首页 > 最新文献

Future Internet最新文献

英文 中文
Using Optimization Techniques in Grammatical Evolution 在语法进化中使用优化技术
IF 3.4 Q1 Computer Science Pub Date : 2024-05-16 DOI: 10.3390/fi16050172
Ioannis G. Tsoulos, Alexandros T. Tzallas, E. Karvounis
The Grammatical Evolution technique has been successfully applied to a wide range of problems in various scientific fields. However, in many cases, techniques that make use of Grammatical Evolution become trapped in local minima of the objective problem and fail to reach the optimal solution. One simple method to tackle such situations is the usage of hybrid techniques, where local minimization algorithms are used in conjunction with the main algorithm. However, Grammatical Evolution is an integer optimization problem and, as a consequence, techniques should be formulated that are applicable to it as well. In the current work, a modified version of the Simulated Annealing algorithm is used as a local optimization procedure in Grammatical Evolution. This approach was tested on the Constructed Neural Networks and a remarkable improvement of the experimental results was shown, both in classification data and in data fitting cases.
语法进化技术已成功应用于各个科学领域的大量问题。然而,在许多情况下,利用语法进化的技术会陷入目标问题的局部最小值,无法达到最优解。解决这种情况的一个简单方法是使用混合技术,即局部最小化算法与主算法结合使用。然而,语法进化论是一个整数优化问题,因此也应制定适用于它的技术。在目前的工作中,语法进化算法中使用了一种改进版的模拟退火算法作为局部优化程序。这种方法在构建神经网络上进行了测试,结果表明,无论是在分类数据还是在数据拟合情况下,实验结果都有显著改善。
{"title":"Using Optimization Techniques in Grammatical Evolution","authors":"Ioannis G. Tsoulos, Alexandros T. Tzallas, E. Karvounis","doi":"10.3390/fi16050172","DOIUrl":"https://doi.org/10.3390/fi16050172","url":null,"abstract":"The Grammatical Evolution technique has been successfully applied to a wide range of problems in various scientific fields. However, in many cases, techniques that make use of Grammatical Evolution become trapped in local minima of the objective problem and fail to reach the optimal solution. One simple method to tackle such situations is the usage of hybrid techniques, where local minimization algorithms are used in conjunction with the main algorithm. However, Grammatical Evolution is an integer optimization problem and, as a consequence, techniques should be formulated that are applicable to it as well. In the current work, a modified version of the Simulated Annealing algorithm is used as a local optimization procedure in Grammatical Evolution. This approach was tested on the Constructed Neural Networks and a remarkable improvement of the experimental results was shown, both in classification data and in data fitting cases.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indoor Infrastructure Maintenance Framework Using Networked Sensors, Robots, and Augmented Reality Human Interface 使用联网传感器、机器人和增强现实人机界面的室内基础设施维护框架
IF 3.4 Q1 Computer Science Pub Date : 2024-05-15 DOI: 10.3390/fi16050170
Alireza Fath, Nicholas Hanna, Yi Liu, Scott Tanch, Tian Xia, Dryver Huston
Sensing and cognition by homeowners and technicians for home maintenance are prime examples of human–building interaction. Damage, decay, and pest infestation present signals that humans interpret and then act upon to remedy and mitigate. The maintenance cognition process has direct effects on sustainability and economic vitality, as well as the health and well-being of building occupants. While home maintenance practices date back to antiquity, they readily submit to augmentation and improvement with modern technologies. This paper describes the use of networked smart technologies embedded with machine learning (ML) and presented in electronic formats to better inform homeowners and occupants about safety and maintenance issues, as well as recommend courses of remedial action. The demonstrated technologies include robotic sensing in confined areas, LiDAR scans of structural shape and deformation, moisture and gas sensing, water leak detection, network embedded ML, and augmented reality interfaces with multi-user teaming capabilities. The sensor information passes through a private local dynamic network to processors with neural network pattern recognition capabilities to abstract the information, which then feeds to humans through augmented reality and conventional smart device interfaces. This networked sensor system serves as a testbed and demonstrator for home maintenance technologies, for what can be termed Home Maintenance 4.0.
