首页 > 最新文献

Journal of Systems Architecture最新文献

英文 中文
LACT: Liveness-Aware Checkpointing to reduce checkpoint overheads in intermittent systems LACT:活泼感知检查点,减少间歇性系统中的检查点开销
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-11 DOI: 10.1016/j.sysarc.2024.103213
Youngbin Kim, Yoojin Lim, Chaedeok Lim

Intermittent computing supports execution of the systems experiencing frequent power failures, such as battery-less devices powered by energy-harvesting. In such systems, checkpoint and recovery is a commonly adopted technique, where volatile system states are regularly saved to Non-Volatile Memory (NVM), to preserve computing progress between power cycles. Since checkpoint involves a large number of NVM accesses, which is expensive in terms of both latency and energy, reducing its overhead has been a significant research challenge. In this paper, we present LACT (Liveness-Aware CheckpoinTing), a compiler optimization technique to minimize checkpoint overhead in intermittent systems. At the time of checkpoint execution, there exist dead values in general, which will not be used or overwritten in the future. LACT examines such liveness information, especially in arrays, based on compile-time analysis and excludes the dead values from the checkpoint to reduce required checkpoint data, which is a previously unexplored optimization opportunity. Our evaluation shows that LACT can reduce 46.4% of required checkpoint data without any runtime support, leading to reduction of 31.5% in execution time and a 5.2% decrease in power consumption on average. Our experiments in real energy-harvesting environment demonstrates that such improvement translates to a 31.6% improvement in end-to-end execution time.

间歇计算支持频繁断电的系统执行,例如由能量收集供电的无电池设备。在此类系统中,检查点和恢复是一种普遍采用的技术,即定期将易失性系统状态保存到非易失性存储器(NVM)中,以便在电源周期之间保持计算进度。由于检查点涉及大量的非易失性存储器访问,在延迟和能耗方面都很昂贵,因此减少其开销一直是一项重大的研究挑战。本文提出了一种编译器优化技术 LACT(Liveness-Aware CheckpoinTing),用于最大限度地减少间歇系统中的检查点开销。在执行检查点时,一般存在死值,这些死值在未来不会被使用或覆盖。LACT 基于编译时分析来检查此类有效性信息,尤其是数组中的有效性信息,并将死值从检查点中排除,从而减少所需的检查点数据,这是以前从未探索过的优化机会。我们的评估表明,LACT 无需任何运行时支持,即可减少 46.4% 的所需检查点数据,从而缩短 31.5% 的执行时间,平均降低 5.2% 的功耗。我们在实际能源收集环境中的实验表明,这种改进可将端到端执行时间缩短 31.6%。
{"title":"LACT: Liveness-Aware Checkpointing to reduce checkpoint overheads in intermittent systems","authors":"Youngbin Kim,&nbsp;Yoojin Lim,&nbsp;Chaedeok Lim","doi":"10.1016/j.sysarc.2024.103213","DOIUrl":"10.1016/j.sysarc.2024.103213","url":null,"abstract":"<div><p>Intermittent computing supports execution of the systems experiencing frequent power failures, such as battery-less devices powered by energy-harvesting. In such systems, checkpoint and recovery is a commonly adopted technique, where volatile system states are regularly saved to Non-Volatile Memory (NVM), to preserve computing progress between power cycles. Since checkpoint involves a large number of NVM accesses, which is expensive in terms of both latency and energy, reducing its overhead has been a significant research challenge. In this paper, we present LACT (Liveness-Aware CheckpoinTing), a compiler optimization technique to minimize checkpoint overhead in intermittent systems. At the time of checkpoint execution, there exist <em>dead</em> values in general, which will not be used or overwritten in the future. LACT examines such liveness information, especially in arrays, based on compile-time analysis and excludes the dead values from the checkpoint to reduce required checkpoint data, which is a previously unexplored optimization opportunity. Our evaluation shows that LACT can reduce 46.4% of required checkpoint data without any runtime support, leading to reduction of 31.5% in execution time and a 5.2% decrease in power consumption on average. Our experiments in real energy-harvesting environment demonstrates that such improvement translates to a 31.6% improvement in end-to-end execution time.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103213"},"PeriodicalIF":4.5,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141409052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio 利用多普勒频率和载波噪声密度比检测无人机的全球导航卫星系统欺骗行为
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-08 DOI: 10.1016/j.sysarc.2024.103212
Xiaomin Wei, Cong Sun, Xinghua Li, Jianfeng Ma

