首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
Multi-Target Device-Free Positioning Based on Spatial-Temporal mmWave Point Cloud 基于时空毫米波点云的多目标无设备定位
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-04 DOI: 10.1109/TMC.2024.3474671
Jie Wang;Jingmiao Wu;Yingwei Qu;Qi Xiao;Qinghua Gao;Yuguang Fang
Device-free positioning (DFP) using mmWave signals is an emerging technique that could track a target without attaching any devices. It conducts position estimation by analyzing the influence of targets on their surrounding mmWave signals. With the widespread utilization of mmWave signals, DFP will have many potential applications in tracking pedestrians and robots in intelligent monitoring systems. State-of-the-art DFP work has already achieved excellent positioning performance when there is one target only, but when there are multiple targets, the time-varying target state, such as entering or leaving of the wireless coverage area and close interactions, makes it challenging to track every target. To solve these problems, in this paper, we propose a spatial-temporal analysis method to robustly track multiple targets based on the high precision mmWave point cloud information. Specifically, we propose a high precision spatial imaging strategy to construct fine-grained mmWave point cloud of the targets, design a spatial-temporal point cloud clustering method to determine the target state, and then leverage a gait based identity and trajectory association scheme and a particle filter to achieve robust identity-aware tracking. Extensive evaluations on a 77 GHz mmWave testbed have been conducted to demonstrate the effectiveness and robustness of our proposed schemes.
使用毫米波信号的无设备定位(DFP)是一种新兴技术,可以在不附加任何设备的情况下跟踪目标。它通过分析目标对周围毫米波信号的影响进行位置估计。随着毫米波信号的广泛应用,DFP将在智能监控系统中跟踪行人和机器人方面具有许多潜在的应用。目前最先进的DFP工作在只有一个目标时已经取得了优异的定位性能,但是当有多个目标时,目标的时变状态,如进入或离开无线覆盖区域,以及密切的相互作用,给跟踪每个目标带来了挑战。针对这些问题,本文提出了一种基于高精度毫米波点云信息的多目标鲁棒跟踪的时空分析方法。具体而言,我们提出了一种高精度空间成像策略来构建目标的细粒度毫米波点云,设计了一种时空点云聚类方法来确定目标状态,然后利用基于步态的身份和轨迹关联方案和粒子滤波来实现鲁棒身份感知跟踪。在77 GHz毫米波测试台上进行了广泛的评估,以证明我们提出的方案的有效性和鲁棒性。
{"title":"Multi-Target Device-Free Positioning Based on Spatial-Temporal mmWave Point Cloud","authors":"Jie Wang;Jingmiao Wu;Yingwei Qu;Qi Xiao;Qinghua Gao;Yuguang Fang","doi":"10.1109/TMC.2024.3474671","DOIUrl":"https://doi.org/10.1109/TMC.2024.3474671","url":null,"abstract":"Device-free positioning (DFP) using mmWave signals is an emerging technique that could track a target without attaching any devices. It conducts position estimation by analyzing the influence of targets on their surrounding mmWave signals. With the widespread utilization of mmWave signals, DFP will have many potential applications in tracking pedestrians and robots in intelligent monitoring systems. State-of-the-art DFP work has already achieved excellent positioning performance when there is one target only, but when there are multiple targets, the time-varying target state, such as entering or leaving of the wireless coverage area and close interactions, makes it challenging to track every target. To solve these problems, in this paper, we propose a spatial-temporal analysis method to robustly track multiple targets based on the high precision mmWave point cloud information. Specifically, we propose a high precision spatial imaging strategy to construct fine-grained mmWave point cloud of the targets, design a spatial-temporal point cloud clustering method to determine the target state, and then leverage a gait based identity and trajectory association scheme and a particle filter to achieve robust identity-aware tracking. Extensive evaluations on a 77 GHz mmWave testbed have been conducted to demonstrate the effectiveness and robustness of our proposed schemes.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1163-1180"},"PeriodicalIF":7.7,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Encoding for Replay-Resistant Smartphone User Authentication Using Handgrips 防重放智能手机用户身份验证的生物识别编码
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-04 DOI: 10.1109/TMC.2024.3474673
Long Huang;Chen Wang
Biometrics have been widely applied for user authentication. However, existing biometric authentications are vulnerable to biometric spoofing, because they can be observed and forged. In addition, they rely on verifying biometric features that rarely change. To address this issue, we propose to verify the handgrip biometric that can be unobtrusively extracted by acoustic signals when the user holds the phone. This biometric is uniquely associated with the user’s hand geometry, body-fat ratio, and gripping strength, which are hard to reproduce. Furthermore, we propose two biometric encoding techniques (i.e., temporal-frequential and spatial) to convert static biometrics into dynamic biometric features to prevent data reuse. In particular, we develop a biometric authentication system to work with the challenge-response protocol. We encode the ultrasonic signal according to a random challenge sequence and extract a distinct biometric code as the response. We further develop two decoding algorithms to decode the biometric code for user authentication. Additionally, we investigate multiple new attacks and explore using a latent diffusion model to solve the acoustic noise discrepancies between the training and testing data to improve system performance. Extensive experiments show our system achieves 97% accuracy in distinguishing users and rejects 100% replay attacks with $ 0.6 , s$ challenge sequence.
