态价格(PoA)至少是统一出价的SPA的PoA,已知为2。我们通过显示未统一招标的FPA PoA为2来补充这一点。接下来,令人惊讶的是,我们发现真实定价在随机环境中并不占主导地位。有一个随机版本的FPA,当每个查询有两个竞标者时,它的无政府状态价格比真实版本的价格要小得多。此外,这种随机化的FPA为两个竞标者实现了最知名的PoA,从而显示了非真实性与随机化相结合的力量。最后,我们表明,当每次拍卖有大量广告商时,没有任何无先验拍卖(即使是随机的、非真实的)可以提高PoA界限为2。这些结果应定性地解释如下。当拍卖压力较低时,随机化和非真实性是有利的。另一方面,如果拍卖压力较大,则收益减少,则实施二次价格拍卖是最佳选择。
{"title":"Efficiency of Non-Truthful Auctions in Auto-bidding: The Power of Randomization","authors":"Christopher Liaw, Aranyak Mehta, Andres Perlroth","doi":"10.1145/3543507.3583492","DOIUrl":"https://doi.org/10.1145/3543507.3583492","url":null,"abstract":"Auto-bidding is now widely adopted as an interface between advertisers and internet advertising as it allows advertisers to specify high-level goals, such as maximizing value subject to a value-per-spend constraint. Prior research has mainly focused on auctions that are truthful (such as a second-price auction) because these auctions admit simple (uniform) bidding strategies and are thus simpler to analyze. The main contribution of this paper is to characterize the efficiency across the spectrum of all auctions, including non-truthful auctions for which optimal bidding may be complex. For deterministic auctions, we show a dominance result: any uniform bidding equilibrium of a second-price auction (SPA) can be mapped to an equilibrium of any other auction – for example, first price auction (FPA) – with identical outcomes. In this sense, SPA with uniform bidding is an instance-wise optimal deterministic auction. Consequently, the price of anarchy (PoA) of any deterministic auction is at least the PoA of SPA with uniform bidding, which is known to be 2. We complement this by showing that the PoA of FPA without uniform bidding is 2. Next, we show, surprisingly, that truthful pricing is not dominant in the randomized setting. There is a randomized version of FPA that achieves a strictly smaller price of anarchy than its truthful counterpart when there are two bidders per query. Furthermore, this randomized FPA achieves the best-known PoA for two bidders, thus showing the power of non-truthfulness when combined with randomization. Finally, we show that no prior-free auction (even randomized, non-truthful) can improve on a PoA bound of 2 when there are a large number of advertisers per auction. These results should be interpreted qualitatively as follows. When the auction pressure is low, randomization and non-truthfulness is beneficial. On the other hand, if the auction pressure is intense, the benefits diminishes and it is optimal to implement a second-price auction.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"121 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129406046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Membership Inference Attacks Against Sequential Recommender Systems 针对顺序推荐系统的成员推理攻击
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583447
Zhihao Zhu, Chenwang Wu, Rui Fan, Defu Lian, Enhong Chen
Recent studies have demonstrated the vulnerability of recommender systems to membership inference attacks, which determine whether a user’s historical data was utilized for model training, posing serious privacy leakage issues. Existing works assumed that member and non-member users follow different recommendation modes, and then infer membership based on the difference vector between the user’s historical behaviors and the recommendation list. The previous frameworks are invalid against inductive recommendations, such as sequential recommendations, since the disparities of difference vectors constructed by the recommendations between members and non-members become imperceptible. This motivates us to dig deeper into the target model. In addition, most MIA frameworks assume that they can obtain some in-distribution data from the same distribution of the target data, which is hard to gain in recommender system. To address these difficulties, we propose a Membership Inference Attack framework against sequential recommenders based on Model Extraction(ME-MIA). Specifically, we train a surrogate model to simulate the target model based on two universal loss functions. For a given behavior sequence, the loss functions ensure the recommended items and corresponding rank of the surrogate model are consistent with the target model’s recommendation. Due to the special training mode of the surrogate model, it is hard to judge which user is its member(non-member). Therefore, we establish a shadow model and use shadow model’s members(non-members) to train the attack model later. Next, we build a user feature generator to construct representative feature vectors from the shadow(surrogate) model. The crafting feature vectors are finally input into the attack model to identify users’ membership. Furthermore, to tackle the high cost of obtaining in-distribution data, we develop two variants of ME-MIA, realizing data-efficient and even data-free MIA by fabricating authentic in-distribution data. Notably, the latter is impossible in the previous works. Finally, we evaluate ME-MIA against multiple sequential recommendation models on three real-world datasets. Experimental results show that ME-MIA and its variants can achieve efficient extraction and outperform state-of-the-art algorithms in terms of attack performance.
