首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee 隐私保证域间路由中的联邦路由泄漏检测
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-02-23 DOI: https://dl.acm.org/doi/10.1145/3561051
Man Zeng, Dandan Li, Pei Zhang, Kun Xie, Xiaohong Huang

In the inter-domain network, route leaks can disrupt the Internet traffic and cause large outages. The accurate detection of route leaks requires the sharing of AS business relationship information. However, the business relationship information between ASes is confidential. ASes are usually unwilling to reveal this information to the other ASes, especially their competitors. In this paper, we propose a method named FL-RLD to detect route leaks while maintaining the privacy of business relationships between ASes by using a blockchain-based federated learning framework, where ASes can collaboratively train a global detection model without directly disclosing their specific business relationships. To mitigate the lack of ground-truth validation data in route leaks, FL-RLD provides a self-validation scheme by labeling AS triples with local routing policies. We evaluate FL-RLD under a variety of datasets including imbalanced and balanced datasets, and examine different deployment strategies of FL-RLD under different topologies. According to the results, FL-RLD performs better in detecting route leaks than the single AS detection, whether the datasets are balanced or imbalanced. Additionally, the results indicate that selecting ASes with the most peers to first deploy FL-RLD brings more significant benefits in detecting route leaks than selecting ASes with the most providers and customers.

在跨域网络中,路由泄漏会导致Internet流量中断,并造成大规模的网络中断。为了准确检测路由泄漏,需要共享AS业务关系信息。但是,ase之间的业务关系信息是保密的。ase通常不愿意将这些信息透露给其他ase,尤其是它们的竞争对手。在本文中,我们提出了一种名为FL-RLD的方法,通过使用基于区块链的联邦学习框架来检测路由泄漏,同时维护ase之间业务关系的隐私,其中ase可以协作训练全局检测模型,而无需直接披露其特定的业务关系。为了缓解路由泄漏中缺乏真实验证数据的问题,FL-RLD提供了一种通过标记本地路由策略的AS三元组来进行自我验证的方案。我们评估了多种数据集下的FL-RLD,包括不平衡数据集和平衡数据集,并研究了不同拓扑下FL-RLD的不同部署策略。结果表明,无论数据集是均衡的还是不均衡的,FL-RLD检测路由泄漏的性能都优于单个AS检测。此外,结果表明,选择具有最多对等体的as来首次部署FL-RLD,在检测路由泄漏方面比选择具有最多提供者和客户的as带来更大的好处。
{"title":"Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee","authors":"Man Zeng, Dandan Li, Pei Zhang, Kun Xie, Xiaohong Huang","doi":"https://dl.acm.org/doi/10.1145/3561051","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3561051","url":null,"abstract":"<p>In the inter-domain network, route leaks can disrupt the Internet traffic and cause large outages. The accurate detection of route leaks requires the sharing of AS business relationship information. However, the business relationship information between ASes is confidential. ASes are usually unwilling to reveal this information to the other ASes, especially their competitors. In this paper, we propose a method named FL-RLD to detect route leaks while maintaining the privacy of business relationships between ASes by using a blockchain-based federated learning framework, where ASes can collaboratively train a global detection model without directly disclosing their specific business relationships. To mitigate the lack of ground-truth validation data in route leaks, FL-RLD provides a self-validation scheme by labeling AS triples with local routing policies. We evaluate FL-RLD under a variety of datasets including imbalanced and balanced datasets, and examine different deployment strategies of FL-RLD under different topologies. According to the results, FL-RLD performs better in detecting route leaks than the single AS detection, whether the datasets are balanced or imbalanced. Additionally, the results indicate that selecting ASes with the most peers to first deploy FL-RLD brings more significant benefits in detecting route leaks than selecting ASes with the most providers and customers.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies 利用新颖的区块链技术促进无服务器匹配的在线游戏
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-02-23 DOI: https://dl.acm.org/doi/10.1145/3565884
Feijie Wu, Ho Yin Yuen, Henry Chan, Victor C. M. Leung, Wei Cai

Applying peer-to-peer (P2P) architecture to online video games has already attracted both academic and industrial interests, since it removes the need for expensive server maintenance. However, there are two major issues preventing the use of a P2P architecture, namely how to provide an effective distributed data storage solution, and how to tackle potential cheating behaviors. Inspired by emerging blockchain techniques, we propose a novel consensus model called Proof-of-Play (PoP) to provide a decentralized data storage system that incorporates an anti-cheating mechanism for P2P games, by rewarding players that interact with the game as intended, along with consideration of security measures to address the Nothing-at-stake Problem and the Long-range Attack. To validate our design, we utilize a game-theory model to show that under certain assumptions, the integrity of the PoP system would not be undermined due to the best interests of any user. Then, as a proof-of-concept, we developed a P2P game (Infinity Battle) to demonstrate how a game can be integrated with PoP in practice. Finally, experiments were conducted to study PoP in comparison with Proof-of-Work (PoW) to show its advantages in various aspects.

