首页 > 最新文献

2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)最新文献

英文 中文
Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations 使用重要的基于符号的结构转换生成对抗性源程序
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00029
Penglong Chen, Zhuguo Li, Yu Wen, Lili Liu
Deep learning models have been widely used in source code processing tasks, such as code captioning, code summarization, code completion, and code classification. Recent studies have shown that deep learning-based source code processing models are vulnerable. Attackers can generate adversarial examples by adding perturbations to source programs. Existing attack methods perturb a source program by renaming one or multiple variables in the program. These attack methods do not take into account the perturbation of the equivalent structural transformations of the source code. We propose a set of program transformations involving identifier renaming and structural transformations, which can ensure that the perturbed program retains the original semantics but can fool the source code processing model to change the original prediction result. We propose a novel method of applying semantics-preserving structural transformations to attack the source program pro-cessing model in the white-box setting. This is the first time that semantics-preserving structural transformations are applied to generate adversarial examples of source code processing models. We first find the important tokens in the program by calculating the contribution values of each part of the program, then select the best transformation for each important token to generate semantic adversarial examples. The experimental results show that the attack success rate of our attack method can improve 8.29 % on average compared with the state-of-the-art attack method; adversarial training using the adversarial examples generated by our attack method can reduce the attack success rates of source code processing models by 21.79% on average.
深度学习模型已广泛应用于源代码处理任务,如代码字幕、代码摘要、代码完成和代码分类。最近的研究表明,基于深度学习的源代码处理模型是脆弱的。攻击者可以通过在源程序中添加扰动来生成对抗性示例。现有的攻击方法通过重命名程序中的一个或多个变量来干扰源程序。这些攻击方法没有考虑到源代码等效结构变换的扰动。我们提出了一组包含标识符重命名和结构转换的程序转换,可以保证被扰动的程序保留原始语义,但可以欺骗源代码处理模型来改变原始预测结果。我们提出了一种应用语义保持结构转换来攻击白盒环境下的源程序处理模型的新方法。这是第一次将保持语义的结构转换应用于生成源代码处理模型的对抗性示例。我们首先通过计算程序中每个部分的贡献值来找到程序中的重要标记,然后为每个重要标记选择最佳变换来生成语义对抗示例。实验结果表明,与目前最先进的攻击方法相比,该方法的攻击成功率平均提高8.29%;使用我们的攻击方法生成的对抗性示例进行对抗性训练,可以使源代码处理模型的攻击成功率平均降低21.79%。
{"title":"Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations","authors":"Penglong Chen, Zhuguo Li, Yu Wen, Lili Liu","doi":"10.1109/ICECCS54210.2022.00029","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00029","url":null,"abstract":"Deep learning models have been widely used in source code processing tasks, such as code captioning, code summarization, code completion, and code classification. Recent studies have shown that deep learning-based source code processing models are vulnerable. Attackers can generate adversarial examples by adding perturbations to source programs. Existing attack methods perturb a source program by renaming one or multiple variables in the program. These attack methods do not take into account the perturbation of the equivalent structural transformations of the source code. We propose a set of program transformations involving identifier renaming and structural transformations, which can ensure that the perturbed program retains the original semantics but can fool the source code processing model to change the original prediction result. We propose a novel method of applying semantics-preserving structural transformations to attack the source program pro-cessing model in the white-box setting. This is the first time that semantics-preserving structural transformations are applied to generate adversarial examples of source code processing models. We first find the important tokens in the program by calculating the contribution values of each part of the program, then select the best transformation for each important token to generate semantic adversarial examples. The experimental results show that the attack success rate of our attack method can improve 8.29 % on average compared with the state-of-the-art attack method; adversarial training using the adversarial examples generated by our attack method can reduce the attack success rates of source code processing models by 21.79% on average.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126503108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Parameterized Design and Formal Verification of Multi-ported Memory 多端口存储器的参数化设计与形式化验证
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00013
Mufan Xiang, Yongjian Li, Sijun Tan, Yongxin Zhao, Yiwei Chi
Multi-ported memories are essential modules to provide parallel access for high-performance parallel computation systems such as VLIW and vector processors, etc. However, the design of multi-ported memories are rather complex and error-prone, which usually causes the high implementation cost. Therefore, the designs and verification of multi-ported memories become challenging. In this paper, we firstly present a modular and parameterized approach based on Chisel to design and implement multi-ported memory concisely. Furthermore, to verify the correctness of the design, we formalize properties of multi-write-read operations of the memories by generalized symbolic trajectory assertion (GSTE) graphs and verified them by two kinds of approaches: SystemVerilog Assertions-based, and GSTE-based approaches. Our verification through SVA and STE/GSTE successfully finds an error caused by misusing one parameter in our high-level design.
