首页 > 最新文献

Chinese Journal of Electronics最新文献

英文 中文
Meet-in-the-Middle Key Recovery Attacks on Rocca Using Differential and Integral Properties 利用微分和积分性质对Rocca的中间相遇键恢复攻击
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2024.00.032
Chan Song;Wenling Wu;Lei Zhang
Rocca is an Advanced Encryption Standard (AES)-based authentication encryption scheme proposed in 2021 for beyond the fifth/sixth generation systems. The latest version of Rocca injects the key into the initialization, which makes the key recovery attack on its original version no longer valid here. In this paper, we propose new key recovery attacks based on the idea of meet-in-the-middle. Benefiting from the design of the round function, we can treat each 128-bit block as a unit and then write the expressions of the internal states in terms of the initial state and the final state, respectively. Among them, we focus on the state blocks with relatively concise expressions, which have poor diffusion, and then explore their differential and integral properties. Next, in the key recovery attacks, we first guess a part of the key to calculate the specific values of state blocks at the middle matching positions, and then use the differential or integral properties on these blocks to validate the key guesses. Uniquely, in our integral crypt-analysis, we impose appropriate conditions to constrain the propagation of nonce, which corresponds to the weak keys. Consequently, we present the 9 and 10 rounds of meet-in-the-middle key recovery attacks on Rocca, as well as the weak key recovery attack for the 11-round Rocca based on integral properties, with four sets of weak keys with 2224 keys each.
Rocca是一种基于高级加密标准(AES)的认证加密方案,于2021年提出,适用于第五代/第六代以上系统。最新版本的Rocca将密钥注入到初始化中,这使得原始版本的密钥恢复攻击在这里不再有效。本文提出了一种基于中间相遇思想的密钥恢复攻击方法。得益于round函数的设计,我们可以将每个128位块视为一个单元,然后分别根据初始状态和最终状态写出内部状态的表达式。其中,我们将重点关注表达式相对简洁、弥散性较差的状态块,然后探索其微分和积分性质。接下来,在密钥恢复攻击中,我们首先猜测一部分密钥来计算中间匹配位置的状态块的具体值,然后使用这些块上的微分或积分属性来验证密钥猜测。独特的是,在我们的积分密码分析中,我们施加了适当的条件来约束nonce的传播,它对应于弱密钥。因此,我们提出了针对Rocca的9轮和10轮中间相遇密钥恢复攻击,以及基于积分性质的针对11轮Rocca的弱密钥恢复攻击,其中4组弱密钥每组2224个密钥。
{"title":"Meet-in-the-Middle Key Recovery Attacks on Rocca Using Differential and Integral Properties","authors":"Chan Song;Wenling Wu;Lei Zhang","doi":"10.23919/cje.2024.00.032","DOIUrl":"https://doi.org/10.23919/cje.2024.00.032","url":null,"abstract":"Rocca is an Advanced Encryption Standard (AES)-based authentication encryption scheme proposed in 2021 for beyond the fifth/sixth generation systems. The latest version of Rocca injects the key into the initialization, which makes the key recovery attack on its original version no longer valid here. In this paper, we propose new key recovery attacks based on the idea of meet-in-the-middle. Benefiting from the design of the round function, we can treat each 128-bit block as a unit and then write the expressions of the internal states in terms of the initial state and the final state, respectively. Among them, we focus on the state blocks with relatively concise expressions, which have poor diffusion, and then explore their differential and integral properties. Next, in the key recovery attacks, we first guess a part of the key to calculate the specific values of state blocks at the middle matching positions, and then use the differential or integral properties on these blocks to validate the key guesses. Uniquely, in our integral crypt-analysis, we impose appropriate conditions to constrain the propagation of nonce, which corresponds to the weak keys. Consequently, we present the 9 and 10 rounds of meet-in-the-middle key recovery attacks on Rocca, as well as the weak key recovery attack for the 11-round Rocca based on integral properties, with four sets of weak keys with 2<sup>224</sup> keys each.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"828-838"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060049","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Self-Learning: A Framework for Few-Shot Jamming Identification 合作自学习:一种小弹干扰识别框架
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.229
Yuxin Shi;Xinjin Lu;Yifu Sun;Kang An;Yusheng Li
Jamming identification is the key objective behind effective anti-jamming methods. Due to the requirement of low-complexity and the limited number of labeled shots for real jamming identification, it is highly challenging to identify jamming patterns with high accuracy. To this end, we first propose a general framework of cooperative jamming identification among multiple nodes. Moreover, we further propose a novel fusion center (FC) aided self-learning scheme, which uses the guidance of the FC to improve the effectiveness of the identification. Simulation results show that the proposed framework of the cooperative jamming identification can significantly enhance the average accuracy with low-complexity. It is also demonstrated that the proposed FC aided self-learning scheme has the superior average accuracy compared with other identification schemes, which is very effective especially in the few labeled jamming shots scenarios.