房主和房屋维护技术人员的感知和认知是人类与建筑互动的典型例子。损坏、腐烂和虫害都会发出信号,人类可以解读这些信号,然后采取行动进行补救和缓解。维护认知过程会直接影响可持续性和经济活力,以及建筑居住者的健康和福祉。尽管住宅维护实践可以追溯到古代,但它们很容易被现代技术所增强和改进。本文介绍了如何利用嵌入机器学习(ML)并以电子格式呈现的联网智能技术,更好地为房主和住户提供有关安全和维护问题的信息,并推荐补救措施。所展示的技术包括密闭区域的机器人传感、结构形状和变形的激光雷达扫描、湿度和气体传感、漏水检测、网络嵌入式 ML 以及具有多用户协同功能的增强现实界面。传感器信息通过专用本地动态网络传输到具有神经网络模式识别功能的处理器,以抽象出信息,然后通过增强现实和传统智能设备界面传输给人类。该网络传感器系统可作为家庭维护技术的试验平台和演示器,可称为家庭维护 4.0。
{"title":"Indoor Infrastructure Maintenance Framework Using Networked Sensors, Robots, and Augmented Reality Human Interface","authors":"Alireza Fath, Nicholas Hanna, Yi Liu, Scott Tanch, Tian Xia, Dryver Huston","doi":"10.3390/fi16050170","DOIUrl":"https://doi.org/10.3390/fi16050170","url":null,"abstract":"Sensing and cognition by homeowners and technicians for home maintenance are prime examples of human–building interaction. Damage, decay, and pest infestation present signals that humans interpret and then act upon to remedy and mitigate. The maintenance cognition process has direct effects on sustainability and economic vitality, as well as the health and well-being of building occupants. While home maintenance practices date back to antiquity, they readily submit to augmentation and improvement with modern technologies. This paper describes the use of networked smart technologies embedded with machine learning (ML) and presented in electronic formats to better inform homeowners and occupants about safety and maintenance issues, as well as recommend courses of remedial action. The demonstrated technologies include robotic sensing in confined areas, LiDAR scans of structural shape and deformation, moisture and gas sensing, water leak detection, network embedded ML, and augmented reality interfaces with multi-user teaming capabilities. The sensor information passes through a private local dynamic network to processors with neural network pattern recognition capabilities to abstract the information, which then feeds to humans through augmented reality and conventional smart device interfaces. This networked sensor system serves as a testbed and demonstrator for home maintenance technologies, for what can be termed Home Maintenance 4.0.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140974216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and Smart Contracts for Digital Copyright Protection 区块链和智能合约促进数字版权保护
IF 3.4 Q1 Computer Science Pub Date : 2024-05-14 DOI: 10.3390/fi16050169
Franco Frattolillo
In a global context characterized by a pressing need to find a solution to the problem of digital copyright protection, buyer-seller watermarking protocols based on asymmetric fingerprinting and adopting a “buyer-friendly” approach have proven effective in addressing such a problem. They can ensure high levels of usability and security. However, they usually resort to trusted third parties (TTPs) to guarantee the protection process, and this is often perceived as a relevant drawback since TTPs may cause conspiracy or collusion problems, besides the fact that they are generally considered as some sort of “big brother”. This paper presents a buyer-seller watermarking protocol that can achieve the right compromise between usability and security without employing a TTP. The protocol is built around previous experiences conducted in the field of protocols based on the buyer-friendly approach. Its peculiarity consists of exploiting smart contracts executed within a blockchain to implement preset and immutable rules that run automatically under specific conditions without control from some kind of central authority. The result is a simple, usable, and secure watermarking protocol able to do without TTPs.
在迫切需要找到解决数字版权保护问题的办法的全球背景下,基于非对称指纹识别和采用 "买方友好 "方法的买方-卖方水印协议已被证明能有效解决这一问题。它们可以确保高水平的可用性和安全性。然而,它们通常需要借助可信第三方(TTPs)来保证保护过程,这通常被认为是一个相关的缺点,因为 TTPs 除了通常被认为是某种 "老大哥 "之外,还可能导致共谋或串通问题。本文介绍了一种买方-卖方水印协议,它可以在不使用 TTP 的情况下实现可用性和安全性之间的适当折衷。该协议是根据先前在基于买方友好方法的协议领域中积累的经验而构建的。其特殊之处在于利用在区块链中执行的智能合约来实施预设和不可更改的规则,这些规则在特定条件下自动运行,不受某种中央机构的控制。因此,它是一种简单、可用且安全的水印协议,无需 TTP。
{"title":"Blockchain and Smart Contracts for Digital Copyright Protection","authors":"Franco Frattolillo","doi":"10.3390/fi16050169","DOIUrl":"https://doi.org/10.3390/fi16050169","url":null,"abstract":"In a global context characterized by a pressing need to find a solution to the problem of digital copyright protection, buyer-seller watermarking protocols based on asymmetric fingerprinting and adopting a “buyer-friendly” approach have proven effective in addressing such a problem. They can ensure high levels of usability and security. However, they usually resort to trusted third parties (TTPs) to guarantee the protection process, and this is often perceived as a relevant drawback since TTPs may cause conspiracy or collusion problems, besides the fact that they are generally considered as some sort of “big brother”. This paper presents a buyer-seller watermarking protocol that can achieve the right compromise between usability and security without employing a TTP. The protocol is built around previous experiences conducted in the field of protocols based on the buyer-friendly approach. Its peculiarity consists of exploiting smart contracts executed within a blockchain to implement preset and immutable rules that run automatically under specific conditions without control from some kind of central authority. The result is a simple, usable, and secure watermarking protocol able to do without TTPs.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140981530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection 评估针对 Windows PE 恶意软件检测的机器学习模型的现实对抗性攻击
IF 3.4 Q1 Computer Science Pub Date : 2024-05-12 DOI: 10.3390/fi16050168
Muhammad Imran, A. Appice, D. Malerba
