首页 > 最新文献

Tsinghua Science and Technology最新文献

英文 中文
A Novel Parallel Processing Element Architecture for Accelerating ODE and AI 一种新的加速ODE和AI的并行处理单元结构
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010090
Kaiyuan Yang;Longchao Liu;Haotian Liu;Tiantai Deng
Transforming complex problems, such as transforming ordinary differential equations (ODEs) into matrix formats, into simpler computational tasks is key for AI advancements and paves the way for more efficient computing architectures. Systolic Arrays, known for their computational efficiency, low power use and ease of implementation, address AI's computational challenges. They are central to mainstream industry AI accelerators, with improvements to the Processing Element (PE) significantly boosting systolic array performance, and also streamlines computing architectures, paving the way for more efficient solutions in technology fields. This research presents a novel PE design and its integration of systolic array based on a novel computing theory - bit-level mathematics for Multiply-Accumulate (MAC) operation. We present 3 different architectures for the PE and provide a comprehensive comparison between them and the state-of-the-art technologies, focusing on power, area, and throughput. This research also demonstrates the integration of the proposed MAC unit design with systolic arrays, highlighting significant improvements in computational efficiency. Our implementations show a 2380952.38 times lower latency, yet 64.19 times less DSP48E1, 1.26 times less Look-Up Tables (LUTs), 10.76 times less Flip-Flops (FFs), with 99.63 times less power consumption and 15.19 times higher performance per PE compared to the state-of-the-art design.
将复杂问题(如将常微分方程(ode)转换为矩阵格式)转换为更简单的计算任务是人工智能进步的关键,并为更高效的计算架构铺平了道路。收缩压阵列以其计算效率、低功耗和易于实现而闻名,解决了人工智能的计算挑战。它们是主流行业人工智能加速器的核心,对处理元件(PE)的改进显著提高了收缩阵列的性能,并简化了计算架构,为技术领域更高效的解决方案铺平了道路。本研究提出了一种新的PE设计及其集成的收缩压阵列,该设计基于一种新颖的计算理论-乘-累加运算的位级数学。我们为PE提供了3种不同的架构,并提供了它们与最先进技术之间的全面比较,重点是功率,面积和吞吐量。本研究还展示了所提出的MAC单元设计与收缩阵列的集成,突出了计算效率的显着提高。我们的实现显示,与最先进的设计相比,延迟降低了2380952.38倍,DSP48E1减少了64.19倍,查找表(lut)减少了1.26倍,触发器(ff)减少了10.76倍,功耗降低了99.63倍,每PE性能提高了15.19倍。
{"title":"A Novel Parallel Processing Element Architecture for Accelerating ODE and AI","authors":"Kaiyuan Yang;Longchao Liu;Haotian Liu;Tiantai Deng","doi":"10.26599/TST.2024.9010090","DOIUrl":"https://doi.org/10.26599/TST.2024.9010090","url":null,"abstract":"Transforming complex problems, such as transforming ordinary differential equations (ODEs) into matrix formats, into simpler computational tasks is key for AI advancements and paves the way for more efficient computing architectures. Systolic Arrays, known for their computational efficiency, low power use and ease of implementation, address AI's computational challenges. They are central to mainstream industry AI accelerators, with improvements to the Processing Element (PE) significantly boosting systolic array performance, and also streamlines computing architectures, paving the way for more efficient solutions in technology fields. This research presents a novel PE design and its integration of systolic array based on a novel computing theory - bit-level mathematics for Multiply-Accumulate (MAC) operation. We present 3 different architectures for the PE and provide a comprehensive comparison between them and the state-of-the-art technologies, focusing on power, area, and throughput. This research also demonstrates the integration of the proposed MAC unit design with systolic arrays, highlighting significant improvements in computational efficiency. Our implementations show a 2380952.38 times lower latency, yet 64.19 times less DSP48E1, 1.26 times less Look-Up Tables (LUTs), 10.76 times less Flip-Flops (FFs), with 99.63 times less power consumption and 15.19 times higher performance per PE compared to the state-of-the-art design.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"1954-1964"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979797","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Medical Image Classification Based on Improved FedAvg Algorithm 基于改进fedag算法的医学图像分类研究
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010184
Rui Li;Hai Wang;Qiang Lu;Jie Yan;Shuo Ji;Yuhui Ma
Federated learning (FL) technology has significant advantages in solving data silos and user privacy problems, but the traditional federal average (FedAvg) algorithm is ineffective in classifying and faces the risk of refactoring attacks when dealing with non-independent and identically distributed (Non-IID) data, which is especially prominent since medical data involves sensitive personal health information. Therefore, optimizing FedAvg to adapt to Non-IID data distribution and enhancing privacy protection are urgent problems that need to be solved, and this paper investigates these two aspects. In order to enhance the classification performance of FedAvg under Non-IID distribution, this paper combines the optimized deep learning model SE-ResNet18-E with FedAvg to obtain the FedAvg(SE-ResNet18-E) algorithm. The algorithm takes advantage of the SE-ResNet18-E model in feature extraction and classification tasks, fully uses the data resources of each participant, and improves the classification performance of FedAvg under Non-IID distribution. In addition, the algorithm achieves high communication performance. Second, in order to enhance the security of FL in the medical domain, threshold Paillier encryption is further introduced on top of FedAvg(SE-ResNet18-E) to form the Safe-FedAvg(SE-ResNet18-E) algorithm, which solves the threat of reconstruction attack and private key leakage in medical FL. After experimental validation, the Safe-FedAvg (SE-ResNet18-E) algorithm effectively improves the accuracy of disease classification and effectively protects the privacy and security of medical data, and enhances the trust of medical organizations participating in FL.