干扰识别是有效抗干扰方法背后的关键目标。由于实际干扰识别需要低复杂度和有限的标记弹数,因此高精度识别干扰模式是一项极具挑战性的工作。为此,我们首先提出了一种多节点协同干扰识别的通用框架。此外,我们进一步提出了一种新的融合中心(FC)辅助自学习方案,该方案利用FC的指导来提高识别的有效性。仿真结果表明,所提出的协同干扰识别框架在低复杂度下显著提高了平均精度。实验还表明,与其他识别方案相比,本文提出的FC辅助自学习方案具有更高的平均准确率,特别是在少数标记干扰弹场景下,该方案非常有效。
{"title":"Cooperative Self-Learning: A Framework for Few-Shot Jamming Identification","authors":"Yuxin Shi;Xinjin Lu;Yifu Sun;Kang An;Yusheng Li","doi":"10.23919/cje.2023.00.229","DOIUrl":"https://doi.org/10.23919/cje.2023.00.229","url":null,"abstract":"Jamming identification is the key objective behind effective anti-jamming methods. Due to the requirement of low-complexity and the limited number of labeled shots for real jamming identification, it is highly challenging to identify jamming patterns with high accuracy. To this end, we first propose a general framework of cooperative jamming identification among multiple nodes. Moreover, we further propose a novel fusion center (FC) aided self-learning scheme, which uses the guidance of the FC to improve the effectiveness of the identification. Simulation results show that the proposed framework of the cooperative jamming identification can significantly enhance the average accuracy with low-complexity. It is also demonstrated that the proposed FC aided self-learning scheme has the superior average accuracy compared with other identification schemes, which is very effective especially in the few labeled jamming shots scenarios.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"722-729"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Decoupled Square Patch Antenna Arrays by Exciting and Using Mixed Electric/Magnetic Coupling Between Adjacent Radiators 基于相邻辐射体间混合电/磁耦合的自解耦方形贴片天线阵列
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.222
Qianwen Liu;Lei Zhu;Wenjun Lu
This article presents and develops a simple decoupling method for the planar square patch antenna arrays by virtue of mixed electric and magnetic coupling property. Since the resonant modes of TM10 and TM01 are a pair of degenerate modes in the square patch radiator which are intrinsically orthogonal, a superposed mode of them can be generated to possess consistent field distributions along all the four sides of the patch by adjusting the feeding position. By employing such superposed mode, the mutual coupling between two horizontally adjacent patch elements will become identical to that between two vertical ones, indicating an expected possibility that the complex 2-D decoupling problem in a large-scale antenna patch array can be effectively facilitated and simplified to a 1-D one. Subsequently, metallic pins and connecting strip are properly loaded in each square patch resonator, such that appropriate electric and magnetic coupling strengths can be readily achieved and thus the mutual coupling can get highly decreased. A 1 × 2 antenna array with an edge-to-edge separation of 1 mm, which corresponding to 0.0117λo, is firstly discussed, simulated, and fabricated. The measured results show that the isolation can be highly improved from 4 dB to 17 dB across the entire passband. In final, 1 × 3, 2 × 2, and 4 × 4 antenna array prototypes are constructed and studied for verification of the expansibility and feasibility of the proposed decoupling method to both linear and 2-D antenna arrays.
本文利用平面方形贴片天线阵的电磁混合耦合特性,提出并发展了一种简单的解耦方法。由于TM10和TM01的谐振模式在方形贴片辐射体中是一对本质正交的简并模式,因此通过调整馈电位置,可以产生它们的叠加模式,使它们在贴片四面具有一致的场分布。通过采用这种叠加方式,两个水平相邻贴片单元之间的相互耦合将与两个垂直贴片单元之间的相互耦合相同,这表明有可能有效地促进大规模天线贴片阵列中复杂的二维解耦问题,并将其简化为一维解耦问题。然后,在每个方形贴片谐振器中适当地加载金属引脚和连接条,可以很容易地获得适当的电和磁耦合强度,从而大大降低相互耦合。首先讨论、模拟并制作了边沿间距为1 mm,对应于0.0117λo的1 × 2天线阵列。测量结果表明,整个通带的隔离度可从4 dB提高到17 dB。最后,构建并研究了1 × 3、2 × 2和4 × 4天线阵列原型,以验证所提出的解耦方法对线性和二维天线阵列的可扩展性和可行性。
{"title":"Self-Decoupled Square Patch Antenna Arrays by Exciting and Using Mixed Electric/Magnetic Coupling Between Adjacent Radiators","authors":"Qianwen Liu;Lei Zhu;Wenjun Lu","doi":"10.23919/cje.2023.00.222","DOIUrl":"https://doi.org/10.23919/cje.2023.00.222","url":null,"abstract":"This article presents and develops a simple decoupling method for the planar square patch antenna arrays by virtue of mixed electric and magnetic coupling property. Since the resonant modes of TM<inf>10</inf> and TM<inf>01</inf> are a pair of degenerate modes in the square patch radiator which are intrinsically orthogonal, a superposed mode of them can be generated to possess consistent field distributions along all the four sides of the patch by adjusting the feeding position. By employing such superposed mode, the mutual coupling between two horizontally adjacent patch elements will become identical to that between two vertical ones, indicating an expected possibility that the complex 2-D decoupling problem in a large-scale antenna patch array can be effectively facilitated and simplified to a 1-D one. Subsequently, metallic pins and connecting strip are properly loaded in each square patch resonator, such that appropriate electric and magnetic coupling strengths can be readily achieved and thus the mutual coupling can get highly decreased. A 1 × 2 antenna array with an edge-to-edge separation of 1 mm, which corresponding to 0.0117λ<inf>o</inf>, is firstly discussed, simulated, and fabricated. The measured results show that the isolation can be highly improved from 4 dB to 17 dB across the entire passband. In final, 1 × 3, 2 × 2, and 4 × 4 antenna array prototypes are constructed and studied for verification of the expansibility and feasibility of the proposed decoupling method to both linear and 2-D antenna arrays.