首页 > 最新文献

2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)最新文献

英文 中文
A Study of Steganography Based on Error Correction Code and Secret Sharing Scheme 基于纠错码和秘密共享方案的隐写技术研究
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340154
Kaito Onuma, S. Miyata
In recent years, opportunities to exchange information on the Internet has increased. Under such circumstances, steganography is a technology for safely exchanging information. Previous studies have proposed some methods that combine Shamir's secret sharing method and correlation-based steganography. Correlation-based steganography embeds pseudo-random number as a secret information in DCT (discrete cosine transform) coefficient of an image and extracts the secret information by correlating the pseudo-random number and DCT coefficient. Since it is necessary to obtain a good correlation at the time of extracting, each value of the pseudorandom number sequence is increased by coefficient. This increasing of values causes image quality deterioration. In this paper, we propose a steganography with an error-correcting code. Our proposed method can improve the embedding capacity without deterioration the image quality.
近年来,在互联网上交换信息的机会增加了。在这种情况下,隐写术是一种安全交换信息的技术。以往的研究已经提出了一些将Shamir秘密共享方法和基于相关性的隐写相结合的方法。基于相关的隐写技术将伪随机数作为秘密信息嵌入到图像的DCT(离散余弦变换)系数中,通过伪随机数与DCT系数的关联提取秘密信息。由于需要在提取时获得良好的相关性,因此伪随机数序列的每个值都增加系数。这种值的增加导致图像质量恶化。本文提出了一种带有纠错码的隐写技术。该方法在不降低图像质量的前提下提高了嵌入容量。
{"title":"A Study of Steganography Based on Error Correction Code and Secret Sharing Scheme","authors":"Kaito Onuma, S. Miyata","doi":"10.1109/ICSPIS51252.2020.9340154","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340154","url":null,"abstract":"In recent years, opportunities to exchange information on the Internet has increased. Under such circumstances, steganography is a technology for safely exchanging information. Previous studies have proposed some methods that combine Shamir's secret sharing method and correlation-based steganography. Correlation-based steganography embeds pseudo-random number as a secret information in DCT (discrete cosine transform) coefficient of an image and extracts the secret information by correlating the pseudo-random number and DCT coefficient. Since it is necessary to obtain a good correlation at the time of extracting, each value of the pseudorandom number sequence is increased by coefficient. This increasing of values causes image quality deterioration. In this paper, we propose a steganography with an error-correcting code. Our proposed method can improve the embedding capacity without deterioration the image quality.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introducing a Mobile App to Increase Cybersecurity Awareness in MENA 引入移动应用程序以提高中东和北非地区的网络安全意识
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340128
Hadeel Mohammed Jawad, Samir Tout
Cybersecurity experts predict that cybersecurity is going to be the new cold war. Arab countries are exposed to cyber-attacks that are aimed at stealing personal data and trade secrets. Furthermore, statistics show that women in such countries are exposed to different forms of cyber violence. This paper introduces a new mobile app in the Arabic language to educate Arab-speaking people in the Middle East and North Africa (MENA) about cybersecurity and to increase their awareness of information assurance and cybercrimes. The app was developed for Android and iOS devices and it includes multiple-choice information assurance questions, terms, and articles. Examples of the term definitions are Two-Factor Authentication, Ethical Hacking, and Honeypot. The app data could be increased in the next update of the app.
