首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters EdgeCI:边缘集群 CNN 推断的分布式工作量分配和模型划分
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-02 DOI: 10.1145/3656041
Yanming Chen, Tong Luo, Weiwei Fang, Neal N. Xiong

Deep learning technology has grown significantly in new application scenarios such as smart cities and driverless vehicles, but its deployment needs to consume a lot of resources. It is usually difficult to execute inference task solely on resource-constrained Intelligent Internet-of-Things (IoT) devices to meet strictly service delay requirements. CNN-based inference task is usually offloaded to the edge servers or cloud. However, it maybe lead to unstable performance and privacy leaks. To address the above challenges, this paper aims to design a low latency distributed inference framework, EdgeCI, which assigns inference tasks to locally idle, connected and resource-constrained IoT device cluster networks. EdgeCI exploits two key optimization knobs, including: (1) Auction-based Workload Assignment Scheme (AWAS), which achieves the workload balance by assigning each workload partition to the more matching IoT device; (2) Fused-Layer parallelization strategy based on non-recursive Dynamic Programming (DPFL), which is aimed at further minimizing the inference time. We have implemented EdgeCI based on PyTorch and evaluated its performance with VGG-16 and ResNet-34 image recognition models. The experimental results prove that our proposed AWAS and DPFL outperform the typical state-of-the-art solutions. When they are well combined, EdgeCI can improve inference speed by 34.72% to 43.52%. EdgeCI outperforms the state-of-the art approaches on the tested platform.

深度学习技术在智慧城市和无人驾驶汽车等新应用场景中得到了长足发展,但其部署需要消耗大量资源。通常,仅在资源受限的智能物联网(IoT)设备上执行推理任务很难满足严格的服务延迟要求。基于 CNN 的推理任务通常被卸载到边缘服务器或云端。然而,这可能会导致性能不稳定和隐私泄露。为应对上述挑战,本文旨在设计一种低延迟分布式推理框架 EdgeCI,将推理任务分配给本地闲置、已连接且资源受限的物联网设备集群网络。EdgeCI 利用了两个关键的优化工具,包括:(1)基于拍卖的工作量分配方案(AWAS),通过将每个工作量分区分配给更匹配的物联网设备来实现工作量平衡;(2)基于非递归动态编程(DPFL)的融合层并行化策略,旨在进一步减少推理时间。我们基于 PyTorch 实现了 EdgeCI,并利用 VGG-16 和 ResNet-34 图像识别模型对其性能进行了评估。实验结果证明,我们提出的 AWAS 和 DPFL 优于最先进的典型解决方案。如果将它们很好地结合起来,EdgeCI 可以将推理速度提高 34.72% 到 43.52%。在测试平台上,EdgeCI 的表现优于最先进的方法。
{"title":"EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters","authors":"Yanming Chen, Tong Luo, Weiwei Fang, Neal N. Xiong","doi":"10.1145/3656041","DOIUrl":"https://doi.org/10.1145/3656041","url":null,"abstract":"<p>Deep learning technology has grown significantly in new application scenarios such as smart cities and driverless vehicles, but its deployment needs to consume a lot of resources. It is usually difficult to execute inference task solely on resource-constrained Intelligent Internet-of-Things (IoT) devices to meet strictly service delay requirements. CNN-based inference task is usually offloaded to the edge servers or cloud. However, it maybe lead to unstable performance and privacy leaks. To address the above challenges, this paper aims to design a low latency distributed inference framework, EdgeCI, which assigns inference tasks to locally idle, connected and resource-constrained IoT device cluster networks. EdgeCI exploits two key optimization knobs, including: (1) Auction-based Workload Assignment Scheme (AWAS), which achieves the workload balance by assigning each workload partition to the more matching IoT device; (2) Fused-Layer parallelization strategy based on non-recursive Dynamic Programming (DPFL), which is aimed at further minimizing the inference time. We have implemented EdgeCI based on PyTorch and evaluated its performance with VGG-16 and ResNet-34 image recognition models. The experimental results prove that our proposed AWAS and DPFL outperform the typical state-of-the-art solutions. When they are well combined, EdgeCI can improve inference speed by 34.72% to 43.52%. EdgeCI outperforms the state-of-the art approaches on the tested platform.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VORTEX : Visual phishing detectiOns aRe Through EXplanations VORTEX:通过 EXplanations 进行可视化网络钓鱼检测
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-28 DOI: 10.1145/3654665
Fabien Charmet, Tomohiro Morikawa, Akira Tanaka, Takeshi Takahashi

Phishing attacks reached a record high in 2022, as reported by the Anti-Phishing Work Group [1], following an upward trend accelerated during the pandemic. Attackers employ increasingly sophisticated tools in their attempts to deceive unaware users into divulging confidential information. Recently, the research community has turned to the utilization of screenshots of legitimate and malicious websites to identify the brands that attackers aim to impersonate. In the field of Computer Vision, convolutional neural networks (CNNs) have been employed to analyze the visual rendering of websites, addressing the problem of phishing detection. However, along with the development of these new models, arose the need to understand their inner workings and the rationale behind each prediction. Answering the question, “How is this website attempting to steal the identity of a well-known brand?” becomes crucial when protecting end-users from such threats. In cybersecurity, the application of explainable AI (XAI) is an emerging approach that aims to answer such questions. In this paper, we propose VORTEX, a phishing website detection solution equipped with the capability to explain how a screenshot attempts to impersonate a specific brand. We conduct an extensive analysis of XAI methods for the phishing detection problem and demonstrate that VORTEX provides meaningful explanations regarding the detection results. Additionally, we evaluate the robustness of our model against Adversarial Example attacks. We adapt these attacks to the VORTEX architecture and evaluate their efficacy across multiple models and datasets. Our results show that VORTEX achieves superior accuracy compared to previous models, and learns semantically meaningful patterns to provide actionable explanations about phishing websites. Finally, VORTEX demonstrates an acceptable level of robustness against adversarial example attacks.