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"483-494"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982048","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Level Queue Security in Switches: Adversarial Inference and Differential Privacy Protection in SDN 交换机中的多级队列安全:SDN中的对抗推理和差分隐私保护
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2022.00.373
Xuewen Dong;Lingtao Xue;Tao Zhang;Zhichao You;Guangxia Li;Yulong Shen
Network switches are critical elements in any network infrastructure for traffic forwarding and packet priority scheduling, which naturally become a target of network adversaries. Most attacks on switches focus on purposely forwarding packets to the wrong network nodes or generating flooding. However, potential privacy leakage in the multi-level priority queue of switches has not been considered. In this paper, we are the first to discuss the multi-level priority queue security and privacy protection problem in switches. Observing that packet leaving order from a queue is strongly correlated to its priority, we introduce a policy inference attack that exploits specific priority-mapping rules between different packet priorities and priority sub-queues in the multi-level queues. Next, based on the policy inference result and the built-in traffic shaping strategy, a capacity inference attack with the error probability decaying exponentially in the number of attacks is presented. In addition, we propose a differentially private priority scheduling mechanism to defend against the above attacks in OpenFlow switches. Theoretical analysis proves that our proposed mechanism can satisfy ε-differential privacy. Extensive evaluation results show that our mechanism can defend against inference attacks well and achieves up to 2.7 times priority process efficiency than a random priority scheduling strategy.
网络交换机是任何网络基础设施中用于流量转发和分组优先级调度的关键部件,自然成为网络攻击者的攻击目标。大多数针对交换机的攻击集中在故意将数据包转发到错误的网络节点或产生泛洪。但是,没有考虑交换机多级优先级队列中潜在的隐私泄露。本文首次讨论了交换机中多级优先队列的安全和隐私保护问题。观察到数据包离开队列的顺序与其优先级密切相关,我们引入了一种策略推理攻击,该攻击利用多层次队列中不同数据包优先级和优先级子队列之间的特定优先级映射规则。其次,基于策略推理结果和内置流量整形策略,提出了一种错误概率随攻击次数呈指数衰减的容量推理攻击。此外,我们提出了一种不同的私有优先级调度机制来防御OpenFlow交换机中的上述攻击。理论分析证明了该机制能够满足ε-差分隐私。大量的评估结果表明,我们的机制可以很好地防御推理攻击,并且比随机优先级调度策略获得高达2.7倍的优先级进程效率。
{"title":"Multi-Level Queue Security in Switches: Adversarial Inference and Differential Privacy Protection in SDN","authors":"Xuewen Dong;Lingtao Xue;Tao Zhang;Zhichao You;Guangxia Li;Yulong Shen","doi":"10.23919/cje.2022.00.373","DOIUrl":"https://doi.org/10.23919/cje.2022.00.373","url":null,"abstract":"Network switches are critical elements in any network infrastructure for traffic forwarding and packet priority scheduling, which naturally become a target of network adversaries. Most attacks on switches focus on purposely forwarding packets to the wrong network nodes or generating flooding. However, potential privacy leakage in the multi-level priority queue of switches has not been considered. In this paper, we are the first to discuss the multi-level priority queue security and privacy protection problem in switches. Observing that packet leaving order from a queue is strongly correlated to its priority, we introduce a policy inference attack that exploits specific priority-mapping rules between different packet priorities and priority sub-queues in the multi-level queues. Next, based on the policy inference result and the built-in traffic shaping strategy, a capacity inference attack with the error probability decaying exponentially in the number of attacks is presented. In addition, we propose a differentially private priority scheduling mechanism to defend against the above attacks in OpenFlow switches. Theoretical analysis proves that our proposed mechanism can satisfy ε-differential privacy. Extensive evaluation results show that our mechanism can defend against inference attacks well and achieves up to 2.7 times priority process efficiency than a random priority scheduling strategy.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"533-547"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Reliability-Centric Method for Swift Spoofing Signal Detection in Advanced GNSS Security 一种以可靠性为中心的快速欺骗信号检测方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.406
Xiang Li;Hao Zhang;Xuhui Yu;Wei Liu