生物识别技术已广泛应用于用户认证。然而,现有的生物识别认证容易受到生物识别欺骗的攻击,因为它们可以被观察和伪造。此外,它们依赖于验证很少变化的生物特征。为了解决这个问题,我们建议验证当用户拿着手机时,可以通过声音信号不显眼地提取的握持生物特征。这种生物特征与用户的手的几何形状、体脂比和握力有独特的联系,而这些是很难复制的。此外,我们提出了两种生物特征编码技术(即时间-频率和空间),将静态生物特征转换为动态生物特征,以防止数据重用。特别是,我们开发了一个生物识别认证系统,以配合挑战响应协议。我们根据随机挑战序列对超声波信号进行编码,并提取一个独特的生物特征码作为响应。我们进一步开发了两种解码算法来解码用户身份验证的生物识别代码。此外,我们研究了多种新的攻击,并探索使用潜在扩散模型来解决训练和测试数据之间的声学噪声差异,以提高系统性能。大量的实验表明,我们的系统在识别用户方面达到了97%的准确率,并且在0.6 ,s$挑战序列下拒绝了100%的重放攻击。
{"title":"Biometric Encoding for Replay-Resistant Smartphone User Authentication Using Handgrips","authors":"Long Huang;Chen Wang","doi":"10.1109/TMC.2024.3474673","DOIUrl":"https://doi.org/10.1109/TMC.2024.3474673","url":null,"abstract":"Biometrics have been widely applied for user authentication. However, existing biometric authentications are vulnerable to biometric spoofing, because they can be observed and forged. In addition, they rely on verifying biometric features that rarely change. To address this issue, we propose to verify the handgrip biometric that can be unobtrusively extracted by acoustic signals when the user holds the phone. This biometric is uniquely associated with the user’s hand geometry, body-fat ratio, and gripping strength, which are hard to reproduce. Furthermore, we propose two biometric encoding techniques (i.e., temporal-frequential and spatial) to convert static biometrics into dynamic biometric features to prevent data reuse. In particular, we develop a biometric authentication system to work with the challenge-response protocol. We encode the ultrasonic signal according to a random challenge sequence and extract a distinct biometric code as the response. We further develop two decoding algorithms to decode the biometric code for user authentication. Additionally, we investigate multiple new attacks and explore using a latent diffusion model to solve the acoustic noise discrepancies between the training and testing data to improve system performance. Extensive experiments show our system achieves 97% accuracy in distinguishing users and rejects 100% replay attacks with \u0000<inline-formula><tex-math>$ 0.6 , s$</tex-math></inline-formula>\u0000 challenge sequence.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1230-1248"},"PeriodicalIF":7.7,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge-Cloud Collaborated Object Detection via Bandwidth Adaptive Difficult-Case Discriminator 基于带宽自适应难区分器的边缘云协同目标检测
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-04 DOI: 10.1109/TMC.2024.3474743
Zhiqiang Cao;Yun Cheng;Zimu Zhou;Yongrui Chen;Youbing Hu;Anqi Lu;Jie Liu;Zhijun Li
Object detection, a fundamental task in computer vision, is crucial for various intelligent edge computing applications. However, object detection algorithms are usually heavy in computation, hindering their deployments on resource-constrained edge devices. Traditional edge-cloud collaboration schemes, like deep neural network (DNN) partitioning across edge and cloud, are unfit for object detection due to the significant communication costs incurred by the large size of intermediate results. To this end, we propose a Difficult-Case based Small-Big model (DCSB) framework. It employs a difficult-case discriminator on the edge device to control data transfer between the small model on the edge and the large model in the cloud. We also adopt regional sampling to further reduce the bandwidth consumption and create a discriminator zoo to accommodate the varying networking conditions. Additionally, we extend DCSB to video tasks by developing an adaptive sampling rate update algorithm, aiming to minimize computational demands without sacrificing detection accuracy. Extensive experiments show that DCSB can detect 97.26%-97.96% objects while saving 74.37%-82.23% network bandwidth, compared to cloud-only methods. Furthermore, DCSB significantly outperforms the latest DNN partitioning methods, reducing inference time by 92.60%-95.10% given an 8Mbps transmission bandwidth. In video tasks, DCSB matches the detection accuracy of leading video analysis methods while cutting the computational overhead by 40%.