根据反钓鱼工作组的报告[1],网络钓鱼攻击在大流行病期间呈加速上升趋势,并在 2022 年创下新高。攻击者使用越来越复杂的工具,试图欺骗不知情的用户泄露机密信息。最近,研究界转而利用合法网站和恶意网站的截图来识别攻击者旨在冒充的品牌。在计算机视觉领域,卷积神经网络(CNN)被用于分析网站的视觉渲染,以解决网络钓鱼检测问题。然而,随着这些新模型的开发,人们需要了解它们的内部工作原理以及每次预测背后的原理。在保护最终用户免受此类威胁时,回答 "这个网站是如何试图窃取知名品牌的身份信息的?"这个问题变得至关重要。在网络安全领域,可解释人工智能(XAI)的应用是一种旨在回答此类问题的新兴方法。在本文中,我们提出了 VORTEX,这是一种钓鱼网站检测解决方案,具有解释截图如何试图冒充特定品牌的能力。我们针对网络钓鱼检测问题对 XAI 方法进行了广泛分析,结果表明 VORTEX 能对检测结果做出有意义的解释。此外,我们还评估了我们的模型对逆向示例攻击的鲁棒性。我们将这些攻击调整为 VORTEX 架构,并在多个模型和数据集上评估其功效。我们的结果表明,与以前的模型相比,VORTEX 实现了更高的准确性,并能学习有语义意义的模式,从而提供有关钓鱼网站的可行解释。最后,VORTEX 在对抗恶意示例攻击方面表现出了可接受的鲁棒性。
{"title":"VORTEX : Visual phishing detectiOns aRe Through EXplanations","authors":"Fabien Charmet, Tomohiro Morikawa, Akira Tanaka, Takeshi Takahashi","doi":"10.1145/3654665","DOIUrl":"https://doi.org/10.1145/3654665","url":null,"abstract":"<p>Phishing attacks reached a record high in 2022, as reported by the Anti-Phishing Work Group [1], following an upward trend accelerated during the pandemic. Attackers employ increasingly sophisticated tools in their attempts to deceive unaware users into divulging confidential information. Recently, the research community has turned to the utilization of screenshots of legitimate and malicious websites to identify the brands that attackers aim to impersonate. In the field of Computer Vision, convolutional neural networks (CNNs) have been employed to analyze the visual rendering of websites, addressing the problem of phishing detection. However, along with the development of these new models, arose the need to understand their inner workings and the rationale behind each prediction. Answering the question, “How is this website attempting to steal the identity of a well-known brand?” becomes crucial when protecting end-users from such threats. In cybersecurity, the application of explainable AI (XAI) is an emerging approach that aims to answer such questions. In this paper, we propose VORTEX, a phishing website detection solution equipped with the capability to explain how a screenshot attempts to impersonate a specific brand. We conduct an extensive analysis of XAI methods for the phishing detection problem and demonstrate that VORTEX provides meaningful explanations regarding the detection results. Additionally, we evaluate the robustness of our model against Adversarial Example attacks. We adapt these attacks to the VORTEX architecture and evaluate their efficacy across multiple models and datasets. Our results show that VORTEX achieves superior accuracy compared to previous models, and learns semantically meaningful patterns to provide actionable explanations about phishing websites. Finally, VORTEX demonstrates an acceptable level of robustness against adversarial example attacks.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140325162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Think Transformer for Enhancing Emotional Health 增强情感健康的多元思维转换器
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-18 DOI: 10.1145/3652512
Jiarong Wang, Jiaji Wu, Shaohong Chen, Xiangyu Han, Mingzhou Tan, Jianguo Yu

The smart healthcare system not only focuses on physical health but also on emotional health. Music therapy, as a non-pharmacological treatment method, has been widely used in clinical treatment, but music selection and generation still require manual intervention. AI music generation technology can assist people in relieving stress and providing more personalized and efficient music therapy support. However, existing AI music generation highly relies on the note generated at the current time to produce the note at the next time. This will lead to disharmonious results. The first reason is the small errors being ignored at the current generated note. This error will accumulate and spread continuously, and finally make the music become random. To solve this problem, we propose a music selection module to filter the errors of generated note. The multi-think mechanism is proposed to filter the result multiple times, so that the generated note is as accurate as possible, eliminating the impact of the results on the next generation process. The second reason is that the results of multiple generation of each music clip are not the same or even do not follow the same music rules. Therefore, in the inference phase, a voting mechanism is proposed in this paper to select the note that follow the music rules that most experimental results follow as the final result. The subjective and objective evaluations demonstrate the superiority of our proposed model in generation of more smooth music that conforms to music rules. This model provides strong support for clinical music therapy, and provides new ideas for the research and practice of emotional health therapy based on the Internet of Things.