网络安全专家预测,网络安全将成为新的冷战。阿拉伯国家面临着旨在窃取个人数据和商业机密的网络攻击。此外,统计数据显示,这些国家的妇女面临不同形式的网络暴力。本文介绍了一款新的阿拉伯语移动应用程序,用于教育中东和北非(MENA)的阿拉伯人有关网络安全的知识,并提高他们对信息保障和网络犯罪的认识。这款应用是为安卓和iOS设备开发的,它包括多项选择题、术语和文章。这些术语定义的例子有双因素认证、道德黑客和蜜罐。应用数据可能会在下次更新时增加。
{"title":"Introducing a Mobile App to Increase Cybersecurity Awareness in MENA","authors":"Hadeel Mohammed Jawad, Samir Tout","doi":"10.1109/ICSPIS51252.2020.9340128","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340128","url":null,"abstract":"Cybersecurity experts predict that cybersecurity is going to be the new cold war. Arab countries are exposed to cyber-attacks that are aimed at stealing personal data and trade secrets. Furthermore, statistics show that women in such countries are exposed to different forms of cyber violence. This paper introduces a new mobile app in the Arabic language to educate Arab-speaking people in the Middle East and North Africa (MENA) about cybersecurity and to increase their awareness of information assurance and cybercrimes. The app was developed for Android and iOS devices and it includes multiple-choice information assurance questions, terms, and articles. Examples of the term definitions are Two-Factor Authentication, Ethical Hacking, and Honeypot. The app data could be increased in the next update of the app.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116425305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Obstructive Sleep Apnea on the Cardiovascular Variability 阻塞性睡眠呼吸暂停对心血管变异性的影响
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340127
S. Sani
Sleep apnea is a serious medical condition that influence millions of adults and children in the United States. It is unknown whether or not sleep apnea can cause any abnormalities in cardiovascular variability in patients with no cardiovascular disease. In this study, we investigated new cardiovascular variables which correspond with obstructive sleep apnea. The power spectrum of the electrocardiogram signal (ECG) was studied in healthy aged-matched adults $boldsymbol{(mathrm{n}=15)}$ and patients diagnosed with moderate obstructive sleep apnea $boldsymbol{(mathrm{n}=15)}$. The power spectral analysis was divided into three main frequency bands: very low frequency $boldsymbol{(0.0033sim 0.04mathrm{Hz})}$; low frequency $boldsymbol{(0.04sim 0.15 mathrm{Hz})}$; and high frequency $boldsymbol{(0.15sim 0.4mathrm{Hz})}$. Frequency domain analysis revealed that the very low frequency component of the ECG signal was increased in obstructive sleep apnea patients during episodes of obstructive sleep apnea, whereas other frequencies (low and high frequency) showed no significant changes. This new cardiovascular variable can be used as a new important feature in any comprehensive obstructive sleep apnea prediction model (to increase the accuracy of the model) or in any other noninvasive approaches for diagnosing or monitoring obstructive sleep apnea at home.
睡眠呼吸暂停是一种严重的疾病,影响着美国数百万成年人和儿童。目前尚不清楚睡眠呼吸暂停是否会导致无心血管疾病患者的心血管变异性异常。在这项研究中,我们研究了与阻塞性睡眠呼吸暂停相关的新的心血管变量。研究年龄匹配的健康成人$boldsymbol{( mathm {n}=15)}$和诊断为中度阻塞性睡眠呼吸暂停$boldsymbol{( mathm {n}=15)}$的心电图信号功率谱。功率谱分析分为三个主要频段:极低频$boldsymbol{(0.0033sim 0.04mathrm{Hz})}$;低频$boldsymbol{(0.04sim 0.15 mathm {Hz})}$;高频$boldsymbol{(0.15sim 0.4 mathm {Hz})}$。频域分析显示,阻塞性睡眠呼吸暂停患者在发作期间心电信号的极低频分量增加,而其他频率(低频和高频)无明显变化。这一新的心血管变量可以作为任何综合性阻塞性睡眠呼吸暂停预测模型(以提高模型的准确性)或任何其他无创方法在家中诊断或监测阻塞性睡眠呼吸暂停的一个新的重要特征。
{"title":"The Effect of Obstructive Sleep Apnea on the Cardiovascular Variability","authors":"S. Sani","doi":"10.1109/ICSPIS51252.2020.9340127","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340127","url":null,"abstract":"Sleep apnea is a serious medical condition that influence millions of adults and children in the United States. It is unknown whether or not sleep apnea can cause any abnormalities in cardiovascular variability in patients with no cardiovascular disease. In this study, we investigated new cardiovascular variables which correspond with obstructive sleep apnea. The power spectrum of the electrocardiogram signal (ECG) was studied in healthy aged-matched adults $boldsymbol{(mathrm{n}=15)}$ and patients diagnosed with moderate obstructive sleep apnea $boldsymbol{(mathrm{n}=15)}$. The power spectral analysis was divided into three main frequency bands: very low frequency $boldsymbol{(0.0033sim 0.04mathrm{Hz})}$; low frequency $boldsymbol{(0.04sim 0.15 mathrm{Hz})}$; and high frequency $boldsymbol{(0.15sim 0.4mathrm{Hz})}$. Frequency domain analysis revealed that the very low frequency component of the ECG signal was increased in obstructive sleep apnea patients during episodes of obstructive sleep apnea, whereas other frequencies (low and high frequency) showed no significant changes. This new cardiovascular variable can be used as a new important feature in any comprehensive obstructive sleep apnea prediction model (to increase the accuracy of the model) or in any other noninvasive approaches for diagnosing or monitoring obstructive sleep apnea at home.