Global navigation satellite systems (GNSSs) have been proven to be susceptible to spoofing signals, presenting a significant threat to the security and stability of nations and societies. Signal quality monitoring (SQM) can be utilized to identify spoofing attacks on GNSS signals. However, traditional SQM metrics exhibit inadequate responsiveness and resolution in detecting spoofing signals, and further the multi-correlator technology based on the traditional SQM metrics needs too high computation cost and still ignores abnormal power problem in the spoofing process. To address these issues, this paper proposed a novel spoofing detection method based on reliability theory for assessing the reliability of GNSS signals. A third-order central moment of GNSS signal correlation peak outputs is selected as the characteristic state equation, and then the reliability metric of GNSS signals is calculated by using the mathematical expectations and standard deviations of the characteristic state equation so as to determine the degree of distortion. After the intermediate spoofing interference dataset of Texas Spoofing Test Battery (TEXBAT) is analyzed experimentally, the proposed reliability metric is demonstrated to detect the presence of spoofing interference more rapidly, thereby mitigating irreversible harm. Additionally, it exhibits superior detection performance, real-time capabilities, and enhanced robustness in terms of identifying spoofing attack.
事实证明,全球卫星导航系统(gnss)容易受到欺骗信号的影响,对国家和社会的安全与稳定构成重大威胁。信号质量监测(SQM)可用于识别GNSS信号的欺骗攻击。然而,传统的SQM指标在检测欺骗信号时的响应性和分辨率不足,而且基于传统SQM指标的多相关器技术计算成本过高,并且仍然忽略了欺骗过程中的异常功率问题。针对这些问题,本文提出了一种基于可靠性理论的欺骗检测方法来评估GNSS信号的可靠性。选择GNSS信号相关峰值输出的一个三阶中心矩作为特征状态方程,然后利用特征状态方程的数学期望和标准差计算GNSS信号的可靠性度量,从而确定失真程度。通过对德克萨斯欺骗测试电池(TEXBAT)的中间欺骗干扰数据集进行实验分析,证明了所提出的可靠性度量可以更快地检测欺骗干扰的存在,从而减轻不可逆损害。此外,它在识别欺骗攻击方面表现出卓越的检测性能、实时能力和增强的健壮性。
{"title":"A Robust Reliability-Centric Method for Swift Spoofing Signal Detection in Advanced GNSS Security","authors":"Xiang Li;Hao Zhang;Xuhui Yu;Wei Liu","doi":"10.23919/cje.2023.00.406","DOIUrl":"https://doi.org/10.23919/cje.2023.00.406","url":null,"abstract":"Global navigation satellite systems (GNSSs) have been proven to be susceptible to spoofing signals, presenting a significant threat to the security and stability of nations and societies. Signal quality monitoring (SQM) can be utilized to identify spoofing attacks on GNSS signals. However, traditional SQM metrics exhibit inadequate responsiveness and resolution in detecting spoofing signals, and further the multi-correlator technology based on the traditional SQM metrics needs too high computation cost and still ignores abnormal power problem in the spoofing process. To address these issues, this paper proposed a novel spoofing detection method based on reliability theory for assessing the reliability of GNSS signals. A third-order central moment of GNSS signal correlation peak outputs is selected as the characteristic state equation, and then the reliability metric of GNSS signals is calculated by using the mathematical expectations and standard deviations of the characteristic state equation so as to determine the degree of distortion. After the intermediate spoofing interference dataset of Texas Spoofing Test Battery (TEXBAT) is analyzed experimentally, the proposed reliability metric is demonstrated to detect the presence of spoofing interference more rapidly, thereby mitigating irreversible harm. Additionally, it exhibits superior detection performance, real-time capabilities, and enhanced robustness in terms of identifying spoofing attack.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"774-786"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060048","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-Resolution ISAR Imaging for Detection of Micro Damages on Spacecraft Thermal Protection System 航天器热防护系统微损伤的高分辨率ISAR成像检测
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.339
Yihang Zhang;Xiao Wang
The thermal protection system (TPS) is an essential component that guarantees the safe flight of high-speed spacecraft. However, the TPS is bound to suffer various level of damages during flight missions, among which the micro damages are difficult to distinguish from optical images. In this paper, we propose a novel approach to detect tiny surface damages of TPS for spacecraft by using inverse synthetic aperture radar (ISAR) imaging. To accomplish this, the procedure consists of three components: electromagnetic scattering simulation, 2-D ISAR imaging, and damage detection and identification. Different types of common TPS surface micro damages such as debonding, cracks, holes, and warpage are simulated. The obtained high-precision 2-D images prominently display the structure and morphology of micro damages. Finally, a relative entropy-based damage detection and identification method is proposed using the established damage characteristics database. The experimental results have demonstrated that by comparing the differences in the statistical characteristics between the damaged and undamaged models, the monitoring and identification of the micro damages can be successfully realized. Overall, the proposed approach offers a promising solution for monitoring the status of TPS in real time and enhancing the safety of high-speed spacecraft during flight missions.