最近的研究表明,推荐系统容易受到成员推理攻击的影响,这种攻击决定了用户的历史数据是否被用于模型训练,造成了严重的隐私泄露问题。现有的工作假设会员用户和非会员用户遵循不同的推荐模式,然后根据用户历史行为与推荐列表之间的差向量来推断隶属度。以前的框架对于归纳推荐(如顺序推荐)无效,因为由成员和非成员之间的推荐构建的差异向量的差异变得难以察觉。这促使我们更深入地挖掘目标模型。此外,大多数MIA框架都假设它们可以从目标数据的相同分布中获得一些分布内数据,这在推荐系统中是很难获得的。为了解决这些困难,我们提出了一个基于模型提取(ME-MIA)的针对顺序推荐的成员推理攻击框架。具体来说,我们训练了一个代理模型来模拟基于两个通用损失函数的目标模型。对于给定的行为序列,损失函数确保代理模型的推荐项目和相应的等级与目标模型的推荐一致。由于代理模型的特殊训练模式,很难判断哪个用户是它的成员(非成员)。因此,我们建立了一个影子模型,然后利用影子模型的成员(非成员)来训练攻击模型。接下来,我们构建一个用户特征生成器,从阴影(代理)模型构造具有代表性的特征向量。最后将生成的特征向量输入到攻击模型中,以识别用户的隶属关系。此外,为了解决获取分布中数据的高成本问题,我们开发了两种ME-MIA变体,通过制造真实的分布中数据来实现数据高效甚至无数据的MIA。值得注意的是,后者在之前的作品中是不可能的。最后,我们在三个真实数据集上对多个顺序推荐模型进行了ME-MIA评估。实验结果表明,ME-MIA及其变体可以实现高效的提取,并且在攻击性能方面优于现有算法。
{"title":"Membership Inference Attacks Against Sequential Recommender Systems","authors":"Zhihao Zhu, Chenwang Wu, Rui Fan, Defu Lian, Enhong Chen","doi":"10.1145/3543507.3583447","DOIUrl":"https://doi.org/10.1145/3543507.3583447","url":null,"abstract":"Recent studies have demonstrated the vulnerability of recommender systems to membership inference attacks, which determine whether a user’s historical data was utilized for model training, posing serious privacy leakage issues. Existing works assumed that member and non-member users follow different recommendation modes, and then infer membership based on the difference vector between the user’s historical behaviors and the recommendation list. The previous frameworks are invalid against inductive recommendations, such as sequential recommendations, since the disparities of difference vectors constructed by the recommendations between members and non-members become imperceptible. This motivates us to dig deeper into the target model. In addition, most MIA frameworks assume that they can obtain some in-distribution data from the same distribution of the target data, which is hard to gain in recommender system. To address these difficulties, we propose a Membership Inference Attack framework against sequential recommenders based on Model Extraction(ME-MIA). Specifically, we train a surrogate model to simulate the target model based on two universal loss functions. For a given behavior sequence, the loss functions ensure the recommended items and corresponding rank of the surrogate model are consistent with the target model’s recommendation. Due to the special training mode of the surrogate model, it is hard to judge which user is its member(non-member). Therefore, we establish a shadow model and use shadow model’s members(non-members) to train the attack model later. Next, we build a user feature generator to construct representative feature vectors from the shadow(surrogate) model. The crafting feature vectors are finally input into the attack model to identify users’ membership. Furthermore, to tackle the high cost of obtaining in-distribution data, we develop two variants of ME-MIA, realizing data-efficient and even data-free MIA by fabricating authentic in-distribution data. Notably, the latter is impossible in the previous works. Finally, we evaluate ME-MIA against multiple sequential recommendation models on three real-world datasets. Experimental results show that ME-MIA and its variants can achieve efficient extraction and outperform state-of-the-art algorithms in terms of attack performance.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"409 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116134220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MoleRec: Combinatorial Drug Recommendation with Substructure-Aware Molecular Representation Learning 基于子结构感知的分子表征学习的组合药物推荐
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583872