During the last decade, the cybersecurity literature has conferred a high-level role to machine learning as a powerful security paradigm to recognise malicious software in modern anti-malware systems. However, a non-negligible limitation of machine learning methods used to train decision models is that adversarial attacks can easily fool them. Adversarial attacks are attack samples produced by carefully manipulating the samples at the test time to violate the model integrity by causing detection mistakes. In this paper, we analyse the performance of five realistic target-based adversarial attacks, namely Extend, Full DOS, Shift, FGSM padding + slack and GAMMA, against two machine learning models, namely MalConv and LGBM, learned to recognise Windows Portable Executable (PE) malware files. Specifically, MalConv is a Convolutional Neural Network (CNN) model learned from the raw bytes of Windows PE files. LGBM is a Gradient-Boosted Decision Tree model that is learned from features extracted through the static analysis of Windows PE files. Notably, the attack methods and machine learning models considered in this study are state-of-the-art methods broadly used in the machine learning literature for Windows PE malware detection tasks. In addition, we explore the effect of accounting for adversarial attacks on securing machine learning models through the adversarial training strategy. Therefore, the main contributions of this article are as follows: (1) We extend existing machine learning studies that commonly consider small datasets to explore the evasion ability of state-of-the-art Windows PE attack methods by increasing the size of the evaluation dataset. (2) To the best of our knowledge, we are the first to carry out an exploratory study to explain how the considered adversarial attack methods change Windows PE malware to fool an effective decision model. (3) We explore the performance of the adversarial training strategy as a means to secure effective decision models against adversarial Windows PE malware files generated with the considered attack methods. Hence, the study explains how GAMMA can actually be considered the most effective evasion method for the performed comparative analysis. On the other hand, the study shows that the adversarial training strategy can actually help in recognising adversarial PE malware generated with GAMMA by also explaining how it changes model decisions.
过去十年间,网络安全文献将机器学习作为一种强大的安全范式,在现代反恶意软件系统中识别恶意软件方面发挥了重要作用。然而,用于训练决策模型的机器学习方法有一个不可忽视的局限性,那就是对抗性攻击很容易骗过它们。所谓对抗性攻击,是指在测试时通过精心操纵样本来破坏模型的完整性,从而导致检测错误的攻击样本。在本文中,我们分析了五种现实的基于目标的对抗性攻击(即 Extend、Full DOS、Shift、FGSM padding + slack 和 GAMMA)在两种机器学习模型(即 MalConv 和 LGBM)面前的表现,这两种模型是为识别 Windows 可移植可执行文件(PE)恶意软件文件而学习的。具体来说,MalConv 是一个卷积神经网络(CNN)模型,从 Windows PE 文件的原始字节中学习。LGBM 是一种梯度提升决策树模型,是从 Windows PE 文件静态分析中提取的特征中学习的。值得注意的是,本研究中考虑的攻击方法和机器学习模型都是机器学习文献中广泛用于 Windows PE 恶意软件检测任务的最先进方法。此外,我们还探讨了通过对抗性训练策略考虑对抗性攻击对确保机器学习模型的影响。因此,本文的主要贡献如下:(1)我们扩展了现有的机器学习研究,这些研究通常考虑小数据集,通过增加评估数据集的规模来探索最先进的 Windows PE 攻击方法的规避能力。(2)据我们所知,我们首次开展了一项探索性研究,以解释所考虑的对抗性攻击方法如何改变 Windows PE 恶意软件,从而愚弄一个有效的决策模型。(3) 我们探索了对抗性训练策略的性能,以此来确保有效的决策模型能够对抗用所考虑的攻击方法生成的对抗性 Windows PE 恶意软件文件。因此,本研究解释了在所进行的比较分析中,GAMMA 如何被视为最有效的规避方法。另一方面,该研究通过解释如何改变模型决策,表明对抗性训练策略实际上有助于识别使用 GAMMA 生成的对抗性 PE 恶意软件。
{"title":"Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection","authors":"Muhammad Imran, A. Appice, D. Malerba","doi":"10.3390/fi16050168","DOIUrl":"https://doi.org/10.3390/fi16050168","url":null,"abstract":"During the last decade, the cybersecurity literature has conferred a high-level role to machine learning as a powerful security paradigm to recognise malicious software in modern anti-malware systems. However, a non-negligible limitation of machine learning methods used to train decision models is that adversarial attacks can easily fool them. Adversarial attacks are attack samples produced by carefully manipulating the samples at the test time to violate the model integrity by causing detection mistakes. In this paper, we analyse the performance of five realistic target-based adversarial attacks, namely Extend, Full DOS, Shift, FGSM padding + slack and GAMMA, against two machine learning models, namely MalConv and LGBM, learned to recognise Windows Portable Executable (PE) malware files. Specifically, MalConv is a Convolutional Neural Network (CNN) model learned from the raw bytes of Windows PE files. LGBM is a Gradient-Boosted Decision Tree model that is learned from features extracted through the static analysis of Windows PE files. Notably, the attack methods and machine learning models considered in this study are state-of-the-art methods broadly used in the machine learning literature for Windows PE malware detection tasks. In addition, we explore the effect of accounting for adversarial attacks on securing machine learning models through the adversarial training strategy. Therefore, the main contributions of this article are as follows: (1) We extend existing machine learning studies that commonly consider small datasets to explore the evasion ability of state-of-the-art Windows PE attack methods by increasing the size of the evaluation dataset. (2) To the best of our knowledge, we are the first to carry out an exploratory study to explain how the considered adversarial attack methods change Windows PE malware to fool an effective decision model. (3) We explore the performance of the adversarial training strategy as a means to secure effective decision models against adversarial Windows PE malware files generated with the considered attack methods. Hence, the study explains how GAMMA can actually be considered the most effective evasion method for the performed comparative analysis. On the other hand, the study shows that the adversarial training strategy can actually help in recognising adversarial PE malware generated with GAMMA by also explaining how it changes model decisions.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140986252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Semi-Automated Workflow for Systematic and Literature Review Processes with Large Language Model Analysis 通过大语言模型分析实现系统性和文献综述流程的混合半自动化工作流程
