首页 > 最新文献

Cybersecurity最新文献

英文 中文
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer 利用分散式(t,n)阈值所有权转移进行云医疗记录审计
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1186/s42400-024-00246-4
Yamei Wang, Weijing You, Yuexin Zhang, Ayong Ye, Li Xu

In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently. However, we investigate and find that most of the existing data ownership transfer protocols only work well between two individuals, and they become inefficient when dealing between two communities. The proposals for transferring tags between communities are problematic as well since, they require all members get involved or a fully trusted aggregator facilitates ownership transfer, which are unrealistic in certain scenarios. To alleviate these problems, in this paper we develop a secure auditing protocol with decentralized (tn)-threshold ownership transfer for cloud EMRs. This protocol is designed to operate efficiently without requiring the mandatory participation of every user or the involvement of any trusted third-party. It is achieved by employing the threshold signature. Rigorous security analyses and comprehensive performance evaluations illustrate the security and practicality of our protocol. Specifically, according to the evaluations and comparisons, the communication and computational consumption is independent of the file size, i.e., it is constant in our protocol for both communities.

在某些云电子病历(EMR)应用中,数据所有权可能需要转移。在实践中,不仅要安全高效地转移数据,还要转移审计能力。然而,我们调查发现,大多数现有的数据所有权转移协议只能在两个人之间有效运行,而在两个社区之间处理时就会变得效率低下。在社区之间转移标签的建议也存在问题,因为它们要求所有成员都参与进来,或者由一个完全可信的聚合器来促进所有权转移,而这在某些情况下是不现实的。为了缓解这些问题,我们在本文中为云 EMR 开发了一种具有分散式(t, n)阈值所有权转移的安全审核协议。该协议无需每个用户的强制参与或任何可信第三方的参与即可高效运行。它通过使用阈值签名来实现。严格的安全分析和全面的性能评估说明了我们协议的安全性和实用性。具体来说,根据评估和比较,通信和计算消耗与文件大小无关,也就是说,在我们的协议中,两个社区的通信和计算消耗都是恒定的。
{"title":"Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer","authors":"Yamei Wang, Weijing You, Yuexin Zhang, Ayong Ye, Li Xu","doi":"10.1186/s42400-024-00246-4","DOIUrl":"https://doi.org/10.1186/s42400-024-00246-4","url":null,"abstract":"<p>In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efficiently. However, we investigate and find that most of the existing data ownership transfer protocols only work well between two individuals, and they become inefficient when dealing between two communities. The proposals for transferring tags between communities are problematic as well since, they require all members get involved or a fully trusted aggregator facilitates ownership transfer, which are unrealistic in certain scenarios. To alleviate these problems, in this paper we develop a secure auditing protocol with decentralized (<i>t</i>, <i>n</i>)-threshold ownership transfer for cloud EMRs. This protocol is designed to operate efficiently without requiring the mandatory participation of every user or the involvement of any trusted third-party. It is achieved by employing the threshold signature. Rigorous security analyses and comprehensive performance evaluations illustrate the security and practicality of our protocol. Specifically, according to the evaluations and comparisons, the communication and computational consumption is independent of the file size, i.e., it is constant in our protocol for both communities.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142249405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics SIFT:筛选文件类型--可解释人工智能在网络取证中的应用
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1186/s42400-024-00241-9
Shahid Alam, Alper Kamil Demir

Artificial Intelligence (AI) is being applied to improve the efficiency of software systems used in various domains, especially in the health and forensic sciences. Explainable AI (XAI) is one of the fields of AI that interprets and explains the methods used in AI. One of the techniques used in XAI to provide such interpretations is by computing the relevance of the input features to the output of an AI model. File fragment classification is one of the vital issues of file carving in Cyber Forensics (CF) and becomes challenging when the filesystem metadata is missing. Other major challenges it faces are: proliferation of file formats, file embeddings, automation, We leverage and utilize interpretations provided by XAI to optimize the classification of file fragments and propose a novel sifting approach, named SIFT (Sifting File Types). SIFT employs TF-IDF to assign weight to a byte (feature), which is used to select features from a file fragment. Threshold-based LIME and SHAP (the two XAI techniques) feature relevance values are computed for the selected features to optimize file fragment classification. To improve multinomial classification, a Multilayer Perceptron model is developed and optimized with five hidden layers, each layer with (i times n) neurons, where i = the layer number and n = the total number of classes in the dataset. When tested with 47,482 samples of 20 file types (classes), SIFT achieves a detection rate of 82.1% and outperforms the other state-of-the-art techniques by at least 10%. To the best of our knowledge, this is the first effort of applying XAI in CF for optimizing file fragment classification.

