首页 > 最新文献

... International Conference on Contemporary Computing. IC3 (Conference)最新文献

英文 中文
Training Medical-Diagnosis Neural Networks on the Cloud with Privacy-Sensitive Patient Data from Multiple Clients. 使用来自多个客户端的隐私敏感患者数据在云上训练医疗诊断神经网络。
Pub Date : 2022-08-01 DOI: 10.1145/3549206.3549291
Dimitrios Melissourgos, Hanzhi Gao, Chaoyi Ma, Shigang Chen, Sam S Wu

Artificial neural networks (ANNs) are changing the paradigm in medical diagnosis. However, it remains an open problem how to outsource the model training operations to the cloud while protecting the privacy of distributed patient data. Homomorphic encryption suffers from high overhead over data independently encrypted from numerous sources, differential privacy introduces a high level of noise which drastically increases the number of patient records needed to train a model, while federated learning requires all participants to perform synchronized local training that counters our goal of outsourcing all training operations to the cloud. This paper proposes to use matrix masking for outsourcing all model training operations to the cloud with privacy protection. After outsourcing their masked data to the cloud, the clients do not need to coordinate and perform any local training operations. The accuracy of the models trained by the cloud from the masked data is comparable to the accuracy of the optimal benchmark models that are trained directly from the original raw data. Our results are confirmed by experimental studies on privacy-preserving cloud training of medical-diagnosis neural network models based on real-world Alzheimer's disease data and Parkinson's disease data.

人工神经网络(ann)正在改变医学诊断的范式。然而,如何将模型训练操作外包到云端,同时保护分布式患者数据的隐私,仍然是一个悬而未决的问题。同态加密与来自多个来源的独立加密数据相比,存在较高的开销,差异隐私引入了高水平的噪声,从而大大增加了训练模型所需的患者记录数量,而联邦学习要求所有参与者执行同步的本地训练,这与我们将所有训练操作外包给云的目标背道而驰。本文提出使用矩阵掩蔽将所有模型训练操作外包到云端,同时保护隐私。客户将掩码数据外包给云后,不需要协调和执行任何本地培训操作。由云从屏蔽数据中训练的模型的准确性与直接从原始数据中训练的最佳基准模型的准确性相当。基于现实世界阿尔茨海默病数据和帕金森病数据的医疗诊断神经网络模型隐私保护云训练实验研究证实了我们的结果。
{"title":"Training Medical-Diagnosis Neural Networks on the Cloud with Privacy-Sensitive Patient Data from Multiple Clients.","authors":"Dimitrios Melissourgos,&nbsp;Hanzhi Gao,&nbsp;Chaoyi Ma,&nbsp;Shigang Chen,&nbsp;Sam S Wu","doi":"10.1145/3549206.3549291","DOIUrl":"https://doi.org/10.1145/3549206.3549291","url":null,"abstract":"<p><p>Artificial neural networks (ANNs) are changing the paradigm in medical diagnosis. However, it remains an open problem how to outsource the model training operations to the cloud while protecting the privacy of distributed patient data. Homomorphic encryption suffers from high overhead over data independently encrypted from numerous sources, differential privacy introduces a high level of noise which drastically increases the number of patient records needed to train a model, while federated learning requires all participants to perform synchronized local training that counters our goal of outsourcing all training operations to the cloud. This paper proposes to use matrix masking for outsourcing all model training operations to the cloud with privacy protection. After outsourcing their masked data to the cloud, the clients do not need to coordinate and perform any local training operations. The accuracy of the models trained by the cloud from the masked data is comparable to the accuracy of the optimal benchmark models that are trained directly from the original raw data. Our results are confirmed by experimental studies on privacy-preserving cloud training of medical-diagnosis neural network models based on real-world Alzheimer's disease data and Parkinson's disease data.</p>","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"2022 ","pages":"502-508"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10155738/pdf/nihms-1892709.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9479376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obviating Multiple Attacks with Enhanced Logic Locking 通过增强逻辑锁定避免多重攻击
Pub Date : 2022-01-01 DOI: 10.1145/3549206.3549235
P. Anu, N. Mohankumar, M. N. Devi
{"title":"Obviating Multiple Attacks with Enhanced Logic Locking","authors":"P. Anu, N. Mohankumar, M. N. Devi","doi":"10.1145/3549206.3549235","DOIUrl":"https://doi.org/10.1145/3549206.3549235","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"56 1","pages":"162-167"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75881561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abstract of the Keynotes 主题演讲摘要
Pub Date : 2019-08-01 DOI: 10.1109/ic3.2019.8844903
I. Dhillon
