首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
Distributed Computation Offloading and Power Control for UAV-Enabled Internet of Medical Things 无人机医疗物联网的分布式计算卸载和功率控制
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-16 DOI: 10.1145/3652513
Jiakun Gao, Xiaolong Xu, Lianyong Qi, Wanchun Dou, Xiaoyu Xia, Xiaokang Zhou

The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT services, Mobile Edge Computing (MEC) has emerged as an indispensable technology in smart health. Benefiting from the cost-effectiveness of deployment, unmanned aerial vehicles (UAVs) equipped with MEC servers in Non-Orthogonal Multiple Access (NOMA) have emerged as a promising solution for providing smart health services in proximity to medical devices (MDs). However, the escalating number of MDs and the limited availability of communication resources of UAVs give rise to a significant increase in transmission latency. Moreover, due to the limited communication range of UAVs, the geographically-distributed MDs lead to workload imbalance of UAVs, which deteriorates the service response delay. To this end, this paper proposes a UAV-enabled Distributed computation Offloading and Power control method with Multi-Agent, named DOPMA, for NOMA-based IoMT environment. Specifically, this paper introduces computation and transmission queue models to analyze the dynamic characteristics of task execution latency and energy consumption. Moreover, a credit assignment scheme-based reward function is designed considering both system-level rewards and rewards tailored to each MD, and an improved multi-agent deep deterministic policy gradient algorithm is developed to derive offloading and power control decisions independently. Extensive simulations demonstrate that the proposed method outperforms existing schemes, achieving (7.1% ) reduction in energy consumption and (16% ) decrease in average delay.

医疗物联网(IoMT)的发展带动了各种健康和情感护理服务(如健康监测)的出现。为了满足 IoMT 服务日益增长的计算需求,移动边缘计算(MEC)已成为智能健康领域不可或缺的技术。由于部署成本效益高,配备了非正交多址(NOMA)MEC 服务器的无人机(UAV)已成为在医疗设备(MD)附近提供智能医疗服务的一种前景广阔的解决方案。然而,MD 数量的不断增加和无人机通信资源的有限性导致传输延迟显著增加。此外,由于无人机的通信范围有限,地理分布不均的 MD 会导致无人机的工作量失衡,从而恶化服务响应延迟。为此,本文针对基于 NOMA 的 IoMT 环境,提出了一种具有多代理功能的无人机分布式计算卸载和功率控制方法,命名为 DOPMA。具体而言,本文引入了计算和传输队列模型,以分析任务执行延迟和能耗的动态特性。此外,考虑到系统级奖励和为每个 MD 量身定制的奖励,设计了基于信用分配方案的奖励函数,并开发了改进的多代理深度确定性策略梯度算法,以独立得出卸载和功率控制决策。大量仿真表明,所提出的方法优于现有方案,实现了能耗的降低和平均时延的减少。
{"title":"Distributed Computation Offloading and Power Control for UAV-Enabled Internet of Medical Things","authors":"Jiakun Gao, Xiaolong Xu, Lianyong Qi, Wanchun Dou, Xiaoyu Xia, Xiaokang Zhou","doi":"10.1145/3652513","DOIUrl":"https://doi.org/10.1145/3652513","url":null,"abstract":"<p>The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT services, Mobile Edge Computing (MEC) has emerged as an indispensable technology in smart health. Benefiting from the cost-effectiveness of deployment, unmanned aerial vehicles (UAVs) equipped with MEC servers in Non-Orthogonal Multiple Access (NOMA) have emerged as a promising solution for providing smart health services in proximity to medical devices (MDs). However, the escalating number of MDs and the limited availability of communication resources of UAVs give rise to a significant increase in transmission latency. Moreover, due to the limited communication range of UAVs, the geographically-distributed MDs lead to workload imbalance of UAVs, which deteriorates the service response delay. To this end, this paper proposes a UAV-enabled Distributed computation Offloading and Power control method with Multi-Agent, named DOPMA, for NOMA-based IoMT environment. Specifically, this paper introduces computation and transmission queue models to analyze the dynamic characteristics of task execution latency and energy consumption. Moreover, a credit assignment scheme-based reward function is designed considering both system-level rewards and rewards tailored to each MD, and an improved multi-agent deep deterministic policy gradient algorithm is developed to derive offloading and power control decisions independently. Extensive simulations demonstrate that the proposed method outperforms existing schemes, achieving (7.1% ) reduction in energy consumption and (16% ) decrease in average delay.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"15 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audio-Visual Event Localization using Multi-task Hybrid Attention Networks for Smart Healthcare Systems 利用多任务混合注意力网络为智能医疗系统提供视听事件定位功能
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-16 DOI: 10.1145/3653018
Han Liang, Jincai Chen, Fazlullah Khan, Gautam Srivastava, Jiangfeng Zeng

