首页 > 最新文献

ACM Transactions on Intelligent Systems and Technology最新文献

英文 中文
Neural Methods for Data-to-text Generation 数据到文本生成的神经方法
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-05-08 DOI: 10.1145/3660639
Mandar Sharma, Ajay Kumar Gogineni, Naren Ramakrishnan

The neural boom that has sparked natural language processing (NLP) research throughout the last decade has similarly led to significant innovations in data-to-text generation (D2T). This survey offers a consolidated view into the neural D2T paradigm with a structured examination of the approaches, benchmark datasets, and evaluation protocols. This survey draws boundaries separating D2T from the rest of the natural language generation (NLG) landscape, encompassing an up-to-date synthesis of the literature, and highlighting the stages of technological adoption from within and outside the greater NLG umbrella. With this holistic view, we highlight promising avenues for D2T research that not only focus on the design of linguistically capable systems but also systems that exhibit fairness and accountability.

过去十年间,神经技术的蓬勃发展推动了自然语言处理(NLP)研究的发展,同样也带来了数据到文本生成(D2T)领域的重大创新。本调查通过对各种方法、基准数据集和评估协议的结构化审查,为神经 D2T 范例提供了一个综合视角。本调查将 D2T 与自然语言生成(NLG)的其他领域区分开来,包括最新的文献综述,并强调了自然语言生成领域内外的技术应用阶段。通过这种全面的视角,我们强调了 D2T 研究的前景,这些研究不仅关注语言能力系统的设计,还关注展现公平性和问责制的系统。
{"title":"Neural Methods for Data-to-text Generation","authors":"Mandar Sharma, Ajay Kumar Gogineni, Naren Ramakrishnan","doi":"10.1145/3660639","DOIUrl":"https://doi.org/10.1145/3660639","url":null,"abstract":"<p>The neural boom that has sparked natural language processing (NLP) research throughout the last decade has similarly led to significant innovations in data-to-text generation (D2T). This survey offers a consolidated view into the neural D2T paradigm with a structured examination of the approaches, benchmark datasets, and evaluation protocols. This survey draws boundaries separating D2T from the rest of the natural language generation (NLG) landscape, encompassing an up-to-date synthesis of the literature, and highlighting the stages of technological adoption from within and outside the greater NLG umbrella. With this holistic view, we highlight promising avenues for D2T research that not only focus on the design of linguistically capable systems but also systems that exhibit fairness and accountability.</p>","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Time Series Forecasting Models with Generative Large Language Models 利用生成式大型语言模型开发时间序列预测模型
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-05-07 DOI: 10.1145/3663485
Juan Morales-García, Antonio Llanes, Francisco Arcas-Túnez, Fernando Terroso-Sáenz

Nowadays, Generative Large Language Models (GLLMs) have made a significant impact in the field of Artificial Intelligence (AI). One of the domains extensively explored for these models is their ability as generators of functional source code for software projects. Nevertheless, their potential as assistants to write the code needed to generate and model Machine Learning (ML) or Deep Learning (DL) architectures has not been fully explored to date. For this reason, this work focuses on evaluating the extent to which different tools based on GLLMs, such as ChatGPT or Copilot, are able to correctly define the source code necessary to generate viable predictive models. The use case defined is the forecasting of a time series that reports the indoor temperature of a greenhouse. The results indicate that, while it is possible to achieve good accuracy metrics with simple predictive models generated by GLLMs, the composition of predictive models with complex architectures using GLLMs is still far from improving the accuracy of predictive models generated by human data scientists.

如今,生成式大型语言模型(GLLMs)在人工智能(AI)领域产生了重大影响。这些模型被广泛探索的领域之一是它们作为软件项目功能源代码生成器的能力。然而,迄今为止,它们作为编写生成机器学习(ML)或深度学习(DL)架构所需的代码的助手的潜力尚未得到充分挖掘。因此,这项工作的重点是评估基于 GLLM 的不同工具(如 ChatGPT 或 Copilot)在多大程度上能够正确定义生成可行预测模型所需的源代码。所定义的用例是预测报告温室室内温度的时间序列。结果表明,虽然使用 GLLMs 生成的简单预测模型可以达到很好的准确度指标,但使用 GLLMs 组成具有复杂架构的预测模型仍然远远无法提高人类数据科学家生成的预测模型的准确度。
{"title":"Developing Time Series Forecasting Models with Generative Large Language Models","authors":"Juan Morales-García, Antonio Llanes, Francisco Arcas-Túnez, Fernando Terroso-Sáenz","doi":"10.1145/3663485","DOIUrl":"https://doi.org/10.1145/3663485","url":null,"abstract":"<p>Nowadays, Generative Large Language Models (GLLMs) have made a significant impact in the field of Artificial Intelligence (AI). One of the domains extensively explored for these models is their ability as generators of functional source code for software projects. Nevertheless, their potential as assistants to write the code needed to generate and model Machine Learning (ML) or Deep Learning (DL) architectures has not been fully explored to date. For this reason, this work focuses on evaluating the extent to which different tools based on GLLMs, such as ChatGPT or Copilot, are able to correctly define the source code necessary to generate viable predictive models. The use case defined is the forecasting of a time series that reports the indoor temperature of a greenhouse. The results indicate that, while it is possible to achieve good accuracy metrics with simple predictive models generated by GLLMs, the composition of predictive models with complex architectures using GLLMs is still far from improving the accuracy of predictive models generated by human data scientists.</p>","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIRECT: Dual Interpretable Recommendation with Multi-aspect Word Attribution DIRECT:具有多方面词语归属的双重可解释推荐
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-05-06 DOI: 10.1145/3663483
Xuansheng Wu, Hanqin Wan, Qiaoyu Tan, Wenlin Yao, Ninghao Liu