IF 3.4 Q1 Computer Science Pub Date : 2024-05-12 DOI: 10.3390/fi16050167
Anjia Ye, Ananda Maiti, Matthew Schmidt, Scott Pedersen
Systematic reviews (SRs) are a rigorous method for synthesizing empirical evidence to answer specific research questions. However, they are labor-intensive because of their collaborative nature, strict protocols, and typically large number of documents. Large language models (LLMs) and their applications such as gpt-4/ChatGPT have the potential to reduce the human workload of the SR process while maintaining accuracy. We propose a new hybrid methodology that combines the strengths of LLMs and humans using the ability of LLMs to summarize large bodies of text autonomously and extract key information. This is then used by a researcher to make inclusion/exclusion decisions quickly. This process replaces the typical manually performed title/abstract screening, full-text screening, and data extraction steps in an SR while keeping a human in the loop for quality control. We developed a semi-automated LLM-assisted (Gemini-Pro) workflow with a novel innovative prompt development strategy. This involves extracting three categories of information including identifier, verifier, and data field (IVD) from the formatted documents. We present a case study where our hybrid approach reduced errors compared with a human-only SR. The hybrid workflow improved the accuracy of the case study by identifying 6/390 (1.53%) articles that were misclassified by the human-only process. It also matched the human-only decisions completely regarding the rest of the 384 articles. Given the rapid advances in LLM technology, these results will undoubtedly improve over time.
系统综述(SR)是一种综合经验证据以回答特定研究问题的严谨方法。然而,由于其协作性质、严格的协议和典型的大量文件,系统综述是一种劳动密集型方法。大型语言模型(LLM)及其应用(如 gpt-4/ChatGPT)有可能在保持准确性的同时减少 SR 过程中的人工工作量。我们提出了一种新的混合方法,它结合了 LLM 和人类的优势,利用 LLM 自主总结大量文本并提取关键信息的能力。然后,研究人员利用这些信息快速做出收录/排除决定。这一流程取代了 SR 中通常由人工执行的标题/摘要筛选、全文筛选和数据提取步骤,同时保留了人工质量控制环节。我们开发了一种半自动化的 LLM 辅助(Gemini-Pro)工作流程,采用了新颖的创新提示开发策略。这涉及从格式化文档中提取三类信息,包括标识符、验证器和数据字段(IVD)。我们介绍了一个案例研究,与纯人工 SR 相比,我们的混合方法减少了错误。混合工作流程提高了案例研究的准确性,识别出 6/390 篇(1.53%)被纯人工流程错误分类的文章。此外,在其余 384 篇文章中,混合工作流程也与纯人工决策完全吻合。鉴于 LLM 技术的飞速发展,随着时间的推移,这些结果无疑会有所改进。
{"title":"A Hybrid Semi-Automated Workflow for Systematic and Literature Review Processes with Large Language Model Analysis","authors":"Anjia Ye, Ananda Maiti, Matthew Schmidt, Scott Pedersen","doi":"10.3390/fi16050167","DOIUrl":"https://doi.org/10.3390/fi16050167","url":null,"abstract":"Systematic reviews (SRs) are a rigorous method for synthesizing empirical evidence to answer specific research questions. However, they are labor-intensive because of their collaborative nature, strict protocols, and typically large number of documents. Large language models (LLMs) and their applications such as gpt-4/ChatGPT have the potential to reduce the human workload of the SR process while maintaining accuracy. We propose a new hybrid methodology that combines the strengths of LLMs and humans using the ability of LLMs to summarize large bodies of text autonomously and extract key information. This is then used by a researcher to make inclusion/exclusion decisions quickly. This process replaces the typical manually performed title/abstract screening, full-text screening, and data extraction steps in an SR while keeping a human in the loop for quality control. We developed a semi-automated LLM-assisted (Gemini-Pro) workflow with a novel innovative prompt development strategy. This involves extracting three categories of information including identifier, verifier, and data field (IVD) from the formatted documents. We present a case study where our hybrid approach reduced errors compared with a human-only SR. The hybrid workflow improved the accuracy of the case study by identifying 6/390 (1.53%) articles that were misclassified by the human-only process. It also matched the human-only decisions completely regarding the rest of the 384 articles. Given the rapid advances in LLM technology, these results will undoubtedly improve over time.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140987089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework pFedBASC:利用区块链辅助半中心化框架进行个性化联合学习
IF 3.4 Q1 Computer Science Pub Date : 2024-05-11 DOI: 10.3390/fi16050164
Yu Zhang, Xiaowei Peng, Hequn Xian
As network technology advances, there is an increasing need for a trusted new-generation information management system. Blockchain technology provides a decentralized, transparent, and tamper-proof foundation. Meanwhile, data islands have become a significant obstacle for machine learning applications. Although federated learning (FL) ensures data privacy protection, server-side security concerns persist. Traditional methods have employed a blockchain system in FL frameworks to maintain a tamper-proof global model database. In this context, we propose a novel personalized federated learning (pFL) with blockchain-assisted semi-centralized framework, pFedBASC. This approach, tailored for the Internet of Things (IoT) scenarios, constructs a semi-centralized IoT structure and utilizes trusted network connections to support FL. We concentrate on designing the aggregation process and FL algorithm, as well as the block structure. To address data heterogeneity and communication costs, we propose a pFL method called FedHype. In this method, each client is assigned a compact hypernetwork (HN) alongside a normal target network (TN) whose parameters are generated by the HN. Clients pull together other clients’ HNs for local aggregation to personalize their TNs, reducing communication costs. Furthermore, FedHype can be integrated with other existing algorithms, enhancing its functionality. Experimental results reveal that pFedBASC effectively tackles data heterogeneity issues while maintaining positive accuracy, communication efficiency, and robustness.