Unmanned Aerial Vehicles (UAVs) are typical real-time embedded systems, which require precise locations for completing flight missions. The Global Navigation Satellite System (GNSS) plays a crucial role in navigation and positioning for UAVs. However, GNSS spoofing attacks pose an increasing threat to GNSS-dependent UAVs. Existing spoofing detection methods primarily rely on simulated data, perception data from multiple UAVs, or various control parameters. This paper proposes SigFeaDet, a signal feature-based GNSS spoofing detection approach for UAVs utilizing machine learning techniques. The core concept revolves around identifying anomalies in signal features arising from differences between authentic and spoofing signals. Key signal features, including Carrier-to-Noise Density Ratio (CN0) and Doppler frequency crucial for GNSS positioning, are employed to discern spoofing signals. Various machine learning algorithms are leveraged to train on GNSS signal data, determining the most effective classifier. TEXBAT GNSS dataset is processed to extract spoofing signal data, and flight experiments are conducted to gather GNSS data, augmenting the authentic GNSS signal dataset. The detection accuracy exceeds 95%. Equal Error Rate (EER) is approximately 5%. We evaluate various impact factors on SigFeaDet to show its robustness, including differences in velocities, altitudes, and experimental locations (10 kilometers apart), and the accuracy consistently surpasses 99%.

无人飞行器(UAV)是典型的实时嵌入式系统,需要精确定位才能完成飞行任务。全球导航卫星系统(GNSS)在无人飞行器的导航和定位方面发挥着至关重要的作用。然而,全球导航卫星系统欺骗攻击对依赖全球导航卫星系统的无人机构成了日益严重的威胁。现有的欺骗检测方法主要依赖模拟数据、多架无人机的感知数据或各种控制参数。本文提出的 SigFeaDet 是一种基于信号特征的无人机 GNSS 欺骗检测方法,利用了机器学习技术。其核心理念是识别真实信号和欺骗信号之间的差异所产生的信号特征异常。关键信号特征,包括载波噪声密度比(CN0)和对 GNSS 定位至关重要的多普勒频率,被用来辨别欺骗信号。利用各种机器学习算法对 GNSS 信号数据进行训练,以确定最有效的分类器。处理 TEXBAT GNSS 数据集以提取欺骗信号数据,并进行飞行实验以收集 GNSS 数据,从而增强真实的 GNSS 信号数据集。检测准确率超过 95%。等效错误率(EER)约为 5%。我们评估了对 SigFeaDet 的各种影响因素,以显示其鲁棒性,包括速度、高度和实验地点(相距 10 公里)的差异,准确率始终超过 99%。
{"title":"GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio","authors":"Xiaomin Wei,&nbsp;Cong Sun,&nbsp;Xinghua Li,&nbsp;Jianfeng Ma","doi":"10.1016/j.sysarc.2024.103212","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103212","url":null,"abstract":"<div><p>Unmanned Aerial Vehicles (UAVs) are typical real-time embedded systems, which require precise locations for completing flight missions. The Global Navigation Satellite System (GNSS) plays a crucial role in navigation and positioning for UAVs. However, GNSS spoofing attacks pose an increasing threat to GNSS-dependent UAVs. Existing spoofing detection methods primarily rely on simulated data, perception data from multiple UAVs, or various control parameters. This paper proposes SigFeaDet, a signal feature-based GNSS spoofing detection approach for UAVs utilizing machine learning techniques. The core concept revolves around identifying anomalies in signal features arising from differences between authentic and spoofing signals. Key signal features, including Carrier-to-Noise Density Ratio (CN0) and Doppler frequency crucial for GNSS positioning, are employed to discern spoofing signals. Various machine learning algorithms are leveraged to train on GNSS signal data, determining the most effective classifier. TEXBAT GNSS dataset is processed to extract spoofing signal data, and flight experiments are conducted to gather GNSS data, augmenting the authentic GNSS signal dataset. The detection accuracy exceeds 95%. Equal Error Rate (EER) is approximately 5%. We evaluate various impact factors on SigFeaDet to show its robustness, including differences in velocities, altitudes, and experimental locations (10 kilometers apart), and the accuracy consistently surpasses 99%.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103212"},"PeriodicalIF":4.5,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141325943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partitioned scheduling with safety-performance trade-offs in stochastic conditional DAG models 在随机条件 DAG 模型中进行安全性能权衡的分区调度
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-07 DOI: 10.1016/j.sysarc.2024.103189
Xuanliang Deng , Ashrarul H. Sifat , Shao-Yu Huang , Sen Wang , Jia-Bin Huang , Changhee Jung , Ryan Williams , Haibo Zeng

This paper is motivated by robotic systems that solve difficult real-world problems such as search and rescue (SAR) or precision agriculture 1. These applications require robots to operate in complex, uncertain environments while maintaining safe interactions with human teammates within a specified level of performance. In this paper, we study the scheduling of real-time applications on heterogeneous hardware platforms inspired by such contexts. To capture the stochasticity due to unpredictable environments, we propose the stochastic heterogeneous parallel conditional DAG (SHPC-DAG) model, which extends the most recent HPC-DAG model in two regards. First, it uses conditional DAG nodes to model the execution of computational pipelines based on context, while the stochasticity of DAG edges captures the uncertain nature of a system’s environment or the reliability of its hardware. Second, considering the pessimism of deterministic worst-case execution time (WCET), it uses probability distributions to model the execution times of subtasks (DAG nodes). We propose a new partitioning algorithm Least Latency Partitioned (LLP), which considers precedence constraints among nodes during the allocation process. Coupled with a scheduling algorithm that accounts for varying subtask criticality and constraints, the end-to-end latencies of safety-critical paths/nodes are then minimized. We use tasksets inspired by real robotics to demonstrate that our framework allows for efficient scheduling in complex computational pipelines, with more flexible representation of timing constraints, and ultimately, safety-performance tradeoffs.