Recommending products to users with intuitive explanations helps improve the system in transparency, persuasiveness, and satisfaction. Existing interpretation techniques include post-hoc methods and interpretable modeling. The former category could quantitatively analyze input contribution to model prediction but has limited interpretation faithfulness, while the latter could explain model internal mechanisms but may not directly attribute model predictions to input features. In this study, we propose a novel Dual Interpretable Recommendation model called DIRECT, which integrates ideas of the two interpretation categories to inherit their advantages and avoid limitations. Specifically, DIRECT makes use of item descriptions as explainable evidence for recommendation. First, similar to the post-hoc interpretation, DIRECT could attribute the prediction of a user preference score to textual words of the item descriptions. The attribution of each word is related to its sentiment polarity and word importance, where a word is important if it corresponds to an item aspect that the user is interested in. Second, to improve the interpretability of embedding space, we propose to extract high-level concepts from embeddings, where each concept corresponds to an item aspect. To learn discriminative concepts, we employ a concept-bottleneck layer, and maximize the coding rate reduction on word-aspect embeddings by leveraging a word-word affinity graph extracted from a pre-trained language model. In this way, DIRECT simultaneously achieves faithful attribution and usable interpretation of embedding space. We also show that DIRECT achieves linear inference time complexity regarding the length of item reviews. We conduct experiments including ablation studies on five real-world datasets. Quantitative analysis, visualizations, and case studies verify the interpretability of DIRECT. Our code is available at: https://github.com/JacksonWuxs/DIRECT.

通过直观的解释向用户推荐产品有助于提高系统的透明度、说服力和满意度。现有的解释技术包括事后方法和可解释建模。前者可以定量分析输入对模型预测的贡献,但解释的忠实性有限;后者可以解释模型的内部机制,但可能无法将模型预测直接归因于输入特征。在本研究中,我们提出了一种名为 DIRECT 的新型双重可解释推荐模型,它整合了两种解释类别的思想,继承了它们的优点,避免了它们的局限性。具体来说,DIRECT 利用项目描述作为可解释的推荐证据。首先,与事后解释类似,DIRECT 可以将用户偏好分数的预测归因于项目描述中的文字词句。每个词的归因都与其情感极性和词的重要性有关,如果一个词与用户感兴趣的项目方面相对应,那么这个词就是重要的。其次,为了提高嵌入空间的可解释性,我们建议从嵌入中提取高级概念,每个概念对应一个项目方面。为了学习辨别概念,我们采用了一个概念瓶颈层,并利用从预先训练的语言模型中提取的词-词亲和图,最大限度地降低词-词嵌入的编码率。这样,DIRECT 就能同时实现嵌入空间的忠实归属和可用解释。我们还证明,DIRECT 在项目评论长度方面实现了线性推理时间复杂性。我们在五个真实世界数据集上进行了实验,包括消融研究。定量分析、可视化和案例研究验证了 DIRECT 的可解释性。我们的代码可在以下网址获取:https://github.com/JacksonWuxs/DIRECT。
{"title":"DIRECT: Dual Interpretable Recommendation with Multi-aspect Word Attribution","authors":"Xuansheng Wu, Hanqin Wan, Qiaoyu Tan, Wenlin Yao, Ninghao Liu","doi":"10.1145/3663483","DOIUrl":"https://doi.org/10.1145/3663483","url":null,"abstract":"<p>Recommending products to users with intuitive explanations helps improve the system in transparency, persuasiveness, and satisfaction. Existing interpretation techniques include post-hoc methods and interpretable modeling. The former category could quantitatively analyze input contribution to model prediction but has limited interpretation faithfulness, while the latter could explain model internal mechanisms but may not directly attribute model predictions to input features. In this study, we propose a novel <underline>D</underline>ual <underline>I</underline>nterpretable <underline>Rec</underline>ommenda<underline>t</underline>ion model called DIRECT, which integrates ideas of the two interpretation categories to inherit their advantages and avoid limitations. Specifically, DIRECT makes use of item descriptions as explainable evidence for recommendation. First, similar to the post-hoc interpretation, DIRECT could attribute the prediction of a user preference score to textual words of the item descriptions. The attribution of each word is related to its sentiment polarity and word importance, where a word is important if it corresponds to an item aspect that the user is interested in. Second, to improve the interpretability of embedding space, we propose to extract high-level concepts from embeddings, where each concept corresponds to an item aspect. To learn discriminative concepts, we employ a concept-bottleneck layer, and maximize the coding rate reduction on word-aspect embeddings by leveraging a word-word affinity graph extracted from a pre-trained language model. In this way, DIRECT simultaneously achieves faithful attribution and usable interpretation of embedding space. We also show that DIRECT achieves linear inference time complexity regarding the length of item reviews. We conduct experiments including ablation studies on five real-world datasets. Quantitative analysis, visualizations, and case studies verify the interpretability of DIRECT. Our code is available at: https://github.com/JacksonWuxs/DIRECT.</p>","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140887025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing Data Challenges to Drive the Transformation of Smart Cities 应对数据挑战,推动智慧城市转型
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-05-03 DOI: 10.1145/3663482
Ekaterina Gilman, Francesca Bugiotti, Ahmed Khalid, Hassan Mehmood, Panos Kostakos, Lauri Tuovinen, Johanna Ylipulli, Xiang Su, Denzil Ferreira

