首页 > 最新文献

Scalable Computing-Practice and Experience最新文献

英文 中文
Fine-grained Reconstruction of Vehicle Trajectories Based on Electronic Registration Identification Data 基于电子登记识别数据的车辆轨迹细粒度重构
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00065
Xin Chen, Linjiang Zheng, Wengang Li, Longquan Liao, Qixing Wang, Xingze Yang
Electronic registration identification technology (ERI) has developed rapidly in recent years. This technology has been widely used in large urban transportation monitoring, vehicle counting, identification, and traffic congestion detection. It has many advantages, such as long recognition distance, high recognition accuracy, more information stored, fast reading speed, etc. Currently this technology has achieved full coverage of the entire road network and vehicles in the cities where it is applied. Despite the richness of this data, there are significant limitations in terms of vehicle trajectories, especially in terms of spatial and temporal density. Compared with ERI trajectories, vehicle GPS trajectories have a higher sampling rate, but we are unable to obtain more comprehensive and complete vehicle GPS data due to the limitations of vehicle technology and security factors. In this paper, we innovatively propose a new method to reconstruct fine-grained ERI trajectories by learning from taxi GPS data. This approach can be divided into two steps. First, a novel Taxi-ERI traffic network is proposed to connect ERI data and taxi data. It’s a directed multi-graph whose nodes are consisted of all ERI acquisition points and edges are composed of clustered taxi trajectories. Then, the probability of each road is calculated by a Bayes classification based on the multi-road travel time distribution model while there are multi roads between two adjacent acquisition points, the model parameters are trained by the expectation maximization (EM) algorithm. Finally, we extensively evaluate the proposed framework on the taxi trajectory dataset and ERI data collected from Chongqing, China. The experimental results show that the method can accurately reconstruct vehicle trajectories.
电子注册识别技术(ERI)近年来发展迅速。该技术已广泛应用于大型城市交通监控、车辆计数、识别、交通拥堵检测等领域。它具有识别距离远、识别精度高、存储信息多、读取速度快等优点。目前该技术已经实现了应用城市整个路网和车辆的全覆盖。尽管这些数据丰富,但在车辆轨迹方面,特别是在空间和时间密度方面,存在显著的局限性。与ERI轨迹相比,车载GPS轨迹具有更高的采样率,但由于车辆技术和安全因素的限制,我们无法获得更全面、完整的车载GPS数据。本文创新性地提出了一种利用出租车GPS数据重构细粒度ERI轨迹的新方法。这种方法可以分为两个步骤。首先,提出了一种新的出租车-ERI交通网络,将ERI数据与出租车数据连接起来。它是一个有向多图,其节点由所有ERI采集点组成,边缘由聚类出租车轨迹组成。然后,基于多路旅行时间分布模型,通过贝叶斯分类计算每条道路的概率,而相邻两个采集点之间存在多路,通过期望最大化(EM)算法训练模型参数;最后,我们在中国重庆收集的出租车轨迹数据集和ERI数据上广泛评估了所提出的框架。实验结果表明,该方法可以准确地重建车辆轨迹。
{"title":"Fine-grained Reconstruction of Vehicle Trajectories Based on Electronic Registration Identification Data","authors":"Xin Chen, Linjiang Zheng, Wengang Li, Longquan Liao, Qixing Wang, Xingze Yang","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00065","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00065","url":null,"abstract":"Electronic registration identification technology (ERI) has developed rapidly in recent years. This technology has been widely used in large urban transportation monitoring, vehicle counting, identification, and traffic congestion detection. It has many advantages, such as long recognition distance, high recognition accuracy, more information stored, fast reading speed, etc. Currently this technology has achieved full coverage of the entire road network and vehicles in the cities where it is applied. Despite the richness of this data, there are significant limitations in terms of vehicle trajectories, especially in terms of spatial and temporal density. Compared with ERI trajectories, vehicle GPS trajectories have a higher sampling rate, but we are unable to obtain more comprehensive and complete vehicle GPS data due to the limitations of vehicle technology and security factors. In this paper, we innovatively propose a new method to reconstruct fine-grained ERI trajectories by learning from taxi GPS data. This approach can be divided into two steps. First, a novel Taxi-ERI traffic network is proposed to connect ERI data and taxi data. It’s a directed multi-graph whose nodes are consisted of all ERI acquisition points and edges are composed of clustered taxi trajectories. Then, the probability of each road is calculated by a Bayes classification based on the multi-road travel time distribution model while there are multi roads between two adjacent acquisition points, the model parameters are trained by the expectation maximization (EM) algorithm. Finally, we extensively evaluate the proposed framework on the taxi trajectory dataset and ERI data collected from Chongqing, China. The experimental results show that the method can accurately reconstruct vehicle trajectories.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80500193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Implicit Relations Among Image Channels for Few-Shot Semantic Segmentation 基于少镜头语义分割的图像通道隐式关系挖掘
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00062
Xu Yuan, Ying Yang, Huafei Huang, Shuo Yu, Lili Cong
The goal of few-shot semantic segmentation (FSS) is to segment the foreground image of an unseen class in the query image by using a few labeled support images. Existing two-branch models mine support and query image information to improve segmentation results by employing support prototypes, calculating the similarity between support and query images, or fusing multi-scale features. Such methods only focus on the spatial information of the query image in the initial feature extraction and subsequent processes. Meanwhile, limited by the sample size, their ability to extract channel information is insufficient, thus leading to the information loss of the query image. To solve the issues, we propose an implicit channel relation based few-shot semantic segmentation method entitled MANGO. The implicit relation mining process is implemented after the initial feature extraction and before the two branches interact to fully mine the query image information. Specifically, the query channel features are taken as nodes to construct the graph structure to establish the relationship between nodes. The network motif is used to quantity the attribute features and structural features of nodes to enhance the relationship between channels. Finally, we aggregate the two features and mine the implicit relationship of nodes through graph representation learning. Experiments on PASCAL-5i and FSS-1000 datasets demonstrate that our proposed method outperforms the state-of-the-art methods.
