首页 > 最新文献

Information Sciences最新文献

英文 中文
The criterion-oriented three-way decision models with generalized risk function 具有广义风险函数的面向准则的三向决策模型
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-31 DOI: 10.1016/j.ins.2026.123179
Xia Lin , Kai Zhang , Ligang Zhou
The criterion-oriented three-way decision model is an effective tool for simultaneously obtaining preference ranking results and three-way classification results in a multi-criteria environment. In view of this, this paper attempts to analyze the research framework of criterion-oriented three-way decision models from the perspective of four different generalized risk functions, which provides a valuable way to obtain both preference ranking results and three-way classification results in multi-criteria decision-making. Firstly, based on a criterion-oriented benefit fuzzy concept, this paper employs a generalized risk function (comprising both the relative loss and relative utility functions) to analyze decision threshold construction and develop two types of three-way decision models based on criterion-oriented benefit fuzzy concepts. Then, by comparing the criterion-oriented benefit fuzzy concept and considering practical semantics, this paper introduces the criterion-oriented cost fuzzy concept. Building on this, utilizing the relative loss and relative utility functions, two types of three-way decision models are proposed based on the criterion-oriented cost fuzzy concept. The relationships and distinctions among the four proposed three-way decision models are then analyzed in detail. The results reveal that, in different three-way decision models, when the monotonic increasing function f and the monotonic decreasing function g respectively retain the same value, the four types of risk functions exhibit the following regularities: α1=α2,α3=α4, β1=β2,β3=β4, γ1=γ2,γ3=γ4, α1+β3=1,γ1+γ3=1. Finally, using a specific relative risk function, this paper demonstrates the effectiveness of the proposed models through case studies and related discussions.
面向准则的三向决策模型是在多准则环境下同时获得偏好排序结果和三向分类结果的有效工具。鉴于此,本文尝试从四种不同的广义风险函数角度分析面向准则的三向决策模型的研究框架,为多准则决策中获得偏好排序结果和三向分类结果提供了有价值的途径。首先,基于面向准则的效益模糊概念,采用广义风险函数(包括相对损失函数和相对效用函数)分析决策阈值的构建,建立了基于面向准则的效益模糊概念的两类三向决策模型。然后,在比较了面向准则的效益模糊概念的基础上,结合实际语义,引入了面向准则的成本模糊概念。在此基础上,利用相对损失函数和相对效用函数,提出了基于面向准则的成本模糊概念的两类三向决策模型。然后详细分析了这四种三向决策模型之间的关系和区别。结果表明,在不同的三向决策模型中,当单调递增函数f和单调递减函数g分别保持相同的值时,四类风险函数呈现如下规律:α1=α2,α3=α4, β1=β2,β3=β4, γ1=γ2,γ3=γ4, α1+β3=1,γ1+γ3=1。最后,利用特定的相对风险函数,通过案例分析和相关讨论验证了所提模型的有效性。
{"title":"The criterion-oriented three-way decision models with generalized risk function","authors":"Xia Lin ,&nbsp;Kai Zhang ,&nbsp;Ligang Zhou","doi":"10.1016/j.ins.2026.123179","DOIUrl":"10.1016/j.ins.2026.123179","url":null,"abstract":"<div><div>The criterion-oriented three-way decision model is an effective tool for simultaneously obtaining preference ranking results and three-way classification results in a multi-criteria environment. In view of this, this paper attempts to analyze the research framework of criterion-oriented three-way decision models from the perspective of four different generalized risk functions, which provides a valuable way to obtain both preference ranking results and three-way classification results in multi-criteria decision-making. Firstly, based on a criterion-oriented benefit fuzzy concept, this paper employs a generalized risk function (comprising both the relative loss and relative utility functions) to analyze decision threshold construction and develop two types of three-way decision models based on criterion-oriented benefit fuzzy concepts. Then, by comparing the criterion-oriented benefit fuzzy concept and considering practical semantics, this paper introduces the criterion-oriented cost fuzzy concept. Building on this, utilizing the relative loss and relative utility functions, two types of three-way decision models are proposed based on the criterion-oriented cost fuzzy concept. The relationships and distinctions among the four proposed three-way decision models are then analyzed in detail. The results reveal that, in different three-way decision models, when the monotonic increasing function <span><math><mi>f</mi></math></span> and the monotonic decreasing function <span><math><mi>g</mi></math></span> respectively retain the same value, the four types of risk functions exhibit the following regularities: <span><math><msub><mrow><mi>α</mi></mrow><mn>1</mn></msub><mo>=</mo><msub><mrow><mi>α</mi></mrow><mn>2</mn></msub><mo>,</mo><msub><mrow><mi>α</mi></mrow><mn>3</mn></msub><mo>=</mo><msub><mrow><mi>α</mi></mrow><mn>4</mn></msub></math></span>, <span><math><msub><mrow><mi>β</mi></mrow><mn>1</mn></msub><mo>=</mo><msub><mrow><mi>β</mi></mrow><mn>2</mn></msub><mo>,</mo><msub><mrow><mi>β</mi></mrow><mn>3</mn></msub><mo>=</mo><msub><mrow><mi>β</mi></mrow><mn>4</mn></msub></math></span>, <span><math><msub><mrow><mi>γ</mi></mrow><mn>1</mn></msub><mo>=</mo><msub><mrow><mi>γ</mi></mrow><mn>2</mn></msub><mo>,</mo><msub><mrow><mi>γ</mi></mrow><mn>3</mn></msub><mo>=</mo><msub><mrow><mi>γ</mi></mrow><mn>4</mn></msub></math></span>, <span><math><msub><mrow><mi>α</mi></mrow><mn>1</mn></msub><mo>+</mo><msub><mrow><mi>β</mi></mrow><mn>3</mn></msub><mo>=</mo><mn>1</mn><mo>,</mo><msub><mrow><mi>γ</mi></mrow><mn>1</mn></msub><mo>+</mo><msub><mrow><mi>γ</mi></mrow><mn>3</mn></msub><mo>=</mo><mn>1.</mn></math></span> Finally, using a specific relative risk function, this paper demonstrates the effectiveness of the proposed models through case studies and related discussions.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123179"},"PeriodicalIF":6.8,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient privacy-preserving sparse matrix-vector multiplication using homomorphic encryption 使用同态加密的高效隐私保护稀疏矩阵向量乘法