Human perception heavily relies on two primary senses: vision and hearing, which are closely inter-connected and capable of complementing each other. Consequently, various multimodal learning tasks have emerged, with audio-visual event localization (AVEL) being a prominent example. AVEL is a popular task within the realm of multimodal learning, with the primary objective of identifying the presence of events within each video segment and predicting their respective categories. This task holds significant utility in domains such as healthcare monitoring and surveillance, among others. Generally speaking, audio-visual co-learning offers a more comprehensive information landscape compared to single-modal learning, as it allows for a more holistic perception of ambient information, aligning with real-world applications. Nevertheless, the inherent heterogeneity of audio and visual data can introduce challenges related to event semantics inconsistency, potentially leading to incorrect predictions. To track these challenges, we propose a multi-task hybrid attention network (MHAN) to acquire high-quality representation for multimodal data. Specifically, our network incorporates hybrid attention of uni- and parallel cross-modal (HAUC) modules, which consists of a uni-modal attention block and a parallel cross-modal attention block, leveraging multimodal complementary and hidden information for better representation. Furthermore, we advocate for the use of a uni-modal visual task as auxiliary supervision to enhance the performance of multimodal tasks employing a multi-task learning strategy. Our proposed model has been proven to outperform the state-of-the-art results based on extensive experiments conducted on the AVE dataset.

人类的感知在很大程度上依赖于两种主要感官:视觉和听觉,这两种感官紧密相连,能够相互补充。因此,出现了各种多模态学习任务,视听事件定位(AVEL)就是一个突出的例子。视听事件定位(AVEL)是多模态学习领域的一项热门任务,其主要目标是识别每个视频片段中是否存在事件,并预测其各自的类别。这项任务在医疗监控和监视等领域具有重要作用。一般来说,与单一模式学习相比,视听协同学习能提供更全面的信息,因为它能更全面地感知环境信息,符合现实世界的应用。然而,音频和视频数据固有的异质性可能会带来与事件语义不一致相关的挑战,从而可能导致不正确的预测。为了应对这些挑战,我们提出了一种多任务混合注意力网络(MHAN),以获得多模态数据的高质量表示。具体来说,我们的网络结合了单模态和并行跨模态混合注意力(HAUC)模块,由一个单模态注意力区块和一个并行跨模态注意力区块组成,利用多模态互补和隐藏信息获得更好的表征。此外,我们还主张使用单模态视觉任务作为辅助监督,以提高采用多任务学习策略的多模态任务的性能。在 AVE 数据集上进行的大量实验证明,我们提出的模型优于最先进的结果。
{"title":"Audio-Visual Event Localization using Multi-task Hybrid Attention Networks for Smart Healthcare Systems","authors":"Han Liang, Jincai Chen, Fazlullah Khan, Gautam Srivastava, Jiangfeng Zeng","doi":"10.1145/3653018","DOIUrl":"https://doi.org/10.1145/3653018","url":null,"abstract":"<p>Human perception heavily relies on two primary senses: vision and hearing, which are closely inter-connected and capable of complementing each other. Consequently, various multimodal learning tasks have emerged, with audio-visual event localization (AVEL) being a prominent example. AVEL is a popular task within the realm of multimodal learning, with the primary objective of identifying the presence of events within each video segment and predicting their respective categories. This task holds significant utility in domains such as healthcare monitoring and surveillance, among others. Generally speaking, audio-visual co-learning offers a more comprehensive information landscape compared to single-modal learning, as it allows for a more holistic perception of ambient information, aligning with real-world applications. Nevertheless, the inherent heterogeneity of audio and visual data can introduce challenges related to event semantics inconsistency, potentially leading to incorrect predictions. To track these challenges, we propose a multi-task hybrid attention network (MHAN) to acquire high-quality representation for multimodal data. Specifically, our network incorporates hybrid attention of uni- and parallel cross-modal (HAUC) modules, which consists of a uni-modal attention block and a parallel cross-modal attention block, leveraging multimodal complementary and hidden information for better representation. Furthermore, we advocate for the use of a uni-modal visual task as auxiliary supervision to enhance the performance of multimodal tasks employing a multi-task learning strategy. Our proposed model has been proven to outperform the state-of-the-art results based on extensive experiments conducted on the AVE dataset.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"21 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Market manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data 加密货币的市场操纵:来自社交媒体和交易数据的证据
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-30 DOI: 10.1145/3643812
Li Wen, Lingfeng Bao, Jiachi Chen, John Grundy, Xin Xia, Xiaohu Yang

The cryptocurrency market cap experienced a great increase in recent years. However, large price fluctuations demonstrate the need for governance structures and identify whether there are market manipulations. In this paper, we conducted three analyses – social media data analysis, blockchain data analysis, and price bubble analysis – to investigate whether market manipulation exists on Bitcoin, Ethereum, and Dogecoin platforms. Social media data analysis aims to find the reasons for the price fluctuations. Blockchain data analysis is used to find the detailed behavior of the manipulators. Price bubble analysis is used to investigate the relation between price fluctuation and manipulators’ behavior. By using the three analyses, we show that market manipulation exists on Bitcoin, Ethereum and Dogecoin. However, market manipulation of Bitcoin is limited, and for most of Bitcoin’s price fluctuations, we found other explanations. The price for Ethereum is most sensitive to technical updates. Technical companies/teams usually hype some new concepts, e.g., ICO, DeFi, which causes a price spike. The price of Dogecoin has a high correlation with Elon Musk’s Twitter activity, which shows influential individuals have the ability to manipulate its prices. Also, the poor monetary liquidity of Dogecoin allows some users to manipulate its price.