智能医疗系统不仅关注身体健康,也关注情感健康。音乐疗法作为一种非药物治疗方法,已广泛应用于临床治疗,但音乐的选择和生成仍需要人工干预。人工智能音乐生成技术可以帮助人们缓解压力,提供更加个性化和高效的音乐治疗支持。然而,现有的人工智能音乐生成技术高度依赖于当前生成的音符来生成下一次的音符。这将导致不和谐的结果。第一个原因是当前生成的音符会忽略一些小错误。这种误差会不断累积和扩散,最终使音乐变得随机。为了解决这个问题,我们提出了一个音乐选择模块来过滤生成音符的错误。我们提出了多重思考机制,对结果进行多次过滤,使生成的音符尽可能准确,消除了结果对下一次生成过程的影响。第二个原因是,每个音乐片段多次生成的结果并不相同,甚至不遵循相同的音乐规则。因此,在推理阶段,本文提出了一种投票机制,选择大多数实验结果遵循音乐规则的音符作为最终结果。主观和客观评估结果表明,我们提出的模型在生成符合音乐规则的更流畅的音乐方面具有优越性。该模型为临床音乐治疗提供了有力支持,也为基于物联网的情绪健康治疗研究与实践提供了新思路。
{"title":"Multi-Think Transformer for Enhancing Emotional Health","authors":"Jiarong Wang, Jiaji Wu, Shaohong Chen, Xiangyu Han, Mingzhou Tan, Jianguo Yu","doi":"10.1145/3652512","DOIUrl":"https://doi.org/10.1145/3652512","url":null,"abstract":"<p>The smart healthcare system not only focuses on physical health but also on emotional health. Music therapy, as a non-pharmacological treatment method, has been widely used in clinical treatment, but music selection and generation still require manual intervention. AI music generation technology can assist people in relieving stress and providing more personalized and efficient music therapy support. However, existing AI music generation highly relies on the note generated at the current time to produce the note at the next time. This will lead to disharmonious results. The first reason is the small errors being ignored at the current generated note. This error will accumulate and spread continuously, and finally make the music become random. To solve this problem, we propose a music selection module to filter the errors of generated note. The multi-think mechanism is proposed to filter the result multiple times, so that the generated note is as accurate as possible, eliminating the impact of the results on the next generation process. The second reason is that the results of multiple generation of each music clip are not the same or even do not follow the same music rules. Therefore, in the inference phase, a voting mechanism is proposed in this paper to select the note that follow the music rules that most experimental results follow as the final result. The subjective and objective evaluations demonstrate the superiority of our proposed model in generation of more smooth music that conforms to music rules. This model provides strong support for clinical music therapy, and provides new ideas for the research and practice of emotional health therapy based on the Internet of Things.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Computation Offloading and Power Control for UAV-Enabled Internet of Medical Things 无人机医疗物联网的分布式计算卸载和功率控制
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-16 DOI: 10.1145/3652513
Jiakun Gao, Xiaolong Xu, Lianyong Qi, Wanchun Dou, Xiaoyu Xia, Xiaokang Zhou

The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT services, Mobile Edge Computing (MEC) has emerged as an indispensable technology in smart health. Benefiting from the cost-effectiveness of deployment, unmanned aerial vehicles (UAVs) equipped with MEC servers in Non-Orthogonal Multiple Access (NOMA) have emerged as a promising solution for providing smart health services in proximity to medical devices (MDs). However, the escalating number of MDs and the limited availability of communication resources of UAVs give rise to a significant increase in transmission latency. Moreover, due to the limited communication range of UAVs, the geographically-distributed MDs lead to workload imbalance of UAVs, which deteriorates the service response delay. To this end, this paper proposes a UAV-enabled Distributed computation Offloading and Power control method with Multi-Agent, named DOPMA, for NOMA-based IoMT environment. Specifically, this paper introduces computation and transmission queue models to analyze the dynamic characteristics of task execution latency and energy consumption. Moreover, a credit assignment scheme-based reward function is designed considering both system-level rewards and rewards tailored to each MD, and an improved multi-agent deep deterministic policy gradient algorithm is developed to derive offloading and power control decisions independently. Extensive simulations demonstrate that the proposed method outperforms existing schemes, achieving (7.1% ) reduction in energy consumption and (16% ) decrease in average delay.