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusted Security Model for IDS Using Deep Learning 基于深度学习的IDS可信安全模型
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340136
K. Makdi, Frederick T. Sheldon, A. A. Hussein
Contemporarily, cloud computing is becoming the most preferred choice for IT firms because it offers flexibility and pay-per-use services. Nonetheless, privacy and security issues are significant challenges in the successful deployment of cloud computing attributed to its distributed and open architectures that are exposed to intrusions. The open and distributed structures of cloud computing are increasingly appealing to potential cybercriminals. Conventional intrusion detection systems are largely ineffective in the cloud computing environment because of their openness. This paper examines the deployment of novel intrusion detection systems involving a trust-based adaptive security model for intrusion detection through deep learning.
目前,云计算正成为IT公司的首选,因为它提供了灵活性和按使用付费的服务。尽管如此,隐私和安全问题是成功部署云计算的重大挑战,因为云计算的分布式和开放架构容易受到入侵。云计算的开放和分布式结构对潜在的网络罪犯越来越有吸引力。传统的入侵检测系统由于其开放性,在云计算环境下大多是无效的。本文研究了新型入侵检测系统的部署,其中包括基于信任的自适应安全模型,通过深度学习进行入侵检测。
{"title":"Trusted Security Model for IDS Using Deep Learning","authors":"K. Makdi, Frederick T. Sheldon, A. A. Hussein","doi":"10.1109/ICSPIS51252.2020.9340136","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340136","url":null,"abstract":"Contemporarily, cloud computing is becoming the most preferred choice for IT firms because it offers flexibility and pay-per-use services. Nonetheless, privacy and security issues are significant challenges in the successful deployment of cloud computing attributed to its distributed and open architectures that are exposed to intrusions. The open and distributed structures of cloud computing are increasingly appealing to potential cybercriminals. Conventional intrusion detection systems are largely ineffective in the cloud computing environment because of their openness. This paper examines the deployment of novel intrusion detection systems involving a trust-based adaptive security model for intrusion detection through deep learning.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128584572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fighting Deepfake by Residual Noise Using Convolutional Neural Networks 利用卷积神经网络残差噪声对抗深度造假
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340138
M. Rai, Hussain Al-Ahmad, O. Gouda, Dina Jamal, M. A. Talib, Q. Nasir
In the last few years, the easy access to images and videos shared online have been continuously increased. The generative adversarial networks using deep learning leads to create very realistic deepfake videos by playing with the digital content of images and videos. The spread of such deepfake videos on social media networks urged the international community to consider seriously its danger and accordingly encouraged the researchers around the world to develop powerful deepfake detection methods. Many approaches are available in the recent literature. In this paper, the proposed approach is based on exploiting the residual noise which is the difference between original image and its denoised version. The study of residual noise has shown effectiveness in deep-fake detection with regards to its distinctive and discriminative features which can be effectively captured by convolutional neural networks with transfer learning. The performance of our approach is evaluated on two datasets: low-resolution video sequences of the FaceForensics++ and high-resolution videos from Kaggle Deepfake Detection challenge (DFDC). The obtained results show relevant accuracy in comparison with other competitive methods.