将点对点(P2P)架构应用于在线视频游戏已经吸引了学术界和工业界的兴趣,因为它消除了对昂贵的服务器维护的需要。然而,有两个主要问题阻碍了P2P架构的使用,即如何提供有效的分布式数据存储解决方案,以及如何解决潜在的作弊行为。受新兴区块链技术的启发,我们提出了一种新的共识模型,称为游戏证明(PoP),通过奖励与游戏互动的玩家,为P2P游戏提供一个分散的数据存储系统,该系统包含反作弊机制,同时考虑安全措施,以解决无风险问题和远程攻击。为了验证我们的设计,我们利用博弈论模型来证明,在某些假设下,PoP系统的完整性不会因为任何用户的最大利益而受到破坏。然后,作为概念验证,我们开发了一款P2P游戏(Infinity Battle)来演示游戏如何在实践中与PoP相结合。最后,通过实验对PoP与工作量证明(PoW)进行了对比研究,展示了其在各个方面的优势。
{"title":"Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies","authors":"Feijie Wu, Ho Yin Yuen, Henry Chan, Victor C. M. Leung, Wei Cai","doi":"https://dl.acm.org/doi/10.1145/3565884","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3565884","url":null,"abstract":"<p>Applying <b>peer-to-peer (P2P)</b> architecture to online video games has already attracted both academic and industrial interests, since it removes the need for expensive server maintenance. However, there are two major issues preventing the use of a P2P architecture, namely how to provide an effective distributed data storage solution, and how to tackle potential cheating behaviors. Inspired by emerging blockchain techniques, we propose a novel consensus model called <b>Proof-of-Play (PoP)</b> to provide a decentralized data storage system that incorporates an anti-cheating mechanism for P2P games, by rewarding players that interact with the game as intended, along with consideration of security measures to address the Nothing-at-stake Problem and the Long-range Attack. To validate our design, we utilize a game-theory model to show that under certain assumptions, the integrity of the PoP system would not be undermined due to the best interests of any user. Then, as a proof-of-concept, we developed a P2P game (<i>Infinity Battle</i>) to demonstrate how a game can be integrated with PoP in practice. Finally, experiments were conducted to study PoP in comparison with <b>Proof-of-Work (PoW)</b> to show its advantages in various aspects.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations 华尔街的总督:泵和转储加密货币操纵的分析和检测
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-02-23 DOI: https://dl.acm.org/doi/10.1145/3561300
Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa

Cryptocurrencies are increasingly popular. Even people who are not experts have started to invest in these assets, and nowadays, cryptocurrency exchanges process transactions for over 100 billion US dollars per month. Despite this, many cryptocurrencies have low liquidity and are highly prone to market manipulation. This paper performs an in-depth analysis of two market manipulations organized by communities over the Internet: The pump and dump and the crowd pump. The pump and dump scheme is a fraud as old as the stock market. Now, it has new vitality in the loosely regulated market of cryptocurrencies. Groups of highly coordinated people systematically arrange this scam, usually on Telegram and Discord. We monitored these groups for more than 3 years, detecting around 900 individual events. We report on three case studies related to pump and dump groups. We leverage our unique dataset of the verified pump and dumps to build a machine learning model able to detect a pump and dump in 25 seconds from the moment it starts, achieving the results of 94.5% of F1-score. Then, we move on to the crowd pump, a new phenomenon that hit the news in the first months of 2021, when a Reddit community inflated the price of the GameStop stocks (GME) by over 1,900% on Wall Street, the world’s largest stock exchange. Later, other Reddit communities replicated the operation on the cryptocurrency markets. The targets were DogeCoin (DOGE) and Ripple (XRP). We reconstruct how these operations developed and discuss differences and analogies with the standard pump and dump. We believe this study helps understand a widespread phenomenon affecting cryptocurrency markets. The detection algorithms we develop effectively detect these events in real-time and helps investors stay out of the market when these frauds are in action.

