首页 > 最新文献

ACM Transactions on Cyber-Physical Systems最新文献

英文 中文
AcTrak: Controlling a Steerable Surveillance Camera using Reinforcement Learning AcTrak:使用强化学习控制可操纵监控摄像头
IF 2.3 Q1 Mathematics Pub Date : 2023-03-03 DOI: 10.1145/3585316
Abdulrahman Fahim, E. Papalexakis, S. Krishnamurthy, Amit K. Roy Chowdhury, L. Kaplan, T. Abdelzaher
Steerable cameras that can be controlled via a network, to retrieve telemetries of interest have become popular. In this paper, we develop a framework called AcTrak, to automate a camera’s motion to appropriately switch between (a) zoom ins on existing targets in a scene to track their activities, and (b) zoom out to search for new targets arriving to the area of interest. Specifically, we seek to achieve a good trade-off between the two tasks, i.e., we want to ensure that new targets are observed by the camera before they leave the scene, while also zooming in on existing targets frequently enough to monitor their activities. There exist prior control algorithms for steering cameras to optimize certain objectives; however, to the best of our knowledge, none have considered this problem, and do not perform well when target activity tracking is required. AcTrak automatically controls the camera’s PTZ configurations using reinforcement learning (RL), to select the best camera position given the current state. Via simulations using real datasets, we show that AcTrak detects newly arriving targets 30% faster than a non-adaptive baseline and rarely misses targets, unlike the baseline which can miss up to 5% of the targets. We also implement AcTrak to control a real camera and demonstrate that in comparison with the baseline, it acquires about 2× more high resolution images of targets.
可以通过网络控制的可操纵摄像机,用于检索感兴趣的遥测仪,已经变得流行起来。在本文中,我们开发了一个名为AcTrak的框架,以使相机的运动自动化,从而在(a)放大场景中的现有目标以跟踪其活动和(b)缩小以搜索到达感兴趣区域的新目标之间进行适当切换。具体而言,我们寻求在这两项任务之间实现良好的权衡,即,我们希望确保新目标在离开场景之前被摄像机观察到,同时也要频繁地放大现有目标,以监控其活动。存在用于操纵摄像机以优化某些目标的先验控制算法;然而,据我们所知,没有人考虑过这个问题,并且在需要跟踪目标活动时表现不佳。AcTrak使用强化学习(RL)自动控制相机的PTZ配置,以在给定当前状态的情况下选择最佳相机位置。通过使用真实数据集的模拟,我们发现AcTrak检测新到达的目标的速度比非自适应基线快30%,并且很少错过目标,而基线可能错过高达5%的目标。我们还实现了AcTrak来控制真实的相机,并证明与基线相比,它可以获得大约2倍多的目标高分辨率图像。
{"title":"AcTrak: Controlling a Steerable Surveillance Camera using Reinforcement Learning","authors":"Abdulrahman Fahim, E. Papalexakis, S. Krishnamurthy, Amit K. Roy Chowdhury, L. Kaplan, T. Abdelzaher","doi":"10.1145/3585316","DOIUrl":"https://doi.org/10.1145/3585316","url":null,"abstract":"Steerable cameras that can be controlled via a network, to retrieve telemetries of interest have become popular. In this paper, we develop a framework called AcTrak, to automate a camera’s motion to appropriately switch between (a) zoom ins on existing targets in a scene to track their activities, and (b) zoom out to search for new targets arriving to the area of interest. Specifically, we seek to achieve a good trade-off between the two tasks, i.e., we want to ensure that new targets are observed by the camera before they leave the scene, while also zooming in on existing targets frequently enough to monitor their activities. There exist prior control algorithms for steering cameras to optimize certain objectives; however, to the best of our knowledge, none have considered this problem, and do not perform well when target activity tracking is required. AcTrak automatically controls the camera’s PTZ configurations using reinforcement learning (RL), to select the best camera position given the current state. Via simulations using real datasets, we show that AcTrak detects newly arriving targets 30% faster than a non-adaptive baseline and rarely misses targets, unlike the baseline which can miss up to 5% of the targets. We also implement AcTrak to control a real camera and demonstrate that in comparison with the baseline, it acquires about 2× more high resolution images of targets.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48191774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue on Automotive CPS Safety & Security: Part 1 汽车CPS安全特刊简介:第1部分
IF 2.3 Q1 Mathematics Pub Date : 2023-02-23 DOI: 10.1145/3579986
S. Chakraborty, S. Jha, Soheil Samii, Philipp Mundhenk
One might argue that automotive and allied domains like robotics serve as the best possible examples of what “cyber-physical systems” (CPS) are. Here, the correctness of the underlying electronics and software (or cyber) components are defined by the dynamics of the vehicle or the robot, viz., the physical components of the system. This shift in perspective on how electronics and software should be modeled and synthesized, and how their correctness should be defined, has led to a tremendous volume of research on CPS in recent times [7, 8, 43, 56]. At the same time, the volume of electronics and software in modern cars has also grown tremendously. Today, high-end cars have more than 100 control computers or electronic control units (ECUs) embedded in them, that run hundreds of millions of lines of software code implementing a range of diverse functions. These functions span across engine and brake control, to the body and entertainment domains. Cars are also equipped with a variety of cameras, radars, and lidar sensors that are used to perceive the external world and take the appropriate control actions as a part of driver assistance features that are common today. As such features continue to accelerate the evolution and adoption of fully autonomous vehicles, the role of electronics and software in the automotive domain is increasing at an unprecedented pace, and modern automobiles are now aptly referred