Cities serve as vital hubs of economic activity and knowledge generation and dissemination. As such, cities bear a significant responsibility to uphold environmental protection measures while promoting the welfare and living comfort of their residents. There are diverse views on the development of smart cities, from integrating Information and Communication Technologies into urban environments for better operational decisions to supporting sustainability, wealth, and comfort of people. However, for all these cases, data is the key ingredient and enabler for the vision and realization of smart cities. This article explores the challenges associated with smart city data. We start with gaining an understanding of the concept of a smart city, how to measure that the city is a smart one, and what architectures and platforms exist to develop one. Afterwards, we research the challenges associated with the data of the cities, including availability, heterogeneity, management, analysis, privacy, and security. Finally, we discuss ethical issues. This article aims to serve as a “one-stop shop” covering data-related issues of smart cities with references for diving deeper into particular topics of interest.

城市是经济活动、知识创造和传播的重要枢纽。因此,城市在促进居民福利和生活舒适度的同时,也承担着维护环境保护措施的重要责任。关于智慧城市的发展,从将信息和通信技术融入城市环境以做出更好的运营决策,到支持可持续发展、创造财富和提高人们的生活舒适度,存在着各种不同的观点。然而,在所有这些情况下,数据都是实现智慧城市愿景的关键要素和推动因素。本文探讨了与智慧城市数据相关的挑战。我们首先要了解智慧城市的概念,如何衡量城市是否是智慧城市,以及开发智慧城市有哪些架构和平台。然后,我们研究与城市数据相关的挑战,包括可用性、异构性、管理、分析、隐私和安全。最后,我们讨论了伦理问题。本文旨在提供 "一站式服务",涵盖与智慧城市数据相关的问题,并为深入探讨感兴趣的特定主题提供参考。
{"title":"Addressing Data Challenges to Drive the Transformation of Smart Cities","authors":"Ekaterina Gilman, Francesca Bugiotti, Ahmed Khalid, Hassan Mehmood, Panos Kostakos, Lauri Tuovinen, Johanna Ylipulli, Xiang Su, Denzil Ferreira","doi":"10.1145/3663482","DOIUrl":"https://doi.org/10.1145/3663482","url":null,"abstract":"<p>Cities serve as vital hubs of economic activity and knowledge generation and dissemination. As such, cities bear a significant responsibility to uphold environmental protection measures while promoting the welfare and living comfort of their residents. There are diverse views on the development of smart cities, from integrating Information and Communication Technologies into urban environments for better operational decisions to supporting sustainability, wealth, and comfort of people. However, for all these cases, data is the key ingredient and enabler for the vision and realization of smart cities. This article explores the challenges associated with smart city data. We start with gaining an understanding of the concept of a smart city, how to measure that the city is a smart one, and what architectures and platforms exist to develop one. Afterwards, we research the challenges associated with the data of the cities, including availability, heterogeneity, management, analysis, privacy, and security. Finally, we discuss ethical issues. This article aims to serve as a “one-stop shop” covering data-related issues of smart cities with references for diving deeper into particular topics of interest.</p>","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140834479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Robustness of Automatic Scientific Claim Verification Tools against Adversarial Rephrasing Attacks 分析自动科学主张验证工具在对抗性改写攻击时的鲁棒性
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-05-02 DOI: 10.1145/3663481
Janet Layne, Qudrat E Alahy Ratul, Edoardo Serra, Sushil Jajodia

The coronavirus pandemic has fostered an explosion of misinformation about the disease, including the risk and effectiveness of vaccination. AI tools for automatic Scientific Claim Verification (SCV) can be crucial to defeat misinformation campaigns spreading through social media channels. However, over the past years, many concerns have been raised about the robustness of AI to adversarial attacks, and the field of automatic scientific claim verification is not exempt. The risk is that such SCV tools may reinforce and legitimize the spread of fake scientific claims rather than refute them. This paper investigates the problem of generating adversarial attacks for SCV tools and shows that it is far more difficult than the generic NLP adversarial attack problem. The current NLP adversarial attack generators, when applied to SCV, often generate modified claims with entirely different meaning from the original. Even when the meaning is preserved, the modification of the generated claim is too simplistic (only a single word is changed), leaving many weaknesses of the SCV tools undiscovered. We propose T5-ParEvo, an iterative evolutionary attack generator, that is able to generate more complex and creative attacks while better preserving the semantics of the original claim. Using detailed quantitative and qualitative analysis, we demonstrate the efficacy of T5-ParEvo in comparison with existing attack generators.