人工智能(AI)正被用于提高各领域软件系统的效率,尤其是在健康和法医学领域。可解释的人工智能(XAI)是人工智能的一个领域,它对人工智能中使用的方法进行解释和说明。XAI 中用于提供此类解释的技术之一是计算输入特征与人工智能模型输出的相关性。文件片段分类是网络取证(CF)中文件雕刻的重要问题之一,当文件系统元数据缺失时,文件片段分类就变得非常具有挑战性。我们利用 XAI 提供的解释来优化文件片段的分类,并提出了一种名为 SIFT(筛选文件类型)的新型筛选方法。SIFT 采用 TF-IDF 为字节(特征)分配权重,用于从文件片段中选择特征。为所选特征计算基于阈值的 LIME 和 SHAP(两种 XAI 技术)特征相关性值,以优化文件片段分类。为了改进多项式分类,开发并优化了多层感知器模型,该模型有 5 个隐藏层,每层有 (i times n) 个神经元,其中 i = 层数,n = 数据集中类别的总数。在对 20 种文件类型(类)的 47,482 个样本进行测试时,SIFT 的检测率达到了 82.1%,比其他最先进的技术至少高出 10%。据我们所知,这是首次在 CF 中应用 XAI 来优化文件片段分类。
{"title":"SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics","authors":"Shahid Alam, Alper Kamil Demir","doi":"10.1186/s42400-024-00241-9","DOIUrl":"https://doi.org/10.1186/s42400-024-00241-9","url":null,"abstract":"<p>Artificial Intelligence (AI) is being applied to improve the efficiency of software systems used in various domains, especially in the health and forensic sciences. Explainable AI (XAI) is one of the fields of AI that interprets and explains the methods used in AI. One of the techniques used in XAI to provide such interpretations is by computing the relevance of the input features to the output of an AI model. File fragment classification is one of the vital issues of file carving in Cyber Forensics (CF) and becomes challenging when the filesystem <i>metadata is missing</i>. Other major challenges it faces are: <i>proliferation of file formats</i>, <i>file embeddings</i>, <i>automation</i>, We leverage and utilize interpretations provided by XAI to optimize the classification of file fragments and propose a novel sifting approach, named SIFT (Sifting File Types). SIFT employs TF-IDF to assign weight to a byte (feature), which is used to select features from a file fragment. Threshold-based LIME and SHAP (the two XAI techniques) feature relevance values are computed for the selected features to optimize file fragment classification. To improve multinomial classification, a Multilayer Perceptron model is developed and optimized with five hidden layers, each layer with <span>(i times n)</span> neurons, where <i>i</i> = the layer number and <i>n</i> = the total number of classes in the dataset. When tested with 47,482 samples of 20 file types (classes), SIFT achieves a detection rate of 82.1% and outperforms the other state-of-the-art techniques by at least 10%. To the best of our knowledge, this is the first effort of applying XAI in CF for optimizing file fragment classification.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142181192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling user notification scenarios in privacy policies 隐私政策中的用户通知情景建模
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1186/s42400-024-00234-8
Mikhail Kuznetsov, Evgenia Novikova, Igor Kotenko

The processing of personal data gives a rise to many privacy concerns, and one of them is to ensure the transparency of data processing to end users. Usually this information is communicated to them using privacy policies. In this paper, the problem of user notification in case of data breaches and policy changes is addressed, besides an ontology-based approach to model them is proposed. To specify the ontology concepts and properties, the requirements and recommendations for the legislative regulations as well as existing privacy policies are evaluated. A set of SPARQL queries to validate the correctness and completeness of the proposed ontology are developed. The proposed approach is applied to evaluate the privacy policies designed by cloud computing providers and IoT device manufacturers. The results of the analysis show that the transparency of user notification scenarios presented in the privacy policies is still very low, and the companies should reconsider the notification mechanisms and provide more detailed information in privacy policies.

个人数据的处理会引起许多隐私问题,其中之一就是要确保数据处理对最终用户的透明度。通常,这些信息是通过隐私政策传达给用户的。本文探讨了数据泄露和政策变更情况下的用户通知问题,并提出了一种基于本体的建模方法。为了明确本体的概念和属性,本文对立法法规的要求和建议以及现有的隐私政策进行了评估。还开发了一套 SPARQL 查询来验证本体的正确性和完整性。建议的方法被用于评估云计算提供商和物联网设备制造商设计的隐私政策。分析结果表明,隐私政策中用户通知场景的透明度仍然很低,公司应重新考虑通知机制,并在隐私政策中提供更详细的信息。
{"title":"Modelling user notification scenarios in privacy policies","authors":"Mikhail Kuznetsov, Evgenia Novikova, Igor Kotenko","doi":"10.1186/s42400-024-00234-8","DOIUrl":"https://doi.org/10.1186/s42400-024-00234-8","url":null,"abstract":"<p>The processing of personal data gives a rise to many privacy concerns, and one of them is to ensure the transparency of data processing to end users. Usually this information is communicated to them using privacy policies. In this paper, the problem of user notification in case of data breaches and policy changes is addressed, besides an ontology-based approach to model them is proposed. To specify the ontology concepts and properties, the requirements and recommendations for the legislative regulations as well as existing privacy policies are evaluated. A set of SPARQL queries to validate the correctness and completeness of the proposed ontology are developed. The proposed approach is applied to evaluate the privacy policies designed by cloud computing providers and IoT device manufacturers. The results of the analysis show that the transparency of user notification scenarios presented in the privacy policies is still very low, and the companies should reconsider the notification mechanisms and provide more detailed information in privacy policies.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142181193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks FLSec-RPL:基于模糊逻辑的入侵检测方案,用于保护基于 RPL 的物联网网络免受 DIO 邻居压制攻击
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1186/s42400-024-00223-x
Chenset Kim, Chakchai So-In, Yanika Kongsorot, Phet Aimtongkham

