首页 > 最新文献

ACM Transactions on Sensor Networks最新文献

英文 中文
EchoSensor: Fine-Grained Ultrasonic Sensing for Smart Home Intrusion Detection EchoSensor:用于智能家居入侵检测的细粒度超声波传感
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-12 DOI: 10.1145/3615658
Jie Lian, Changlai Du, Jiadong Lou, Li Chen, Xu Yuan
This paper presents the design and implementation of a novel intrusion detection system, called EchoSensor, which leverages speakers and microphones in smart home devices to capture human gait patterns for individual identification. EchoSensor harnesses the speaker to send inaudible acoustic signals (around 20kHz) and utilizes the microphone to capture the reflected signals. As the reflected signals have unique variations in the Doppler shift respective to the gaits of different people, EchoSensor is able to profile human gait patterns from the generated spectrograms. To mine the gait information, we first propose a two-stage interference cancellation scheme to remove the background noise and environmental interference, followed by a new method to detect the starting point of walking and estimate the gait cycle time. We then perform the fine-grained analysis of the spectrograms to extract a series of features. In the end, machine learning is employed to construct an identifier for individual recognition. We implement the EchoSensor system and deploy it under different household environments to conduct intrusion detection tasks. Extensive experimental results have demonstrated that EchoSensor can achieve the averaged Intruder Gait Detection Rate (IDR) and True Family Member Gait Detection Rate (TFR) of 92.7% and 91.9%, respectively.
本文介绍了一种名为EchoSensor的新型入侵检测系统的设计和实现,该系统利用智能家居设备中的扬声器和麦克风来捕捉人类步态模式,以进行个人识别。EchoSensor利用扬声器发送听不见的声学信号(约20kHz),并利用麦克风捕获反射信号。由于反射信号的多普勒频移与不同人的步态有着独特的变化,EchoSensor能够从生成的频谱图中描绘出人类的步态模式。为了挖掘步态信息,我们首先提出了一种两阶段干扰消除方案来去除背景噪声和环境干扰,然后提出了一个新的方法来检测步行的起点并估计步态周期时间。然后,我们对声谱图进行细粒度分析,以提取一系列特征。最后,使用机器学习来构造用于个体识别的标识符。我们实现了EchoSensor系统,并将其部署在不同的家庭环境中,以执行入侵检测任务。大量实验结果表明,EchoSensor的平均入侵步态检测率和真实家庭成员步态检测率分别为92.7%和91.9%。
{"title":"EchoSensor: Fine-Grained Ultrasonic Sensing for Smart Home Intrusion Detection","authors":"Jie Lian, Changlai Du, Jiadong Lou, Li Chen, Xu Yuan","doi":"10.1145/3615658","DOIUrl":"https://doi.org/10.1145/3615658","url":null,"abstract":"This paper presents the design and implementation of a novel intrusion detection system, called EchoSensor, which leverages speakers and microphones in smart home devices to capture human gait patterns for individual identification. EchoSensor harnesses the speaker to send inaudible acoustic signals (around 20kHz) and utilizes the microphone to capture the reflected signals. As the reflected signals have unique variations in the Doppler shift respective to the gaits of different people, EchoSensor is able to profile human gait patterns from the generated spectrograms. To mine the gait information, we first propose a two-stage interference cancellation scheme to remove the background noise and environmental interference, followed by a new method to detect the starting point of walking and estimate the gait cycle time. We then perform the fine-grained analysis of the spectrograms to extract a series of features. In the end, machine learning is employed to construct an identifier for individual recognition. We implement the EchoSensor system and deploy it under different household environments to conduct intrusion detection tasks. Extensive experimental results have demonstrated that EchoSensor can achieve the averaged Intruder Gait Detection Rate (IDR) and True Family Member Gait Detection Rate (TFR) of 92.7% and 91.9%, respectively.","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":" ","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47079341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TFSemantic: A Time-Frequency Semantic GAN Framework for Imbalanced Classification Using Radio Signals 基于无线电信号的不平衡分类时频语义GAN框架
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-08 DOI: 10.1145/3614096
Peng Liao, Xuyu Wang, Lin An, Shiwen Mao, Tianya Zhao, Chao Yang
Recently, wireless sensing techniques have been widely used for Internet of Things (IoT) applications. Unlike traditional device-based sensing, wireless sensing is contactless, pervasive, low-cost, and non-invasive, making it highly suitable for relevant IoT applications. However, most existing methods are highly dependent on high-quality datasets, and the minority class will not achieve a satisfactory performance when suffering from a class imbalance problem. In this paper, we propose a time-frequency semantic generative adversarial network (GAN) framework (i.e., TFSemantic) to address the imbalanced classification problem in human activity recognition (HAR) using radio frequency (RF) signals. Specifically, the TFSemantic framework can learn semantic features from the minority classes and then generate high-quality signals to restore data balance. It includes a data pre-processing module, a semantic extraction module, a semantic distribution module, and a data augmenter module. In the data pre-processing module, we process four different RF datasets (i.e., WiFi, RFID, UWB, and mmWave). We also develop Fourier semantic feature convolution (SFC) and attention semantic feature embedding (SFE) methods for the semantic extraction module. A discrete wavelet transform (DWT) is utilized for reconstructed RF samples in the semantic distribution module. In data augmenter module, we design an associated loss function to achieve effective adversarial training. Finally, we validate the effectiveness of the proposed TFSemantic framework using different RF datasets, which outperforms several state-of-the-art methods.
