首页 > 最新文献

ACM Transactions on Internet of Things最新文献

英文 中文
UltraSnoop: Placement-agnostic Keystroke Snooping via Smartphone-based Ultrasonic Sonar UltraSnoop:通过基于智能手机的超声波声纳进行位置无关的击键窥探
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-10 DOI: 10.1145/3614440
Yanchao Zhao, Yiming Zhao, Si Li, Hao Han, Linfu Xie
Keystroke snooping is an effective way to steal sensitive information from the victims. Recent research on acoustic emanation based techniques has greatly improved the accessibility by non-professional adversaries. However, these approaches either require multiple smartphones or require specific placement of the smartphone relative to the keyboards, which tremendously restrict the application scenarios. In this paper, we propose UltraSnoop, a training-free, transferable, and placement-agnostic scheme, which manages to infer user’s input using a single smartphone placed within the range covered by a microphone and speaker. The innovation of Ultrasnoop is that we propose an ultrasonic anchor-keystroke positioning method and an MFCCs clustering algorithm, synthesis of which could infer the relative position between the smartphone and the keyboard. Along with the keystroke TDoA, our method could infer the keystrokes and even gradually improve the accuracy as the snooping proceeds. Our real-world experiments show that UltraSnoop could achieve more than 85% top-3 snooping accuracy when the smartphone is placed within the range of 30-60cm from the keyboard.
击键窥探是窃取用户敏感信息的有效手段。最近基于声发射技术的研究大大提高了非专业对手的可及性。然而,这些方法要么需要多个智能手机,要么需要智能手机相对于键盘的特定位置,这极大地限制了应用场景。在本文中,我们提出了UltraSnoop,这是一种无需培训、可转移且与位置无关的方案,它可以通过放置在麦克风和扬声器覆盖范围内的单个智能手机来推断用户的输入。Ultrasnoop的创新之处在于我们提出了一种超声波锚击定位方法和一种MFCCs聚类算法,两者的综合可以推断出智能手机与键盘之间的相对位置。随着按键的TDoA,我们的方法可以推断出按键,甚至随着窥探的进行逐渐提高准确率。我们的实际实验表明,当智能手机放置在距离键盘30-60厘米的范围内时,UltraSnoop可以达到85%以上的top-3窥探精度。
{"title":"UltraSnoop: Placement-agnostic Keystroke Snooping via Smartphone-based Ultrasonic Sonar","authors":"Yanchao Zhao, Yiming Zhao, Si Li, Hao Han, Linfu Xie","doi":"10.1145/3614440","DOIUrl":"https://doi.org/10.1145/3614440","url":null,"abstract":"Keystroke snooping is an effective way to steal sensitive information from the victims. Recent research on acoustic emanation based techniques has greatly improved the accessibility by non-professional adversaries. However, these approaches either require multiple smartphones or require specific placement of the smartphone relative to the keyboards, which tremendously restrict the application scenarios. In this paper, we propose UltraSnoop, a training-free, transferable, and placement-agnostic scheme, which manages to infer user’s input using a single smartphone placed within the range covered by a microphone and speaker. The innovation of Ultrasnoop is that we propose an ultrasonic anchor-keystroke positioning method and an MFCCs clustering algorithm, synthesis of which could infer the relative position between the smartphone and the keyboard. Along with the keystroke TDoA, our method could infer the keystrokes and even gradually improve the accuracy as the snooping proceeds. Our real-world experiments show that UltraSnoop could achieve more than 85% top-3 snooping accuracy when the smartphone is placed within the range of 30-60cm from the keyboard.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"33 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78737930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I am an Earphone and I can Hear my Users Face: Facial Landmark Tracking using Smart Earphones 我是一个耳机,我可以听到我的用户的脸:面部地标跟踪使用智能耳机
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-09 DOI: 10.1145/3614438
Shijia Zhang, Taiting Lu, Hao Zhou, Yilin Liu, Runze Liu, Mahanth K. Gowda
This paper presents EARFace, a system that shows the feasibility of tracking facial landmarks for 3D facial reconstruction using in-ear acoustic sensors embedded within smart earphones. This enables a number of applications in the areas of facial expression tracking, user-interfaces, AR/VR applications, affective computing, accessibility, etc. While conventional vision-based solutions break down under poor lighting, occlusions, and also suffer from privacy concerns, earphone platforms are robust to ambient conditions, while being privacy-preserving. In contrast to prior work on earable platforms that perform outer-ear sensing for facial motion tracking, EARFace shows the feasibility of completely in-ear sensing with a natural earphone form-factor, thus enhancing the comfort levels of wearing. The core intuition exploited by EARFace is that the shape of the ear canal changes due to the movement of facial muscles during facial motion. EARFace tracks the changes in shape of the ear canal by measuring ultrasonic channel frequency response (CFR) of the inner ear, ultimately resulting in tracking of the facial motion. A transformer based machine learning (ML) model is designed to exploit spectral and temporal relationships in the ultrasonic CFR data to predict the facial landmarks of the user with an accuracy of 1.83 mm. Using these predicted landmarks, a 3D graphical model of the face that replicates the precise facial motion of the user is then reconstructed. Domain adaptation is further performed by adapting the weights of layers using a group-wise and differential learning rate. This decreases the training overhead in EARFace. The transformer based ML model runs on smartphone devices with a processing latency of 13 ms and an overall low power consumption profile. Finally, usability studies indicate higher levels of comforts of wearing EARFace’s earphone platform in comparison with alternative form-factors.