The Internet of Things (IoT) has gained popularity and is widely used in modern society. The growth in the sizes of IoT networks with more internet-connected devices has led to concerns regarding privacy and security. In particular, related to the routing protocol for low-power and lossy networks (RPL), which lacks robust security functions, many IoT devices in RPL networks are resource-constrained, with limited computing power, bandwidth, memory, and battery life. This causes them to face various vulnerabilities and potential attacks, such as DIO neighbor suppression attacks. This type of attack specifically targets neighboring nodes through DIO messages and poses a significant security threat to RPL-based IoT networks. Recent studies have proposed methods for detecting and mitigating this attack; however, they produce high false-positive and false-negative rates in detection tasks and cannot fully protect RPL networks against this attack type. In this paper, we propose a novel fuzzy logic-based intrusion detection scheme to secure the RPL protocol (FLSec-RPL) to protect against this attack. Our method is built of three key phases consecutively: (1) it tracks attack activity variables to determine potential malicious behaviors; (2) it performs fuzzy logic-based intrusion detection to identify malicious neighbor nodes; and (3) it provides a detection validation and blocking mechanism to ensure that both malicious and suspected malicious nodes are accurately detected and blocked. To evaluate the effectiveness of our method, we conduct comprehensive experiments across diverse scenarios, including Static-RPL and Mobile-RPL networks. We compare the performance of our proposed method with that of the state-of-the-art methods. The results demonstrate that our method outperforms existing methods in terms of the detection accuracy, F1 score, power consumption, end-to-end delay, and packet delivery ratio metrics.

物联网(IoT)已在现代社会得到普及和广泛应用。随着物联网网络规模的扩大,与互联网连接的设备越来越多,引发了人们对隐私和安全的担忧。特别是与缺乏强大安全功能的低功耗和有损网络路由协议(RPL)有关,RPL 网络中的许多物联网设备资源有限,计算能力、带宽、内存和电池寿命都很有限。这导致它们面临各种漏洞和潜在攻击,如 DIO 邻居压制攻击。这类攻击专门通过 DIO 消息攻击邻近节点,对基于 RPL 的物联网网络构成了严重的安全威胁。最近的研究提出了检测和缓解这种攻击的方法,但这些方法在检测任务中会产生很高的假阳性率和假阴性率,无法完全保护 RPL 网络免受这种攻击。在本文中,我们提出了一种新颖的基于模糊逻辑的入侵检测方案来保护 RPL 协议(FLSec-RPL),以抵御这种攻击。我们的方法由三个关键阶段组成:(1) 跟踪攻击活动变量,以确定潜在的恶意行为;(2) 执行基于模糊逻辑的入侵检测,以识别恶意邻居节点;(3) 提供检测验证和阻断机制,以确保准确检测和阻断恶意节点和疑似恶意节点。为了评估我们方法的有效性,我们在静态-RPL 和移动-RPL 网络等不同场景下进行了综合实验。我们比较了我们提出的方法和最先进方法的性能。结果表明,我们的方法在检测准确率、F1 分数、功耗、端到端延迟和数据包交付率等指标上都优于现有方法。
{"title":"FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks","authors":"Chenset Kim, Chakchai So-In, Yanika Kongsorot, Phet Aimtongkham","doi":"10.1186/s42400-024-00223-x","DOIUrl":"https://doi.org/10.1186/s42400-024-00223-x","url":null,"abstract":"<p>The Internet of Things (IoT) has gained popularity and is widely used in modern society. The growth in the sizes of IoT networks with more internet-connected devices has led to concerns regarding privacy and security. In particular, related to the routing protocol for low-power and lossy networks (RPL), which lacks robust security functions, many IoT devices in RPL networks are resource-constrained, with limited computing power, bandwidth, memory, and battery life. This causes them to face various vulnerabilities and potential attacks, such as DIO neighbor suppression attacks. This type of attack specifically targets neighboring nodes through DIO messages and poses a significant security threat to RPL-based IoT networks. Recent studies have proposed methods for detecting and mitigating this attack; however, they produce high false-positive and false-negative rates in detection tasks and cannot fully protect RPL networks against this attack type. In this paper, we propose a novel fuzzy logic-based intrusion detection scheme to secure the RPL protocol (FLSec-RPL) to protect against this attack. Our method is built of three key phases consecutively: (1) it tracks attack activity variables to determine potential malicious behaviors; (2) it performs fuzzy logic-based intrusion detection to identify malicious neighbor nodes; and (3) it provides a detection validation and blocking mechanism to ensure that both malicious and suspected malicious nodes are accurately detected and blocked. To evaluate the effectiveness of our method, we conduct comprehensive experiments across diverse scenarios, including Static-RPL and Mobile-RPL networks. We compare the performance of our proposed method with that of the state-of-the-art methods. The results demonstrate that our method outperforms existing methods in terms of the detection accuracy, F1 score, power consumption, end-to-end delay, and packet delivery ratio metrics.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142181195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New partial key exposure attacks on RSA with additive exponent blinding 利用加法指数致盲对 RSA 进行新的部分密钥暴露攻击
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1186/s42400-024-00214-y
Ziming Jiang, Yongbin Zhou, Yuejun Liu