医疗物联网(IoMT)的发展带动了各种健康和情感护理服务(如健康监测)的出现。为了满足 IoMT 服务日益增长的计算需求,移动边缘计算(MEC)已成为智能健康领域不可或缺的技术。由于部署成本效益高,配备了非正交多址(NOMA)MEC 服务器的无人机(UAV)已成为在医疗设备(MD)附近提供智能医疗服务的一种前景广阔的解决方案。然而,MD 数量的不断增加和无人机通信资源的有限性导致传输延迟显著增加。此外,由于无人机的通信范围有限,地理分布不均的 MD 会导致无人机的工作量失衡,从而恶化服务响应延迟。为此,本文针对基于 NOMA 的 IoMT 环境,提出了一种具有多代理功能的无人机分布式计算卸载和功率控制方法,命名为 DOPMA。具体而言,本文引入了计算和传输队列模型,以分析任务执行延迟和能耗的动态特性。此外,考虑到系统级奖励和为每个 MD 量身定制的奖励,设计了基于信用分配方案的奖励函数,并开发了改进的多代理深度确定性策略梯度算法,以独立得出卸载和功率控制决策。大量仿真表明,所提出的方法优于现有方案,实现了能耗的降低和平均时延的减少。
{"title":"Distributed Computation Offloading and Power Control for UAV-Enabled Internet of Medical Things","authors":"Jiakun Gao, Xiaolong Xu, Lianyong Qi, Wanchun Dou, Xiaoyu Xia, Xiaokang Zhou","doi":"10.1145/3652513","DOIUrl":"https://doi.org/10.1145/3652513","url":null,"abstract":"<p>The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT services, Mobile Edge Computing (MEC) has emerged as an indispensable technology in smart health. Benefiting from the cost-effectiveness of deployment, unmanned aerial vehicles (UAVs) equipped with MEC servers in Non-Orthogonal Multiple Access (NOMA) have emerged as a promising solution for providing smart health services in proximity to medical devices (MDs). However, the escalating number of MDs and the limited availability of communication resources of UAVs give rise to a significant increase in transmission latency. Moreover, due to the limited communication range of UAVs, the geographically-distributed MDs lead to workload imbalance of UAVs, which deteriorates the service response delay. To this end, this paper proposes a UAV-enabled Distributed computation Offloading and Power control method with Multi-Agent, named DOPMA, for NOMA-based IoMT environment. Specifically, this paper introduces computation and transmission queue models to analyze the dynamic characteristics of task execution latency and energy consumption. Moreover, a credit assignment scheme-based reward function is designed considering both system-level rewards and rewards tailored to each MD, and an improved multi-agent deep deterministic policy gradient algorithm is developed to derive offloading and power control decisions independently. Extensive simulations demonstrate that the proposed method outperforms existing schemes, achieving (7.1% ) reduction in energy consumption and (16% ) decrease in average delay.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audio-Visual Event Localization using Multi-task Hybrid Attention Networks for Smart Healthcare Systems 利用多任务混合注意力网络为智能医疗系统提供视听事件定位功能
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-03-16 DOI: 10.1145/3653018
Han Liang, Jincai Chen, Fazlullah Khan, Gautam Srivastava, Jiangfeng Zeng

Human perception heavily relies on two primary senses: vision and hearing, which are closely inter-connected and capable of complementing each other. Consequently, various multimodal learning tasks have emerged, with audio-visual event localization (AVEL) being a prominent example. AVEL is a popular task within the realm of multimodal learning, with the primary objective of identifying the presence of events within each video segment and predicting their respective categories. This task holds significant utility in domains such as healthcare monitoring and surveillance, among others. Generally speaking, audio-visual co-learning offers a more comprehensive information landscape compared to single-modal learning, as it allows for a more holistic perception of ambient information, aligning with real-world applications. Nevertheless, the inherent heterogeneity of audio and visual data can introduce challenges related to event semantics inconsistency, potentially leading to incorrect predictions. To track these challenges, we propose a multi-task hybrid attention network (MHAN) to acquire high-quality representation for multimodal data. Specifically, our network incorporates hybrid attention of uni- and parallel cross-modal (HAUC) modules, which consists of a uni-modal attention block and a parallel cross-modal attention block, leveraging multimodal complementary and hidden information for better representation. Furthermore, we advocate for the use of a uni-modal visual task as auxiliary supervision to enhance the performance of multimodal tasks employing a multi-task learning strategy. Our proposed model has been proven to outperform the state-of-the-art results based on extensive experiments conducted on the AVE dataset.

人类的感知在很大程度上依赖于两种主要感官:视觉和听觉,这两种感官紧密相连,能够相互补充。因此,出现了各种多模态学习任务,视听事件定位(AVEL)就是一个突出的例子。视听事件定位(AVEL)是多模态学习领域的一项热门任务,其主要目标是识别每个视频片段中是否存在事件,并预测其各自的类别。这项任务在医疗监控和监视等领域具有重要作用。一般来说,与单一模式学习相比,视听协同学习能提供更全面的信息,因为它能更全面地感知环境信息,符合现实世界的应用。然而,音频和视频数据固有的异质性可能会带来与事件语义不一致相关的挑战,从而可能导致不正确的预测。为了应对这些挑战,我们提出了一种多任务混合注意力网络(MHAN),以获得多模态数据的高质量表示。具体来说,我们的网络结合了单模态和并行跨模态混合注意力(HAUC)模块,由一个单模态注意力区块和一个并行跨模态注意力区块组成,利用多模态互补和隐藏信息获得更好的表征。此外,我们还主张使用单模态视觉任务作为辅助监督,以提高采用多任务学习策略的多模态任务的性能。在 AVE 数据集上进行的大量实验证明,我们提出的模型优于最先进的结果。
{"title":"Audio-Visual Event Localization using Multi-task Hybrid Attention Networks for Smart Healthcare Systems","authors":"Han Liang, Jincai Chen, Fazlullah Khan, Gautam Srivastava, Jiangfeng Zeng","doi":"10.1145/3653018","DOIUrl":"https://doi.org/10.1145/3653018","url":null,"abstract":"<p>Human perception heavily relies on two primary senses: vision and hearing, which are closely inter-connected and capable of complementing each other. Consequently, various multimodal learning tasks have emerged, with audio-visual event localization (AVEL) being a prominent example. AVEL is a popular task within the realm of multimodal learning, with the primary objective of identifying the presence of events within each video segment and predicting their respective categories. This task holds significant utility in domains such as healthcare monitoring and surveillance, among others. Generally speaking, audio-visual co-learning offers a more comprehensive information landscape compared to single-modal learning, as it allows for a more holistic perception of ambient information, aligning with real-world applications. Nevertheless, the inherent heterogeneity of audio and visual data can introduce challenges related to event semantics inconsistency, potentially leading to incorrect predictions. To track these challenges, we propose a multi-task hybrid attention network (MHAN) to acquire high-quality representation for multimodal data. Specifically, our network incorporates hybrid attention of uni- and parallel cross-modal (HAUC) modules, which consists of a uni-modal attention block and a parallel cross-modal attention block, leveraging multimodal complementary and hidden information for better representation. Furthermore, we advocate for the use of a uni-modal visual task as auxiliary supervision to enhance the performance of multimodal tasks employing a multi-task learning strategy. Our proposed model has been proven to outperform the state-of-the-art results based on extensive experiments conducted on the AVE dataset.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Market manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data 加密货币的市场操纵:来自社交媒体和交易数据的证据
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-30 DOI: 10.1145/3643812
Li Wen, Lingfeng Bao, Jiachi Chen, John Grundy, Xin Xia, Xiaohu Yang

