首页 > 最新文献

EURASIP Journal on Information Security最新文献

英文 中文
Synthetic speech detection through short-term and long-term prediction traces 合成语音检测通过短期和长期的预测痕迹
IF 3.6 Q1 Computer Science Pub Date : 2021-04-06 DOI: 10.1186/s13635-021-00116-3
Clara Borrelli, Paolo Bestagini, F. Antonacci, A. Sarti, S. Tubaro
{"title":"Synthetic speech detection through short-term and long-term prediction traces","authors":"Clara Borrelli, Paolo Bestagini, F. Antonacci, A. Sarti, S. Tubaro","doi":"10.1186/s13635-021-00116-3","DOIUrl":"https://doi.org/10.1186/s13635-021-00116-3","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2021-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-021-00116-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65684088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Network traffic classification model based on attention mechanism and spatiotemporal features 基于注意机制和时空特征的网络流量分类模型
IF 3.6 Q1 Computer Science Pub Date : 2021-04-01 DOI: 10.1186/s13635-023-00141-4
Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, N. Liao, Yanqi Song
{"title":"Network traffic classification model based on attention mechanism and spatiotemporal features","authors":"Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, N. Liao, Yanqi Song","doi":"10.1186/s13635-023-00141-4","DOIUrl":"https://doi.org/10.1186/s13635-023-00141-4","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48521784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture 通过类分类结构增强基于CNN的双JPEG图像主量化矩阵估计
IF 3.6 Q1 Computer Science Pub Date : 2020-12-01 DOI: 10.1186/s13635-021-00119-0
B. Tondi, Andrea Costanzo, Dequ Huang, Bin Li
{"title":"Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture","authors":"B. Tondi, Andrea Costanzo, Dequ Huang, Bin Li","doi":"10.1186/s13635-021-00119-0","DOIUrl":"https://doi.org/10.1186/s13635-021-00119-0","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-021-00119-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45033690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smooth adversarial examples 流畅的对抗性例子
IF 3.6 Q1 Computer Science Pub Date : 2020-11-17 DOI: 10.1186/s13635-020-00112-z
Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg
This paper investigates the visual quality of the adversarial examples. Recent papers propose to smooth the perturbations to get rid of high frequency artifacts. In this work, smoothing has a different meaning as it perceptually shapes the perturbation according to the visual content of the image to be attacked. The perturbation becomes locally smooth on the flat areas of the input image, but it may be noisy on its textured areas and sharp across its edges.This operation relies on Laplacian smoothing, well-known in graph signal processing, which we integrate in the attack pipeline. We benchmark several attacks with and without smoothing under a white box scenario and evaluate their transferability. Despite the additional constraint of smoothness, our attack has the same probability of success at lower distortion.