Nianzu Yang, Kaipeng Zeng, Qitian Wu, Junchi Yan
Combinatorial drug recommendation involves recommending a personalized combination of medication (drugs) to a patient over his/her longitudinal history, which essentially aims at solving a combinatorial optimization problem that pursues high accuracy under the safety constraint. Among existing learning-based approaches, the association between drug substructures (i.e., a sub-graph of the molecule that contributes to certain chemical effect) and the target disease is largely overlooked, though the function of drugs in fact exhibits strong relevance with particular substructures. To address this issue, we propose a molecular substructure-aware encoding method entitled MoleRec that entails a hierarchical architecture aimed at modeling inter-substructure interactions and individual substructures’ impact on patient’s health condition, in order to identify those substructures that really contribute to healing patients. Specifically, MoleRec learns to attentively pooling over substructure representations which will be element-wisely re-scaled by the model’s inferred relevancy with a patient’s health condition to obtain a prior-knowledge-informed drug representation. We further design a weight annealing strategy for drug-drug-interaction (DDI) objective to adaptively control the balance between accuracy and safety criteria throughout training. Experiments on the MIMIC-III dataset demonstrate that our approach achieves new state-of-the-art performance w.r.t. four accuracy and safety metrics. Our source code is publicly available at https://github.com/yangnianzu0515/MoleRec.
组合推荐药物是根据患者的纵向病史,向患者推荐个性化的药物组合,其本质是解决在安全约束下追求高精度的组合优化问题。在现有的基于学习的方法中,药物亚结构(即,有助于某些化学作用的分子的子图)与目标疾病之间的关联在很大程度上被忽视,尽管药物的功能实际上与特定的亚结构有很强的相关性。为了解决这个问题,我们提出了一种名为MoleRec的分子子结构感知编码方法,该方法需要一个分层结构,旨在模拟子结构之间的相互作用和单个子结构对患者健康状况的影响,以确定那些真正有助于治愈患者的子结构。具体来说,MoleRec学会了对子结构表征进行集中,这些表征将根据模型与患者健康状况的推断相关性进行元素明智地重新缩放,以获得先验知识知情的药物表征。我们进一步设计了药物-药物相互作用(DDI)目标的权值退火策略,在整个训练过程中自适应控制准确性和安全性标准之间的平衡。在MIMIC-III数据集上的实验表明,我们的方法实现了新的最先进的性能,包括四个精度和安全性指标。我们的源代码可以在https://github.com/yangnianzu0515/MoleRec上公开获得。
{"title":"MoleRec: Combinatorial Drug Recommendation with Substructure-Aware Molecular Representation Learning","authors":"Nianzu Yang, Kaipeng Zeng, Qitian Wu, Junchi Yan","doi":"10.1145/3543507.3583872","DOIUrl":"https://doi.org/10.1145/3543507.3583872","url":null,"abstract":"Combinatorial drug recommendation involves recommending a personalized combination of medication (drugs) to a patient over his/her longitudinal history, which essentially aims at solving a combinatorial optimization problem that pursues high accuracy under the safety constraint. Among existing learning-based approaches, the association between drug substructures (i.e., a sub-graph of the molecule that contributes to certain chemical effect) and the target disease is largely overlooked, though the function of drugs in fact exhibits strong relevance with particular substructures. To address this issue, we propose a molecular substructure-aware encoding method entitled MoleRec that entails a hierarchical architecture aimed at modeling inter-substructure interactions and individual substructures’ impact on patient’s health condition, in order to identify those substructures that really contribute to healing patients. Specifically, MoleRec learns to attentively pooling over substructure representations which will be element-wisely re-scaled by the model’s inferred relevancy with a patient’s health condition to obtain a prior-knowledge-informed drug representation. We further design a weight annealing strategy for drug-drug-interaction (DDI) objective to adaptively control the balance between accuracy and safety criteria throughout training. Experiments on the MIMIC-III dataset demonstrate that our approach achieves new state-of-the-art performance w.r.t. four accuracy and safety metrics. Our source code is publicly available at https://github.com/yangnianzu0515/MoleRec.