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-31 DOI: 10.1016/j.ins.2026.123180
Yang Gao , Gang Quan , Wujie Wen , Scott Piersall , Qian Lou , Liqiang Wang
Sparse matrix–vector multiplication (SpMV) is a fundamental operation in scientific computing, data analysis, and machine learning. When the data being processed are sensitive, preserving privacy becomes critical, and homomorphic encryption (HE) has emerged as a leading approach for addressing this challenge. Although HE enables privacy-preserving computation, its application to SpMV has remained largely unaddressed. To the best of our knowledge, this paper presents the first framework that efficiently integrates HE with SpMV, addressing the dual challenges of computational efficiency and data privacy. In particular, we introduce a novel compressed matrix format, named Compressed Sparse Sorted Column (CSSC), which is specifically designed to optimize encrypted sparse matrix computations. By preserving sparsity and enabling efficient ciphertext packing, CSSC significantly reduces storage and computational overhead. Our experimental results on real-world datasets demonstrate that the proposed method achieves significant gains in both processing time and memory usage. This study advances privacy-preserving SpMV and lays the groundwork for secure applications in federated learning, encrypted databases, and scientific computing, beyond.
稀疏矩阵向量乘法(SpMV)是科学计算、数据分析和机器学习中的基本运算。当处理的数据非常敏感时,保护隐私就变得至关重要,同态加密(HE)已经成为解决这一挑战的主要方法。尽管HE实现了隐私保护计算,但其在SpMV中的应用在很大程度上仍未得到解决。据我们所知,本文提出了第一个有效集成HE与SpMV的框架,解决了计算效率和数据隐私的双重挑战。特别地,我们引入了一种新的压缩矩阵格式,称为压缩稀疏排序列(CSSC),它专门用于优化加密稀疏矩阵计算。通过保持稀疏性和支持有效的密文打包,CSSC显著降低了存储和计算开销。我们在真实数据集上的实验结果表明,所提出的方法在处理时间和内存使用方面都取得了显著的进步。这项研究推进了保护隐私的SpMV,并为联邦学习、加密数据库和科学计算等领域的安全应用奠定了基础。
{"title":"Efficient privacy-preserving sparse matrix-vector multiplication using homomorphic encryption","authors":"Yang Gao ,&nbsp;Gang Quan ,&nbsp;Wujie Wen ,&nbsp;Scott Piersall ,&nbsp;Qian Lou ,&nbsp;Liqiang Wang","doi":"10.1016/j.ins.2026.123180","DOIUrl":"10.1016/j.ins.2026.123180","url":null,"abstract":"<div><div>Sparse matrix–vector multiplication (SpMV) is a fundamental operation in scientific computing, data analysis, and machine learning. When the data being processed are sensitive, preserving privacy becomes critical, and homomorphic encryption (HE) has emerged as a leading approach for addressing this challenge. Although HE enables privacy-preserving computation, its application to SpMV has remained largely unaddressed. To the best of our knowledge, this paper presents the first framework that efficiently integrates HE with SpMV, addressing the dual challenges of computational efficiency and data privacy. In particular, we introduce a novel compressed matrix format, named Compressed Sparse Sorted Column (CSSC), which is specifically designed to optimize encrypted sparse matrix computations. By preserving sparsity and enabling efficient ciphertext packing, CSSC significantly reduces storage and computational overhead. Our experimental results on real-world datasets demonstrate that the proposed method achieves significant gains in both processing time and memory usage. This study advances privacy-preserving SpMV and lays the groundwork for secure applications in federated learning, encrypted databases, and scientific computing, beyond.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123180"},"PeriodicalIF":6.8,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond static cues: Detecting fine-grained forgeries via temporal inconsistencies in facial dynamics 超越静态线索:通过面部动态的时间不一致性检测细粒度伪造
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-30 DOI: 10.1016/j.ins.2026.123165
Peixu Zhang , Mohan Zhang , Tongyu Wang , Xinyu Yang
Fine-grained facial attribute editing represents a new frontier in deepfake technology, creating hyper-realistic forgeries that evade traditional detection methods by preserving identity and motion consistency. This subtlety poses a dual challenge: existing detectors, tuned for coarse artifacts, are rendered ineffective, and research is hampered by the absence of dedicated benchmark datasets. This paper argues that the key to unmasking these fine-grained forgeries lies not in static appearance, but in the temporal inconsistencies of underlying facial dynamics. To catalyze research in this area, we introduce EditForge, the first large-scale video dataset focused specifically on fine-grained facial attribute editing. Our analysis confirms that dynamic signals provide a powerful forensic trace that is consistently disrupted during the fine-grained forgery process. Building on this insight, we propose Fine-grained Forgery Mamba (F2-Mamba), a novel multimodal detection framework. F2-Mamba synergistically models features from facial dynamics, static appearance, and audio, employing robust alignment mechanisms and a Bi-Mamba architecture to efficiently capture long-range, cross-modal temporal dependencies. Extensive experiments validate that F2-Mamba establishes a new state-of-the-art, achieving area under the ROC curve (AUC) of 99.0% on fine-grained forgeries. This performance signals a paradigm shift towards behavior-based, dynamic analysis, significantly raising the bar for future forgery generation.