在过去的几年里,在网上分享图像和视频的方便访问不断增加。使用深度学习的生成式对抗网络可以通过处理图像和视频的数字内容来创建非常逼真的深度假视频。这种深度造假视频在社交网络上的传播,促使国际社会认真考虑其危险性,并相应地鼓励世界各地的研究人员开发强大的深度造假检测方法。在最近的文献中有许多可用的方法。本文提出的方法是基于利用残差噪声,即原始图像与去噪后的图像之间的差异。残差噪声的研究表明,残差噪声具有明显的判别性,可以通过卷积神经网络的迁移学习有效地捕获残差噪声。我们的方法在两个数据集上进行了性能评估:face取证++的低分辨率视频序列和Kaggle Deepfake Detection挑战(DFDC)的高分辨率视频。所得结果与其他竞争方法相比具有一定的准确性。
{"title":"Fighting Deepfake by Residual Noise Using Convolutional Neural Networks","authors":"M. Rai, Hussain Al-Ahmad, O. Gouda, Dina Jamal, M. A. Talib, Q. Nasir","doi":"10.1109/ICSPIS51252.2020.9340138","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340138","url":null,"abstract":"In the last few years, the easy access to images and videos shared online have been continuously increased. The generative adversarial networks using deep learning leads to create very realistic deepfake videos by playing with the digital content of images and videos. The spread of such deepfake videos on social media networks urged the international community to consider seriously its danger and accordingly encouraged the researchers around the world to develop powerful deepfake detection methods. Many approaches are available in the recent literature. In this paper, the proposed approach is based on exploiting the residual noise which is the difference between original image and its denoised version. The study of residual noise has shown effectiveness in deep-fake detection with regards to its distinctive and discriminative features which can be effectively captured by convolutional neural networks with transfer learning. The performance of our approach is evaluated on two datasets: low-resolution video sequences of the FaceForensics++ and high-resolution videos from Kaggle Deepfake Detection challenge (DFDC). The obtained results show relevant accuracy in comparison with other competitive methods.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130125636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Vulnerability Assessment for IoT Nodes Using OpenBTS and Software Defined Radios 使用OpenBTS和软件定义无线电的物联网节点脆弱性评估
Pub Date : 2020-11-25 DOI: 10.1109/ICSPIS51252.2020.9340151
José de Jesús Rugeles Uribe, E. Guillén
Large-scale cyber attacks using IoT devices have increased in recent years. One of the strategies to deal with this problem is the use of penetration test techniques. The aim of this study was to develop a vulnerability assessment for an IoT M2M node that uses GSM technology. A test scenario was designed consisting of a GMS network created using USRP N210 and OpenBTS radios in a multicell configuration. An IoT-GSM node was designed from a sim8001 radio module, used in several M2M devices. The IoT node stores the measurements of the radio bases operational parameters that make up the GSM network. An algorithm for controlling an attacking base radio was designed using the OpenBTS API, which allows the deployment of a “man in the middle” attack. The entire test deployment can be carried out remotely. Analysis of the results of the measurements obtained lets us understand the attack's behavior in detail and determine the IoT-GSM node's vulnerability. The results obtained show the potential of SDR and OpenBTS technology as penetration test tools to analyze vulnerabilities of IoT systems.