本文介绍了EARFace系统,该系统显示了使用嵌入智能耳机的入耳式声学传感器跟踪面部地标进行3D面部重建的可行性。这使得面部表情跟踪、用户界面、AR/VR应用、情感计算、可访问性等领域的许多应用成为可能。虽然传统的基于视觉的解决方案在光线不足、遮挡和隐私问题下会失效,但耳机平台在保护隐私的同时,对环境条件也很强大。与之前使用外耳感应进行面部运动跟踪的可穿戴平台相比,EARFace展示了完全入耳感应的可行性,具有自然的耳机形状因素,从而提高了佩戴的舒适度。EARFace利用的核心直觉是,在面部运动时,由于面部肌肉的运动,耳道的形状会发生变化。EARFace通过测量内耳的超声通道频率响应(CFR)来跟踪耳道形状的变化,最终实现对面部运动的跟踪。基于变压器的机器学习(ML)模型旨在利用超声CFR数据中的光谱和时间关系来预测用户的面部地标,精度为1.83 mm。使用这些预测的地标,然后重建一个面部的3D图形模型,该模型复制了用户精确的面部运动。通过使用分组和差分学习率来调整层的权重,进一步进行域自适应。这减少了EARFace的训练开销。基于变压器的ML模型运行在智能手机设备上,处理延迟为13毫秒,总体功耗低。最后,可用性研究表明,与其他形式的因素相比,佩戴EARFace耳机平台的舒适度更高。
{"title":"I am an Earphone and I can Hear my Users Face: Facial Landmark Tracking using Smart Earphones","authors":"Shijia Zhang, Taiting Lu, Hao Zhou, Yilin Liu, Runze Liu, Mahanth K. Gowda","doi":"10.1145/3614438","DOIUrl":"https://doi.org/10.1145/3614438","url":null,"abstract":"This paper presents EARFace, a system that shows the feasibility of tracking facial landmarks for 3D facial reconstruction using in-ear acoustic sensors embedded within smart earphones. This enables a number of applications in the areas of facial expression tracking, user-interfaces, AR/VR applications, affective computing, accessibility, etc. While conventional vision-based solutions break down under poor lighting, occlusions, and also suffer from privacy concerns, earphone platforms are robust to ambient conditions, while being privacy-preserving. In contrast to prior work on earable platforms that perform outer-ear sensing for facial motion tracking, EARFace shows the feasibility of completely in-ear sensing with a natural earphone form-factor, thus enhancing the comfort levels of wearing. The core intuition exploited by EARFace is that the shape of the ear canal changes due to the movement of facial muscles during facial motion. EARFace tracks the changes in shape of the ear canal by measuring ultrasonic channel frequency response (CFR) of the inner ear, ultimately resulting in tracking of the facial motion. A transformer based machine learning (ML) model is designed to exploit spectral and temporal relationships in the ultrasonic CFR data to predict the facial landmarks of the user with an accuracy of 1.83 mm. Using these predicted landmarks, a 3D graphical model of the face that replicates the precise facial motion of the user is then reconstructed. Domain adaptation is further performed by adapting the weights of layers using a group-wise and differential learning rate. This decreases the training overhead in EARFace. The transformer based ML model runs on smartphone devices with a processing latency of 13 ms and an overall low power consumption profile. Finally, usability studies indicate higher levels of comforts of wearing EARFace’s earphone platform in comparison with alternative form-factors.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"19 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85993332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
airBP: Monitor Your Blood Pressure with Millimeter-Wave in the Air airBP:用毫米波监测你的血压
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-09 DOI: 10.1145/3614439
Yumeng Liang, Anfu Zhou, Xinzhe Wen, Wei Huang, Pu Shi, Lingyu Pu, Huanhuan Zhang, Huadong Ma
Blood pressure (BP), an important vital sign to assess human health, is expected to be monitored conveniently. The existing BP monitoring methods, either traditional cuff-based or newly-emerging wearable-based, all require skin contact, which may cause unpleasant user experience and is even injurious to certain users. In this paper, we explore contact-less BP monitoring and propose airBP, which emits millimeter-wave signals toward a user’s wrist, and captures the reflected signal bounded off from the pulsating artery underlying the wrist. By analyzing the reflected signal strength of the signal, airBP generates arterial pulse and further estimates BP by exploiting the relationship between the arterial pulse and BP. To realize airBP, we design a new beam-forming method to keep focusing on the tiny and hidden wrist artery, by leveraging the inherent periodicity of the arterial pulse. Moreover, we custom-design a pre-training and neural network architecture, to combat the challenges from the arterial pulse sparsity and ambiguity, so as to estimate BP accurately. We prototype airBP using a coin-size COTS mmWave radar and perform extensive experiments on 41 subjects. The results demonstrate that airBP accurately estimates systolic and diastolic BP, with the mean error of -0.30 mmHg and -0.23 mmHg, as well as the standard deviation error of 4.80 mmHg and 3.79 mmHg (within the acceptable range regulated by the FDA’s AAMI protocol), respectively, at a distance up to 26 cm.