少镜头语义分割(FSS)的目标是使用少量标记的支持图像来分割查询图像中未见类的前景图像。现有的双分支模型通过挖掘支持和查询图像信息,利用支持原型、计算支持和查询图像之间的相似度或融合多尺度特征来改善分割结果。这些方法在初始特征提取和后续处理中只关注查询图像的空间信息。同时,受样本量的限制,它们提取通道信息的能力不足,从而导致查询图像的信息丢失。为了解决这一问题,我们提出了一种基于隐式通道关系的少镜头语义分割方法MANGO。隐式关系挖掘过程在初始特征提取之后,在两个分支交互之前实现,充分挖掘查询图像信息。具体而言,将查询通道特征作为节点来构造图结构,建立节点之间的关系。利用网络基序对节点的属性特征和结构特征进行量化,增强通道之间的关系。最后,我们将两个特征聚合,并通过图表示学习挖掘节点之间的隐式关系。在PASCAL-5i和FSS-1000数据集上的实验表明,我们提出的方法优于最先进的方法。
{"title":"Mining Implicit Relations Among Image Channels for Few-Shot Semantic Segmentation","authors":"Xu Yuan, Ying Yang, Huafei Huang, Shuo Yu, Lili Cong","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00062","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00062","url":null,"abstract":"The goal of few-shot semantic segmentation (FSS) is to segment the foreground image of an unseen class in the query image by using a few labeled support images. Existing two-branch models mine support and query image information to improve segmentation results by employing support prototypes, calculating the similarity between support and query images, or fusing multi-scale features. Such methods only focus on the spatial information of the query image in the initial feature extraction and subsequent processes. Meanwhile, limited by the sample size, their ability to extract channel information is insufficient, thus leading to the information loss of the query image. To solve the issues, we propose an implicit channel relation based few-shot semantic segmentation method entitled MANGO. The implicit relation mining process is implemented after the initial feature extraction and before the two branches interact to fully mine the query image information. Specifically, the query channel features are taken as nodes to construct the graph structure to establish the relationship between nodes. The network motif is used to quantity the attribute features and structural features of nodes to enhance the relationship between channels. Finally, we aggregate the two features and mine the implicit relationship of nodes through graph representation learning. Experiments on PASCAL-5i and FSS-1000 datasets demonstrate that our proposed method outperforms the state-of-the-art methods.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79406077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Digital Twin for Vehicular Edge Computing Networks 车辆边缘计算网络的隐私保护数字孪生
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00318
Yi Yang, Wenqiang Ma, Wenqiao Sun, Haibin Zhang t, Zhiqiang Liu, Lexi Xu, Ye Zhu
As an emerging technology, digital twin (DT) has great potential to address the challenges posed by the dynamics and complexity of vehicles in vehicular edge computing (VEC) networks. By mapping the VEC network to the virtual space, DT can monitor vehicles, road side units (RSUs), channels, and resource usage in real time, further bringing comprehensive and accurate network analysis to the VEC network. However, the real-world implement of DT-empowered VEC networks cannot avoid the collection of privacy-sensitive information of participants. An incentive mechanism is necessitated to identify the qualities of participants without prior information and incent them to participate in DT modeling, so as to realize the requirement of privacy preserving while improving the DT modeling efficiency. In this paper, We propose a combined multi-armed bandit-based auction (CMABA) incentive mechanism that can identify the quality of clients in the VEC network without revealing sensitive and private information, and achieve the optimal performance of the model under budget constraints. The simulation results show that this scheme can significantly incent high-quality clients to participate in DT modeling under the requirement of privacy preserving and the constraint of limited budget, and improve the accuracy of DT modeling.