本文的灵感来自于解决现实世界中困难问题的机器人系统,如搜救(SAR)或精准农业1。这些应用要求机器人在复杂、不确定的环境中工作,同时在规定的性能水平内保持与人类队友的安全互动。在本文中,我们受此类环境的启发,研究了异构硬件平台上实时应用的调度问题。为了捕捉不可预测环境造成的随机性,我们提出了随机异构并行条件 DAG(SHPC-DAG)模型,该模型在两个方面扩展了最新的 HPC-DAG 模型。首先,它使用条件 DAG 节点来模拟基于上下文的计算流水线的执行,而 DAG 边的随机性则捕捉了系统环境或硬件可靠性的不确定性。其次,考虑到确定性最坏情况执行时间(WCET)的悲观性,它使用概率分布来模拟子任务(DAG 节点)的执行时间。我们提出了一种新的分区算法 Least Latency Partitioned (LLP),它在分配过程中考虑了节点间的优先级限制。再加上考虑到不同子任务关键性和约束的调度算法,安全关键路径/节点的端到端延迟就会降到最低。我们利用受真实机器人技术启发的任务集来证明,我们的框架可以在复杂的计算流水线中实现高效调度,更灵活地表示时序约束,并最终实现安全性能权衡。
{"title":"Partitioned scheduling with safety-performance trade-offs in stochastic conditional DAG models","authors":"Xuanliang Deng ,&nbsp;Ashrarul H. Sifat ,&nbsp;Shao-Yu Huang ,&nbsp;Sen Wang ,&nbsp;Jia-Bin Huang ,&nbsp;Changhee Jung ,&nbsp;Ryan Williams ,&nbsp;Haibo Zeng","doi":"10.1016/j.sysarc.2024.103189","DOIUrl":"10.1016/j.sysarc.2024.103189","url":null,"abstract":"<div><p>This paper is motivated by robotic systems that solve difficult real-world problems such as search and rescue (SAR) or precision agriculture <span><sup>1</sup></span>. These applications require robots to operate in complex, uncertain environments while maintaining safe interactions with human teammates within a specified level of performance. In this paper, we study the scheduling of real-time applications on heterogeneous hardware platforms inspired by such contexts. To capture the <em>stochasticity</em> due to unpredictable environments, we propose the stochastic heterogeneous parallel conditional DAG (SHPC-DAG) model, which extends the most recent HPC-DAG model in two regards. First, it uses conditional DAG nodes to model the execution of computational pipelines based on <em>context</em>, while the stochasticity of DAG edges captures the uncertain nature of a system’s environment or the reliability of its hardware. Second, considering the pessimism of deterministic worst-case execution time (WCET), it uses <em>probability distributions</em> to model the execution times of subtasks (DAG nodes). We propose a new partitioning algorithm <em>Least Latency Partitioned (LLP)</em>, which considers precedence constraints among nodes during the allocation process. Coupled with a scheduling algorithm that accounts for varying subtask criticality and constraints, the end-to-end latencies of safety-critical paths/nodes are then minimized. We use tasksets inspired by real robotics to demonstrate that our framework allows for efficient scheduling in complex computational pipelines, with more flexible representation of timing constraints, and ultimately, safety-performance tradeoffs.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103189"},"PeriodicalIF":4.5,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141395697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2F-MASK-VSS: Two-factor mutual authentication and session key agreement scheme for video surveillance system 2F-MASK-VSS:用于视频监控系统的双因素相互认证和会话密钥协议方案
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-07 DOI: 10.1016/j.sysarc.2024.103196
Pramod Kumar , Arup Kumar Pal , SK Hafizul Islam

The trend for deploying Video Surveillance Systems (VSSs) in public places has become common practice to maintain effective law and order in modern civilization. Further, data access control and the proper management of surveillance data with valid users are desirable for the safety and security of the communities. This paper aims to develop practical solutions to protect VSSs against evolving threats and challenges. This paper proposes a Two-Factor Mutual Authentication and Session Key Agreement usable in VSS (2F-MASK-VSS) environments for real-time data storage and access. In 2F-MASK-VSS, lightweight cryptographic tools, viz. hash function and symmetric key encryption, are used to maintain the desirable security features. In 2F-MASK-VSS, a surveillance camera captures real-time data and sends them securely to a central server for storage through the established session key agreement among valid concerns. Moreover, 2F-MASK-VSS can protect access control among valid users. The security strength of 2F-MASK-VSS has been proven by formal and informal analysis. The BAN logic model, AVISPA and Scyther tools validate the attack-resilience of 2F-MASK-VSS. Furthermore, the security analysis in the random oracle model shows that 2F-MASK-VSS is provably secure. In addition, 2F-MASK-VSS has been implemented using the Raspberry PI testbed to demonstrate its practical implementation.