联邦学习(FL)技术在解决数据孤岛和用户隐私问题方面具有显著优势,但传统的联邦平均(FedAvg)算法在处理非独立和同分布(Non-IID)数据时分类效果不佳,并且面临重构攻击的风险,这一点在医疗数据涉及敏感的个人健康信息时尤为突出。因此,优化fedag以适应非iid数据分布和加强隐私保护是迫切需要解决的问题,本文从这两个方面进行了研究。为了增强FedAvg在非iid分布下的分类性能,本文将优化后的深度学习模型SE-ResNet18-E与FedAvg结合,得到FedAvg(SE-ResNet18-E)算法。该算法在特征提取和分类任务上利用SE-ResNet18-E模型,充分利用各参与者的数据资源,提高了fedag在非iid分布下的分类性能。此外,该算法具有较高的通信性能。其次,为了增强FL在医疗领域的安全性,在FedAvg(SE-ResNet18-E)的基础上进一步引入阈值Paillier加密,形成Safe-FedAvg(SE-ResNet18-E)算法,解决了医疗FL中重构攻击和私钥泄露的威胁。经过实验验证,Safe-FedAvg(SE-ResNet18-E)算法有效提高了疾病分类的准确率,有效保护了医疗数据的隐私和安全。提高参与FL的医疗机构的信任度。
{"title":"Research on Medical Image Classification Based on Improved FedAvg Algorithm","authors":"Rui Li;Hai Wang;Qiang Lu;Jie Yan;Shuo Ji;Yuhui Ma","doi":"10.26599/TST.2024.9010184","DOIUrl":"https://doi.org/10.26599/TST.2024.9010184","url":null,"abstract":"Federated learning (FL) technology has significant advantages in solving data silos and user privacy problems, but the traditional federal average (FedAvg) algorithm is ineffective in classifying and faces the risk of refactoring attacks when dealing with non-independent and identically distributed (Non-IID) data, which is especially prominent since medical data involves sensitive personal health information. Therefore, optimizing FedAvg to adapt to Non-IID data distribution and enhancing privacy protection are urgent problems that need to be solved, and this paper investigates these two aspects. In order to enhance the classification performance of FedAvg under Non-IID distribution, this paper combines the optimized deep learning model SE-ResNet18-E with FedAvg to obtain the FedAvg(SE-ResNet18-E) algorithm. The algorithm takes advantage of the SE-ResNet18-E model in feature extraction and classification tasks, fully uses the data resources of each participant, and improves the classification performance of FedAvg under Non-IID distribution. In addition, the algorithm achieves high communication performance. Second, in order to enhance the security of FL in the medical domain, threshold Paillier encryption is further introduced on top of FedAvg(SE-ResNet18-E) to form the Safe-FedAvg(SE-ResNet18-E) algorithm, which solves the threat of reconstruction attack and private key leakage in medical FL. After experimental validation, the Safe-FedAvg (SE-ResNet18-E) algorithm effectively improves the accuracy of disease classification and effectively protects the privacy and security of medical data, and enhances the trust of medical organizations participating in FL.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2243-2258"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979789","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating High-Order Adversarial Attacks Using Runge-Kutta Methods 用龙格-库塔方法逼近高阶对抗性攻击
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010154
Anjie Peng;Guoqiang Shi;Zhi Lin;Hui Zeng;Xing Yang
Adversarial attacks craft adversarial examples (AEs) to fool convolution neural networks. The mainstream gradient-based attacks, based on first-order optimization methods, encounter bottlenecks to generate high transferable AEs attacking unknown models. Considering that the high-order method would be a better optimization algorithm, we attempt to build high-order adversarial attacks to improve the transferability of AEs. However, solving the optimization problem of adversarial attacks directly via higher-order derivatives is computationally difficult and may face the non-convergence problem. So, we leverage the Runge-Kutta (RK) method, which is an accurate yet efficient high-order numerical solver of ordinary differential equation (ODE), to approximate high-order adversarial attacks. We first induce the gradient descent process of gradient-based attack as an ODE, and then numerically solve the ODE via RK method to develop approximated high-order adversarial attacks. Concretely, through ignoring the higher-order infinitesimal item in the Taylor expansion of the loss, the proposed method utilizes a linear combination of the present gradient and looking-ahead gradients to replace the computationally expensive high-order derivatives, and yields a relatively fast equivalent high-order adversarial attack. The proposed high-order adversarial attack can be extensively integrated with transferability augmentation methods to generate high transferable AEs. Extensive experiments demonstrate that the RK-based attacks exhibit higher transferability than the state of the arts.