近年来,无线传感技术已被广泛用于物联网(IoT)应用。与传统的基于设备的传感不同,无线传感具有非接触、普及、低成本和非侵入性,非常适合相关的物联网应用。然而,大多数现有的方法都高度依赖于高质量的数据集,少数类在遇到类不平衡问题时不会获得令人满意的性能。在本文中,我们提出了一种时频语义生成对抗性网络(GAN)框架(即TFSemantic),以解决使用射频(RF)信号的人类活动识别(HAR)中的不平衡分类问题。具体来说,TFSemantic框架可以从少数类中学习语义特征,然后生成高质量的信号来恢复数据平衡。它包括数据预处理模块、语义提取模块、语义分发模块和数据扩充模块。在数据预处理模块中,我们处理四个不同的RF数据集(即WiFi、RFID、UWB和毫米波)。我们还为语义提取模块开发了傅立叶语义特征卷积(SFC)和注意力语义特征嵌入(SFE)方法。离散小波变换(DWT)用于语义分布模块中的重构RF样本。在数据增强模块中,我们设计了一个相关的损失函数来实现有效的对抗性训练。最后,我们使用不同的RF数据集验证了所提出的TFSemantic框架的有效性,它优于几种最先进的方法。
{"title":"TFSemantic: A Time-Frequency Semantic GAN Framework for Imbalanced Classification Using Radio Signals","authors":"Peng Liao, Xuyu Wang, Lin An, Shiwen Mao, Tianya Zhao, Chao Yang","doi":"10.1145/3614096","DOIUrl":"https://doi.org/10.1145/3614096","url":null,"abstract":"Recently, wireless sensing techniques have been widely used for Internet of Things (IoT) applications. Unlike traditional device-based sensing, wireless sensing is contactless, pervasive, low-cost, and non-invasive, making it highly suitable for relevant IoT applications. However, most existing methods are highly dependent on high-quality datasets, and the minority class will not achieve a satisfactory performance when suffering from a class imbalance problem. In this paper, we propose a time-frequency semantic generative adversarial network (GAN) framework (i.e., TFSemantic) to address the imbalanced classification problem in human activity recognition (HAR) using radio frequency (RF) signals. Specifically, the TFSemantic framework can learn semantic features from the minority classes and then generate high-quality signals to restore data balance. It includes a data pre-processing module, a semantic extraction module, a semantic distribution module, and a data augmenter module. In the data pre-processing module, we process four different RF datasets (i.e., WiFi, RFID, UWB, and mmWave). We also develop Fourier semantic feature convolution (SFC) and attention semantic feature embedding (SFE) methods for the semantic extraction module. A discrete wavelet transform (DWT) is utilized for reconstructed RF samples in the semantic distribution module. In data augmenter module, we design an associated loss function to achieve effective adversarial training. Finally, we validate the effectiveness of the proposed TFSemantic framework using different RF datasets, which outperforms several state-of-the-art methods.","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":" ","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45495804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VSSB-Raft:A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain VSSB-Raft:一种安全高效的区块链零信任共识算法
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-08 DOI: 10.1145/3611308
Siben Tian, Fenhua Bai, Tao Shen, Chi Zhang, Gong Bei
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus algorithm -Verifiable Secret Sharing Byzantine Fault Tolerance Raft Consensus Algorithm(VSSB-Raft). The VSSB-Raft consensus algorithm realizes zero trust through the supervisor node and secret sharing algorithm without the invisible trust between nodes required by the algorithm. Meanwhile, the VSSB-Raft consensus algorithm uses the SM2 signature algorithm to realize the characteristics of zero trust requiring authentication before data use. In addition, by introducing the NDN network, we redesign the communication between nodes and guarantee the communication quality among nodes. The VSSB-Raft consensus algorithm proposed in this paper can make the algorithm Byzantine fault tolerant by setting a threshold for secret sharing while maintaining the algorithm’s complexity to be O(n). Experiments show that the VSSB-Raft consensus algorithm is secure and efficient with high throughput and low consensus latency.