热防护系统(TPS)是保证高速航天器安全飞行的重要部件。然而,TPS在飞行任务中必然会遭受不同程度的损伤,其中微观损伤难以从光学图像中识别出来。本文提出了一种利用逆合成孔径雷达(ISAR)成像检测航天器TPS表面微小损伤的新方法。为了实现这一目标,该过程由三个部分组成:电磁散射模拟、二维ISAR成像以及损伤检测和识别。模拟了不同类型的常见TPS表面微损伤,如脱粘、裂纹、孔洞和翘曲。获得的高精度二维图像清晰地显示了微损伤的结构和形态。最后,利用已建立的损伤特征库,提出了一种基于相对熵的损伤检测与识别方法。实验结果表明,通过比较损伤模型与未损伤模型统计特征的差异,可以成功地实现对微损伤的监测与识别。总体而言,该方法为实时监测TPS状态和提高高速航天器飞行任务的安全性提供了一种有希望的解决方案。
{"title":"High-Resolution ISAR Imaging for Detection of Micro Damages on Spacecraft Thermal Protection System","authors":"Yihang Zhang;Xiao Wang","doi":"10.23919/cje.2023.00.339","DOIUrl":"https://doi.org/10.23919/cje.2023.00.339","url":null,"abstract":"The thermal protection system (TPS) is an essential component that guarantees the safe flight of high-speed spacecraft. However, the TPS is bound to suffer various level of damages during flight missions, among which the micro damages are difficult to distinguish from optical images. In this paper, we propose a novel approach to detect tiny surface damages of TPS for spacecraft by using inverse synthetic aperture radar (ISAR) imaging. To accomplish this, the procedure consists of three components: electromagnetic scattering simulation, 2-D ISAR imaging, and damage detection and identification. Different types of common TPS surface micro damages such as debonding, cracks, holes, and warpage are simulated. The obtained high-precision 2-D images prominently display the structure and morphology of micro damages. Finally, a relative entropy-based damage detection and identification method is proposed using the established damage characteristics database. The experimental results have demonstrated that by comparing the differences in the statistical characteristics between the damaged and undamaged models, the monitoring and identification of the micro damages can be successfully realized. Overall, the proposed approach offers a promising solution for monitoring the status of TPS in real time and enhancing the safety of high-speed spacecraft during flight missions.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"787-801"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EASA: Fine-Tuning SAM with Edge Attention and Adapters for Image Manipulation Localization EASA:微调SAM与边缘注意和适配器的图像处理定位
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2024.00.086
Fan Zhang;Qiming Xu;Wei Hu;Fei Ma
The Segment Anything Model (SAM) is gaining attention for various applications due to its success in precise segmentation and zero-shot inference across diverse datasets. The image manipulation localization (IML) task, facing a lack of high-quality, diverse datasets, could benefit from SAM's strong generalization ability. However, the unique nature of the IML task presents a significant challenge: the vast distributional disparity between IML data and conventional visual task data makes it seem implausible to effectively transfer a pretrained model like SAM to this task. Models typically either forget previous knowledge or fail to adapt to IML's unique data distribution due to structural mismatches. To address this, we introduce the edge-attention SAM-adapter (EASA), which overcomes catastrophic forgetting and effectively adapts to IML's unique data distribution. Specifically, our EASA method mitigates the issue of catastrophic forgetting by employing adapter tuning strategy and designs a novel edge-attention branch effectively captures the subtle traces of edge manipulations in manipulated regions. In our experiments across six public datasets, our method significantly enhances performance in IML tasks compared to state-of-the-art methods, thus showcasing the potential of SAM in various downstream tasks previously considered challenging.