作为一项新兴技术,数字孪生(DT)在解决车辆边缘计算(VEC)网络中车辆动态和复杂性带来的挑战方面具有巨大潜力。通过将VEC网络映射到虚拟空间,DT可以实时监控车辆、路侧单元(rsu)、通道和资源使用情况,进一步为VEC网络带来全面、准确的网络分析。然而,在现实世界中,基于dt的VEC网络无法避免对参与者隐私敏感信息的收集。需要一种激励机制来识别没有先验信息的参与者的素质,激励他们参与DT建模,从而在提高DT建模效率的同时实现隐私保护的要求。在本文中,我们提出了一种联合多臂强盗拍卖(CMABA)激励机制,该机制可以在不泄露敏感和私有信息的情况下识别VEC网络中的客户质量,并在预算约束下实现模型的最优性能。仿真结果表明,该方案在隐私保护要求和有限预算约束下,能显著激励优质客户参与DT建模,提高了DT建模的精度。
{"title":"Privacy-Preserving Digital Twin for Vehicular Edge Computing Networks","authors":"Yi Yang, Wenqiang Ma, Wenqiao Sun, Haibin Zhang t, Zhiqiang Liu, Lexi Xu, Ye Zhu","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00318","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00318","url":null,"abstract":"As an emerging technology, digital twin (DT) has great potential to address the challenges posed by the dynamics and complexity of vehicles in vehicular edge computing (VEC) networks. By mapping the VEC network to the virtual space, DT can monitor vehicles, road side units (RSUs), channels, and resource usage in real time, further bringing comprehensive and accurate network analysis to the VEC network. However, the real-world implement of DT-empowered VEC networks cannot avoid the collection of privacy-sensitive information of participants. An incentive mechanism is necessitated to identify the qualities of participants without prior information and incent them to participate in DT modeling, so as to realize the requirement of privacy preserving while improving the DT modeling efficiency. In this paper, We propose a combined multi-armed bandit-based auction (CMABA) incentive mechanism that can identify the quality of clients in the VEC network without revealing sensitive and private information, and achieve the optimal performance of the model under budget constraints. The simulation results show that this scheme can significantly incent high-quality clients to participate in DT modeling under the requirement of privacy preserving and the constraint of limited budget, and improve the accuracy of DT modeling.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84964705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PABAU: Privacy Analysis of Biometric API Usage 生物识别API使用的隐私分析
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00327
Feiyang Tang
Biometric data privacy is becoming a major concern for many organizations in the age of big data, particularly in the ICT sector, because it may be easily exploited in apps. Most apps utilize biometrics by accessing common application programming interfaces (APIs); hence, we aim to categorize their usage. The categorization based on behavior may be closely correlated with the sensitive processing of a user’s biometric data, hence highlighting crucial biometric data privacy assessment concerns. We propose PABAU, Privacy Analysis of Biometric API Usage. PABAU learns semantic features of methods in biometric APIs and uses them to detect and categorize the usage of biometric API implementation in the software according to their privacy-related behaviors. This technique bridges the communication and background knowledge gap between technical and non-technical individuals in organizations by providing an automated method for both parties to acquire a rapid understanding of the essential behaviors of biometric API in apps, as well as future support to data protection officers (DPO) with legal documentation, such as conducting a Data Protection Impact Assessment (DPIA).