对抗性攻击使用对抗性示例(ae)来欺骗卷积神经网络。主流的基于梯度的攻击基于一阶优化方法,在生成攻击未知模型的高可转移AEs时遇到瓶颈。考虑到高阶方法是一种更好的优化算法,我们尝试构建高阶对抗性攻击来提高AEs的可转移性。然而,直接通过高阶导数求解对抗性攻击的优化问题计算困难,并且可能面临不收敛问题。因此,我们利用Runge-Kutta (RK)方法来近似高阶对抗性攻击,这是一种精确而高效的常微分方程(ODE)高阶数值求解器。首先将基于梯度的攻击的梯度下降过程归纳为ODE,然后通过RK方法对ODE进行数值求解,得到近似的高阶对抗性攻击。具体而言,该方法通过忽略损失的泰勒展开式中的高阶无穷小项,利用当前梯度和前瞻梯度的线性组合来取代计算代价高昂的高阶导数,并产生相对快速的等效高阶对抗性攻击。所提出的高阶对抗性攻击可以与可转移性增强方法广泛集成,以生成高可转移的ae。大量的实验表明,基于rk的攻击比目前的技术表现出更高的可转移性。
{"title":"Approximating High-Order Adversarial Attacks Using Runge-Kutta Methods","authors":"Anjie Peng;Guoqiang Shi;Zhi Lin;Hui Zeng;Xing Yang","doi":"10.26599/TST.2024.9010154","DOIUrl":"https://doi.org/10.26599/TST.2024.9010154","url":null,"abstract":"Adversarial attacks craft adversarial examples (AEs) to fool convolution neural networks. The mainstream gradient-based attacks, based on first-order optimization methods, encounter bottlenecks to generate high transferable AEs attacking unknown models. Considering that the high-order method would be a better optimization algorithm, we attempt to build high-order adversarial attacks to improve the transferability of AEs. However, solving the optimization problem of adversarial attacks directly via higher-order derivatives is computationally difficult and may face the non-convergence problem. So, we leverage the Runge-Kutta (RK) method, which is an accurate yet efficient high-order numerical solver of ordinary differential equation (ODE), to approximate high-order adversarial attacks. We first induce the gradient descent process of gradient-based attack as an ODE, and then numerically solve the ODE via RK method to develop approximated high-order adversarial attacks. Concretely, through ignoring the higher-order infinitesimal item in the Taylor expansion of the loss, the proposed method utilizes a linear combination of the present gradient and looking-ahead gradients to replace the computationally expensive high-order derivatives, and yields a relatively fast equivalent high-order adversarial attack. The proposed high-order adversarial attack can be extensively integrated with transferability augmentation methods to generate high transferable AEs. Extensive experiments demonstrate that the RK-based attacks exhibit higher transferability than the state of the arts.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"1927-1939"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979816","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MFF-YOLO: An Improved YOLO Algorithm Based on Multi-Scale Semantic Feature Fusion MFF-YOLO:基于多尺度语义特征融合的改进YOLO算法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010097
Junsan Zhang;Chenyang Xu;Shigen Shen;Jie Zhu;Peiying Zhang
The YOLOv5 algorithm is widely used in edge computing systems for object detection. However, the limited computing resources of embedded devices and the large model size of existing deep learning based methods increase the difficulty of real-time object detection on edge devices. To address this issue, we propose a smaller, less computationally intensive, and more accurate algorithm for object detection. Multi-scale Feature Fusion-YOLO (MFF-YOLO) is built on top of the YOLOv5s framework, but it contains substantial improvements to YOLOv5s. First, we design the MFF module to improve the feature propagation path in the feature pyramid, which further integrates the semantic information from different paths of feature layers. Then, a large convolution-kernel module is used in the bottleneck. The structure enlarges the receptive field and preserves shallow semantic information, which overcomes the performance limitation arising from uneven propagation in Feature Pyramid Networks (FPN). In addition, a multi-branch downsampling method based on depthwise separable convolutions and a bottleneck structure with deformable convolutions are designed to reduce the complexity of the backbone network and minimize the real-time performance loss caused by the increased model complexity. The experimental results on PASCAL VOC and MS COCO datasets show that, compared with YOLOv5s, MFF-YOLO reduces the number of parameters by 7% and the number of FLoating point Operations Per second (FLOPs) by 11.8%. The mAP@0.5 has improved by 3.7% and 5.5%, and the mAP@0.5:0.95 has improved by 6.5% and 6.2%, respetively. Furthermore, compared with YOLOv7-tiny, PP-YOLO-tiny, and other mainstream methods, MFF-YOLO has achieved better results on multiple indicators.