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117067693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Leveraging Existing Literature on the Web and Deep Neural Models to Build a Knowledge Graph Focused on Water Quality and Health Risks 利用网络上现有文献和深度神经模型构建一个关注水质和健康风险的知识图谱
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3584185
Nikita Gautam, David Shumway, Megan Kowalcyk, Sarthak Khanal, Doina Caragea, Cornelia Caragea, H. Mcginty, S. Dorevitch
A knowledge graph focusing on water quality in relation to health risks posed by water activities (such as diving or swimming) is not currently available. To address this limitation, we first use existing resources to construct a knowledge graph relevant to water quality and health risks using KNowledge Acquisition and Representation Methodology (KNARM). Subsequently, we explore knowledge graph completion approaches for maintaining and updating the graph. Specifically, we manually identify a set of domain-specific UMLS concepts and use them to extract a graph of approximately 75,000 semantic triples from the Semantic MEDLINE database (which contains head-relation-tail triples extracted from PubMed). Using the resulting knowledge graph, we experiment with the KG-BERT approach for graph completion by employing pre-trained BERT/RoBERTa models and also models fine-tuned on a collection of water quality and health risks abstracts retrieved from the Web of Science. Experimental results show that KG-BERT with BERT/RoBERTa models fine-tuned on a domain-specific corpus improves the performance of KG-BERT with pre-trained models. Furthermore, KG-BERT gives better results than several translational distance or semantic matching baseline models.
目前还没有关于水质与水上活动(如潜水或游泳)造成的健康风险的知识图谱。为了解决这一限制,我们首先使用知识获取和表示方法(KNARM)利用现有资源构建了与水质和健康风险相关的知识图谱。随后,我们探索了维护和更新知识图的知识图补全方法。具体来说,我们手动识别一组特定于领域的UMLS概念,并使用它们从semantic MEDLINE数据库(其中包含从PubMed提取的头-尾三元组)中提取大约75,000个语义三元组的图。使用得到的知识图,我们通过使用预训练的BERT/RoBERTa模型和对从Web of Science检索的水质和健康风险摘要集合进行微调的模型,对KG-BERT方法进行图补全实验。实验结果表明,在特定领域语料库上对BERT/RoBERTa模型进行微调的KG-BERT可以提高预训练模型的KG-BERT的性能。此外,KG-BERT给出了比几种翻译距离或语义匹配基线模型更好的结果。
{"title":"Leveraging Existing Literature on the Web and Deep Neural Models to Build a Knowledge Graph Focused on Water Quality and Health Risks","authors":"Nikita Gautam, David Shumway, Megan Kowalcyk, Sarthak Khanal, Doina Caragea, Cornelia Caragea, H. Mcginty, S. Dorevitch","doi":"10.1145/3543507.3584185","DOIUrl":"https://doi.org/10.1145/3543507.3584185","url":null,"abstract":"A knowledge graph focusing on water quality in relation to health risks posed by water activities (such as diving or swimming) is not currently available. To address this limitation, we first use existing resources to construct a knowledge graph relevant to water quality and health risks using KNowledge Acquisition and Representation Methodology (KNARM). Subsequently, we explore knowledge graph completion approaches for maintaining and updating the graph. Specifically, we manually identify a set of domain-specific UMLS concepts and use them to extract a graph of approximately 75,000 semantic triples from the Semantic MEDLINE database (which contains head-relation-tail triples extracted from PubMed). Using the resulting knowledge graph, we experiment with the KG-BERT approach for graph completion by employing pre-trained BERT/RoBERTa models and also models fine-tuned on a collection of water quality and health risks abstracts retrieved from the Web of Science. Experimental results show that KG-BERT with BERT/RoBERTa models fine-tuned on a domain-specific corpus improves the performance of KG-BERT with pre-trained models. Furthermore, KG-BERT gives better results than several translational distance or semantic matching baseline models.