Partial key exposure attacks present a significant threat to RSA-type cryptosystems. These attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent, which is typically revealed by side-channel attacks, cold boot attacks, etc. In practice, the RSA implementations typically employ countermeasures to resist physical attacks, such as additive exponent blinding (d' = d + r varphi (N)) with unknown random blinding factor r. Although there are a couple of partial key exposure attacks on blinding RSA, these attacks require a considerable amount of leakage and fail to work when e is up to full size. In this paper, we propose new partial key exposure attacks on RSA with additive exponent blinding, focusing on leakage scenarios where the Most Significant Bits (MSBs) or Least Significant Bits (LSBs) of (d') are revealed. For the case where e is small, we first recover partial information of p by solving the quadratic congruence equation, and then find the small roots of the integer equation to recover entire private key. Our method relaxes the attack requirements, for instance, we reduce the amount of MSBs for a successful attack from 75 to 25% when (e approx N^{0.25}) and (rapprox N^{0}). Furthermore, we propose new attacks using the unique algebraic relationship in blinding RSA, which extend the attack to the case where e is of full size.

部分密钥暴露攻击对 RSA 类密码系统构成重大威胁。这些攻击利用解密指数的部分知识对 RSA 模进行因式分解,而解密指数通常是通过侧信道攻击、冷启动攻击等方式泄露的。在实践中,RSA 实现通常会采用一些对策来抵御物理攻击,如带有未知随机致盲因子 r 的加法指数致盲(d' = d + r varphi (N))。虽然有一些针对致盲 RSA 的部分密钥暴露攻击,但这些攻击需要相当大的泄漏量,而且当 e 达到全尺寸时无法奏效。在本文中,我们针对RSA的加法指数盲法提出了新的部分密钥暴露攻击,重点关注(d')的最重要位(MSBs)或最不重要位(LSBs)被泄露的情况。对于 e 较小的情况,我们首先通过求解二次全等方程恢复 p 的部分信息,然后找到整数方程的小根恢复整个私钥。我们的方法放宽了攻击要求,例如,当 (e approx N^{0.25}) 和 (rapprox N^{0}) 时,我们将成功攻击的 MSB 数量从 75% 降至 25%。此外,我们还提出了一些新的攻击方法,利用盲RSA中独特的代数关系,将攻击扩展到e为全大小的情况。
{"title":"New partial key exposure attacks on RSA with additive exponent blinding","authors":"Ziming Jiang, Yongbin Zhou, Yuejun Liu","doi":"10.1186/s42400-024-00214-y","DOIUrl":"https://doi.org/10.1186/s42400-024-00214-y","url":null,"abstract":"<p>Partial key exposure attacks present a significant threat to RSA-type cryptosystems. These attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent, which is typically revealed by side-channel attacks, cold boot attacks, etc. In practice, the RSA implementations typically employ countermeasures to resist physical attacks, such as additive exponent blinding <span>(d' = d + r varphi (N))</span> with unknown random blinding factor <i>r</i>. Although there are a couple of partial key exposure attacks on blinding RSA, these attacks require a considerable amount of leakage and fail to work when <i>e</i> is up to full size. In this paper, we propose new partial key exposure attacks on RSA with additive exponent blinding, focusing on leakage scenarios where the Most Significant Bits (MSBs) or Least Significant Bits (LSBs) of <span>(d')</span> are revealed. For the case where <i>e</i> is small, we first recover partial information of <i>p</i> by solving the quadratic congruence equation, and then find the small roots of the integer equation to recover entire private key. Our method relaxes the attack requirements, for instance, we reduce the amount of MSBs for a successful attack from 75 to 25% when <span>(e approx N^{0.25})</span> and <span>(rapprox N^{0})</span>. Furthermore, we propose new attacks using the unique algebraic relationship in blinding RSA, which extend the attack to the case where <i>e</i> is of full size.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142181194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic group fuzzy extractor 动态组模糊提取器
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1186/s42400-024-00210-2
Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen

The group fuzzy extractor allows group users to extract and reproduce group cryptographic keys from their individual non-uniform random sources. It can be easily used in group-oriented cryptographic applications. However, current group fuzzy extractors are not dynamic, i.e. they spend a large cost when dealing with user revocation. In this work, we propose the formal definition and construction of dynamic group fuzzy extractor (DGFE) to address this issue. For the revocation, DGFE allows unrevoked group users to reproduce updated group keys from the existing group help data. Meanwhile, it prevents any revoked group user from generating new group keys using the previously authorized individual help data. We propose a DGFE construction based on the revocable group signature. Furthermore, we give formal proofs of reusability, anonymity and traceability of our construction.

群组模糊提取器允许群组用户从各自的非均匀随机源中提取和复制群组加密密钥。它可以很容易地应用于面向群组的加密应用中。然而,目前的群组模糊提取器不是动态的,即在处理用户撤销时会花费很大的成本。在这项工作中,我们提出了动态组模糊提取器(DGFE)的正式定义和构造,以解决这个问题。对于撤销,DGFE 允许未撤销的群组用户从现有的群组帮助数据中复制更新的群组密钥。同时,它可以防止任何被撤销的群组用户使用先前授权的个人帮助数据生成新的群组密钥。我们提出了一种基于可撤销群组签名的 DGFE 结构。此外,我们还给出了我们构建的可重用性、匿名性和可追溯性的正式证明。
{"title":"Dynamic group fuzzy extractor","authors":"Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen","doi":"10.1186/s42400-024-00210-2","DOIUrl":"https://doi.org/10.1186/s42400-024-00210-2","url":null,"abstract":"<p>The group fuzzy extractor allows group users to extract and reproduce group cryptographic keys from their individual non-uniform random sources. It can be easily used in group-oriented cryptographic applications. However, current group fuzzy extractors are not dynamic, i.e. they spend a large cost when dealing with user revocation. In this work, we propose the formal definition and construction of dynamic group fuzzy extractor (DGFE) to address this issue. For the revocation, DGFE allows unrevoked group users to reproduce updated group keys from the existing group help data. Meanwhile, it prevents any revoked group user from generating new group keys using the previously authorized individual help data. We propose a DGFE construction based on the revocable group signature. Furthermore, we give formal proofs of reusability, anonymity and traceability of our construction.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142181196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EvilPromptFuzzer: generating inappropriate content based on text-to-image models EvilPromptFuzzer:基于文本到图像模型生成不当内容
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1186/s42400-024-00279-9
Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li

Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research has focused on content security threats of large language models (LLMs), yet comprehensive studies on the content security of TTI models are notably scarce. This paper introduces a systematic tool, named EvilPromptFuzzer, designed to fuzz evil prompts in TTI models. For 15 kinds of fine-grained risks, EvilPromptFuzzer employs the strong knowledge-mining ability of LLMs to construct seed banks, in which the seeds cover various types of characters, interrelations, actions, objects, expressions, body parts, locations, surroundings, etc. Subsequently, these seeds are fed into the LLMs to build scene-diverse prompts, which can weaken the semantic sensitivity related to the fine-grained risks. Hence, the prompts can bypass the content audit mechanism of the TTI model, and ultimately help to generate images with inappropriate content. For the risks of violence, horrible, disgusting, animal cruelty, religious bias, political symbol, and extremism, the efficiency of EvilPromptFuzzer for generating inappropriate images based on DALL.E 3 are greater than 30%, namely, more than 30 generated images are malicious among 100 prompts. Specifically, the efficiency of horrible, disgusting, political symbols, and extremism up to 58%, 64%, 71%, and 50%, respectively. Additionally, we analyzed the vulnerability of existing popular content audit platforms, including Amazon, Google, Azure, and Baidu. Even the most effective Google SafeSearch cloud platform identifies only 33.85% of malicious images across three distinct categories.