YOLOv5算法广泛应用于边缘计算系统中进行目标检测。然而,嵌入式设备有限的计算资源和现有基于深度学习的方法的大模型尺寸增加了边缘设备上实时目标检测的难度。为了解决这个问题,我们提出了一个更小、计算量更少、更准确的目标检测算法。多尺度特征融合- yolo (MFF-YOLO)是建立在YOLOv5s框架之上的,但它包含了对YOLOv5s的实质性改进。首先,我们设计了MFF模块,改进了特征金字塔中的特征传播路径,进一步整合了特征层不同路径的语义信息。然后,在瓶颈中使用了一个大的卷积核模块。该结构扩大了接收野并保留了浅层语义信息,克服了特征金字塔网络(FPN)中传播不均匀所带来的性能限制。此外,设计了基于深度可分离卷积的多分支下采样方法和具有可变形卷积的瓶颈结构,以降低骨干网的复杂性,最大限度地降低模型复杂性增加带来的实时性能损失。在PASCAL VOC和MS COCO数据集上的实验结果表明,与YOLOv5s相比,MFF-YOLO减少了7%的参数个数,每秒浮点运算次数(FLOPs)减少了11.8%。mAP@0.5分别提高3.7%和5.5%,mAP@0.5:0.95分别提高6.5%和6.2%。此外,与YOLOv7-tiny、pp - yoloo -tiny等主流方法相比,MFF-YOLO在多个指标上都取得了更好的效果。
{"title":"MFF-YOLO: An Improved YOLO Algorithm Based on Multi-Scale Semantic Feature Fusion","authors":"Junsan Zhang;Chenyang Xu;Shigen Shen;Jie Zhu;Peiying Zhang","doi":"10.26599/TST.2024.9010097","DOIUrl":"https://doi.org/10.26599/TST.2024.9010097","url":null,"abstract":"The YOLOv5 algorithm is widely used in edge computing systems for object detection. However, the limited computing resources of embedded devices and the large model size of existing deep learning based methods increase the difficulty of real-time object detection on edge devices. To address this issue, we propose a smaller, less computationally intensive, and more accurate algorithm for object detection. Multi-scale Feature Fusion-YOLO (MFF-YOLO) is built on top of the YOLOv5s framework, but it contains substantial improvements to YOLOv5s. First, we design the MFF module to improve the feature propagation path in the feature pyramid, which further integrates the semantic information from different paths of feature layers. Then, a large convolution-kernel module is used in the bottleneck. The structure enlarges the receptive field and preserves shallow semantic information, which overcomes the performance limitation arising from uneven propagation in Feature Pyramid Networks (FPN). In addition, a multi-branch downsampling method based on depthwise separable convolutions and a bottleneck structure with deformable convolutions are designed to reduce the complexity of the backbone network and minimize the real-time performance loss caused by the increased model complexity. The experimental results on PASCAL VOC and MS COCO datasets show that, compared with YOLOv5s, MFF-YOLO reduces the number of parameters by 7% and the number of FLoating point Operations Per second (FLOPs) by 11.8%. The mAP@0.5 has improved by 3.7% and 5.5%, and the mAP@0.5:0.95 has improved by 6.5% and 6.2%, respetively. Furthermore, compared with YOLOv7-tiny, PP-YOLO-tiny, and other mainstream methods, MFF-YOLO has achieved better results on multiple indicators.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2097-2113"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979796","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DQN-Based Edge Offloading Method for Smart City Pollution Control 基于dqn的智慧城市污染控制边缘卸载方法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010105
Jiajie Xu;Haolong Xiang;Shaobo Zang;Muhammad Bilal;Maqbool Khan;Guangming Cui
Smart city pollution control is fundamental to urban sustainability, which relies extensively on physical infrastructure such as sensors and cameras for real-time monitoring. Generally, monitoring data needs to be transmitted to centralized servers for pollution control service determination. In order to achieve highly efficient service quality, edge computing is involved in the smart city pollution control system (SCPCS) as it provides computational capabilities near the monitoring devices and low-latency pollution control services. However, considering the diversity of service requests, determination of offloading destination is a crucial challenge for SCPCS. In this paper, A Deep Q-Network (DQN)-based edge offloading method, called N-DEO, is proposed. Initially, N-DEO employs neural hierarchical interpolation for time series forecasting (N-HITS) to forecast pollution control service requests. Afterwards, an epsilon-greedy policy is designed to select actions. Finally, the optimal service offloading strategy is determined by the DQN algorithm. Experimental results demonstrate that N-DEO achieves the higher performance on service latency and system load compared with the current state-of-the-art methods.