有人可能会说,汽车和机器人等相关领域是“网络物理系统”(CPS)的最佳例子。在这里,底层电子和软件(或网络)组件的正确性是由车辆或机器人的动力学定义的,即系统的物理组件。这种关于电子和软件应该如何建模和合成,以及如何定义它们的正确性的观点的转变,导致了近年来对CPS的大量研究[7,8,43,56]。与此同时,现代汽车中的电子设备和软件的数量也有了巨大的增长。如今,高端汽车有100多台控制计算机或电子控制单元(ecu)嵌入其中,这些计算机或电子控制单元运行数亿行软件代码,实现一系列不同的功能。这些功能涵盖了发动机和刹车控制、车身和娱乐领域。汽车还配备了各种摄像头、雷达和激光雷达传感器,用于感知外部世界,并采取适当的控制行动,这是当今常见的驾驶员辅助功能的一部分。随着这些功能不断加速全自动驾驶汽车的发展和采用,电子和软件在汽车领域的作用正以前所未有的速度增长,现代汽车现在被恰当地引用
{"title":"Introduction to the Special Issue on Automotive CPS Safety & Security: Part 1","authors":"S. Chakraborty, S. Jha, Soheil Samii, Philipp Mundhenk","doi":"10.1145/3579986","DOIUrl":"https://doi.org/10.1145/3579986","url":null,"abstract":"One might argue that automotive and allied domains like robotics serve as the best possible examples of what “cyber-physical systems” (CPS) are. Here, the correctness of the underlying electronics and software (or cyber) components are defined by the dynamics of the vehicle or the robot, viz., the physical components of the system. This shift in perspective on how electronics and software should be modeled and synthesized, and how their correctness should be defined, has led to a tremendous volume of research on CPS in recent times [7, 8, 43, 56]. At the same time, the volume of electronics and software in modern cars has also grown tremendously. Today, high-end cars have more than 100 control computers or electronic control units (ECUs) embedded in them, that run hundreds of millions of lines of software code implementing a range of diverse functions. These functions span across engine and brake control, to the body and entertainment domains. Cars are also equipped with a variety of cameras, radars, and lidar sensors that are used to perceive the external world and take the appropriate control actions as a part of driver assistance features that are common today. As such features continue to accelerate the evolution and adoption of fully autonomous vehicles, the role of electronics and software in the automotive domain is increasing at an unprecedented pace, and modern automobiles are now aptly referred","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48339430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Mixed Autonomy Traffic Flow with Decentralized Autonomous Vehicles and Multi-Agent Reinforcement Learning 分散式自动驾驶汽车和多智能体强化学习优化混合式自动驾驶交通流
IF 2.3 Q1 Mathematics Pub Date : 2023-02-09 DOI: 10.1145/3582576
Eugene Vinitsky, Nathan Lichtlé, Kanaad Parvate, A. Bayen
We study the ability of autonomous vehicles to improve the throughput of a bottleneck using a fully decentralized control scheme in a mixed autonomy setting. We consider the problem of improving the throughput of a scaled model of the San Francisco–Oakland Bay Bridge: a two-stage bottleneck where four lanes reduce to two and then reduce to one. Although there is extensive work examining variants of bottleneck control in a centralized setting, there is less study of the challenging multi-agent setting where the large number of interacting AVs leads to significant optimization difficulties for reinforcement learning methods. We apply multi-agent reinforcement algorithms to this problem and demonstrate that significant improvements in bottleneck throughput, from 20% at a 5% penetration rate to 33% at a 40% penetration rate, can be achieved. We compare our results to a hand-designed feedback controller and demonstrate that our results sharply outperform the feedback controller despite extensive tuning. Additionally, we demonstrate that the RL-based controllers adopt a robust strategy that works across penetration rates whereas the feedback controllers degrade immediately upon penetration rate variation. We investigate the feasibility of both action and observation decentralization and demonstrate that effective strategies are possible using purely local sensing. Finally, we open-source our code at https://github.com/eugenevinitsky/decentralized_bottlenecks.
我们研究了自动驾驶汽车在混合自主环境中使用完全分散控制方案提高瓶颈吞吐量的能力。我们考虑了提高旧金山-奥克兰湾大桥缩放模型吞吐量的问题:四车道减少到两车道,然后减少到一车道的两阶段瓶颈。尽管在集中式环境中研究瓶颈控制的变体有大量工作,但对具有挑战性的多智能体环境的研究较少,在这种环境中,大量的交互AVs会导致强化学习方法的显著优化困难。我们将多智能体增强算法应用于该问题,并证明可以显著提高瓶颈吞吐量,从5%渗透率时的20%提高到40%渗透率时的33%。我们将我们的结果与手工设计的反馈控制器进行了比较,并证明尽管进行了大量调整,但我们的结果明显优于反馈控制器。此外,我们证明了基于RL的控制器采用了跨渗透率工作的鲁棒策略,而反馈控制器在渗透率变化时立即降级。我们研究了行动和观测权力下放的可行性,并证明使用纯粹的局部传感是可能的有效策略。最后,我们在https://github.com/eugenevinitsky/decentralized_bottlenecks.