细粒度的面部属性编辑代表了深度伪造技术的新前沿,通过保持身份和运动一致性来创建超逼真的伪造物,逃避传统的检测方法。这种微妙之处带来了双重挑战:现有的针对粗糙工件进行调优的检测器变得无效,并且由于缺乏专用基准数据集而阻碍了研究。本文认为,揭露这些细粒度伪造的关键不在于静态外观,而在于潜在的面部动态的时间不一致性。为了促进这一领域的研究,我们引入了EditForge,这是第一个专门针对细粒度面部属性编辑的大规模视频数据集。我们的分析证实,动态信号提供了强大的法医痕迹,在细粒度伪造过程中一直被破坏。基于这一见解,我们提出了细粒度伪造曼巴(f2 -曼巴),一种新的多模态检测框架。F2-Mamba协同建模面部动态、静态外观和音频的特征,采用强大的对齐机制和Bi-Mamba架构来有效地捕获远程、跨模态的时间依赖性。大量的实验证实,F2-Mamba建立了一种新的最先进的技术,在细粒度伪造品上实现了99.0%的ROC曲线下面积(AUC)。这种表现标志着向基于行为的动态分析的范式转变,大大提高了未来伪造的标准。
{"title":"Beyond static cues: Detecting fine-grained forgeries via temporal inconsistencies in facial dynamics","authors":"Peixu Zhang ,&nbsp;Mohan Zhang ,&nbsp;Tongyu Wang ,&nbsp;Xinyu Yang","doi":"10.1016/j.ins.2026.123165","DOIUrl":"10.1016/j.ins.2026.123165","url":null,"abstract":"<div><div>Fine-grained facial attribute editing represents a new frontier in deepfake technology, creating hyper-realistic forgeries that evade traditional detection methods by preserving identity and motion consistency. This subtlety poses a dual challenge: existing detectors, tuned for coarse artifacts, are rendered ineffective, and research is hampered by the absence of dedicated benchmark datasets. This paper argues that the key to unmasking these fine-grained forgeries lies not in static appearance, but in the temporal inconsistencies of underlying facial dynamics. To catalyze research in this area, we introduce EditForge, the first large-scale video dataset focused specifically on fine-grained facial attribute editing. Our analysis confirms that dynamic signals provide a powerful forensic trace that is consistently disrupted during the fine-grained forgery process. Building on this insight, we propose Fine-grained Forgery Mamba (F<sup>2</sup>-Mamba), a novel multimodal detection framework. F<sup>2</sup>-Mamba synergistically models features from facial dynamics, static appearance, and audio, employing robust alignment mechanisms and a Bi-Mamba architecture to efficiently capture long-range, cross-modal temporal dependencies. Extensive experiments validate that F<sup>2</sup>-Mamba establishes a new state-of-the-art, achieving area under the ROC curve (AUC) of 99.0% on fine-grained forgeries. This performance signals a paradigm shift towards behavior-based, dynamic analysis, significantly raising the bar for future forgery generation.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123165"},"PeriodicalIF":6.8,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and performance analysis of Epsilon-Greedy optimization strategy in quantum link selection Epsilon-Greedy优化策略在量子链路选择中的应用及性能分析
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-30 DOI: 10.1016/j.ins.2026.123176
Liang Huang, Jihao Fan
We investigate the optimal selection of high-fidelity quantum links that can preserve fragile quantum states during information transmission. However, uniformly estimating the fidelities of all links becomes prohibitively costly in large-scale networks with numerous noisy connections. To overcome this limitation, we recast link selection and fidelity inference as an optimal-action discovery task within a reinforcement learning framework. Subsequently, we propose an algorithm termed Epsilon-Greedy Quantum Link Selection (EGreedyQLiS). This algorithm effectively identifies the optimal link among numerous quantum links and provides accurate fidelity estimates with a low consumption of quantum resources. EGreedyQLiS infers link fidelities using observations obtained from a standard network benchmarking procedure and greedily optimizes link selection during the fidelity estimation procedure. This optimization strategy concentrates quantum resources on estimating high-fidelity links, thereby providing accurate fidelity estimation for these links. The results of extensive simulations demonstrate that EGreedyQLiS exceeds existing approaches in optimal link identification with reduced quantum resource overhead.