智能城市污染控制是城市可持续发展的基础,它广泛依赖于传感器和摄像头等物理基础设施进行实时监控。一般情况下,监测数据需要传输到集中的服务器,以确定污染控制服务。为了实现高效的服务质量,智能城市污染控制系统(SCPCS)涉及边缘计算,因为它提供了靠近监控设备的计算能力和低延迟的污染控制服务。然而,考虑到服务请求的多样性,卸载目的地的确定是SCPCS面临的一个关键挑战。本文提出了一种基于深度q网络(Deep Q-Network, DQN)的边缘卸载方法N-DEO。最初,N-DEO采用神经分层插值时间序列预测(N-HITS)来预测污染控制服务请求。然后,设计一个贪心策略来选择动作。最后,利用DQN算法确定最优服务卸载策略。实验结果表明,与现有方法相比,N-DEO在服务延迟和系统负载方面具有更高的性能。
{"title":"A DQN-Based Edge Offloading Method for Smart City Pollution Control","authors":"Jiajie Xu;Haolong Xiang;Shaobo Zang;Muhammad Bilal;Maqbool Khan;Guangming Cui","doi":"10.26599/TST.2024.9010105","DOIUrl":"https://doi.org/10.26599/TST.2024.9010105","url":null,"abstract":"Smart city pollution control is fundamental to urban sustainability, which relies extensively on physical infrastructure such as sensors and cameras for real-time monitoring. Generally, monitoring data needs to be transmitted to centralized servers for pollution control service determination. In order to achieve highly efficient service quality, edge computing is involved in the smart city pollution control system (SCPCS) as it provides computational capabilities near the monitoring devices and low-latency pollution control services. However, considering the diversity of service requests, determination of offloading destination is a crucial challenge for SCPCS. In this paper, A Deep Q-Network (DQN)-based edge offloading method, called N-DEO, is proposed. Initially, N-DEO employs neural hierarchical interpolation for time series forecasting (N-HITS) to forecast pollution control service requests. Afterwards, an epsilon-greedy policy is designed to select actions. Finally, the optimal service offloading strategy is determined by the DQN algorithm. Experimental results demonstrate that N-DEO achieves the higher performance on service latency and system load compared with the current state-of-the-art methods.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2227-2242"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979785","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble Learning Model Based on Three-Way Decision for Concept Drift Adaptation 基于三向决策的概念漂移自适应集成学习模型
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010085
Dayong Deng;Wenxin Shen;Zhixuan Deng;Tianrui Li;Anjin Liu
The ensemble learning model can effectively detect drift and utilize diversity to improve the performance of adapting to drift. However, local concept drift can occur in different types at different time points, causing basic learners are difficult to distinguish the drift of local boundaries, and the drift range is difficult to determine. Thus, the ensemble learning model to adapt local concept drifts is still challenging problem. Moreover, there are often differences in decision boundaries after drift adaptation, and employing overall diversity measurement is inappropriate. To address these two issues, this paper proposes a novel ensemble learning model called instance-weighted ensemble learning based on the three-way decision (IWE-TWD). In IWE-TWD, a divide-and-conquer strategy is employed to handle uncertain drift and to select base learners; Density clustering dynamically constructs density regions to lock drift range; Three-way decision is adopted to estimate whether the region distribution changes, and the instance is weighted with the probability of region distribution change; The diversities between base learners are determined with three-way decision also. Experimental results show that IWE-TWD has better performance than the state-of-the-art models in data stream classification on ten synthetic data sets and seven real-world data sets.
集成学习模型可以有效地检测漂移,并利用多样性提高对漂移的适应性能。然而,不同类型的局部概念漂移会在不同的时间点发生,导致基础学习者难以区分局部边界的漂移,漂移范围难以确定。因此,适应局部概念漂移的集成学习模型仍然是一个具有挑战性的问题。此外,漂移适应后的决策边界往往存在差异,采用整体多样性测量是不合适的。为了解决这两个问题,本文提出了一种新的集成学习模型,称为基于三向决策的实例加权集成学习(IWE-TWD)。在IWE-TWD中,采用分治策略处理不确定漂移和选择基础学习器;密度聚类动态构建密度区域锁定漂移范围;采用三向决策来估计区域分布是否发生变化,并用区域分布发生变化的概率对实例进行加权;基础学习器之间的差异性也由三向决策决定。实验结果表明,IWE-TWD在10个合成数据集和7个真实数据集上的数据流分类性能优于目前最先进的模型。
{"title":"An Ensemble Learning Model Based on Three-Way Decision for Concept Drift Adaptation","authors":"Dayong Deng;Wenxin Shen;Zhixuan Deng;Tianrui Li;Anjin Liu","doi":"10.26599/TST.2024.9010085","DOIUrl":"https://doi.org/10.26599/TST.2024.9010085","url":null,"abstract":"The ensemble learning model can effectively detect drift and utilize diversity to improve the performance of adapting to drift. However, local concept drift can occur in different types at different time points, causing basic learners are difficult to distinguish the drift of local boundaries, and the drift range is difficult to determine. Thus, the ensemble learning model to adapt local concept drifts is still challenging problem. Moreover, there are often differences in decision boundaries after drift adaptation, and employing overall diversity measurement is inappropriate. To address these two issues, this paper proposes a novel ensemble learning model called instance-weighted ensemble learning based on the three-way decision (IWE-TWD). In IWE-TWD, a divide-and-conquer strategy is employed to handle uncertain drift and to select base learners; Density clustering dynamically constructs density regions to lock drift range; Three-way decision is adopted to estimate whether the region distribution changes, and the instance is weighted with the probability of region distribution change; The diversities between base learners are determined with three-way decision also. Experimental results show that IWE-TWD has better performance than the state-of-the-art models in data stream classification on ten synthetic data sets and seven real-world data sets.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2029-2047"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ComPact: Edge Collaborative Spatiotemporal Graph Learning for Wind Speed Forecasting 紧凑:用于风速预报的边缘协同时空图学习
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010261
Zaigang Gong;Siyu Chen;Qiangsheng Dai;Ying Feng;Jinghui Zhang
In edge-distributed environments, spatiotemporal graphs provide a promising solution for capturing the complex dependencies among nodes and edges necessary for accurate wind speed forecasting. These dependencies involve spatial and temporal interactions that are crucial for modeling dynamic weather patterns. However, challenges, such as effectively maintaining spatial dependency information across spatiotemporal subgraphs, can lead to reduced prediction accuracy. Additionally, managing high communication costs, associated with the need for frequent and intensive data exchanges required for real-time forecasting across distributed nodes, poses significant hurdles. To address these issues, we propose graph coarsening-based cross-subgraph message passing with edge collaboration training mechanism (namely ComPact), a novel approach that simplifies graph structures through graph coarsening while preserving essential spatiotemporal dependencies. This coarsening process minimizes communication overhead and enables effective cross-subgraph message passing, capturing both local and long-range dependencies. ComPact further leverages hierarchical graph learning and structured edge collaboration to integrate global information into local subgraphs, enhancing predictive performance. Experimental validation on large-scale datasets, primarily the WindPower dataset, demonstrates ComPact's superiority in wind speed forecasting, with up to a 31.82% reduction in Mean Absolute Error (MAE) and 11.8% lower in Mean Absolute Percentage Error (MAPE) compared to federated learning baselines.