{"title":"Optimizing Mixed Autonomy Traffic Flow with Decentralized Autonomous Vehicles and Multi-Agent Reinforcement Learning","authors":"Eugene Vinitsky, Nathan Lichtlé, Kanaad Parvate, A. Bayen","doi":"10.1145/3582576","DOIUrl":"https://doi.org/10.1145/3582576","url":null,"abstract":"We study the ability of autonomous vehicles to improve the throughput of a bottleneck using a fully decentralized control scheme in a mixed autonomy setting. We consider the problem of improving the throughput of a scaled model of the San Francisco–Oakland Bay Bridge: a two-stage bottleneck where four lanes reduce to two and then reduce to one. Although there is extensive work examining variants of bottleneck control in a centralized setting, there is less study of the challenging multi-agent setting where the large number of interacting AVs leads to significant optimization difficulties for reinforcement learning methods. We apply multi-agent reinforcement algorithms to this problem and demonstrate that significant improvements in bottleneck throughput, from 20% at a 5% penetration rate to 33% at a 40% penetration rate, can be achieved. We compare our results to a hand-designed feedback controller and demonstrate that our results sharply outperform the feedback controller despite extensive tuning. Additionally, we demonstrate that the RL-based controllers adopt a robust strategy that works across penetration rates whereas the feedback controllers degrade immediately upon penetration rate variation. We investigate the feasibility of both action and observation decentralization and demonstrate that effective strategies are possible using purely local sensing. Finally, we open-source our code at https://github.com/eugenevinitsky/decentralized_bottlenecks.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48028055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Green Data Center Cooling Control via Physics-Guided Safe Reinforcement Learning 基于物理指导的安全强化学习的绿色数据中心冷却控制
IF 2.3 Q1 Mathematics Pub Date : 2023-02-01 DOI: 10.1145/3582577
Ruihang Wang, Zhi-Ying Cao, Xiaoxia Zhou, Yonggang Wen, Rui Tan
Deep reinforcement learning (DRL) has shown good performance in tackling Markov decision process (MDP) problems. As DRL optimizes a long-term reward, it is a promising approach to improving the energy efficiency of data center cooling. However, enforcement of thermal safety constraints during DRL’s state exploration is a main challenge. The widely adopted reward shaping approach adds negative reward when the exploratory action results in unsafety. Thus, it needs to experience sufficient unsafe states before it learns how to prevent unsafety. In this paper, we propose a safety-aware DRL framework for data center cooling control. It applies offline imitation learning and online post-hoc rectification to holistically prevent thermal unsafety during online DRL. In particular, the post-hoc rectification searches for the minimum modification to the DRL-recommended action such that the rectified action will not result in unsafety. The rectification is designed based on a thermal state transition model that is fitted using historical safe operation traces and able to extrapolate the transitions to unsafe states explored by DRL. Extensive evaluation for chilled water and direct expansion-cooled data centers in two climate conditions show that our approach saves 18% to 26.6% of total data center power compared with conventional control and reduces safety violations by 94.5% to 99% compared with reward shaping. We also extend the proposed framework to address data centers with non-uniform temperature distributions for detailed safety considerations. The evaluation shows that our approach saves 14% power usage compared with the PID control while addressing safety compliance during the training.