血压(BP)是衡量人体健康的重要生命指标,有望实现便捷的监测。现有的血压监测方法,无论是传统的袖带式还是新兴的可穿戴式,都需要与皮肤接触,这可能会造成不愉快的用户体验,甚至对某些用户造成伤害。在本文中,我们探索了非接触式血压监测,并提出了airBP,它向用户的手腕发射毫米波信号,并捕获来自手腕下方脉动动脉的反射信号。通过分析信号的反射信号强度,airBP产生动脉脉搏,并利用动脉脉搏与血压之间的关系进一步估计血压。为了实现airBP,我们设计了一种新的波束形成方法,利用动脉脉冲固有的周期性来持续聚焦微小且隐藏的手腕动脉。此外,我们定制了一种预训练和神经网络架构,以克服动脉脉冲稀疏性和模糊性带来的挑战,从而准确地估计BP。我们使用硬币大小的COTS毫米波雷达对airBP进行原型设计,并对41名受试者进行了广泛的实验。结果表明,在长达26厘米的距离内,airBP准确地估计了收缩压和舒张压,平均误差分别为-0.30 mmHg和-0.23 mmHg,标准差误差分别为4.80 mmHg和3.79 mmHg(在FDA AAMI协议规定的可接受范围内)。
{"title":"airBP: Monitor Your Blood Pressure with Millimeter-Wave in the Air","authors":"Yumeng Liang, Anfu Zhou, Xinzhe Wen, Wei Huang, Pu Shi, Lingyu Pu, Huanhuan Zhang, Huadong Ma","doi":"10.1145/3614439","DOIUrl":"https://doi.org/10.1145/3614439","url":null,"abstract":"Blood pressure (BP), an important vital sign to assess human health, is expected to be monitored conveniently. The existing BP monitoring methods, either traditional cuff-based or newly-emerging wearable-based, all require skin contact, which may cause unpleasant user experience and is even injurious to certain users. In this paper, we explore contact-less BP monitoring and propose airBP, which emits millimeter-wave signals toward a user’s wrist, and captures the reflected signal bounded off from the pulsating artery underlying the wrist. By analyzing the reflected signal strength of the signal, airBP generates arterial pulse and further estimates BP by exploiting the relationship between the arterial pulse and BP. To realize airBP, we design a new beam-forming method to keep focusing on the tiny and hidden wrist artery, by leveraging the inherent periodicity of the arterial pulse. Moreover, we custom-design a pre-training and neural network architecture, to combat the challenges from the arterial pulse sparsity and ambiguity, so as to estimate BP accurately. We prototype airBP using a coin-size COTS mmWave radar and perform extensive experiments on 41 subjects. The results demonstrate that airBP accurately estimates systolic and diastolic BP, with the mean error of -0.30 mmHg and -0.23 mmHg, as well as the standard deviation error of 4.80 mmHg and 3.79 mmHg (within the acceptable range regulated by the FDA’s AAMI protocol), respectively, at a distance up to 26 cm.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"22 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90865251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Query Interface for Smart City Internet of Things Data Marketplaces: A Case Study 智慧城市物联网数据市场查询接口:案例研究
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-18 DOI: 10.1145/3609336
Naeima Hamed, A. Gaglione, A. Gluhak, Omer F. Rana, Charith Perera
Cities are increasingly becoming augmented with sensors through public, private, and academic sector initiatives. Most of the time, these sensors are deployed with a primary purpose (objective) in mind (e.g., deploy sensors to understand noise pollution) by a sensor owner (i.e., the organization that invests in sensing hardware, e.g., a city council). Over the past few years, communities undertaking smart city development projects have understood the importance of making the sensor data available to a wider community—beyond their primary usage. Different business models have been proposed to achieve this, including creating data marketplaces. The vision is to encourage new startups and small and medium-scale businesses to create novel products and services using sensor data to generate additional economic value. Currently, data are sold as pre-defined independent datasets (e.g., noise level and parking status data may be sold separately). This approach creates several challenges, such as (i) difficulties in pricing, which leads to higher prices (per dataset); (ii) higher network communication and bandwidth requirements; and (iii) information overload for data consumers (i.e., those who purchase data). We investigate the benefit of semantic representation and its reasoning capabilities toward creating a business model that offers data on demand within smart city Internet of Things data marketplaces. The objective is to help data consumers (i.e., small and medium enterprises) acquire the most relevant data they need. We demonstrate the utility of our approach by integrating it into a real-world IoT data marketplace (developed by the synchronicity-iot.eu project). We discuss design decisions and their consequences (i.e., tradeoffs) on the choice and selection of datasets. Subsequently, we present a series of data modeling principles and recommendations for implementing IoT data marketplaces.
