首页 > 最新文献

Computer Science Review最新文献

英文 中文
Deep learning with the generative models for recommender systems: A survey 用于推荐系统的生成模型深度学习:调查
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-04 DOI: 10.1016/j.cosrev.2024.100646
Ravi Nahta , Ganpat Singh Chauhan , Yogesh Kumar Meena , Dinesh Gopalani

The variety of enormous information on the web encourages the field of recommender systems (RS) to flourish. In recent times, deep learning techniques have significantly impacted information retrieval tasks, including RS. The probabilistic and non-linear views of neural networks emerge to generative models for recommendation tasks. At present, there is an absence of extensive survey on deep generative models for RS. Therefore, this article aims at providing a coherent and comprehensive survey on recent efforts on deep generative models for RS. In particular, we provide an in-depth research effort in devising the taxonomy of deep generative models for RS, along with the summary of state-of-art methods. Lastly, we highlight the potential future prospects based on recent trends and new research avenues in this interesting and developing field. Public code links, papers, and popular datasets covered in this survey are accessible at: https://github.com/creyesp/Awesome-recsys?tab=readme-ov-file#papers.

网络信息种类繁多,推动了推荐系统(RS)领域的蓬勃发展。近来,深度学习技术对包括推荐系统在内的信息检索任务产生了重大影响。神经网络的概率和非线性观点成为推荐任务的生成模型。目前,还没有关于 RS 深度生成模型的广泛调查。因此,本文旨在对近期针对 RS 的深度生成模型所做的努力进行连贯而全面的调查。特别是,我们深入研究了为 RS 设计深度生成模型的分类方法,并总结了最先进的方法。最后,我们根据这一有趣且不断发展的领域的最新趋势和新研究途径,强调了未来的潜在前景。本调查所涉及的公共代码链接、论文和流行数据集可在以下网址访问:https://github.com/creyesp/Awesome-recsys?tab=readme-ov-file#papers。
{"title":"Deep learning with the generative models for recommender systems: A survey","authors":"Ravi Nahta ,&nbsp;Ganpat Singh Chauhan ,&nbsp;Yogesh Kumar Meena ,&nbsp;Dinesh Gopalani","doi":"10.1016/j.cosrev.2024.100646","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100646","url":null,"abstract":"<div><p>The variety of enormous information on the web encourages the field of recommender systems (RS) to flourish. In recent times, deep learning techniques have significantly impacted information retrieval tasks, including RS. The probabilistic and non-linear views of neural networks emerge to generative models for recommendation tasks. At present, there is an absence of extensive survey on deep generative models for RS. Therefore, this article aims at providing a coherent and comprehensive survey on recent efforts on deep generative models for RS. In particular, we provide an in-depth research effort in devising the taxonomy of deep generative models for RS, along with the summary of state-of-art methods. Lastly, we highlight the potential future prospects based on recent trends and new research avenues in this interesting and developing field. Public code links, papers, and popular datasets covered in this survey are accessible at: <span>https://github.com/creyesp/Awesome-recsys?tab=readme-ov-file#papers</span><svg><path></path></svg>.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"53 ","pages":"Article 100646"},"PeriodicalIF":12.9,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141243890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
More than a framework: Sketching out technical enablers for natural language-based source code generation 不仅仅是一个框架:勾勒基于自然语言的源代码生成的技术手段
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-25 DOI: 10.1016/j.cosrev.2024.100637
Chen Yang, Yan Liu, Changqing Yin

Natural Language-based Source Code Generation (NLSCG) holds the promise to revolutionize the way how software is developed by means of facilitating a collection of intelligent technical enablers, based on sustained improvements on the natural language to source code pipelines and continuous adoption of new coding paradigms. In recent years, a large variety of NLSCG technical solutions have been proposed, and quite exciting experimental results have been reported. Meanwhile, current researches and initiative application projects in this area reflect a large diversity of NLSCG contexts and of major technical enablers. Such heterogeneity, fragmentation, and vagueness of the NLSCG technical landscape are currently frustrating the full realization of the NLSCG research and application vision. Players in this field could not find systematic guidelines on how to effectively address the ”known unknowns” and how to simply spot the ”unknown unknowns”, which eventually hinder the turning of NLSCG solutions into further research enhancements or production applications. Understanding the context, boundaries, capabilities, and integrations of NLSCG enablers is considered as one of the key drivers for the more practical application of NLSCG models. In this paper, we analyze in detail the natural language to source code pipelines and the evolvement of source code generation tasks, by considering both the problem context and technological aspects. A foresight reference framework for NLSCG is proposed to help handle the source code generation tasks with proper intelligent models. We review the present-day NLSCG technical landscape, as well as the core technical enablers along the source code generation pipelines. Relevant experiments are conducted to validate the role of representative models across different technical enablers on typical datasets, and we finally highlight the contribution of different enablers to code generation capabilities.