近年来,加密货币的市值经历了大幅增长。然而,价格的大幅波动表明需要建立治理结构,并识别是否存在市场操纵行为。在本文中,我们通过社交媒体数据分析、区块链数据分析和价格泡沫分析这三种分析方法来研究比特币、以太坊和 Dogecoin 平台是否存在市场操纵行为。社交媒体数据分析旨在找出价格波动的原因。区块链数据分析用于发现操纵者的详细行为。价格泡沫分析用于研究价格波动与操纵者行为之间的关系。通过这三种分析,我们发现比特币、以太坊和 Dogecoin 都存在市场操纵行为。然而,对比特币的市场操纵是有限的,对于比特币的大部分价格波动,我们找到了其他解释。以太坊的价格对技术更新最为敏感。技术公司/团队通常会炒作一些新概念,如 ICO、DeFi,从而导致价格飙升。Dogecoin 的价格与 Elon Musk 的 Twitter 活动高度相关,这表明有影响力的个人有能力操纵其价格。此外,由于 Dogecoin 的货币流动性较差,一些用户可以操纵其价格。
{"title":"Market manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data","authors":"Li Wen, Lingfeng Bao, Jiachi Chen, John Grundy, Xin Xia, Xiaohu Yang","doi":"10.1145/3643812","DOIUrl":"https://doi.org/10.1145/3643812","url":null,"abstract":"<p>The cryptocurrency market cap experienced a great increase in recent years. However, large price fluctuations demonstrate the need for governance structures and identify whether there are market manipulations. In this paper, we conducted three analyses – social media data analysis, blockchain data analysis, and price bubble analysis – to investigate whether market manipulation exists on Bitcoin, Ethereum, and Dogecoin platforms. Social media data analysis aims to find the reasons for the price fluctuations. Blockchain data analysis is used to find the detailed behavior of the manipulators. Price bubble analysis is used to investigate the relation between price fluctuation and manipulators’ behavior. By using the three analyses, we show that market manipulation exists on Bitcoin, Ethereum and Dogecoin. However, market manipulation of Bitcoin is limited, and for most of Bitcoin’s price fluctuations, we found other explanations. The price for Ethereum is most sensitive to technical updates. Technical companies/teams usually hype some new concepts, e.g., ICO, DeFi, which causes a price spike. The price of Dogecoin has a high correlation with Elon Musk’s Twitter activity, which shows influential individuals have the ability to manipulate its prices. Also, the poor monetary liquidity of Dogecoin allows some users to manipulate its price.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"4 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139648306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-assisted Blockchain-enabled Smart and Secure E-prescription Management Framework 人工智能辅助区块链智能安全电子处方管理框架
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-23 DOI: 10.1145/3641279
Siva Sai, Vinay Chamola

Traditional medical prescriptions based on physical paper-based documents are prone to manipulation, errors, and unauthorized reproduction due to their format. Addressing the limitations of the traditional prescription system, e-prescription systems have been introduced in several countries. However, e-prescription systems lead to several concerns like the risk of privacy loss, the problem of double-spending prescriptions, lack of interoperability, and single point of failure, all of which need to be addressed immediately. We propose an AI-assisted blockchain-enabled smart and secure e-prescription management framework to address these issues. Our proposed system overcomes the problems of the centralized e-prescription systems and enables efficient consent management to access prescriptions by incorporating blockchain-based smart contracts. Our work incorporates the Umbral proxy re-encryption scheme in the proposed system, avoiding the need for repeated encryption and decryption of the prescriptions when transferred between different entities in the network. In our work, we employ two different machine learning models(Random Forest classifier and LightGBM classifier) to assist the doctor in prescribing medicines. One is a drug recommendation model, which is aimed at providing drug recommendations considering the medical history of the patients and the general prescription pattern for the particular ailment of the patient. We have fine-tuned the SciBERT model for adverse drug reaction detection. The extensive experimentation and results show that the proposed e-prescription framework is secure, scalable, and interoperable. Further, the proposed machine learning models produce results higher than 95%.