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117190703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Word Sense Disambiguation by Refining Target Word Embedding 基于目标词嵌入的词义消歧算法
Pub Date : 2023-04-30 DOI: 10.1145/3543507.3583191
Xuefeng Zhang, Richong Zhang, Xiaoyang Li, Fanshuang Kong, J. Chen, Samuel Mensah, Yongyi Mao
Word Sense Disambiguation (WSD) which aims to identify the correct sense of a target word appearing in a specific context is essential for web text analysis. The use of glosses has been explored as a means for WSD. However, only a few works model the correlation between the target context and gloss. We add to the body of literature by presenting a model that employs a multi-head attention mechanism on deep contextual features of the target word and candidate glosses to refine the target word embedding. Furthermore, to encourage the model to learn the relevant part of target features that align with the correct gloss, we recursively alternate attention on target word features and that of candidate glosses to gradually extract the relevant contextual features of the target word, refining its representation and strengthening the final disambiguation results. Empirical studies on the five most commonly used benchmark datasets show that our proposed model is effective and achieves state-of-the-art results.
词义消歧(WSD)是网络文本分析中必不可少的一种方法,它旨在识别在特定语境中出现的目标词的正确含义。本署亦曾探讨使用彩图作为水务署的一种手段。然而,只有少数作品模拟了目标上下文与光泽之间的关系。我们提出了一个模型,该模型采用多头注意机制对目标词和候选词的深层上下文特征进行关注,以改进目标词的嵌入。此外,为了鼓励模型学习目标特征中与正确注释对齐的相关部分,我们递归地交替关注目标词特征和候选注释,逐步提取目标词的相关上下文特征,改进其表示并加强最终的消歧结果。对五个最常用的基准数据集的实证研究表明,我们提出的模型是有效的,并取得了最先进的结果。
{"title":"Word Sense Disambiguation by Refining Target Word Embedding","authors":"Xuefeng Zhang, Richong Zhang, Xiaoyang Li, Fanshuang Kong, J. Chen, Samuel Mensah, Yongyi Mao","doi":"10.1145/3543507.3583191","DOIUrl":"https://doi.org/10.1145/3543507.3583191","url":null,"abstract":"Word Sense Disambiguation (WSD) which aims to identify the correct sense of a target word appearing in a specific context is essential for web text analysis. The use of glosses has been explored as a means for WSD. However, only a few works model the correlation between the target context and gloss. We add to the body of literature by presenting a model that employs a multi-head attention mechanism on deep contextual features of the target word and candidate glosses to refine the target word embedding. Furthermore, to encourage the model to learn the relevant part of target features that align with the correct gloss, we recursively alternate attention on target word features and that of candidate glosses to gradually extract the relevant contextual features of the target word, refining its representation and strengthening the final disambiguation results. Empirical studies on the five most commonly used benchmark datasets show that our proposed model is effective and achieves state-of-the-art results.","PeriodicalId":296351,"journal":{"name":"Proceedings of the ACM Web Conference 2023","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the ACM Web Conference 2023
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1