加密货币越来越受欢迎。即使不是专家的人也开始投资这些资产,如今,加密货币交易所每月处理的交易超过1000亿美元。尽管如此,许多加密货币的流动性很低,很容易受到市场操纵。本文对两种由互联网上的社区组织的市场操纵行为进行了深入的分析:泵和转储和人群泵。哄抬股价的骗局是一种和股票市场一样古老的骗局。现在,它在监管宽松的加密货币市场中焕发了新的活力。一群高度协调的人系统地安排这种骗局,通常在Telegram和Discord上。我们对这些群体进行了3年多的监测,发现了大约900个单独的事件。我们报告了与泵和转储组相关的三个案例研究。我们利用我们独特的验证泵和转储数据集来构建一个机器学习模型,该模型能够从泵和转储开始的那一刻起在25秒内检测到泵和转储,达到f1分数的94.5%。然后,我们再来看看众筹,这是一个在2021年的头几个月成为新闻热点的新现象,当时Reddit社区将GameStop股票(GME)的价格在全球最大的证券交易所华尔街推高了1900%以上。后来,Reddit的其他社区在加密货币市场上复制了这一操作。目标是狗狗币(DOGE)和Ripple (XRP)。我们重建了这些操作是如何发展的,并讨论了与标准泵和转储的区别和相似之处。我们认为这项研究有助于理解影响加密货币市场的普遍现象。我们开发的检测算法可以实时有效地检测这些事件,并帮助投资者在这些欺诈行为发生时远离市场。
{"title":"The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations","authors":"Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa","doi":"https://dl.acm.org/doi/10.1145/3561300","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3561300","url":null,"abstract":"<p>Cryptocurrencies are increasingly popular. Even people who are not experts have started to invest in these assets, and nowadays, cryptocurrency exchanges process transactions for over 100 billion US dollars per month. Despite this, many cryptocurrencies have low liquidity and are highly prone to market manipulation. This paper performs an in-depth analysis of two market manipulations organized by communities over the Internet: The pump and dump and the crowd pump. The pump and dump scheme is a fraud as old as the stock market. Now, it has new vitality in the loosely regulated market of cryptocurrencies. Groups of highly coordinated people systematically arrange this scam, usually on Telegram and Discord. We monitored these groups for more than 3 years, detecting around 900 individual events. We report on three case studies related to pump and dump groups. We leverage our unique dataset of the verified pump and dumps to build a machine learning model able to detect a pump and dump in 25 seconds from the moment it starts, achieving the results of 94.5% of F1-score. Then, we move on to the crowd pump, a new phenomenon that hit the news in the first months of 2021, when a Reddit community inflated the price of the GameStop stocks (GME) by over 1,900% on Wall Street, the world’s largest stock exchange. Later, other Reddit communities replicated the operation on the cryptocurrency markets. The targets were DogeCoin (DOGE) and Ripple (XRP). We reconstruct how these operations developed and discuss differences and analogies with the standard pump and dump. We believe this study helps understand a widespread phenomenon affecting cryptocurrency markets. The detection algorithms we develop effectively detect these events in real-time and helps investors stay out of the market when these frauds are in action.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts 基于细粒度上下文的动态个性化POI序列推荐
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-02-13 DOI: 10.1145/3583687
Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li
The Point Of Interest (POI) sequence recommendation is the key task in itinerary and travel route planning. Existing works usually consider the temporal and spatial factors in travel planning. However, the external environment, such as the weather, is usually overlooked. In fact, the weather is an important factor because it can affect a user’s check-in behaviors. Furthermore, most of the existing research is based on a static environment for POI sequence recommendation. While the external environment (e.g., the weather) may change during travel, it is difficult for existing works to adjust the POI sequence in time. What’s more, people usually prefer the attractive routes when traveling. To address these issues, we first conduct comprehensive data analysis on two real-world check-in datasets to study the effects of weather and time, as well as the features of the POI sequence. Based on this, we propose a model of Dynamic Personalized POI Sequence Recommendation with fine-grained contexts (DPSR for short). It extracts user interest and POI popularity with fine-grained contexts and captures the attractiveness of the POI sequence. Next, we apply the Monte Carlo Tree Search model (MCTS for short) to simulate the process of recommending POI sequence in the dynamic environment, i.e., the weather and time change after visiting a POI. What’s more, we consider different speeds to reflect the fact that people may take different transportation to transfer between POIs. To validate the efficacy of DPSR, we conduct extensive experiments. The results show that our model can improve the accuracy of the recommendation significantly. Furthermore, it can better meet user preferences and enhance experiences.
兴趣点(POI)序列推荐是行程和旅行路线规划中的关键任务。现有的工作通常会考虑旅行规划中的时间和空间因素。然而,外部环境,如天气,通常被忽视。事实上,天气是一个重要因素,因为它会影响用户的入住行为。此外,现有的大多数研究都是基于POI序列推荐的静态环境。虽然外部环境(例如天气)可能在旅行过程中发生变化,但现有作品很难及时调整POI序列。更重要的是,人们在旅行时通常更喜欢有吸引力的路线。为了解决这些问题,我们首先对两个真实世界的报到数据集进行了全面的数据分析,以研究天气和时间的影响,以及POI序列的特征。在此基础上,我们提出了一个具有细粒度上下文的动态个性化POI序列推荐模型(简称DPSR)。它利用细粒度上下文提取用户兴趣和POI流行度,并捕捉POI序列的吸引力。接下来,我们应用蒙特卡罗树搜索模型(简称MCTS)来模拟在动态环境中推荐POI序列的过程,即访问POI后的天气和时间变化。更重要的是,我们考虑不同的速度,以反映人们在POI之间可能乘坐不同的交通工具进行换乘的事实。为了验证DPSR的有效性,我们进行了广泛的实验。结果表明,我们的模型可以显著提高推荐的准确性。此外,它可以更好地满足用户的偏好,增强体验。