分段任意模型(SAM)由于其在不同数据集的精确分割和零概率推理方面的成功而受到各种应用的关注。面对缺乏高质量、多样化数据集的图像处理定位(IML)任务,SAM具有较强的泛化能力。然而,IML任务的独特性质带来了一个重大挑战:IML数据和传统视觉任务数据之间的巨大分布差异使得有效地将像SAM这样的预训练模型转移到该任务中似乎是不可能的。模型通常要么忘记了以前的知识,要么由于结构不匹配而无法适应IML独特的数据分布。为了解决这个问题,我们引入了边缘注意sam适配器(EASA),它克服了灾难性遗忘,并有效地适应了IML独特的数据分布。具体来说,我们的EASA方法通过采用适配器调优策略减轻了灾难性遗忘的问题,并设计了一种新的边缘注意分支,有效地捕获了被操纵区域中边缘操作的细微痕迹。在我们跨六个公共数据集的实验中,与最先进的方法相比,我们的方法显着提高了IML任务的性能,从而展示了SAM在以前被认为具有挑战性的各种下游任务中的潜力。
{"title":"EASA: Fine-Tuning SAM with Edge Attention and Adapters for Image Manipulation Localization","authors":"Fan Zhang;Qiming Xu;Wei Hu;Fei Ma","doi":"10.23919/cje.2024.00.086","DOIUrl":"https://doi.org/10.23919/cje.2024.00.086","url":null,"abstract":"The Segment Anything Model (SAM) is gaining attention for various applications due to its success in precise segmentation and zero-shot inference across diverse datasets. The image manipulation localization (IML) task, facing a lack of high-quality, diverse datasets, could benefit from SAM's strong generalization ability. However, the unique nature of the IML task presents a significant challenge: the vast distributional disparity between IML data and conventional visual task data makes it seem implausible to effectively transfer a pretrained model like SAM to this task. Models typically either forget previous knowledge or fail to adapt to IML's unique data distribution due to structural mismatches. To address this, we introduce the edge-attention SAM-adapter (EASA), which overcomes catastrophic forgetting and effectively adapts to IML's unique data distribution. Specifically, our EASA method mitigates the issue of catastrophic forgetting by employing adapter tuning strategy and designs a novel edge-attention branch effectively captures the subtle traces of edge manipulations in manipulated regions. In our experiments across six public datasets, our method significantly enhances performance in IML tasks compared to state-of-the-art methods, thus showcasing the potential of SAM in various downstream tasks previously considered challenging.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"980-989"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060045","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144519351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Sitting Posture Recognition System Using Passive RFID Tags in Internet of Things 基于被动RFID标签的物联网动态坐姿识别系统
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.354
Jian Su;Shijie Chen
The rapidly developing Internet of things technology is gradually being utilized to monitor people's unhealthy behaviors. Sedentary behavior and wrong sitting posture are common health issues that can detrimentally impact the physical and psychological health of teenagers. An effective way to promptly rectify improper sitting postures among teenagers is to use equipment to monitor and recognize the alterations of sitting posture. The majority of conventional sitting posture recognition methods rely on cameras or sensors to recognize sitting posture. The employment of cameras will violate user's privacy, and the utilization of sensors will increase the cost of implementation. A dynamic sitting posture recognition system based on commodity off-the-shelf (COTS) radio frequency identification (RFID) devices is proposed. This system can recognize six common erroneous sitting postures by simply sticking five passive RFID tags on the user's back. We collect phase and received signal strength indicator (RSSI) data of passive RFID tags, then transform them into Doppler shift and RSSI difference data respectively, and finally input them into the established deep residual neural network for the classification of sitting postures. The experiment results show that our system achieves an average recognition accuracy of 99.17% with six sitting postures and is highly robust to different users and different usage environments.
快速发展的物联网技术正逐渐被用于监测人们的不健康行为。久坐行为和错误的坐姿是常见的健康问题,会对青少年的身心健康产生不利影响。及时纠正青少年不当坐姿的有效方法是使用设备监测和识别坐姿的变化。传统的坐姿识别方法大多依靠摄像头或传感器来识别坐姿。摄像头的使用会侵犯用户的隐私,而传感器的使用会增加实现成本。提出了一种基于商品现货(COTS)射频识别(RFID)器件的动态坐姿识别系统。该系统可以识别六种常见的错误坐姿,只需在用户背上贴上五个无源RFID标签。我们采集无源RFID标签的相位和接收信号强度指标(RSSI)数据,将其分别转化为多普勒频移和RSSI差值数据,最后输入到所建立的深度残差神经网络中进行坐姿分类。实验结果表明,该系统对6种坐姿的平均识别准确率达到99.17%,对不同用户和不同使用环境具有很强的鲁棒性。
{"title":"Dynamic Sitting Posture Recognition System Using Passive RFID Tags in Internet of Things","authors":"Jian Su;Shijie Chen","doi":"10.23919/cje.2023.00.354","DOIUrl":"https://doi.org/10.23919/cje.2023.00.354","url":null,"abstract":"The rapidly developing Internet of things technology is gradually being utilized to monitor people's unhealthy behaviors. Sedentary behavior and wrong sitting posture are common health issues that can detrimentally impact the physical and psychological health of teenagers. An effective way to promptly rectify improper sitting postures among teenagers is to use equipment to monitor and recognize the alterations of sitting posture. The majority of conventional sitting posture recognition methods rely on cameras or sensors to recognize sitting posture. The employment of cameras will violate user's privacy, and the utilization of sensors will increase the cost of implementation. A dynamic sitting posture recognition system based on commodity off-the-shelf (COTS) radio frequency identification (RFID) devices is proposed. This system can recognize six common erroneous sitting postures by simply sticking five passive RFID tags on the user's back. We collect phase and received signal strength indicator (RSSI) data of passive RFID tags, then transform them into Doppler shift and RSSI difference data respectively, and finally input them into the established deep residual neural network for the classification of sitting postures. The experiment results show that our system achieves an average recognition accuracy of 99.17% with six sitting postures and is highly robust to different users and different usage environments.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"586-599"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982073","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Path Reasoning for Multi-Hop Question Answering over Knowledge Graph 知识图上多跳问答的多路径推理