在现代文明中,在公共场所部署视频监控系统(VSS)已成为维护有效法律和秩序的普遍做法。此外,为了社区的安全和安保,数据访问控制和有效用户对监控数据的适当管理也是可取的。本文旨在开发实用的解决方案,以保护 VSS 免受不断演变的威胁和挑战。本文提出了一种可用于 VSS 环境的双因素相互认证和会话密钥协议(2F-MASK-VSS),用于实时数据存储和访问。在 2F-MASK-VSS 中,使用哈希函数和对称密钥加密等轻量级加密工具来保持理想的安全特性。在 2F-MASK-VSS 中,监控摄像头捕获实时数据,并通过有效关注点之间建立的会话密钥协议将数据安全地发送到中央服务器进行存储。此外,2F-MASK-VSS 还能保护有效用户之间的访问控制。2F-MASK-VSS 的安全强度已通过正式和非正式分析得到证实。BAN 逻辑模型、AVISPA 和 Scyther 工具验证了 2F-MASK-VSS 的抗攻击能力。此外,随机甲骨文模型的安全分析表明,2F-MASK-VSS 是可证明的安全。此外,2F-MASK-VSS 还利用树莓派(Raspberry PI)测试平台进行了实际应用演示。
{"title":"2F-MASK-VSS: Two-factor mutual authentication and session key agreement scheme for video surveillance system","authors":"Pramod Kumar ,&nbsp;Arup Kumar Pal ,&nbsp;SK Hafizul Islam","doi":"10.1016/j.sysarc.2024.103196","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103196","url":null,"abstract":"<div><p>The trend for deploying Video Surveillance Systems (VSSs) in public places has become common practice to maintain effective law and order in modern civilization. Further, data access control and the proper management of surveillance data with valid users are desirable for the safety and security of the communities. This paper aims to develop practical solutions to protect VSSs against evolving threats and challenges. This paper proposes a Two-Factor Mutual Authentication and Session Key Agreement usable in VSS (2F-MASK-VSS) environments for real-time data storage and access. In 2F-MASK-VSS, lightweight cryptographic tools, viz. hash function and symmetric key encryption, are used to maintain the desirable security features. In 2F-MASK-VSS, a surveillance camera captures real-time data and sends them securely to a central server for storage through the established session key agreement among valid concerns. Moreover, 2F-MASK-VSS can protect access control among valid users. The security strength of 2F-MASK-VSS has been proven by formal and informal analysis. The BAN logic model, AVISPA and Scyther tools validate the attack-resilience of 2F-MASK-VSS. Furthermore, the security analysis in the random oracle model shows that 2F-MASK-VSS is provably secure. In addition, 2F-MASK-VSS has been implemented using the Raspberry PI testbed to demonstrate its practical implementation.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103196"},"PeriodicalIF":4.5,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141325951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transformers in source code generation: A comprehensive survey 源代码生成中的转换器:全面调查
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-06 DOI: 10.1016/j.sysarc.2024.103193
Hadi Ghaemi , Zakieh Alizadehsani , Amin Shahraki , Juan M. Corchado

Transformers have revolutionized natural language processing (NLP) and have had a huge impact on automating tasks. Recently, transformers have led to the development of powerful large language models (LLMs), which have advanced automatic code generation. This study provides a review of code generation concepts and transformer applications in this field. First, the fundamental concepts of the attention mechanism embedded into transformers are explored. Then, predominant automated code generation approaches are briefly reviewed, including non-learning code generation (e.g., rule-based), shallow learning (e.g., heuristic rules, grammar-based), and deep learning models. Afterward, this survey reviews pre-training and fine-tuning techniques for code generation, focusing on the application of efficient transformer methods such as parameter-efficient tuning, instruction tuning, and prompt tuning. Additionally, this work briefly outlines resources for code generation (e.g., datasets, benchmarks, packages) and evaluation metrics utilized in code generation processes. Finally, the challenges and potential research directions (e.g., multimodal learning) are investigated in depth.