{"title":"Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts","authors":"Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li","doi":"10.1145/3583687","DOIUrl":"https://doi.org/10.1145/3583687","url":null,"abstract":"The Point Of Interest (POI) sequence recommendation is the key task in itinerary and travel route planning. Existing works usually consider the temporal and spatial factors in travel planning. However, the external environment, such as the weather, is usually overlooked. In fact, the weather is an important factor because it can affect a user’s check-in behaviors. Furthermore, most of the existing research is based on a static environment for POI sequence recommendation. While the external environment (e.g., the weather) may change during travel, it is difficult for existing works to adjust the POI sequence in time. What’s more, people usually prefer the attractive routes when traveling. To address these issues, we first conduct comprehensive data analysis on two real-world check-in datasets to study the effects of weather and time, as well as the features of the POI sequence. Based on this, we propose a model of Dynamic Personalized POI Sequence Recommendation with fine-grained contexts (DPSR for short). It extracts user interest and POI popularity with fine-grained contexts and captures the attractiveness of the POI sequence. Next, we apply the Monte Carlo Tree Search model (MCTS for short) to simulate the process of recommending POI sequence in the dynamic environment, i.e., the weather and time change after visiting a POI. What’s more, we consider different speeds to reflect the fact that people may take different transportation to transfer between POIs. To validate the efficacy of DPSR, we conduct extensive experiments. The results show that our model can improve the accuracy of the recommendation significantly. Furthermore, it can better meet user preferences and enhance experiences.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47225148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding MWPoW+:一种用于区块链共享的强共识协议
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-02-13 DOI: 10.1145/3584020
Yibin Xu, Jia-Jung Shao, Tijs Slaats, Boris Düdder
Blockchain sharding splits a blockchain into several shards where consensus is reached at the shard level rather than over the entire blockchain. It improves transaction throughput and reduces the computational resources required of individual nodes. But a derivation of trustworthy consensus within a shard becomes an issue as the longest chain based mechanisms used in conventional blockchains can no longer be used. Instead, a vote-based consensus mechanism must be employed. However, existing vote-based Byzantine fault tolerance consensus protocols do not offer sufficient security guarantees for sharded blockchains. First, when used to support consensus where only one block is allowed at a time (binary consensus), these protocols are susceptible to progress-hindering attacks (i.e., unable to reach a consensus). Second, when used to support a stronger type of consensus where multiple concurrent blocks are allowed (strong consensus), their tolerance of adversary nodes is low. This article proposes a new consensus protocol to address all these issues. We call the new protocol MWPoW+, as its basic framework is based on the existing Multiple Winners Proof of Work (MWPoW) protocol but includes new mechanisms to address the issues mentioned previously. MWPoW+ is a vote-based protocol for strong consensus, asynchronous in consensus derivation but synchronous in communication. We prove that it can tolerate up to f < n/2 adversary nodes in a n-node system as if using a binary consensus protocol and does not suffer from progress-hindering attacks.
区块链分片将区块链拆分为多个分片,在分片级别而不是整个区块链上达成共识。它提高了事务吞吐量,并减少了单个节点所需的计算资源。但是,由于传统区块链中使用的最长的基于链的机制无法再使用,因此在碎片内推导可信的共识成为了一个问题。相反,必须采用基于投票的协商一致机制。然而,现有的基于投票的拜占庭容错共识协议并不能为分块区块链提供足够的安全保障。首先,当用于支持一次只允许一个块的共识(二进制共识)时,这些协议容易受到阻碍进展的攻击(即无法达成共识)。其次,当用于支持允许多个并发块的更强类型的一致性(强一致性)时,它们对对手节点的容忍度较低。本文提出了一个新的协商一致协议来解决所有这些问题。我们将新协议称为MWPoW+,因为其基本框架基于现有的多赢家工作证明(MWPoW)协议,但包括解决前面提到的问题的新机制。MWPoW+是一种基于投票的强一致性协议,在一致性推导中是异步的,但在通信中是同步的。我们证明,在n节点系统中,它可以容忍多达f
{"title":"MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding","authors":"Yibin Xu, Jia-Jung Shao, Tijs Slaats, Boris Düdder","doi":"10.1145/3584020","DOIUrl":"https://doi.org/10.1145/3584020","url":null,"abstract":"Blockchain sharding splits a blockchain into several shards where consensus is reached at the shard level rather than over the entire blockchain. It improves transaction throughput and reduces the computational resources required of individual nodes. But a derivation of trustworthy consensus within a shard becomes an issue as the longest chain based mechanisms used in conventional blockchains can no longer be used. Instead, a vote-based consensus mechanism must be employed. However, existing vote-based Byzantine fault tolerance consensus protocols do not offer sufficient security guarantees for sharded blockchains. First, when used to support consensus where only one block is allowed at a time (binary consensus), these protocols are susceptible to progress-hindering attacks (i.e., unable to reach a consensus). Second, when used to support a stronger type of consensus where multiple concurrent blocks are allowed (strong consensus), their tolerance of adversary nodes is low. This article proposes a new consensus protocol to address all these issues. We call the new protocol MWPoW+, as its basic framework is based on the existing Multiple Winners Proof of Work (MWPoW) protocol but includes new mechanisms to address the issues mentioned previously. MWPoW+ is a vote-based protocol for strong consensus, asynchronous in consensus derivation but synchronous in communication. We prove that it can tolerate up to f < n/2 adversary nodes in a n-node system as if using a binary consensus protocol and does not suffer from progress-hindering attacks.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45019870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Finding the Source in Networks: An Approach Based on Structural Entropy 在网络中寻找源:一种基于结构熵的方法