基于自然语言的源代码生成(NLSCG)有望在持续改进自然语言到源代码流水线和不断采用新的编码范例的基础上,通过促进一系列智能技术手段,彻底改变软件开发的方式。近年来,人们提出了各种各样的 NLSCG 技术解决方案,并取得了令人振奋的实验结果。同时,该领域当前的研究和主动应用项目反映出 NLSCG 环境和主要技术手段的巨大多样性。目前,NLSCG 技术领域的这种异质性、分散性和模糊性阻碍了 NLSCG 研究和应用愿景的全面实现。该领域的参与者找不到系统的指导原则,不知道如何有效解决 "已知的未知问题",也不知道如何简单地发现 "未知的未知问题",这些问题最终阻碍了 NLSCG 解决方案转化为进一步的研究改进或生产应用。了解 NLSCG 使能因素的背景、边界、能力和集成被认为是更实际应用 NLSCG 模型的关键驱动力之一。在本文中,我们通过考虑问题背景和技术方面,详细分析了从自然语言到源代码的流水线以及源代码生成任务的发展。我们提出了一个 NLSCG 的前瞻性参考框架,以帮助使用适当的智能模型处理源代码生成任务。我们回顾了当今 NLSCG 的技术状况,以及源代码生成管道的核心技术推动因素。我们进行了相关实验,以验证不同技术手段的代表模型在典型数据集上的作用,最后我们强调了不同技术手段对代码生成能力的贡献。
{"title":"More than a framework: Sketching out technical enablers for natural language-based source code generation","authors":"Chen Yang,&nbsp;Yan Liu,&nbsp;Changqing Yin","doi":"10.1016/j.cosrev.2024.100637","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100637","url":null,"abstract":"<div><p>Natural Language-based Source Code Generation (NLSCG) holds the promise to revolutionize the way how software is developed by means of facilitating a collection of intelligent technical enablers, based on sustained improvements on the natural language to source code pipelines and continuous adoption of new coding paradigms. In recent years, a large variety of NLSCG technical solutions have been proposed, and quite exciting experimental results have been reported. Meanwhile, current researches and initiative application projects in this area reflect a large diversity of NLSCG contexts and of major technical enablers. Such heterogeneity, fragmentation, and vagueness of the NLSCG technical landscape are currently frustrating the full realization of the NLSCG research and application vision. Players in this field could not find systematic guidelines on how to effectively address the ”known unknowns” and how to simply spot the ”unknown unknowns”, which eventually hinder the turning of NLSCG solutions into further research enhancements or production applications. Understanding the context, boundaries, capabilities, and integrations of NLSCG enablers is considered as one of the key drivers for the more practical application of NLSCG models. In this paper, we analyze in detail the natural language to source code pipelines and the evolvement of source code generation tasks, by considering both the problem context and technological aspects. A foresight reference framework for NLSCG is proposed to help handle the source code generation tasks with proper intelligent models. We review the present-day NLSCG technical landscape, as well as the core technical enablers along the source code generation pipelines. Relevant experiments are conducted to validate the role of representative models across different technical enablers on typical datasets, and we finally highlight the contribution of different enablers to code generation capabilities.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"53 ","pages":"Article 100637"},"PeriodicalIF":12.9,"publicationDate":"2024-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review on applications of Raspberry Pi 树莓派应用综述
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1016/j.cosrev.2024.100636
Sudha Ellison Mathe , Hari Kishan Kondaveeti , Suseela Vappangi , Sunny Dayal Vanambathina , Nandeesh Kumar Kumaravelu

Raspberry Pi is an invaluable and popular prototyping tool in scientific research for experimenting with a wide variety of ideas, ranging from simple to complex projects. This review article explores how Raspberry Pi is used in various studies, discussing its pros and cons along with its applications in various domains such as home automation, agriculture, healthcare, industrial control, and advanced research. Our aim is to provide a useful resource for researchers, educators, students, product developers, and enthusiasts, helping them to grasp the current status and discover new research possibilities using Raspberry Pi.

在科学研究中,Raspberry Pi 是一种宝贵而流行的原型工具,可用于实验从简单到复杂的各种项目。这篇综述文章探讨了 Raspberry Pi 在各种研究中的应用,讨论了它的优缺点以及在家庭自动化、农业、医疗保健、工业控制和高级研究等各个领域的应用。我们的目的是为研究人员、教育工作者、学生、产品开发人员和爱好者提供有用的资源,帮助他们掌握 Raspberry Pi 的现状并发现新的研究可能性。
{"title":"A comprehensive review on applications of Raspberry Pi","authors":"Sudha Ellison Mathe ,&nbsp;Hari Kishan Kondaveeti ,&nbsp;Suseela Vappangi ,&nbsp;Sunny Dayal Vanambathina ,&nbsp;Nandeesh Kumar Kumaravelu","doi":"10.1016/j.cosrev.2024.100636","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100636","url":null,"abstract":"<div><p>Raspberry Pi is an invaluable and popular prototyping tool in scientific research for experimenting with a wide variety of ideas, ranging from simple to complex projects. This review article explores how Raspberry Pi is used in various studies, discussing its pros and cons along with its applications in various domains such as home automation, agriculture, healthcare, industrial control, and advanced research. Our aim is to provide a useful resource for researchers, educators, students, product developers, and enthusiasts, helping them to grasp the current status and discover new research possibilities using Raspberry Pi.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100636"},"PeriodicalIF":12.9,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140917835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks 基于生成式对抗网络的复杂智能系统行为建模概览
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-27 DOI: 10.1016/j.cosrev.2024.100635
Yali Lv , Jingpu Duan , Xiong Li