变换器给自然语言处理(NLP)带来了革命性的变化,并对任务自动化产生了巨大影响。近来,变换器推动了功能强大的大型语言模型(LLM)的发展,从而促进了代码自动生成。本研究回顾了代码生成概念和变换器在这一领域的应用。首先,探讨了嵌入转换器的注意力机制的基本概念。然后,简要回顾了主流的自动代码生成方法,包括非学习代码生成(如基于规则)、浅层学习(如启发式规则、基于语法)和深度学习模型。随后,本调查回顾了代码生成的预训练和微调技术,重点关注高效转换器方法的应用,如参数高效调整、指令调整和提示调整。此外,本研究还简要概述了代码生成的资源(如数据集、基准、软件包)以及代码生成过程中使用的评估指标。最后,还深入探讨了面临的挑战和潜在的研究方向(如多模态学习)。
{"title":"Transformers in source code generation: A comprehensive survey","authors":"Hadi Ghaemi ,&nbsp;Zakieh Alizadehsani ,&nbsp;Amin Shahraki ,&nbsp;Juan M. Corchado","doi":"10.1016/j.sysarc.2024.103193","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103193","url":null,"abstract":"<div><p>Transformers have revolutionized natural language processing (NLP) and have had a huge impact on automating tasks. Recently, transformers have led to the development of powerful large language models (LLMs), which have advanced automatic code generation. This study provides a review of code generation concepts and transformer applications in this field. First, the fundamental concepts of the attention mechanism embedded into transformers are explored. Then, predominant automated code generation approaches are briefly reviewed, including non-learning code generation (e.g., rule-based), shallow learning (e.g., heuristic rules, grammar-based), and deep learning models. Afterward, this survey reviews pre-training and fine-tuning techniques for code generation, focusing on the application of efficient transformer methods such as parameter-efficient tuning, instruction tuning, and prompt tuning. Additionally, this work briefly outlines resources for code generation (e.g., datasets, benchmarks, packages) and evaluation metrics utilized in code generation processes. Finally, the challenges and potential research directions (e.g., multimodal learning) are investigated in depth.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103193"},"PeriodicalIF":4.5,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage 具有可追溯性的匿名大宇宙医疗云存储数据共享方案
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-06 DOI: 10.1016/j.sysarc.2024.103210
Qing Wu , Guoqiang Meng , Leyou Zhang , Yue Lei

The application of medical cloud storage technology in healthcare and the sharing of electronic medical records (EMR) bring convenience for patients and medical institutes. However, two barriers limit further expansions of the above (i.e. key escrow and key abuse issues). In this paper, we construct a large universe data-sharing scheme based on attribute-based encryption. We design all attribute authorities simultaneously to participate in the key computation, and the user performs aggregation. By issuing anonymous credentials to the recipients, their identity information is protected. To achieve complete tracing of the traitor, we blend the two mechanisms, white-box traceability and black-box traceability, together. Detailed security proofs have been carried out for various types of possible attackers, and theoretical analyses have verified the security of the proposed scheme. We performed performance evaluations in conjunction with existing schemes, and numerical experience shows that the burden on the user side is also minimal.

医疗云存储技术在医疗保健领域的应用以及电子病历(EMR)的共享为患者和医疗机构带来了便利。然而,两个障碍限制了上述方案的进一步扩展(即密钥托管和密钥滥用问题)。在本文中,我们构建了一种基于属性加密的大宇宙数据共享方案。我们设计所有属性机构同时参与密钥计算,并由用户执行聚合。通过向接收者发放匿名凭证,他们的身份信息得到了保护。为了实现对叛徒的完全追踪,我们将白盒追踪和黑盒追踪这两种机制融合在一起。我们针对各种类型的可能攻击者进行了详细的安全证明,理论分析也验证了所提方案的安全性。我们结合现有方案进行了性能评估,数值经验表明,用户方面的负担也很小。
{"title":"An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage","authors":"Qing Wu ,&nbsp;Guoqiang Meng ,&nbsp;Leyou Zhang ,&nbsp;Yue Lei","doi":"10.1016/j.sysarc.2024.103210","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103210","url":null,"abstract":"<div><p>The application of medical cloud storage technology in healthcare and the sharing of electronic medical records (EMR) bring convenience for patients and medical institutes. However, two barriers limit further expansions of the above (i.e. key escrow and key abuse issues). In this paper, we construct a large universe data-sharing scheme based on attribute-based encryption. We design all attribute authorities simultaneously to participate in the key computation, and the user performs aggregation. By issuing anonymous credentials to the recipients, their identity information is protected. To achieve complete tracing of the traitor, we blend the two mechanisms, white-box traceability and black-box traceability, together. Detailed security proofs have been carried out for various types of possible attackers, and theoretical analyses have verified the security of the proposed scheme. We performed performance evaluations in conjunction with existing schemes, and numerical experience shows that the burden on the user side is also minimal.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103210"},"PeriodicalIF":4.5,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust defense for spiking neural networks against adversarial examples via input filtering 通过输入过滤为尖峰神经网络提供抵御对抗性示例的稳健方法
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-05 DOI: 10.1016/j.sysarc.2024.103209
Shasha Guo , Lei Wang , Zhijie Yang , Yuliang Lu