随着网络技术的发展,人们越来越需要可信的新一代信息管理系统。区块链技术提供了一个去中心化、透明和防篡改的基础。同时,数据孤岛已成为机器学习应用的一大障碍。虽然联合学习(FL)能确保数据隐私得到保护,但服务器端的安全问题依然存在。传统的方法是在联合学习框架中采用区块链系统来维护一个防篡改的全局模型数据库。在此背景下,我们提出了一种新颖的个性化联合学习(pFL)区块链辅助半集中式框架--pFedBASC。这种方法专为物联网(IoT)场景量身定制,构建了一个半中心化的物联网结构,并利用可信网络连接来支持联合学习。我们专注于设计聚合过程和 FL 算法,以及区块结构。为了解决数据异构和通信成本问题,我们提出了一种名为 FedHype 的 pFL 方法。在这种方法中,每个客户端都被分配了一个紧凑的超网络(HN)和一个正常的目标网络(TN),TN 的参数由 HN 生成。客户端将其他客户端的 HN 拉到一起进行本地聚合,以个性化其 TN,从而降低通信成本。此外,FedHype 还可与其他现有算法集成,从而增强其功能。实验结果表明,pFedBASC 能有效解决数据异构问题,同时保持积极的准确性、通信效率和稳健性。
{"title":"pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework","authors":"Yu Zhang, Xiaowei Peng, Hequn Xian","doi":"10.3390/fi16050164","DOIUrl":"https://doi.org/10.3390/fi16050164","url":null,"abstract":"As network technology advances, there is an increasing need for a trusted new-generation information management system. Blockchain technology provides a decentralized, transparent, and tamper-proof foundation. Meanwhile, data islands have become a significant obstacle for machine learning applications. Although federated learning (FL) ensures data privacy protection, server-side security concerns persist. Traditional methods have employed a blockchain system in FL frameworks to maintain a tamper-proof global model database. In this context, we propose a novel personalized federated learning (pFL) with blockchain-assisted semi-centralized framework, pFedBASC. This approach, tailored for the Internet of Things (IoT) scenarios, constructs a semi-centralized IoT structure and utilizes trusted network connections to support FL. We concentrate on designing the aggregation process and FL algorithm, as well as the block structure. To address data heterogeneity and communication costs, we propose a pFL method called FedHype. In this method, each client is assigned a compact hypernetwork (HN) alongside a normal target network (TN) whose parameters are generated by the HN. Clients pull together other clients’ HNs for local aggregation to personalize their TNs, reducing communication costs. Furthermore, FedHype can be integrated with other existing algorithms, enhancing its functionality. Experimental results reveal that pFedBASC effectively tackles data heterogeneity issues while maintaining positive accuracy, communication efficiency, and robustness.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140987414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments 面向元宇宙环境的区块链安全互操作认证方案
IF 3.4 Q1 Computer Science Pub Date : 2024-05-11 DOI: 10.3390/fi16050166
Sonali Patwe, Sunil B. Mane
The metaverse, which amalgamates physical and virtual realms for diverse social activities, has been the focus of extensive application development by organizations, research institutes, and companies. However, these applications are often isolated, employing distinct authentication methods across platforms. Achieving interoperable authentication is crucial for when avatars traverse different metaverses to mitigate security concerns like impersonation, mutual authentication, replay, and server spoofing. To address these issues, we propose a blockchain-enabled secure and interoperable authentication scheme. This mechanism uniquely identifies users in the physical world as well as avatars, facilitating seamless navigation across verses. Our proposal is substantiated through informal security analyses, employing automated verification of internet security protocols and applications (AVISPA), the real-or-random (ROR) model, and Burrows–Abadi–Needham (BAN) logic and showcasing effectiveness against a broad spectrum of security threats. Comparative assessments against similar schemes demonstrate our solution’s superiority in terms of communication costs, computation costs, and security features. Consequently, our blockchain-enabled, interoperable, and secure authentication scheme stands as a robust solution for ensuring security in metaverse environments.