目标检测是计算机视觉中的一项基本任务,对于各种智能边缘计算应用至关重要。然而,目标检测算法通常计算量很大,阻碍了它们在资源受限的边缘设备上的部署。传统的边缘云协作方案,如深度神经网络(DNN)跨边缘和云的划分,由于中间结果的大尺寸带来了巨大的通信成本,不适合用于目标检测。为此,我们提出了一个基于困难案例的小-大模型(DCSB)框架。它在边缘设备上使用困难情况鉴别器来控制边缘小模型与云中的大模型之间的数据传输。我们还采用了区域采样来进一步减少带宽消耗,并创建了一个判别器动物园来适应不同的网络条件。此外,我们通过开发自适应采样率更新算法将DCSB扩展到视频任务,旨在在不牺牲检测精度的情况下最小化计算需求。大量实验表明,与纯云方法相比,DCSB可以检测97.26% ~ 97.96%的对象,同时节省74.37% ~ 82.23%的网络带宽。此外,DCSB显著优于最新的DNN划分方法,在8Mbps的传输带宽下,将推理时间减少了92.60%-95.10%。在视频任务中,DCSB的检测精度与领先的视频分析方法相当,同时将计算开销减少了40%。
{"title":"Edge-Cloud Collaborated Object Detection via Bandwidth Adaptive Difficult-Case Discriminator","authors":"Zhiqiang Cao;Yun Cheng;Zimu Zhou;Yongrui Chen;Youbing Hu;Anqi Lu;Jie Liu;Zhijun Li","doi":"10.1109/TMC.2024.3474743","DOIUrl":"https://doi.org/10.1109/TMC.2024.3474743","url":null,"abstract":"Object detection, a fundamental task in computer vision, is crucial for various intelligent edge computing applications. However, object detection algorithms are usually heavy in computation, hindering their deployments on resource-constrained edge devices. Traditional edge-cloud collaboration schemes, like deep neural network (DNN) partitioning across edge and cloud, are unfit for object detection due to the significant communication costs incurred by the large size of intermediate results. To this end, we propose a Difficult-Case based Small-Big model (DCSB) framework. It employs a difficult-case discriminator on the edge device to control data transfer between the small model on the edge and the large model in the cloud. We also adopt regional sampling to further reduce the bandwidth consumption and create a discriminator zoo to accommodate the varying networking conditions. Additionally, we extend DCSB to video tasks by developing an adaptive sampling rate update algorithm, aiming to minimize computational demands without sacrificing detection accuracy. Extensive experiments show that DCSB can detect 97.26%-97.96% objects while saving 74.37%-82.23% network bandwidth, compared to cloud-only methods. Furthermore, DCSB significantly outperforms the latest DNN partitioning methods, reducing inference time by 92.60%-95.10% given an 8Mbps transmission bandwidth. In video tasks, DCSB matches the detection accuracy of leading video analysis methods while cutting the computational overhead by 40%.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1181-1196"},"PeriodicalIF":7.7,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual Class-Aware Contrastive Federated Semi-Supervised Learning 双类感知对比联邦半监督学习
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-04 DOI: 10.1109/TMC.2024.3474732
Qi Guo;Di Wu;Yong Qi;Saiyu Qi
Federated semi-supervised learning (FSSL), facilitates labeled clients and unlabeled clients jointly training a global model without sharing private data. Existing FSSL methods predominantly employ pseudo-labeling and consistency regularization to exploit the knowledge of unlabeled data, achieving notable success in raw data utilization. However, the effectiveness of these methods is challenged by large deviations between uploaded local models of labeled and unlabeled clients, as well as confirmation bias introduced by noisy pseudo-labels, both of which negatively affect the global model's performance. In this paper, we present a novel FSSL method called Dual Class-aware Contrastive Federated Semi-Supervised Learning (DCCFSSL). This method considers both the local class-aware distribution of each client's data and the global class-aware distribution of all clients’ data within the feature space. By implementing a dual class-aware contrastive module, DCCFSSL establishes a unified training objective for different clients to tackle large deviations and incorporates contrastive information in the feature space to mitigate confirmation bias. Additionally, DCCFSSL introduces an authentication-reweighted aggregation technique to improve the server's aggregation robustness. Our comprehensive experiments show that DCCFSSL outperforms current state-of-the-art methods on three benchmark datasets and surpasses the FedAvg with relabeled unlabeled clients on CIFAR-10, CIFAR-100, and STL-10 datasets.
联邦半监督学习(FSSL)促进了标记客户端和未标记客户端在不共享私有数据的情况下联合训练全局模型。现有的FSSL方法主要采用伪标记和一致性正则化来利用未标记数据的知识,在原始数据利用方面取得了显著的成功。然而,这些方法的有效性受到上传的标记客户端和未标记客户端的局部模型之间的较大偏差以及噪声伪标签引入的确认偏差的挑战,这两者都会对全局模型的性能产生负面影响。本文提出了一种新的半监督学习方法——双类感知对比联邦半监督学习(Dual Class-aware contrast Federated Semi-Supervised Learning, DCCFSSL)。该方法既考虑每个客户端数据的局部类感知分布,又考虑特征空间中所有客户端数据的全局类感知分布。DCCFSSL通过实现双类感知的对比模块,为不同的客户端建立统一的训练目标,以解决较大的偏差,并在特征空间中纳入对比信息,以减轻确认偏差。此外,DCCFSSL引入了一种身份验证重加权聚合技术,以提高服务器的聚合健壮性。我们的综合实验表明,DCCFSSL在三个基准数据集上优于当前最先进的方法,并且在CIFAR-10、CIFAR-100和STL-10数据集上优于fedag重新标记的未标记客户端。
{"title":"Dual Class-Aware Contrastive Federated Semi-Supervised Learning","authors":"Qi Guo;Di Wu;Yong Qi;Saiyu Qi","doi":"10.1109/TMC.2024.3474732","DOIUrl":"https://doi.org/10.1109/TMC.2024.3474732","url":null,"abstract":"Federated semi-supervised learning (FSSL), facilitates labeled clients and unlabeled clients jointly training a global model without sharing private data. Existing FSSL methods predominantly employ pseudo-labeling and consistency regularization to exploit the knowledge of unlabeled data, achieving notable success in raw data utilization. However, the effectiveness of these methods is challenged by large deviations between uploaded local models of labeled and unlabeled clients, as well as confirmation bias introduced by noisy pseudo-labels, both of which negatively affect the global model's performance. In this paper, we present a novel FSSL method called Dual Class-aware Contrastive Federated Semi-Supervised Learning (DCCFSSL). This method considers both the local class-aware distribution of each client's data and the global class-aware distribution of all clients’ data within the feature space. By implementing a dual class-aware contrastive module, DCCFSSL establishes a unified training objective for different clients to tackle large deviations and incorporates contrastive information in the feature space to mitigate confirmation bias. Additionally, DCCFSSL introduces an authentication-reweighted aggregation technique to improve the server's aggregation robustness. Our comprehensive experiments show that DCCFSSL outperforms current state-of-the-art methods on three benchmark datasets and surpasses the FedAvg with relabeled unlabeled clients on CIFAR-10, CIFAR-100, and STL-10 datasets.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1073-1089"},"PeriodicalIF":7.7,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-End Steady-State Adaptive Slicing Method for Dynamic Network State and Load 动态网络状态和负载的端到端稳态自适应切片方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-03 DOI: 10.1109/TMC.2024.3473908