冠状病毒大流行引发了有关该疾病(包括疫苗接种的风险和效果)的错误信息爆炸。用于自动科学索赔验证(SCV)的人工智能工具对于战胜通过社交媒体渠道传播的错误信息至关重要。然而,在过去几年中,人们对人工智能是否能抵御对抗性攻击提出了许多担忧,自动科学主张验证领域也不例外。风险在于,此类 SCV 工具可能会强化虚假科学主张的传播并使之合法化,而不是对其进行反驳。本文研究了为SCV工具生成对抗攻击的问题,结果表明它比一般的NLP对抗攻击问题要难得多。当前的 NLP 对抗性攻击生成器在应用于 SCV 时,往往会生成与原始含义完全不同的修改后的声明。即使保留了原意,生成的索赔修改也过于简单(只修改了一个单词),导致 SCV 工具的许多弱点未被发现。我们提出了一种迭代进化攻击生成器 T5-ParEvo,它能够生成更复杂、更有创意的攻击,同时更好地保留原始索赔的语义。通过详细的定量和定性分析,我们证明了 T5-ParEvo 与现有攻击生成器相比的功效。
{"title":"Analyzing Robustness of Automatic Scientific Claim Verification Tools against Adversarial Rephrasing Attacks","authors":"Janet Layne, Qudrat E Alahy Ratul, Edoardo Serra, Sushil Jajodia","doi":"10.1145/3663481","DOIUrl":"https://doi.org/10.1145/3663481","url":null,"abstract":"<p>The coronavirus pandemic has fostered an explosion of misinformation about the disease, including the risk and effectiveness of vaccination. AI tools for automatic Scientific Claim Verification (SCV) can be crucial to defeat misinformation campaigns spreading through social media channels. However, over the past years, many concerns have been raised about the robustness of AI to adversarial attacks, and the field of automatic scientific claim verification is not exempt. The risk is that such SCV tools may reinforce and legitimize the spread of fake scientific claims rather than refute them. This paper investigates the problem of generating adversarial attacks for SCV tools and shows that it is far more difficult than the generic NLP adversarial attack problem. The current NLP adversarial attack generators, when applied to SCV, often generate modified claims with entirely different meaning from the original. Even when the meaning is preserved, the modification of the generated claim is too simplistic (only a single word is changed), leaving many weaknesses of the SCV tools undiscovered. We propose T5-ParEvo, an iterative evolutionary attack generator, that is able to generate more complex and creative attacks while better preserving the semantics of the original claim. Using detailed quantitative and qualitative analysis, we demonstrate the efficacy of T5-ParEvo in comparison with existing attack generators.</p>","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140842102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teacher-Student Framework for Polyphonic Semi-supervised Sound Event Detection: Survey and Empirical Analysis 复调半监督声音事件检测的师生框架:调查与实证分析
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-04-23 DOI: 10.1145/3660641
Zhor Diffallah, Hadjer Ykhlef, Hafida Bouarfa
Polyphonic sound event detection refers to the task of automatically identifying sound events occurring simultaneously in an auditory scene. Due to the inherent complexity and variability of real-world auditory scenes, building robust detectors for polyphonic sound event detection poses a significant challenge. The task becomes further more challenging without sufficient annotated data to develop sound event detection systems under a supervised learning regime. In this paper, we explore the recent developments in polyphonic sound event detection, with a particular emphasis on the application of Teacher-Student techniques within the semi-supervised learning paradigm. Unlike previous works, we have consolidated and organized the fragmented literature on Teacher-Student techniques for polyphonic sound event detection. By examining the latest research, categorizing Teacher-Student approaches, and conducting an empirical study to assess the performance of each approach, this survey offers valuable insights and practical guidance for researchers and practitioners in the field. Our findings highlight the potential benefits of utilizing multiple learners, ensuring consistent predictions, and making thoughtful choices regarding perturbation strategies.
复调声音事件检测是指自动识别听觉场景中同时发生的声音事件的任务。由于真实世界听觉场景固有的复杂性和多变性,为复调声音事件检测构建稳健的检测器是一项巨大的挑战。如果没有足够的注释数据来开发监督学习机制下的声音事件检测系统,这项任务就会变得更具挑战性。在本文中,我们探讨了复调声音事件检测的最新发展,特别强调了半监督学习范式中师生技术的应用。与以往的研究不同,我们对有关复调声音事件检测的师生技术的零散文献进行了整合和整理。通过研究最新研究成果、对 "教师-学生 "方法进行分类以及开展实证研究以评估每种方法的性能,本调查报告为该领域的研究人员和从业人员提供了宝贵的见解和实用指导。我们的研究结果凸显了利用多个学习者、确保预测的一致性以及对扰动策略进行深思熟虑的选择的潜在益处。
{"title":"Teacher-Student Framework for Polyphonic Semi-supervised Sound Event Detection: Survey and Empirical Analysis","authors":"Zhor Diffallah, Hadjer Ykhlef, Hafida Bouarfa","doi":"10.1145/3660641","DOIUrl":"https://doi.org/10.1145/3660641","url":null,"abstract":"Polyphonic sound event detection refers to the task of automatically identifying sound events occurring simultaneously in an auditory scene. Due to the inherent complexity and variability of real-world auditory scenes, building robust detectors for polyphonic sound event detection poses a significant challenge. The task becomes further more challenging without sufficient annotated data to develop sound event detection systems under a supervised learning regime. In this paper, we explore the recent developments in polyphonic sound event detection, with a particular emphasis on the application of Teacher-Student techniques within the semi-supervised learning paradigm. Unlike previous works, we have consolidated and organized the fragmented literature on Teacher-Student techniques for polyphonic sound event detection. By examining the latest research, categorizing Teacher-Student approaches, and conducting an empirical study to assess the performance of each approach, this survey offers valuable insights and practical guidance for researchers and practitioners in the field. Our findings highlight the potential benefits of utilizing multiple learners, ensuring consistent predictions, and making thoughtful choices regarding perturbation strategies.","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140666643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trustworthy and Responsible Decision-Making Framework for Resource Management in Food-Energy-Water Nexus: A Control-Theoretical Approach 粮食-能源-水关系中值得信赖和负责任的资源管理决策框架:控制论方法
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-04-23 DOI: 10.1145/3660640