文本到图像(TTI)模型为许多行业提供了巨大的创新能力,而由其引发的内容安全问题也引起了广泛关注。大量研究都集中在大型语言模型(LLM)的内容安全威胁上,但对 TTI 模型内容安全的全面研究却少之又少。本文介绍了一种名为 EvilPromptFuzzer 的系统工具,旨在模糊 TTI 模型中的邪恶提示。针对 15 种细粒度风险,EvilPromptFuzzer 利用 LLMs 强大的知识挖掘能力构建种子库,其中的种子涵盖各种类型的字符、相互关系、动作、对象、表情、身体部位、位置、周围环境等。随后,这些种子被输入 LLM,以构建场景多样化的提示,从而削弱与细粒度风险相关的语义敏感性。因此,这些提示可以绕过 TTI 模型的内容审核机制,最终帮助生成内容不当的图像。对于暴力、恐怖、恶心、虐待动物、宗教偏见、政治符号和极端主义等风险,EvilPromptFuzzer 基于 DALL.E 3 生成不当图片的效率均大于 30%,即在 100 条提示中生成了 30 多张恶意图片。具体来说,恐怖、恶心、政治符号和极端主义的效率分别高达 58%、64%、71% 和 50%。此外,我们还分析了亚马逊、谷歌、Azure 和百度等现有流行内容审核平台的漏洞。即使是最有效的谷歌 SafeSearch 云平台,也只能识别出 33.85% 的恶意图片,而这些恶意图片涉及三个不同的类别。
{"title":"EvilPromptFuzzer: generating inappropriate content based on text-to-image models","authors":"Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li","doi":"10.1186/s42400-024-00279-9","DOIUrl":"https://doi.org/10.1186/s42400-024-00279-9","url":null,"abstract":"<p>Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research has focused on content security threats of large language models (LLMs), yet comprehensive studies on the content security of TTI models are notably scarce. This paper introduces a systematic tool, named EvilPromptFuzzer, designed to fuzz evil prompts in TTI models. For 15 kinds of fine-grained risks, EvilPromptFuzzer employs the strong knowledge-mining ability of LLMs to construct seed banks, in which the seeds cover various types of characters, interrelations, actions, objects, expressions, body parts, locations, surroundings, etc. Subsequently, these seeds are fed into the LLMs to build scene-diverse prompts, which can weaken the semantic sensitivity related to the fine-grained risks. Hence, the prompts can bypass the content audit mechanism of the TTI model, and ultimately help to generate images with inappropriate content. For the risks of violence, horrible, disgusting, animal cruelty, religious bias, political symbol, and extremism, the efficiency of EvilPromptFuzzer for generating inappropriate images based on DALL.E 3 are greater than 30%, namely, more than 30 generated images are malicious among 100 prompts. Specifically, the efficiency of horrible, disgusting, political symbols, and extremism up to 58%, 64%, 71%, and 50%, respectively. Additionally, we analyzed the vulnerability of existing popular content audit platforms, including Amazon, Google, Azure, and Baidu. Even the most effective Google SafeSearch cloud platform identifies only 33.85% of malicious images across three distinct categories.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142181197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ProcSAGE: an efficient host threat detection method based on graph representation learning ProcSAGE:基于图表示学习的高效主机威胁检测方法
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-25 DOI: 10.1186/s42400-024-00240-w
Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang, Zhigang Lu

Advanced Persistent Threats (APTs) achieves internal networks penetration through multiple methods, making it difficult to detect attack clues solely through boundary defense measures. To address this challenge, some research has proposed threat detection methods based on provenance graphs, which leverage entity relationships such as processes, files, and sockets found in host audit logs. However, these methods are generally inefficient, especially when faced with massive audit logs and the computational resource-intensive nature of graph algorithms. Effectively and economically extracting APT attack clues from massive system audit logs remains a significant challenge. To tackle this problem, this paper introduces the ProcSAGE method, which detects threats based on abnormal behavior patterns, offering high accuracy, low cost, and independence from expert knowledge. ProcSAGE focuses on processes or threads in host audit logs during the graph construction phase to effectively control the scale of provenance graphs and reduce performance overhead. Additionally, in the feature extraction phase, ProcSAGE considers information about the processes or threads themselves and their neighboring nodes to accurately characterize them and enhance model accuracy. In order to verify the effectiveness of the ProcSAGE method, this study conducted a comprehensive evaluation on the StreamSpot dataset. The experimental results show that the ProcSAGE method can significantly reduce the time and memory consumption in the threat detection process while improving the accuracy, and the optimization effect becomes more significant as the data size expands.