This paper provides an extensive and in-depth survey of behavior modeling for complex intelligent systems, focusing specifically on the innovative applications of Generative Adversarial Networks (GANs). The survey not only delves into the fundamental principles of GANs, but also elucidates their pivotal role in accurately modeling the behaviors exhibited by complex intelligent systems. By categorizing behavior modeling into prediction and learning, this survey meticulously examines the current landscape of research in each domain, shedding light on the latest advancements and methodologies driven by GANs. Furthermore, the paper offers insights into both the theoretical underpinnings and practical implications of GANs in behavior modeling for complex intelligent systems, and proposes potential future research directions to advance the field. Overall, this comprehensive survey serves as a valuable resource for researchers, practitioners, and scholars seeking to deepen their understanding of behavior modeling using GANs and to chart a course for future exploration and innovation in this dynamic field.

本文对复杂智能系统的行为建模进行了广泛而深入的研究,尤其侧重于生成对抗网络(GANs)的创新应用。该研究不仅深入探讨了生成对抗网络的基本原理,还阐明了生成对抗网络在准确模拟复杂智能系统行为方面的关键作用。本调查报告将行为建模分为预测和学习两类,仔细研究了每个领域的研究现状,揭示了由 GANs 推动的最新进展和方法。此外,本文还深入探讨了 GANs 在复杂智能系统行为建模中的理论基础和实际意义,并提出了未来推动该领域发展的潜在研究方向。总之,对于希望加深对使用 GANs 进行行为建模的理解,并为这一动态领域的未来探索和创新指明方向的研究人员、从业人员和学者来说,这份全面的调查报告是一份宝贵的资源。
{"title":"A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks","authors":"Yali Lv ,&nbsp;Jingpu Duan ,&nbsp;Xiong Li","doi":"10.1016/j.cosrev.2024.100635","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100635","url":null,"abstract":"<div><p>This paper provides an extensive and in-depth survey of behavior modeling for complex intelligent systems, focusing specifically on the innovative applications of Generative Adversarial Networks (GANs). The survey not only delves into the fundamental principles of GANs, but also elucidates their pivotal role in accurately modeling the behaviors exhibited by complex intelligent systems. By categorizing behavior modeling into prediction and learning, this survey meticulously examines the current landscape of research in each domain, shedding light on the latest advancements and methodologies driven by GANs. Furthermore, the paper offers insights into both the theoretical underpinnings and practical implications of GANs in behavior modeling for complex intelligent systems, and proposes potential future research directions to advance the field. Overall, this comprehensive survey serves as a valuable resource for researchers, practitioners, and scholars seeking to deepen their understanding of behavior modeling using GANs and to chart a course for future exploration and innovation in this dynamic field.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100635"},"PeriodicalIF":12.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140650636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harnessing Heterogeneous Information Networks: A systematic literature review 利用异构信息网络:系统文献综述
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-27 DOI: 10.1016/j.cosrev.2024.100633
Leila Outemzabet , Nicolas Gaud , Aurélie Bertaux , Christophe Nicolle , Stéphane Gerart , Sébastien Vachenc

The integration of multiple heterogeneous data into graph models has been the subject of extensive research in recent years. Harnessing these resulting Heterogeneous Information Networks (HINs) is a complex task that requires reasoning to perform various prediction tasks.

In the last decade, multiple Artificial Intelligence (AI) approaches have been developed to bridge the gap between the abundance of diverse data within various fields, their heterogeneity and complexity within HINs. A focus has been directed on developing graph-oriented algorithms that can effectively analyze and leverage the rich information in HINs.

Given the sheer volume of approaches being developed, selecting the most suitable one for a specific objective has become a daunting challenge. This article reviews the recent advances in AI methods for modeling and analyzing HINs. It proposes a cartography of these approaches, structured as a pipeline, offering diverse options at each stage. This structured framework aims to guide practitioners in choosing the most fitting methods based on the nature of their data and specific objectives.

近年来,将多种异构数据整合到图模型中一直是广泛研究的主题。在过去的十年中,人们开发了多种人工智能(AI)方法,以弥补各领域丰富多样的数据与 HIN 中的异构性和复杂性之间的差距。鉴于开发的方法数量庞大,为特定目标选择最合适的方法已成为一项艰巨的挑战。本文回顾了用于 HINs 建模和分析的人工智能方法的最新进展。文章提出了这些方法的结构图,作为一个流水线,在每个阶段提供不同的选择。这一结构化框架旨在指导从业人员根据数据性质和具体目标选择最合适的方法。
{"title":"Harnessing Heterogeneous Information Networks: A systematic literature review","authors":"Leila Outemzabet ,&nbsp;Nicolas Gaud ,&nbsp;Aurélie Bertaux ,&nbsp;Christophe Nicolle ,&nbsp;Stéphane Gerart ,&nbsp;Sébastien Vachenc","doi":"10.1016/j.cosrev.2024.100633","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100633","url":null,"abstract":"<div><p>The integration of multiple heterogeneous data into graph models has been the subject of extensive research in recent years. Harnessing these resulting Heterogeneous Information Networks (HINs) is a complex task that requires reasoning to perform various prediction tasks.</p><p>In the last decade, multiple Artificial Intelligence (AI) approaches have been developed to bridge the gap between the abundance of diverse data within various fields, their heterogeneity and complexity within HINs. A focus has been directed on developing graph-oriented algorithms that can effectively analyze and leverage the rich information in HINs.</p><p>Given the sheer volume of approaches being developed, selecting the most suitable one for a specific objective has become a daunting challenge. This article reviews the recent advances in AI methods for modeling and analyzing HINs. It proposes a cartography of these approaches, structured as a pipeline, offering diverse options at each stage. This structured framework aims to guide practitioners in choosing the most fitting methods based on the nature of their data and specific objectives.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100633"},"PeriodicalIF":12.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140807234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey 跨站脚本攻击被揭露已有 22 年:系统映射和全面调查
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-23 DOI: 10.1016/j.cosrev.2024.100634
Abdelhakim Hannousse , Salima Yahiouche , Mohamed Cherif Nait-Hamoud