传统的医疗处方以实体纸质文件为基础,由于其格式问题,容易出现篡改、错误和未经授权的复制。针对传统处方系统的局限性,一些国家引入了电子处方系统。然而,电子处方系统会导致一些问题,如隐私泄露的风险、重复花费处方的问题、缺乏互操作性以及单点故障,所有这些问题都需要立即解决。为了解决这些问题,我们提出了一个人工智能辅助的区块链智能安全电子处方管理框架。我们提出的系统克服了集中式电子处方系统存在的问题,并通过结合基于区块链的智能合约,实现了高效的同意管理,以获取处方。我们的工作将 Umbral 代理重加密方案纳入了拟议系统,避免了在网络中不同实体之间传输处方时重复加密和解密的需要。在我们的工作中,我们采用了两种不同的机器学习模型(随机森林分类器和 LightGBM 分类器)来协助医生开药。其中一个是药物推荐模型,旨在根据患者的病史和针对患者特定疾病的一般处方模式提供药物推荐。我们对用于药物不良反应检测的 SciBERT 模型进行了微调。大量实验和结果表明,建议的电子处方框架是安全、可扩展和可互操作的。此外,所提出的机器学习模型的结果高于 95%。
{"title":"AI-assisted Blockchain-enabled Smart and Secure E-prescription Management Framework","authors":"Siva Sai, Vinay Chamola","doi":"10.1145/3641279","DOIUrl":"https://doi.org/10.1145/3641279","url":null,"abstract":"<p>Traditional medical prescriptions based on physical paper-based documents are prone to manipulation, errors, and unauthorized reproduction due to their format. Addressing the limitations of the traditional prescription system, e-prescription systems have been introduced in several countries. However, e-prescription systems lead to several concerns like the risk of privacy loss, the problem of double-spending prescriptions, lack of interoperability, and single point of failure, all of which need to be addressed immediately. We propose an AI-assisted blockchain-enabled smart and secure e-prescription management framework to address these issues. Our proposed system overcomes the problems of the centralized e-prescription systems and enables efficient consent management to access prescriptions by incorporating blockchain-based smart contracts. Our work incorporates the Umbral proxy re-encryption scheme in the proposed system, avoiding the need for repeated encryption and decryption of the prescriptions when transferred between different entities in the network. In our work, we employ two different machine learning models(Random Forest classifier and LightGBM classifier) to assist the doctor in prescribing medicines. One is a drug recommendation model, which is aimed at providing drug recommendations considering the medical history of the patients and the general prescription pattern for the particular ailment of the patient. We have fine-tuned the SciBERT model for adverse drug reaction detection. The extensive experimentation and results show that the proposed e-prescription framework is secure, scalable, and interoperable. Further, the proposed machine learning models produce results higher than 95%.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"2 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion 用于智能交通灯控制器的 SDN 量化 LQR 可优化拥堵状况
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-16 DOI: 10.1145/3641104
Anuj Sachan, Neetesh Kumar

Existing intersection management systems, in urban cities, lack in meeting the current requirements of self-configuration, lightweight computing, and software-defined control, which are necessarily required for congested road-lane networks. To satisfy these requirements, this work proposes effective, scalable, multi-input and multi-output, and congestion prevention enabled intersection management system utilizing a software-defined control interface that not only regularly monitors the traffic to prevent congestion for minimizing queue length and waiting time, it also offers a computationally efficient solution in real-time. For effective intersection management, a modified linear-quadratic regulator, i.e., Quantized Linear Quadratic Regulator (QLQR), is designed along with Software-Defined Networking (SDN) enabled control interface to maximize throughput and vehicles speed and minimize queue length and waiting time at the intersection. Experimental results prove that the proposed SDN-QLQR improves the comparative performance in the interval of 24.94% – 49.07%, 35.78% – 68.86%, 36.67% – 59.08%, and 29.94% – 57.87% for various performance metrics, i.e., average queue length, average waiting time, throughput, and average speed respectively.

城市中现有的交叉口管理系统无法满足当前对自配置、轻量级计算和软件定义控制的要求,而这正是拥堵的道路车道网络所必须的。为满足这些要求,本研究提出了有效、可扩展、多输入和多输出、可预防拥堵的交叉口管理系统,该系统利用软件定义的控制界面,不仅能定期监控交通,预防拥堵,从而最大限度地减少排队长度和等待时间,还能实时提供计算效率高的解决方案。为实现有效的交叉路口管理,设计了一种改进的线性二次调节器,即量化线性二次调节器(QLQR),并配备了软件定义网络(SDN)控制界面,以最大限度地提高吞吐量和车速,并最大限度地减少交叉路口的队列长度和等待时间。实验结果证明,就平均队列长度、平均等待时间、吞吐量和平均速度等各种性能指标而言,所提出的 SDN-QLQR 可分别在 24.94% - 49.07%、35.78% - 68.86%、36.67% - 59.08% 和 29.94% - 57.87% 的区间内提高比较性能。
{"title":"SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion","authors":"Anuj Sachan, Neetesh Kumar","doi":"10.1145/3641104","DOIUrl":"https://doi.org/10.1145/3641104","url":null,"abstract":"<p>Existing intersection management systems, in urban cities, lack in meeting the current requirements of self-configuration, lightweight computing, and software-defined control, which are necessarily required for congested road-lane networks. To satisfy these requirements, this work proposes effective, scalable, multi-input and multi-output, and congestion prevention enabled intersection management system utilizing a software-defined control interface that not only regularly monitors the traffic to prevent congestion for minimizing queue length and waiting time, it also offers a computationally efficient solution in real-time. For effective intersection management, a modified linear-quadratic regulator, i.e., Quantized Linear Quadratic Regulator (QLQR), is designed along with Software-Defined Networking (SDN) enabled control interface to maximize throughput and vehicles speed and minimize queue length and waiting time at the intersection. Experimental results prove that the proposed SDN-QLQR improves the comparative performance in the interval of 24.94% – 49.07%, 35.78% – 68.86%, 36.67% – 59.08%, and 29.94% – 57.87% for various performance metrics, i.e., average queue length, average waiting time, throughput, and average speed respectively.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"10 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139474811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADTO: A Trust Active Detecting based Task Offloading Scheme in Edge Computing for Internet of Things ADTO:物联网边缘计算中基于信任主动检测的任务卸载方案
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-12 DOI: 10.1145/3640013
Xuezheng Yang, Zhiwen Zeng, Anfeng Liu, Neal N. Xiong, Shaobo Zhang