本文研究了对抗性示例的视觉质量。最近的一些论文提出对扰动进行平滑以去除高频伪影。在这项工作中,平滑具有不同的含义,因为它根据要攻击的图像的视觉内容感知地塑造扰动。扰动在输入图像的平坦区域局部变得平滑,但在其纹理区域可能是噪声的,在其边缘可能是尖锐的。该操作依赖于在图信号处理中众所周知的拉普拉斯平滑,我们将其集成到攻击管道中。我们在白盒场景下测试了几种有平滑和没有平滑的攻击,并评估了它们的可移植性。尽管有额外的平滑性约束,我们的攻击在较低失真下具有相同的成功概率。
{"title":"Smooth adversarial examples","authors":"Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg","doi":"10.1186/s13635-020-00112-z","DOIUrl":"https://doi.org/10.1186/s13635-020-00112-z","url":null,"abstract":"This paper investigates the visual quality of the adversarial examples. Recent papers propose to smooth the perturbations to get rid of high frequency artifacts. In this work, smoothing has a different meaning as it perceptually shapes the perturbation according to the visual content of the image to be attacked. The perturbation becomes locally smooth on the flat areas of the input image, but it may be noisy on its textured areas and sharp across its edges.This operation relies on Laplacian smoothing, well-known in graph signal processing, which we integrate in the attack pipeline. We benchmark several attacks with and without smoothing under a white box scenario and evaluate their transferability. Despite the additional constraint of smoothness, our attack has the same probability of success at lower distortion.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138536945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm 一种利用Knuth-Morris-Pratt字符串匹配算法防止SQL注入和跨站脚本攻击的新技术
IF 3.6 Q1 Computer Science Pub Date : 2020-08-18 DOI: 10.1186/s13635-020-00113-y
Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmed Haruna Dokoro, Oluwatobi Noah Akande, Aderonke Anthonia Kayode
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy confidential data are increasing. Therefore, measures must be put in place to curtail the growing threats of SQL injection and XSS attacks. This study presents a technique for detecting and preventing these threats using Knuth-Morris-Pratt (KMP) string matching algorithm. The algorithm was used to match user’s input string with the stored pattern of the injection string in order to detect any malicious code. The implementation was carried out using PHP scripting language and Apache XAMPP Server. The security level of the technique was measured using different test cases of SQL injection, cross-site scripting (XSS), and encoded injection attacks. Results obtained revealed that the proposed technique was able to successfully detect and prevent the attacks, log the attack entry in the database, block the system using its mac address, and also generate a warning message. Therefore, the proposed technique proved to be more effective in detecting and preventing SQL injection and XSS attacks
结构化查询语言(SQL)注入和跨站点脚本仍然是数据驱动的web应用程序的主要威胁。黑客可以不受限制地访问web应用程序的后端数据库,从而窃取、编辑和破坏机密数据的情况越来越多。因此,必须采取适当的措施来减少与日俱增的SQL注入和XSS攻击的威胁。本研究提出了一种使用Knuth-Morris-Pratt (KMP)字符串匹配算法检测和预防这些威胁的技术。该算法将用户输入的字符串与存储的注入字符串模式进行匹配,从而检测出恶意代码。使用PHP脚本语言和Apache XAMPP服务器实现。使用SQL注入、跨站点脚本(XSS)和编码注入攻击的不同测试用例测量了该技术的安全级别。结果表明,该技术能够成功地检测和阻止攻击,将攻击条目记录在数据库中,并使用其mac地址阻止系统,并生成警告消息。因此,所提出的技术在检测和防止SQL注入和XSS攻击方面更为有效
{"title":"A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm","authors":"Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmed Haruna Dokoro, Oluwatobi Noah Akande, Aderonke Anthonia Kayode","doi":"10.1186/s13635-020-00113-y","DOIUrl":"https://doi.org/10.1186/s13635-020-00113-y","url":null,"abstract":"Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy confidential data are increasing. Therefore, measures must be put in place to curtail the growing threats of SQL injection and XSS attacks. This study presents a technique for detecting and preventing these threats using Knuth-Morris-Pratt (KMP) string matching algorithm. The algorithm was used to match user’s input string with the stored pattern of the injection string in order to detect any malicious code. The implementation was carried out using PHP scripting language and Apache XAMPP Server. The security level of the technique was measured using different test cases of SQL injection, cross-site scripting (XSS), and encoded injection attacks. Results obtained revealed that the proposed technique was able to successfully detect and prevent the attacks, log the attack entry in the database, block the system using its mac address, and also generate a warning message. Therefore, the proposed technique proved to be more effective in detecting and preventing SQL injection and XSS attacks","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2020-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138536911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment 可扩展、高效、安全的RFID椭圆曲线密码系统,用于医疗环境中的物联网
IF 3.6 Q1 Computer Science Pub Date : 2020-07-29 DOI: 10.1186/s13635-020-00114-x
Davood Noori, Hassan Shakeri, Masood Niazi Torshiz
The rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing secure communications in health care systems is vital. The adoption of high-security optimal mechanisms for this purpose has been more effective regarding the efficiency of medical information systems; hence, many studies are being conducted in this field today. One of the most important components is the RFID cards that can be used for communication between entities in the environment. In healthcare systems, patient information is critical and nobody should have access to this information. Thus, providing security for these networks is essential. Recently, good researches have been done in the area of authentication for medical information systems, using RFID technology, which has a low computational cost. In this paper, we propose a novel method based on elliptic curve cryptography for vital and efficient and scalable authentication between RFID cards, card readers, and servers. This proposed method maintains security and has less computational cost and low elliptic curve point multiplication running time compared to similar recent methods.