Boyi Tang;Yijun Mo;Chen Yu;Huiyu Liu
Network slicing has become a primary function of 5G/6G network resource management. However, the existing slicing schemes have not sufficiently discussed the reconfiguration optimization schemes brought by user behavior changes and mobile network environment fluctuations, leading to excessive service interruption rates and slice reconfiguration costs in dynamic environments. To address this problem, this paper proposes an End-to-end Steady-state Adaptive slicing method for Dynamic network state and load (ESAD). To realize the steady-state slicing decisions, ESAD takes the steady-state degree of network slicing and reconfiguration cost as the objective and constructs the slicing reconfiguration probability evaluation function based on the service load dynamics function and the time-varying function of the network channel conditions. To improve the predictability and steady-state degree of the slicing decision, ESAD introduces an ensemble deep learning method to predict the load service fluctuation based on the user behavior model and employs reinforcement learning to compute the channel dynamics boundary, which guides the slicing decision to balance the network dynamics factors. Experiments on quality of service assurance for 5G cloud game rendering class prove that ESAD can reduce reconfiguration probability and long-term reconfiguration cost by 49.45%–58.50% while improving system QoS assurance and capacity.
网络切片已经成为5G/6G网络资源管理的主要功能。然而,现有的切片方案没有充分讨论用户行为变化和移动网络环境波动带来的重构优化方案,导致动态环境下的业务中断率和切片重构成本过高。为了解决这一问题,本文提出了一种基于动态网络状态和负载的端到端稳态自适应切片方法。为了实现稳态切片决策,ESAD以网络切片的稳态程度和重构代价为目标,基于业务负载动态函数和网络信道条件时变函数构建了切片重构概率评价函数。为了提高切片决策的可预测性和稳态度,ESAD引入了基于用户行为模型的集成深度学习方法来预测负荷服务波动,并采用强化学习计算通道动态边界,从而指导切片决策平衡网络动态因素。5G云游戏渲染类的服务质量保证实验证明,ESAD在提高系统QoS保证和容量的同时,可将重构概率和长期重构成本降低49.45% ~ 58.50%。
{"title":"End-to-End Steady-State Adaptive Slicing Method for Dynamic Network State and Load","authors":"Boyi Tang;Yijun Mo;Chen Yu;Huiyu Liu","doi":"10.1109/TMC.2024.3473908","DOIUrl":"https://doi.org/10.1109/TMC.2024.3473908","url":null,"abstract":"Network slicing has become a primary function of 5G/6G network resource management. However, the existing slicing schemes have not sufficiently discussed the reconfiguration optimization schemes brought by user behavior changes and mobile network environment fluctuations, leading to excessive service interruption rates and slice reconfiguration costs in dynamic environments. To address this problem, this paper proposes an End-to-end Steady-state Adaptive slicing method for Dynamic network state and load (ESAD). To realize the steady-state slicing decisions, ESAD takes the steady-state degree of network slicing and reconfiguration cost as the objective and constructs the slicing reconfiguration probability evaluation function based on the service load dynamics function and the time-varying function of the network channel conditions. To improve the predictability and steady-state degree of the slicing decision, ESAD introduces an ensemble deep learning method to predict the load service fluctuation based on the user behavior model and employs reinforcement learning to compute the channel dynamics boundary, which guides the slicing decision to balance the network dynamics factors. Experiments on quality of service assurance for 5G cloud game rendering class prove that ESAD can reduce reconfiguration probability and long-term reconfiguration cost by 49.45%–58.50% while improving system QoS assurance and capacity.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"1090-1104"},"PeriodicalIF":7.7,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedSiam-DA: Dual-Aggregated Federated Learning via Siamese Network for Non-IID Data FedSiam-DA:通过Siamese网络对非iid数据进行双聚合联邦学习
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-03 DOI: 10.1109/TMC.2024.3472898
Xin Wang;Yanhan Wang;Ming Yang;Feng Li;Xiaoming Wu;Lisheng Fan;Shibo He
Federated learning (FL) is an effective mobile edge computing framework that enables multiple participants to collaboratively train intelligent models, without requiring large amounts of data transmission while protecting privacy. However, FL encounters challenges due to non-independent and identically distributed (non-IID) data from different participants. The existing methods, whether focusing on local training or global aggregation, often suffer from insufficient unilateral optimization. Achieving effective local-global collaborative optimization, particularly in the absence of additional reference models or datasets, is both crucial and challenging. To address this, we propose a novel approach: Dual-Aggregated Federated learning based on a triple Siamese network (FedSiam-DA). This method enhances the FL algorithm on both client and server sides. On the client side, we establish a triple Siamese network incorporating a stop-gradient scheme, which leverages a contrastive learning strategy to control the update directions of local models. On the server side, we introduce a dual aggregation mechanism with dynamic weights for local updates, improving the global model’s ability to assimilate personalized knowledge from local models. Extensive experiments on multiple benchmark datasets demonstrate that FedSiam-DA significantly improves model performance under non-IID data conditions compared to existing methods.