Suleyman Uslu, Davinder Kaur, S. Rivera, A. Durresi, M. Babbar‐Sebens, J. Tilt
This paper introduces a hybrid framework for trustworthy and responsible natural resource management, aimed at building bottom-up trust to enhance cooperation among decision makers in the Food, Energy, and Water sectors. Cooperation is highly critical for the adoption and application of resource management alternatives (solutions), including those generated by AI-based recommender systems, in communities due to significant impact of these sectors on the environment and the economic productivity of affected communities. While algorithms can recommend solutions, effectively communicating and gaining community acceptance of these solutions is crucial. Our research stands out by emphasizing the collaboration between humans and machines, which is essential for addressing broader challenges related to climate change and the need for expert trade-off handling in the management of natural resources. To support future decision-making, we propose a successful control-theory model based on previous decision-making and actor behavior. We utilize control theory to depict how community decisions can be affected by how much individuals trust and accept proposed solutions on irrigation water rights and crop operations in an iterative and interactive decision support environment. This model interacts with stakeholders to collect their feedback on the acceptability of solutions, while also examining the influence of consensus levels, trust sensitivities, and the number of decision-making rounds on the acceptance of proposed solutions. Furthermore, we investigate a system of multiple decision-making and explore the impact of learning actors who adjust their trust sensitivities based on solution acceptance and the number of decision-making rounds. Additionally, our approach can be employed to evaluate and refine potential policy modifications. Although we assess potential outcomes using hypothetical actions by individuals, it is essential to emphasize our primary objective of developing a tool that accurately captures real human behavior and fosters improved collaboration in community decision-making. Ultimately, our aim is to enhance the harmony between AI-based recommender systems and human values, promoting a deeper understanding and integration between the two.
本文介绍了一个可信和负责任的自然资源管理混合框架,旨在建立自下而上的信任,以加强粮食、能源和水资源部门决策者之间的合作。由于这些部门对环境和受影响社区的经济生产力有重大影响,因此合作对于在社区采纳和应用资源管理替代方案(解决方案)(包括由基于人工智能的推荐系统生成的方案)至关重要。虽然算法可以推荐解决方案,但有效沟通并让社区接受这些解决方案至关重要。我们的研究通过强调人类与机器之间的合作而脱颖而出,这对于应对与气候变化相关的更广泛挑战以及在自然资源管理中对专家权衡处理的需求至关重要。为了支持未来的决策,我们根据以往的决策和行动者行为提出了一个成功的控制理论模型。我们利用控制论描绘了在一个迭代和互动的决策支持环境中,个人对灌溉水权和农作物操作建议解决方案的信任和接受程度如何影响社区决策。该模型与利益相关者互动,收集他们对解决方案可接受性的反馈,同时还研究了共识水平、信任敏感度和决策轮数对建议解决方案接受度的影响。此外,我们还研究了多重决策系统,并探讨了学习参与者根据解决方案接受度和决策轮数调整其信任敏感度的影响。此外,我们的方法还可用于评估和完善潜在的政策修改。虽然我们使用个人的假设行动来评估潜在结果,但必须强调我们的主要目标是开发一种能准确捕捉人类真实行为的工具,并促进社区决策中的协作。最终,我们的目标是加强基于人工智能的推荐系统与人类价值观之间的和谐,促进两者之间更深入的理解和融合。
{"title":"A Trustworthy and Responsible Decision-Making Framework for Resource Management in Food-Energy-Water Nexus: A Control-Theoretical Approach","authors":"Suleyman Uslu, Davinder Kaur, S. Rivera, A. Durresi, M. Babbar‐Sebens, J. Tilt","doi":"10.1145/3660640","DOIUrl":"https://doi.org/10.1145/3660640","url":null,"abstract":"This paper introduces a hybrid framework for trustworthy and responsible natural resource management, aimed at building bottom-up trust to enhance cooperation among decision makers in the Food, Energy, and Water sectors. Cooperation is highly critical for the adoption and application of resource management alternatives (solutions), including those generated by AI-based recommender systems, in communities due to significant impact of these sectors on the environment and the economic productivity of affected communities. While algorithms can recommend solutions, effectively communicating and gaining community acceptance of these solutions is crucial. Our research stands out by emphasizing the collaboration between humans and machines, which is essential for addressing broader challenges related to climate change and the need for expert trade-off handling in the management of natural resources. To support future decision-making, we propose a successful control-theory model based on previous decision-making and actor behavior. We utilize control theory to depict how community decisions can be affected by how much individuals trust and accept proposed solutions on irrigation water rights and crop operations in an iterative and interactive decision support environment. This model interacts with stakeholders to collect their feedback on the acceptability of solutions, while also examining the influence of consensus levels, trust sensitivities, and the number of decision-making rounds on the acceptance of proposed solutions. Furthermore, we investigate a system of multiple decision-making and explore the impact of learning actors who adjust their trust sensitivities based on solution acceptance and the number of decision-making rounds. Additionally, our approach can be employed to evaluate and refine potential policy modifications. Although we assess potential outcomes using hypothetical actions by individuals, it is essential to emphasize our primary objective of developing a tool that accurately captures real human behavior and fosters improved collaboration in community decision-making. Ultimately, our aim is to enhance the harmony between AI-based recommender systems and human values, promoting a deeper understanding and integration between the two.","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140669540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Explore-Exploit Workload-bounded Strategy for Rare Event Detection in Massive Energy Sensor Time Series 在大规模能量传感器时间序列中检测罕见事件的 "探索-利用 "工作量限制策略
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-04-17 DOI: 10.1145/3657641
Lo Pang-Yun Ting, Rong Chao, Chai-Shi Chang, Kun-Ta Chuang