在大数据时代,生物识别数据隐私正成为许多组织的主要关注点,尤其是在信息通信技术领域,因为它可能很容易被应用程序利用。大多数应用程序通过访问通用应用程序编程接口(api)来利用生物识别技术;因此,我们的目标是对它们的用法进行分类。基于行为的分类可能与用户生物特征数据的敏感处理密切相关,因此突出了关键的生物特征数据隐私评估问题。我们提出了PABAU,生物识别API使用的隐私分析。PABAU学习生物识别API中方法的语义特征,并根据其隐私相关行为对软件中生物识别API实现的使用情况进行检测和分类。这项技术通过为双方提供一种自动化的方法来快速了解应用程序中生物识别API的基本行为,以及为数据保护官(DPO)提供法律文件的未来支持,例如进行数据保护影响评估(DPIA),从而弥合了组织中技术人员和非技术人员之间的沟通和背景知识差距。
{"title":"PABAU: Privacy Analysis of Biometric API Usage","authors":"Feiyang Tang","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00327","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00327","url":null,"abstract":"Biometric data privacy is becoming a major concern for many organizations in the age of big data, particularly in the ICT sector, because it may be easily exploited in apps. Most apps utilize biometrics by accessing common application programming interfaces (APIs); hence, we aim to categorize their usage. The categorization based on behavior may be closely correlated with the sensitive processing of a user’s biometric data, hence highlighting crucial biometric data privacy assessment concerns. We propose PABAU, Privacy Analysis of Biometric API Usage. PABAU learns semantic features of methods in biometric APIs and uses them to detect and categorize the usage of biometric API implementation in the software according to their privacy-related behaviors. This technique bridges the communication and background knowledge gap between technical and non-technical individuals in organizations by providing an automated method for both parties to acquire a rapid understanding of the essential behaviors of biometric API in apps, as well as future support to data protection officers (DPO) with legal documentation, such as conducting a Data Protection Impact Assessment (DPIA).","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85011289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme Metaverse-AKA:一个轻量级且保护隐私的无缝跨metaverse认证和密钥协议方案
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00340
Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, J. Misic, V. Mišić
The recent advances of emerging technologies including artificial intelligence, 5G, 6G, extended reality and blockchain promote the rapid development of next-generation Internet. As an evolving paradigm of next-generation Internet, metaverse, a fully immersive, hyper spatiotemporal and selfsustaining virtual shared space, is moving from imagination to the coming reality. However, its massive data flow, pervasive user profiling activities and other intrinsic features can lead to a lot of security and privacy concerns, which will hinder its further deployment. Specially, since the identities of users/avatars in the metaverse can be illegally stolen, impersonated, and interoperability issues can be encountered in authentication across metaverses, this paper designs a lightweight and privacy-preserving seamless cross-metaverse authentication and key agreement scheme named MetaverseAKA to meet the challenges. Metaverse-AKA can not only realize the seamless cross-metaverse authentication but also assure the users’ privacy by achieving the anonymity and unlinkability. In addition, Metaverse-AKA also has the following advantages: (i) Realizing the traceability for users in physical world. (ii) Resistance to multiple attacks like impersonation attack, man-in-the-middle attack and replay attack. (iii) Adopting lightweight cryptographic prinitives and having better performance through experiment verification and comparison.
近年来,人工智能、5G、6G、扩展现实、区块链等新兴技术的发展推动了下一代互联网的快速发展。作为下一代互联网不断发展的范式,虚拟世界作为一个完全沉浸式、超时空和自我维持的虚拟共享空间,正从想象走向现实。然而,其庞大的数据流、普遍的用户分析活动和其他固有特性可能导致许多安全和隐私问题,这将阻碍其进一步部署。特别针对元空间中用户/头像的身份可能被非法窃取、冒充以及跨元空间身份验证存在互操作性问题等问题,本文设计了一种轻量级、隐私保护的无缝跨元空间身份验证和密钥协议方案MetaverseAKA来应对这些挑战。Metaverse-AKA不仅可以实现无缝的跨metaverse认证,还可以通过匿名性和不可链接性来保证用户的隐私。此外,Metaverse-AKA还具有以下优势:(i)实现了用户在物理世界中的可追溯性。(ii)抵抗多种攻击,如冒充攻击、中间人攻击和重放攻击。(iii)采用轻量级的密码原语,通过实验验证和比较,具有更好的性能。
{"title":"Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme","authors":"Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, J. Misic, V. Mišić","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00340","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00340","url":null,"abstract":"The recent advances of emerging technologies including artificial intelligence, 5G, 6G, extended reality and blockchain promote the rapid development of next-generation Internet. As an evolving paradigm of next-generation Internet, metaverse, a fully immersive, hyper spatiotemporal and selfsustaining virtual shared space, is moving from imagination to the coming reality. However, its massive data flow, pervasive user profiling activities and other intrinsic features can lead to a lot of security and privacy concerns, which will hinder its further deployment. Specially, since the identities of users/avatars in the metaverse can be illegally stolen, impersonated, and interoperability issues can be encountered in authentication across metaverses, this paper designs a lightweight and privacy-preserving seamless cross-metaverse authentication and key agreement scheme named MetaverseAKA to meet the challenges. Metaverse-AKA can not only realize the seamless cross-metaverse authentication but also assure the users’ privacy by achieving the anonymity and unlinkability. In addition, Metaverse-AKA also has the following advantages: (i) Realizing the traceability for users in physical world. (ii) Resistance to multiple attacks like impersonation attack, man-in-the-middle attack and replay attack. (iii) Adopting lightweight cryptographic prinitives and having better performance through experiment verification and comparison.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85092428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatio-temporal Feature Based Multi-participant Recruitment in Heterogeneous Crowdsensing 基于时空特征的异构众感知多参与者招募