联邦学习(FL)是一种有效的移动边缘计算框架,它使多个参与者能够协同训练智能模型,而不需要大量数据传输,同时保护隐私。然而,由于来自不同参与者的非独立和同分布(non-IID)数据,FL遇到了挑战。现有的方法,无论是关注局部训练还是全局聚合,往往存在单边优化不足的问题。实现有效的局部-全局协作优化,特别是在缺乏额外参考模型或数据集的情况下,既关键又具有挑战性。为了解决这个问题,我们提出了一种新的方法:基于三重暹罗网络的双聚合联邦学习(federdsiam - da)。该方法在客户端和服务器端对FL算法进行了改进。在客户端,我们建立了一个包含停止梯度方案的三重暹罗网络,该网络利用对比学习策略来控制局部模型的更新方向。在服务器端,我们为本地更新引入了具有动态权重的双重聚合机制,提高了全局模型从本地模型吸收个性化知识的能力。在多个基准数据集上的大量实验表明,与现有方法相比,FedSiam-DA在非iid数据条件下显著提高了模型性能。
{"title":"FedSiam-DA: Dual-Aggregated Federated Learning via Siamese Network for Non-IID Data","authors":"Xin Wang;Yanhan Wang;Ming Yang;Feng Li;Xiaoming Wu;Lisheng Fan;Shibo He","doi":"10.1109/TMC.2024.3472898","DOIUrl":"https://doi.org/10.1109/TMC.2024.3472898","url":null,"abstract":"Federated learning (FL) is an effective mobile edge computing framework that enables multiple participants to collaboratively train intelligent models, without requiring large amounts of data transmission while protecting privacy. However, FL encounters challenges due to non-independent and identically distributed (non-IID) data from different participants. The existing methods, whether focusing on local training or global aggregation, often suffer from insufficient unilateral optimization. Achieving effective local-global collaborative optimization, particularly in the absence of additional reference models or datasets, is both crucial and challenging. To address this, we propose a novel approach: \u0000<bold>D</b>\u0000ual-\u0000<bold>A</b>\u0000ggregated \u0000<bold>Fed</b>\u0000erated learning based on a triple \u0000<bold>Siam</b>\u0000ese network (\u0000<bold>FedSiam-DA</b>\u0000). This method enhances the FL algorithm on both client and server sides. On the client side, we establish a triple Siamese network incorporating a stop-gradient scheme, which leverages a contrastive learning strategy to control the update directions of local models. On the server side, we introduce a dual aggregation mechanism with dynamic weights for local updates, improving the global model’s ability to assimilate personalized knowledge from local models. Extensive experiments on multiple benchmark datasets demonstrate that FedSiam-DA significantly improves model performance under non-IID data conditions compared to existing methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"985-998"},"PeriodicalIF":7.7,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Localization for Underwater Wireless Sensor Networks via AUV Cooperative Beamforming With Reinforcement Learning 基于AUV协同波束形成强化学习的水下无线传感器网络安全定位
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-02 DOI: 10.1109/TMC.2024.3472643
Rong Fan;Azzedine Boukerche;Pan Pan;Zhigang Jin;Yishan Su;Fei Dou
In harsh underwater environments, the localization of network nodes faces severe challenges due to open deployment environments. Most existing underwater localization methods suffer from privacy leaks. However, privacy protection schemes applied in terrestrial networks are not viable for underwater acoustic networks due to stratification effects and multipath complexities. In this paper, we introduce a secure localization scheme for underwater wireless sensor networks (UWSNs) utilizing cooperative beamforming among mobile underwater anchor nodes. With this scheme, the underwater sensor communicates and ranges with mobile anchor nodes to perform self-localization via time difference of arrival (TDOA) algorithm. However, the presence of eavesdroppers poses a threat by intercepting information emitted by the anchors. To avoid localization information leakage, then we model the secure localization requirement as a multi-anchors multi-objective dual joint optimization problem to enhance both security and energy performance. The deep reinforcement learning (DRL)-based multi-agent deep deterministic policy gradient (MADDPG) algorithm is applied to solve the optimization problem. Both simulation and field experimental results robustly validate the efficiency and accuracy of the proposed secure localization scheme.