Despite having remarkable performance on many sequence learning tasks, recurrent neural networks (RNNs) are hard to train with long sequences due to limited expressive power and the vanishing and exploding gradient issues. Previous work has focused on stabilizing the gradients by encouraging orthogonality of weight matrices via re-parameterization techniques. However, two major issues remain in these methods. First, the re-parameterization often relies on a chain of operations on small matrices or vectors that are not friendly to hardware accelerators. As a result, it becomes a source of performance bottleneck for training. Second, these methods fix the singular values of the transition matrix throughout the temporal dimension, which further restricts the expressive power of the model and wastes the potential of encoding useful information into the singular values. In this talk, I will present the Singular Value Gated RNN that can efficiently encode temporal information into singular values, as well as mitigate the vanishing and exploding gradient problems. In addition, we can design novel forward and backward propagation algorithms that are friendly to hardware accelerators. This leads to 3-4 times speedup on GPUs and greatly reduces memory cost. On contemporary applications like voice recognition and text summarization, where long term dependencies are hard to capture, the proposed method outperforms other recurrent models with similar or smaller model sizes. Joint work with Jiong Zhang of UT Austin
尽管递归神经网络(RNNs)在许多序列学习任务中表现出色,但由于表达能力有限以及梯度消失和爆炸问题,难以对长序列进行训练。以前的工作主要集中在通过重参数化技术鼓励权矩阵的正交性来稳定梯度。然而,这些方法仍然存在两个主要问题。首先,重新参数化通常依赖于对硬件加速器不友好的小矩阵或向量的一系列操作。因此,它成为培训绩效瓶颈的来源。其次,这些方法在整个时间维度上固定了转移矩阵的奇异值,这进一步限制了模型的表达能力,浪费了将有用信息编码到奇异值中的潜力。在这次演讲中,我将介绍奇异值门控RNN,它可以有效地将时间信息编码为奇异值,并减轻梯度消失和爆炸的问题。此外,我们还可以设计对硬件加速器友好的新颖的前向和后向传播算法。这使得gpu的速度提高了3-4倍,并大大降低了内存成本。在语音识别和文本摘要等难以捕获长期依赖关系的当代应用中,所提出的方法优于其他具有相似或更小模型大小的循环模型。与德州大学奥斯汀分校的张炯合作
{"title":"Abstract of the Keynotes","authors":"I. Dhillon","doi":"10.1109/ic3.2019.8844903","DOIUrl":"https://doi.org/10.1109/ic3.2019.8844903","url":null,"abstract":"Despite having remarkable performance on many sequence learning tasks, recurrent neural networks (RNNs) are hard to train with long sequences due to limited expressive power and the vanishing and exploding gradient issues. Previous work has focused on stabilizing the gradients by encouraging orthogonality of weight matrices via re-parameterization techniques. However, two major issues remain in these methods. First, the re-parameterization often relies on a chain of operations on small matrices or vectors that are not friendly to hardware accelerators. As a result, it becomes a source of performance bottleneck for training. Second, these methods fix the singular values of the transition matrix throughout the temporal dimension, which further restricts the expressive power of the model and wastes the potential of encoding useful information into the singular values. In this talk, I will present the Singular Value Gated RNN that can efficiently encode temporal information into singular values, as well as mitigate the vanishing and exploding gradient problems. In addition, we can design novel forward and backward propagation algorithms that are friendly to hardware accelerators. This leads to 3-4 times speedup on GPUs and greatly reduces memory cost. On contemporary applications like voice recognition and text summarization, where long term dependencies are hard to capture, the proposed method outperforms other recurrent models with similar or smaller model sizes. Joint work with Jiong Zhang of UT Austin","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81789298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data-Driven Framework for Survivable Wireless Sensor Networks 可生存无线传感器网络的数据驱动框架
Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530461
Jasminder Kaur Sandhu, A. Verma, P. Rana
The data-driven technique uses real-world readings or simulated dataset to draw inference about the behavior of communication network. The design of the network is further optimized to enhance the performability according to the inference drawn. The performability of the network is dependent on the performance parameters of the network such as packet delivery ratio, packets dropped, delay, throughput, and data rate. The data rate prediction is carried out using different machine learning techniques. Further, the performability of the network is directly associated with its survivability. Better is the network performability, more is the survivability of that particular network. This work proposes a framework for survivable Wireless Sensor Network which predicts the data rate of the network. The past experience serves as an optimized way to traverse data in the network with efficient data rate. A primary dataset designed with the help of simulations is used for this work. Also, the robustness of best predictive model is checked with the help of N-fold cross-validation technique.