高级持续性威胁(APT)通过多种方法实现内部网络渗透,因此很难仅仅通过边界防御措施来检测攻击线索。为了应对这一挑战,一些研究提出了基于出处图的威胁检测方法,这种方法利用了主机审计日志中的进程、文件和套接字等实体关系。然而,这些方法通常效率不高,尤其是在面对海量审计日志和图算法的计算资源密集型特性时。从海量系统审计日志中有效、经济地提取 APT 攻击线索仍是一项重大挑战。为解决这一问题,本文介绍了 ProcSAGE 方法,该方法基于异常行为模式检测威胁,具有高准确性、低成本和独立于专家知识的特点。在图构建阶段,ProcSAGE 专注于主机审计日志中的进程或线程,以有效控制出处图的规模并降低性能开销。此外,在特征提取阶段,ProcSAGE 会考虑进程或线程本身及其相邻节点的信息,以准确描述它们的特征,提高模型的准确性。为了验证 ProcSAGE 方法的有效性,本研究在 StreamSpot 数据集上进行了全面评估。实验结果表明,ProcSAGE 方法可以显著减少威胁检测过程中的时间和内存消耗,同时提高检测精度,而且随着数据规模的扩大,优化效果会更加显著。
{"title":"ProcSAGE: an efficient host threat detection method based on graph representation learning","authors":"Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang, Zhigang Lu","doi":"10.1186/s42400-024-00240-w","DOIUrl":"https://doi.org/10.1186/s42400-024-00240-w","url":null,"abstract":"<p>Advanced Persistent Threats (APTs) achieves internal networks penetration through multiple methods, making it difficult to detect attack clues solely through boundary defense measures. To address this challenge, some research has proposed threat detection methods based on provenance graphs, which leverage entity relationships such as processes, files, and sockets found in host audit logs. However, these methods are generally inefficient, especially when faced with massive audit logs and the computational resource-intensive nature of graph algorithms. Effectively and economically extracting APT attack clues from massive system audit logs remains a significant challenge. To tackle this problem, this paper introduces the ProcSAGE method, which detects threats based on abnormal behavior patterns, offering high accuracy, low cost, and independence from expert knowledge. ProcSAGE focuses on processes or threads in host audit logs during the graph construction phase to effectively control the scale of provenance graphs and reduce performance overhead. Additionally, in the feature extraction phase, ProcSAGE considers information about the processes or threads themselves and their neighboring nodes to accurately characterize them and enhance model accuracy. In order to verify the effectiveness of the ProcSAGE method, this study conducted a comprehensive evaluation on the StreamSpot dataset. The experimental results show that the ProcSAGE method can significantly reduce the time and memory consumption in the threat detection process while improving the accuracy, and the optimization effect becomes more significant as the data size expands.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142181199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones 无人机互联网基于邻圈的轻量级用户身份验证和群组密钥协议
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-18 DOI: 10.1186/s42400-024-00247-3
Zhuo Zhao, Chingfang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu

As mobile internet and Internet of Things technologies continue to advance, the application scenarios of peer-to-peer Internet of Drones (IoD) are becoming increasingly diverse. However, the development of IoD also faces significant challenges, such as security, privacy protection, and limited computing power, which require technological innovation to overcome. For group secure communication, it is necessary to provide two basic services, user authentication and group key agreement. Due to the limited storage of IoD devices, group key negotiation requires lightweight calculations, and conventional schemes cannot satisfy the requirements of group communication in the IoD. To this end, a new lightweight communication scheme based on ring neighbors is presented in this paper for IoD, which not only realizes the identity verification of user and group key negotiation, but also improves computational efficiency on each group member side. A detailed security analysis substantiates that the designed scheme is capable of withstanding attacks from both internal and external adversaries while satisfying all defined security requirements. More importantly, in our proposal, the computational cost on the user side remains unaffected by the variability of the number of members participating in group communication, as members communicate in a non-interactive manner through broadcasting. As a result, the protocol proposed in this article demonstrates lower computational and communication costs in comparison to other cryptographic schemes. Hence, this proposal presents a more appealing approach to lightweight group key agreement protocol with user authentication for application in the IoD.

随着移动互联网和物联网技术的不断进步,点对点无人机互联网(IoD)的应用场景日益多样化。然而,无人机互联网的发展也面临着安全、隐私保护、计算能力有限等重大挑战,需要通过技术创新加以克服。要实现群组安全通信,必须提供用户身份验证和群组密钥协议这两项基本服务。由于物联网设备的存储空间有限,群组密钥协议需要轻量级计算,传统方案无法满足物联网群组通信的要求。为此,本文针对 IoD 提出了一种基于环邻的新型轻量级通信方案,不仅实现了用户身份验证和组密钥协商,还提高了每个组员端的计算效率。详细的安全分析证实,所设计的方案能够抵御来自内部和外部对手的攻击,同时满足所有定义的安全要求。更重要的是,在我们的方案中,用户端的计算成本不受参与群组通信的成员数量变化的影响,因为成员通过广播以非交互方式进行通信。因此,与其他加密方案相比,本文提出的协议具有更低的计算和通信成本。因此,本文提出了一种更有吸引力的轻量级群组密钥协议方法,并将用户身份验证应用于物联网发展。
{"title":"Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones","authors":"Zhuo Zhao, Chingfang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu","doi":"10.1186/s42400-024-00247-3","DOIUrl":"https://doi.org/10.1186/s42400-024-00247-3","url":null,"abstract":"<p>As mobile internet and Internet of Things technologies continue to advance, the application scenarios of peer-to-peer Internet of Drones (IoD) are becoming increasingly diverse. However, the development of IoD also faces significant challenges, such as security, privacy protection, and limited computing power, which require technological innovation to overcome. For group secure communication, it is necessary to provide two basic services, user authentication and group key agreement. Due to the limited storage of IoD devices, group key negotiation requires lightweight calculations, and conventional schemes cannot satisfy the requirements of group communication in the IoD. To this end, a new lightweight communication scheme based on ring neighbors is presented in this paper for IoD, which not only realizes the identity verification of user and group key negotiation, but also improves computational efficiency on each group member side. A detailed security analysis substantiates that the designed scheme is capable of withstanding attacks from both internal and external adversaries while satisfying all defined security requirements. More importantly, in our proposal, the computational cost on the user side remains unaffected by the variability of the number of members participating in group communication, as members communicate in a non-interactive manner through broadcasting. As a result, the protocol proposed in this article demonstrates lower computational and communication costs in comparison to other cryptographic schemes. Hence, this proposal presents a more appealing approach to lightweight group key agreement protocol with user authentication for application in the IoD.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142181198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-channel spatial information feature based human pose estimation algorithm 基于多通道空间信息特征的人体姿态估计算法
IF 3.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-11 DOI: 10.1186/s42400-024-00248-2
Yinghong Xie, Yan Hao, Xiaowei Han, Qiang Gao, Biao Yin