在恶劣的水下环境下,开放的部署环境对网络节点的定位提出了严峻的挑战。现有的水下定位方法大多存在隐私泄露的问题。然而,由于分层效应和多径复杂性,应用于地面网络的隐私保护方案在水声网络中并不可行。本文介绍了一种利用水下移动锚节点间协同波束形成的水下无线传感器网络安全定位方案。该方案利用到达时间差(TDOA)算法与移动锚节点进行通信和测距,实现水下传感器的自定位。然而,窃听者的存在通过拦截锚点发出的信息而构成威胁。为了避免定位信息泄漏,我们将安全定位需求建模为多锚点多目标双联合优化问题,以提高安全性和节能性能。采用基于深度强化学习(DRL)的多智能体深度确定性策略梯度(madpg)算法求解优化问题。仿真和现场实验结果有力地验证了所提出的安全定位方案的有效性和准确性。
{"title":"Secure Localization for Underwater Wireless Sensor Networks via AUV Cooperative Beamforming With Reinforcement Learning","authors":"Rong Fan;Azzedine Boukerche;Pan Pan;Zhigang Jin;Yishan Su;Fei Dou","doi":"10.1109/TMC.2024.3472643","DOIUrl":"https://doi.org/10.1109/TMC.2024.3472643","url":null,"abstract":"In harsh underwater environments, the localization of network nodes faces severe challenges due to open deployment environments. Most existing underwater localization methods suffer from privacy leaks. However, privacy protection schemes applied in terrestrial networks are not viable for underwater acoustic networks due to stratification effects and multipath complexities. In this paper, we introduce a secure localization scheme for underwater wireless sensor networks (UWSNs) utilizing cooperative beamforming among mobile underwater anchor nodes. With this scheme, the underwater sensor communicates and ranges with mobile anchor nodes to perform self-localization via time difference of arrival (TDOA) algorithm. However, the presence of eavesdroppers poses a threat by intercepting information emitted by the anchors. To avoid localization information leakage, then we model the secure localization requirement as a multi-anchors multi-objective dual joint optimization problem to enhance both security and energy performance. The deep reinforcement learning (DRL)-based multi-agent deep deterministic policy gradient (MADDPG) algorithm is applied to solve the optimization problem. Both simulation and field experimental results robustly validate the efficiency and accuracy of the proposed secure localization scheme.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"924-938"},"PeriodicalIF":7.7,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ScooterID: Posture-Based Continuous User Identification From Mobility Scooter Rides ScooterID:基于姿势的移动滑板车用户连续识别
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-02 DOI: 10.1109/TMC.2024.3473609
Devan Shah;Ruoqi Huang;Nisha Vinayaga-Sureshkanth;Tingting Chen;Murtuza Jadliwala
Mobility scooters serve as a powerful last-mile transportation tool for people with mobility challenges. Given the unique riding behavior and posture of mobility scooter riders, such user-specific mobility scooter ride data has tremendous potential towards the design of continuous user identification and authentication mechanisms. However, there have been no prior research efforts in the literature exploring this unique modality for the design of continuous user identification techniques. To address this gap, this paper proposes ScooterID, the first framework which employs rider posture data collected from cameras on mobility scooters to continuously identify (and authenticate) users/riders. As part of this framework, a machine learning based model comprising of a spatio-temporal Graph Convolutional Network and a body-part-informed encoder is designed to effectively capture a user’s subtle upper-body movements during mobility scooter rides into discriminating embedding vectors. These embeddings can then be used to reliably and continuously identify and authenticate users/riders. Experiments with real-world mobility scooter ride data show that ScooterID achieves high levels of authentication accuracy with few enrollment video samples. ScooterID also performs efficiently on resource-constrained devices (e.g., Raspberry Pis) and is robust against adversarial perturbations to authentication inputs.