通过公共、私营和学术部门的倡议,城市越来越多地增加了传感器。大多数情况下,这些传感器是由传感器所有者(即投资传感硬件的组织,例如市议会)部署的,其主要目的(目标)是(例如,部署传感器以了解噪音污染)。在过去的几年里,从事智慧城市发展项目的社区已经认识到将传感器数据提供给更广泛的社区的重要性,而不仅仅是它们的主要用途。为了实现这一目标,已经提出了不同的商业模式,包括创建数据市场。其愿景是鼓励新的初创企业和中小型企业利用传感器数据创造新的产品和服务,以产生额外的经济价值。目前,数据是作为预定义的独立数据集出售的(例如,噪音水平和停车状态数据可能会单独出售)。这种方法带来了一些挑战,例如(i)定价困难,导致更高的价格(每个数据集);(ii)更高的网络通信和带宽要求;(iii)数据消费者(即购买数据的人)的信息过载。我们研究了语义表示的好处及其推理能力,以创建一个在智慧城市物联网数据市场中按需提供数据的商业模型。目标是帮助数据消费者(即中小型企业)获得他们需要的最相关的数据。我们通过将其集成到现实世界的物联网数据市场(由synchronicity-iot开发)来展示我们方法的实用性。欧盟项目)。我们讨论设计决策及其结果(即权衡)对数据集的选择和选择。随后,我们提出了一系列数据建模原则和实施物联网数据市场的建议。
{"title":"Query Interface for Smart City Internet of Things Data Marketplaces: A Case Study","authors":"Naeima Hamed, A. Gaglione, A. Gluhak, Omer F. Rana, Charith Perera","doi":"10.1145/3609336","DOIUrl":"https://doi.org/10.1145/3609336","url":null,"abstract":"Cities are increasingly becoming augmented with sensors through public, private, and academic sector initiatives. Most of the time, these sensors are deployed with a primary purpose (objective) in mind (e.g., deploy sensors to understand noise pollution) by a sensor owner (i.e., the organization that invests in sensing hardware, e.g., a city council). Over the past few years, communities undertaking smart city development projects have understood the importance of making the sensor data available to a wider community—beyond their primary usage. Different business models have been proposed to achieve this, including creating data marketplaces. The vision is to encourage new startups and small and medium-scale businesses to create novel products and services using sensor data to generate additional economic value. Currently, data are sold as pre-defined independent datasets (e.g., noise level and parking status data may be sold separately). This approach creates several challenges, such as (i) difficulties in pricing, which leads to higher prices (per dataset); (ii) higher network communication and bandwidth requirements; and (iii) information overload for data consumers (i.e., those who purchase data). We investigate the benefit of semantic representation and its reasoning capabilities toward creating a business model that offers data on demand within smart city Internet of Things data marketplaces. The objective is to help data consumers (i.e., small and medium enterprises) acquire the most relevant data they need. We demonstrate the utility of our approach by integrating it into a real-world IoT data marketplace (developed by the synchronicity-iot.eu project). We discuss design decisions and their consequences (i.e., tradeoffs) on the choice and selection of datasets. Subsequently, we present a series of data modeling principles and recommendations for implementing IoT data marketplaces.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"52 1","pages":"1 - 39"},"PeriodicalIF":2.7,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85147445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning FL4IoT:使用联邦学习的物联网设备指纹识别和识别
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-09 DOI: 10.1145/3603257
Han Wang, David Eklund, Alina Oprea, S. Raza
Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks. With the proliferation of massive but heterogeneous IoT devices, it is getting challenging to detect vulnerable devices connected to networks. Current machine learning-based techniques for fingerprinting and identifying devices necessitate a significant amount of data gathered from IoT networks that must be transmitted to a central cloud. Nevertheless, private IoT data cannot be shared with the central cloud in numerous sensitive scenarios. Federated learning (FL) has been regarded as a promising paradigm for decentralized learning and has been applied in many different use cases. It enables machine learning models to be trained in a privacy-preserving way. In this article, we propose a privacy-preserved IoT device fingerprinting and identification mechanisms using FL; we call it FL4IoT. FL4IoT is a two-phased system combining unsupervised-learning-based device fingerprinting and supervised-learning-based device identification. FL4IoT shows its practicality in different performance metrics in a federated and centralized setup. For instance, in the best cases, empirical results show that FL4IoT achieves ∼99% accuracy and F1-Score in identifying IoT devices using a federated setup without exposing any private data to a centralized cloud entity. In addition, FL4IoT can detect spoofed devices with over 99% accuracy.