数据驱动技术使用真实世界的读数或模拟数据集来推断通信网络的行为。根据得出的推理,进一步优化网络的设计,提高网络的可执行性。网络的性能取决于网络的性能参数,如丢包率、丢包率、时延、吞吐量、数据速率等。数据率预测使用不同的机器学习技术进行。此外,网络的可执行性与其生存能力直接相关。网络的性能越好,特定网络的生存能力越强。本文提出了一个可生存无线传感器网络的框架,用于预测网络的数据速率。过去的经验可以作为一种优化的方式,以高效的数据速率在网络中遍历数据。在模拟的帮助下设计了一个主要数据集用于这项工作。同时,利用N-fold交叉验证技术对最佳预测模型的鲁棒性进行了检验。
{"title":"A Data-Driven Framework for Survivable Wireless Sensor Networks","authors":"Jasminder Kaur Sandhu, A. Verma, P. Rana","doi":"10.1109/IC3.2018.8530461","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530461","url":null,"abstract":"The data-driven technique uses real-world readings or simulated dataset to draw inference about the behavior of communication network. The design of the network is further optimized to enhance the performability according to the inference drawn. The performability of the network is dependent on the performance parameters of the network such as packet delivery ratio, packets dropped, delay, throughput, and data rate. The data rate prediction is carried out using different machine learning techniques. Further, the performability of the network is directly associated with its survivability. Better is the network performability, more is the survivability of that particular network. This work proposes a framework for survivable Wireless Sensor Network which predicts the data rate of the network. The past experience serves as an optimized way to traverse data in the network with efficient data rate. A primary dataset designed with the help of simulations is used for this work. Also, the robustness of best predictive model is checked with the help of N-fold cross-validation technique.","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78383572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiple Team Formation Using an Evolutionary Approach 使用进化方法组建多团队
Pub Date : 2018-08-01 DOI: 10.1109/IC3.2018.8530662
Vivek Singh Baghel, S. Bhavani
Multiple team formation problem is an interesting problem in the area of social network analysis which asks how experts can be assigned among multiple projects so that the effectiveness of allocation can be maximized. In this paper, we consider an approach based on genetic algorithm and sociometry for calculating the social relationship between experts in each project. Due to unavailability of data set, experimentation has been performed on synthetic data set given by J. H. Gutiérrez et al. [1] and results show that the allocation of experts for different projects is effective compared to the algorithm proposed in the literature.
{"title":"Multiple Team Formation Using an Evolutionary Approach","authors":"Vivek Singh Baghel, S. Bhavani","doi":"10.1109/IC3.2018.8530662","DOIUrl":"https://doi.org/10.1109/IC3.2018.8530662","url":null,"abstract":"Multiple team formation problem is an interesting problem in the area of social network analysis which asks how experts can be assigned among multiple projects so that the effectiveness of allocation can be maximized. In this paper, we consider an approach based on genetic algorithm and sociometry for calculating the social relationship between experts in each project. Due to unavailability of data set, experimentation has been performed on synthetic data set given by J. H. Gutiérrez et al. [1] and results show that the allocation of experts for different projects is effective compared to the algorithm proposed in the literature.","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"96 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81054850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Grenade Explosion Method for Maximum Weight Clique Problem 最大权重团问题的手榴弹爆炸方法
Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_8
Manohar Pallantla, