首页 > 最新文献

IET Computers and Digital Techniques最新文献

英文 中文
A novel self-timing CMOS first-edge take-all circuit for on-chip communication systems 一种用于片上通信系统的新型自定时CMOS第一边缘全通电路
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-21 DOI: 10.1049/cdt2.12059
Saleh Abdelhafeez, Shadi M. S. Harb

In today's communication systems, it has become prominent for processing elements (PEs) to receive requests with simultaneous, conflicting signals, which are unpredicted and randomly triggered. In such a case, multiple overlapping signal requests can potentially compete in the same PE causing erroneous operations or a halt of the communication cycle. The authors propose a self-timing CMOS first-edge take-all (FETA) circuit architecture, which examines two overlapping signals’ requests, and outputs only the leading-edge signal while the lagging-edge signal's request is declined. The FETA circuit functionality is considered as an essential component in First-In-First-Out for metastability avoidance, which usually occurs between the write and read overlapping requests for applications related to Internet of Things, Network-on-Chips, and microprocessor memory management units. HSPICE simulations for a 90 nm CMOS technology are used to verify the speed up to 1 GHz. Besides, the achievable resolution is in the order of 20 ps considering process variation sensitivity based on design inheriting symmetric timing paths between the two signals. Additionally, the proposed circuit architecture adopts a self-timing scheme obviating the overhead synchronisation circuitry, which comprises 12 D-Type Flip-Flops with about 300 transistors. This design is suited for HDL synthesis and FPGA application features.

在当今的通信系统中,处理元件(PE)接收具有不可预测和随机触发的同时的、冲突的信号的请求已经变得突出。在这种情况下,多个重叠的信号请求可能在同一PE中竞争,从而导致错误操作或通信周期的停止。作者提出了一种自定时CMOS先沿全取(FETA)电路结构,该结构检查两个重叠信号的请求,并且只输出前沿信号,而拒绝滞后信号的请求。FETA电路功能被认为是先进先出中的一个重要组件,用于避免亚稳态,这通常发生在与物联网、芯片上网络和微处理器存储器管理单元相关的应用程序的写入和读取重叠请求之间。针对90nm CMOS技术的HSPICE模拟用于验证高达1GHz的速度。此外,考虑到基于继承两个信号之间的对称时序路径的设计的工艺变化灵敏度,可实现的分辨率在20ps的数量级。此外,所提出的电路架构采用了一种自定时方案,消除了开销同步电路,该电路包括12个具有约300个晶体管的D型触发器。此设计适用于HDL合成和FPGA应用功能。
{"title":"A novel self-timing CMOS first-edge take-all circuit for on-chip communication systems","authors":"Saleh Abdelhafeez,&nbsp;Shadi M. S. Harb","doi":"10.1049/cdt2.12059","DOIUrl":"https://doi.org/10.1049/cdt2.12059","url":null,"abstract":"<p>In today's communication systems, it has become prominent for processing elements (PEs) to receive requests with simultaneous, conflicting signals, which are unpredicted and randomly triggered. In such a case, multiple overlapping signal requests can potentially compete in the same PE causing erroneous operations or a halt of the communication cycle. The authors propose a self-timing CMOS first-edge take-all (FETA) circuit architecture, which examines two overlapping signals’ requests, and outputs only the leading-edge signal while the lagging-edge signal's request is declined. The FETA circuit functionality is considered as an essential component in First-In-First-Out for metastability avoidance, which usually occurs between the write and read overlapping requests for applications related to Internet of Things, Network-on-Chips, and microprocessor memory management units. HSPICE simulations for a 90 nm CMOS technology are used to verify the speed up to 1 GHz. Besides, the achievable resolution is in the order of 20 ps considering process variation sensitivity based on design inheriting symmetric timing paths between the two signals. Additionally, the proposed circuit architecture adopts a self-timing scheme obviating the overhead synchronisation circuitry, which comprises 12 D-Type Flip-Flops with about 300 transistors. This design is suited for HDL synthesis and FPGA application features.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 3-4","pages":"141-148"},"PeriodicalIF":1.2,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50139916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated taxonomy of standard indicators for ranking and selecting supercomputers 超级计算机排名和选择标准指标的综合分类法
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-20 DOI: 10.1049/cdt2.12061
Davood Maleki, Alireza Mansouri, Ehsan Arianyan

Due to the ever-increasing computing requirements of modern applications, supercomputers are at the centre of attraction as a platform for high-performance computing. Although various features and indicators for testing and evaluating supercomputers are proposed in the literature, a comprehensive feature set to guide designers in comparing supercomputers and selecting an appropriate choice is not provided. Here, an integrated feature-based taxonomy comprised of seven indicator groups including passive infrastructure, hardware, software, support and maintenance, service, business, and security features is proposed. Also, a case study using our proposed framework is provided and a comparison between some commercial and research supercomputers including Fugaku's ideal supercomputer, Sharif supercomputer, Aramco supercomputer, and ITU supercomputer is presented. Moreover, here, the authors’ proposed method is compared with the Top500 method, which shows that the authors’ proposed method facilitates the ranking, comparison, and selection of the appropriate supercomputer in various fields by considering various aspects of design and implementation. The ranking results show that Aramco supercomputer, ITU supercomputer, and Sharif supercomputer have 65.9%, 57.6%, and 48.2% of ideal supercomputer points, respectively.

由于现代应用程序对计算的需求不断增加,超级计算机作为高性能计算平台成为吸引人的焦点。尽管文献中提出了测试和评估超级计算机的各种特征和指标,但没有提供一个全面的特征集来指导设计者比较超级计算机并选择合适的选择。在此,提出了一个基于功能的集成分类法,该分类法由七个指标组组成,包括被动基础设施、硬件、软件、支持和维护、服务、业务和安全功能。此外,还使用我们提出的框架进行了案例研究,并对一些商业和研究超级计算机进行了比较,包括Fugaku的理想超级计算机、Sharif超级计算机、Aramco超级计算机和ITU超级计算机。此外,在这里,作者提出的方法与Top500方法进行了比较,这表明作者提出的算法通过考虑设计和实现的各个方面,有助于在各个领域对合适的超级计算机进行排名、比较和选择。排名结果显示,阿美超级计算机、国际电联超级计算机和谢里夫超级计算机的理想超级计算机点数分别为65.9%、57.6%和48.2%。
{"title":"An integrated taxonomy of standard indicators for ranking and selecting supercomputers","authors":"Davood Maleki,&nbsp;Alireza Mansouri,&nbsp;Ehsan Arianyan","doi":"10.1049/cdt2.12061","DOIUrl":"https://doi.org/10.1049/cdt2.12061","url":null,"abstract":"<p>Due to the ever-increasing computing requirements of modern applications, supercomputers are at the centre of attraction as a platform for high-performance computing. Although various features and indicators for testing and evaluating supercomputers are proposed in the literature, a comprehensive feature set to guide designers in comparing supercomputers and selecting an appropriate choice is not provided. Here, an integrated feature-based taxonomy comprised of seven indicator groups including passive infrastructure, hardware, software, support and maintenance, service, business, and security features is proposed. Also, a case study using our proposed framework is provided and a comparison between some commercial and research supercomputers including Fugaku's ideal supercomputer, Sharif supercomputer, Aramco supercomputer, and ITU supercomputer is presented. Moreover, here, the authors’ proposed method is compared with the Top500 method, which shows that the authors’ proposed method facilitates the ranking, comparison, and selection of the appropriate supercomputer in various fields by considering various aspects of design and implementation. The ranking results show that Aramco supercomputer, ITU supercomputer, and Sharif supercomputer have 65.9%, 57.6%, and 48.2% of ideal supercomputer points, respectively.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 3-4","pages":"162-179"},"PeriodicalIF":1.2,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50139238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compressing fully connected layers of deep neural networks using permuted features 利用置换特征压缩深度神经网络的全连通层
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-11 DOI: 10.1049/cdt2.12060
Dara Nagaraju, Nitin Chandrachoodan

Modern deep neural networks typically have some fully connected layers at the final classification stages. These stages have large memory requirements that can be expensive on resource-constrained embedded devices and also consume significant energy just to read the parameters from external memory into the processing chip. The authors show that the weights in such layers can be modelled as permutations of a common sequence with minimal impact on recognition accuracy. This allows the storage requirements of FC layer(s) to be significantly reduced, which reflects in the reduction of total network parameters from 1.3× to 36× with a median of 4.45× on several benchmark networks. The authors compare the results with existing pruning, bitwidth reduction, and deep compression techniques and show the superior compression that can be achieved with this method. The authors also showed 7× reduction of parameters on VGG16 architecture with ImageNet dataset. The authors also showed that the proposed method can be used in the classification stage of the transfer learning networks.

现代深度神经网络通常在最终分类阶段具有一些完全连接的层。这些阶段具有大的存储器需求,这在资源受限的嵌入式设备上可能是昂贵的,并且仅仅为了将参数从外部存储器读取到处理芯片中也消耗大量能量。作者表明,这些层中的权重可以建模为公共序列的排列,对识别精度的影响最小。这使得FC层的存储需求显著降低,这反映在总网络参数从1.3倍降低到36倍,在几个基准网络上的中值为4.45倍。作者将结果与现有的修剪、位宽缩减和深度压缩技术进行了比较,并展示了该方法可以实现的优越压缩。作者还用ImageNet数据集展示了VGG16架构上的参数减少了7倍。作者还表明,所提出的方法可以用于迁移学习网络的分类阶段。
{"title":"Compressing fully connected layers of deep neural networks using permuted features","authors":"Dara Nagaraju,&nbsp;Nitin Chandrachoodan","doi":"10.1049/cdt2.12060","DOIUrl":"https://doi.org/10.1049/cdt2.12060","url":null,"abstract":"<p>Modern deep neural networks typically have some fully connected layers at the final classification stages. These stages have large memory requirements that can be expensive on resource-constrained embedded devices and also consume significant energy just to read the parameters from external memory into the processing chip. The authors show that the weights in such layers can be modelled as permutations of a common sequence with minimal impact on recognition accuracy. This allows the storage requirements of FC layer(s) to be significantly reduced, which reflects in the reduction of total network parameters from 1.3× to 36× with a median of 4.45× on several benchmark networks. The authors compare the results with existing pruning, bitwidth reduction, and deep compression techniques and show the superior compression that can be achieved with this method. The authors also showed 7× reduction of parameters on VGG16 architecture with ImageNet dataset. The authors also showed that the proposed method can be used in the classification stage of the transfer learning networks.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 3-4","pages":"149-161"},"PeriodicalIF":1.2,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50149530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of serialising instructions for security against transient execution attacks 针对瞬态执行攻击的串行指令安全性验证
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-05-29 DOI: 10.1049/cdt2.12058
Kushal K. Ponugoti, Sudarshan K. Srinivasan, Nimish Mathure

Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side-channels. Software solutions to defend against many transient execution attacks employ the lfence serialising instruction, which does not allow instructions that come after the lfence to execute out-of-order with respect to instructions that come before the lfence. However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. The authors provide a formal method solution that addresses the verification of lfence hardware implementation. The authors also show how hardware Trojans can be designed to circumvent lfence and demonstrate that their verification approach will flag such Trojans as well. The authors have demonstrated the efficacy of our approach using RSD, which is an open source RISC-V based superscalar out-of-order processor.

Spectre和Meltdown等瞬态执行攻击利用现代微处理器中的推测执行,通过缓存侧通道泄漏信息。针对许多瞬态执行攻击的软件解决方案采用lfence串行化指令,该指令不允许lfence之后的指令相对于lfence之前的指令无序执行。然而,lfence硬件实现中的错误和特洛伊木马可以被利用来破坏使用lfence的软件缓解措施。上述安全漏洞以前没有发现和解决。作者提供了一种形式化的方法解决方案,解决了lfence硬件实现的验证问题。作者还展示了如何设计硬件木马来规避lfence,并证明他们的验证方法也会标记此类木马。作者已经使用RSD证明了我们的方法的有效性,RSD是一种基于开源RISC-V的超标量无序处理器。
{"title":"Verification of serialising instructions for security against transient execution attacks","authors":"Kushal K. Ponugoti,&nbsp;Sudarshan K. Srinivasan,&nbsp;Nimish Mathure","doi":"10.1049/cdt2.12058","DOIUrl":"https://doi.org/10.1049/cdt2.12058","url":null,"abstract":"<p>Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side-channels. Software solutions to defend against many transient execution attacks employ the <i>lfence</i> serialising instruction, which does not allow instructions that come after the <i>lfence</i> to execute out-of-order with respect to instructions that come before the <i>lfence</i>. However, errors and Trojans in the hardware implementation of <i>lfence</i> can be exploited to compromise the software mitigations that use <i>lfence</i>. The aforementioned security gap has not been identified and addressed previously. The authors provide a formal method solution that addresses the verification of <i>lfence</i> hardware implementation. The authors also show how hardware Trojans can be designed to circumvent <i>lfence</i> and demonstrate that their verification approach will flag such Trojans as well. The authors have demonstrated the efficacy of our approach using RSD, which is an open source RISC-V based superscalar out-of-order processor.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 3-4","pages":"127-140"},"PeriodicalIF":1.2,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50147574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists 轻量级密码密码学竞赛决赛选手的电源侧信道攻击残余漏洞
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-05-22 DOI: 10.1049/cdt2.12057
Aurelien T. Mozipo, John M. Acken

The protection of communications between Internet of Things (IoT) devices is of great concern because the information exchanged contains vital sensitive data. Malicious agents seek to exploit those data to extract secret information about the owners or the system. Power side channel attacks are of great concern on these devices because their power consumption unintentionally leaks information correlatable to the device's secret data. Several studies have demonstrated the effectiveness of authenticated encryption with advanced data, in protecting communications with these devices. A comprehensive evaluation of the seven (out of 10) algorithm finalists of the National Institute of Standards and Technology (NIST) IoT lightweight cipher competition that do not integrate built-in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power side channel attacks (SCA). For five ciphers, an attack methodology as well as the leakage function needed to perform correlation power analysis (CPA) is proposed. The authors assert that Ascon, Sparkle, and PHOTON-Beetle security vulnerability can generally be assessed with the security assumptions “Chosen ciphertext attack and leakage in encryption only, with nonce-misuse resilience adversary (CCAmL1)” and “Chosen ciphertext attack and leakage in encryption only with nonce-respecting adversary (CCAL1)”, respectively. However, the security vulnerability of GIFT-COFB, Grain, Romulus, and TinyJambu can be evaluated more straightforwardly with publicly available leakage models and solvers. They can also be assessed simply by increasing the number of traces collected to launch the attack.

物联网(IoT)设备之间的通信保护备受关注,因为交换的信息包含重要的敏感数据。恶意代理试图利用这些数据来提取有关所有者或系统的秘密信息。功率侧信道攻击在这些设备上引起了极大的关注,因为它们的功耗无意中泄露了与设备的秘密数据相关的信息。几项研究已经证明了使用高级数据进行身份验证加密在保护与这些设备的通信方面的有效性。对美国国家标准与技术研究院(NIST)物联网轻量级密码竞赛的七名(满分10名)算法决赛选手进行了综合评估,这些选手没有集成内置对策。研究表明,尽管如此,它们仍然存在一些对功率侧信道攻击(SCA)的残余漏洞。针对五种密码,提出了一种攻击方法以及执行相关功率分析(CPA)所需的泄漏函数。作者断言,Ascon、Sparkle和PHOTON Beetle的安全漏洞通常可以分别根据安全假设“仅在加密中选择密文攻击和泄漏,具有随机数滥用弹性对手(CCAmL1)”和“仅在尊重随机数的对手(CCAL1)的加密中选择密码攻击和泄漏”进行评估。然而,GIFT-COFB、Grain、Romulus和TinyJambu的安全漏洞可以使用公开的泄漏模型和求解器进行更直接的评估。也可以简单地通过增加为发动攻击而收集的痕迹数量来评估它们。
{"title":"Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists","authors":"Aurelien T. Mozipo,&nbsp;John M. Acken","doi":"10.1049/cdt2.12057","DOIUrl":"https://doi.org/10.1049/cdt2.12057","url":null,"abstract":"<p>The protection of communications between Internet of Things (IoT) devices is of great concern because the information exchanged contains vital sensitive data. Malicious agents seek to exploit those data to extract secret information about the owners or the system. Power side channel attacks are of great concern on these devices because their power consumption unintentionally leaks information correlatable to the device's secret data. Several studies have demonstrated the effectiveness of authenticated encryption with advanced data, in protecting communications with these devices. A comprehensive evaluation of the seven (out of 10) algorithm finalists of the National Institute of Standards and Technology (NIST) IoT lightweight cipher competition that do not integrate built-in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power side channel attacks (SCA). For five ciphers, an attack methodology as well as the leakage function needed to perform correlation power analysis (CPA) is proposed. The authors assert that Ascon, Sparkle, and PHOTON-Beetle security vulnerability can generally be assessed with the security assumptions “Chosen ciphertext attack and leakage in encryption only, with nonce-misuse resilience adversary (CCAmL1)” and “Chosen ciphertext attack and leakage in encryption only with nonce-respecting adversary (CCAL1)”, respectively. However, the security vulnerability of GIFT-COFB, Grain, Romulus, and TinyJambu can be evaluated more straightforwardly with publicly available leakage models and solvers. They can also be assessed simply by increasing the number of traces collected to launch the attack.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 3-4","pages":"75-88"},"PeriodicalIF":1.2,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50141094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient implementation of low cost and secure framework with firmware updates 通过固件更新高效实现低成本、安全的框架
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-05-10 DOI: 10.1049/cdt2.12054
Ines Ben Hlima, Halim Kacem, Ali Gharsallah

Recently, the Internet of things (IoT) has become extensively used in our daily lives. This technology offers a new vision of the future internet where devices are interconnected and can communicate together. A big number of these devices complicates the firmware update and makes it more expensive since each node must be updated locally. Nevertheless, there are many cases where devices cannot change their location to upgrade the firmware locally due to an unreachable location or dangerous place. Therefore, it is necessary to remotely update the firmware of devices. In this study, the authors propose an efficient implementation of a low cost and secure framework of upgrading the firmware employing the latter On-The-Air programming technique. The authors present a proof of concept for a ubiquitous system applying wireless programmer. Our design offers a remote broadcasting of image code without disturbing the main functionality of nodes. The authors validated the performance of our design on a real network based on STM32 micro-controllers. The results showed the reduction of the network time-off, enabling a continuous operation of the ecosystem.

最近,物联网在我们的日常生活中得到了广泛的应用。这项技术为未来互联网提供了一个新的愿景,在未来互联网中,设备相互连接,可以一起通信。大量的这些设备使固件更新变得复杂,并且由于每个节点都必须在本地更新,因此成本更高。然而,在许多情况下,由于无法到达的位置或危险的地方,设备无法更改其位置以在本地升级固件。因此,有必要远程更新设备的固件。在这项研究中,作者提出了一种使用后一种空中编程技术升级固件的低成本和安全框架的有效实现。作者提出了一个应用无线编程器的泛在系统的概念证明。我们的设计提供了图像代码的远程广播,而不会干扰节点的主要功能。作者在基于STM32微控制器的真实网络上验证了我们的设计性能。结果表明,网络中断时间减少,使生态系统能够持续运行。
{"title":"Efficient implementation of low cost and secure framework with firmware updates","authors":"Ines Ben Hlima,&nbsp;Halim Kacem,&nbsp;Ali Gharsallah","doi":"10.1049/cdt2.12054","DOIUrl":"https://doi.org/10.1049/cdt2.12054","url":null,"abstract":"<p>Recently, the Internet of things (IoT) has become extensively used in our daily lives. This technology offers a new vision of the future internet where devices are interconnected and can communicate together. A big number of these devices complicates the firmware update and makes it more expensive since each node must be updated locally. Nevertheless, there are many cases where devices cannot change their location to upgrade the firmware locally due to an unreachable location or dangerous place. Therefore, it is necessary to remotely update the firmware of devices. In this study, the authors propose an efficient implementation of a low cost and secure framework of upgrading the firmware employing the latter On-The-Air programming technique. The authors present a proof of concept for a ubiquitous system applying wireless programmer. Our design offers a remote broadcasting of image code without disturbing the main functionality of nodes. The authors validated the performance of our design on a real network based on STM32 micro-controllers. The results showed the reduction of the network time-off, enabling a continuous operation of the ecosystem.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 3-4","pages":"89-99"},"PeriodicalIF":1.2,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50147647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints ActiveGuard:一种用于深度神经网络的主动知识产权保护技术,利用对抗性示例作为用户指纹
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-05-10 DOI: 10.1049/cdt2.12056
Mingfu Xue, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang, Jian Wang, Weiqiang Liu

The intellectual properties (IP) protection of deep neural networks (DNN) models has raised many concerns in recent years. To date, most of the existing works use DNN watermarking to protect the IP of DNN models. However, the DNN watermarking methods can only passively verify the copyright of the model after the DNN model has been pirated, which cannot prevent piracy in the first place. In this paper, an active DNN IP protection technique against DNN piracy, called ActiveGuard, is proposed. ActiveGuard can provide active authorisation control, users' identities management, and ownership verification for DNN models. Specifically, for the first time, ActiveGuard exploits well-crafted rare and specific adversarial examples with specific classes and confidences as users' fingerprints to distinguish authorised users from unauthorised ones. Authorised users can input their fingerprints to the DNN model for identity authentication and then obtain normal usage, while unauthorised users will obtain a very poor model performance. In addition, ActiveGuard enables the model owner to embed a watermark into the weights of the DNN model for ownership verification. Compared to the few existing active DNN IP protection works, ActiveGuard can support both users' identities identification and active authorisation control. Besides, ActiveGuard introduces lower overhead than these existing active protection works. Experimental results show that, for authorised users, the test accuracy of LeNet-5 and Wide Residual Network (WRN) models are 99.15% and 91.46%, respectively, while for unauthorised users, the test accuracy of LeNet-5 and WRN models are only 8.92% and 10%, respectively. Besides, each authorised user can pass the fingerprint authentication with a high success rate (up to 100%). For ownership verification, the embedded watermark can be successfully extracted, while the normal performance of DNN models will not be affected. Furthermore, it is demonstrated that ActiveGuard is robust against model fine-tuning attack, pruning attack, and three types of fingerprint forgery attacks.