Cross-site scripting (XSS) is one of the major threats menacing the privacy of data and the navigation of trusted web applications. Since its disclosure in late 1999 by Microsoft security engineers, several techniques have been developed with the aim of securing web navigation and protecting web applications against XSS attacks. XSS has been and is still in the top 10 list of web vulnerabilities reported by the Open Web Applications Security Project (OWASP). Consequently, handling XSS attacks has become one of the major concerns of several web security communities. Despite the numerous studies that have been conducted to combat XSS attacks, the attacks continue to rise. This motivates the study of how the interest in XSS attacks has evolved over the years, what has already been achieved to prevent these attacks, and what is missing to restrain their prevalence. In this paper, we conduct a systematic mapping and a comprehensive survey with the aim of answering all these questions. We summarize and categorize existing endeavors that aim to handle XSS attacks and develop XSS-free web applications. The systematic mapping yielded 157 high-quality published studies. By thoroughly analyzing those studies, a comprehensive taxonomy is drawn out outlining various techniques used to prevent, detect, protect, and defend against XSS attacks and vulnerabilities. The study of the literature revealed a remarkable interest bias toward basic (84.71%) and JavaScript (81.63%) XSS attacks as well as a dearth of vulnerability repair mechanisms and tools (only 1.48%). Notably, existing vulnerability detection techniques focus solely on single-page detection, overlooking flaws that may span across multiple pages. Furthermore, the study brought to the forefront the limitations and challenges of existing attack detection and defense techniques concerning machine learning and content-security policies. Consequently, we strongly advocate the development of more suitable detection and defense techniques, along with an increased focus on addressing XSS vulnerabilities through effective detection (hybrid solutions) and repair strategies. Additionally, there is a pressing need for more high-quality studies to overcome the limitations of promising approaches such as machine learning and content-security policies while also addressing diverse XSS attacks in different languages. Hopefully, this study can serve as guidance for both the academic and practitioner communities in the development of XSS-free web applications.