网络中未识别的设备可能会导致毁灭性的后果。因此,有必要对连接到专用或关键网络的物联网设备进行指纹识别和识别。随着大量异构物联网设备的激增,检测连接到网络的易受攻击设备变得越来越具有挑战性。当前基于机器学习的指纹识别和设备识别技术需要从物联网网络收集大量数据,这些数据必须传输到中央云。然而,在许多敏感场景中,私有物联网数据无法与中心云共享。联邦学习(FL)被认为是分散学习的一种很有前途的范例,并已被应用于许多不同的用例中。它使机器学习模型能够以一种保护隐私的方式进行训练。在本文中,我们提出了一种使用FL保护隐私的物联网设备指纹和识别机制;我们称之为FL4IoT。FL4IoT是基于无监督学习的设备指纹识别和基于监督学习的设备识别相结合的两阶段系统。FL4IoT在联邦和集中式设置的不同性能指标中显示了它的实用性。例如,在最好的情况下,经验结果表明,FL4IoT在使用联邦设置识别物联网设备方面达到了~ 99%的准确率和F1-Score,而不会将任何私有数据暴露给集中式云实体。此外,FL4IoT可以检测欺骗设备,准确率超过99%。
{"title":"FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning","authors":"Han Wang, David Eklund, Alina Oprea, S. Raza","doi":"10.1145/3603257","DOIUrl":"https://doi.org/10.1145/3603257","url":null,"abstract":"Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks. With the proliferation of massive but heterogeneous IoT devices, it is getting challenging to detect vulnerable devices connected to networks. Current machine learning-based techniques for fingerprinting and identifying devices necessitate a significant amount of data gathered from IoT networks that must be transmitted to a central cloud. Nevertheless, private IoT data cannot be shared with the central cloud in numerous sensitive scenarios. Federated learning (FL) has been regarded as a promising paradigm for decentralized learning and has been applied in many different use cases. It enables machine learning models to be trained in a privacy-preserving way. In this article, we propose a privacy-preserved IoT device fingerprinting and identification mechanisms using FL; we call it FL4IoT. FL4IoT is a two-phased system combining unsupervised-learning-based device fingerprinting and supervised-learning-based device identification. FL4IoT shows its practicality in different performance metrics in a federated and centralized setup. For instance, in the best cases, empirical results show that FL4IoT achieves ∼99% accuracy and F1-Score in identifying IoT devices using a federated setup without exposing any private data to a centralized cloud entity. In addition, FL4IoT can detect spoofed devices with over 99% accuracy.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"129 1","pages":"1 - 24"},"PeriodicalIF":2.7,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79886241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of Things 交互式隐私管理:面向物联网环境下增强隐私意识与控制
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-07 DOI: 10.1145/3600096
Bayan AL MUHANDER, Jason Wiese, Omer F. Rana, Charith Perera
The balance between protecting user privacy while providing cost-effective devices that are functional and usable is a key challenge in the burgeoning Internet of Things (IoT). In traditional desktop and mobile contexts, the primary user interface is a screen; however, in IoT devices, screens are rare or very small, invalidating many existing approaches to protecting user privacy. Privacy visualizations are a common approach for assisting users in understanding the privacy implications of web and mobile services. To gain a thorough understanding of IoT privacy, we examine existing web, mobile, and IoT visualization approaches. Following that, we define five major privacy factors in the IoT context: type, usage, storage, retention period, and access. We then describe notification methods used in various contexts as reported in the literature. We aim to highlight key approaches that developers and researchers can use for creating effective IoT privacy notices that improve user privacy management (awareness and control). Using a toolkit, a use case scenario, and two examples from the literature, we demonstrate how privacy visualization approaches can be supported in practice.