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-02-06 DOI: 10.1145/3568309
Chong Zhang, Qiang Guo, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Cheng Zhou
The popularity of intelligent devices provides straightforward access to the Internet and online social networks. However, the quick and easy data updates from networks also benefit the risk spreading, such as rumor, malware, or computer viruses. To this end, this article studies the problem of source detection, which is to infer the source node out of an aftermath of a cascade, that is, the observed infected graph GN of the network at some time. Prior arts have adopted various statistical quantities such as degree, distance, or infection size to reflect the structural centrality of the source. In this article, we propose a new metric that we call the infected tree entropy (ITE), to utilize richer underlying structural features for source detection. Our idea of ITE is inspired by the conception of structural entropy [21], which demonstrated that the minimization of average bits to encode the network structures with different partitions is the principle for detecting the natural or true structures in real-world networks. Accordingly, our proposed ITE based estimator for the source tries to minimize the coding of network partitions brought by the infected tree rooted at all the potential sources, thus minimizing the structural deviation between the cascades from the potential sources and the actual infection process included in GN. On polynomially growing geometric trees, with increasing tree heterogeneity, the ITE estimator remarkably yields more reliable detection under only moderate infection sizes, and returns an asymptotically complete detection. In contrast, for regular expanding trees, we still observe guaranteed detection probability of ITE estimator even with an infinite infection size, thanks to the degree regularity property. We also algorithmically realize the ITE based detection that enjoys linear time complexity via a message-passing scheme, and further extend it to general graphs. Extensive experiments on synthetic and real datasets confirm the superiority of ITE to the baselines. For example, ITE returns an accuracy of 85%, ranking the source among the top 10%, far exceeding 55% of the classic algorithm on scale-free networks.
智能设备的普及提供了直接访问互联网和在线社交网络的途径。然而,网络上快速便捷的数据更新也有利于风险的传播,如谣言、恶意软件或计算机病毒。为此,本文研究了源检测问题,即从级联的余波中推断出源节点,即从某一时刻观察到的网络感染图GN中推断出源节点。现有技术采用了各种统计量,如程度、距离或感染大小来反映源的结构中心性。在本文中,我们提出了一种新的度量,我们称之为感染树熵(ITE),以利用更丰富的底层结构特征进行源检测。我们的ITE思想受到结构熵[21]概念的启发,该概念证明了对不同分区的网络结构进行编码的平均比特的最小化是检测现实世界网络中自然或真实结构的原则。因此,我们提出的基于ITE的源估计器试图最小化扎根于所有潜在源的感染树所带来的网络分区编码,从而最小化来自潜在源的级联与GN中包含的实际感染过程之间的结构偏差。在多项式生长的几何树上,随着树异质性的增加,ITE估计器在中等感染规模下显著地产生更可靠的检测,并返回渐近完全检测。相比之下,对于规则扩展树,由于程度正则性,即使感染规模无限,我们仍然观察到ITE估计器的检测概率是有保证的。我们还通过消息传递方案算法实现了具有线性时间复杂度的基于ITE的检测,并将其进一步扩展到一般图中。在合成数据集和真实数据集上进行的大量实验证实了ITE相对于基线的优越性。例如,ITE返回的准确率为85%,将源排在前10%,远远超过无标度网络上经典算法的55%。
{"title":"Finding the Source in Networks: An Approach Based on Structural Entropy","authors":"Chong Zhang, Qiang Guo, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Cheng Zhou","doi":"10.1145/3568309","DOIUrl":"https://doi.org/10.1145/3568309","url":null,"abstract":"The popularity of intelligent devices provides straightforward access to the Internet and online social networks. However, the quick and easy data updates from networks also benefit the risk spreading, such as rumor, malware, or computer viruses. To this end, this article studies the problem of source detection, which is to infer the source node out of an aftermath of a cascade, that is, the observed infected graph GN of the network at some time. Prior arts have adopted various statistical quantities such as degree, distance, or infection size to reflect the structural centrality of the source. In this article, we propose a new metric that we call the infected tree entropy (ITE), to utilize richer underlying structural features for source detection. Our idea of ITE is inspired by the conception of structural entropy [21], which demonstrated that the minimization of average bits to encode the network structures with different partitions is the principle for detecting the natural or true structures in real-world networks. Accordingly, our proposed ITE based estimator for the source tries to minimize the coding of network partitions brought by the infected tree rooted at all the potential sources, thus minimizing the structural deviation between the cascades from the potential sources and the actual infection process included in GN. On polynomially growing geometric trees, with increasing tree heterogeneity, the ITE estimator remarkably yields more reliable detection under only moderate infection sizes, and returns an asymptotically complete detection. In contrast, for regular expanding trees, we still observe guaranteed detection probability of ITE estimator even with an infinite infection size, thanks to the degree regularity property. We also algorithmically realize the ITE based detection that enjoys linear time complexity via a message-passing scheme, and further extend it to general graphs. Extensive experiments on synthetic and real datasets confirm the superiority of ITE to the baselines. For example, ITE returns an accuracy of 85%, ranking the source among the top 10%, far exceeding 55% of the classic algorithm on scale-free networks.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42896656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Movie Account Recommendation on Instagram 推荐Instagram上的电影账号