深度强化学习(DRL)在解决马尔可夫决策过程(MDP)问题方面表现出良好的性能。由于DRL优化了长期回报,它是提高数据中心冷却能源效率的一种有前途的方法。然而,在DRL的状态勘探过程中,热安全约束的实施是主要的挑战。当探索性行为导致不安全时,普遍采用的奖励塑造方法增加了负奖励。因此,在学习如何预防不安全之前,它需要经历足够多的不安全状态。在本文中,我们提出了一个安全感知的数据中心冷却控制DRL框架。采用离线模仿学习和在线事后整改,从整体上防止在线DRL过程中的热不安全。特别地,事后整改搜索对drl推荐的操作的最小修改,使纠正后的操作不会导致不安全。整流设计基于热态转变模型,该模型使用历史安全运行轨迹拟合,并能够推断DRL探索的不安全状态的转变。对两种气候条件下的冷冻水和直接膨胀冷却数据中心的广泛评估表明,与传统控制相比,我们的方法节省了数据中心总电力的18%至26.6%,与奖励形成相比,减少了94.5%至99%的安全违规行为。我们还扩展了所提出的框架,以解决具有非均匀温度分布的数据中心的详细安全考虑。评估表明,与PID控制相比,我们的方法节省了14%的功耗,同时在训练过程中解决了安全合规问题。
{"title":"Green Data Center Cooling Control via Physics-Guided Safe Reinforcement Learning","authors":"Ruihang Wang, Zhi-Ying Cao, Xiaoxia Zhou, Yonggang Wen, Rui Tan","doi":"10.1145/3582577","DOIUrl":"https://doi.org/10.1145/3582577","url":null,"abstract":"Deep reinforcement learning (DRL) has shown good performance in tackling Markov decision process (MDP) problems. As DRL optimizes a long-term reward, it is a promising approach to improving the energy efficiency of data center cooling. However, enforcement of thermal safety constraints during DRL’s state exploration is a main challenge. The widely adopted reward shaping approach adds negative reward when the exploratory action results in unsafety. Thus, it needs to experience sufficient unsafe states before it learns how to prevent unsafety. In this paper, we propose a safety-aware DRL framework for data center cooling control. It applies offline imitation learning and online post-hoc rectification to holistically prevent thermal unsafety during online DRL. In particular, the post-hoc rectification searches for the minimum modification to the DRL-recommended action such that the rectified action will not result in unsafety. The rectification is designed based on a thermal state transition model that is fitted using historical safe operation traces and able to extrapolate the transitions to unsafe states explored by DRL. Extensive evaluation for chilled water and direct expansion-cooled data centers in two climate conditions show that our approach saves 18% to 26.6% of total data center power compared with conventional control and reduces safety violations by 94.5% to 99% compared with reward shaping. We also extend the proposed framework to address data centers with non-uniform temperature distributions for detailed safety considerations. The evaluation shows that our approach saves 14% power usage compared with the PID control while addressing safety compliance during the training.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47468330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors SchedGuard++:在多核处理器上使用Linux容器防止调度泄漏
Q1 Mathematics Pub Date : 2023-01-31 DOI: 10.1145/3565974
Jiyang Chen, Tomasz Kloda, Rohan Tabish, Ayoosh Bansal, Chien-Ying Chen, Bo Liu, Sibin Mohan, Marco Caccamo, Lui Sha
Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous driving system. It has been recently shown that these systems can be vulnerable to timing inference attacks, mainly due to their predictable behavioral patterns. Existing solutions like schedule randomization cannot protect against such attacks, often limited by the system’s real-time nature. This article presents “ SchedGuard++ ”: a temporal protection framework for Linux-based real-time systems that protects against posterior schedule-based attacks by preventing untrusted tasks from executing during specific time intervals. SchedGuard++ supports multi-core platforms and is implemented using Linux containers and a customized Linux kernel real-time scheduler. We provide schedulability analysis assuming the Logical Execution Time (LET) paradigm, which enforces I/O predictability. The proposed response time analysis takes into account the interference from trusted and untrusted tasks and the impact of the protection mechanism. We demonstrate the effectiveness of our system using a realistic radio-controlled rover platform. Not only is “ SchedGuard++ ” able to protect against the posterior schedule-based attacks, but it also ensures that the real-time tasks/containers meet their temporal requirements.
在多临界实时系统(如自动驾驶系统)中,时间正确性至关重要。最近的研究表明,这些系统容易受到时间推理攻击,主要是由于它们的可预测行为模式。现有的解决方案,如调度随机化,往往受到系统实时性的限制,无法抵御这种攻击。本文介绍了“SchedGuard++”:一个用于基于linux的实时系统的临时保护框架,它通过防止在特定时间间隔内执行不受信任的任务来防止基于调度的后向攻击。SchedGuard++支持多核平台,并使用Linux容器和定制的Linux内核实时调度器实现。我们提供假设逻辑执行时间(LET)范式的可调度性分析,该范式强制I/O可预测性。提出的响应时间分析考虑了可信任务和不可信任务的干扰以及保护机制的影响。我们用一个真实的无线电控制漫游者平台证明了我们系统的有效性。“SchedGuard++”不仅能够防止后端基于调度的攻击,而且还能确保实时任务/容器满足它们的时间需求。
{"title":"SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors","authors":"Jiyang Chen, Tomasz Kloda, Rohan Tabish, Ayoosh Bansal, Chien-Ying Chen, Bo Liu, Sibin Mohan, Marco Caccamo, Lui Sha","doi":"10.1145/3565974","DOIUrl":"https://doi.org/10.1145/3565974","url":null,"abstract":"Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous driving system. It has been recently shown that these systems can be vulnerable to timing inference attacks, mainly due to their predictable behavioral patterns. Existing solutions like schedule randomization cannot protect against such attacks, often limited by the system’s real-time nature. This article presents “ SchedGuard++ ”: a temporal protection framework for Linux-based real-time systems that protects against posterior schedule-based attacks by preventing untrusted tasks from executing during specific time intervals. SchedGuard++ supports multi-core platforms and is implemented using Linux containers and a customized Linux kernel real-time scheduler. We provide schedulability analysis assuming the Logical Execution Time (LET) paradigm, which enforces I/O predictability. The proposed response time analysis takes into account the interference from trusted and untrusted tasks and the impact of the protection mechanism. We demonstrate the effectiveness of our system using a realistic radio-controlled rover platform. Not only is “ SchedGuard++ ” able to protect against the posterior schedule-based attacks, but it also ensures that the real-time tasks/containers meet their temporal requirements.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135202259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DT-DS: CAN Intrusion Detection with Decision Tree Ensembles DT-DS:基于决策树集成的CAN入侵检测