为了解决Raft共识算法中存在的投票伪造和候选节点恶意选举问题,我们将零信任与Raft共识算法相结合,提出了一种安全高效的共识算法——可验证秘密共享拜占庭容错Raft共识算法(VSSB-Raft)。VSSB-Raft共识算法通过监督节点和秘密共享算法实现零信任,不需要算法所要求的节点间隐形信任。同时,VSSB-Raft共识算法采用SM2签名算法,实现了数据使用前需要认证的零信任特性。此外,通过引入NDN网络,重新设计节点间通信,保证节点间通信质量。本文提出的VSSB-Raft共识算法在保持算法复杂度为O(n)的前提下,通过设置秘密共享阈值使算法具有拜占庭容错性。实验表明,VSSB-Raft共识算法具有高吞吐量和低共识延迟的安全高效特点。
{"title":"VSSB-Raft:A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain","authors":"Siben Tian, Fenhua Bai, Tao Shen, Chi Zhang, Gong Bei","doi":"10.1145/3611308","DOIUrl":"https://doi.org/10.1145/3611308","url":null,"abstract":"To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus algorithm -Verifiable Secret Sharing Byzantine Fault Tolerance Raft Consensus Algorithm(VSSB-Raft). The VSSB-Raft consensus algorithm realizes zero trust through the supervisor node and secret sharing algorithm without the invisible trust between nodes required by the algorithm. Meanwhile, the VSSB-Raft consensus algorithm uses the SM2 signature algorithm to realize the characteristics of zero trust requiring authentication before data use. In addition, by introducing the NDN network, we redesign the communication between nodes and guarantee the communication quality among nodes. The VSSB-Raft consensus algorithm proposed in this paper can make the algorithm Byzantine fault tolerant by setting a threshold for secret sharing while maintaining the algorithm’s complexity to be O(n). Experiments show that the VSSB-Raft consensus algorithm is secure and efficient with high throughput and low consensus latency.","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":" ","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45410582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge-assisted Object Segmentation using Multimodal Feature Aggregation and Learning 基于多模态特征聚合和学习的边缘辅助目标分割
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-04 DOI: 10.1145/3612922
Jianbo Li, Genji Yuan, Zheng Yang
Object segmentation aims to perfectly identify objects embedded in the surrounding environment and has a wide range of applications. Most previous methods of object segmentation only use RGB images and ignore geometric information from disparity images. Making full use of heterogeneous data from different devices has proved to be a very effective strategy for improving segmentation performance. The key challenge of the multimodal fusion based object segmentation task lies in the learning, transformation, and fusion of multimodal information. In this paper, we focus on the transformation of disparity images and the fusion of multimodal features. We develop a multimodal fusion object segmentation framework, termed the Hybrid Fusion Segmentation Network (HFSNet). Specifically, HFSNet contains three key components, i.e., disparity convolutional sparse coding (DCSC), asymmetric dense projection feature aggregation (ADPFA) and multimodal feature fusion (MFF). The DCSC is designed based on convolutional sparse coding. It not only has better interpretability but also preserves the key geometric information of the object. ADPFA is designed to enhance texture and geometric information to fully exploit nonadjacent features. MFF is used to perform multimodal feature fusion. Extensive experiments show that our HFSNet outperforms existing state-of-the-art models on two challenging datasets.
目标分割旨在完美识别嵌入在周围环境中的物体,具有广泛的应用。以往的目标分割方法大多只使用RGB图像,而忽略了视差图像的几何信息。充分利用来自不同设备的异构数据已被证明是提高分割性能的一种非常有效的策略。基于多模态融合的目标分割任务的关键挑战在于多模态信息的学习、转换和融合。本文主要研究视差图像的变换和多模态特征的融合。我们开发了一个多模态融合目标分割框架,称为混合融合分割网络(HFSNet)。HFSNet包含视差卷积稀疏编码(DCSC)、非对称密集投影特征聚合(ADPFA)和多模态特征融合(MFF)三个关键组件。DCSC是基于卷积稀疏编码设计的。它不仅具有更好的可解释性,而且保留了物体的关键几何信息。ADPFA旨在增强纹理和几何信息,以充分利用非相邻特征。MFF用于多模态特征融合。广泛的实验表明,我们的HFSNet在两个具有挑战性的数据集上优于现有的最先进的模型。
{"title":"Edge-assisted Object Segmentation using Multimodal Feature Aggregation and Learning","authors":"Jianbo Li, Genji Yuan, Zheng Yang","doi":"10.1145/3612922","DOIUrl":"https://doi.org/10.1145/3612922","url":null,"abstract":"Object segmentation aims to perfectly identify objects embedded in the surrounding environment and has a wide range of applications. Most previous methods of object segmentation only use RGB images and ignore geometric information from disparity images. Making full use of heterogeneous data from different devices has proved to be a very effective strategy for improving segmentation performance. The key challenge of the multimodal fusion based object segmentation task lies in the learning, transformation, and fusion of multimodal information. In this paper, we focus on the transformation of disparity images and the fusion of multimodal features. We develop a multimodal fusion object segmentation framework, termed the Hybrid Fusion Segmentation Network (HFSNet). Specifically, HFSNet contains three key components, i.e., disparity convolutional sparse coding (DCSC), asymmetric dense projection feature aggregation (ADPFA) and multimodal feature fusion (MFF). The DCSC is designed based on convolutional sparse coding. It not only has better interpretability but also preserves the key geometric information of the object. ADPFA is designed to enhance texture and geometric information to fully exploit nonadjacent features. MFF is used to perform multimodal feature fusion. Extensive experiments show that our HFSNet outperforms existing state-of-the-art models on two challenging datasets.","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":" ","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45512492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retrieving similar trajectories from cellular data of multiple carriers at city scale 从城市规模的多个运营商的蜂窝数据中检索相似的轨迹
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-03 DOI: 10.1145/3613245
Zhihao Shen, Wan Du, Xi Zhao, Jianhua Zou
Retrieving similar trajectories aims to search for the trajectories that are close to a query trajectory in spatio-temporal domain from a large trajectory dataset. This is critical for a variety of applications, like transportation planning and mobility analysis. Unlike previous studies that perform similar trajectory retrieval on fine-grained GPS data or single cellular carrier, we investigate the feasibility of finding similar trajectories from cellular data of multiple carriers, which provide more comprehensive coverage of population and space. To handle the issues of spatial bias of cellular data from multiple carriers, coarse spatial granularity, and irregular sparse temporal sampling, we develop a holistic system cellSim. Specifically, to avoid the issue of spatial bias, we first propose a novel map matching approach, which transforms the cell tower sequences from multiple carriers to routes on a unified road map. Then, to address the issue of temporal sparse sampling, we generate multiple routes with different confidences to increases the probability of finding truly similar trajectories. Finally, a new trajectory similarity measure is developed for similar trajectory search by calculating the similarities between the irregularly-sampled trajectories. Extensive experiments on a large-scale cellular dataset from two carriers and real-world 1,701-km query trajectories reveal that cellSim provides state-of-the-art performance for similar trajectory retrieval.