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-01-13 DOI: 10.1145/3579852
Yu-Jhen Wang, Anthony J. T. Lee
With the increasing popularity of social networks, many businesses have started implementing their branding or targeted advertising strategies to reach potential customers through social media platforms. It is desirable and essential to help businesses to reach mass audiences and assist users to find favorite business accounts on social media platforms. In the movie industry, movie companies often create business accounts (movie accounts) to promote their movies and capture the attention of followers on Instagram. Instagram contains rich information about movies and user feedback, while IMDb, one of the most popular online databases, contains well-organized information related to movies. The features extracted from the data collected from Instagram and IMDb can complement each other. Therefore, in this study, we propose a framework for recommending movie accounts to users on Instagram by using the data collected from Instagram and IMDb platforms. The experiment results show that our proposed framework outperforms the comparing methods in terms of precision, recall, F1-score, and Normalized Discounted Cumulative Gain (NDCG), and mitigates the effect of cold start problems. The proposed framework can help movie companies or businesses reach potential audiences and implement effective targeted advertising strategies.
随着社交网络的日益普及,许多企业已经开始实施他们的品牌或有针对性的广告策略,通过社交媒体平台接触潜在客户。帮助企业接触大众受众,帮助用户在社交媒体平台上找到喜欢的企业账户,这是可取的,也是必不可少的。在电影行业,电影公司经常在Instagram上创建商业账号(电影账号)来宣传自己的电影,吸引粉丝的关注。Instagram包含丰富的电影信息和用户反馈,而IMDb是最受欢迎的在线数据库之一,包含了组织良好的电影相关信息。从Instagram和IMDb收集的数据中提取的特征可以互补。因此,在本研究中,我们利用从Instagram和IMDb平台收集的数据,提出了一个向Instagram用户推荐电影账户的框架。实验结果表明,该框架在查全率、查全率、f1分数和归一化贴现累积增益(NDCG)等方面优于其他方法,并减轻了冷启动问题的影响。所提出的框架可以帮助电影公司或企业接触到潜在的观众,并实施有效的定向广告策略。
{"title":"Movie Account Recommendation on Instagram","authors":"Yu-Jhen Wang, Anthony J. T. Lee","doi":"10.1145/3579852","DOIUrl":"https://doi.org/10.1145/3579852","url":null,"abstract":"With the increasing popularity of social networks, many businesses have started implementing their branding or targeted advertising strategies to reach potential customers through social media platforms. It is desirable and essential to help businesses to reach mass audiences and assist users to find favorite business accounts on social media platforms. In the movie industry, movie companies often create business accounts (movie accounts) to promote their movies and capture the attention of followers on Instagram. Instagram contains rich information about movies and user feedback, while IMDb, one of the most popular online databases, contains well-organized information related to movies. The features extracted from the data collected from Instagram and IMDb can complement each other. Therefore, in this study, we propose a framework for recommending movie accounts to users on Instagram by using the data collected from Instagram and IMDb platforms. The experiment results show that our proposed framework outperforms the comparing methods in terms of precision, recall, F1-score, and Normalized Discounted Cumulative Gain (NDCG), and mitigates the effect of cold start problems. The proposed framework can help movie companies or businesses reach potential audiences and implement effective targeted advertising strategies.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43478361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript 《绝命毒师:量化Web元素对JavaScript的依赖
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-01-12 DOI: 10.1145/3579846
Romain Fouquet, Pierre Laperdrix, Romain Rouvoy
While JavaScript established itself as a cornerstone of the modern web, it also constitutes a major tracking and security vector, thus raising critical privacy and security concerns. In this context, some browser extensions propose to systematically block scripts reported by crowdsourced trackers lists. However, this solution heavily depends on the quality of these built-in lists, which may be deprecated or incomplete, thus exposing the visitor to unknown trackers. In this article, we explore a different strategy by investigating the benefits of disabling JavaScript in the browser. More specifically, by adopting such a strict policy, we aim to quantify the JavaScript addiction of web elements composing a web page through the observation of web breakages. As there is no standard mechanism for detecting such breakages, we introduce a framework to inspect several page features when blocking JavaScript, that we deploy to analyze 6,384 pages, including landing and internal web pages. We discover that 43% of web pages are not strictly dependent on JavaScript and that more than 67% of pages are likely to be usable as long as the visitor only requires the content from the main section of the page, for which the user most likely reached the page, while reducing the number of tracking requests by 85% on average. Finally, we discuss the viability of currently browsing the web without JavaScript and detail multiple incentives for websites to be kept usable without JavaScript.