对于行动不便的人来说,电动滑板车是一种强大的最后一英里交通工具。考虑到机动滑板车使用者独特的骑行行为和姿势,这种针对用户的机动滑板车骑行数据对于设计持续的用户识别和认证机制具有巨大的潜力。然而,在之前的文献中,还没有研究工作探索这种独特的模式来设计连续的用户识别技术。为了解决这一差距,本文提出了ScooterID,这是第一个使用从移动滑板车上的摄像头收集的骑手姿势数据来连续识别(和认证)用户/骑手的框架。作为该框架的一部分,一个基于机器学习的模型由一个时空图卷积网络和一个身体部位信息编码器组成,旨在有效地捕捉用户在移动滑板车上的细微上半身运动,并将其识别为嵌入向量。然后,这些嵌入可以用来可靠地、持续地识别和验证用户/骑手。对现实世界中机动滑板车骑行数据的实验表明,ScooterID在注册视频样本较少的情况下实现了高水平的认证准确性。ScooterID在资源受限的设备(例如,Raspberry Pis)上也能有效地执行,并且对认证输入的对抗性扰动具有鲁棒性。
{"title":"ScooterID: Posture-Based Continuous User Identification From Mobility Scooter Rides","authors":"Devan Shah;Ruoqi Huang;Nisha Vinayaga-Sureshkanth;Tingting Chen;Murtuza Jadliwala","doi":"10.1109/TMC.2024.3473609","DOIUrl":"https://doi.org/10.1109/TMC.2024.3473609","url":null,"abstract":"Mobility scooters serve as a powerful last-mile transportation tool for people with mobility challenges. Given the unique riding behavior and posture of mobility scooter riders, such user-specific mobility scooter ride data has tremendous potential towards the design of continuous user identification and authentication mechanisms. However, there have been no prior research efforts in the literature exploring this unique modality for the design of continuous user identification techniques. To address this gap, this paper proposes \u0000<italic>ScooterID</i>\u0000, the first framework which employs rider posture data collected from cameras on mobility scooters to continuously identify (and authenticate) users/riders. As part of this framework, a machine learning based model comprising of a spatio-temporal Graph Convolutional Network and a body-part-informed encoder is designed to effectively capture a user’s subtle upper-body movements during mobility scooter rides into discriminating embedding vectors. These embeddings can then be used to reliably and continuously identify and authenticate users/riders. Experiments with real-world mobility scooter ride data show that \u0000<italic>ScooterID</i>\u0000 achieves high levels of authentication accuracy with few enrollment video samples. \u0000<italic>ScooterID</i>\u0000 also performs efficiently on resource-constrained devices (e.g., Raspberry Pis) and is robust against adversarial perturbations to authentication inputs.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"970-984"},"PeriodicalIF":7.7,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Facial Tracking and User Authentication Through Lightweight Single-Ear Biosensors 通过轻量级单耳生物传感器进行3D面部跟踪和用户认证
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-01 DOI: 10.1109/TMC.2024.3470339
Yi Wu;Xiande Zhang;Tianhao Wu;Bing Zhou;Phuc Nguyen;Jian Liu
Facial landmark tracking and 3D reconstruction have gained considerable attention due to their numerous applications such as human-computer interactions, facial expression analysis, and emotion recognition, etc. Traditional approaches require users to be confined to a particular location and face a camera under constrained recording conditions, which prevents them from being deployed in many application scenarios involving human motions. In this paper, we propose the first single-earpiece lightweight biosensing system, BioFace-3D, that can unobtrusively, continuously, and reliably sense the entire facial movements, track 2D facial landmarks, and further render 3D facial animations. Our single-earpiece biosensing system takes advantage of the cross-modal transfer learning model to transfer the knowledge embodied in a high-grade visual facial landmark detection model to the low-grade biosignal domain. After training, our BioFace-3D can directly perform continuous 3D facial reconstruction from the biosignals, without any visual input. Additionally, by utilizing biosensors, we also showcase the potential for capturing both behavioral aspects, such as facial gestures, and distinctive individual physiological traits, establishing a comprehensive two-factor authentication/identification framework. Extensive experiments involving 16 participants demonstrate that BioFace-3D can accurately track 53 major facial landmarks with only 1.85 mm average error and 3.38% normalized mean error, which is comparable with most state-of-the-art camera-based solutions. Experiments also show that the system can authenticate users with high accuracy (e.g., over 99.8% within two trials for three gestures in series), low false positive rate (e.g., less 0.24%), and is robust to various types of attacks.
面部地标跟踪和三维重建因其在人机交互、面部表情分析、情感识别等领域的广泛应用而受到广泛关注。传统的方法要求用户被限制在特定的位置,并在受限的记录条件下面对摄像机,这使得它们无法部署在许多涉及人体运动的应用场景中。在本文中,我们提出了第一个单耳机轻量级生物传感系统BioFace-3D,它可以不显眼、连续、可靠地感知整个面部运动,跟踪2D面部地标,并进一步渲染3D面部动画。我们的单耳机生物传感系统利用跨模态迁移学习模型将高级视觉面部地标检测模型中包含的知识转移到低级生物信号域。经过训练,我们的BioFace-3D可以直接从生物信号中进行连续的3D面部重建,而无需任何视觉输入。此外,通过利用生物传感器,我们还展示了捕获行为方面(如面部手势)和独特的个体生理特征的潜力,建立了一个全面的双因素认证/识别框架。涉及16名参与者的广泛实验表明,BioFace-3D可以准确地跟踪53个主要的面部地标,平均误差仅为1.85 mm,归一化平均误差为3.38%,这与大多数最先进的基于相机的解决方案相当。实验还表明,该系统对用户的身份验证准确率高(连续三个手势两次验证准确率超过99.8%),误报率低(小于0.24%),对各种攻击具有较强的鲁棒性。