多端口存储器是为高性能并行计算系统(如VLIW和矢量处理器等)提供并行访问的基本模块。然而,多端口存储器的设计相当复杂且容易出错,这通常导致较高的实现成本。因此,多端口存储器的设计和验证变得具有挑战性。本文首先提出了一种基于Chisel的模块化和参数化方法来简洁地设计和实现多端口存储器。此外,为了验证设计的正确性,我们用广义符号轨迹断言(GSTE)图形式化了存储器的多次写读操作的性质,并通过两种方法进行了验证:基于SystemVerilog断言的方法和基于GSTE的方法。通过SVA和STE/GSTE的验证,我们成功地发现了高层次设计中一个参数使用不当导致的错误。
{"title":"Parameterized Design and Formal Verification of Multi-ported Memory","authors":"Mufan Xiang, Yongjian Li, Sijun Tan, Yongxin Zhao, Yiwei Chi","doi":"10.1109/ICECCS54210.2022.00013","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00013","url":null,"abstract":"Multi-ported memories are essential modules to provide parallel access for high-performance parallel computation systems such as VLIW and vector processors, etc. However, the design of multi-ported memories are rather complex and error-prone, which usually causes the high implementation cost. Therefore, the designs and verification of multi-ported memories become challenging. In this paper, we firstly present a modular and parameterized approach based on Chisel to design and implement multi-ported memory concisely. Furthermore, to verify the correctness of the design, we formalize properties of multi-write-read operations of the memories by generalized symbolic trajectory assertion (GSTE) graphs and verified them by two kinds of approaches: SystemVerilog Assertions-based, and GSTE-based approaches. Our verification through SVA and STE/GSTE successfully finds an error caused by misusing one parameter in our high-level design.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining Global and Local Representations of Source Code for Method Naming 结合方法命名源代码的全局和局部表示
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00026
Cong Zhou, Li Kuang
Code is a kind of complex data. Recent models learn code representation using global or local aggregation. Global encoding allows all tokens of code to be connected directly and neglects the graph structure. Local encoding focuses on the neighbor nodes when capturing the graph structure but fails to capture long dependencies. In this work, we gather both encoding strategies and investigate different models that combine both global and local representations of code in order to learn code representation better. Specifically, we modify the layer structure based on the sequence-to-sequence model to incorporate a structured model in the encoder and decoder parts, respectively. To further consider different integration ways, we propose four models for method naming. In an extensive evaluation, we demonstrate that our models have a significant improvement on a well-studied dataset of method naming, achieving ROUGE-1 score of 54.1, ROUGE-2 score of 26.7, and ROUGE-L score of 54.3, outperforming state-of-the-art models by 2.7, 1.7, and 4.3 points, respectively. Our data and code are available at https://github.com/zc-work/CGLNaming.
代码是一种复杂的数据。最近的模型使用全局或局部聚合学习代码表示。全局编码允许直接连接代码的所有标记,而忽略图结构。局部编码在捕获图结构时关注邻居节点,但无法捕获长依赖关系。在这项工作中,我们收集了两种编码策略,并研究了结合代码的全局和局部表示的不同模型,以便更好地学习代码表示。具体来说,我们基于序列到序列模型修改了层结构,分别在编码器和解码器部分合并了结构化模型。为了进一步考虑不同的集成方式,我们提出了四种方法命名模型。在广泛的评估中,我们证明了我们的模型在一个经过充分研究的方法命名数据集上有显著的改进,实现了ROUGE-1得分为54.1,ROUGE-2得分为26.7,ROUGE-L得分为54.3,分别比最先进的模型高出2.7,1.7和4.3分。我们的数据和代码可在https://github.com/zc-work/CGLNaming上获得。
{"title":"Combining Global and Local Representations of Source Code for Method Naming","authors":"Cong Zhou, Li Kuang","doi":"10.1109/ICECCS54210.2022.00026","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00026","url":null,"abstract":"Code is a kind of complex data. Recent models learn code representation using global or local aggregation. Global encoding allows all tokens of code to be connected directly and neglects the graph structure. Local encoding focuses on the neighbor nodes when capturing the graph structure but fails to capture long dependencies. In this work, we gather both encoding strategies and investigate different models that combine both global and local representations of code in order to learn code representation better. Specifically, we modify the layer structure based on the sequence-to-sequence model to incorporate a structured model in the encoder and decoder parts, respectively. To further consider different integration ways, we propose four models for method naming. In an extensive evaluation, we demonstrate that our models have a significant improvement on a well-studied dataset of method naming, achieving ROUGE-1 score of 54.1, ROUGE-2 score of 26.7, and ROUGE-L score of 54.3, outperforming state-of-the-art models by 2.7, 1.7, and 4.3 points, respectively. Our data and code are available at https://github.com/zc-work/CGLNaming.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"24 54","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extending Tensor Virtual Machine to Support Deep-Learning Accelerators with Convolution Cores
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00031
Yanzhao Wang, Fei Xie
Deep-learning accelerators are increasingly popular. There are two prevalent accelerator architectures: one based on general matrix multiplication units and the other on convolution cores. However, Tensor Virtual Machine (TVM), a widely used deep-learning compiler stack, does not support the latter. This paper proposes a general framework for extending TVM to support deep-learning accelerators with convolution cores. We have applied it to two well-known accelerators: Nvidia's NVDLA and Bitmain's BM1880 successfully. Deep-learning workloads can now be readily deployed to these accelerators through TVM and executed efficiently. This framework can extend TVM to other accelerators with minimum effort.