近年来,深度神经网络模型的知识产权保护引起了人们的广泛关注。到目前为止,大多数现有的作品都使用DNN水印来保护DNN模型的IP。然而,DNN水印方法只能在DNN模型被盗版后被动地验证模型的版权,这不能从一开始就防止盗版。本文提出了一种针对DNN盗版的主动DNN IP保护技术ActiveGuard。ActiveGuard可以为DNN模型提供主动授权控制、用户身份管理和所有权验证。具体来说,ActiveGuard首次利用精心制作的罕见和特定的对抗性示例,将特定的类和机密信息作为用户的指纹,以区分授权用户和未授权用户。授权用户可以将指纹输入DNN模型进行身份验证,然后获得正常使用,而未授权用户将获得非常差的模型性能。此外,ActiveGuard使模型所有者能够将水印嵌入DNN模型的权重中,以进行所有权验证。与现有为数不多的主动DNN IP保护工作相比,ActiveGuard可以同时支持用户身份识别和主动授权控制。此外,ActiveGuard引入了比这些现有的主动保护工作更低的开销。实验结果表明,对于授权用户,LeNet-5和宽残差网络(WRN)模型的测试准确率分别为99.15%和91.46%,而对于未经授权的用户,LeNet-5和WRN模型的测试正确率分别仅为8.92%和10%。此外,每个授权用户都可以通过指纹认证,成功率高达100%。对于所有权验证,嵌入的水印可以成功提取,而DNN模型的正常性能不会受到影响。此外,还证明了ActiveGuard对模型微调攻击、修剪攻击和三种类型的指纹伪造攻击具有鲁棒性。
{"title":"ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints","authors":"Mingfu Xue,&nbsp;Shichang Sun,&nbsp;Can He,&nbsp;Dujuan Gu,&nbsp;Yushu Zhang,&nbsp;Jian Wang,&nbsp;Weiqiang Liu","doi":"10.1049/cdt2.12056","DOIUrl":"https://doi.org/10.1049/cdt2.12056","url":null,"abstract":"<p>The intellectual properties (IP) protection of deep neural networks (DNN) models has raised many concerns in recent years. To date, most of the existing works use DNN watermarking to protect the IP of DNN models. However, the DNN watermarking methods can only passively verify the copyright of the model after the DNN model has been pirated, which cannot prevent piracy in the first place. In this paper, an active DNN IP protection technique against DNN piracy, called ActiveGuard<i>,</i> is proposed. ActiveGuard can provide active authorisation control, users' identities management, and ownership verification for DNN models. Specifically, for the first time, ActiveGuard exploits well-crafted rare and specific adversarial examples with specific classes and confidences as users' fingerprints to distinguish authorised users from unauthorised ones. Authorised users can input their fingerprints to the DNN model for identity authentication and then obtain normal usage, while unauthorised users will obtain a very poor model performance. In addition, ActiveGuard enables the model owner to embed a watermark into the weights of the DNN model for ownership verification. Compared to the few existing active DNN IP protection works, ActiveGuard can support both users' identities identification and active authorisation control. Besides, ActiveGuard introduces lower overhead than these existing active protection works. Experimental results show that, for authorised users, the test accuracy of LeNet-5 and Wide Residual Network (WRN) models are 99.15% and 91.46%, respectively, while for unauthorised users, the test accuracy of LeNet-5 and WRN models are only 8.92% and 10%, respectively. Besides, each authorised user can pass the fingerprint authentication with a high success rate (up to 100%). For ownership verification, the embedded watermark can be successfully extracted, while the normal performance of DNN models will not be affected. Furthermore, it is demonstrated that ActiveGuard is robust against model fine-tuning attack, pruning attack, and three types of fingerprint forgery attacks.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 3-4","pages":"111-126"},"PeriodicalIF":1.2,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50147648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fast approximation of the top-k items in data streams using FPGAs 使用FPGA快速逼近数据流中的前k项
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-19 DOI: 10.1049/cdt2.12053
Ali Ebrahim, Jalal Khalifat

Two methods are presented for finding the top-k items in data streams using Field Programmable Gate Arrays (FPGAs). These methods deploy two variants of a novel accelerator architecture capable of extracting an approximate list of the topmost frequently occurring items in a single pass over the input stream without the need for random access. The first variant of the accelerator implements the well-known Probabilistic sampling algorithm by mapping its main processing stages to a hardware architecture consisting of two custom systolic arrays. The proposed architecture retains all the properties of this algorithm, which works even if the stream size is unknown at run time. The architecture shows better scalability compared to other architectures that are based on other stream algorithms. In addition, experimental results on both synthetic and real datasets, when implementing the accelerator on an Intel Arria 10 GX 1150 FPGA device, showed very good accuracy and significant throughput gains compared to the existing software and hardware-accelerated solutions. The second variant of the accelerator is specifically tailored for applications requiring higher accuracy, provided that the size of the stream is known at run time. This variant takes advantage of the embedded memory resources in an FPGA to implement a sketch-based filter that precedes the main systolic array in the accelerator's pipeline. This filter enhances the accuracy of the accelerator by pre-processing the stream to remove much of the insignificant items, allowing the accelerator to process a significantly smaller filtered stream.