In edge computing, Internet of Things (IoT) devices with weak computing power offload tasks to nearby edge servers for execution, so the task completion time can be reduced and delay sensitive tasks can be facilitated. However, if the task is offloaded to malicious edge servers, the system will suffer losses. Therefore, it is significant to identify the trusted edge servers and offload tasks to trusted edge servers, which can improve the performance of edge computing. However, it is still challenging. In this paper, a trust Active Detecting based Task Offloading (ADTO) scheme is proposed to maximize revenue in edge computing. The main innovation points of our work are as follows: (a) The ADTO scheme innovatively proposes a method to actively get trust by trust detection. This method offloads microtasks to edge servers whose trust needs to be identified, and then quickly identifies the trust of edge servers according to the completion of tasks by edge servers. Based on the identification of the trust, tasks can be offloaded to trusted edge servers, so as to improve the success rate of tasks. (b) Although the trust of edge servers can be identified by our detection, it needs to pay a price. Therefore, to maximize system revenue, searching the most suitable number of trusted edge servers for various conditions is transformed into an optimization problem. Finally, theoretical and experimental analysis shows the effectiveness of the proposed strategy, which can effectively identify the trusted and untrusted edge servers. The task offloading strategy based on trust detection proposed in this paper greatly improves the success rate of tasks, compared with the strategy without trust detection, the task success rate is increased by 40.27%, and there is a significant increase in revenue, which fully demonstrates the effectiveness of the strategy.

在边缘计算中,计算能力较弱的物联网(IoT)设备会将任务卸载到附近的边缘服务器执行,从而缩短任务完成时间,并为延迟敏感任务提供便利。但是,如果任务被卸载到恶意的边缘服务器上,系统就会遭受损失。因此,识别可信的边缘服务器并将任务卸载到可信的边缘服务器上意义重大,这可以提高边缘计算的性能。然而,这仍然具有挑战性。本文提出了一种基于信任主动检测的任务卸载(ADTO)方案,以最大限度地提高边缘计算的收益。我们工作的主要创新点如下:(a) ADTO 方案创新性地提出了一种通过信任检测主动获取信任的方法。该方法将需要识别信任度的微任务卸载给边缘服务器,然后根据边缘服务器完成任务的情况快速识别边缘服务器的信任度。在信任度识别的基础上,可将任务卸载到受信任的边缘服务器上,从而提高任务的成功率。(b) 虽然我们的检测可以识别边缘服务器的信任度,但它需要付出代价。因此,为了使系统收益最大化,寻找各种条件下最合适的受信任边缘服务器数量就变成了一个优化问题。最后,理论和实验分析表明了所提策略的有效性,它能有效识别可信和不可信的边缘服务器。本文提出的基于信任检测的任务卸载策略大大提高了任务的成功率,与没有信任检测的策略相比,任务成功率提高了 40.27%,收入也有显著增加,充分说明了该策略的有效性。
{"title":"ADTO: A Trust Active Detecting based Task Offloading Scheme in Edge Computing for Internet of Things","authors":"Xuezheng Yang, Zhiwen Zeng, Anfeng Liu, Neal N. Xiong, Shaobo Zhang","doi":"10.1145/3640013","DOIUrl":"https://doi.org/10.1145/3640013","url":null,"abstract":"<p>In edge computing, Internet of Things (IoT) devices with weak computing power offload tasks to nearby edge servers for execution, so the task completion time can be reduced and delay sensitive tasks can be facilitated. However, if the task is offloaded to malicious edge servers, the system will suffer losses. Therefore, it is significant to identify the trusted edge servers and offload tasks to trusted edge servers, which can improve the performance of edge computing. However, it is still challenging. In this paper, a trust Active Detecting based Task Offloading (ADTO) scheme is proposed to maximize revenue in edge computing. The main innovation points of our work are as follows: (a) The ADTO scheme innovatively proposes a method to actively get trust by trust detection. This method offloads microtasks to edge servers whose trust needs to be identified, and then quickly identifies the trust of edge servers according to the completion of tasks by edge servers. Based on the identification of the trust, tasks can be offloaded to trusted edge servers, so as to improve the success rate of tasks. (b) Although the trust of edge servers can be identified by our detection, it needs to pay a price. Therefore, to maximize system revenue, searching the most suitable number of trusted edge servers for various conditions is transformed into an optimization problem. Finally, theoretical and experimental analysis shows the effectiveness of the proposed strategy, which can effectively identify the trusted and untrusted edge servers. The task offloading strategy based on trust detection proposed in this paper greatly improves the success rate of tasks, compared with the strategy without trust detection, the task success rate is increased by 40.27%, and there is a significant increase in revenue, which fully demonstrates the effectiveness of the strategy.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"28 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139461497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network 从无线人体传感器网络的压缩心电图测量结果中检测心房颤动
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-10 DOI: 10.1145/3637440
Yongyong Chen, Junxin Chen, Shuang Sun, Jingyong Su, Qiankun Li, Zhihan Lyu