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00048
Fengyuan Zhang, Zhiwen Yu, Yimeng Liu, Helei Cui, Bin Guo
Mobile crowdsensing (MCS) collects sensing data by recruiting task participants to realize large-scale sensing tasks in cities. However, due to the limitations of human activity range and sensing mode, relying only on human participants to achieve this process will lead to sensing blind areas, ultimately affecting the integrity and validity of sensing data. With the rise of unmanned vehicles (UVs) and sensor-assisted MCS research, it provides new inspirations for solving complex sensing tasks in smart cities. In this article, we propose heterogeneous crowdsensing, which includes heterogeneous participants such as human participants, UVs, and fixed sensors. Our goal is to accomplish large-scale, high-quality urban sensing tasks by collaborating with these three types of heterogeneous participants. To solve the collaborative sensing problem, we propose an algorithm called spatio-temporal PPO (STPPO). We first define the capability and cost attributes of the heterogeneous participants and then divide the large-scale sensing area into a set of subregions by a subgraph construction method. Based on the spatio-temporal characteristics of the subregions and the attributes of the heterogeneous participants, we finally solve the cooperative scheduling problem of the subregions using proximal policy optimization (PPO) algorithms to maximize the overall POI collection rate and collection fairness. Finally, extensive experiments are conducted based on real datasets. The overall results of STPPO outperform other baselines, with a 30.19% performance improvement compared to the PPO algorithm.
移动众测(Mobile crowdsensing, MCS)通过招募任务参与者收集传感数据,实现城市大规模的传感任务。然而,由于人类活动范围和传感方式的限制,仅依靠人类参与者来实现这一过程将导致传感盲区,最终影响传感数据的完整性和有效性。随着无人驾驶车辆(UVs)和传感器辅助MCS研究的兴起,它为解决智慧城市中复杂的传感任务提供了新的灵感。在本文中,我们提出了异质众感,包括异质参与者,如人类参与者、uv和固定传感器。我们的目标是通过与这三种类型的异构参与者合作来完成大规模、高质量的城市传感任务。为了解决协同感知问题,我们提出了一种时空PPO (spatial -temporal PPO)算法。首先定义异构参与者的能力和成本属性,然后采用子图构建方法将大尺度感知区域划分为一组子区域。基于子区域的时空特征和异构参与者的属性,采用近似策略优化(PPO)算法解决子区域的协同调度问题,以最大化整体POI收集率和收集公平性。最后,基于实际数据集进行了大量实验。STPPO的总体结果优于其他基准,与PPO算法相比,性能提高了30.19%。
{"title":"Spatio-temporal Feature Based Multi-participant Recruitment in Heterogeneous Crowdsensing","authors":"Fengyuan Zhang, Zhiwen Yu, Yimeng Liu, Helei Cui, Bin Guo","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00048","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00048","url":null,"abstract":"Mobile crowdsensing (MCS) collects sensing data by recruiting task participants to realize large-scale sensing tasks in cities. However, due to the limitations of human activity range and sensing mode, relying only on human participants to achieve this process will lead to sensing blind areas, ultimately affecting the integrity and validity of sensing data. With the rise of unmanned vehicles (UVs) and sensor-assisted MCS research, it provides new inspirations for solving complex sensing tasks in smart cities. In this article, we propose heterogeneous crowdsensing, which includes heterogeneous participants such as human participants, UVs, and fixed sensors. Our goal is to accomplish large-scale, high-quality urban sensing tasks by collaborating with these three types of heterogeneous participants. To solve the collaborative sensing problem, we propose an algorithm called spatio-temporal PPO (STPPO). We first define the capability and cost attributes of the heterogeneous participants and then divide the large-scale sensing area into a set of subregions by a subgraph construction method. Based on the spatio-temporal characteristics of the subregions and the attributes of the heterogeneous participants, we finally solve the cooperative scheduling problem of the subregions using proximal policy optimization (PPO) algorithms to maximize the overall POI collection rate and collection fairness. Finally, extensive experiments are conducted based on real datasets. The overall results of STPPO outperform other baselines, with a 30.19% performance improvement compared to the PPO algorithm.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85235727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Perturbation Consistency to Improve Multi-hop Knowledge Base Question Answering 利用扰动一致性改进多跳知识库问答
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00196
Xin Wang, Hongbin Shi
Multi-hop knowledge base question answering aims to answer natural language questions through multi-hop relation reasoning in the knowledge base. An important challenge of the task is the lack of labels for reasoning paths, which leads to the possibility to produce correct answers through incorrect paths in the training, and cannot generalize well in testing. Recently research has attempted to handle the challenge by devising reward shaping or introducing additional information to generate supervision signals of intermediate paths. But they required extra expert experience and label information. To address this situation, we propose a novel method under the teacher-student framework, it leverages perturbation consistency to learn intermediate paths. In the teacher network, we construct close data points for intermediate path prediction by applying random perturbations. Inspired by the data smoothing assumption that labels of close data points should be the same, a consistency loss over predictions of constructed data points and original ones is evaluated. The student network is used to answer questions more precisely by leveraging the intermediate distribution learned from the teacher network. Extensive experiments on two benchmark datasets are conducted, and the results have demonstrated the effectiveness of the proposed method.