提出了两种使用现场可编程门阵列(FPGA)查找数据流中前k项的方法。这些方法部署了一种新型加速器架构的两种变体,该架构能够在不需要随机访问的情况下在输入流上的一次传递中提取最频繁出现的项目的近似列表。加速器的第一个变体通过将其主要处理阶段映射到由两个自定义收缩阵列组成的硬件架构来实现众所周知的概率采样算法。所提出的体系结构保留了该算法的所有属性,即使在运行时流大小未知,该算法也能工作。与基于其他流算法的其他架构相比,该架构显示出更好的可扩展性。此外,当在Intel Arria 10 GX 1150 FPGA设备上实现加速器时,在合成和真实数据集上的实验结果显示,与现有的软件和硬件加速解决方案相比,具有非常好的准确性和显著的吞吐量提高。加速器的第二种变体是专门为需要更高精度的应用而定制的,前提是在运行时已知流的大小。该变体利用FPGA中的嵌入式内存资源来实现基于草图的滤波器,该滤波器位于加速器管道中的主收缩阵列之前。该过滤器通过预处理流以去除大部分不重要的项目来提高加速器的准确性,从而允许加速器处理明显较小的过滤流。
{"title":"Fast approximation of the top-k items in data streams using FPGAs","authors":"Ali Ebrahim,&nbsp;Jalal Khalifat","doi":"10.1049/cdt2.12053","DOIUrl":"https://doi.org/10.1049/cdt2.12053","url":null,"abstract":"<p>Two methods are presented for finding the top-<i>k</i> items in data streams using Field Programmable Gate Arrays (FPGAs). These methods deploy two variants of a novel accelerator architecture capable of extracting an approximate list of the topmost frequently occurring items in a single pass over the input stream without the need for random access. The first variant of the accelerator implements the well-known <i>Probabilistic</i> sampling algorithm by mapping its main processing stages to a hardware architecture consisting of two custom systolic arrays. The proposed architecture retains all the properties of this algorithm, which works even if the stream size is unknown at run time. The architecture shows better scalability compared to other architectures that are based on other stream algorithms. In addition, experimental results on both synthetic and real datasets, when implementing the accelerator on an Intel Arria 10 GX 1150 FPGA device, showed very good accuracy and significant throughput gains compared to the existing software and hardware-accelerated solutions. The second variant of the accelerator is specifically tailored for applications requiring higher accuracy, provided that the size of the stream is known at run time. This variant takes advantage of the embedded memory resources in an FPGA to implement a sketch-based filter that precedes the main systolic array in the accelerator's pipeline. This filter enhances the accuracy of the accelerator by pre-processing the stream to remove much of the insignificant items, allowing the accelerator to process a significantly smaller filtered stream.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 2","pages":"60-73"},"PeriodicalIF":1.2,"publicationDate":"2023-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phone-nomenon 2.0: A compact thermal model for smartphones 手机nomenon 2.0:一款适用于智能手机的紧凑型散热机型
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-08 DOI: 10.1049/cdt2.12052
Yu-Min Lee, Hong-Wen Chiou, Shinyu Shiau, Chi-Wen Pan, Shih-Hung Ting

This paper presents a compact thermal model for smartphones, Phone-nomenon 2.0, to predict the thermal behavior of smartphones. In the beginning, non-linearities of internal and external heat transfer mechanisms of smartphones and a compact thermal model for these non-linearities have been studied and proposed. Then, an iterative simulation procedure to handle these non-linearities was developed, and the basic simulation framework which is one option in Phone-nomenon 2.0 was established and we call it Phone-nomenon.Iter. Finally, the linearisation approach was applied, and model order reduction techniques to enhance and speed up the basic framework were employed, and these two options Phone-nomenon.Lin and Phone-nomenon.LinMOR were named. Compared with a commercial tool, ANSYS Icepak, Phone-nomenon.Iter can achieve two orders of magnitude speedup with the maximum error being less than 1.90% for steady-state simulations and three orders of magnitude speedup with the temperature difference being less than 0.65°C for transient simulations. In addition, the speedup of Phone-nomenon.Lin over Phone-nomenon.Iter can be at least 4.22× and 3.26× for steady-state and transient simulations, respectively. Moreover, the speedup of Phone-nomenon.LinMOR over Phone-nomenon.Lin is at least 2.57×.

本文提出了一个紧凑的智能手机热模型,Phone nomenon 2.0,用于预测智能手机的热行为。首先,研究并提出了智能手机内部和外部传热机制的非线性,以及这些非线性的紧凑热模型。然后,开发了一个处理这些非线性的迭代仿真程序,并建立了Phone nomenon 2.0中的一个基本仿真框架,我们称之为Phone-nomenon.it。最后,应用了线性化方法,并采用了模型降阶技术来增强和加速基本框架,并将这两个选项命名为Phone-nomnon.Lin和Phone-nomNon.LinMOR。与商业工具ANSYS Icepak相比,Phone-nomnon.Iter可以实现两个数量级的加速,稳态模拟的最大误差小于1.90%,瞬态模拟的加速可以实现三个数量级,温差小于0.65°C。此外,对于稳态和瞬态模拟,Phone-nomnon.Lin比Phone-nomNon.Iter的加速率分别至少为4.22倍和3.26倍。此外,Phone-nomenon.LinMOR比Phone-nomnon.Lin的加速率至少为2.57×。
{"title":"Phone-nomenon 2.0: A compact thermal model for smartphones","authors":"Yu-Min Lee,&nbsp;Hong-Wen Chiou,&nbsp;Shinyu Shiau,&nbsp;Chi-Wen Pan,&nbsp;Shih-Hung Ting","doi":"10.1049/cdt2.12052","DOIUrl":"https://doi.org/10.1049/cdt2.12052","url":null,"abstract":"<p>This paper presents a compact thermal model for smartphones, Phone-nomenon 2.0, to predict the thermal behavior of smartphones. In the beginning, non-linearities of internal and external heat transfer mechanisms of smartphones and a compact thermal model for these non-linearities have been studied and proposed. Then, an iterative simulation procedure to handle these non-linearities was developed, and the basic simulation framework which is one option in Phone-nomenon 2.0 was established and we call it Phone-nomenon.Iter. Finally, the linearisation approach was applied, and model order reduction techniques to enhance and speed up the basic framework were employed, and these two options Phone-nomenon.Lin and Phone-nomenon.LinMOR were named. Compared with a commercial tool, ANSYS Icepak, Phone-nomenon.Iter can achieve two orders of magnitude speedup with the maximum error being less than 1.90% for steady-state simulations and three orders of magnitude speedup with the temperature difference being less than 0.65°C for transient simulations. In addition, the speedup of Phone-nomenon.Lin over Phone-nomenon.Iter can be at least 4.22× and 3.26× for steady-state and transient simulations, respectively. Moreover, the speedup of Phone-nomenon.LinMOR over Phone-nomenon.Lin is at least 2.57×.</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 2","pages":"43-59"},"PeriodicalIF":1.2,"publicationDate":"2023-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50125052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning guided thermal management of Open Computing Language applications on CPU-GPU based embedded platforms 基于CPU-GPU的嵌入式平台上开放计算语言应用程序的机器学习引导热管理
IF 1.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-28 DOI: 10.1049/cdt2.12050
Rakesh Kumar, Bibhas Ghoshal