跨站脚本(XSS)是威胁数据隐私和可信网络应用程序导航的主要威胁之一。自从微软公司的安全工程师于 1999 年底披露了这一漏洞以来,已经开发出了多种技术,旨在确保网络导航安全和保护网络应用程序免受 XSS 攻击。XSS 一直是开放式网络应用安全项目(OWASP)报告的十大网络漏洞之一。因此,处理 XSS 攻击已成为多个网络安全社区关注的主要问题之一。尽管针对 XSS 攻击开展了大量研究,但攻击仍在继续增加。这就促使我们研究 XSS 攻击的兴趣在过去几年中是如何演变的,在防止这些攻击方面已经取得了哪些成果,在抑制其流行方面还缺少哪些东西。在本文中,我们进行了一次系统的摸底和全面的调查,旨在回答所有这些问题。我们对旨在处理 XSS 攻击和开发无 XSS 网络应用程序的现有工作进行了总结和分类。通过系统性映射,我们获得了 157 项高质量的已发表研究。通过对这些研究的深入分析,我们总结出了一个全面的分类法,概述了用于预防、检测、保护和防御 XSS 攻击和漏洞的各种技术。文献研究表明,人们对基本 XSS 攻击(84.71%)和 JavaScript XSS 攻击(81.63%)的兴趣明显偏向于基本 XSS 攻击,而对漏洞修复机制和工具的兴趣却很低(仅为 1.48%)。值得注意的是,现有的漏洞检测技术只关注单页面检测,忽略了可能跨越多个页面的漏洞。此外,这项研究还凸显了现有攻击检测和防御技术在机器学习和内容安全策略方面的局限性和挑战。因此,我们强烈主张开发更合适的检测和防御技术,同时更加关注通过有效的检测(混合解决方案)和修复策略来解决 XSS 漏洞。此外,我们迫切需要进行更多高质量的研究,以克服机器学习和内容安全策略等有前途的方法的局限性,同时解决不同语言的各种 XSS 攻击问题。希望本研究能为学术界和实践界开发无 XSS 网络应用程序提供指导。
{"title":"Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey","authors":"Abdelhakim Hannousse ,&nbsp;Salima Yahiouche ,&nbsp;Mohamed Cherif Nait-Hamoud","doi":"10.1016/j.cosrev.2024.100634","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100634","url":null,"abstract":"<div><p>Cross-site scripting (XSS) is one of the major threats menacing the privacy of data and the navigation of trusted web applications. Since its disclosure in late 1999 by Microsoft security engineers, several techniques have been developed with the aim of securing web navigation and protecting web applications against XSS attacks. XSS has been and is still in the top 10 list of web vulnerabilities reported by the Open Web Applications Security Project (OWASP). Consequently, handling XSS attacks has become one of the major concerns of several web security communities. Despite the numerous studies that have been conducted to combat XSS attacks, the attacks continue to rise. This motivates the study of how the interest in XSS attacks has evolved over the years, what has already been achieved to prevent these attacks, and what is missing to restrain their prevalence. In this paper, we conduct a systematic mapping and a comprehensive survey with the aim of answering all these questions. We summarize and categorize existing endeavors that aim to handle XSS attacks and develop XSS-free web applications. The systematic mapping yielded 157 high-quality published studies. By thoroughly analyzing those studies, a comprehensive taxonomy is drawn out outlining various techniques used to prevent, detect, protect, and defend against XSS attacks and vulnerabilities. The study of the literature revealed a remarkable interest bias toward basic (84.71%) and JavaScript (81.63%) XSS attacks as well as a dearth of vulnerability repair mechanisms and tools (only 1.48%). Notably, existing vulnerability detection techniques focus solely on single-page detection, overlooking flaws that may span across multiple pages. Furthermore, the study brought to the forefront the limitations and challenges of existing attack detection and defense techniques concerning machine learning and content-security policies. Consequently, we strongly advocate the development of more suitable detection and defense techniques, along with an increased focus on addressing XSS vulnerabilities through effective detection (hybrid solutions) and repair strategies. Additionally, there is a pressing need for more high-quality studies to overcome the limitations of promising approaches such as machine learning and content-security policies while also addressing diverse XSS attacks in different languages. Hopefully, this study can serve as guidance for both the academic and practitioner communities in the development of XSS-free web applications.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100634"},"PeriodicalIF":12.9,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140638499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions 关于聊天机器人、人工智能驱动的虚拟对话代理、ChatGPT 的当代综述:应用、公开挑战和未来研究方向
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-09 DOI: 10.1016/j.cosrev.2024.100632
Avyay Casheekar, Archit Lahiri, Kanishk Rath, Kaushik Sanjay Prabhakar, Kathiravan Srinivasan

This review paper offers an in-depth analysis of AI-powered virtual conversational agents, specifically focusing on OpenAI’s ChatGPT. The main contributions of this paper are threefold: (i) an exhaustive review of prior literature on chatbots, (ii) a background of chatbots including existing chatbots/conversational agents like ChatGPT, and (iii) a UI/UX design analysis of prominent chatbots. Another contribution of this review is the comprehensive exploration of ChatGPT’s applications across a multitude of sectors, including education, business, public health, and more. This review highlights the transformative potential of ChatGPT, despite the challenges it faces such as hallucination, biases in training data, jailbreaks, and anonymous data collection. The review paper then presents a comprehensive survey of prior literature reviews on chatbots, identifying gaps in the prior work and highlighting the need for further research in areas such as chatbot evaluation, user experience, and ethical considerations. The paper also provides a detailed analysis of the UI/UX design of prominent chatbots, including their conversational flow, visual design, and user engagement. The paper also identifies key future research directions, including mitigating language bias, enhancing ethical decision-making capabilities, improving user interaction and personalization, and developing robust governance frameworks. By solving these issues, we can ensure that AI chatbots like ChatGPT are used responsibly and effectively across a broad variety of applications. This review will be a valuable resource for researchers and practitioners in understanding the current state and future potential of AI chatbots like ChatGPT.