The cryptocurrency market cap experienced a great increase in recent years. However, large price fluctuations demonstrate the need for governance structures and identify whether there are market manipulations. In this paper, we conducted three analyses – social media data analysis, blockchain data analysis, and price bubble analysis – to investigate whether market manipulation exists on Bitcoin, Ethereum, and Dogecoin platforms. Social media data analysis aims to find the reasons for the price fluctuations. Blockchain data analysis is used to find the detailed behavior of the manipulators. Price bubble analysis is used to investigate the relation between price fluctuation and manipulators’ behavior. By using the three analyses, we show that market manipulation exists on Bitcoin, Ethereum and Dogecoin. However, market manipulation of Bitcoin is limited, and for most of Bitcoin’s price fluctuations, we found other explanations. The price for Ethereum is most sensitive to technical updates. Technical companies/teams usually hype some new concepts, e.g., ICO, DeFi, which causes a price spike. The price of Dogecoin has a high correlation with Elon Musk’s Twitter activity, which shows influential individuals have the ability to manipulate its prices. Also, the poor monetary liquidity of Dogecoin allows some users to manipulate its price.

近年来,加密货币的市值经历了大幅增长。然而,价格的大幅波动表明需要建立治理结构,并识别是否存在市场操纵行为。在本文中,我们通过社交媒体数据分析、区块链数据分析和价格泡沫分析这三种分析方法来研究比特币、以太坊和 Dogecoin 平台是否存在市场操纵行为。社交媒体数据分析旨在找出价格波动的原因。区块链数据分析用于发现操纵者的详细行为。价格泡沫分析用于研究价格波动与操纵者行为之间的关系。通过这三种分析,我们发现比特币、以太坊和 Dogecoin 都存在市场操纵行为。然而,对比特币的市场操纵是有限的,对于比特币的大部分价格波动,我们找到了其他解释。以太坊的价格对技术更新最为敏感。技术公司/团队通常会炒作一些新概念,如 ICO、DeFi,从而导致价格飙升。Dogecoin 的价格与 Elon Musk 的 Twitter 活动高度相关,这表明有影响力的个人有能力操纵其价格。此外,由于 Dogecoin 的货币流动性较差,一些用户可以操纵其价格。
{"title":"Market manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data","authors":"Li Wen, Lingfeng Bao, Jiachi Chen, John Grundy, Xin Xia, Xiaohu Yang","doi":"10.1145/3643812","DOIUrl":"https://doi.org/10.1145/3643812","url":null,"abstract":"<p>The cryptocurrency market cap experienced a great increase in recent years. However, large price fluctuations demonstrate the need for governance structures and identify whether there are market manipulations. In this paper, we conducted three analyses – social media data analysis, blockchain data analysis, and price bubble analysis – to investigate whether market manipulation exists on Bitcoin, Ethereum, and Dogecoin platforms. Social media data analysis aims to find the reasons for the price fluctuations. Blockchain data analysis is used to find the detailed behavior of the manipulators. Price bubble analysis is used to investigate the relation between price fluctuation and manipulators’ behavior. By using the three analyses, we show that market manipulation exists on Bitcoin, Ethereum and Dogecoin. However, market manipulation of Bitcoin is limited, and for most of Bitcoin’s price fluctuations, we found other explanations. The price for Ethereum is most sensitive to technical updates. Technical companies/teams usually hype some new concepts, e.g., ICO, DeFi, which causes a price spike. The price of Dogecoin has a high correlation with Elon Musk’s Twitter activity, which shows influential individuals have the ability to manipulate its prices. Also, the poor monetary liquidity of Dogecoin allows some users to manipulate its price.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139648306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-assisted Blockchain-enabled Smart and Secure E-prescription Management Framework 人工智能辅助区块链智能安全电子处方管理框架
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-23 DOI: 10.1145/3641279
Siva Sai, Vinay Chamola