我们研究了高保真量子链路的最佳选择,可以在信息传输过程中保持脆弱的量子态。然而,在具有大量噪声连接的大规模网络中,统一估计所有链路的保真度变得非常昂贵。为了克服这一限制,我们将链接选择和保真度推理重新定义为强化学习框架内的最优行为发现任务。随后,我们提出了一种称为Epsilon-Greedy量子链路选择(EGreedyQLiS)的算法。该算法在众多量子链路中有效地识别出最优链路,并以较低的量子资源消耗提供准确的保真度估计。EGreedyQLiS使用从标准网络基准测试过程中获得的观察结果推断链路保真度,并在保真度估计过程中贪婪地优化链路选择。该优化策略将量子资源集中在高保真链路的估计上,从而为高保真链路提供准确的估计。大量的仿真结果表明,EGreedyQLiS在减少量子资源开销的情况下优于现有的最优链路识别方法。
{"title":"Application and performance analysis of Epsilon-Greedy optimization strategy in quantum link selection","authors":"Liang Huang,&nbsp;Jihao Fan","doi":"10.1016/j.ins.2026.123176","DOIUrl":"10.1016/j.ins.2026.123176","url":null,"abstract":"<div><div>We investigate the optimal selection of <em>high-fidelity</em> quantum links that can preserve fragile quantum states during information transmission. However, uniformly estimating the fidelities of all links becomes prohibitively costly in large-scale networks with numerous noisy connections. To overcome this limitation, we recast link selection and fidelity inference as an optimal-action discovery task within a reinforcement learning framework. Subsequently, we propose an algorithm termed Epsilon-Greedy Quantum Link Selection (EGreedyQLiS). This algorithm effectively identifies the optimal link among numerous quantum links and provides accurate fidelity estimates with a low consumption of quantum resources. EGreedyQLiS infers link fidelities using observations obtained from a standard <em>network benchmarking</em> procedure and greedily optimizes link selection during the fidelity estimation procedure. This optimization strategy concentrates quantum resources on estimating high-fidelity links, thereby providing accurate fidelity estimation for these links. The results of extensive simulations demonstrate that EGreedyQLiS exceeds existing approaches in optimal link identification with reduced quantum resource overhead.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123176"},"PeriodicalIF":6.8,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADAPT-DPoS: Data-driven producer selection in delegated proof of stake ADAPT-DPoS:委托权益证明中的数据驱动生产者选择
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-30 DOI: 10.1016/j.ins.2026.123178
Yong Liu , Wenhao Luo , Guangxia Xu
Delegated Proof of Stake (DPoS) is widely used in public blockchains, but static, vote-centric election rules struggle to cope with heterogeneous wide-area networks and evolving attack strategies. Producers are often chosen mainly by stake, with little regard for real-time operational quality, leading to performance bottlenecks, stake plutocracy, and unstable committees. We present ADAPT-DPoS, a dynamic, data-driven framework that casts producer selection as a multi-attribute decision-making problem. It combines entropy- and SHAP-based dynamic weighting, a two-phase TOPSIS–PROMETHEE II ranking pipeline, and an adaptive producer-count controller driven by transaction load, candidate-pool quality, and latency signals. Experiments on a heterogeneous WAN testbed with geographically distributed nodes show that, under a strict P99 latency bound of 1 s, ADAPT-DPoS drives latency-bounded throughput close to the physical limit of the deployment and achieves about 64% higher LBT than vanilla DPoS (798 vs. 486 TPS in S0). Under adversarial stress, it reduces block misses by 88% (MR: 9.69%1.15%) and substantially improves decentralization and reward–contribution alignment (Nakamoto: 5.4114.89; RCA: 0.240.86), demonstrating that MADM-based, feedback-driven design can significantly enhance DPoS-style consensus.
委托权益证明(DPoS)广泛应用于公共区块链,但静态的、以投票为中心的选举规则难以应对异构广域网和不断发展的攻击策略。生产商通常主要是通过股份来选择的,很少考虑实时运营质量,从而导致绩效瓶颈、股权财阀和不稳定的委员会。我们提出ADAPT-DPoS,一个动态的,数据驱动的框架,将生产者选择作为一个多属性决策问题。它结合了基于熵和shap的动态加权、两阶段TOPSIS-PROMETHEE II排序管道,以及由事务负载、候选池质量和延迟信号驱动的自适应生产者计数控制器。在具有地理分布节点的异构WAN测试平台上进行的实验表明,在严格的P99延迟限制为1秒的情况下,ADAPT-DPoS驱动的延迟限制吞吐量接近部署的物理极限,并且比普通DPoS实现的LBT高约64% (798 TPS vs. 486 TPS)。在对抗压力下,它减少了约88%的区块失手(MR: 9.69%→1.15%),并大幅改善了去中心化和奖励贡献一致性(Nakamoto: 5.41→14.89;RCA: 0.24→0.86),表明基于madm的反馈驱动设计可以显着增强dpos风格的共识。
{"title":"ADAPT-DPoS: Data-driven producer selection in delegated proof of stake","authors":"Yong Liu ,&nbsp;Wenhao Luo ,&nbsp;Guangxia Xu","doi":"10.1016/j.ins.2026.123178","DOIUrl":"10.1016/j.ins.2026.123178","url":null,"abstract":"<div><div>Delegated Proof of Stake (DPoS) is widely used in public blockchains, but static, vote-centric election rules struggle to cope with heterogeneous wide-area networks and evolving attack strategies. Producers are often chosen mainly by stake, with little regard for real-time operational quality, leading to performance bottlenecks, stake plutocracy, and unstable committees. We present ADAPT-DPoS, a dynamic, data-driven framework that casts producer selection as a multi-attribute decision-making problem. It combines entropy- and SHAP-based dynamic weighting, a two-phase TOPSIS–PROMETHEE II ranking pipeline, and an adaptive producer-count controller driven by transaction load, candidate-pool quality, and latency signals. Experiments on a heterogeneous WAN testbed with geographically distributed nodes show that, under a strict P99 latency bound of 1 s, ADAPT-DPoS drives latency-bounded throughput close to the physical limit of the deployment and achieves <strong>about 64% higher LBT than vanilla DPoS</strong> (798 vs. 486 TPS in S0). Under adversarial stress, it <strong>reduces block misses by</strong> <span><math><mo>∼</mo></math></span><strong>88%</strong> (MR: 9.69%<span><math><mo>→</mo></math></span>1.15%) and substantially improves decentralization and reward–contribution alignment (Nakamoto: 5.41<span><math><mo>→</mo></math></span>14.89; RCA: 0.24<span><math><mo>→</mo></math></span>0.86), demonstrating that MADM-based, feedback-driven design can significantly enhance DPoS-style consensus.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123178"},"PeriodicalIF":6.8,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VCRec: Visibility graph and convolutional neural networks for sequential recommendation 序列推荐的可见性图和卷积神经网络