物联网技术的快速发展导致了我们日常生活中各种设备的使用。随着物联网的不断兴起,在卫生保健系统中使用适当的方法建立安全通信至关重要。在医疗信息系统的效率方面,为此目的采用高安全性的最佳机制更为有效;因此,今天在这一领域正在进行许多研究。其中最重要的组件之一是RFID卡,它可以用于环境中实体之间的通信。在医疗保健系统中,患者信息至关重要,任何人都不应该获得这些信息。因此,为这些网络提供安全保障至关重要。近年来,在医疗信息系统的身份认证方面,利用RFID技术进行了较好的研究,该技术具有较低的计算成本。在本文中,我们提出了一种基于椭圆曲线密码的新方法,用于RFID卡,读卡器和服务器之间的重要,高效和可扩展的身份验证。该方法在保证安全性的同时,具有较低的计算成本和较短的椭圆曲线点乘法运行时间。
{"title":"Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment","authors":"Davood Noori, Hassan Shakeri, Masood Niazi Torshiz","doi":"10.1186/s13635-020-00114-x","DOIUrl":"https://doi.org/10.1186/s13635-020-00114-x","url":null,"abstract":"The rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing secure communications in health care systems is vital. The adoption of high-security optimal mechanisms for this purpose has been more effective regarding the efficiency of medical information systems; hence, many studies are being conducted in this field today. One of the most important components is the RFID cards that can be used for communication between entities in the environment. In healthcare systems, patient information is critical and nobody should have access to this information. Thus, providing security for these networks is essential. Recently, good researches have been done in the area of authentication for medical information systems, using RFID technology, which has a low computational cost. In this paper, we propose a novel method based on elliptic curve cryptography for vital and efficient and scalable authentication between RFID cards, card readers, and servers. This proposed method maintains security and has less computational cost and low elliptic curve point multiplication running time compared to similar recent methods.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2020-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138543382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Use of SHDM in commutative watermarking encryption SHDM在交换水印加密中的应用
IF 3.6 Q1 Computer Science Pub Date : 2020-07-16 DOI: 10.1186/s13635-020-00115-w
R. Schmitz
{"title":"Use of SHDM in commutative watermarking encryption","authors":"R. Schmitz","doi":"10.1186/s13635-020-00115-w","DOIUrl":"https://doi.org/10.1186/s13635-020-00115-w","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2020-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-00115-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49640514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition 颤抖触发器:探索基于dnn的人脸识别后门的敏感性
IF 3.6 Q1 Computer Science Pub Date : 2020-06-23 DOI: 10.1186/s13635-020-00104-z
Cecilia Pasquini, Rainer Böhme
Backdoor attacks against supervised machine learning methods seek to modify the training samples in such a way that, at inference time, the presence of a specific pattern (trigger) in the input data causes misclassifications to a target class chosen by the adversary. Successful backdoor attacks have been presented in particular for face recognition systems based on deep neural networks (DNNs). These attacks were evaluated for identical triggers at training and inference time. However, the vulnerability to backdoor attacks in practice crucially depends on the sensitivity of the backdoored classifier to approximate trigger inputs. To assess this, we study the response of a backdoored DNN for face recognition to trigger signals that have been transformed with typical image processing operators of varying strength. Results for different kinds of geometric and color transformations suggest that in particular geometric misplacements and partial occlusions of the trigger limit the effectiveness of the backdoor attacks considered. Moreover, our analysis reveals that the spatial interaction of the trigger with the subject’s face affects the success of the attack. Experiments with physical triggers inserted in live acquisitions validate the observed response of the DNN when triggers are inserted digitally.