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.044
Yana Lyu;Xutong Qin;Xiuli Du;Niujie Zhao;Shaoming Qiu
Multi-hop question answering over knowledge graph (KGQA) aims to find the answer entities that are multiple hops away from the entities in the question called seed entities in the knowledge graph. The main methods include rule and template based methods and deep learning based methods. At present, deep learning based methods is in the mainstream, with the advantages of good portability and high utilization of knowledge graph information. A significant challenge is the lack of information on intermediate entities along the reasoning path. However, most deep learning models are unable to learn the correct reasoning path. To address this challenge, we propose a multi-path reasoning model, which selects the correct reasoning path by constraining the consistency of multiple paths from the seed entity to the answer entity. Then, a teacher-student network is adopted for model compression, where the teacher model relies on the proposed multi-path reasoning model. To demonstrate our model's effectiveness on the KGQA task, we compared our model with four baselines on two benchmark datasets. The experimental results revealed that the Hits@1 values of the model reached 77.8% and 60.2% on WebQuestionsSP and Complex WebQuestions 1.1 datasets, respectively.
知识图谱上的多跳问答(KGQA)旨在寻找与问题中的实体相距多跳的答案实体,即知识图谱中的种子实体。主要的方法有基于规则和模板的方法和基于深度学习的方法。目前,基于深度学习的方法是主流,具有可移植性好、知识图信息利用率高的优点。一个重要的挑战是缺乏关于推理路径上的中间实体的信息。然而,大多数深度学习模型无法学习正确的推理路径。为了解决这个问题,我们提出了一个多路径推理模型,该模型通过约束从种子实体到答案实体的多条路径的一致性来选择正确的推理路径。然后,采用师生网络进行模型压缩,其中教师模型依赖于所提出的多路径推理模型。为了证明我们的模型在KGQA任务上的有效性,我们将我们的模型与两个基准数据集上的四个基线进行了比较。实验结果表明,该模型在WebQuestionsSP和Complex WebQuestions 1.1数据集上的Hits@1值分别达到77.8%和60.2%。
{"title":"Multi-Path Reasoning for Multi-Hop Question Answering over Knowledge Graph","authors":"Yana Lyu;Xutong Qin;Xiuli Du;Niujie Zhao;Shaoming Qiu","doi":"10.23919/cje.2023.00.044","DOIUrl":"https://doi.org/10.23919/cje.2023.00.044","url":null,"abstract":"Multi-hop question answering over knowledge graph (KGQA) aims to find the answer entities that are multiple hops away from the entities in the question called seed entities in the knowledge graph. The main methods include rule and template based methods and deep learning based methods. At present, deep learning based methods is in the mainstream, with the advantages of good portability and high utilization of knowledge graph information. A significant challenge is the lack of information on intermediate entities along the reasoning path. However, most deep learning models are unable to learn the correct reasoning path. To address this challenge, we propose a multi-path reasoning model, which selects the correct reasoning path by constraining the consistency of multiple paths from the seed entity to the answer entity. Then, a teacher-student network is adopted for model compression, where the teacher model relies on the proposed multi-path reasoning model. To demonstrate our model's effectiveness on the KGQA task, we compared our model with four baselines on two benchmark datasets. The experimental results revealed that the Hits@1 values of the model reached 77.8% and 60.2% on WebQuestionsSP and Complex WebQuestions 1.1 datasets, respectively.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"642-648"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous Consensus Algorithm Integrating Dynamic Weight Sharding Strategy 集成动态权重分片策略的异步一致性算法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-03-01 DOI: 10.23919/cje.2023.00.313
Ao Xiong;Wang Zhang;Yu Song;Dong Wang;Da Li;Qinglei Guo;Desheng Bai
Blockchain technology has broad application prospects in many fields due to its unique characteristics such as decentralization, traceability, and tamper-proofing, and has become a research hotspot in recent years. As a key component of blockchain technology, the consensus algorithm is one of the important factors affecting blockchain performance. Many consensus algorithms currently used in consortium chains are based on timing assumptions and lack horizontal scalability. That is to say, these algorithms cannot reach an agreement in an asynchronous network where the receiving time of network packets is uncertain, and their efficiency decreases as the number of nodes increases, which hinders the large-scale application of the consortium chain. In order to solve the above problems, this paper proposes the dynamic sharding Dumbo (DS-Dumbo) algorithm, an asynchronous consensus algorithm that integrates dynamic sharding strategies, based on the currently excellent Dumbo Byzantine fault tolerance (DumboBFT) asynchronous consensus algorithm. The main work of this paper revolves around how to fragment and optimize the consensus process. This paper designs a node asynchronous sharding model based on multi-dimensional weights, so that the re-sharding work of each blockchain node can be executed concurrently with the asynchronous consensus algorithm, reducing the conflict between blockchain sharding and asynchronous consensus algorithms. We also designed an intelligent transaction placement strategy, which calculates the relevance score of each transaction for all shards to determine which shard the transaction is processed in order to reduce the number of complex cross-shard transactions. We optimized the execution process of the DumboBFT algorithm, converted its internal synchronous working mode to an asynchronous working mode, and reduced the consumption of consensus work to a certain extent. The experimental evaluation shows that the DS-Dumbo algorithm has higher throughput and lower delay than the DumboBFT algorithm, can increase the throughput with the increase of nodes, and has the ability of horizontal expansion.