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-30 DOI: 10.1016/j.ins.2026.123153
Hailin Li , Jie Wang
The primary purpose of sequential recommendation is to analyze user behavior sequences, extract user preferences and identify dependencies between items to generate relevant recommendations. Although sequential recommendation models have advantages, they still face challenges in discovering complex relationships in users’ purchase histories and capturing users’ dynamic behavior patterns with shallow network structures. In this article, we propose the Visibility Graph and Convolutional Neural Networks for Sequential Recommendation (VCRec), which is the first application of visibility graphs to sequential recommendation. The VCRec model transforms users and their behavior sequences into user-embedding vectors and item-embedding matrices. The improved adaptive visibility graph algorithm is then proposed to encode the item-embedding matrices in both paired and non-paired ways, and obtains the three-dimensional tensor. High-order features of the items are extracted using residual and convolutional blocks. The resulting item features are combined with user embedding vectors to predict the subsequent item with which the user will engage. Extensive experiments on realistic datasets have demonstrated the performance of the VCRec model. These experimental results suggest that the VCRec model produces high-quality recommendations efficiently, which is of significant practical value.
顺序推荐的主要目的是分析用户行为序列,提取用户偏好,识别项目之间的依赖关系,从而生成相关的推荐。序列推荐模型虽然具有一定的优势,但在发现用户购买历史中的复杂关系和浅层网络结构捕捉用户动态行为模式方面仍然面临挑战。在本文中,我们提出了序列推荐的可见性图和卷积神经网络(VCRec),这是可见性图在序列推荐中的首次应用。VCRec模型将用户及其行为序列转化为用户嵌入向量和项嵌入矩阵。然后提出改进的自适应可见性图算法,对项目嵌入矩阵进行配对和非配对编码,得到三维张量。使用残差和卷积块提取项目的高阶特征。结果的项目特征与用户嵌入向量相结合,以预测用户将参与的后续项目。在实际数据集上的大量实验证明了VCRec模型的性能。实验结果表明,VCRec模型能够有效地生成高质量的推荐,具有重要的实用价值。
{"title":"VCRec: Visibility graph and convolutional neural networks for sequential recommendation","authors":"Hailin Li ,&nbsp;Jie Wang","doi":"10.1016/j.ins.2026.123153","DOIUrl":"10.1016/j.ins.2026.123153","url":null,"abstract":"<div><div>The primary purpose of sequential recommendation is to analyze user behavior sequences, extract user preferences and identify dependencies between items to generate relevant recommendations. Although sequential recommendation models have advantages, they still face challenges in discovering complex relationships in users’ purchase histories and capturing users’ dynamic behavior patterns with shallow network structures. In this article, we propose the Visibility Graph and Convolutional Neural Networks for Sequential Recommendation (VCRec), which is the first application of visibility graphs to sequential recommendation. The VCRec model transforms users and their behavior sequences into user-embedding vectors and item-embedding matrices. The improved adaptive visibility graph algorithm is then proposed to encode the item-embedding matrices in both paired and non-paired ways, and obtains the three-dimensional tensor. High-order features of the items are extracted using residual and convolutional blocks. The resulting item features are combined with user embedding vectors to predict the subsequent item with which the user will engage. Extensive experiments on realistic datasets have demonstrated the performance of the VCRec model. These experimental results suggest that the VCRec model produces high-quality recommendations efficiently, which is of significant practical value.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123153"},"PeriodicalIF":6.8,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risks analysis and countermeasures research of merchant fishing vessels collision accidents based on LLM and GRAA 基于LLM和GRAA的商船渔船碰撞事故风险分析及对策研究
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-30 DOI: 10.1016/j.ins.2026.123167
Xueman Wang , Xinping Xiao , Mingyun Gao , Congjun Rao
Merchant-fishing vessel collision accidents threaten crew safety, property, and marine ecology. Currently, accident reports in unstructured text form hinder efficient risk-based decision-making during navigation. To improve the accuracy and efficiency of risk assessment and decision-making, this paper proposes a semi-automated multi-stage risk assessment framework based on large language models (LLMs), machine learning algorithms, and Grey Relational Analysis. First, a workflow based on the Dify platform is constructed to extract and identify risk-influencing factors (RIFs) from ship collision accident reports. Second, Bayesian network structure learning and association rule mining are utilized to explore the causal relationships among these factors. Third, a Grey Relational Attraction Analysis(GRAA) model is established to reduce the dependence of complex, multi-dimensional risk assessment on limited sample sizes, enhancing the reliability of risk quantification. The results indicate that core-layer risk factors such as inadequate crew competence, fatigue, and improper emergency response play key roles in the ship collision accident propagation network. Additionally, this study constructs an integrated risk assessment pipeline based on the Dify-LLM workflow, achieving rapid extraction and quantification of risk information from unstructured text.