在保护用户隐私和提供具有成本效益的功能和可用设备之间取得平衡是新兴的物联网(IoT)的关键挑战。在传统的桌面和移动环境中,主要的用户界面是屏幕;然而,在物联网设备中,屏幕很少或非常小,使许多现有的保护用户隐私的方法失效。隐私可视化是一种常见的方法来帮助用户理解的隐私影响网络和移动服务。为了全面了解物联网隐私,我们研究了现有的web、移动和物联网可视化方法。接下来,我们定义了物联网环境中的五个主要隐私因素:类型、使用、存储、保留期限和访问。然后,我们描述了在文献中报道的各种上下文中使用的通知方法。我们的目标是强调开发人员和研究人员可以用来创建有效的物联网隐私通知的关键方法,这些通知可以改善用户隐私管理(意识和控制)。通过使用一个工具箱、一个用例场景和两个文献中的例子,我们演示了在实践中如何支持隐私可视化方法。
{"title":"Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of Things","authors":"Bayan AL MUHANDER, Jason Wiese, Omer F. Rana, Charith Perera","doi":"10.1145/3600096","DOIUrl":"https://doi.org/10.1145/3600096","url":null,"abstract":"The balance between protecting user privacy while providing cost-effective devices that are functional and usable is a key challenge in the burgeoning Internet of Things (IoT). In traditional desktop and mobile contexts, the primary user interface is a screen; however, in IoT devices, screens are rare or very small, invalidating many existing approaches to protecting user privacy. Privacy visualizations are a common approach for assisting users in understanding the privacy implications of web and mobile services. To gain a thorough understanding of IoT privacy, we examine existing web, mobile, and IoT visualization approaches. Following that, we define five major privacy factors in the IoT context: type, usage, storage, retention period, and access. We then describe notification methods used in various contexts as reported in the literature. We aim to highlight key approaches that developers and researchers can use for creating effective IoT privacy notices that improve user privacy management (awareness and control). Using a toolkit, a use case scenario, and two examples from the literature, we demonstrate how privacy visualization approaches can be supported in practice.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"50 1","pages":"1 - 34"},"PeriodicalIF":2.7,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84464387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Performance Comparison of IEEE 802.15.4 DSME and TSCH in a Realistic IoT Scenario for Industrial Applications IEEE 802.15.4 DSME和TSCH在工业应用物联网场景中的综合性能比较
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-01 DOI: 10.1145/3595188
Ivonne Andrea Mantilla Gonzalez, Florian Meyer, V. Turau
In the Industrial Internet of Things (i.e., IIoT), the standardization of open technologies and protocols has achieved seamless data exchange between machines and other physical systems from different manufacturers. At the MAC sublayer, the industry-standard protocols IEEE 802.15.4 Time Slot Channel Hopping (TSCH) and Deterministic and Synchronous Multi-channel Extension (DSME) show promising properties for high adaptability and dynamically changing traffic. However, performance comparison between these MAC protocols rarely has gone beyond a simulation phase. This work presents the results of such a comparison on physically deployed networks using the facilities of the FIT-IoTLab. The evaluation includes fully implementing an IIoT protocol stack based on MQTT in Contiki-NG. It comprises the integration of DSME as part of Contiki-NG’s software stack through OpenDSME, the only publicly available implementation of DSME. Results show that both protocols suit IIoT applications, particularly for data collection. The comparison between TSCH and DSME also includes an evaluation of distributed schedulers for both MAC modes and one autonomous scheduler for TSCH within a UDP protocol stack.
在工业物联网(即IIoT)中,开放技术和协议的标准化实现了机器与来自不同制造商的其他物理系统之间的无缝数据交换。在MAC子层,行业标准协议IEEE 802.15.4时隙信道跳变(TSCH)和确定性和同步多信道扩展(DSME)显示出高适应性和动态变化流量的良好特性。然而,这些MAC协议之间的性能比较很少超出仿真阶段。这项工作展示了使用FIT-IoTLab设施对物理部署网络进行比较的结果。评估包括在Contiki-NG中完全实现基于MQTT的IIoT协议栈。它通过OpenDSME将DSME集成为Contiki-NG软件堆栈的一部分,OpenDSME是唯一公开可用的DSME实现。结果表明,这两种协议都适合工业物联网应用,特别是数据收集。TSCH和DSME之间的比较还包括对MAC模式的分布式调度器和UDP协议栈中TSCH的一个自治调度器的评估。
{"title":"A Comprehensive Performance Comparison of IEEE 802.15.4 DSME and TSCH in a Realistic IoT Scenario for Industrial Applications","authors":"Ivonne Andrea Mantilla Gonzalez, Florian Meyer, V. Turau","doi":"10.1145/3595188","DOIUrl":"https://doi.org/10.1145/3595188","url":null,"abstract":"In the Industrial Internet of Things (i.e., IIoT), the standardization of open technologies and protocols has achieved seamless data exchange between machines and other physical systems from different manufacturers. At the MAC sublayer, the industry-standard protocols IEEE 802.15.4 Time Slot Channel Hopping (TSCH) and Deterministic and Synchronous Multi-channel Extension (DSME) show promising properties for high adaptability and dynamically changing traffic. However, performance comparison between these MAC protocols rarely has gone beyond a simulation phase. This work presents the results of such a comparison on physically deployed networks using the facilities of the FIT-IoTLab. The evaluation includes fully implementing an IIoT protocol stack based on MQTT in Contiki-NG. It comprises the integration of DSME as part of Contiki-NG’s software stack through OpenDSME, the only publicly available implementation of DSME. Results show that both protocols suit IIoT applications, particularly for data collection. The comparison between TSCH and DSME also includes an evaluation of distributed schedulers for both MAC modes and one autonomous scheduler for TSCH within a UDP protocol stack.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"40 1","pages":"1 - 30"},"PeriodicalIF":2.7,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85202341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pi-ViMo: Physiology-inspired Robust Vital Sign Monitoring using mmWave Radars Pi-ViMo:使用毫米波雷达的生理启发的鲁棒生命体征监测
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-24 DOI: 10.1145/3589347
Bo-yan Zhang, Boyu Jiang, Rong Zheng, Xiaoping Zhang, Jun Yu Li, Q. Xu
Continuous monitoring of human vital signs using non-contact mmWave radars is attractive due to their ability to penetrate garments and operate under different lighting conditions. Unfortunately, most prior research requires subjects to stay at a fixed distance from radar sensors and to remain still during monitoring. These restrictions limit the applications of radar vital sign monitoring in real life scenarios. In this article, we address these limitations and present Pi-ViMo, a non-contact Physiology-inspired Robust Vital Sign Monitoring system, using mmWave radars. We first derive a multi-scattering point model for the human body, and introduce a coherent combining of multiple scatterings to enhance the quality of estimated chest-wall movements. It enables vital sign estimations of subjects at any location in a radar’s field of view (FoV). We then propose a template matching method to extract human vital signs by adopting physical models of respiration and cardiac activities. The proposed method is capable to separate respiration and heartbeat in the presence of micro-level random body movements (RBM) when a subject is at any location within the field of view of a radar. Experiments in a radar testbed show average respiration rate errors of 6% and heart rate errors of 11.9% for the stationary subjects, and average errors of 13.5% for respiration rate and 13.6% for heart rate for subjects under different RBMs.