虽然JavaScript将自己确立为现代网络的基石,但它也构成了主要的跟踪和安全向量,因此引发了关键的隐私和安全问题。在这种情况下,一些浏览器扩展建议系统地阻止由众包跟踪列表报告的脚本。然而,这个解决方案在很大程度上依赖于这些内置列表的质量,这些列表可能被弃用或不完整,从而将访问者暴露给未知的跟踪器。在本文中,我们通过研究在浏览器中禁用JavaScript的好处来探索另一种策略。更具体地说,通过采用如此严格的策略,我们的目标是通过观察网页破坏来量化组成网页的web元素的JavaScript成瘾程度。由于没有检测此类破坏的标准机制,我们引入了一个框架,在阻止JavaScript时检查几个页面特性,我们部署该框架来分析6384个页面,包括登陆页面和内部网页。我们发现,43%的网页并不严格依赖于JavaScript,超过67%的网页可能是可用的,只要访问者只需要页面的主要部分的内容,用户最有可能到达的页面,同时减少了85%的跟踪请求的数量平均。最后,我们讨论了目前在没有JavaScript的情况下浏览网页的可行性,并详细介绍了在没有JavaScript的情况下保持网站可用性的多种激励措施。
{"title":"Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript","authors":"Romain Fouquet, Pierre Laperdrix, Romain Rouvoy","doi":"10.1145/3579846","DOIUrl":"https://doi.org/10.1145/3579846","url":null,"abstract":"While JavaScript established itself as a cornerstone of the modern web, it also constitutes a major tracking and security vector, thus raising critical privacy and security concerns. In this context, some browser extensions propose to systematically block scripts reported by crowdsourced trackers lists. However, this solution heavily depends on the quality of these built-in lists, which may be deprecated or incomplete, thus exposing the visitor to unknown trackers. In this article, we explore a different strategy by investigating the benefits of disabling JavaScript in the browser. More specifically, by adopting such a strict policy, we aim to quantify the JavaScript addiction of web elements composing a web page through the observation of web breakages. As there is no standard mechanism for detecting such breakages, we introduce a framework to inspect several page features when blocking JavaScript, that we deploy to analyze 6,384 pages, including landing and internal web pages. We discover that 43% of web pages are not strictly dependent on JavaScript and that more than 67% of pages are likely to be usable as long as the visitor only requires the content from the main section of the page, for which the user most likely reached the page, while reducing the number of tracking requests by 85% on average. Finally, we discuss the viability of currently browsing the web without JavaScript and detail multiple incentives for websites to be kept usable without JavaScript.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64063297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures 网络制造系统对级联故障的容忍度分析
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-01-12 DOI: 10.1145/3579847
Xiuwen Fu, P. Pace, G. Aloi, A. Guerrieri, Wenfeng Li, G. Fortino
In practical cyber-manufacturing systems (CMS), the node component is the forwarder of information and the provider of services. This dual role makes the whole system have the typical physical-services interaction characteristic, making CMS more vulnerable to cascading failures than general manufacturing systems. In this work, in order to reasonably characterize the cascading process of CMS, we first develop an interdependent network model for CMS from a physical-service networking perspective. On this basis, a realistic cascading failure model for CMS is designed with full consideration of the routing-oriented load distribution characteristics of the physical network and selective load distribution characteristics of the service network. Through extensive experiments, the soundness of the proposed model has been verified and some meaningful findings have been obtained: 1) attacks on the physical network are more likely to trigger cascading failures and may cause more damage; 2) interdependency failures are the main cause of performance degradation in the service network during cascading failures; 3) isolation failures are the main cause of performance degradation in the physical network during cascading failures. The obtained results can certainly help users to design a more reliable CMS against cascading failures.