商船-渔船碰撞事故对船员安全、财产和海洋生态构成威胁。目前,非结构化文本形式的事故报告阻碍了导航过程中基于风险的有效决策。为了提高风险评估和决策的准确性和效率,本文提出了一种基于大语言模型(LLMs)、机器学习算法和灰色关联分析的半自动化多阶段风险评估框架。首先,构建基于Dify平台的船舶碰撞事故报告风险影响因素提取与识别工作流程;其次,利用贝叶斯网络结构学习和关联规则挖掘来探索这些因素之间的因果关系。第三,建立灰色关联吸引力分析(GRAA)模型,减少复杂、多维度的风险评估对有限样本量的依赖,提高风险量化的可靠性。结果表明,船员能力不足、船员疲劳和应急响应不当等核心层风险因素在船舶碰撞事故传播网络中起着关键作用。此外,本研究构建了基于Dify-LLM工作流的集成风险评估管道,实现了从非结构化文本中快速提取和量化风险信息。
{"title":"Risks analysis and countermeasures research of merchant fishing vessels collision accidents based on LLM and GRAA","authors":"Xueman Wang ,&nbsp;Xinping Xiao ,&nbsp;Mingyun Gao ,&nbsp;Congjun Rao","doi":"10.1016/j.ins.2026.123167","DOIUrl":"10.1016/j.ins.2026.123167","url":null,"abstract":"<div><div>Merchant-fishing vessel collision accidents threaten crew safety, property, and marine ecology. Currently, accident reports in unstructured text form hinder efficient risk-based decision-making during navigation. To improve the accuracy and efficiency of risk assessment and decision-making, this paper proposes a semi-automated multi-stage risk assessment framework based on large language models (LLMs), machine learning algorithms, and Grey Relational Analysis. First, a workflow based on the Dify platform is constructed to extract and identify risk-influencing factors (RIFs) from ship collision accident reports. Second, Bayesian network structure learning and association rule mining are utilized to explore the causal relationships among these factors. Third, a Grey Relational Attraction Analysis(GRAA) model is established to reduce the dependence of complex, multi-dimensional risk assessment on limited sample sizes, enhancing the reliability of risk quantification. The results indicate that core-layer risk factors such as inadequate crew competence, fatigue, and improper emergency response play key roles in the ship collision accident propagation network. Additionally, this study constructs an integrated risk assessment pipeline based on the Dify-LLM workflow, achieving rapid extraction and quantification of risk information from unstructured text.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123167"},"PeriodicalIF":6.8,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Campus anomaly detection systems from the perspective of unmanned aerial vehicles 基于无人机视角的校园异常检测系统
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-30 DOI: 10.1016/j.ins.2026.123166
Shujuan Feng , Jinming Wang , Yangkai Wu , Fei Liu , Ezzeddine Touti
Campus anomalies due to large crowds are monitored and thwarted using unmanned aerial vehicle (UAV) images/ videos. A pattern anomaly is detected by correlating the physical dimensions of the input image with the usual and unusual activities used for training. The proposed Boundary Position-induced Object Anomaly Detection (BPOAD) method uses deep ensemble learning with parallel, modular functions to identify unusual crowd behaviour patterns. The BPOAD method uniquely coordinates bagging and boosting processes within its method. The bagging component creates diverse training subsets to enhance boundary detection precision and orientation, while the boosting component adaptively weights misclassified instances to improve feature correlation across training sets. This dual approach allows the system to maintain high accuracy even after precision saturation, as the model can selectively apply either technique based on extracted features. This method establishes robust decision boundaries that maximise anomaly detection by correlating the physical dimensions of input images with normal and abnormal activity patterns. In real-world campus security applications, this significantly reduces false alarm rates and faster response times to potential threats. Experimental results demonstrate BPOAD’s effectiveness with 12.79% improved anomaly detection precision, 11.81% higher sensitivity, and 11.54% increased recall compared to existing methods. These improvements enable campus security personnel to more accurately identify and respond to unusual situations, ultimately enhancing overall campus safety management.