在边缘分布的环境中,时空图为捕获节点和边缘之间的复杂依赖关系提供了一个很有前途的解决方案,这是准确预测风速所必需的。这些依赖关系涉及对动态天气模式建模至关重要的空间和时间相互作用。然而,诸如跨时空子图有效维护空间依赖信息等挑战可能导致预测精度降低。此外,管理高通信成本,以及跨分布式节点进行实时预测所需的频繁和密集的数据交换,构成了重大障碍。为了解决这些问题,我们提出了基于图粗化的跨子图消息传递和边缘协作训练机制(即ComPact),这是一种通过图粗化简化图结构的新方法,同时保留了基本的时空依赖性。这种粗化过程使通信开销最小化,并支持有效的跨子图消息传递,捕获本地和远程依赖关系。ComPact进一步利用分层图学习和结构化边缘协作将全局信息集成到局部子图中,从而提高预测性能。在大规模数据集(主要是WindPower数据集)上的实验验证证明了ComPact在风速预测方面的优势,与联邦学习基线相比,平均绝对误差(MAE)降低了31.82%,平均绝对百分比误差(MAPE)降低了11.8%。
{"title":"ComPact: Edge Collaborative Spatiotemporal Graph Learning for Wind Speed Forecasting","authors":"Zaigang Gong;Siyu Chen;Qiangsheng Dai;Ying Feng;Jinghui Zhang","doi":"10.26599/TST.2024.9010261","DOIUrl":"https://doi.org/10.26599/TST.2024.9010261","url":null,"abstract":"In edge-distributed environments, spatiotemporal graphs provide a promising solution for capturing the complex dependencies among nodes and edges necessary for accurate wind speed forecasting. These dependencies involve spatial and temporal interactions that are crucial for modeling dynamic weather patterns. However, challenges, such as effectively maintaining spatial dependency information across spatiotemporal subgraphs, can lead to reduced prediction accuracy. Additionally, managing high communication costs, associated with the need for frequent and intensive data exchanges required for real-time forecasting across distributed nodes, poses significant hurdles. To address these issues, we propose graph coarsening-based cross-subgraph message passing with edge collaboration training mechanism (namely ComPact), a novel approach that simplifies graph structures through graph coarsening while preserving essential spatiotemporal dependencies. This coarsening process minimizes communication overhead and enables effective cross-subgraph message passing, capturing both local and long-range dependencies. ComPact further leverages hierarchical graph learning and structured edge collaboration to integrate global information into local subgraphs, enhancing predictive performance. Experimental validation on large-scale datasets, primarily the WindPower dataset, demonstrates ComPact's superiority in wind speed forecasting, with up to a 31.82% reduction in Mean Absolute Error (MAE) and 11.8% lower in Mean Absolute Percentage Error (MAPE) compared to federated learning baselines.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2320-2341"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979814","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Innovative Algorithm for Attacking Symmetric Ciphers Using D-Wave Quantum Annealing 一种利用d波量子退火攻击对称密码的创新算法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010231
Zhi Pei;Chunlei Hong;Fen Xia;Chao Wang
Quantum computing is generally considered non-threatening to symmetric ciphers. Quantum attacks on symmetric ciphers require a thorough analysis of their internal structures, posing considerable difficulties and challenges. As of 2023, Google's quantum supremacy chip, Sycamore, is still incapable of cryptanalysis. Leveraging D-Wave's quantum annealing exploits the unique quantum tunneling effect, providing an edge in solving combinatorial optimization problems. It can be regarded as a class of artificial intelligence algorithm that can achieve global optimization. We propose a quantum heuristic symmetric cipher attack algorithm for substitution-permutation network (SPN) symmetric ciphers, which transforms the plaintext-ciphertext propagation rules within SPN structure into the problem of solving a constrained quadratic model (CQM). A novel reduction algorithm is employed to eliminate redundant constraint conditions. The D-Wave Advantage quantum computer is used to recover the encryption sub-keys. Using the quantum approximate optimization algorithm, IBM Q Experience can only recover two rounds of the Heys Cipher sub-key, whereas D-Wave Advantage achieves complete key recovery, validating its potential in quantum symmetric cipher attacks.