IF 2.3 Q1 Mathematics Pub Date : 2023-01-21 DOI: 10.1145/3566132
Jarul Mehta, Guillaume Richard, Loren Lugosch, Derek Yu, B. Meyer
The controller area network (CAN) protocol, used in many modern vehicles for real-time inter-device communications, is known to have cybersecurity vulnerabilities, putting passengers at risk for data exfiltration and control system sabotage. To address this issue, researchers have proposed to utilize security measures based on cryptography and message authentication; unfortunately, such approaches are often too computationally expensive to be deployed in real time on CAN devices. Additionally, they have developed machine learning (ML) techniques to detect anomalies in CAN traffic and thereby prevent attacks. The main disadvantage of existing ML-based techniques is that they either depend on additional computational hardware or they heuristically assume that all communication anomalies are malicious. In this article, we show that tree-based learning ensembles outperform anomaly-based techniques like AutoRegressive Integrated Moving Average (ARIMA) and Z-Score when used to detect attacks that result in increased bus utilization. We evaluated the detection capacity of three tree-based ensembles, Adaboost, gradient boosting, and random forests, and collectively refer to these as DT-DS. We conclude that the decision tree ensemble with Adaboost performs best with an area under curve (AUC) score of 0.999, closely followed by gradient boosting and random forests with 0.997 and 0.991 AUC scores, respectively, when trained using message profiles. We observe that with an increase in the observation window, the DT-DS models present an average AUC score of 0.999, and offer a nearly perfect detection of attacks, at the cost of increased latency in detection of attacked messages. We evaluate the performance of the IDS for Aeronautical Radio, Incorporated– (ARINC) encoded CAN communication traffic in avionic systems, generated using an aerospace testbench, ARINC-825TBv2. The IDS has been evaluated against the active attacks of a state-of-the-art predictive attacker model. Additionally, we observed that the performance of IDS approaches such as ARIMA and Z-Score degrade considerably with a decrease in the size of the observation time window. In contrast, the performance of DT-DS models is consistent, with only an average drop of 0.005 in the AUC score.
控制器区域网络(CAN)协议用于许多现代车辆的实时设备间通信,已知存在网络安全漏洞,使乘客面临数据泄露和控制系统破坏的风险。为了解决这个问题,研究人员提出了利用基于加密和消息认证的安全措施;不幸的是,这种方法通常在计算上过于昂贵,无法在CAN设备上实时部署。此外,他们还开发了机器学习(ML)技术来检测CAN流量中的异常情况,从而防止攻击。现有的基于机器学习的技术的主要缺点是,它们要么依赖于额外的计算硬件,要么启发式地假设所有通信异常都是恶意的。在本文中,我们表明,当用于检测导致总线利用率增加的攻击时,基于树的学习集成优于基于异常的技术,如自回归集成移动平均(ARIMA)和Z-Score。我们评估了三种基于树的系统,Adaboost,梯度增强和随机森林的检测能力,并将它们统称为DT-DS。我们得出结论,当使用消息概要进行训练时,Adaboost的决策树集成表现最佳,曲线下面积(AUC)得分为0.999,紧随其后的是梯度增强和随机森林,AUC得分分别为0.997和0.991。我们观察到,随着观察窗口的增加,DT-DS模型的平均AUC得分为0.999,并且提供了近乎完美的攻击检测,但代价是检测被攻击消息的延迟增加。我们评估了航空电子系统中航空无线电公司(ARINC)编码CAN通信流量的IDS的性能,使用ARINC- 825tbv2航空航天试验台生成。IDS已经针对最先进的预测攻击者模型的主动攻击进行了评估。此外,我们观察到,IDS方法(如ARIMA和Z-Score)的性能随着观测时间窗口大小的减小而显著下降。相比之下,DT-DS模型的表现较为一致,AUC得分平均仅下降0.005。
{"title":"DT-DS: CAN Intrusion Detection with Decision Tree Ensembles","authors":"Jarul Mehta, Guillaume Richard, Loren Lugosch, Derek Yu, B. Meyer","doi":"10.1145/3566132","DOIUrl":"https://doi.org/10.1145/3566132","url":null,"abstract":"The controller area network (CAN) protocol, used in many modern vehicles for real-time inter-device communications, is known to have cybersecurity vulnerabilities, putting passengers at risk for data exfiltration and control system sabotage. To address this issue, researchers have proposed to utilize security measures based on cryptography and message authentication; unfortunately, such approaches are often too computationally expensive to be deployed in real time on CAN devices. Additionally, they have developed machine learning (ML) techniques to detect anomalies in CAN traffic and thereby prevent attacks. The main disadvantage of existing ML-based techniques is that they either depend on additional computational hardware or they heuristically assume that all communication anomalies are malicious. In this article, we show that tree-based learning ensembles outperform anomaly-based techniques like AutoRegressive Integrated Moving Average (ARIMA) and Z-Score when used to detect attacks that result in increased bus utilization. We evaluated the detection capacity of three tree-based ensembles, Adaboost, gradient boosting, and random forests, and collectively refer to these as DT-DS. We conclude that the decision tree ensemble with Adaboost performs best with an area under curve (AUC) score of 0.999, closely followed by gradient boosting and random forests with 0.997 and 0.991 AUC scores, respectively, when trained using message profiles. We observe that with an increase in the observation window, the DT-DS models present an average AUC score of 0.999, and offer a nearly perfect detection of attacks, at the cost of increased latency in detection of attacked messages. We evaluate the performance of the IDS for Aeronautical Radio, Incorporated– (ARINC) encoded CAN communication traffic in avionic systems, generated using an aerospace testbench, ARINC-825TBv2. The IDS has been evaluated against the active attacks of a state-of-the-art predictive attacker model. Additionally, we observed that the performance of IDS approaches such as ARIMA and Z-Score degrade considerably with a decrease in the size of the observation time window. In contrast, the performance of DT-DS models is consistent, with only an average drop of 0.005 in the AUC score.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47361185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving 数据驱动的参数化拐角合成用于自动驾驶感知系统的有效验证