元宇宙(metaverse)将物理和虚拟领域结合在一起,用于各种社会活动,一直是各组织、研究机构和公司广泛开发应用的重点。然而,这些应用往往是孤立的,在不同平台上采用不同的身份验证方法。当虚拟化身穿越不同的元世界时,实现可互操作的身份验证对于减轻冒充、相互验证、重放和服务器欺骗等安全问题至关重要。为了解决这些问题,我们提出了一种支持区块链的安全、可互操作的身份验证方案。这种机制可以唯一识别物理世界中的用户以及化身,从而促进跨版本的无缝导航。我们通过非正式的安全分析,采用互联网安全协议和应用自动验证(AVISPA)、真实或随机(ROR)模型和Burrows-Abadi-Needham(BAN)逻辑,证实了我们的建议,并展示了针对各种安全威胁的有效性。与类似方案的比较评估表明,我们的解决方案在通信成本、计算成本和安全功能方面都更胜一筹。因此,我们的区块链支持、可互操作和安全的认证方案是确保元宇宙环境安全的强大解决方案。
{"title":"Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments","authors":"Sonali Patwe, Sunil B. Mane","doi":"10.3390/fi16050166","DOIUrl":"https://doi.org/10.3390/fi16050166","url":null,"abstract":"The metaverse, which amalgamates physical and virtual realms for diverse social activities, has been the focus of extensive application development by organizations, research institutes, and companies. However, these applications are often isolated, employing distinct authentication methods across platforms. Achieving interoperable authentication is crucial for when avatars traverse different metaverses to mitigate security concerns like impersonation, mutual authentication, replay, and server spoofing. To address these issues, we propose a blockchain-enabled secure and interoperable authentication scheme. This mechanism uniquely identifies users in the physical world as well as avatars, facilitating seamless navigation across verses. Our proposal is substantiated through informal security analyses, employing automated verification of internet security protocols and applications (AVISPA), the real-or-random (ROR) model, and Burrows–Abadi–Needham (BAN) logic and showcasing effectiveness against a broad spectrum of security threats. Comparative assessments against similar schemes demonstrate our solution’s superiority in terms of communication costs, computation costs, and security features. Consequently, our blockchain-enabled, interoperable, and secure authentication scheme stands as a robust solution for ensuring security in metaverse environments.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140989030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable-Intelligent-Surface-Enhanced Dynamic Resource Allocation for the Social Internet of Electric Vehicle Charging Networks with Causal-Structure-Based Reinforcement Learning 利用基于因果结构的强化学习,为电动汽车充电网络的社交互联网提供可重构智能表面增强型动态资源配置
IF 3.4 Q1 Computer Science Pub Date : 2024-05-11 DOI: 10.3390/fi16050165
Yuzhu Zhang, Hao Xu
Charging stations and electric vehicle (EV) charging networks signify a significant advancement in technology as a frontier application of the Social Internet of Things (SIoT), presenting both challenges and opportunities for current 6G wireless networks. One primary challenge in this integration is limited wireless network resources, particularly when serving a large number of users within distributed EV charging networks in the SIoT. Factors such as congestion during EV travel, varying EV user preferences, and uncertainties in decision-making regarding charging station resources significantly impact system operation and network resource allocation. To address these challenges, this paper develops a novel framework harnessing the potential of emerging technologies, specifically reconfigurable intelligent surfaces (RISs) and causal-structure-enhanced asynchronous advantage actor–critic (A3C) reinforcement learning techniques. This framework aims to optimize resource allocation, thereby enhancing communication support within EV charging networks. Through the integration of RIS technology, which enables control over electromagnetic waves, and the application of causal reinforcement learning algorithms, the framework dynamically adjusts resource allocation strategies to accommodate evolving conditions in EV charging networks. An essential aspect of this framework is its ability to simultaneously meet real-world social requirements, such as ensuring efficient utilization of network resources. Numerical simulation results validate the effectiveness and adaptability of this approach in improving wireless network efficiency and enhancing user experience within the SIoT context. Through these simulations, it becomes evident that the developed framework offers promising solutions to the challenges posed by integrating the SIoT with EV charging networks.