As embedded devices start supporting heterogeneous processing cores (Central Processing Unit [CPU]–Graphical Processing Unit [GPU] based cores), performance aware task allocation becomes a major issue. Use of Open Computing Language (OpenCL) applications on both CPU and GPU cores improves performance and resolves the problem. However, it has an adverse effect on the overall power consumption and the operating temperature of the system. Operating both kind of cores within a small form factor at high frequency causes rise in power consumption which in turn leads to increase in processor temperature. The elevated temperature brings about major thermal issues. In this paper, we present our investigation on the role of CPU during execution of GPU specific application and argue against running it at the high frequency. In addition, a machine learning guided mechanism to predict the optimal operating frequency of CPU cores during execution of OpenCL GPU kernels is presented in this study. Our experiments with OpenCL applications on the state of the art ODROID XU4 embedded platform show that the CPU cores of the experimental board if operated at a frequency proposed by our Machine Learning-based predictive method brings about 12.5°C reduction in processor temperature at 1.06% degradation in performance compared to the baseline frequency (default performance frequency governor of the embedded platform).

随着嵌入式设备开始支持异构处理核心(基于中央处理器[CPU]-图形处理单元[GPU]的核心),性能感知任务分配成为一个主要问题。在CPU和GPU核心上使用开放计算语言(OpenCL)应用程序可以提高性能并解决问题。然而,它对系统的整体功耗和工作温度有不利影响。在高频下以小的形状因子操作这两种内核会导致功耗的上升,进而导致处理器温度的上升。升高的温度带来了重大的热问题。在本文中,我们对CPU在GPU特定应用程序执行过程中的作用进行了研究,并反对在高频率下运行它。此外,本研究还提出了一种机器学习引导机制,用于预测OpenCL GPU内核执行过程中CPU内核的最佳工作频率。我们在最先进的ODROID XU4嵌入式平台上对OpenCL应用程序进行的实验表明,如果实验板的CPU内核以我们基于机器学习的预测方法提出的频率运行,与基线频率相比,处理器温度降低约12.5°C,性能下降1.06%(嵌入式平台的默认性能调速器)。
{"title":"Machine learning guided thermal management of Open Computing Language applications on CPU-GPU based embedded platforms","authors":"Rakesh Kumar,&nbsp;Bibhas Ghoshal","doi":"10.1049/cdt2.12050","DOIUrl":"https://doi.org/10.1049/cdt2.12050","url":null,"abstract":"<p>As embedded devices start supporting heterogeneous processing cores (Central Processing Unit [CPU]–Graphical Processing Unit [GPU] based cores), performance aware task allocation becomes a major issue. Use of Open Computing Language (OpenCL) applications on both CPU and GPU cores improves performance and resolves the problem. However, it has an adverse effect on the overall power consumption and the operating temperature of the system. Operating both kind of cores within a small form factor at high frequency causes rise in power consumption which in turn leads to increase in processor temperature. The elevated temperature brings about major thermal issues. In this paper, we present our investigation on the role of CPU during execution of GPU specific application and argue against running it at the high frequency. In addition, a machine learning guided mechanism to predict the optimal operating frequency of CPU cores during execution of OpenCL GPU kernels is presented in this study. Our experiments with OpenCL applications on the state of the art <i>ODROID XU4</i> embedded platform show that the CPU cores of the experimental board if operated at a frequency proposed by our Machine Learning-based predictive method brings about 12.5°C reduction in processor temperature at 1.06% degradation in performance compared to the baseline frequency (default <i>performance</i> frequency governor of the embedded platform).</p>","PeriodicalId":50383,"journal":{"name":"IET Computers and Digital Techniques","volume":"17 1","pages":"20-28"},"PeriodicalIF":1.2,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cdt2.12050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50155184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
IET Computers and Digital Techniques
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1