Spiking Neural Networks (SNNs) are increasingly deployed in applications on resource constraint embedding systems due to their low power. Unfortunately, SNNs are vulnerable to adversarial examples which threaten the application security. Existing denoising filters can protect SNNs from adversarial examples. However, the reason why filters can defend against adversarial examples remains unclear and thus it cannot ensure a trusty defense. In this work, we aim to explain the reason and provide a more robust filter against different adversarial examples. First, we propose two new norms l0 and l to describe the spatial and temporal features of adversarial events for understanding the working principles of filters. Second, we propose to combine filters to provide a robust defense against different perturbation events. To make up the gap between the goal and the ability of existing filters, we propose a new filter that can defend against both spatially and temporally dense perturbation events. We conduct the experiments on two widely used neuromorphic datasets, NMNIST and IBM DVSGesture. Experimental results show that the combined defense can restore the accuracy to over 80% of the original SNN accuracy.

尖峰神经网络(SNN)由于功耗低,越来越多地应用于资源有限的嵌入式系统中。遗憾的是,SNN 容易受到对抗性示例的影响,从而威胁到应用的安全性。现有的去噪滤波器可以保护 SNNs 免受恶意示例的攻击。但是,滤波器能够抵御对抗性示例的原因仍不清楚,因此无法确保可靠的防御。在这项工作中,我们旨在解释其原因,并提供一种更强大的过滤器来抵御不同的对抗性示例。首先,我们提出了两个新的规范 l0 和 l∞,用以描述对抗事件的空间和时间特征,从而理解过滤器的工作原理。其次,我们建议将过滤器结合起来,针对不同的扰动事件提供稳健的防御。为了弥补目标与现有滤波器能力之间的差距,我们提出了一种新的滤波器,它既能防御空间上密集的扰动事件,也能防御时间上密集的扰动事件。我们在两个广泛使用的神经形态数据集 NMNIST 和 IBM DVSGesture 上进行了实验。实验结果表明,综合防御可将精确度恢复到原始 SNN 精确度的 80% 以上。
{"title":"A robust defense for spiking neural networks against adversarial examples via input filtering","authors":"Shasha Guo ,&nbsp;Lei Wang ,&nbsp;Zhijie Yang ,&nbsp;Yuliang Lu","doi":"10.1016/j.sysarc.2024.103209","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103209","url":null,"abstract":"<div><p>Spiking Neural Networks (SNNs) are increasingly deployed in applications on resource constraint embedding systems due to their low power. Unfortunately, SNNs are vulnerable to adversarial examples which threaten the application security. Existing denoising filters can protect SNNs from adversarial examples. However, the reason why filters can defend against adversarial examples remains unclear and thus it cannot ensure a trusty defense. In this work, we aim to explain the reason and provide a more robust filter against different adversarial examples. First, we propose two new norms <span><math><msub><mrow><mi>l</mi></mrow><mrow><mn>0</mn></mrow></msub></math></span> and <span><math><msub><mrow><mi>l</mi></mrow><mrow><mi>∞</mi></mrow></msub></math></span> to describe the spatial and temporal features of adversarial events for understanding the working principles of filters. Second, we propose to combine filters to provide a robust defense against different perturbation events. To make up the gap between the goal and the ability of existing filters, we propose a new filter that can defend against both spatially and temporally dense perturbation events. We conduct the experiments on two widely used neuromorphic datasets, NMNIST and IBM DVSGesture. Experimental results show that the combined defense can restore the accuracy to over 80% of the original SNN accuracy.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103209"},"PeriodicalIF":4.5,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141313645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gradient descent algorithm for the optimization of fixed priorities in real-time systems 用于优化实时系统中固定优先级的梯度下降算法
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-04 DOI: 10.1016/j.sysarc.2024.103198
Juan M. Rivas , J. Javier Gutiérrez , Ana Guasque , Patricia Balbastre

This paper considers the offline assignment of fixed priorities in partitioned preemptive real-time systems where tasks have precedence constraints. This problem is crucial in this type of systems, as having a good fixed priority assignment allows for an efficient use of the processing resources while meeting all the deadlines. In the literature, we can find several proposals to solve this problem, which offer varying trade-offs between the quality of their results and their computational complexities. In this paper, we propose a new approach, leveraging existing algorithms that are widely exploited in the field of Machine Learning: Gradient Descent, the Adam Optimizer, and Gradient Noise. We show how to adapt these algorithms to the problem of fixed priority assignment in conjunction with existing worst-case response time analyses. We demonstrate the performance of our proposal on synthetic task-sets with different sizes. This evaluation shows that our proposal is able to find more schedulable solutions than previous heuristics, approximating optimal but intractable algorithms such as MILP or brute-force, while requiring reasonable execution times.