IF 2.3 Q1 Mathematics Pub Date : 2023-01-20 DOI: 10.1145/3571286
Handi Yu, Xin Li
Today's automotive cyber-physical systems for autonomous driving aim to enhance driving safety by replacing the uncertainties posed by human drivers with standard procedures of automated systems. However, the accuracy of in-vehicle perception systems may significantly vary under different operational conditions (e.g., fog density, light condition, etc.) and consequently degrade the reliability of autonomous driving. A perception system for autonomous driving must be carefully validated with an extremely large dataset collected under all possible operational conditions in order to ensure its robustness. The aforementioned dataset required for validation, however, is expensive or even impossible to acquire in practice, since most operational corners rarely occur in a real-world environment. In this paper, we propose to generate synthetic datasets at a variety of operational corners by using a parameterized cycle-consistent generative adversarial network (PCGAN). The proposed PCGAN is able to learn from an image dataset recorded at real-world operational conditions with only a few samples at corners and synthesize a large dataset at a given operational corner. By taking STOP sign detection as an example, our numerical experiments demonstrate that the proposed approach is able to generate high-quality synthetic datasets to facilitate accurate validation.
今天用于自动驾驶的汽车网络物理系统旨在通过用自动化系统的标准程序取代人类驾驶员带来的不确定性来提高驾驶安全性。然而,车载感知系统的准确性在不同的操作条件下(例如,雾密度、光线条件等)可能会显著变化,从而降低自动驾驶的可靠性。自动驾驶感知系统必须通过在所有可能的操作条件下收集的超大数据集进行仔细验证,以确保其稳健性。然而,上述验证所需的数据集在实践中成本高昂,甚至不可能获得,因为大多数操作角落很少发生在现实世界的环境中。在本文中,我们建议使用参数化循环一致生成对抗性网络(PCGAN)在各种操作角生成合成数据集。所提出的PCGAN能够从在真实世界的操作条件下记录的图像数据集中学习,在拐角处只有几个样本,并在给定的操作拐角处合成大型数据集。以STOP符号检测为例,我们的数值实验表明,所提出的方法能够生成高质量的合成数据集,以便于准确验证。
{"title":"Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving","authors":"Handi Yu, Xin Li","doi":"10.1145/3571286","DOIUrl":"https://doi.org/10.1145/3571286","url":null,"abstract":"Today's automotive cyber-physical systems for autonomous driving aim to enhance driving safety by replacing the uncertainties posed by human drivers with standard procedures of automated systems. However, the accuracy of in-vehicle perception systems may significantly vary under different operational conditions (e.g., fog density, light condition, etc.) and consequently degrade the reliability of autonomous driving. A perception system for autonomous driving must be carefully validated with an extremely large dataset collected under all possible operational conditions in order to ensure its robustness. The aforementioned dataset required for validation, however, is expensive or even impossible to acquire in practice, since most operational corners rarely occur in a real-world environment. In this paper, we propose to generate synthetic datasets at a variety of operational corners by using a parameterized cycle-consistent generative adversarial network (PCGAN). The proposed PCGAN is able to learn from an image dataset recorded at real-world operational conditions with only a few samples at corners and synthesize a large dataset at a given operational corner. By taking STOP sign detection as an example, our numerical experiments demonstrate that the proposed approach is able to generate high-quality synthetic datasets to facilitate accurate validation.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42881393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics 基于视频流特性的入侵无人机入侵检测框架
IF 2.3 Q1 Mathematics Pub Date : 2023-01-17 DOI: 10.1145/3579999
Anas Alsoliman, Giulio Rigoni, Davide Callegaro, M. Levorato, C. Pinotti, M. Conti
Cheap commercial off-the-shelf (COTS) First-Person View (FPV) drones have become widely available for consumers in recent years. Unfortunately, they also provide low-cost attack opportunities to malicious users. Thus, effective methods to detect the presence of unknown and non-cooperating drones within a restricted area are highly demanded. Approaches based on detection of drones based on emitted video stream have been proposed, but were not yet shown to work against other similar benign traffic, such as that generated by wireless security cameras. Most importantly, these approaches were not studied in the context of detecting new unprofiled drone types. In this work, we propose a novel drone detection framework, which leverages specific patterns in video traffic transmitted by drones. The patterns consist of repetitive synchronization packets (we call pivots), which we use as features for a machine learning classifier. We show that our framework can achieve up to 99% in detection accuracy over an encrypted WiFi channel using only 170 packets originated from the drone within 820ms time period. Our framework is able to identify drone transmissions even among very similar WiFi transmissions (such as video streams originated from security cameras) as well as in noisy scenarios with background traffic. Furthermore, the design of our pivot features enables the classifier to detect unprofiled drones in which the classifier has never trained on and is refined using a novel feature selection strategy that selects the features that have the discriminative power of detecting new unprofiled drones.