有两种流行的加速器架构:一种基于一般矩阵乘法单元,另一种基于卷积核。然而,广泛使用的深度学习编译器堆栈Tensor Virtual Machine (TVM)不支持后者。我们已经成功地将其应用于两个著名的加速器:Nvidia的NVDLA和比特大陆的BM1880。深度学习工作负载现在可以通过TVM轻松部署到这些加速器上,并有效地执行。该框架可以以最小的工作量将TVM扩展到其他加速器。
{"title":"Extending Tensor Virtual Machine to Support Deep-Learning Accelerators with Convolution Cores","authors":"Yanzhao Wang, Fei Xie","doi":"10.1109/ICECCS54210.2022.00031","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00031","url":null,"abstract":"Deep-learning accelerators are increasingly popular. There are two prevalent accelerator architectures: one based on general matrix multiplication units and the other on convolution cores. However, Tensor Virtual Machine (TVM), a widely used deep-learning compiler stack, does not support the latter. This paper proposes a general framework for extending TVM to support deep-learning accelerators with convolution cores. We have applied it to two well-known accelerators: Nvidia's NVDLA and Bitmain's BM1880 successfully. Deep-learning workloads can now be readily deployed to these accelerators through TVM and executed efficiently. This framework can extend TVM to other accelerators with minimum effort.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Parallel Java Streams 优化并行Java流
Pub Date : 2022-03-01 DOI: 10.1109/ICECCS54210.2022.00012
Matteo Basso, F. Schiavio, Andrea Rosà, Walter Binder
The Java Stream API increases developer produc-tivity and greatly simplifies exploiting parallel computation by providing a high-level abstraction on top of complex data pro-cessing, parallelization, and synchronization algorithms. However, the usage of the Java Stream API often incurs significant runtime overhead. Method inlining and the automated translation of code using the Java Stream API into imperative code using loops can reduce such overhead; however, existing approaches and tools are applicable only to sequential stream pipelines, leaving the optimization of parallel streams an open issue. We bridge this gap by presenting a novel method to exploit high-level static analysis to characterize stream pipelines, detect parallel streams, and apply transformations removing the abstraction overhead. We evaluate our method on a set of benchmarks, showing that our approach significantly reduces execution time and memory allocation.
Java Stream API通过在复杂的数据处理、并行化和同步算法之上提供高级抽象,提高了开发人员的工作效率,并极大地简化了并行计算的开发。然而,Java流API的使用通常会导致显著的运行时开销。方法内联和使用Java流API将代码自动转换为使用循环的命令式代码可以减少这种开销;然而,现有的方法和工具只适用于顺序流管道,使并行流的优化成为一个开放的问题。我们提出了一种新颖的方法来利用高级静态分析来描述流管道,检测并行流,并应用转换来消除抽象开销,从而弥合了这一差距。我们在一组基准测试中评估了我们的方法,结果表明我们的方法显著减少了执行时间和内存分配。
{"title":"Optimizing Parallel Java Streams","authors":"Matteo Basso, F. Schiavio, Andrea Rosà, Walter Binder","doi":"10.1109/ICECCS54210.2022.00012","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00012","url":null,"abstract":"The Java Stream API increases developer produc-tivity and greatly simplifies exploiting parallel computation by providing a high-level abstraction on top of complex data pro-cessing, parallelization, and synchronization algorithms. However, the usage of the Java Stream API often incurs significant runtime overhead. Method inlining and the automated translation of code using the Java Stream API into imperative code using loops can reduce such overhead; however, existing approaches and tools are applicable only to sequential stream pipelines, leaving the optimization of parallel streams an open issue. We bridge this gap by presenting a novel method to exploit high-level static analysis to characterize stream pipelines, detect parallel streams, and apply transformations removing the abstraction overhead. We evaluate our method on a set of benchmarks, showing that our approach significantly reduces execution time and memory allocation.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114907929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees 攻防树中具有最小代理数的最小调度
Pub Date : 2021-01-18 DOI: 10.1109/ICECCS54210.2022.00009
Jaime Arias, W. Penczek, L. Petrucci, Teofil Sidoruk
Expressing attack-defence trees in a multi-agent setting allows for studying a new aspect of security scenarios, namely how the number of agents and their task assignment impact the performance, e.g. attack time, of strategies executed by opposing coalitions. Optimal scheduling of agents' actions, a non-trivial problem, is thus vital. We discuss associated caveats and propose an algorithm that synthesises such an assignment, targeting minimal attack time and using minimal number of agents for a given attack-defence tree.