使用无人机(UAV)图像/视频监控和阻止大量人群导致的校园异常。通过将输入图像的物理尺寸与用于训练的通常和不寻常的活动相关联来检测模式异常。提出的边界位置诱导目标异常检测(BPOAD)方法使用深度集成学习与并行、模块化函数来识别异常的人群行为模式。BPOAD方法在其方法内唯一地协调装袋和提升过程。装袋组件创建不同的训练子集,以提高边界检测的精度和方向,而提升组件自适应加权错误分类的实例,以提高训练集之间的特征相关性。这种双重方法使系统即使在精度饱和后也能保持高精度,因为模型可以根据提取的特征选择性地应用任何一种技术。该方法通过将输入图像的物理尺寸与正常和异常活动模式相关联,建立了鲁棒的决策边界,最大限度地提高了异常检测。在现实世界的校园安全应用中,这大大降低了误报率,并加快了对潜在威胁的响应时间。实验结果表明,与现有方法相比,BPOAD的异常检测精度提高了12.79%,灵敏度提高了11.81%,召回率提高了11.54%。这些改进使校园保安人员能够更准确地识别和应对异常情况,最终提高校园整体安全管理水平。
{"title":"Campus anomaly detection systems from the perspective of unmanned aerial vehicles","authors":"Shujuan Feng ,&nbsp;Jinming Wang ,&nbsp;Yangkai Wu ,&nbsp;Fei Liu ,&nbsp;Ezzeddine Touti","doi":"10.1016/j.ins.2026.123166","DOIUrl":"10.1016/j.ins.2026.123166","url":null,"abstract":"<div><div>Campus anomalies due to large crowds are monitored and thwarted using unmanned aerial vehicle (UAV) images/ videos. A pattern anomaly is detected by correlating the physical dimensions of the input image with the usual and unusual activities used for training. The proposed Boundary Position-induced Object Anomaly Detection (BPOAD) method uses deep ensemble learning with parallel, modular functions to identify unusual crowd behaviour patterns. The BPOAD method uniquely coordinates bagging and boosting processes within its method. The bagging component creates diverse training subsets to enhance boundary detection precision and orientation, while the boosting component adaptively weights misclassified instances to improve feature correlation across training sets. This dual approach allows the system to maintain high accuracy even after precision saturation, as the model can selectively apply either technique based on extracted features. This method establishes robust decision boundaries that maximise anomaly detection by correlating the physical dimensions of input images with normal and abnormal activity patterns. In real-world campus security applications, this significantly reduces false alarm rates and faster response times to potential threats. Experimental results demonstrate BPOAD’s effectiveness with 12.79% improved anomaly detection precision, 11.81% higher sensitivity, and 11.54% increased recall compared to existing methods. These improvements enable campus security personnel to more accurately identify and respond to unusual situations, ultimately enhancing overall campus safety management.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123166"},"PeriodicalIF":6.8,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146190942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective two-archive evolutionary algorithm to optimize the discovery of gene networks involved in cancer survival 多目标双档案进化算法优化发现与癌症生存相关的基因网络
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-30 DOI: 10.1016/j.ins.2026.123182
Fernando M. Rodríguez-Bejarano , Sergio Santander-Jiménez , Miguel A. Vega-Rodríguez
Gene networks have gained considerable relevance in cancer research, enabling the representation of complex biological relationships that provide insights into the mechanisms driving tumor development and progression. The increasing availability of biological data facilitates the construction of clinically relevant gene networks by integrating multiple information sources. Specifically, we consider mutation data, patient survival data, and protein-protein interaction data to identify networks whose genes are recurrently mutated, significantly involved in patient survival, and functionally associated. To this end, we apply multi-objective optimization to simultaneously maximize survival impact, functional association, and mutation coverage. Herein, we introduce MOTEA-GENSU (Multi-Objective Two-archive Evolutionary Algorithm to discover GEne Networks involved in SUrvival), a novel method that employs two collaborative archives and intelligent evolutionary operators to guide the generation of high-quality gene networks. Evaluation across 27 real biological scenarios covering diverse cancer types shows that MOTEA-GENSU outperforms existing methods, achieving superior results in 92.6% of comparisons, with improvements of up to 315.8% over the best-performing competing approach, and consistently surpassing all state-of-the-art methods on average within each evaluated dataset. Biological analysis of the identified networks validates their functional coherence and significant impact on cancer patient survival, revealing clinically relevant networks composed of genes with demonstrated prognostic value.
基因网络已经在癌症研究中获得了相当大的相关性,使复杂的生物关系的表征能够深入了解驱动肿瘤发生和进展的机制。生物数据的可获得性不断提高,通过整合多种信息来源,促进了临床相关基因网络的构建。具体来说,我们考虑突变数据、患者生存数据和蛋白质-蛋白质相互作用数据,以确定基因反复突变、显著参与患者生存和功能相关的网络。为此,我们应用多目标优化来同时最大化生存影响、功能关联和突变覆盖。本文提出了MOTEA-GENSU (Multi-Objective two -archive Evolutionary Algorithm to discover involved in SUrvival GEne Networks)算法,该算法采用两个协同档案和智能进化算子来指导高质量基因网络的生成。对涵盖不同癌症类型的27种真实生物学情景的评估表明,MOTEA-GENSU优于现有方法,在92.6%的比较中取得了优异的结果,比表现最佳的竞争方法提高了315.8%,并且在每个评估数据集中平均持续超过所有最先进的方法。对已识别网络的生物学分析验证了它们的功能一致性和对癌症患者生存的重大影响,揭示了由具有预后价值的基因组成的临床相关网络。