在实际的网络制造系统(CMS)中,节点组件是信息的转发器和服务的提供者。这种双重作用使整个系统具有典型的物理服务交互特性,使CMS比一般制造系统更容易受到级联故障的影响。在这项工作中,为了合理地描述CMS的级联过程,我们首先从物理服务网络的角度为CMS开发了一个相互依赖的网络模型。在此基础上,充分考虑了物理网络面向路由的负载分布特性和服务网络的选择性负载分布特性,设计了一个实用的CMS级联故障模型。通过大量实验,验证了所提出模型的可靠性,并获得了一些有意义的发现:1)对物理网络的攻击更有可能引发级联故障,并可能造成更大的破坏;2) 在级联故障过程中,相互依赖故障是导致服务网络性能下降的主要原因;3) 在级联故障期间,隔离故障是物理网络性能下降的主要原因。所获得的结果当然可以帮助用户设计一个更可靠的CMS来应对级联故障。
{"title":"Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures","authors":"Xiuwen Fu, P. Pace, G. Aloi, A. Guerrieri, Wenfeng Li, G. Fortino","doi":"10.1145/3579847","DOIUrl":"https://doi.org/10.1145/3579847","url":null,"abstract":"In practical cyber-manufacturing systems (CMS), the node component is the forwarder of information and the provider of services. This dual role makes the whole system have the typical physical-services interaction characteristic, making CMS more vulnerable to cascading failures than general manufacturing systems. In this work, in order to reasonably characterize the cascading process of CMS, we first develop an interdependent network model for CMS from a physical-service networking perspective. On this basis, a realistic cascading failure model for CMS is designed with full consideration of the routing-oriented load distribution characteristics of the physical network and selective load distribution characteristics of the service network. Through extensive experiments, the soundness of the proposed model has been verified and some meaningful findings have been obtained: 1) attacks on the physical network are more likely to trigger cascading failures and may cause more damage; 2) interdependency failures are the main cause of performance degradation in the service network during cascading failures; 3) isolation failures are the main cause of performance degradation in the physical network during cascading failures. The obtained results can certainly help users to design a more reliable CMS against cascading failures.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48427794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enabling Short-Term Energy Flexibility Markets Through Blockchain 通过bbb实现短期能源灵活性市场
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2022-12-12 DOI: 10.1145/3542949
Michell Boerger, Philipp Lämmel, Nikolay Tcholtchev, M. Hauswirth
Climate change has put significant pressure on energy markets. Political decisions such as the plan of the German government to shut down coal power plants by 2038 are shifting electricity production towards renewable and distributed energy resources. The share of these resources will continue to grow significantly in the coming years. This trend changes the ways how energy markets work which mandates fundamental changes in the underlying IT infrastructure. In this paper, we propose a blockchain-based solution which enables an economically viable and grid-serving integration of distributed energy resources into the existing energy system. Our blockchain-based approach targets intraday and day-ahead operating reserve markets, on which energy grid operators and operators of distributed energy resources can trade flexibilities within the schedulable energy production and consumption of their resources. By utilizing these flexibilities as an operating reserve, renewable and climate-friendly technologies can contribute to maintaining the grid stability and security of supply while simultaneously creating economically interesting business models for their operators. We propose to define blockchain-based short-term energy markets by utilizing the concept of general-purpose smart contracts and cryptocurrencies. This enables direct and decentralized trading of energy flexibilities without any intermediary or central instance. We demonstrate the feasibility of our approach through an implementation of a prototype of the proposed markets based on the Ethereum blockchain and provide a detailed evaluation of its efficiency and scalability.
气候变化给能源市场带来了巨大压力。德国政府计划在2038年前关闭燃煤电厂等政治决策,正在将电力生产转向可再生能源和分布式能源。这些资源的份额在未来几年将继续显著增长。这一趋势改变了能源市场的运作方式,要求对底层IT基础设施进行根本性的改变。在本文中,我们提出了一种基于区块链的解决方案,该解决方案能够将分布式能源整合到现有的能源系统中,从而实现经济上可行的并网服务。我们基于区块链的方法针对当日和日前运营储备市场,在这个市场上,能源电网运营商和分布式能源运营商可以在可调度的能源生产和资源消耗范围内交易灵活性。通过利用这些灵活性作为运营储备,可再生能源和气候友好型技术可以有助于维护电网的稳定性和供应安全,同时为运营商创造经济上有趣的商业模式。我们建议利用通用智能合约和加密货币的概念来定义基于区块链的短期能源市场。这使得能源灵活性的直接和分散交易无需任何中介或中心实例。我们通过实施基于以太坊区块链的拟议市场原型来证明我们方法的可行性,并对其效率和可扩展性进行了详细评估。
{"title":"Enabling Short-Term Energy Flexibility Markets Through Blockchain","authors":"Michell Boerger, Philipp Lämmel, Nikolay Tcholtchev, M. Hauswirth","doi":"10.1145/3542949","DOIUrl":"https://doi.org/10.1145/3542949","url":null,"abstract":"Climate change has put significant pressure on energy markets. Political decisions such as the plan of the German government to shut down coal power plants by 2038 are shifting electricity production towards renewable and distributed energy resources. The share of these resources will continue to grow significantly in the coming years. This trend changes the ways how energy markets work which mandates fundamental changes in the underlying IT infrastructure. In this paper, we propose a blockchain-based solution which enables an economically viable and grid-serving integration of distributed energy resources into the existing energy system. Our blockchain-based approach targets intraday and day-ahead operating reserve markets, on which energy grid operators and operators of distributed energy resources can trade flexibilities within the schedulable energy production and consumption of their resources. By utilizing these flexibilities as an operating reserve, renewable and climate-friendly technologies can contribute to maintaining the grid stability and security of supply while simultaneously creating economically interesting business models for their operators. We propose to define blockchain-based short-term energy markets by utilizing the concept of general-purpose smart contracts and cryptocurrencies. This enables direct and decentralized trading of energy flexibilities without any intermediary or central instance. We demonstrate the feasibility of our approach through an implementation of a prototype of the proposed markets based on the Ethereum blockchain and provide a detailed evaluation of its efficiency and scalability.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41369045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1