在多智能体设置中表达攻击-防御树允许研究安全场景的一个新方面,即智能体的数量及其任务分配如何影响敌对联盟执行策略的性能,例如攻击时间。因此,代理行为的最优调度是一个非常重要的问题。我们讨论了相关的注意事项,并提出了一种综合这种分配的算法,针对给定的攻击防御树,以最小的攻击时间和最少的代理数量为目标。
{"title":"Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees","authors":"Jaime Arias, W. Penczek, L. Petrucci, Teofil Sidoruk","doi":"10.1109/ICECCS54210.2022.00009","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00009","url":null,"abstract":"Expressing attack-defence trees in a multi-agent setting allows for studying a new aspect of security scenarios, namely how the number of agents and their task assignment impact the performance, e.g. attack time, of strategies executed by opposing coalitions. Optimal scheduling of agents' actions, a non-trivial problem, is thus vital. We discuss associated caveats and propose an algorithm that synthesises such an assignment, targeting minimal attack time and using minimal number of agents for a given attack-defence tree.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formalism- Driven Development of Decentralized Systems 分散系统的形式主义驱动发展
Pub Date : 2020-12-08 DOI: 10.1109/ICECCS54210.2022.00018
Yepeng Ding, Hiroyuki Sato
Decentralized systems have been widely developed and applied to address security and privacy issues in centralized systems, especially since the advancement of distributed ledger technology. However, it is challenging to ensure their correct functioning with respect to their designs and minimize the technical risk before the delivery. Although formal methods have made significant progress over the past decades, a feasible solution based on formal methods from a development process perspective has not been well developed. In this paper, we formulate an iterative and incremental development process, named formalism-driven development (FDD), for developing provably correct decentralized systems under the guidance of formal methods. We also present a framework named Seniz, to practicalize FDD with a new modeling language and scaffolds. Furthermore, we conduct case studies to demonstrate the effectiveness of FDD in practice with the support of Seniz.
去中心化系统已经得到了广泛的发展和应用,以解决中心化系统中的安全和隐私问题,特别是自分布式账本技术的进步以来。然而,在交付之前,确保它们在设计方面的正确功能并将技术风险降至最低是具有挑战性的。虽然正式方法在过去几十年中取得了重大进展,但从开发过程的角度来看,基于正式方法的可行解决方案尚未得到很好的发展。在本文中,我们制定了一个迭代和增量的开发过程,称为形式主义驱动的开发(FDD),用于在形式方法的指导下开发可证明正确的分散系统。我们还提出了一个名为Seniz的框架,用一种新的建模语言和脚手架来实践FDD。此外,我们在Seniz的支持下进行案例研究,以证明FDD在实践中的有效性。
{"title":"Formalism- Driven Development of Decentralized Systems","authors":"Yepeng Ding, Hiroyuki Sato","doi":"10.1109/ICECCS54210.2022.00018","DOIUrl":"https://doi.org/10.1109/ICECCS54210.2022.00018","url":null,"abstract":"Decentralized systems have been widely developed and applied to address security and privacy issues in centralized systems, especially since the advancement of distributed ledger technology. However, it is challenging to ensure their correct functioning with respect to their designs and minimize the technical risk before the delivery. Although formal methods have made significant progress over the past decades, a feasible solution based on formal methods from a development process perspective has not been well developed. In this paper, we formulate an iterative and incremental development process, named formalism-driven development (FDD), for developing provably correct decentralized systems under the guidance of formal methods. We also present a framework named Seniz, to practicalize FDD with a new modeling language and scaffolds. Furthermore, we conduct case studies to demonstrate the effectiveness of FDD in practice with the support of Seniz.","PeriodicalId":344493,"journal":{"name":"2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 26th International Conference on Engineering of Complex Computer Systems (ICECCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1