检索相似轨迹的目的是从一个大的轨迹数据集中,在时空域中寻找与查询轨迹接近的轨迹。这对于交通规划和交通分析等各种应用都是至关重要的。不同于以往在细粒度GPS数据或单个蜂窝载波上进行相似轨迹检索的研究,我们研究了从多载波的蜂窝数据中寻找相似轨迹的可行性,这提供了更全面的人口和空间覆盖。为了处理来自多个载波的元胞数据的空间偏差、粗糙的空间粒度和不规则的稀疏时间采样问题,我们开发了一个整体系统cellSim。具体而言,为了避免空间偏差问题,我们首先提出了一种新的地图匹配方法,将多个载波的信号塔序列转换为统一路线图上的路径。然后,为了解决时间稀疏采样的问题,我们生成了具有不同置信度的多条路线,以增加找到真正相似轨迹的概率。最后,通过计算不规则采样轨迹之间的相似度,提出了一种新的轨迹相似度度量方法,用于相似轨迹搜索。在两个运营商和真实世界1701公里查询轨迹的大规模蜂窝数据集上进行的大量实验表明,cellSim为类似的轨迹检索提供了最先进的性能。
{"title":"Retrieving similar trajectories from cellular data of multiple carriers at city scale","authors":"Zhihao Shen, Wan Du, Xi Zhao, Jianhua Zou","doi":"10.1145/3613245","DOIUrl":"https://doi.org/10.1145/3613245","url":null,"abstract":"Retrieving similar trajectories aims to search for the trajectories that are close to a query trajectory in spatio-temporal domain from a large trajectory dataset. This is critical for a variety of applications, like transportation planning and mobility analysis. Unlike previous studies that perform similar trajectory retrieval on fine-grained GPS data or single cellular carrier, we investigate the feasibility of finding similar trajectories from cellular data of multiple carriers, which provide more comprehensive coverage of population and space. To handle the issues of spatial bias of cellular data from multiple carriers, coarse spatial granularity, and irregular sparse temporal sampling, we develop a holistic system cellSim. Specifically, to avoid the issue of spatial bias, we first propose a novel map matching approach, which transforms the cell tower sequences from multiple carriers to routes on a unified road map. Then, to address the issue of temporal sparse sampling, we generate multiple routes with different confidences to increases the probability of finding truly similar trajectories. Finally, a new trajectory similarity measure is developed for similar trajectory search by calculating the similarities between the irregularly-sampled trajectories. Extensive experiments on a large-scale cellular dataset from two carriers and real-world 1,701-km query trajectories reveal that cellSim provides state-of-the-art performance for similar trajectory retrieval.","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":" ","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48858119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elder-oriented Active Learning for Adaptation of Perception Intelligence in Home Service Robots 面向老年人的主动学习用于家庭服务机器人感知智能的自适应
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-27 DOI: 10.1145/3607871
Qi Wang, Yan He, W. Sheng, Senlin Zhang, Meiqin Liu, Badong Chen
Active learning is a special case of machine learning in which a learning algorithm can interactively query a user to label new data points with the desired outputs. In robotics, active learning allows a robot to adapt its perception intelligence to a new environment with users’ help. This paper presents a new active learning method for elderly care robots to select data that is not only useful for learning but also easy for the elderly user to label. First, a series of image properties related to annotation difficulty are determined based on existing medical researches in human vision in elderly population. Based on that, a user study is conducted to determine the ground truth of annotation difficulty of images for the older adults. Second, a robust annotation difficulty predictor is developed using the results of the user study, and the difficulty prediction of an image is combined with three other active learning criteria to form an annotation difficulty-aware active learning metric, which facilitates the query data selection as the robot adapts its perception intelligence in a home environment. Third, we present an ablation study of the proposed active learning method through a simulation experiment. The experimental results validate the advantages of the proposed method.