近年来,廉价的商用现货(COTS)第一人称视角(FPV)无人机已广泛为消费者所用。不幸的是,它们还为恶意用户提供了低成本的攻击机会。因此,迫切需要有效的方法来检测禁区内未知和不合作的无人机的存在。已经提出了基于发射的视频流检测无人机的方法,但尚未证明可以对抗其他类似的良性交通,例如无线安全摄像头产生的交通。最重要的是,这些方法没有在检测新的未盈利无人机类型的背景下进行研究。在这项工作中,我们提出了一种新的无人机检测框架,该框架利用了无人机传输的视频流量中的特定模式。这些模式由重复的同步数据包(我们称之为枢轴)组成,我们将其用作机器学习分类器的特征。我们表明,在820ms的时间段内,仅使用来自无人机的170个数据包,我们的框架就可以在加密WiFi信道上实现高达99%的检测准确率。我们的框架能够识别无人机的传输,即使是在非常相似的WiFi传输(例如源自安全摄像头的视频流)中,以及在有背景交通的嘈杂场景中。此外,我们的中枢特征的设计使分类器能够检测到分类器从未训练过的未盈利无人机,并使用一种新的特征选择策略进行改进,该策略选择具有检测新的未盈利无人人机的辨别能力的特征。
{"title":"Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics","authors":"Anas Alsoliman, Giulio Rigoni, Davide Callegaro, M. Levorato, C. Pinotti, M. Conti","doi":"10.1145/3579999","DOIUrl":"https://doi.org/10.1145/3579999","url":null,"abstract":"Cheap commercial off-the-shelf (COTS) First-Person View (FPV) drones have become widely available for consumers in recent years. Unfortunately, they also provide low-cost attack opportunities to malicious users. Thus, effective methods to detect the presence of unknown and non-cooperating drones within a restricted area are highly demanded. Approaches based on detection of drones based on emitted video stream have been proposed, but were not yet shown to work against other similar benign traffic, such as that generated by wireless security cameras. Most importantly, these approaches were not studied in the context of detecting new unprofiled drone types. In this work, we propose a novel drone detection framework, which leverages specific patterns in video traffic transmitted by drones. The patterns consist of repetitive synchronization packets (we call pivots), which we use as features for a machine learning classifier. We show that our framework can achieve up to 99% in detection accuracy over an encrypted WiFi channel using only 170 packets originated from the drone within 820ms time period. Our framework is able to identify drone transmissions even among very similar WiFi transmissions (such as video streams originated from security cameras) as well as in noisy scenarios with background traffic. Furthermore, the design of our pivot features enables the classifier to detect unprofiled drones in which the classifier has never trained on and is refined using a novel feature selection strategy that selects the features that have the discriminative power of detecting new unprofiled drones.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49235077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey 基于机器学习的智能网格入侵检测研究综述
IF 2.3 Q1 Mathematics Pub Date : 2023-01-11 DOI: 10.1145/3578366
Nitasha Sahani, Ruoxi Zhu, Jinny Cho, Chen-Ching Liu
Machine learning (ML)-based intrusion detection system (IDS) approaches have been significantly applied and advanced the state-of-the-art system security and defense mechanisms. In smart grid computing environments, security threats have been significantly increased as shared networks are commonly used, along with the associated vulnerabilities. However, compared to other network environments, ML-based IDS research in a smart grid is relatively unexplored, although the smart grid environment is facing serious security threats due to its unique environmental vulnerabilities. In this article, we conducted an extensive survey on ML-based IDS in smart grids based on the following key aspects: (1) The applications of the ML-based IDS in transmission and distribution side power components of a smart power grid by addressing its security vulnerabilities; (2) dataset generation process and its usage in applying ML-based IDSs in the smart grid; (3) a wide range of ML-based IDSs used by the surveyed papers in the smart grid environment; (4) metrics, complexity analysis, and evaluation testbeds of the IDSs applied in the smart grid; and (5) lessons learned, insights, and future research directions.