量子计算通常被认为对对称密码没有威胁。对对称密码的量子攻击需要对其内部结构进行彻底的分析,这带来了相当大的困难和挑战。截至2023年,谷歌的量子霸权芯片Sycamore仍然无法进行密码分析。利用D-Wave的量子退火技术,利用独特的量子隧道效应,为解决组合优化问题提供了优势。它可以看作是一类可以实现全局优化的人工智能算法。提出了一种针对替换置换网络(SPN)对称密码的量子启发式对称密码攻击算法,该算法将替换置换网络(SPN)结构内明文-密文传播规则转化为求解约束二次模型(CQM)问题。采用一种新的约简算法消除冗余约束条件。使用D-Wave Advantage量子计算机恢复加密子密钥。使用量子近似优化算法,IBM Q Experience只能恢复两轮Heys Cipher子密钥,而D-Wave Advantage实现了完整的密钥恢复,验证了其在量子对称密码攻击中的潜力。
{"title":"An Innovative Algorithm for Attacking Symmetric Ciphers Using D-Wave Quantum Annealing","authors":"Zhi Pei;Chunlei Hong;Fen Xia;Chao Wang","doi":"10.26599/TST.2024.9010231","DOIUrl":"https://doi.org/10.26599/TST.2024.9010231","url":null,"abstract":"Quantum computing is generally considered non-threatening to symmetric ciphers. Quantum attacks on symmetric ciphers require a thorough analysis of their internal structures, posing considerable difficulties and challenges. As of 2023, Google's quantum supremacy chip, Sycamore, is still incapable of cryptanalysis. Leveraging D-Wave's quantum annealing exploits the unique quantum tunneling effect, providing an edge in solving combinatorial optimization problems. It can be regarded as a class of artificial intelligence algorithm that can achieve global optimization. We propose a quantum heuristic symmetric cipher attack algorithm for substitution-permutation network (SPN) symmetric ciphers, which transforms the plaintext-ciphertext propagation rules within SPN structure into the problem of solving a constrained quadratic model (CQM). A novel reduction algorithm is employed to eliminate redundant constraint conditions. The D-Wave Advantage quantum computer is used to recover the encryption sub-keys. Using the quantum approximate optimization algorithm, IBM Q Experience can only recover two rounds of the Heys Cipher sub-key, whereas D-Wave Advantage achieves complete key recovery, validating its potential in quantum symmetric cipher attacks.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2184-2194"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979788","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing Depth of Graph-Structured Convolutional Neural Networks with Efficient Pathway Usage for Remote Sensing 基于有效路径的图结构卷积神经网络深度最大化遥感研究
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010102
Difeng Wang;Liangming Chen;Fang Gong;Qiankun Zhu
Recently, Randomly Wired Neural Networks (RWNNs) using random graphs for Convolutional Neural Network (CNN) construction have shown efficient layer connectivity, but may limit depth, affecting approximation, generalization, and robustness. In this work, we increase the depth of graph-structured CNNs while maintaining efficient pathway usage, which is achieved by building a feature-extraction backbone with a depth-first search, employing edges that have not been traversed for parameter-efficient skip connections. The proposed Efficiently Pathed Deep Network (EPDN) reaches maximum graph-based architecture depth without redundant node use, ensuring feature propagation with reduced connectivity. The deep structure of EPDN, coupled with its efficient pathway usage, allows for a nuanced feature extraction. EPDN is highly beneficial for processing remote sensing images, as its performance relies on the ability to resolve intricate spatial details. EPDN facilitates this by preserving low-level details through its deep and efficient skip connections, allowing for enhanced feature extraction. Additionally, the remote-sensing-adapted EPDN variant is akin to a special case of a multistep method for solving an Ordinary Differential Equation (ODE), leveraging historical data for improved prediction. EPDN outperforms existing CNNs in generalization and robustness on image classification benchmarks and remote sensing tasks. The source code is publicly available at https://github.com/AnonymousGithubLink/EPDN.
最近,使用随机图构建卷积神经网络(CNN)的随机连线神经网络(RWNNs)显示出有效的层连通性,但可能会限制深度,影响近似、泛化和鲁棒性。在这项工作中,我们增加了图结构cnn的深度,同时保持了有效的路径使用,这是通过使用深度优先搜索构建特征提取主干来实现的,该主干使用未遍历的边缘来进行参数高效的跳过连接。提出的高效路径深度网络(EPDN)在不使用冗余节点的情况下达到最大的基于图的架构深度,在减少连接的情况下确保特征传播。EPDN的深层结构,加上其有效的通路使用,允许细微的特征提取。EPDN对遥感图像处理非常有利,因为它的性能依赖于对复杂空间细节的解析能力。EPDN通过其深度和高效的跳过连接来保留低级细节,从而增强了特征提取。此外,适应遥感的EPDN变体类似于求解常微分方程(ODE)的多步骤方法的特殊情况,利用历史数据来改进预测。EPDN在图像分类基准和遥感任务上的泛化和鲁棒性优于现有cnn。源代码可在https://github.com/AnonymousGithubLink/EPDN上公开获得。
{"title":"Maximizing Depth of Graph-Structured Convolutional Neural Networks with Efficient Pathway Usage for Remote Sensing","authors":"Difeng Wang;Liangming Chen;Fang Gong;Qiankun Zhu","doi":"10.26599/TST.2024.9010102","DOIUrl":"https://doi.org/10.26599/TST.2024.9010102","url":null,"abstract":"Recently, Randomly Wired Neural Networks (RWNNs) using random graphs for Convolutional Neural Network (CNN) construction have shown efficient layer connectivity, but may limit depth, affecting approximation, generalization, and robustness. In this work, we increase the depth of graph-structured CNNs while maintaining efficient pathway usage, which is achieved by building a feature-extraction backbone with a depth-first search, employing edges that have not been traversed for parameter-efficient skip connections. The proposed Efficiently Pathed Deep Network (EPDN) reaches maximum graph-based architecture depth without redundant node use, ensuring feature propagation with reduced connectivity. The deep structure of EPDN, coupled with its efficient pathway usage, allows for a nuanced feature extraction. EPDN is highly beneficial for processing remote sensing images, as its performance relies on the ability to resolve intricate spatial details. EPDN facilitates this by preserving low-level details through its deep and efficient skip connections, allowing for enhanced feature extraction. Additionally, the remote-sensing-adapted EPDN variant is akin to a special case of a multistep method for solving an Ordinary Differential Equation (ODE), leveraging historical data for improved prediction. EPDN outperforms existing CNNs in generalization and robustness on image classification benchmarks and remote sensing tasks. The source code is publicly available at https://github.com/AnonymousGithubLink/EPDN.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"1940-1953"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979817","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Very Compact and a Threshold Implementation of uBlock for Internet of Things 物联网uBlock的一种非常紧凑的阈值实现
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-04-29 DOI: 10.26599/TST.2024.9010257
Botao Liu;Ming Tang
The rapid proliferation of Internet of Things (IoT) devices necessitates lightweight cryptographic algorithms and their secure physical implementations. Masking, as a provably secure countermeasure against Side-Channel Attacks (SCA), has been extensively studied in the context of lightweight cryptography algorithms. Currently, some cryptographers have proposed a low-cost Threshold Implementation (TI) of the uBlock algorithm. However, their approach suffers from significant area overhead due to the inefficient serial and pipelined implementation of uBlock's Pshufb-Xor (PX) network structure. To address this issue, we develop a new serial and pipelined implementation method that optimizes the area of the uBlock algorithm. Based on this optimization, we implement a 2-share TI scheme for uBlock that requires minimal area resources and does not need fresh randomness. Compared to the state-of-the-art appoach, our method reduces slice area by 63.4% on Field Programmable Gate Arrays (FPGA) platform and Gate Equivalent (GE) area by 17.2% on Application-Specific Integrated Circuit (ASIC) platform for the unprotected implementation. For the protected implementation, our method reduces slice area by 41.5% and GE area by 14.0%. Finally, our protection scheme is validated using the automated tool PROLEAD and evaluated with Test Vector Leakage Assessment (TVLA), achieving first-order glitch-extended probing security.
物联网(IoT)设备的快速扩散需要轻量级加密算法及其安全的物理实现。掩蔽作为一种可证明的对抗侧信道攻击(SCA)的安全对策,在轻量级加密算法中得到了广泛的研究。目前,一些密码学家提出了uBlock算法的低成本阈值实现(TI)。然而,由于uBlock的Pshufb-Xor (PX)网络结构的串行和流水线实现效率低下,他们的方法遭受了巨大的面积开销。为了解决这个问题,我们开发了一种新的串行和流水线实现方法,优化了uBlock算法的面积。基于此优化,我们实现了一个2-share的uBlock TI方案,该方案需要最小的面积资源,不需要新的随机性。与最先进的方法相比,我们的方法在现场可编程门阵列(FPGA)平台上减少了63.4%的切片面积,在专用集成电路(ASIC)平台上减少了17.2%的等效门(GE)面积。对于受保护的实现,我们的方法减少了41.5%的切片面积和14.0%的GE面积。最后,使用自动化工具PROLEAD验证了我们的保护方案,并使用测试向量泄漏评估(TVLA)进行了评估,实现了一阶故障扩展探测安全性。
{"title":"A Very Compact and a Threshold Implementation of uBlock for Internet of Things","authors":"Botao Liu;Ming Tang","doi":"10.26599/TST.2024.9010257","DOIUrl":"https://doi.org/10.26599/TST.2024.9010257","url":null,"abstract":"The rapid proliferation of Internet of Things (IoT) devices necessitates lightweight cryptographic algorithms and their secure physical implementations. Masking, as a provably secure countermeasure against Side-Channel Attacks (SCA), has been extensively studied in the context of lightweight cryptography algorithms. Currently, some cryptographers have proposed a low-cost Threshold Implementation (TI) of the uBlock algorithm. However, their approach suffers from significant area overhead due to the inefficient serial and pipelined implementation of uBlock's Pshufb-Xor (PX) network structure. To address this issue, we develop a new serial and pipelined implementation method that optimizes the area of the uBlock algorithm. Based on this optimization, we implement a 2-share TI scheme for uBlock that requires minimal area resources and does not need fresh randomness. Compared to the state-of-the-art appoach, our method reduces slice area by 63.4% on Field Programmable Gate Arrays (FPGA) platform and Gate Equivalent (GE) area by 17.2% on Application-Specific Integrated Circuit (ASIC) platform for the unprotected implementation. For the protected implementation, our method reduces slice area by 41.5% and GE area by 14.0%. Finally, our protection scheme is validated using the automated tool PROLEAD and evaluated with Test Vector Leakage Assessment (TVLA), achieving first-order glitch-extended probing security.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 5","pages":"2270-2283"},"PeriodicalIF":6.6,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10979790","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Tsinghua Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1