针对监督机器学习方法的后门攻击试图以这样一种方式修改训练样本,即在推理时,输入数据中特定模式(触发器)的存在导致对手选择的目标类的错误分类。针对基于深度神经网络(dnn)的人脸识别系统,已经出现了成功的后门攻击。这些攻击在训练和推理时被评估为相同的触发。然而,在实践中,后门攻击的脆弱性关键取决于后门分类器对近似触发输入的敏感性。为了评估这一点,我们研究了用于人脸识别的后门深度神经网络对触发信号的响应,这些信号已被不同强度的典型图像处理算子转换。不同类型的几何和颜色变换的结果表明,特别是几何错位和触发器的部分遮挡限制了后门攻击所考虑的有效性。此外,我们的分析表明,触发器与受试者面部的空间相互作用会影响攻击的成功。在实时采集中插入物理触发器的实验验证了数字插入触发器时观察到的DNN响应。
{"title":"Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition","authors":"Cecilia Pasquini, Rainer Böhme","doi":"10.1186/s13635-020-00104-z","DOIUrl":"https://doi.org/10.1186/s13635-020-00104-z","url":null,"abstract":"Backdoor attacks against supervised machine learning methods seek to modify the training samples in such a way that, at inference time, the presence of a specific pattern (trigger) in the input data causes misclassifications to a target class chosen by the adversary. Successful backdoor attacks have been presented in particular for face recognition systems based on deep neural networks (DNNs). These attacks were evaluated for identical triggers at training and inference time. However, the vulnerability to backdoor attacks in practice crucially depends on the sensitivity of the backdoored classifier to approximate trigger inputs. To assess this, we study the response of a backdoored DNN for face recognition to trigger signals that have been transformed with typical image processing operators of varying strength. Results for different kinds of geometric and color transformations suggest that in particular geometric misplacements and partial occlusions of the trigger limit the effectiveness of the backdoor attacks considered. Moreover, our analysis reveals that the spatial interaction of the trigger with the subject’s face affects the success of the attack. Experiments with physical triggers inserted in live acquisitions validate the observed response of the DNN when triggers are inserted digitally.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2020-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138536910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reversible data hiding for binary images based on adaptive overlapping pattern 基于自适应重叠模式的二值图像可逆数据隐藏
IF 3.6 Q1 Computer Science Pub Date : 2020-06-01 DOI: 10.1186/s13635-020-00107-w
Keming Dong, Hyoung-Joong Kim, Xiaohan Yu, Xiaoqing Feng
{"title":"Reversible data hiding for binary images based on adaptive overlapping pattern","authors":"Keming Dong, Hyoung-Joong Kim, Xiaohan Yu, Xiaoqing Feng","doi":"10.1186/s13635-020-00107-w","DOIUrl":"https://doi.org/10.1186/s13635-020-00107-w","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-00107-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45598438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process 物联网网络风险:全面分析网络风险评估框架、风险向量和风险排序流程
IF 3.6 Q1 Computer Science Pub Date : 2020-05-26 DOI: 10.1186/s13635-020-00111-0
K. Kandasamy, Sethuraman Srinivas, K. Achuthan, Venkat Rangan
{"title":"IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process","authors":"K. Kandasamy, Sethuraman Srinivas, K. Achuthan, Venkat Rangan","doi":"10.1186/s13635-020-00111-0","DOIUrl":"https://doi.org/10.1186/s13635-020-00111-0","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13635-020-00111-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65684052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
期刊
EURASIP Journal on Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1