基于机器学习(ML)的入侵检测系统(IDS)方法已经得到了显著的应用,并推进了最先进的系统安全和防御机制。在智能网格计算环境中,由于共享网络的普遍使用,安全威胁以及相关的漏洞显著增加。然而,与其他网络环境相比,智能电网中基于ML的IDS研究相对未被探索,尽管智能电网环境由于其独特的环境漏洞而面临严重的安全威胁。在本文中,我们基于以下关键方面对智能电网中基于ML的IDS进行了广泛的调查:(1)通过解决其安全漏洞,介绍了基于ML的入侵检测系统在智能电网输配电侧电力元件中的应用;(2) 数据集生成过程及其在智能电网中应用基于ML的IDS中的使用;(3) 被调查论文在智能电网环境中使用的广泛的基于ML的IDS;(4) 智能电网中应用的IDS的度量、复杂性分析和评估试验台;以及(5)经验教训、见解和未来的研究方向。
{"title":"Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey","authors":"Nitasha Sahani, Ruoxi Zhu, Jinny Cho, Chen-Ching Liu","doi":"10.1145/3578366","DOIUrl":"https://doi.org/10.1145/3578366","url":null,"abstract":"Machine learning (ML)-based intrusion detection system (IDS) approaches have been significantly applied and advanced the state-of-the-art system security and defense mechanisms. In smart grid computing environments, security threats have been significantly increased as shared networks are commonly used, along with the associated vulnerabilities. However, compared to other network environments, ML-based IDS research in a smart grid is relatively unexplored, although the smart grid environment is facing serious security threats due to its unique environmental vulnerabilities. In this article, we conducted an extensive survey on ML-based IDS in smart grids based on the following key aspects: (1) The applications of the ML-based IDS in transmission and distribution side power components of a smart power grid by addressing its security vulnerabilities; (2) dataset generation process and its usage in applying ML-based IDSs in the smart grid; (3) a wide range of ML-based IDSs used by the surveyed papers in the smart grid environment; (4) metrics, complexity analysis, and evaluation testbeds of the IDSs applied in the smart grid; and (5) lessons learned, insights, and future research directions.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46531489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Control Performance Analysis of Automotive Cyber-Physical Systems: A Study on Efficient Formal Verification 汽车网络物理系统的控制性能分析——一种有效的形式化验证方法研究
IF 2.3 Q1 Mathematics Pub Date : 2022-12-14 DOI: 10.1145/3576046
V. Panahi, M. Kargahi, Fathiyeh Faghih
Automotive cyber-physical systems consist of multiple control subsystems working under resource limitations, and the trend is to run the corresponding control tasks on a shared platform. The resource requirements of the tasks are usually variable at runtime due to the uncertainties in the environment, necessitating some kinds of adaptation to deal with the resource limitations. Such adaptations may positively or negatively affect the control performance of several subsystems. Since there might be some thresholds on the control performances as quality constraints, this matter should be considered carefully to avoid any quality attribute constraint violation. This paper proposes a scalable control performance constraint verification method for such a system that works based on a feedback scheduler. The scalability is the result of a control-aware pruning method. In case of a constraint violation, the designer may change the system configuration and perform re-verification. Our evaluations show that the proposed method scales well while preserving the verification soundness.
汽车网络物理系统由多个在资源限制下工作的控制子系统组成,其趋势是在共享平台上运行相应的控制任务。由于环境的不确定性,任务的资源需求在运行时通常是可变的,因此需要进行某种调整来应对资源限制。这种适应可能对几个子系统的控制性能产生积极或消极的影响。由于控制性能可能存在一些阈值作为质量约束,因此应仔细考虑这一问题,以避免违反任何质量属性约束。针对这种基于反馈调度器的系统,本文提出了一种可伸缩控制性能约束验证方法。可伸缩性是控制感知修剪方法的结果。在违反约束的情况下,设计者可以更改系统配置并执行重新验证。我们的评估表明,所提出的方法在保持验证合理性的同时,具有良好的规模。
{"title":"Control Performance Analysis of Automotive Cyber-Physical Systems: A Study on Efficient Formal Verification","authors":"V. Panahi, M. Kargahi, Fathiyeh Faghih","doi":"10.1145/3576046","DOIUrl":"https://doi.org/10.1145/3576046","url":null,"abstract":"Automotive cyber-physical systems consist of multiple control subsystems working under resource limitations, and the trend is to run the corresponding control tasks on a shared platform. The resource requirements of the tasks are usually variable at runtime due to the uncertainties in the environment, necessitating some kinds of adaptation to deal with the resource limitations. Such adaptations may positively or negatively affect the control performance of several subsystems. Since there might be some thresholds on the control performances as quality constraints, this matter should be considered carefully to avoid any quality attribute constraint violation. This paper proposes a scalable control performance constraint verification method for such a system that works based on a feedback scheduler. The scalability is the result of a control-aware pruning method. In case of a constraint violation, the designer may change the system configuration and perform re-verification. Our evaluations show that the proposed method scales well while preserving the verification soundness.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42137204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1