本文探讨了任务有优先级限制的分区抢占式实时系统中固定优先级的离线分配问题。这个问题在这类系统中至关重要,因为良好的固定优先级分配可以在满足所有截止日期要求的同时有效利用处理资源。在文献中,我们可以找到几种解决这一问题的方案,它们在结果质量和计算复杂性之间做出了不同的权衡。在本文中,我们提出了一种新方法,利用机器学习领域广泛使用的现有算法:梯度下降算法、亚当优化算法和梯度噪声算法。我们展示了如何将这些算法与现有的最坏情况响应时间分析相结合,以适应固定优先级分配问题。我们在不同规模的合成任务集上演示了我们建议的性能。评估结果表明,与之前的启发式算法相比,我们的建议能够找到更多可调度的解决方案,近似于 MILP 或蛮力等最优但难以解决的算法,同时要求合理的执行时间。
{"title":"Gradient descent algorithm for the optimization of fixed priorities in real-time systems","authors":"Juan M. Rivas ,&nbsp;J. Javier Gutiérrez ,&nbsp;Ana Guasque ,&nbsp;Patricia Balbastre","doi":"10.1016/j.sysarc.2024.103198","DOIUrl":"10.1016/j.sysarc.2024.103198","url":null,"abstract":"<div><p>This paper considers the offline assignment of fixed priorities in partitioned preemptive real-time systems where tasks have precedence constraints. This problem is crucial in this type of systems, as having a <em>good</em> fixed priority assignment allows for an efficient use of the processing resources while meeting all the deadlines. In the literature, we can find several proposals to solve this problem, which offer varying trade-offs between the quality of their results and their computational complexities. <em>In this paper</em>, we propose a new approach, leveraging existing algorithms that are widely exploited in the field of Machine Learning: Gradient Descent, the Adam Optimizer, and Gradient Noise. We show how to adapt these algorithms to the problem of fixed priority assignment in conjunction with existing worst-case response time analyses. We demonstrate the performance of our proposal on synthetic task-sets with different sizes. This evaluation shows that our proposal is able to find more schedulable solutions than previous heuristics, approximating optimal but intractable algorithms such as MILP or brute-force, while requiring reasonable execution times.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103198"},"PeriodicalIF":4.5,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001358/pdfft?md5=e6db572d1a849663538d79c2985ac16d&pid=1-s2.0-S1383762124001358-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141394346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability-aware scheduling for (m,k)-firm real-time embedded systems under hard energy budget constraint h条件下(m,k)确认实时嵌入式系统的可靠性感知调度
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-04 DOI: 10.1016/j.sysarc.2024.103185
Linwei Niu, Jonathan Musselwhite

For real-time embedded systems, feasibility, Quality of Service (QoS), reliability, and energy constraint are among the primary design concerns. In this research, we proposed a reliability-aware scheduling scheme for real-time embedded systems with (m,k)-firm deadlines under hard energy budget constraint. The (m,k)-firm systems require that at least m out of any k consecutive jobs of a real-time task meet their deadlines. To achieve the dual goals of maximizing the feasibility and QoS for such kind of systems while satisfying the reliability requirement under given energy budget constraint, we propose to reserve recovery space for real-time jobs in an adaptive way based on the mandatory/optional job partitioning strategy. The evaluation results demonstrate that the proposed techniques significantly outperform the previous research in maximizing the feasibility and QoS for (m,k)-firm real-time embedded systems while preserving the system reliability under hard energy budget constraint. Moreover, the proposed work has also addressed some insufficiency in Niu (2020) in terms of preserving the system reliability.

对于实时嵌入式系统来说,可行性、服务质量(QoS)、可靠性和能源约束是设计中的主要关注点。在这项研究中,我们提出了一种可靠性感知调度方案,适用于在硬能源预算约束下具有(m,k)确认截止日期的实时嵌入式系统。(m,k)-firm 系统要求实时任务的任意 k 个连续作业中至少有 m 个作业能在截止日期前完成。为了实现此类系统可行性和服务质量最大化的双重目标,同时满足给定能源预算约束下的可靠性要求,我们提出了基于强制/可选作业分区策略的自适应方式,为实时作业预留恢复空间。评估结果表明,对于 (m,k) 确认的实时嵌入式系统,所提出的技术在最大化可行性和 QoS 方面明显优于之前的研究,同时还能在硬能源预算约束下保持系统可靠性。此外,所提出的工作还解决了 Niu(2020)在保护系统可靠性方面的一些不足。
{"title":"Reliability-aware scheduling for (m,k)-firm real-time embedded systems under hard energy budget constraint","authors":"Linwei Niu,&nbsp;Jonathan Musselwhite","doi":"10.1016/j.sysarc.2024.103185","DOIUrl":"10.1016/j.sysarc.2024.103185","url":null,"abstract":"<div><p>For real-time embedded systems, feasibility, Quality of Service (QoS), reliability, and energy constraint are among the primary design concerns. In this research, we proposed a reliability-aware scheduling scheme for real-time embedded systems with <span><math><mrow><mo>(</mo><mi>m</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></math></span>-firm deadlines under hard energy budget constraint. The <span><math><mrow><mo>(</mo><mi>m</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></math></span>-firm systems require that at least <span><math><mi>m</mi></math></span> out of any <span><math><mi>k</mi></math></span> consecutive jobs of a real-time task meet their deadlines. To achieve the dual goals of maximizing the feasibility and QoS for such kind of systems while satisfying the reliability requirement under given energy budget constraint, we propose to reserve recovery space for real-time jobs in an adaptive way based on the mandatory/optional job partitioning strategy. The evaluation results demonstrate that the proposed techniques significantly outperform the previous research in maximizing the feasibility and QoS for <span><math><mrow><mo>(</mo><mi>m</mi><mo>,</mo><mi>k</mi><mo>)</mo></mrow></math></span>-firm real-time embedded systems while preserving the system reliability under hard energy budget constraint. Moreover, the proposed work has also addressed some insufficiency in Niu (2020) in terms of preserving the system reliability.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103185"},"PeriodicalIF":3.7,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141405221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription TRA-PS:提供快速、精细可控订阅的可问责数据发布/子服务
IF 4.5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-03 DOI: 10.1016/j.sysarc.2024.103197
Kai Zhang , Xiaobing Shi , Jinguo Li , Yi Wu , Jianting Ning