Recent years have witnessed an increasing prevalence of wearable devices in the public, where atrial fibrillation (AF) detection is a popular application in these devices. Generally, AF detection is performed on cloud whereas this paper describes an on-device AF detection method. Technically, compressed sensing (CS) is first used for electrocardiograph (ECG) acquisition. Then QRS detection is proposed to be performed directly on the compressed CS measurements, rather than on the reconstructed signals on the powerful cloud server. Based on the extracted QRS information, AF is determined by quantitatively analyzing the (RR, dRR) plot. Databases with ECG samples collected from both medical-level (MIT-BIH afdb) and wearable ECG devices (Physionet Challenge 2017) are introduced for performance validation. The experiment results well demonstrate that our on-device AF detection algorithm can approach the performance of those implemented on the raw signals. Our proposal is suitable for AF screening directly on the wearable devices, without the support of the data center for signal reconstruction and intelligent analysis.

近年来,可穿戴设备在公众中日益普及,心房颤动(AF)检测是这些设备中的热门应用。一般来说,房颤检测是在云端进行的,而本文介绍的是一种设备上的房颤检测方法。在技术上,压缩传感(CS)首先用于心电图(ECG)采集。然后,建议直接在压缩的 CS 测量值上进行 QRS 检测,而不是在功能强大的云服务器上对重建信号进行检测。根据提取的 QRS 信息,通过定量分析(RR、dRR)图确定房颤。为进行性能验证,引入了从医疗级(MIT-BIH afdb)和可穿戴心电图设备(Physionet Challenge 2017)收集的心电图样本数据库。实验结果很好地证明了我们的设备房颤检测算法可以接近在原始信号上实现的算法的性能。我们的建议适用于直接在可穿戴设备上进行房颤筛查,无需数据中心支持信号重建和智能分析。
{"title":"Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network","authors":"Yongyong Chen, Junxin Chen, Shuang Sun, Jingyong Su, Qiankun Li, Zhihan Lyu","doi":"10.1145/3637440","DOIUrl":"https://doi.org/10.1145/3637440","url":null,"abstract":"<p>Recent years have witnessed an increasing prevalence of wearable devices in the public, where atrial fibrillation (AF) detection is a popular application in these devices. Generally, AF detection is performed on cloud whereas this paper describes an on-device AF detection method. Technically, compressed sensing (CS) is first used for electrocardiograph (ECG) acquisition. Then QRS detection is proposed to be performed directly on the compressed CS measurements, rather than on the reconstructed signals on the powerful cloud server. Based on the extracted QRS information, AF is determined by quantitatively analyzing the (<i>RR</i>, <i>dRR</i>) plot. Databases with ECG samples collected from both medical-level (MIT-BIH afdb) and wearable ECG devices (Physionet Challenge 2017) are introduced for performance validation. The experiment results well demonstrate that our on-device AF detection algorithm can approach the performance of those implemented on the raw signals. Our proposal is suitable for AF screening directly on the wearable devices, without the support of the data center for signal reconstruction and intelligent analysis.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"8 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139413496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Set Dandelion Network for IoT Intrusion Detection 用于物联网入侵检测的开放集蒲公英网络
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-09 DOI: 10.1145/3639822
Jiashu Wu, Hao Dai, Kenneth B. Kent, Jerome Yen, Chengzhong Xu, Yang Wang

As Internet of Things devices become widely used in the real world, it is crucial to protect them from malicious intrusions. However, the data scarcity of IoT limits the applicability of traditional intrusion detection methods, which are highly data-dependent. To address this, in this paper we propose the Open-Set Dandelion Network (OSDN) based on unsupervised heterogeneous domain adaptation in an open-set manner. The OSDN model performs intrusion knowledge transfer from the knowledge-rich source network intrusion domain to facilitate more accurate intrusion detection for the data-scarce target IoT intrusion domain. Under the open-set setting, it can also detect newly-emerged target domain intrusions that are not observed in the source domain. To achieve this, the OSDN model forms the source domain into a dandelion-like feature space in which each intrusion category is compactly grouped and different intrusion categories are separated, i.e., simultaneously emphasising inter-category separability and intra-category compactness. The dandelion-based target membership mechanism then forms the target dandelion. Then, the dandelion angular separation mechanism achieves better inter-category separability, and the dandelion embedding alignment mechanism further aligns both dandelions in a finer manner. To promote intra-category compactness, the discriminating sampled dandelion mechanism is used. Assisted by the intrusion classifier trained using both known and generated unknown intrusion knowledge, a semantic dandelion correction mechanism emphasises easily-confused categories and guides better inter-category separability. Holistically, these mechanisms form the OSDN model that effectively performs intrusion knowledge transfer to benefit IoT intrusion detection. Comprehensive experiments on several intrusion datasets verify the effectiveness of the OSDN model, outperforming three state-of-the-art baseline methods by (16.9% ). The contribution of each OSDN constituting component, the stability and the efficiency of the OSDN model are also verified.