近年来,使用物联网设备的大规模网络攻击有所增加。处理这个问题的策略之一是使用渗透测试技术。本研究的目的是为使用GSM技术的物联网M2M节点开发漏洞评估。设计了一个测试场景,包括在多小区配置中使用USRP N210和OpenBTS无线电创建的GMS网络。基于sim8001无线电模块设计了一个IoT-GSM节点,用于多个M2M设备。物联网节点存储构成GSM网络的无线电基站操作参数的测量值。使用OpenBTS API设计了一种控制攻击基础无线电的算法,该算法允许部署“中间人”攻击。整个测试部署可以远程执行。对获得的测量结果进行分析,可以让我们详细了解攻击行为,并确定IoT-GSM节点的脆弱性。获得的结果表明,SDR和OpenBTS技术作为渗透测试工具分析物联网系统漏洞的潜力。
{"title":"Vulnerability Assessment for IoT Nodes Using OpenBTS and Software Defined Radios","authors":"José de Jesús Rugeles Uribe, E. Guillén","doi":"10.1109/ICSPIS51252.2020.9340151","DOIUrl":"https://doi.org/10.1109/ICSPIS51252.2020.9340151","url":null,"abstract":"Large-scale cyber attacks using IoT devices have increased in recent years. One of the strategies to deal with this problem is the use of penetration test techniques. The aim of this study was to develop a vulnerability assessment for an IoT M2M node that uses GSM technology. A test scenario was designed consisting of a GMS network created using USRP N210 and OpenBTS radios in a multicell configuration. An IoT-GSM node was designed from a sim8001 radio module, used in several M2M devices. The IoT node stores the measurements of the radio bases operational parameters that make up the GSM network. An algorithm for controlling an attacking base radio was designed using the OpenBTS API, which allows the deployment of a “man in the middle” attack. The entire test deployment can be carried out remotely. Analysis of the results of the measurements obtained lets us understand the attack's behavior in detail and determine the IoT-GSM node's vulnerability. The results obtained show the potential of SDR and OpenBTS technology as penetration test tools to analyze vulnerabilities of IoT systems.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130066574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Discrete-Time Model of Fractional-Order PLL 分数阶锁相环的一种新的离散时间模型
Pub Date : 2020-11-25 DOI: 10.1109/icspis51252.2020.9340137
R. El-Khazali, S. Momani, I. Batiha
this work presents a new discrete-time fractional-order phase-locked loop (DTFoPLL). The new model is developed by introducing a 1st-order z-transfer function that approximates a dynamic fractional-order discrete-time integrator that depends on its fractional order. Such structure is used to realize both the discrete-time fractional-order filter (DTFoF) and a fractional-order digital controlled-oscillator (FoDCO) of the PLL. The flexibility of the design follows from choosing low-order PLLs (between $boldsymbol{0.1leqalphaleq 0.2)}$ that provides wider bandwidth and requires lower gains than its integer-order counter parts. The main points of this work are illustrated via numerical simulation.
提出了一种新的离散分数阶锁相环(DTFoPLL)。新模型是通过引入一阶z传递函数开发的,该函数近似于依赖于分数阶的动态分数阶离散时间积分器。该结构用于实现锁相环的离散分数阶滤波器(dtof)和分数阶数字控制振荡器(FoDCO)。设计的灵活性来自于选择低阶锁相环(在$boldsymbol{0.1leqalphaleq 0.2)}$之间),它提供更宽的带宽,并且需要比其整数阶计数器部件更低的增益。通过数值模拟说明了本文工作的要点。
{"title":"A New Discrete-Time Model of Fractional-Order PLL","authors":"R. El-Khazali, S. Momani, I. Batiha","doi":"10.1109/icspis51252.2020.9340137","DOIUrl":"https://doi.org/10.1109/icspis51252.2020.9340137","url":null,"abstract":"this work presents a new discrete-time fractional-order phase-locked loop (DTFoPLL). The new model is developed by introducing a 1st-order z-transfer function that approximates a dynamic fractional-order discrete-time integrator that depends on its fractional order. Such structure is used to realize both the discrete-time fractional-order filter (DTFoF) and a fractional-order digital controlled-oscillator (FoDCO) of the PLL. The flexibility of the design follows from choosing low-order PLLs (between $boldsymbol{0.1leqalphaleq 0.2)}$ that provides wider bandwidth and requires lower gains than its integer-order counter parts. The main points of this work are illustrated via numerical simulation.","PeriodicalId":373750,"journal":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","volume":"482 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1