Traditional medical prescriptions based on physical paper-based documents are prone to manipulation, errors, and unauthorized reproduction due to their format. Addressing the limitations of the traditional prescription system, e-prescription systems have been introduced in several countries. However, e-prescription systems lead to several concerns like the risk of privacy loss, the problem of double-spending prescriptions, lack of interoperability, and single point of failure, all of which need to be addressed immediately. We propose an AI-assisted blockchain-enabled smart and secure e-prescription management framework to address these issues. Our proposed system overcomes the problems of the centralized e-prescription systems and enables efficient consent management to access prescriptions by incorporating blockchain-based smart contracts. Our work incorporates the Umbral proxy re-encryption scheme in the proposed system, avoiding the need for repeated encryption and decryption of the prescriptions when transferred between different entities in the network. In our work, we employ two different machine learning models(Random Forest classifier and LightGBM classifier) to assist the doctor in prescribing medicines. One is a drug recommendation model, which is aimed at providing drug recommendations considering the medical history of the patients and the general prescription pattern for the particular ailment of the patient. We have fine-tuned the SciBERT model for adverse drug reaction detection. The extensive experimentation and results show that the proposed e-prescription framework is secure, scalable, and interoperable. Further, the proposed machine learning models produce results higher than 95%.

传统的医疗处方以实体纸质文件为基础,由于其格式问题,容易出现篡改、错误和未经授权的复制。针对传统处方系统的局限性,一些国家引入了电子处方系统。然而,电子处方系统会导致一些问题,如隐私泄露的风险、重复花费处方的问题、缺乏互操作性以及单点故障,所有这些问题都需要立即解决。为了解决这些问题,我们提出了一个人工智能辅助的区块链智能安全电子处方管理框架。我们提出的系统克服了集中式电子处方系统存在的问题,并通过结合基于区块链的智能合约,实现了高效的同意管理,以获取处方。我们的工作将 Umbral 代理重加密方案纳入了拟议系统,避免了在网络中不同实体之间传输处方时重复加密和解密的需要。在我们的工作中,我们采用了两种不同的机器学习模型(随机森林分类器和 LightGBM 分类器)来协助医生开药。其中一个是药物推荐模型,旨在根据患者的病史和针对患者特定疾病的一般处方模式提供药物推荐。我们对用于药物不良反应检测的 SciBERT 模型进行了微调。大量实验和结果表明,建议的电子处方框架是安全、可扩展和可互操作的。此外,所提出的机器学习模型的结果高于 95%。
{"title":"AI-assisted Blockchain-enabled Smart and Secure E-prescription Management Framework","authors":"Siva Sai, Vinay Chamola","doi":"10.1145/3641279","DOIUrl":"https://doi.org/10.1145/3641279","url":null,"abstract":"<p>Traditional medical prescriptions based on physical paper-based documents are prone to manipulation, errors, and unauthorized reproduction due to their format. Addressing the limitations of the traditional prescription system, e-prescription systems have been introduced in several countries. However, e-prescription systems lead to several concerns like the risk of privacy loss, the problem of double-spending prescriptions, lack of interoperability, and single point of failure, all of which need to be addressed immediately. We propose an AI-assisted blockchain-enabled smart and secure e-prescription management framework to address these issues. Our proposed system overcomes the problems of the centralized e-prescription systems and enables efficient consent management to access prescriptions by incorporating blockchain-based smart contracts. Our work incorporates the Umbral proxy re-encryption scheme in the proposed system, avoiding the need for repeated encryption and decryption of the prescriptions when transferred between different entities in the network. In our work, we employ two different machine learning models(Random Forest classifier and LightGBM classifier) to assist the doctor in prescribing medicines. One is a drug recommendation model, which is aimed at providing drug recommendations considering the medical history of the patients and the general prescription pattern for the particular ailment of the patient. We have fine-tuned the SciBERT model for adverse drug reaction detection. The extensive experimentation and results show that the proposed e-prescription framework is secure, scalable, and interoperable. Further, the proposed machine learning models produce results higher than 95%.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion 用于智能交通灯控制器的 SDN 量化 LQR 可优化拥堵状况
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-16 DOI: 10.1145/3641104
Anuj Sachan, Neetesh Kumar

Existing intersection management systems, in urban cities, lack in meeting the current requirements of self-configuration, lightweight computing, and software-defined control, which are necessarily required for congested road-lane networks. To satisfy these requirements, this work proposes effective, scalable, multi-input and multi-output, and congestion prevention enabled intersection management system utilizing a software-defined control interface that not only regularly monitors the traffic to prevent congestion for minimizing queue length and waiting time, it also offers a computationally efficient solution in real-time. For effective intersection management, a modified linear-quadratic regulator, i.e., Quantized Linear Quadratic Regulator (QLQR), is designed along with Software-Defined Networking (SDN) enabled control interface to maximize throughput and vehicles speed and minimize queue length and waiting time at the intersection. Experimental results prove that the proposed SDN-QLQR improves the comparative performance in the interval of 24.94% – 49.07%, 35.78% – 68.86%, 36.67% – 59.08%, and 29.94% – 57.87% for various performance metrics, i.e., average queue length, average waiting time, throughput, and average speed respectively.