主动学习是机器学习的一种特殊情况,在这种情况下,学习算法可以交互式地询问用户,以用期望的输出标记新的数据点。在机器人技术中,主动学习允许机器人在用户的帮助下将其感知智能适应新环境。本文提出了一种新的主动学习方法,用于老年护理机器人选择数据,该方法不仅对学习有用,而且易于老年用户标记。首先,在现有医学对老年人视觉研究的基础上,确定了一系列与标注难度相关的图像特性。在此基础上,进行了一项用户研究,以确定老年人图像注释难度的基本事实。其次,使用用户研究的结果开发了一个稳健的注释难度预测器,并将图像的难度预测与其他三个主动学习标准相结合,以形成注释难度感知的主动学习度量,这有助于在机器人在家庭环境中适应其感知智能时选择查询数据。第三,我们通过模拟实验对所提出的主动学习方法进行了消融研究。实验结果验证了该方法的优越性。
{"title":"Elder-oriented Active Learning for Adaptation of Perception Intelligence in Home Service Robots","authors":"Qi Wang, Yan He, W. Sheng, Senlin Zhang, Meiqin Liu, Badong Chen","doi":"10.1145/3607871","DOIUrl":"https://doi.org/10.1145/3607871","url":null,"abstract":"Active learning is a special case of machine learning in which a learning algorithm can interactively query a user to label new data points with the desired outputs. In robotics, active learning allows a robot to adapt its perception intelligence to a new environment with users’ help. This paper presents a new active learning method for elderly care robots to select data that is not only useful for learning but also easy for the elderly user to label. First, a series of image properties related to annotation difficulty are determined based on existing medical researches in human vision in elderly population. Based on that, a user study is conducted to determine the ground truth of annotation difficulty of images for the older adults. Second, a robust annotation difficulty predictor is developed using the results of the user study, and the difficulty prediction of an image is combined with three other active learning criteria to form an annotation difficulty-aware active learning metric, which facilitates the query data selection as the robot adapts its perception intelligence in a home environment. Third, we present an ablation study of the proposed active learning method through a simulation experiment. The experimental results validate the advantages of the proposed method.","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":" ","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44454923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Automatically Connecting IoT Devices with Vulnerabilities in the Wild 面向在野外自动连接具有漏洞的物联网设备
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-17 DOI: 10.1145/3608951
Jinke Song, Shangfeng Wan, Minfei Huang, Ji-Qiang Liu, Limin Sun, Qiang Li
With the increasing number of Internet of Things (IoT) devices connected to the internet, the industry and research community have become increasingly concerned about their security impact. Adversaries or hackers often exploit public security flaws to compromise IoT devices and launch cyber attacks. However, despite this growing concern, little effort has been made to investigate the detection of IoT devices and their underlying risks. To address this gap, this paper proposes to automatically establish relationships between IoT devices and their vulnerabilities in the wild. Specifically, we construct a deep neural network (DNN) to extract semantic information from IoT packets and generate fine-grained fingerprints of IoT devices. This enables us to annotate IoT devices in cyberspace, including their device type, vendor, and product information. We collect vulnerability reports from various security sources and extract IoT device information from these reports to automatically match vulnerabilities with the fingerprints of IoT devices. We implemented a prototype system and conducted extensive experiments to validate the effectiveness of our approach. The results show that our DNN model achieved a 98% precision rate and a 95% recall rate in IoT device fingerprinting. Furthermore, we collected and analyzed over 13,063 IoT-related vulnerability reports and our method automatically built 5,458 connections between IoT device fingerprints and their vulnerabilities. These findings shed light on the ongoing threat of cyber-attacks on IoT systems as both IoT devices and disclosed vulnerabilities are targets for malicious attackers.
随着越来越多的物联网(IoT)设备连接到互联网,业界和研究界越来越关注其安全影响。对手或黑客经常利用公共安全漏洞来破坏物联网设备并发动网络攻击。然而,尽管人们越来越关注这一问题,但很少有人去调查物联网设备的检测及其潜在风险。为了解决这一差距,本文提出在物联网设备及其漏洞之间自动建立关系。具体来说,我们构建了一个深度神经网络(DNN)来从物联网数据包中提取语义信息,并生成物联网设备的细粒度指纹。这使我们能够在网络空间中注释物联网设备,包括其设备类型,供应商和产品信息。我们从各种安全来源收集漏洞报告,并从中提取物联网设备信息,自动匹配漏洞与物联网设备指纹。我们实现了一个原型系统,并进行了大量的实验来验证我们方法的有效性。结果表明,我们的深度神经网络模型在物联网设备指纹识别中达到了98%的准确率和95%的召回率。此外,我们收集并分析了超过13063份与物联网相关的漏洞报告,我们的方法自动在物联网设备指纹与其漏洞之间建立了5458个连接。这些发现揭示了网络攻击对物联网系统的持续威胁,因为物联网设备和公开的漏洞都是恶意攻击者的目标。