多跳知识库问答旨在通过知识库中的多跳关系推理来回答自然语言问题。该任务的一个重要挑战是缺乏对推理路径的标签,这导致在训练中可能通过错误的路径产生正确的答案,而在测试中不能很好地泛化。最近的研究试图通过设计奖励塑造或引入额外的信息来产生中间路径的监督信号来应对这一挑战。但它们需要额外的专家经验和标签信息。为了解决这种情况,我们提出了一种新的方法,在师生框架下,它利用扰动一致性来学习中间路径。在教师网络中,我们通过应用随机扰动构造接近的数据点来进行中间路径预测。受数据平滑假设的启发,接近数据点的标签应该是相同的,对构建数据点和原始数据点的预测的一致性损失进行了评估。通过利用从教师网络中学到的中间分布,学生网络可以更精确地回答问题。在两个基准数据集上进行了大量的实验,结果证明了该方法的有效性。
{"title":"Leveraging Perturbation Consistency to Improve Multi-hop Knowledge Base Question Answering","authors":"Xin Wang, Hongbin Shi","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00196","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00196","url":null,"abstract":"Multi-hop knowledge base question answering aims to answer natural language questions through multi-hop relation reasoning in the knowledge base. An important challenge of the task is the lack of labels for reasoning paths, which leads to the possibility to produce correct answers through incorrect paths in the training, and cannot generalize well in testing. Recently research has attempted to handle the challenge by devising reward shaping or introducing additional information to generate supervision signals of intermediate paths. But they required extra expert experience and label information. To address this situation, we propose a novel method under the teacher-student framework, it leverages perturbation consistency to learn intermediate paths. In the teacher network, we construct close data points for intermediate path prediction by applying random perturbations. Inspired by the data smoothing assumption that labels of close data points should be the same, a consistency loss over predictions of constructed data points and original ones is evaluated. The student network is used to answer questions more precisely by leveraging the intermediate distribution learned from the teacher network. Extensive experiments on two benchmark datasets are conducted, and the results have demonstrated the effectiveness of the proposed method.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76773025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Term Similarity-aware Extensive and Intensive Reading For Multiple Choice Question Answering
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00179
Xue Li, Junjie Zhang, Junlong Ma
Multiple Choice Question Answering(MCQA) aims to automatically choose a correct answer from candidate options when given a passage and question. Existing approaches generally model attention mechanisms based on whole-passage information or manually tag key sentences for weakly supervised learning, which leads to the models focusing extensively on redundant information and costly manual annotation. In this paper, we consider evidence sentence extraction work in an unsupervised way to precisely pinpoint evidence sentences and minimize the impact of redundant information while avoiding costly manual annotations. Specifically, we propose a novel model called Term Similarity-aware Extensive and Intensive Reading(TS-EIR), which dynamically and automatically refines critical information by term similarity. In detail, it intelligently selects sentences more relevant to the question from the passage and deeply extracts features by enhanced graph convolutional neural network. We apply the proposed TS-EIR to a typical pre-trained language model, BERT, for encoding and evaluate it on the RACE and Dream benchmarks, which verify our model achieves substantial performance improvements over the current baseline.