城市中现有的交叉口管理系统无法满足当前对自配置、轻量级计算和软件定义控制的要求,而这正是拥堵的道路车道网络所必须的。为满足这些要求,本研究提出了有效、可扩展、多输入和多输出、可预防拥堵的交叉口管理系统,该系统利用软件定义的控制界面,不仅能定期监控交通,预防拥堵,从而最大限度地减少排队长度和等待时间,还能实时提供计算效率高的解决方案。为实现有效的交叉路口管理,设计了一种改进的线性二次调节器,即量化线性二次调节器(QLQR),并配备了软件定义网络(SDN)控制界面,以最大限度地提高吞吐量和车速,并最大限度地减少交叉路口的队列长度和等待时间。实验结果证明,就平均队列长度、平均等待时间、吞吐量和平均速度等各种性能指标而言,所提出的 SDN-QLQR 可分别在 24.94% - 49.07%、35.78% - 68.86%、36.67% - 59.08% 和 29.94% - 57.87% 的区间内提高比较性能。
{"title":"SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion","authors":"Anuj Sachan, Neetesh Kumar","doi":"10.1145/3641104","DOIUrl":"https://doi.org/10.1145/3641104","url":null,"abstract":"<p>Existing intersection management systems, in urban cities, lack in meeting the current requirements of self-configuration, lightweight computing, and software-defined control, which are necessarily required for congested road-lane networks. To satisfy these requirements, this work proposes effective, scalable, multi-input and multi-output, and congestion prevention enabled intersection management system utilizing a software-defined control interface that not only regularly monitors the traffic to prevent congestion for minimizing queue length and waiting time, it also offers a computationally efficient solution in real-time. For effective intersection management, a modified linear-quadratic regulator, i.e., Quantized Linear Quadratic Regulator (QLQR), is designed along with Software-Defined Networking (SDN) enabled control interface to maximize throughput and vehicles speed and minimize queue length and waiting time at the intersection. Experimental results prove that the proposed SDN-QLQR improves the comparative performance in the interval of 24.94% – 49.07%, 35.78% – 68.86%, 36.67% – 59.08%, and 29.94% – 57.87% for various performance metrics, i.e., average queue length, average waiting time, throughput, and average speed respectively.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139474811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADTO: A Trust Active Detecting based Task Offloading Scheme in Edge Computing for Internet of Things ADTO:物联网边缘计算中基于信任主动检测的任务卸载方案
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-12 DOI: 10.1145/3640013
Xuezheng Yang, Zhiwen Zeng, Anfeng Liu, Neal N. Xiong, Shaobo Zhang

In edge computing, Internet of Things (IoT) devices with weak computing power offload tasks to nearby edge servers for execution, so the task completion time can be reduced and delay sensitive tasks can be facilitated. However, if the task is offloaded to malicious edge servers, the system will suffer losses. Therefore, it is significant to identify the trusted edge servers and offload tasks to trusted edge servers, which can improve the performance of edge computing. However, it is still challenging. In this paper, a trust Active Detecting based Task Offloading (ADTO) scheme is proposed to maximize revenue in edge computing. The main innovation points of our work are as follows: (a) The ADTO scheme innovatively proposes a method to actively get trust by trust detection. This method offloads microtasks to edge servers whose trust needs to be identified, and then quickly identifies the trust of edge servers according to the completion of tasks by edge servers. Based on the identification of the trust, tasks can be offloaded to trusted edge servers, so as to improve the success rate of tasks. (b) Although the trust of edge servers can be identified by our detection, it needs to pay a price. Therefore, to maximize system revenue, searching the most suitable number of trusted edge servers for various conditions is transformed into an optimization problem. Finally, theoretical and experimental analysis shows the effectiveness of the proposed strategy, which can effectively identify the trusted and untrusted edge servers. The task offloading strategy based on trust detection proposed in this paper greatly improves the success rate of tasks, compared with the strategy without trust detection, the task success rate is increased by 40.27%, and there is a significant increase in revenue, which fully demonstrates the effectiveness of the strategy.