随着物联网设备在现实世界中的广泛应用,保护它们免遭恶意入侵至关重要。然而,物联网的数据稀缺性限制了高度依赖数据的传统入侵检测方法的适用性。针对这一问题,我们在本文中提出了基于开放集方式的无监督异构域适应的开放集蒲公英网络(OSDN)。OSDN 模型从知识丰富的源网络入侵域进行入侵知识转移,以促进对数据稀缺的目标物联网入侵域进行更准确的入侵检测。在开放集设置下,它还能检测到源域未观察到的新出现的目标域入侵。为此,OSDN 模型将源域形成一个类似蒲公英的特征空间,在这个空间中,每个入侵类别被紧凑分组,不同的入侵类别被分开,即同时强调类别间的可分离性和类别内的紧凑性。然后,基于蒲公英的目标成员机制形成目标蒲公英。然后,蒲公英角度分离机制实现更好的类别间分离性,而蒲公英嵌入对齐机制则进一步以更精细的方式对齐两个蒲公英。为了提高类别内的紧凑性,使用了辨别采样蒲公英机制。在使用已知和生成的未知入侵知识训练的入侵分类器的辅助下,语义蒲公英校正机制强调易混淆的类别,并引导更好的类别间分离。从整体上看,这些机制构成了 OSDN 模型,它能有效地进行入侵知识转移,从而有利于物联网入侵检测。在多个入侵数据集上的综合实验验证了OSDN模型的有效性,其性能优于三种最先进的基线方法(16.9%)。此外,还验证了构成OSDN模型的每个组件的贡献、OSDN模型的稳定性和效率。
{"title":"Open Set Dandelion Network for IoT Intrusion Detection","authors":"Jiashu Wu, Hao Dai, Kenneth B. Kent, Jerome Yen, Chengzhong Xu, Yang Wang","doi":"10.1145/3639822","DOIUrl":"https://doi.org/10.1145/3639822","url":null,"abstract":"<p>As Internet of Things devices become widely used in the real world, it is crucial to protect them from malicious intrusions. However, the data scarcity of IoT limits the applicability of traditional intrusion detection methods, which are highly data-dependent. To address this, in this paper we propose the Open-Set Dandelion Network (OSDN) based on unsupervised heterogeneous domain adaptation in an open-set manner. The OSDN model performs intrusion knowledge transfer from the knowledge-rich source network intrusion domain to facilitate more accurate intrusion detection for the data-scarce target IoT intrusion domain. Under the open-set setting, it can also detect newly-emerged target domain intrusions that are not observed in the source domain. To achieve this, the OSDN model forms the source domain into a dandelion-like feature space in which each intrusion category is compactly grouped and different intrusion categories are separated, i.e., simultaneously emphasising inter-category separability and intra-category compactness. The dandelion-based target membership mechanism then forms the target dandelion. Then, the dandelion angular separation mechanism achieves better inter-category separability, and the dandelion embedding alignment mechanism further aligns both dandelions in a finer manner. To promote intra-category compactness, the discriminating sampled dandelion mechanism is used. Assisted by the intrusion classifier trained using both known and generated unknown intrusion knowledge, a semantic dandelion correction mechanism emphasises easily-confused categories and guides better inter-category separability. Holistically, these mechanisms form the OSDN model that effectively performs intrusion knowledge transfer to benefit IoT intrusion detection. Comprehensive experiments on several intrusion datasets verify the effectiveness of the OSDN model, outperforming three state-of-the-art baseline methods by (16.9% ). The contribution of each OSDN constituting component, the stability and the efficiency of the OSDN model are also verified.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"52 11 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139413651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things 基于联合学习的安全医疗物联网信息泄漏风险检测
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-09 DOI: 10.1145/3639466
Tingting Wang, Tao Tang, Zhen Cai, Kai Fang, Jinyu Tian, Jianqing Li, Wei Wang, Feng Xia

The Medical Internet of Things (MIoT) requires extreme information and communication security, particularly for remote consultation systems. MIoT’s integration of physical and computational components creates a seamless network of medical devices providing high-quality care via continuous monitoring and treatment. However, traditional security methods such as cryptography cannot prevent privacy compromise and information leakage caused by security breaches. To solve this issue, this paper proposes a novel Federated Learning Intrusion Detection System (FLIDS). FLIDS combines Generative Adversarial Network (GAN) and Federated Learning (FL) to detect cyber attacks like Denial of Service (DoS), data modification, and data injection using machine learning. FLIDS shows exceptional performance with over 99% detection accuracy and 1% False Positive Rate (FPR). It saves bandwidth by transmitting 3.8 times fewer bytes compared to central data collection. These results prove FLIDS’ effectiveness in detecting and mitigating security threats in Medical Cyber-Physical Systems (MCPS). The paper recommends scaling up FLIDS to use computing resources from multiple mobile devices for better intrusion detection accuracy and efficiency while reducing the burden on individual devices in MIoT.