MCQA (Multiple Choice Question answer)的目的是在给定一篇文章或一个问题时,从考生的选项中自动选择一个正确答案。对于弱监督学习,现有的方法通常基于全文信息或手动标记关键句子来建模注意机制,这导致模型广泛关注冗余信息和昂贵的手动注释。在本文中,我们考虑以一种无监督的方式提取证据句子,以精确地定位证据句子,并最小化冗余信息的影响,同时避免昂贵的人工注释。具体来说,我们提出了一个新的模型,称为术语相似度感知的泛读和精读(TS-EIR),该模型根据术语相似度动态自动地提炼关键信息。它从文章中智能地选择与问题更相关的句子,并通过增强的图卷积神经网络深度提取特征。我们将提出的TS-EIR应用到一个典型的预训练语言模型BERT上进行编码,并在RACE和Dream基准上对其进行评估,这验证了我们的模型在当前基线上实现了实质性的性能改进。
{"title":"Term Similarity-aware Extensive and Intensive Reading For Multiple Choice Question Answering","authors":"Xue Li, Junjie Zhang, Junlong Ma","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00179","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00179","url":null,"abstract":"Multiple Choice Question Answering(MCQA) aims to automatically choose a correct answer from candidate options when given a passage and question. Existing approaches generally model attention mechanisms based on whole-passage information or manually tag key sentences for weakly supervised learning, which leads to the models focusing extensively on redundant information and costly manual annotation. In this paper, we consider evidence sentence extraction work in an unsupervised way to precisely pinpoint evidence sentences and minimize the impact of redundant information while avoiding costly manual annotations. Specifically, we propose a novel model called Term Similarity-aware Extensive and Intensive Reading(TS-EIR), which dynamically and automatically refines critical information by term similarity. In detail, it intelligently selects sentences more relevant to the question from the passage and deeply extracts features by enhanced graph convolutional neural network. We apply the proposed TS-EIR to a typical pre-trained language model, BERT, for encoding and evaluate it on the RACE and Dream benchmarks, which verify our model achieves substantial performance improvements over the current baseline.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76895686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redesign Visual Transformer For Small Datasets 为小数据集重新设计可视化转换器
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00077
Jingjie Wang, Xiang Wei, Siyang Lu, Mingquan Wang, Xiaoyu Liu, Wei Lu
Nowadays, the self-attention mechanism has become a resound of visual feature extraction along with convolution. The transformer network composed of self-attention has developed rapidly and made remarkable achievements in visual tasks. The self-attention shows the potential to replace convolution as the primary method of visual feature extraction in ubiquitous intelligence. Nevertheless, the development of the Visual Transformer still suffer from the following problems: a) The self-attention mechanism has a low inductive bias, which leads to large data demand and a high training cost. b) The Transformer backbone network cannot adapt well to the low visual information density and performs unsatisfactorily under low resolution and small-scale datasets. To tackle the abovementioned two problems, this paper proposes a novel algorithm based on the mature Visual Transformer architecture, which is dedicated to exploring the performance potential of the Transformer network and its kernel self-attention mechanism on small-scale datasets. Specifically, we first propose a network architecture equipped with multi-coordination strategy to solve the self-attention degradation problem inherent in the existing Transformer architecture. Secondly, we introduce consistent regularization into the Transformer to make the self-attention mechanism acquire more reliable feature representation ability in the case of insufficient visual features. In the experiments, CSwin Transformer, the mainstream visual model, is selected to verify the effectiveness of the proposed method on the prevalent small datasets, and superior results are achieved. In particular, without pre-training, our accuracy on the CIFAR-100 dataset is improved by 1.24% compared to CSwin.
自注意机制与卷积一起成为当前视觉特征提取的一个热点。自关注组成的变压器网络发展迅速,在视觉任务方面取得了显著成就。自关注显示了取代卷积作为泛在智能中视觉特征提取的主要方法的潜力。然而,Visual Transformer的开发仍然存在以下问题:a)自注意机制的归纳偏置较低,导致数据需求量大,训练成本高。b) Transformer骨干网不能很好地适应低视觉信息密度,在低分辨率和小尺度数据集下表现不理想。为了解决上述两个问题,本文提出了一种基于成熟的Visual Transformer架构的新算法,该算法致力于探索Transformer网络在小规模数据集上的性能潜力及其内核自关注机制。具体而言,我们首先提出了一种配备多协调策略的网络体系结构,以解决现有Transformer体系结构固有的自关注退化问题。其次,在Transformer中引入一致性正则化,使自关注机制在视觉特征不足的情况下获得更可靠的特征表示能力;在实验中,选择主流视觉模型CSwin Transformer在流行的小数据集上验证了所提出方法的有效性,取得了较好的效果。特别是,在没有预训练的情况下,我们在CIFAR-100数据集上的准确率比CSwin提高了1.24%。
{"title":"Redesign Visual Transformer For Small Datasets","authors":"Jingjie Wang, Xiang Wei, Siyang Lu, Mingquan Wang, Xiaoyu Liu, Wei Lu","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00077","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00077","url":null,"abstract":"Nowadays, the self-attention mechanism has become a resound of visual feature extraction along with convolution. The transformer network composed of self-attention has developed rapidly and made remarkable achievements in visual tasks. The self-attention shows the potential to replace convolution as the primary method of visual feature extraction in ubiquitous intelligence. Nevertheless, the development of the Visual Transformer still suffer from the following problems: a) The self-attention mechanism has a low inductive bias, which leads to large data demand and a high training cost. b) The Transformer backbone network cannot