区块链技术以其独特的去中心化、可追溯性、防篡改等特点,在诸多领域有着广阔的应用前景,成为近年来的研究热点。共识算法作为区块链技术的关键组成部分,是影响区块链性能的重要因素之一。目前在联盟链中使用的许多共识算法都是基于时间假设的,缺乏横向可扩展性。也就是说,这些算法在网络数据包接收时间不确定的异步网络中无法达成一致,且效率随着节点数量的增加而降低,阻碍了联盟链的大规模应用。为了解决上述问题,本文在目前优秀的Dumbo拜占庭容错(DumboBFT)异步共识算法的基础上,提出了一种集成了动态分片策略的异步共识算法——动态分片Dumbo (DS-Dumbo)算法。本文的主要工作围绕如何分割和优化共识过程展开。本文设计了一种基于多维权值的节点异步分片模型,使得区块链节点的重分片工作可以与异步共识算法并行执行,减少了区块链分片与异步共识算法之间的冲突。我们还设计了一个智能事务放置策略,该策略计算所有分片的每个事务的相关性评分,以确定处理哪个分片的事务,以减少复杂的跨分片事务的数量。我们优化了DumboBFT算法的执行过程,将其内部的同步工作模式转换为异步工作模式,在一定程度上减少了共识工作的消耗。实验评估表明,DS-Dumbo算法比DumboBFT算法具有更高的吞吐量和更低的延迟,可以随着节点的增加而增加吞吐量,并具有水平扩展的能力。
{"title":"Asynchronous Consensus Algorithm Integrating Dynamic Weight Sharding Strategy","authors":"Ao Xiong;Wang Zhang;Yu Song;Dong Wang;Da Li;Qinglei Guo;Desheng Bai","doi":"10.23919/cje.2023.00.313","DOIUrl":"https://doi.org/10.23919/cje.2023.00.313","url":null,"abstract":"Blockchain technology has broad application prospects in many fields due to its unique characteristics such as decentralization, traceability, and tamper-proofing, and has become a research hotspot in recent years. As a key component of blockchain technology, the consensus algorithm is one of the important factors affecting blockchain performance. Many consensus algorithms currently used in consortium chains are based on timing assumptions and lack horizontal scalability. That is to say, these algorithms cannot reach an agreement in an asynchronous network where the receiving time of network packets is uncertain, and their efficiency decreases as the number of nodes increases, which hinders the large-scale application of the consortium chain. In order to solve the above problems, this paper proposes the dynamic sharding Dumbo (DS-Dumbo) algorithm, an asynchronous consensus algorithm that integrates dynamic sharding strategies, based on the currently excellent Dumbo Byzantine fault tolerance (DumboBFT) asynchronous consensus algorithm. The main work of this paper revolves around how to fragment and optimize the consensus process. This paper designs a node asynchronous sharding model based on multi-dimensional weights, so that the re-sharding work of each blockchain node can be executed concurrently with the asynchronous consensus algorithm, reducing the conflict between blockchain sharding and asynchronous consensus algorithms. We also designed an intelligent transaction placement strategy, which calculates the relevance score of each transaction for all shards to determine which shard the transaction is processed in order to reduce the number of complex cross-shard transactions. We optimized the execution process of the DumboBFT algorithm, converted its internal synchronous working mode to an asynchronous working mode, and reduced the consumption of consensus work to a certain extent. The experimental evaluation shows that the DS-Dumbo algorithm has higher throughput and lower delay than the DumboBFT algorithm, can increase the throughput with the increase of nodes, and has the ability of horizontal expansion.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 2","pages":"600-611"},"PeriodicalIF":1.6,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10982076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Chinese Journal of Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1