使用非接触式毫米波雷达连续监测人体生命体征是有吸引力的,因为它们能够穿透衣服并在不同的照明条件下工作。不幸的是,大多数先前的研究要求受试者与雷达传感器保持固定距离,并在监测期间保持静止。这些限制限制了雷达生命体征监测在现实生活场景中的应用。在本文中,我们解决了这些限制,并提出了Pi-ViMo,一种使用毫米波雷达的非接触式生理启发的鲁棒生命体征监测系统。我们首先推导了人体的多散射点模型,并引入了多个散射点的相干组合来提高估计胸壁运动的质量。它可以在雷达视野(FoV)的任何位置对目标进行生命体征估计。然后,我们提出了一种模板匹配方法,通过采用呼吸和心脏活动的物理模型来提取人体生命体征。当受试者处于雷达视野范围内的任何位置时,该方法能够在微观随机身体运动(RBM)存在的情况下分离呼吸和心跳。在雷达测试台上进行的实验表明,静止状态下受试者的呼吸速率误差平均为6%,心率误差平均为11.9%,不同rbm下受试者的呼吸速率误差平均为13.5%,心率误差平均为13.6%。
{"title":"Pi-ViMo: Physiology-inspired Robust Vital Sign Monitoring using mmWave Radars","authors":"Bo-yan Zhang, Boyu Jiang, Rong Zheng, Xiaoping Zhang, Jun Yu Li, Q. Xu","doi":"10.1145/3589347","DOIUrl":"https://doi.org/10.1145/3589347","url":null,"abstract":"Continuous monitoring of human vital signs using non-contact mmWave radars is attractive due to their ability to penetrate garments and operate under different lighting conditions. Unfortunately, most prior research requires subjects to stay at a fixed distance from radar sensors and to remain still during monitoring. These restrictions limit the applications of radar vital sign monitoring in real life scenarios. In this article, we address these limitations and present Pi-ViMo, a non-contact Physiology-inspired Robust Vital Sign Monitoring system, using mmWave radars. We first derive a multi-scattering point model for the human body, and introduce a coherent combining of multiple scatterings to enhance the quality of estimated chest-wall movements. It enables vital sign estimations of subjects at any location in a radar’s field of view (FoV). We then propose a template matching method to extract human vital signs by adopting physical models of respiration and cardiac activities. The proposed method is capable to separate respiration and heartbeat in the presence of micro-level random body movements (RBM) when a subject is at any location within the field of view of a radar. Experiments in a radar testbed show average respiration rate errors of 6% and heart rate errors of 11.9% for the stationary subjects, and average errors of 13.5% for respiration rate and 13.6% for heart rate for subjects under different RBMs.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"14 1","pages":"1 - 27"},"PeriodicalIF":2.7,"publicationDate":"2023-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89614177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HyEdge: A Cooperative Edge Computing Framework for Provisioning Private and Public Services HyEdge:用于提供私有和公共服务的协作边缘计算框架
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-13 DOI: 10.1145/3585078
Siyuan Gu, Deke Guo, Guoming Tang, Lailong Luo, Yuchen Sun, Xueshan Luo
With the widespread use of Internet of Things (IoT) devices and the arrival of the 5G era, edge computing has become an attractive paradigm to serve end-users and provide better QoS. Many efforts have been paid to provision some merging public network services at the network edge. We reveal that it is very common that specific users call for private and isolated edge services to preserve data privacy and enable other security intentions. However, it still remains open to fulfill such kind of mixed requests in edge computing. In this article, we propose a cooperative edge computing framework, i.e., HyEdge, to offer both public and private edge services systematically. To fully exploit the benefits of this novel framework, we define the problem of optimal request scheduling over a given placement solution of hybrid edge servers to minimize the response delay. This problem is further modeled as a mixed integer non-linear programming problem (MINLP), which is typically NP-hard. Accordingly, we propose the partition-based optimization method, which can efficiently solve this NP-hard problem via the problem decomposition and the branch and bound strategies. We finally conduct extensive evaluations with a real-world dataset to measure the performance of our method. The results indicate that the proposed method achieves elegant performance with low computation complexity.