充电站和电动汽车(EV)充电网络作为社会物联网(SIoT)的前沿应用,标志着技术的重大进步,为当前的 6G 无线网络带来了挑战和机遇。整合过程中的一个主要挑战是无线网络资源有限,尤其是在为 SIoT 分布式电动汽车充电网络中的大量用户提供服务时。电动汽车行驶过程中的拥堵、电动汽车用户的不同偏好以及充电站资源决策的不确定性等因素都会严重影响系统运行和网络资源的分配。为应对这些挑战,本文开发了一种新型框架,利用了新兴技术的潜力,特别是可重构智能表面(RIS)和因果结构增强型异步优势行为批评(A3C)强化学习技术。该框架旨在优化资源分配,从而增强电动汽车充电网络内的通信支持。通过整合可控制电磁波的 RIS 技术和因果强化学习算法的应用,该框架可动态调整资源分配策略,以适应电动汽车充电网络中不断变化的条件。该框架的一个重要方面是能够同时满足现实世界的社会需求,如确保网络资源的有效利用。数值模拟结果验证了这种方法在 SIoT 环境下提高无线网络效率和增强用户体验的有效性和适应性。通过这些模拟,我们可以明显看出,所开发的框架为解决 SIoT 与电动汽车充电网络整合所带来的挑战提供了前景广阔的解决方案。
{"title":"Reconfigurable-Intelligent-Surface-Enhanced Dynamic Resource Allocation for the Social Internet of Electric Vehicle Charging Networks with Causal-Structure-Based Reinforcement Learning","authors":"Yuzhu Zhang, Hao Xu","doi":"10.3390/fi16050165","DOIUrl":"https://doi.org/10.3390/fi16050165","url":null,"abstract":"Charging stations and electric vehicle (EV) charging networks signify a significant advancement in technology as a frontier application of the Social Internet of Things (SIoT), presenting both challenges and opportunities for current 6G wireless networks. One primary challenge in this integration is limited wireless network resources, particularly when serving a large number of users within distributed EV charging networks in the SIoT. Factors such as congestion during EV travel, varying EV user preferences, and uncertainties in decision-making regarding charging station resources significantly impact system operation and network resource allocation. To address these challenges, this paper develops a novel framework harnessing the potential of emerging technologies, specifically reconfigurable intelligent surfaces (RISs) and causal-structure-enhanced asynchronous advantage actor–critic (A3C) reinforcement learning techniques. This framework aims to optimize resource allocation, thereby enhancing communication support within EV charging networks. Through the integration of RIS technology, which enables control over electromagnetic waves, and the application of causal reinforcement learning algorithms, the framework dynamically adjusts resource allocation strategies to accommodate evolving conditions in EV charging networks. An essential aspect of this framework is its ability to simultaneously meet real-world social requirements, such as ensuring efficient utilization of network resources. Numerical simulation results validate the effectiveness and adaptability of this approach in improving wireless network efficiency and enhancing user experience within the SIoT context. Through these simulations, it becomes evident that the developed framework offers promising solutions to the challenges posed by integrating the SIoT with EV charging networks.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140987416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization 基于区块链的零信任供应链安全与用于库存优化的深度强化学习相结合
IF 3.4 Q1 Computer Science Pub Date : 2024-05-10 DOI: 10.3390/fi16050163
Zhe Ma, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Y. Wu, Mengjie Zhou
Modern supply chain systems face significant challenges, including lack of transparency, inefficient inventory management, and vulnerability to disruptions and security threats. Traditional optimization methods often struggle to adapt to the complex and dynamic nature of these systems. This paper presents a novel blockchain-based zero-trust supply chain security framework integrated with deep reinforcement learning (SAC-rainbow) to address these challenges. The SAC-rainbow framework leverages the Soft Actor–Critic (SAC) algorithm with prioritized experience replay for inventory optimization and a blockchain-based zero-trust mechanism for secure supply chain management. The SAC-rainbow algorithm learns adaptive policies under demand uncertainty, while the blockchain architecture ensures secure, transparent, and traceable record-keeping and automated execution of supply chain transactions. An experiment using real-world supply chain data demonstrated the superior performance of the proposed framework in terms of reward maximization, inventory stability, and security metrics. The SAC-rainbow framework offers a promising solution for addressing the challenges of modern supply chains by leveraging blockchain, deep reinforcement learning, and zero-trust security principles. This research paves the way for developing secure, transparent, and efficient supply chain management systems in the face of growing complexity and security risks.