{"title":"Towards Automatically Connecting IoT Devices with Vulnerabilities in the Wild","authors":"Jinke Song, Shangfeng Wan, Minfei Huang, Ji-Qiang Liu, Limin Sun, Qiang Li","doi":"10.1145/3608951","DOIUrl":"https://doi.org/10.1145/3608951","url":null,"abstract":"With the increasing number of Internet of Things (IoT) devices connected to the internet, the industry and research community have become increasingly concerned about their security impact. Adversaries or hackers often exploit public security flaws to compromise IoT devices and launch cyber attacks. However, despite this growing concern, little effort has been made to investigate the detection of IoT devices and their underlying risks. To address this gap, this paper proposes to automatically establish relationships between IoT devices and their vulnerabilities in the wild. Specifically, we construct a deep neural network (DNN) to extract semantic information from IoT packets and generate fine-grained fingerprints of IoT devices. This enables us to annotate IoT devices in cyberspace, including their device type, vendor, and product information. We collect vulnerability reports from various security sources and extract IoT device information from these reports to automatically match vulnerabilities with the fingerprints of IoT devices. We implemented a prototype system and conducted extensive experiments to validate the effectiveness of our approach. The results show that our DNN model achieved a 98% precision rate and a 95% recall rate in IoT device fingerprinting. Furthermore, we collected and analyzed over 13,063 IoT-related vulnerability reports and our method automatically built 5,458 connections between IoT device fingerprints and their vulnerabilities. These findings shed light on the ongoing threat of cyber-attacks on IoT systems as both IoT devices and disclosed vulnerabilities are targets for malicious attackers.","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":" ","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46447366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Automatically Connecting IoT Devices with Vulnerabilities in the Wild 实现自动连接存在漏洞的物联网设备
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-17 DOI: https://dl.acm.org/doi/10.1145/3608951
Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li

With the increasing number of Internet of Things (IoT) devices connected to the internet, the industry and research community have become increasingly concerned about their security impact. Adversaries or hackers often exploit public security flaws to compromise IoT devices and launch cyber attacks. However, despite this growing concern, little effort has been made to investigate the detection of IoT devices and their underlying risks. To address this gap, this paper proposes to automatically establish relationships between IoT devices and their vulnerabilities in the wild. Specifically, we construct a deep neural network (DNN) to extract semantic information from IoT packets and generate fine-grained fingerprints of IoT devices. This enables us to annotate IoT devices in cyberspace, including their device type, vendor, and product information. We collect vulnerability reports from various security sources and extract IoT device information from these reports to automatically match vulnerabilities with the fingerprints of IoT devices. We implemented a prototype system and conducted extensive experiments to validate the effectiveness of our approach. The results show that our DNN model achieved a 98% precision rate and a 95% recall rate in IoT device fingerprinting. Furthermore, we collected and analyzed over 13,063 IoT-related vulnerability reports and our method automatically built 5,458 connections between IoT device fingerprints and their vulnerabilities. These findings shed light on the ongoing threat of cyber-attacks on IoT systems as both IoT devices and disclosed vulnerabilities are targets for malicious attackers.

随着越来越多的物联网(IoT)设备连接到互联网,业界和研究界越来越关注其安全影响。对手或黑客经常利用公共安全漏洞来破坏物联网设备并发动网络攻击。然而,尽管人们越来越关注这一问题,但很少有人去调查物联网设备的检测及其潜在风险。为了解决这一差距,本文提出在物联网设备及其漏洞之间自动建立关系。具体来说,我们构建了一个深度神经网络(DNN)来从物联网数据包中提取语义信息,并生成物联网设备的细粒度指纹。这使我们能够在网络空间中注释物联网设备,包括其设备类型,供应商和产品信息。我们从各种安全来源收集漏洞报告,并从中提取物联网设备信息,自动匹配漏洞与物联网设备指纹。我们实现了一个原型系统,并进行了大量的实验来验证我们方法的有效性。结果表明,我们的深度神经网络模型在物联网设备指纹识别中达到了98%的准确率和95%的召回率。此外,我们收集并分析了超过13063份与物联网相关的漏洞报告,我们的方法自动在物联网设备指纹与其漏洞之间建立了5458个连接。这些发现揭示了网络攻击对物联网系统的持续威胁,因为物联网设备和公开的漏洞都是恶意攻击者的目标。
{"title":"Towards Automatically Connecting IoT Devices with Vulnerabilities in the Wild","authors":"Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li","doi":"https://dl.acm.org/doi/10.1145/3608951","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3608951","url":null,"abstract":"<p>With the increasing number of Internet of Things (IoT) devices connected to the internet, the industry and research community have become increasingly concerned about their security impact. Adversaries or hackers often exploit public security flaws to compromise IoT devices and launch cyber attacks. However, despite this growing concern, little effort has been made to investigate the detection of IoT devices and their underlying risks. To address this gap, this paper proposes to automatically establish relationships between IoT devices and their vulnerabilities in the wild. Specifically, we construct a deep neural network (DNN) to extract semantic information from IoT packets and generate fine-grained fingerprints of IoT devices. This enables us to annotate IoT devices in cyberspace, including their device type, vendor, and product information. We collect vulnerability reports from various security sources and extract IoT device information from these reports to automatically match vulnerabilities with the fingerprints of IoT devices. We implemented a prototype system and conducted extensive experiments to validate the effectiveness of our approach. The results show that our DNN model achieved a 98% precision rate and a 95% recall rate in IoT device fingerprinting. Furthermore, we collected and analyzed over 13,063 IoT-related vulnerability reports and our method automatically built 5,458 connections between IoT device fingerprints and their vulnerabilities. These findings shed light on the ongoing threat of cyber-attacks on IoT systems as both IoT devices and disclosed vulnerabilities are targets for malicious attackers.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"28 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