医疗物联网(MIoT)要求极高的信息和通信安全性,尤其是远程会诊系统。MIoT 整合了物理和计算组件,创建了一个无缝的医疗设备网络,通过持续监测和治疗提供高质量的护理。然而,密码学等传统安全方法无法防止安全漏洞造成的隐私泄露和信息泄漏。为解决这一问题,本文提出了一种新颖的联合学习入侵检测系统(FLIDS)。FLIDS 结合了生成对抗网络(GAN)和联合学习(FL),利用机器学习检测拒绝服务(DoS)、数据修改和数据注入等网络攻击。FLIDS 性能卓越,检测准确率超过 99%,误报率 (FPR) 为 1%。与中央数据收集相比,它的传输字节数减少了 3.8 倍,从而节省了带宽。这些结果证明了 FLIDS 在检测和减轻医疗网络物理系统 (MCPS) 中的安全威胁方面的有效性。论文建议扩大 FLIDS 的规模,使用多个移动设备的计算资源,以提高入侵检测的准确性和效率,同时减轻 MIoT 中单个设备的负担。
{"title":"Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things","authors":"Tingting Wang, Tao Tang, Zhen Cai, Kai Fang, Jinyu Tian, Jianqing Li, Wei Wang, Feng Xia","doi":"10.1145/3639466","DOIUrl":"https://doi.org/10.1145/3639466","url":null,"abstract":"<p>The Medical Internet of Things (MIoT) requires extreme information and communication security, particularly for remote consultation systems. MIoT’s integration of physical and computational components creates a seamless network of medical devices providing high-quality care via continuous monitoring and treatment. However, traditional security methods such as cryptography cannot prevent privacy compromise and information leakage caused by security breaches. To solve this issue, this paper proposes a novel Federated Learning Intrusion Detection System (FLIDS). FLIDS combines Generative Adversarial Network (GAN) and Federated Learning (FL) to detect cyber attacks like Denial of Service (DoS), data modification, and data injection using machine learning. FLIDS shows exceptional performance with over 99% detection accuracy and 1% False Positive Rate (FPR). It saves bandwidth by transmitting 3.8 times fewer bytes compared to central data collection. These results prove FLIDS’ effectiveness in detecting and mitigating security threats in Medical Cyber-Physical Systems (MCPS). The paper recommends scaling up FLIDS to use computing resources from multiple mobile devices for better intrusion detection accuracy and efficiency while reducing the burden on individual devices in MIoT.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"54 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139413652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Cross-Domain Recommendation with Evolution Learning 利用进化学习进行跨域推荐的新方法
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-05 DOI: 10.1145/3639567
Yi-Cheng Chen, Wang-Chien Lee

In this “info-plosion” era, recommendation systems (or recommenders) play a significant role in finding interesting items in the surge of on-line digital activities and e-commerce. Several techniques have been widely applied for recommendation systems, but the cold start and sparsity problems remain a major challenge. The cold start problem occurs when generating recommendations for new users and items without sufficient information. Sparsity refers to the problem of having a large amount of users and items but with few transactions or interactions. In this paper, a novel cross-domain recommendation model, Cross-Domain Evolution Learning Recommendation (abbreviated as CD-ELR), is developed to communicate the information from different domains in order to tackle the cold start and sparsity issues by integrating matrix factorization and recurrent neural network. We introduce an evolutionary concept to describe the preference variation of users over time. Furthermore, several optimization methods are developed for combining the domain features for precision recommendation. Experimental results show that CD-ELR outperforms existing state-of-the-art recommendation baselines. Finally, we conduct experiments on several real-world datasets to demonstrate the practicability of the proposed CD-ELR.

在这个 "信息爆炸 "的时代,推荐系统(或称推荐器)在寻找在线数字活动和电子商务激增中的有趣项目方面发挥着重要作用。有几种技术已被广泛应用于推荐系统,但冷启动和稀疏性问题仍是一大挑战。冷启动问题是指在没有足够信息的情况下为新用户和新商品生成推荐时出现的问题。稀疏性指的是用户和商品数量大但交易或互动少的问题。本文开发了一种新颖的跨领域推荐模型--跨领域进化学习推荐(简称 CD-ELR),通过整合矩阵因式分解和循环神经网络来交流不同领域的信息,从而解决冷启动和稀疏性问题。我们引入了进化概念来描述用户偏好随时间的变化。此外,我们还开发了几种优化方法,用于结合领域特征进行精准推荐。实验结果表明,CD-ELR 优于现有的最先进的推荐基线。最后,我们在几个真实世界的数据集上进行了实验,以证明所提出的 CD-ELR 的实用性。
{"title":"A Novel Cross-Domain Recommendation with Evolution Learning","authors":"Yi-Cheng Chen, Wang-Chien Lee","doi":"10.1145/3639567","DOIUrl":"https://doi.org/10.1145/3639567","url":null,"abstract":"<p>In this “info-plosion” era, recommendation systems (or recommenders) play a significant role in finding interesting items in the surge of on-line digital activities and e-commerce. Several techniques have been widely applied for recommendation systems, but the cold start and sparsity problems remain a major challenge. The cold start problem occurs when generating recommendations for new users and items without sufficient information. Sparsity refers to the problem of having a large amount of users and items but with few transactions or interactions. In this paper, a novel cross-domain recommendation model, Cross-Domain Evolution Learning Recommendation (abbreviated as CD-ELR), is developed to communicate the information from different domains in order to tackle the cold start and sparsity issues by integrating matrix factorization and recurrent neural network. We introduce an evolutionary concept to describe the preference variation of users over time. Furthermore, several optimization methods are developed for combining the domain features for precision recommendation. Experimental results show that CD-ELR outperforms existing state-of-the-art recommendation baselines. Finally, we conduct experiments on several real-world datasets to demonstrate the practicability of the proposed CD-ELR.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"63 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139376453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1