本综述论文深入分析了人工智能驱动的虚拟会话代理,特别关注 OpenAI 的 ChatGPT。本文的主要贡献有三个方面:(i) 对以前有关聊天机器人的文献进行了详尽回顾;(ii) 介绍了聊天机器人的背景,包括 ChatGPT 等现有聊天机器人/对话代理;(iii) 对著名聊天机器人的 UI/UX 设计进行了分析。本综述的另一个贡献是全面探讨了 ChatGPT 在教育、商业、公共卫生等多个领域的应用。尽管 ChatGPT 面临着幻觉、训练数据偏差、越狱和匿名数据收集等挑战,但这篇综述强调了 ChatGPT 的变革潜力。然后,综述论文对之前有关聊天机器人的文献综述进行了全面调查,找出了之前工作中的不足,并强调了在聊天机器人评估、用户体验和伦理考虑等领域进一步研究的必要性。论文还详细分析了著名聊天机器人的用户界面/用户体验设计,包括对话流程、视觉设计和用户参与。论文还确定了未来的主要研究方向,包括减轻语言偏见、增强伦理决策能力、改善用户互动和个性化,以及开发强大的管理框架。通过解决这些问题,我们可以确保像 ChatGPT 这样的人工智能聊天机器人在各种应用中得到负责任和有效的使用。本综述将成为研究人员和从业人员了解 ChatGPT 等人工智能聊天机器人的现状和未来潜力的宝贵资源。
{"title":"A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions","authors":"Avyay Casheekar,&nbsp;Archit Lahiri,&nbsp;Kanishk Rath,&nbsp;Kaushik Sanjay Prabhakar,&nbsp;Kathiravan Srinivasan","doi":"10.1016/j.cosrev.2024.100632","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100632","url":null,"abstract":"<div><p>This review paper offers an in-depth analysis of AI-powered virtual conversational agents, specifically focusing on OpenAI’s ChatGPT. The main contributions of this paper are threefold: (i) an exhaustive review of prior literature on chatbots, (ii) a background of chatbots including existing chatbots/conversational agents like ChatGPT, and (iii) a UI/UX design analysis of prominent chatbots. Another contribution of this review is the comprehensive exploration of ChatGPT’s applications across a multitude of sectors, including education, business, public health, and more. This review highlights the transformative potential of ChatGPT, despite the challenges it faces such as hallucination, biases in training data, jailbreaks, and anonymous data collection. The review paper then presents a comprehensive survey of prior literature reviews on chatbots, identifying gaps in the prior work and highlighting the need for further research in areas such as chatbot evaluation, user experience, and ethical considerations. The paper also provides a detailed analysis of the UI/UX design of prominent chatbots, including their conversational flow, visual design, and user engagement. The paper also identifies key future research directions, including mitigating language bias, enhancing ethical decision-making capabilities, improving user interaction and personalization, and developing robust governance frameworks. By solving these issues, we can ensure that AI chatbots like ChatGPT are used responsibly and effectively across a broad variety of applications. This review will be a valuable resource for researchers and practitioners in understanding the current state and future potential of AI chatbots like ChatGPT.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100632"},"PeriodicalIF":12.9,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges 基于物联网的 DDoS 攻击检测的人工智能技术:分类法、综合评述和研究挑战
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-30 DOI: 10.1016/j.cosrev.2024.100631
Bindu Bala , Sunny Behal

Distributed Denial of Service (DDoS) attacks in IoT networks are one of the most devastating and challenging cyber-attacks. The number of IoT users is growing exponentially due to the increase in IoT devices over the past years. Consequently, DDoS attack has become the most prominent attack as vulnerable IoT devices are becoming victims of it. In the literature, numerous techniques have been proposed to detect IoT-based DDoS attacks. However, techniques based on Artificial Intelligence (AI) have proven to be effective in the detection of cyber-attacks in comparison to other alternative techniques. This paper presents a systematic literature review of AI-based tools and techniques used for analysis, classification, and detection of the most threatening, prominent, and dreadful IoT-based DDoS attacks between the years 2019 to 2023. A comparative study of real datasets having IoT traffic features has also been illustrated. The findings of this systematic review provide useful insights into the existing research landscape for designing AI-based models to detect IoT-based DDoS attacks specifically. Additionally, the study sheds light on IoT botnet lifecycle, various botnet families, the taxonomy of IoT-based DDoS attacks, prominent tools used to launch DDoS attack, publicly available IoT datasets, the taxonomy of AI techniques, popular software available for ML/DL modeling, a list of numerous research challenges and future directions that may aid in the development of novel and reliable methods for identifying and categorizing IoT-based DDoS attacks.

物联网网络中的分布式拒绝服务(DDoS)攻击是最具破坏性和挑战性的网络攻击之一。由于过去几年物联网设备的增加,物联网用户数量呈指数级增长。因此,DDoS 攻击已成为最突出的攻击,因为易受攻击的物联网设备正成为其受害者。文献中提出了许多检测基于物联网的 DDoS 攻击的技术。然而,与其他替代技术相比,基于人工智能(AI)的技术已被证明能有效检测网络攻击。本文对基于人工智能的工具和技术进行了系统的文献综述,这些工具和技术用于分析、分类和检测 2019 年至 2023 年间最具威胁性、最突出和最可怕的基于物联网的 DDoS 攻击。此外,还对具有物联网流量特征的真实数据集进行了比较研究。本系统综述的研究结果为设计基于人工智能的模型来专门检测基于物联网的 DDoS 攻击提供了有益的见解。此外,本研究还揭示了物联网僵尸网络的生命周期、各种僵尸网络家族、基于物联网的 DDoS 攻击分类、用于发起 DDoS 攻击的主要工具、公开可用的物联网数据集、人工智能技术分类、可用于 ML/DL 建模的流行软件、众多研究挑战和未来方向,这些都有助于开发新型可靠的方法来识别和分类基于物联网的 DDoS 攻击。
{"title":"AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges","authors":"Bindu Bala ,&nbsp;Sunny Behal","doi":"10.1016/j.cosrev.2024.100631","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100631","url":null,"abstract":"<div><p>Distributed Denial of Service (DDoS) attacks in IoT networks are one of the most devastating and challenging cyber-attacks. The number of IoT users is growing exponentially due to the increase in IoT devices over the past years. Consequently, DDoS attack has become the most prominent attack as vulnerable IoT devices are becoming victims of it. In the literature, numerous techniques have been proposed to detect IoT-based DDoS attacks. However, techniques based on Artificial Intelligence (AI) have proven to be effective in the detection of cyber-attacks in comparison to other alternative techniques. This paper presents a systematic literature review of AI-based tools and techniques used for analysis, classification, and detection of the most threatening, prominent, and dreadful IoT-based DDoS attacks between the years 2019 to 2023. A comparative study of real datasets having IoT traffic features has also been illustrated. The findings of this systematic review provide useful insights into the existing research landscape for designing AI-based models to detect IoT-based DDoS attacks specifically. Additionally, the study sheds light on IoT botnet lifecycle, various botnet families, the taxonomy of IoT-based DDoS attacks, prominent tools used to launch DDoS attack, publicly available IoT datasets, the taxonomy of AI techniques, popular software available for ML/DL modeling, a list of numerous research challenges and future directions that may aid in the development of novel and reliable methods for identifying and categorizing IoT-based DDoS attacks.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100631"},"PeriodicalIF":12.9,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140330585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple clusterings: Recent advances and perspectives 多重聚类:最新进展与展望
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-26 DOI: 10.1016/j.cosrev.2024.100621
Guoxian Yu , Liangrui Ren , Jun Wang , Carlotta Domeniconi , Xiangliang Zhang