With the rise of Internet-of-Things devices, the analysis of sensor-generated energy time series data has become increasingly important. This is especially crucial for detecting rare events like unusual electricity usage or water leakages in residential and commercial buildings, which is essential for optimizing energy efficiency and reducing costs. However, existing detection methods on large-scale data may fail to correctly detect rare events when they do not behave significantly differently from standard events or when their attributes are non-stationary. Additionally, the capacity of computational resources to analyze all time series data generated by an increasing number of sensors becomes a challenge. This situation creates an emergent demand for a workload-bounded strategy. To ensure both effectiveness and efficiency in detecting rare events in massive energy time series, we propose a heuristic-based framework called HALE. This framework utilizes an explore-exploit selection process that is specifically designed to recognize potential features of rare events in energy time series. HALE involves constructing an attribute-aware graph to preserve the attribute information of rare events. A heuristic-based random walk is then derived based on partial labels received at each time period to discover the non-stationarity of rare events. Potential rare event data is selected from the attribute-aware graph, and existing detection models are applied for final confirmation. Our study, which was conducted on three actual energy datasets, demonstrates that the HALE framework is both effective and efficient in its detection capabilities. This underscores its practicality in delivering cost-effective energy monitoring services.

随着物联网设备的兴起,对传感器生成的能源时间序列数据进行分析变得越来越重要。这对于检测住宅和商业建筑中的异常用电或漏水等罕见事件尤为重要,而这对于优化能效和降低成本至关重要。然而,当罕见事件的行为与标准事件无明显差异或其属性为非平稳时,现有的大规模数据检测方法可能无法正确检测到罕见事件。此外,要分析越来越多传感器产生的所有时间序列数据,计算资源的容量也成为了一个挑战。在这种情况下,对有工作量限制的策略提出了新的要求。为了确保在海量能源时间序列中检测罕见事件的有效性和效率,我们提出了一种基于启发式的框架,称为 HALE。该框架采用探索-开发选择流程,专门用于识别能源时间序列中罕见事件的潜在特征。HALE 包括构建一个属性感知图,以保留罕见事件的属性信息。然后,根据每个时间段收到的部分标签推导出基于启发式的随机行走,以发现罕见事件的非平稳性。从属性感知图中选择潜在的罕见事件数据,并应用现有的检测模型进行最终确认。我们在三个实际能源数据集上进行的研究表明,HALE 框架的检测能力既有效又高效。这凸显了它在提供具有成本效益的能源监测服务方面的实用性。
{"title":"An Explore-Exploit Workload-bounded Strategy for Rare Event Detection in Massive Energy Sensor Time Series","authors":"Lo Pang-Yun Ting, Rong Chao, Chai-Shi Chang, Kun-Ta Chuang","doi":"10.1145/3657641","DOIUrl":"https://doi.org/10.1145/3657641","url":null,"abstract":"<p>With the rise of Internet-of-Things devices, the analysis of sensor-generated energy time series data has become increasingly important. This is especially crucial for detecting rare events like unusual electricity usage or water leakages in residential and commercial buildings, which is essential for optimizing energy efficiency and reducing costs. However, existing detection methods on large-scale data may fail to correctly detect rare events when they do not behave significantly differently from standard events or when their attributes are non-stationary. Additionally, the capacity of computational resources to analyze all time series data generated by an increasing number of sensors becomes a challenge. This situation creates an emergent demand for a workload-bounded strategy. To ensure both effectiveness and efficiency in detecting rare events in massive energy time series, we propose a heuristic-based framework called <i>HALE</i>. This framework utilizes an explore-exploit selection process that is specifically designed to recognize potential features of rare events in energy time series. <i>HALE</i> involves constructing an attribute-aware graph to preserve the attribute information of rare events. A heuristic-based random walk is then derived based on partial labels received at each time period to discover the non-stationarity of rare events. Potential rare event data is selected from the attribute-aware graph, and existing detection models are applied for final confirmation. Our study, which was conducted on three actual energy datasets, demonstrates that the <i>HALE</i> framework is both effective and efficient in its detection capabilities. This underscores its practicality in delivering cost-effective energy monitoring services.</p>","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140615375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CGKPN: Cross-Graph Knowledge Propagation Network with Adaptive Connection for Reasoning-Based Machine Reading Comprehension CGKPN:基于推理的机器阅读理解中带有自适应连接的跨图知识传播网络
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-04-17 DOI: 10.1145/3658673
Zhuo Zhao, Guangyou Zhou, Zhiwen Xie, Lingfei Wu, Jimmy Xiangji Huang