{"title":"Multi-objective two-archive evolutionary algorithm to optimize the discovery of gene networks involved in cancer survival","authors":"Fernando M. Rodríguez-Bejarano ,&nbsp;Sergio Santander-Jiménez ,&nbsp;Miguel A. Vega-Rodríguez","doi":"10.1016/j.ins.2026.123182","DOIUrl":"10.1016/j.ins.2026.123182","url":null,"abstract":"<div><div>Gene networks have gained considerable relevance in cancer research, enabling the representation of complex biological relationships that provide insights into the mechanisms driving tumor development and progression. The increasing availability of biological data facilitates the construction of clinically relevant gene networks by integrating multiple information sources. Specifically, we consider mutation data, patient survival data, and protein-protein interaction data to identify networks whose genes are recurrently mutated, significantly involved in patient survival, and functionally associated. To this end, we apply multi-objective optimization to simultaneously maximize survival impact, functional association, and mutation coverage. Herein, we introduce MOTEA-GENSU (Multi-Objective Two-archive Evolutionary Algorithm to discover GEne Networks involved in SUrvival), a novel method that employs two collaborative archives and intelligent evolutionary operators to guide the generation of high-quality gene networks. Evaluation across 27 real biological scenarios covering diverse cancer types shows that MOTEA-GENSU outperforms existing methods, achieving superior results in 92.6% of comparisons, with improvements of up to 315.8% over the best-performing competing approach, and consistently surpassing all state-of-the-art methods on average within each evaluated dataset. Biological analysis of the identified networks validates their functional coherence and significant impact on cancer patient survival, revealing clinically relevant networks composed of genes with demonstrated prognostic value.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123182"},"PeriodicalIF":6.8,"publicationDate":"2026-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146191067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lyapunov-based emotion-aware switching in hybrid human-artificial intelligence customer service systems 基于lyapunov的混合人-人工智能客户服务系统的情感感知切换
IF 6.8 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-29 DOI: 10.1016/j.ins.2026.123172
Zehan Tan, Henghua Shen
In this paper, we novelly apply the classical Lyapunov stability analysis to hybrid human-Artificial Intelligence (AI) customer service systems. The core idea is to use the Lyapunov ellipsoid of a linear autonomous dynamical system (LADS) to assess the customers’ emotional states and automatically determine whether a switch from the AI agent to a human agent is necessary. This involves two innovations: 1) User emotions are modeled as discrete-time LADSs in the Pleasure–Arousal–Dominance (PAD) space, parameterized by MBTI-specific dynamics matrices; 2) A Lyapunov function defines a safe emotional ellipsoid whose boundary, together with a Lyapunov Decay Rate (LDR), forms a dual-trigger switching mechanism to transfer service from the AI agent to a human agent when the user’s real-time emotional state approaches too fast or crosses the ellipsoid boundary, thus proactively preventing emotional destabilization.
To evaluate the proposed framework, we construct a domain-specific, multi-turn customer service dialogue dataset with PAD annotations. We compare our method with three other existing customer service systems, including methods with Fixed Lyapunov Ellipsoid for All (FLEA), Rule-Based Thresholding (RBT) and No-Switching Baseline (NSB). Comparative experiments demonstrate that the proposed switching mechanism significantly improves reduces negative emotional outcomes, enhances system usability and minimizes unnecessary human intervention.
本文新颖地将经典李雅普诺夫稳定性分析应用于人工智能(AI)混合客户服务系统。其核心思想是使用线性自主动力系统(LADS)的Lyapunov椭球来评估客户的情绪状态,并自动确定是否需要从AI代理切换到人类代理。这涉及两个创新:1)用户情绪建模为快乐-觉醒-支配(PAD)空间中的离散时间lads,由mbti特定的动态矩阵参数化;2) Lyapunov函数定义了一个安全的情绪椭球,该椭球边界与Lyapunov衰减率(Lyapunov Decay Rate, LDR)形成双触发切换机制,当用户实时情绪状态接近太快或越过椭球边界时,将服务从AI智能体转移到人类智能体,从而主动防止情绪不稳定。为了评估提出的框架,我们构建了一个具有PAD注释的特定领域的多轮客户服务对话数据集。我们将我们的方法与其他三种现有的客户服务系统进行了比较,包括所有人的固定Lyapunov椭球(FLEA)、基于规则的阈值(RBT)和无切换基线(NSB)方法。对比实验表明,所提出的切换机制显著改善了负面情绪结果,提高了系统可用性,并最大限度地减少了不必要的人为干预。
{"title":"Lyapunov-based emotion-aware switching in hybrid human-artificial intelligence customer service systems","authors":"Zehan Tan,&nbsp;Henghua Shen","doi":"10.1016/j.ins.2026.123172","DOIUrl":"10.1016/j.ins.2026.123172","url":null,"abstract":"<div><div>In this paper, we novelly apply the classical Lyapunov stability analysis to hybrid human-Artificial Intelligence (AI) customer service systems. The core idea is to use the Lyapunov ellipsoid of a linear autonomous dynamical system (LADS) to assess the customers’ emotional states and automatically determine whether a switch from the AI agent to a human agent is necessary. This involves two innovations: 1) User emotions are modeled as discrete-time LADSs in the Pleasure–Arousal–Dominance (PAD) space, parameterized by MBTI-specific dynamics matrices; 2) A Lyapunov function defines a safe emotional ellipsoid whose boundary, together with a Lyapunov Decay Rate (LDR), forms a dual-trigger switching mechanism to transfer service from the AI agent to a human agent when the user’s real-time emotional state approaches too fast or crosses the ellipsoid boundary, thus proactively preventing emotional destabilization.</div><div>To evaluate the proposed framework, we construct a domain-specific, multi-turn customer service dialogue dataset with PAD annotations. We compare our method with three other existing customer service systems, including methods with Fixed Lyapunov Ellipsoid for All (FLEA), Rule-Based Thresholding (RBT) and No-Switching Baseline (NSB). Comparative experiments demonstrate that the proposed switching mechanism significantly improves reduces negative emotional outcomes, enhances system usability and minimizes unnecessary human intervention.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"739 ","pages":"Article 123172"},"PeriodicalIF":6.8,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146190943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1