Clustering is a fundamental data exploration technique to discover hidden grouping structure of data. With the proliferation of big data, and the increase of volume and variety, the complexity of data multiplicity is increasing as well. Traditional clustering methods can provide only a single clustering result, which restricts data exploration to one single possible partition. In contrast, multiple clustering can simultaneously or sequentially uncover multiple non-redundant and distinct clustering solutions, which can reveal multiple interesting hidden structures of the data from different perspectives. For these reasons, multiple clustering has become a popular and promising field of study. In this survey, we have conducted a systematic review of the existing multiple clustering methods. Specifically, we categorize existing approaches according to four different perspectives (i.e., multiple clustering in the original space, in subspaces and on multi-view data, and multiple co-clustering). We summarize the key ideas underlying the techniques and their objective functions, and discuss the advantages and disadvantages of each. In addition, we built a repository of multiple clustering resources (i.e., benchmark datasets and codes). Finally, we discuss the key open issues for future investigation.

聚类是一种基本的数据探索技术,用于发现数据中隐藏的分组结构。随着大数据的激增、数量和种类的增加,数据多元性的复杂性也在增加。传统的聚类方法只能提供单一的聚类结果,这就把数据探索限制在单一可能的分区上。相比之下,多重聚类可以同时或依次发现多个非冗余且截然不同的聚类方案,从而从不同角度揭示数据中多个有趣的隐藏结构。因此,多重聚类已成为一个热门且前景广阔的研究领域。在本调查中,我们对现有的多重聚类方法进行了系统回顾。具体来说,我们按照四个不同的视角(即原始空间中的多重聚类、子空间中的多重聚类、多视角数据中的多重聚类以及多重协同聚类)对现有方法进行了分类。我们总结了这些技术及其目标函数的主要思想,并讨论了每种技术的优缺点。此外,我们还建立了多个聚类资源库(即基准数据集和代码)。最后,我们讨论了未来研究的关键问题。
{"title":"Multiple clusterings: Recent advances and perspectives","authors":"Guoxian Yu ,&nbsp;Liangrui Ren ,&nbsp;Jun Wang ,&nbsp;Carlotta Domeniconi ,&nbsp;Xiangliang Zhang","doi":"10.1016/j.cosrev.2024.100621","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100621","url":null,"abstract":"<div><p>Clustering is a fundamental data exploration technique to discover hidden grouping structure of data. With the proliferation of big data, and the increase of volume and variety, the complexity of data multiplicity is increasing as well. Traditional clustering methods can provide only a single clustering result, which restricts data exploration to one single possible partition. In contrast, multiple clustering can simultaneously or sequentially uncover multiple non-redundant and distinct clustering solutions, which can reveal multiple interesting hidden structures of the data from different perspectives. For these reasons, multiple clustering has become a popular and promising field of study. In this survey, we have conducted a systematic review of the existing multiple clustering methods. Specifically, we categorize existing approaches according to four different perspectives (i.e., multiple clustering in the original space, in subspaces and on multi-view data, and multiple co-clustering). We summarize the key ideas underlying the techniques and their objective functions, and discuss the advantages and disadvantages of each. In addition, we built a repository of multiple clustering resources (i.e., benchmark datasets and codes). Finally, we discuss the key open issues for future investigation.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100621"},"PeriodicalIF":12.9,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139975673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable computing across datacenters: A review of enabling models and techniques 跨数据中心的可持续计算:有利模式和技术综述
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-13 DOI: 10.1016/j.cosrev.2024.100620
Muhammad Zakarya , Ayaz Ali Khan , Mohammed Reza Chalak Qazani , Hashim Ali , Mahmood Al-Bahri , Atta Ur Rehman Khan , Ahmad Ali , Rahim Khan