{"title":"3D Facial Tracking and User Authentication Through Lightweight Single-Ear Biosensors","authors":"Yi Wu;Xiande Zhang;Tianhao Wu;Bing Zhou;Phuc Nguyen;Jian Liu","doi":"10.1109/TMC.2024.3470339","DOIUrl":"https://doi.org/10.1109/TMC.2024.3470339","url":null,"abstract":"Facial landmark tracking and 3D reconstruction have gained considerable attention due to their numerous applications such as human-computer interactions, facial expression analysis, and emotion recognition, etc. Traditional approaches require users to be confined to a particular location and face a camera under constrained recording conditions, which prevents them from being deployed in many application scenarios involving human motions. In this paper, we propose the first single-earpiece lightweight biosensing system, \u0000<italic>BioFace-3D</i>\u0000, that can unobtrusively, continuously, and reliably sense the entire facial movements, track 2D facial landmarks, and further render 3D facial animations. Our single-earpiece biosensing system takes advantage of the cross-modal transfer learning model to transfer the knowledge embodied in a \u0000<italic>high-grade</i>\u0000 visual facial landmark detection model to the \u0000<italic>low-grade</i>\u0000 biosignal domain. After training, our \u0000<italic>BioFace-3D</i>\u0000 can directly perform continuous 3D facial reconstruction from the biosignals, without any visual input. Additionally, by utilizing biosensors, we also showcase the potential for capturing both behavioral aspects, such as facial gestures, and distinctive individual physiological traits, establishing a comprehensive two-factor authentication/identification framework. Extensive experiments involving 16 participants demonstrate that \u0000<italic>BioFace-3D</i>\u0000 can accurately track 53 major facial landmarks with only 1.85 mm average error and 3.38% normalized mean error, which is comparable with most state-of-the-art camera-based solutions. Experiments also show that the system can authenticate users with high accuracy (e.g., over 99.8% within two trials for three gestures in series), low false positive rate (e.g., less 0.24%), and is robust to various types of attacks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"749-762"},"PeriodicalIF":7.7,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unknown Worker Recruitment With Long-Term Incentive in Mobile Crowdsensing 移动众测中具有长期激励的未知员工招聘
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-30 DOI: 10.1109/TMC.2024.3471569
Qihang Zhou;Xinglin Zhang;Zheng Yang
Many mobile crowdsensing applications require efficient recruitment of workers whose qualities are often unknown a priori. While prior research has explored multi-armed bandit-based mechanisms with short-term incentives to address this unknown worker recruitment challenge, these mechanisms mostly neglect the enduring participation issues stemming from privacy concern and selection starvation in the long-term task. Therefore, in this paper, we focus on incentivizing long-term participation of unknown workers, thereby providing crucial assurance for crowdsensing applications. We first establish an auction framework based on shuffle differential privacy (SDP), where we leverage SDP’s privacy amplification effect to mitigate privacy-related utility loss when dealing with the privacy-sensitive worker and the utility-sensitive platform. Following this, we model the selection requirements of workers as fairness constraints and propose two novel fairness-aware incentive mechanisms, GFA and IFA, to ensure group and individual fairness for unknown workers, respectively. Theoretical analyses highlight the desirable properties of GFA and IFA, complemented by an in-depth exploration of fairness violation and regret. Finally, numerical simulations are conducted on two real-world datasets, validating the superior performance of the proposed mechanisms.
许多移动众测应用需要高效招聘员工,而这些员工的素质往往是先天未知的。虽然先前的研究已经探索了基于多武装强盗的短期激励机制来解决这一未知的工人招聘挑战,但这些机制大多忽视了长期任务中由隐私问题和选择饥饿引起的持久参与问题。因此,在本文中,我们专注于激励未知工人的长期参与,从而为众感应用提供关键保证。我们首先建立了一个基于洗牌差分隐私(SDP)的拍卖框架,在处理隐私敏感的工作人员和效用敏感的平台时,我们利用SDP的隐私放大效应来减轻与隐私相关的效用损失。在此基础上,我们将工人的选择要求建模为公平约束,并提出了两种新的公平意识激励机制GFA和IFA,分别确保未知工人的群体和个人公平。理论分析强调了GFA和IFA的可取之处,并对公平违反和遗憾进行了深入探讨。最后,在两个真实数据集上进行了数值模拟,验证了所提出机制的优越性能。
{"title":"Unknown Worker Recruitment With Long-Term Incentive in Mobile Crowdsensing","authors":"Qihang Zhou;Xinglin Zhang;Zheng Yang","doi":"10.1109/TMC.2024.3471569","DOIUrl":"https://doi.org/10.1109/TMC.2024.3471569","url":null,"abstract":"Many mobile crowdsensing applications require efficient recruitment of workers whose qualities are often unknown a priori. While prior research has explored multi-armed bandit-based mechanisms with short-term incentives to address this unknown worker recruitment challenge, these mechanisms mostly neglect the enduring participation issues stemming from privacy concern and selection starvation in the long-term task. Therefore, in this paper, we focus on incentivizing long-term participation of unknown workers, thereby providing crucial assurance for crowdsensing applications. We first establish an auction framework based on shuffle differential privacy (SDP), where we leverage SDP’s privacy amplification effect to mitigate privacy-related utility loss when dealing with the privacy-sensitive worker and the utility-sensitive platform. Following this, we model the selection requirements of workers as fairness constraints and propose two novel fairness-aware incentive mechanisms, GFA and IFA, to ensure group and individual fairness for unknown workers, respectively. Theoretical analyses highlight the desirable properties of GFA and IFA, complemented by an in-depth exploration of fairness violation and regret. Finally, numerical simulations are conducted on two real-world datasets, validating the superior performance of the proposed mechanisms.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 2","pages":"999-1015"},"PeriodicalIF":7.7,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1