The task of machine reading comprehension (MRC) is to enable machine to read and understand a piece of text, and then answer the corresponding question correctly. This task requires machine to not only be able to perform semantic understanding, but also possess logical reasoning capabilities. Just like human reading, it involves thinking about the text from two interacting perspectives of semantics and logic. However, previous methods based on reading comprehension either consider only the logical structure of the text or only the semantic structure of the text, and cannot simultaneously balance semantic understanding and logical reasoning. This single form of reasoning cannot make the machine fully understand the meaning of the text. Additionally, the issue of sparsity in composition presents a significant challenge for models that rely on graph-based reasoning. To this end, a cross-graph knowledge propagation network (CGKPN) with adaptive connection is presented to address the above issues. The model first performs self-view node embedding on the constructed logical graph and semantic graph to update the representations of the graphs. Specifically, relevance matrix between nodes is introduced to adaptively adjust node connections in response to the challenge posed by sparse graph. Subsequently, CGKPN conducts cross-graph knowledge propagation on nodes that are identical in both graphs, effectively resolving conflicts arising from identical nodes in different views, and enabling the model to better integrate the logical and semantic relationships of the text through efficient interaction. Experiments on the two MRC datasets ReClor and LogiQA indicate the superior performance of our proposed model CGKPN compared to other existing baselines.

机器阅读理解(MRC)的任务是让机器能够阅读并理解一段文字,然后正确回答相应的问题。这项任务要求机器不仅能进行语义理解,还要具备逻辑推理能力。就像人类阅读一样,这需要从语义和逻辑这两个相互作用的角度来思考文本。然而,以往基于阅读理解的方法要么只考虑文本的逻辑结构,要么只考虑文本的语义结构,无法同时兼顾语义理解和逻辑推理。这种单一的推理形式无法让机器完全理解文本的含义。此外,构成中的稀疏性问题也给依赖图推理的模型带来了巨大挑战。为此,我们提出了一种具有自适应连接的跨图知识传播网络(CGKPN)来解决上述问题。该模型首先对构建的逻辑图和语义图进行自视节点嵌入,以更新图的表示。具体来说,该模型引入了节点之间的相关性矩阵,以自适应地调整节点连接,从而应对稀疏图带来的挑战。随后,CGKPN 对两个图中相同的节点进行跨图知识传播,有效解决了不同视图中相同节点所产生的冲突,并通过高效交互使模型更好地整合文本的逻辑和语义关系。在两个 MRC 数据集 ReClor 和 LogiQA 上的实验表明,与其他现有基线相比,我们提出的 CGKPN 模型性能更优。
{"title":"CGKPN: Cross-Graph Knowledge Propagation Network with Adaptive Connection for Reasoning-Based Machine Reading Comprehension","authors":"Zhuo Zhao, Guangyou Zhou, Zhiwen Xie, Lingfei Wu, Jimmy Xiangji Huang","doi":"10.1145/3658673","DOIUrl":"https://doi.org/10.1145/3658673","url":null,"abstract":"<p>The task of machine reading comprehension (MRC) is to enable machine to read and understand a piece of text, and then answer the corresponding question correctly. This task requires machine to not only be able to perform semantic understanding, but also possess logical reasoning capabilities. Just like human reading, it involves thinking about the text from two interacting perspectives of semantics and logic. However, previous methods based on reading comprehension either consider only the logical structure of the text or only the semantic structure of the text, and cannot simultaneously balance semantic understanding and logical reasoning. This single form of reasoning cannot make the machine fully understand the meaning of the text. Additionally, the issue of sparsity in composition presents a significant challenge for models that rely on graph-based reasoning. To this end, a cross-graph knowledge propagation network (CGKPN) with adaptive connection is presented to address the above issues. The model first performs self-view node embedding on the constructed logical graph and semantic graph to update the representations of the graphs. Specifically, relevance matrix between nodes is introduced to adaptively adjust node connections in response to the challenge posed by sparse graph. Subsequently, CGKPN conducts cross-graph knowledge propagation on nodes that are identical in both graphs, effectively resolving conflicts arising from identical nodes in different views, and enabling the model to better integrate the logical and semantic relationships of the text through efficient interaction. Experiments on the two MRC datasets ReClor and LogiQA indicate the superior performance of our proposed model CGKPN compared to other existing baselines.</p>","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140614841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Game-theoretic Framework for Privacy-preserving Federated Learning 保护隐私的联盟学习博弈论框架
IF 5 4区 计算机科学 Q1 Mathematics Pub Date : 2024-04-10 DOI: 10.1145/3656049
Xiaojin Zhang, Lixin Fan, Siwei Wang, Wenjie Li, Kai Chen, Qiang Yang