InferLoc: Hypothesis-based Joint Edge Inference and Localization in Sparse Sensor Networks 基于假设的稀疏传感器网络联合边缘推理与定位
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-12 DOI: https://dl.acm.org/doi/10.1145/3608477
Xuewei Bai, Yongcai Wang, Haodi Ping, Xiaojia Xu, Deying Li, Shuo Wang

Ranging-based localization is a fundamental problem in the Internet of Things (IoT) and Unmanned Aerial Vehicles (UAV) networks. However, the nodes’ limited-ranging scope and users’ broad coverage purpose inevitably cause network sparsity or subnetwork sparsity. The performances of existing localization algorithms are extremely unsatisfactory in sparse networks. A crucial way to deal with the sparsity is to exploit the hidden knowledge provided by the unmeasured edges, which inspires this paper to propose a hypothesis-based Joint Edge Inference and Localization algorithm, i.e., InferLoc. InferLoc mines the Unmeasured but Inferable Edges (UIEs). Each UIE is an unmeasured edge, but it is restricted through other edges in the network to be inside a rigid component, so it has only a limited number of possible lengths. We propose an efficient method to detect UIEs and geometric approaches to infer possible lengths for UIEs in 2D and 3D networks. The inferred possible lengths of UIEs are then treated as multiple hypotheses to determine the node locations and the lengths of UIEs simultaneously through a joint graph optimization process. In the joint graph optimization model, to make the 0/1 decision variables for hypotheses selection differentiable, differentiable functions are proposed to relax the 0/1 selections, and rounding is applied to select the final length after the optimization converges. We also prove the condition when a UIE can contribute to sparse localization. Extensive experiments show remarkably better accuracy and efficiency performances of InferLoc than the state-of-the-art network localization algorithms. In particular, it reduces the localization errors by more than (90% ) and speeds up the convergence time over 100 times than the widely used G2O-based methods in sparse networks.

基于测距的定位是物联网(IoT)和无人机(UAV)网络中的一个基本问题。然而,节点范围有限,用户覆盖目的广泛,不可避免地造成网络或子网稀疏。现有的定位算法在稀疏网络中的性能非常不理想。利用未测量边所提供的隐藏知识是处理稀疏性的关键方法,为此,本文提出了一种基于假设的联合边缘推断与定位算法,即interloc。InferLoc挖掘未测量但可推断的边缘(UIEs)。每个UIE都是一条未测量的边,但它通过网络中的其他边被限制在刚性组件内,因此它只有有限数量的可能长度。我们提出了一种有效的方法来检测uie和几何方法来推断二维和三维网络中uie的可能长度。然后将推断出的uie可能长度作为多个假设,通过联合图优化过程同时确定uie的节点位置和长度。在联合图优化模型中,为了使假设选择的0/1决策变量可微,提出了可微函数来放宽0/1选择,并采用舍入来选择优化收敛后的最终长度。我们还证明了UIE有助于稀疏定位的条件。大量实验表明,该算法的精度和效率明显优于当前最先进的网络定位算法。特别是,与稀疏网络中广泛使用的基于g20的方法相比,它将定位误差降低了(90% )以上,收敛时间加快了100倍以上。
{"title":"InferLoc: Hypothesis-based Joint Edge Inference and Localization in Sparse Sensor Networks","authors":"Xuewei Bai, Yongcai Wang, Haodi Ping, Xiaojia Xu, Deying Li, Shuo Wang","doi":"https://dl.acm.org/doi/10.1145/3608477","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3608477","url":null,"abstract":"<p>Ranging-based localization is a fundamental problem in the Internet of Things (IoT) and Unmanned Aerial Vehicles (UAV) networks. However, the nodes’ limited-ranging scope and users’ broad coverage purpose inevitably cause network sparsity or subnetwork sparsity. The performances of existing localization algorithms are extremely unsatisfactory in sparse networks. A crucial way to deal with the sparsity is to exploit the hidden knowledge provided by the unmeasured edges, which inspires this paper to propose a hypothesis-based <i>Joint Edge Inference and Localization algorithm, i.e., InferLoc</i>. InferLoc mines the Unmeasured but Inferable Edges (UIEs). Each UIE is an unmeasured edge, but it is restricted through other edges in the network to be inside a rigid component, so it has only a limited number of possible lengths. We propose an efficient method to detect UIEs and geometric approaches to infer possible lengths for UIEs in 2D and 3D networks. The inferred possible lengths of UIEs are then treated as multiple hypotheses to determine the node locations and the lengths of UIEs simultaneously through a joint graph optimization process. In the joint graph optimization model, to make the 0/1 decision variables for hypotheses selection differentiable, differentiable functions are proposed to relax the 0/1 selections, and rounding is applied to select the final length after the optimization converges. We also prove the condition when a UIE can contribute to sparse localization. Extensive experiments show remarkably better accuracy and efficiency performances of InferLoc than the state-of-the-art network localization algorithms. In particular, it reduces the localization errors by more than (90% ) and speeds up the convergence time over 100 times than the widely used G2O-based methods in sparse networks.</p>","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":"18 7","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138496484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