adapt well to the low visual information density and performs unsatisfactorily under low resolution and small-scale datasets. To tackle the abovementioned two problems, this paper proposes a novel algorithm based on the mature Visual Transformer architecture, which is dedicated to exploring the performance potential of the Transformer network and its kernel self-attention mechanism on small-scale datasets. Specifically, we first propose a network architecture equipped with multi-coordination strategy to solve the self-attention degradation problem inherent in the existing Transformer architecture. Secondly, we introduce consistent regularization into the Transformer to make the self-attention mechanism acquire more reliable feature representation ability in the case of insufficient visual features. In the experiments, CSwin Transformer, the mainstream visual model, is selected to verify the effectiveness of the proposed method on the prevalent small datasets, and superior results are achieved. In particular, without pre-training, our accuracy on the CIFAR-100 dataset is improved by 1.24% compared to CSwin.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80934160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering All-chain Set with Direction and Graduality Characteristics over Streaming Time Series 流时间序列上具有方向性和渐进性特征的全链集的发现
IF 1.1 Q2 Computer Science Pub Date : 2022-12-01 DOI: 10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00240
Shaopeng Wang, Chunkai Feng
Since its introduction over five years ago, time series chain has become a fundamental tool for time series analytics, finding diverse uses in dozens of domains. Recent work has generalized the definition of time series chain, and introduced a novel definition of time series chain with directionality and graduality characteristics (TSC-DG) which can significantly enhance both robustness and usability of the original time series chain. However, previous studies on TSCDG process fixed-length time series. In this work, we focus on the issue of all-chain set with direction and graduality characteristics (all-TSCS-DG) mining over streaming time series for the first time, where all-TSCS-DG is the core of current TSCDG researches. We propose an improved Naive algorithm (IN) to solve this problem. Compared to the Naive, the IN guarantees the same space costs and results firstly, secondly is the IN takes two additional optimal strategies to further improve the time efficiency. The basic ideas of these two strategies are both incremental computing. The first one can make the IN update the IB structure at each time-tick incrementally, where the IB is an important data structure that is used to obtain the all-TSCS-DG. The second one makes the IN obtain mining results at current time-tick based on the ones at the last time-tick incrementally. Extensive experiments on real dataset demonstrate the efficiency and effectiveness of the IN.
自五年前推出以来,时间序列链已成为时间序列分析的基本工具,在数十个领域中找到了不同的用途。近年来对时间序列链的定义进行了推广,提出了一种具有方向性和渐进性特征的时间序列链的新定义(TSC-DG),可以显著提高原时间序列链的鲁棒性和可用性。然而,以往的研究对TSCDG处理定长时间序列。本文首次研究了流时间序列上具有方向性和渐进性特征的全链集(all-TSCS-DG)挖掘问题,其中all-TSCS-DG是当前TSCDG研究的核心。我们提出了一种改进的朴素算法(IN)来解决这个问题。与Naive相比,IN首先保证了相同的空间成本和结果,其次是IN额外采用了两种最优策略来进一步提高时间效率。这两种策略的基本思想都是增量计算。第一种方法可以使IN在每个时间点增量更新IB结构,其中IB是用于获取all-TSCS-DG的重要数据结构。第二种方法是基于上一个时间点的挖掘结果,逐步获得当前时间点的挖掘结果。在真实数据集上的大量实验证明了该方法的有效性。
{"title":"Discovering All-chain Set with Direction and Graduality Characteristics over Streaming Time Series","authors":"Shaopeng Wang, Chunkai Feng","doi":"10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00240","DOIUrl":"https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00240","url":null,"abstract":"Since its introduction over five years ago, time series chain has become a fundamental tool for time series analytics, finding diverse uses in dozens of domains. Recent work has generalized the definition of time series chain, and introduced a novel definition of time series chain with directionality and graduality characteristics (TSC-DG) which can significantly enhance both robustness and usability of the original time series chain. However, previous studies on TSCDG process fixed-length time series. In this work, we focus on the issue of all-chain set with direction and graduality characteristics (all-TSCS-DG) mining over streaming time series for the first time, where all-TSCS-DG is the core of current TSCDG researches. We propose an improved Naive algorithm (IN) to solve this problem. Compared to the Naive, the IN guarantees the same space costs and results firstly, secondly is the IN takes two additional optimal strategies to further improve the time efficiency. The basic ideas of these two strategies are both incremental computing. The first one can make the IN update the IB structure at each time-tick incrementally, where the IB is an important data structure that is used to obtain the all-TSCS-DG. The second one makes the IN obtain mining results at current time-tick based on the ones at the last time-tick incrementally. Extensive experiments on real dataset demonstrate the efficiency and effectiveness of the IN.","PeriodicalId":43791,"journal":{"name":"Scalable Computing-Practice and Experience","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79525821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Scalable Computing-Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1