In federated learning, benign participants aim to optimize a global model collaboratively. However, the risk of privacy leakage cannot be ignored in the presence of semi-honest adversaries. Existing research has focused either on designing protection mechanisms or on inventing attacking mechanisms. While the battle between defenders and attackers seems never-ending, we are concerned with one critical question: is it possible to prevent potential attacks in advance? To address this, we propose the first game-theoretic framework that considers both FL defenders and attackers in terms of their respective payoffs, which include computational costs, FL model utilities, and privacy leakage risks. We name this game the federated learning privacy game (FLPG), in which neither defenders nor attackers are aware of all participants’ payoffs. To handle the incomplete information inherent in this situation, we propose associating the FLPG with an oracle that has two primary responsibilities. First, the oracle provides lower and upper bounds of the payoffs for the players. Second, the oracle acts as a correlation device, privately providing suggested actions to each player. With this novel framework, we analyze the optimal strategies of defenders and attackers. Furthermore, we derive and demonstrate conditions under which the attacker, as a rational decision-maker, should always follow the oracle’s suggestion not to attack.

在联合学习中,良性参与者的目标是共同优化全局模型。然而,在半诚信对手存在的情况下,隐私泄露的风险不容忽视。现有的研究要么侧重于设计保护机制,要么侧重于发明攻击机制。虽然防御者和攻击者之间的斗争似乎永无止境,但我们关注的是一个关键问题:是否有可能提前预防潜在的攻击?为了解决这个问题,我们提出了第一个博弈论框架,该框架从 FL 捍卫者和攻击者各自的回报(包括计算成本、FL 模型效用和隐私泄露风险)的角度来考虑他们。我们将这种博弈命名为联合学习隐私博弈(FLPG),在这种博弈中,防御者和攻击者都不知道所有参与者的回报。为了处理这种情况下固有的不完整信息,我们建议将 FLPG 与一个甲骨文联系起来,甲骨文有两个主要职责。首先,神谕为参与者提供报酬的下限和上限。其次,神谕作为一个相关设备,私下向每个玩家提供建议行动。利用这个新颖的框架,我们分析了防御方和攻击方的最优策略。此外,我们还推导并证明了攻击方作为理性决策者应始终遵循甲骨文建议不攻击的条件。
{"title":"A Game-theoretic Framework for Privacy-preserving Federated Learning","authors":"Xiaojin Zhang, Lixin Fan, Siwei Wang, Wenjie Li, Kai Chen, Qiang Yang","doi":"10.1145/3656049","DOIUrl":"https://doi.org/10.1145/3656049","url":null,"abstract":"<p>In federated learning, benign participants aim to optimize a global model collaboratively. However, the risk of <i>privacy leakage</i> cannot be ignored in the presence of <i>semi-honest</i> adversaries. Existing research has focused either on designing protection mechanisms or on inventing attacking mechanisms. While the battle between defenders and attackers seems never-ending, we are concerned with one critical question: is it possible to prevent potential attacks in advance? To address this, we propose the first game-theoretic framework that considers both FL defenders and attackers in terms of their respective payoffs, which include computational costs, FL model utilities, and privacy leakage risks. We name this game the federated learning privacy game (FLPG), in which neither defenders nor attackers are aware of all participants’ payoffs. To handle the <i>incomplete information</i> inherent in this situation, we propose associating the FLPG with an <i>oracle</i> that has two primary responsibilities. First, the oracle provides lower and upper bounds of the payoffs for the players. Second, the oracle acts as a correlation device, privately providing suggested actions to each player. With this novel framework, we analyze the optimal strategies of defenders and attackers. Furthermore, we derive and demonstrate conditions under which the attacker, as a rational decision-maker, should always follow the oracle’s suggestion <i>not to attack</i>.</p>","PeriodicalId":48967,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140595327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Intelligent Systems and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1