The growth rate in big data and internet of things (IoT) is far exceeding the computer performance rate at which modern processors can compute on the massive amount of data. The cluster and cloud technologies enriched by machine learning applications had significantly helped in performance growths subject to the underlying network performance. Computer systems have been studied for improvement in performance, driven by user’s applications demand, in the past few decades, particularly from 1990 to 2010. By the mid of 2010 to 2023, albeit parallel and distributed computing was omnipresent, but the total performance improvement rate of a single computing core had significantly reduced. Similarly, from 2010 to 2023, our digital world of big data and IoT has considerably increased from 1.2 Zettabytes (i.e., sextillion bytes) to approximately 120 zettabytes. Moreover, in 2022 cloud datacenters consumed 200TWh of energy worldwide. However, due to their ever-increasing energy demand which causes CO2 emissions, over the past years the focus has shifted to the design of architectures, software, and in particular, intelligent algorithms to compute on the data more efficiently and intelligently. The energy consumption problem is even greater for large-scale systems that involve several thousand servers. Combining these fears, cloud service providers are presently facing more challenges than earlier because they fight to keep up with the extraordinary network traffic being produced by the world’s fast-tracked move to online due to global pandemics. In this paper, we deliberate the energy consumption and performance problems of large-scale systems and present several taxonomies of energy and performance aware methodologies. We debate over the energy and performance efficiencies, both, which make this study different from those previously published in the literature. Important research papers have been surveyed to characterise and recognise crucial and outstanding topics for further research. We deliberate numerous state-of-the-art methods and algorithms, stated in the literature, that claim to advance the energy efficiency and performance of large-scale computing systems, and recognise numerous open challenges.

大数据和物联网(IoT)的增长速度远远超过了现代处理器计算海量数据的计算机性能。机器学习应用所丰富的集群和云技术极大地促进了性能的增长,但这取决于底层网络的性能。过去几十年,特别是 1990 年至 2010 年,计算机系统在用户应用需求的驱动下,一直在研究如何提高性能。到 2010 年至 2023 年中期,尽管并行和分布式计算已无处不在,但单个计算核心的总性能改进率已大幅下降。同样,从 2010 年到 2023 年,我们的大数据和物联网数字世界已从 1.2 ZB(即六千万字节)大幅增至约 120 ZB。此外,2022 年全球云数据中心的能耗将达到 200 太瓦时。然而,由于云数据中心对能源的需求不断增加,导致二氧化碳排放,过去几年来,人们已将重点转移到架构、软件,特别是智能算法的设计上,以便更高效、更智能地计算数据。对于涉及数千台服务器的大型系统来说,能耗问题更为严重。综合这些担忧,云服务提供商目前正面临着比以往更多的挑战,因为他们要努力跟上全球大流行病导致的全球快速上网所产生的巨大网络流量。在本文中,我们探讨了大规模系统的能耗和性能问题,并介绍了几种能耗和性能感知方法。我们对能效和性能效率进行了讨论,这两点使本研究有别于之前发表在文献中的研究。我们对重要的研究论文进行了调查,以确定和识别有待进一步研究的关键和突出主题。我们讨论了文献中提到的众多先进方法和算法,这些方法和算法都声称可以提高大规模计算系统的能效和性能,同时我们也认识到了众多有待解决的挑战。
{"title":"Sustainable computing across datacenters: A review of enabling models and techniques","authors":"Muhammad Zakarya ,&nbsp;Ayaz Ali Khan ,&nbsp;Mohammed Reza Chalak Qazani ,&nbsp;Hashim Ali ,&nbsp;Mahmood Al-Bahri ,&nbsp;Atta Ur Rehman Khan ,&nbsp;Ahmad Ali ,&nbsp;Rahim Khan","doi":"10.1016/j.cosrev.2024.100620","DOIUrl":"https://doi.org/10.1016/j.cosrev.2024.100620","url":null,"abstract":"<div><p>The growth rate in big data and internet of things (IoT) is far exceeding the computer performance rate at which modern processors can compute on the massive amount of data. The cluster and cloud technologies enriched by machine learning applications had significantly helped in performance growths subject to the underlying network performance. Computer systems have been studied for improvement in performance, driven by user’s applications demand, in the past few decades, particularly from 1990 to 2010. By the mid of 2010 to 2023, albeit parallel and distributed computing was omnipresent, but the total performance improvement rate of a single computing core had significantly reduced. Similarly, from 2010 to 2023, our digital world of big data and IoT has considerably increased from 1.2 Zettabytes (i.e., sextillion bytes) to approximately 120 zettabytes. Moreover, in 2022 cloud datacenters consumed <span><math><mo>∼</mo></math></span> 200TWh of energy worldwide. However, due to their ever-increasing energy demand which causes <span><math><msub><mrow><mi>CO</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> emissions, over the past years the focus has shifted to the design of architectures, software, and in particular, intelligent algorithms to compute on the data more efficiently and intelligently. The energy consumption problem is even greater for large-scale systems that involve several thousand servers. Combining these fears, cloud service providers are presently facing more challenges than earlier because they fight to keep up with the extraordinary network traffic being produced by the world’s fast-tracked move to online due to global pandemics. In this paper, we deliberate the energy consumption and performance problems of large-scale systems and present several taxonomies of energy and performance aware methodologies. We debate over the energy and performance efficiencies, both, which make this study different from those previously published in the literature. Important research papers have been surveyed to characterise and recognise crucial and outstanding topics for further research. We deliberate numerous state-of-the-art methods and algorithms, stated in the literature, that claim to advance the energy efficiency and performance of large-scale computing systems, and recognise numerous open challenges.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"52 ","pages":"Article 100620"},"PeriodicalIF":12.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139726310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Science Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1