在边缘计算中,计算能力较弱的物联网(IoT)设备会将任务卸载到附近的边缘服务器执行,从而缩短任务完成时间,并为延迟敏感任务提供便利。但是,如果任务被卸载到恶意的边缘服务器上,系统就会遭受损失。因此,识别可信的边缘服务器并将任务卸载到可信的边缘服务器上意义重大,这可以提高边缘计算的性能。然而,这仍然具有挑战性。本文提出了一种基于信任主动检测的任务卸载(ADTO)方案,以最大限度地提高边缘计算的收益。我们工作的主要创新点如下:(a) ADTO 方案创新性地提出了一种通过信任检测主动获取信任的方法。该方法将需要识别信任度的微任务卸载给边缘服务器,然后根据边缘服务器完成任务的情况快速识别边缘服务器的信任度。在信任度识别的基础上,可将任务卸载到受信任的边缘服务器上,从而提高任务的成功率。(b) 虽然我们的检测可以识别边缘服务器的信任度,但它需要付出代价。因此,为了使系统收益最大化,寻找各种条件下最合适的受信任边缘服务器数量就变成了一个优化问题。最后,理论和实验分析表明了所提策略的有效性,它能有效识别可信和不可信的边缘服务器。本文提出的基于信任检测的任务卸载策略大大提高了任务的成功率,与没有信任检测的策略相比,任务成功率提高了 40.27%,收入也有显著增加,充分说明了该策略的有效性。
{"title":"ADTO: A Trust Active Detecting based Task Offloading Scheme in Edge Computing for Internet of Things","authors":"Xuezheng Yang, Zhiwen Zeng, Anfeng Liu, Neal N. Xiong, Shaobo Zhang","doi":"10.1145/3640013","DOIUrl":"https://doi.org/10.1145/3640013","url":null,"abstract":"<p>In edge computing, Internet of Things (IoT) devices with weak computing power offload tasks to nearby edge servers for execution, so the task completion time can be reduced and delay sensitive tasks can be facilitated. However, if the task is offloaded to malicious edge servers, the system will suffer losses. Therefore, it is significant to identify the trusted edge servers and offload tasks to trusted edge servers, which can improve the performance of edge computing. However, it is still challenging. In this paper, a trust Active Detecting based Task Offloading (ADTO) scheme is proposed to maximize revenue in edge computing. The main innovation points of our work are as follows: (a) The ADTO scheme innovatively proposes a method to actively get trust by trust detection. This method offloads microtasks to edge servers whose trust needs to be identified, and then quickly identifies the trust of edge servers according to the completion of tasks by edge servers. Based on the identification of the trust, tasks can be offloaded to trusted edge servers, so as to improve the success rate of tasks. (b) Although the trust of edge servers can be identified by our detection, it needs to pay a price. Therefore, to maximize system revenue, searching the most suitable number of trusted edge servers for various conditions is transformed into an optimization problem. Finally, theoretical and experimental analysis shows the effectiveness of the proposed strategy, which can effectively identify the trusted and untrusted edge servers. The task offloading strategy based on trust detection proposed in this paper greatly improves the success rate of tasks, compared with the strategy without trust detection, the task success rate is increased by 40.27%, and there is a significant increase in revenue, which fully demonstrates the effectiveness of the strategy.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139461497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network 从无线人体传感器网络的压缩心电图测量结果中检测心房颤动
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-10 DOI: 10.1145/3637440
Yongyong Chen, Junxin Chen, Shuang Sun, Jingyong Su, Qiankun Li, Zhihan Lyu

Recent years have witnessed an increasing prevalence of wearable devices in the public, where atrial fibrillation (AF) detection is a popular application in these devices. Generally, AF detection is performed on cloud whereas this paper describes an on-device AF detection method. Technically, compressed sensing (CS) is first used for electrocardiograph (ECG) acquisition. Then QRS detection is proposed to be performed directly on the compressed CS measurements, rather than on the reconstructed signals on the powerful cloud server. Based on the extracted QRS information, AF is determined by quantitatively analyzing the (RR, dRR) plot. Databases with ECG samples collected from both medical-level (MIT-BIH afdb) and wearable ECG devices (Physionet Challenge 2017) are introduced for performance validation. The experiment results well demonstrate that our on-device AF detection algorithm can approach the performance of those implemented on the raw signals. Our proposal is suitable for AF screening directly on the wearable devices, without the support of the data center for signal reconstruction and intelligent analysis.

近年来,可穿戴设备在公众中日益普及,心房颤动(AF)检测是这些设备中的热门应用。一般来说,房颤检测是在云端进行的,而本文介绍的是一种设备上的房颤检测方法。在技术上,压缩传感(CS)首先用于心电图(ECG)采集。然后,建议直接在压缩的 CS 测量值上进行 QRS 检测,而不是在功能强大的云服务器上对重建信号进行检测。根据提取的 QRS 信息,通过定量分析(RR、dRR)图确定房颤。为进行性能验证,引入了从医疗级(MIT-BIH afdb)和可穿戴心电图设备(Physionet Challenge 2017)收集的心电图样本数据库。实验结果很好地证明了我们的设备房颤检测算法可以接近在原始信号上实现的算法的性能。我们的建议适用于直接在可穿戴设备上进行房颤筛查,无需数据中心支持信号重建和智能分析。
{"title":"Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network","authors":"Yongyong Chen, Junxin Chen, Shuang Sun, Jingyong Su, Qiankun Li, Zhihan Lyu","doi":"10.1145/3637440","DOIUrl":"https://doi.org/10.1145/3637440","url":null,"abstract":"<p>Recent years have witnessed an increasing prevalence of wearable devices in the public, where atrial fibrillation (AF) detection is a popular application in these devices. Generally, AF detection is performed on cloud whereas this paper describes an on-device AF detection method. Technically, compressed sensing (CS) is first used for electrocardiograph (ECG) acquisition. Then QRS detection is proposed to be performed directly on the compressed CS measurements, rather than on the reconstructed signals on the powerful cloud server. Based on the extracted QRS information, AF is determined by quantitatively analyzing the (<i>RR</i>, <i>dRR</i>) plot. Databases with ECG samples collected from both medical-level (MIT-BIH afdb) and wearable ECG devices (Physionet Challenge 2017) are introduced for performance validation. The experiment results well demonstrate that our on-device AF detection algorithm can approach the performance of those implemented on the raw signals. Our proposal is suitable for AF screening directly on the wearable devices, without the support of the data center for signal reconstruction and intelligent analysis.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139413496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1