随着物联网(IoT)设备的广泛使用和5G时代的到来,边缘计算已经成为服务最终用户和提供更好QoS的有吸引力的范式。在网络边缘提供一些合并的公共网络服务已经付出了许多努力。我们发现,特定用户通常会要求私有和隔离的边缘服务来保护数据隐私并实现其他安全意图。然而,在边缘计算中,它仍然可以满足这种混合请求。在本文中,我们提出了一个协作边缘计算框架,即HyEdge,以系统地提供公共和私有边缘服务。为了充分利用这种新框架的优势,我们定义了在混合边缘服务器的给定放置解决方案上的最优请求调度问题,以最大限度地减少响应延迟。该问题进一步建模为混合整数非线性规划问题(MINLP),这是典型的np困难问题。因此,我们提出了基于分区的优化方法,通过问题分解和分支定界策略有效地解决了这一NP-hard问题。最后,我们使用真实世界的数据集进行了广泛的评估,以衡量我们的方法的性能。结果表明,该方法具有较好的性能和较低的计算复杂度。
{"title":"HyEdge: A Cooperative Edge Computing Framework for Provisioning Private and Public Services","authors":"Siyuan Gu, Deke Guo, Guoming Tang, Lailong Luo, Yuchen Sun, Xueshan Luo","doi":"10.1145/3585078","DOIUrl":"https://doi.org/10.1145/3585078","url":null,"abstract":"With the widespread use of Internet of Things (IoT) devices and the arrival of the 5G era, edge computing has become an attractive paradigm to serve end-users and provide better QoS. Many efforts have been paid to provision some merging public network services at the network edge. We reveal that it is very common that specific users call for private and isolated edge services to preserve data privacy and enable other security intentions. However, it still remains open to fulfill such kind of mixed requests in edge computing. In this article, we propose a cooperative edge computing framework, i.e., HyEdge, to offer both public and private edge services systematically. To fully exploit the benefits of this novel framework, we define the problem of optimal request scheduling over a given placement solution of hybrid edge servers to minimize the response delay. This problem is further modeled as a mixed integer non-linear programming problem (MINLP), which is typically NP-hard. Accordingly, we propose the partition-based optimization method, which can efficiently solve this NP-hard problem via the problem decomposition and the branch and bound strategies. We finally conduct extensive evaluations with a real-world dataset to measure the performance of our method. The results indicate that the proposed method achieves elegant performance with low computation complexity.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"24 1","pages":"1 - 23"},"PeriodicalIF":2.7,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76548224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security 基于魔方密码系统的区块链环境下物联网安全认证与会话密钥生成模型
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-06 DOI: 10.1145/3586578
Ankit Attkan, V. Ranga, Priyanka Ahlawat
Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A session key pool randomizer is used to avoid network probabilistic attacks. Our hybrid model is capable of generating secure session keys that can be used for mutual authentication and reliable data transferring tasks. Cyber-attacks resistance and performance results were verified using standard tools, which gave industry level promising results in terms of efficiency, light weightiness, and practical applications.
在过去的十年中,物联网在拥有资源绑定架构的情况下,在技术探索、集成和各种应用方面都取得了巨大的发展势头。在Edge设备上运行任何高端安全协议都是一项挑战。这些设备极易受到众多网络攻击。物联网网络节点需要点对点安全,如果网络设备之间存在适当的相互认证,这是可能的。在发送敏感数据之前,需要在源节点和目的节点之间建立安全会话密钥。为了生成这些会话密钥,需要一个强大的密码系统来通过无线网络安全地共享参数。在本文中,我们利用基于魔方谜题的密码系统在对等体之间交换参数并生成会话密钥。区块链技术被纳入提议的模型中,以提供令牌交易的匿名性,网络设备在此基础上交换服务。使用会话密钥池随机化器来避免网络概率攻击。我们的混合模型能够生成可用于相互身份验证和可靠数据传输任务的安全会话密钥。使用标准工具验证了抗网络攻击和性能结果,在效率、轻量化和实际应用方面提供了行业级的有希望的结果。
{"title":"A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security","authors":"Ankit Attkan, V. Ranga, Priyanka Ahlawat","doi":"10.1145/3586578","DOIUrl":"https://doi.org/10.1145/3586578","url":null,"abstract":"Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A session key pool randomizer is used to avoid network probabilistic attacks. Our hybrid model is capable of generating secure session keys that can be used for mutual authentication and reliable data transferring tasks. Cyber-attacks resistance and performance results were verified using standard tools, which gave industry level promising results in terms of efficiency, light weightiness, and practical applications.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"2014 1","pages":"1 - 39"},"PeriodicalIF":2.7,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73622741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ACM Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1