现代供应链系统面临着巨大的挑战,包括缺乏透明度、库存管理效率低下以及容易受到干扰和安全威胁。传统的优化方法往往难以适应这些系统复杂多变的性质。本文介绍了一种新颖的基于区块链的零信任供应链安全框架,该框架与深度强化学习(SAC-rainbow)相结合,以应对这些挑战。SAC-rainbow 框架利用软行为批判(Soft Actor-Critic,SAC)算法和优先级经验重放来优化库存,并利用基于区块链的零信任机制来实现供应链安全管理。SAC-rainbow 算法可在需求不确定的情况下学习自适应策略,而区块链架构可确保安全、透明、可追溯的记录保存和供应链交易的自动执行。使用真实供应链数据进行的实验表明,所提出的框架在奖励最大化、库存稳定性和安全指标方面表现出色。SAC-rainbow 框架利用区块链、深度强化学习和零信任安全原则,为应对现代供应链的挑战提供了一个前景广阔的解决方案。面对日益增长的复杂性和安全风险,这项研究为开发安全、透明和高效的供应链管理系统铺平了道路。
{"title":"Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization","authors":"Zhe Ma, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Y. Wu, Mengjie Zhou","doi":"10.3390/fi16050163","DOIUrl":"https://doi.org/10.3390/fi16050163","url":null,"abstract":"Modern supply chain systems face significant challenges, including lack of transparency, inefficient inventory management, and vulnerability to disruptions and security threats. Traditional optimization methods often struggle to adapt to the complex and dynamic nature of these systems. This paper presents a novel blockchain-based zero-trust supply chain security framework integrated with deep reinforcement learning (SAC-rainbow) to address these challenges. The SAC-rainbow framework leverages the Soft Actor–Critic (SAC) algorithm with prioritized experience replay for inventory optimization and a blockchain-based zero-trust mechanism for secure supply chain management. The SAC-rainbow algorithm learns adaptive policies under demand uncertainty, while the blockchain architecture ensures secure, transparent, and traceable record-keeping and automated execution of supply chain transactions. An experiment using real-world supply chain data demonstrated the superior performance of the proposed framework in terms of reward maximization, inventory stability, and security metrics. The SAC-rainbow framework offers a promising solution for addressing the challenges of modern supply chains by leveraging blockchain, deep reinforcement learning, and zero-trust security principles. This research paves the way for developing secure, transparent, and efficient supply chain management systems in the face of growing complexity and security risks.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140993716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Empowered Multimodal Hierarchical Graph-Based Learning for Situation Awareness on Enhancing Disaster Responses 基于人工智能的多模态分层图谱学习,用于增强灾害响应的态势感知
IF 3.4 Q1 Computer Science Pub Date : 2024-05-07 DOI: 10.3390/fi16050161
Jieli Chen, K. Seng, L. Ang, Jeremy Smith, Hanyue Xu
Situational awareness (SA) is crucial in disaster response, enhancing the understanding of the environment. Social media, with its extensive user base, offers valuable real-time information for such scenarios. Although SA systems excel in extracting disaster-related details from user-generated content, a common limitation in prior approaches is their emphasis on single-modal extraction rather than embracing multi-modalities. This paper proposed a multimodal hierarchical graph-based situational awareness (MHGSA) system for comprehensive disaster event classification. Specifically, the proposed multimodal hierarchical graph contains nodes representing different disaster events and the features of the event nodes are extracted from the corresponding images and acoustic features. The proposed feature extraction modules with multi-branches for vision and audio features provide hierarchical node features for disaster events of different granularities, aiming to build a coarse-granularity classification task to constrain the model and enhance fine-granularity classification. The relationships between different disaster events in multi-modalities are learned by graph convolutional neural networks to enhance the system’s ability to recognize disaster events, thus enabling the system to fuse complex features of vision and audio. Experimental results illustrate the effectiveness of the proposed visual and audio feature extraction modules in single-modal scenarios. Furthermore, the MHGSA successfully fuses visual and audio features, yielding promising results in disaster event classification tasks.
态势感知(SA)在灾难响应中至关重要,它能增强对环境的了解。社交媒体拥有广泛的用户群,可为此类场景提供宝贵的实时信息。虽然态势感知系统能从用户生成的内容中提取与灾难相关的细节,但以往方法的一个共同局限是强调单一模式提取,而不是拥抱多模式。本文提出了一种基于分层图的多模态态势感知(MHGSA)系统,用于综合灾害事件分类。具体来说,所提出的多模态分层图包含代表不同灾害事件的节点,而事件节点的特征则从相应的图像和声学特征中提取。针对视觉和音频特征提出的多分支特征提取模块为不同粒度的灾难事件提供了分层节点特征,旨在建立粗粒度分类任务,以约束模型并增强细粒度分类。通过图卷积神经网络学习多模态中不同灾害事件之间的关系,增强系统识别灾害事件的能力,从而使系统能够融合视觉和音频的复杂特征。实验结果表明了所提出的视觉和音频特征提取模块在单模态场景中的有效性。此外,MHGSA 成功地融合了视觉和音频特征,在灾难事件分类任务中取得了可喜的成果。
{"title":"AI-Empowered Multimodal Hierarchical Graph-Based Learning for Situation Awareness on Enhancing Disaster Responses","authors":"Jieli Chen, K. Seng, L. Ang, Jeremy Smith, Hanyue Xu","doi":"10.3390/fi16050161","DOIUrl":"https://doi.org/10.3390/fi16050161","url":null,"abstract":"Situational awareness (SA) is crucial in disaster response, enhancing the understanding of the environment. Social media, with its extensive user base, offers valuable real-time information for such scenarios. Although SA systems excel in extracting disaster-related details from user-generated content, a common limitation in prior approaches is their emphasis on single-modal extraction rather than embracing multi-modalities. This paper proposed a multimodal hierarchical graph-based situational awareness (MHGSA) system for comprehensive disaster event classification. Specifically, the proposed multimodal hierarchical graph contains nodes representing different disaster events and the features of the event nodes are extracted from the corresponding images and acoustic features. The proposed feature extraction modules with multi-branches for vision and audio features provide hierarchical node features for disaster events of different granularities, aiming to build a coarse-granularity classification task to constrain the model and enhance fine-granularity classification. The relationships between different disaster events in multi-modalities are learned by graph convolutional neural networks to enhance the system’s ability to recognize disaster events, thus enabling the system to fuse complex features of vision and audio. Experimental results illustrate the effectiveness of the proposed visual and audio feature extraction modules in single-modal scenarios. Furthermore, the MHGSA successfully fuses visual and audio features, yielding promising results in disaster event classification tasks.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141002985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1