The Cloud-based data publish/subscribe (Pub/Sub) service presents a selective manner for publishers and subscribers to share and receive data, where confidentiality and authorized access to the data are the fundamental security properties. Therefore, the methodology of attribute-based keyword search (ABKS) was applied that recently considered bilateral access control between the publisher and subscriber. However, existing data Pub/Sub solutions fail to take into account the following features: (i) the efficient revocation of subscribers; (ii) the traceability and auditability of subscriptions; (iii) the excessive time cost of decryption procedure. Therefore, we propose TRA-PS, an accountable data Pub/Sub service that implements efficient revocation, traceability, and public auditability for subscriptions. Technically, we refine the secret key of subscriber in the classic ABKS schemes with associating its identity information and binding accountability module. In addition, we implement TRA-PS and evaluate its practical performance compared to state-of-the-art work in the real cloud environment. Besides achieving accountable property, TRA-PS significantly diminishes the decryption time cost (number of attributes/keywords is 25) by 91.8%, independent of the number of attributes/keywords.

基于云的数据发布/订阅(Pub/Sub)服务为发布者和订阅者提供了一种有选择地共享和接收数据的方式,数据的保密性和授权访问是其基本的安全属性。因此,基于属性的关键字搜索(ABKS)方法得到了应用,该方法最近考虑了发布者和订阅者之间的双边访问控制。然而,现有的数据发布/订阅解决方案没有考虑到以下特点:(i) 订阅者的有效撤销;(ii) 订阅的可追溯性和可审计性;(iii) 解密过程的时间成本过高。因此,我们提出了 TRA-PS,一种可问责的数据 Pub/Sub 服务,它实现了订阅的高效撤销、可追溯性和公开可审计性。在技术上,我们通过关联订阅者的身份信息和绑定责任模块,完善了经典 ABKS 方案中订阅者的秘钥。此外,我们还实现了 TRA-PS,并在真实云环境中评估了其与最先进技术的实际性能。TRA-PS 除了实现了可问责特性外,还显著降低了解密时间成本(属性/关键字数量为 25),降幅达 91.8%,且与属性/关键字数量无关。
{"title":"TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription","authors":"Kai Zhang ,&nbsp;Xiaobing Shi ,&nbsp;Jinguo Li ,&nbsp;Yi Wu ,&nbsp;Jianting Ning","doi":"10.1016/j.sysarc.2024.103197","DOIUrl":"10.1016/j.sysarc.2024.103197","url":null,"abstract":"<div><p>The Cloud-based data publish/subscribe (Pub/Sub) service presents a selective manner for publishers and subscribers to share and receive data, where confidentiality and authorized access to the data are the fundamental security properties. Therefore, the methodology of attribute-based keyword search (ABKS) was applied that recently considered bilateral access control between the publisher and subscriber. However, existing data Pub/Sub solutions fail to take into account the following features: (i) the efficient revocation of subscribers; (ii) the traceability and auditability of subscriptions; (iii) the excessive time cost of decryption procedure. Therefore, we propose TRA-PS, an accountable data Pub/Sub service that implements efficient revocation, traceability, and public auditability for subscriptions. Technically, we refine the secret key of subscriber in the classic ABKS schemes with associating its identity information and binding accountability module. In addition, we implement TRA-PS and evaluate its practical performance compared to state-of-the-art work in the real cloud environment. Besides achieving accountable property, TRA-PS significantly diminishes the decryption time cost (number of attributes/keywords is 25) by 91.8%, independent of the number of attributes/keywords.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"153 ","pages":"Article 103197"},"PeriodicalIF":4.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141275811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Systems Architecture
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1