Human pose estimation is an important task in computer vision, which can provide key point detection of human body and obtain bone information. At present, human pose estimation is mainly utilized for detection of large targets, and there is no solution for detection of small targets. This paper proposes a multi-channel spatial information feature based human pose (MCSF-Pose) estimation algorithm to address the issue of medium and small targets inaccurate detection of human key points in scenarios involving occlusion and multiple poses. The MCSF-Pose network is a bottom-up regression network. Firstly, an UP-Focus module is designed to expand the feature information while reducing parameter computation during the up-sampling process. Then, the channel segmentation strategy is adopted to cut the features, and the feature information of multiple dimensions is retained through different convolutional groups, which reduces the parameter lightweight network model and makes up for the loss of the feature information associated with the depth of the network. Finally, the three-layer PANet structure is designed to reduce the complexity of the model. With the aid of the structure, it also to improve the detection accuracy and anti-interference ability of human key points. The experimental results indicate that the proposed algorithm outperforms YOLO-Pose and other human pose estimation algorithms on COCO2017 and MPII human pose datasets.

人体姿态估计是计算机视觉中的一项重要任务,它可以对人体进行关键点检测并获取骨骼信息。目前,人体姿态估计主要用于大型目标的检测,对于小型目标的检测还没有解决方案。本文提出了一种基于多通道空间信息特征的人体姿态(MCSF-Pose)估计算法,以解决在涉及遮挡和多种姿态的场景中,中小型目标的人体关键点检测不准确的问题。MCSF-Pose 网络是一个自下而上的回归网络。首先,设计了一个 UP-Focus 模块来扩展特征信息,同时减少上采样过程中的参数计算。然后,采用通道分割策略对特征进行切割,通过不同的卷积组保留多维度的特征信息,从而减少了参数轻量级网络模型,弥补了与网络深度相关的特征信息损失。最后,三层 PANet 结构的设计降低了模型的复杂度。借助该结构,还可以提高人类关键点的检测精度和抗干扰能力。实验结果表明,在 COCO2017 和 MPII 人类姿态数据集上,所提出的算法优于 YOLO-Pose 和其他人类姿态估计算法。
{"title":"A multi-channel spatial information feature based human pose estimation algorithm","authors":"Yinghong Xie, Yan Hao, Xiaowei Han, Qiang Gao, Biao Yin","doi":"10.1186/s42400-024-00248-2","DOIUrl":"https://doi.org/10.1186/s42400-024-00248-2","url":null,"abstract":"<p>Human pose estimation is an important task in computer vision, which can provide key point detection of human body and obtain bone information. At present, human pose estimation is mainly utilized for detection of large targets, and there is no solution for detection of small targets. This paper proposes a multi-channel spatial information feature based human pose (MCSF-Pose) estimation algorithm to address the issue of medium and small targets inaccurate detection of human key points in scenarios involving occlusion and multiple poses. The MCSF-Pose network is a bottom-up regression network. Firstly, an UP-Focus module is designed to expand the feature information while reducing parameter computation during the up-sampling process. Then, the channel segmentation strategy is adopted to cut the features, and the feature information of multiple dimensions is retained through different convolutional groups, which reduces the parameter lightweight network model and makes up for the loss of the feature information associated with the depth of the network. Finally, the three-layer PANet structure is designed to reduce the complexity of the model. With the aid of the structure, it also to improve the detection accuracy and anti-interference ability of human key points. The experimental results indicate that the proposed algorithm outperforms YOLO-Pose and other human pose estimation algorithms on COCO2017 and MPII human pose datasets.</p>","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141932915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1