InferLoc: Hypothesis-based Joint Edge Inference and Localization in Sparse Sensor Networks 基于假设的稀疏传感器网络联合边缘推理与定位
IF 4.1 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-12 DOI: 10.1145/3608477
Xuewei Bai, Yongcai Wang, Haodi Ping, Xiaojia Xu, Deying Li, Shuo Wang
Ranging-based localization is a fundamental problem in the Internet of Things (IoT) and Unmanned Aerial Vehicles (UAV) networks. However, the nodes’ limited-ranging scope and users’ broad coverage purpose inevitably cause network sparsity or subnetwork sparsity. The performances of existing localization algorithms are extremely unsatisfactory in sparse networks. A crucial way to deal with the sparsity is to exploit the hidden knowledge provided by the unmeasured edges, which inspires this paper to propose a hypothesis-based Joint Edge Inference and Localization algorithm, i.e., InferLoc. InferLoc mines the Unmeasured but Inferable Edges (UIEs). Each UIE is an unmeasured edge, but it is restricted through other edges in the network to be inside a rigid component, so it has only a limited number of possible lengths. We propose an efficient method to detect UIEs and geometric approaches to infer possible lengths for UIEs in 2D and 3D networks. The inferred possible lengths of UIEs are then treated as multiple hypotheses to determine the node locations and the lengths of UIEs simultaneously through a joint graph optimization process. In the joint graph optimization model, to make the 0/1 decision variables for hypotheses selection differentiable, differentiable functions are proposed to relax the 0/1 selections, and rounding is applied to select the final length after the optimization converges. We also prove the condition when a UIE can contribute to sparse localization. Extensive experiments show remarkably better accuracy and efficiency performances of InferLoc than the state-of-the-art network localization algorithms. In particular, it reduces the localization errors by more than (90% ) and speeds up the convergence time over 100 times than the widely used G2O-based methods in sparse networks.
基于测距的定位是物联网和无人机网络中的一个基本问题。然而,节点的测距范围有限,用户覆盖目的广泛,不可避免地会导致网络稀疏或子网络稀疏。现有的定位算法在稀疏网络中的性能极不令人满意。处理稀疏性的一个关键方法是利用未测量边缘提供的隐藏知识,这启发了本文提出了一种基于假设的联合边缘推理和定位算法,即InferLoc。InferLoc挖掘未测量但可推断的边(UIE)。每个UIE都是一条未测量的边,但它通过网络中的其他边被限制在刚性组件内部,因此它只有有限的可能长度。我们提出了一种有效的方法来检测UIE,并提出了几何方法来推断2D和3D网络中UIE的可能长度。推断出的UIE的可能长度然后被视为多个假设,以通过联合图优化过程同时确定节点位置和UIE的长度。在联合图优化模型中,为了使假设选择的0/1决策变量可微,提出了可微函数来放松0/1选择,并在优化收敛后应用舍入来选择最终长度。我们还证明了UIE有助于稀疏定位的条件。大量实验表明,与最先进的网络定位算法相比,InferLoc具有更好的准确性和效率。特别是,与稀疏网络中广泛使用的基于G2O的方法相比,它将定位误差减少了90%以上,并将收敛时间加快了100倍以上。
{"title":"InferLoc: Hypothesis-based Joint Edge Inference and Localization in Sparse Sensor Networks","authors":"Xuewei Bai, Yongcai Wang, Haodi Ping, Xiaojia Xu, Deying Li, Shuo Wang","doi":"10.1145/3608477","DOIUrl":"https://doi.org/10.1145/3608477","url":null,"abstract":"Ranging-based localization is a fundamental problem in the Internet of Things (IoT) and Unmanned Aerial Vehicles (UAV) networks. However, the nodes’ limited-ranging scope and users’ broad coverage purpose inevitably cause network sparsity or subnetwork sparsity. The performances of existing localization algorithms are extremely unsatisfactory in sparse networks. A crucial way to deal with the sparsity is to exploit the hidden knowledge provided by the unmeasured edges, which inspires this paper to propose a hypothesis-based Joint Edge Inference and Localization algorithm, i.e., InferLoc. InferLoc mines the Unmeasured but Inferable Edges (UIEs). Each UIE is an unmeasured edge, but it is restricted through other edges in the network to be inside a rigid component, so it has only a limited number of possible lengths. We propose an efficient method to detect UIEs and geometric approaches to infer possible lengths for UIEs in 2D and 3D networks. The inferred possible lengths of UIEs are then treated as multiple hypotheses to determine the node locations and the lengths of UIEs simultaneously through a joint graph optimization process. In the joint graph optimization model, to make the 0/1 decision variables for hypotheses selection differentiable, differentiable functions are proposed to relax the 0/1 selections, and rounding is applied to select the final length after the optimization converges. We also prove the condition when a UIE can contribute to sparse localization. Extensive experiments show remarkably better accuracy and efficiency performances of InferLoc than the state-of-the-art network localization algorithms. In particular, it reduces the localization errors by more than (90% ) and speeds up the convergence time over 100 times than the widely used G2O-based methods in sparse networks.","PeriodicalId":50910,"journal":{"name":"ACM Transactions on Sensor Networks","volume":" ","pages":""},"PeriodicalIF":4.1,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46094730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Sensor Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1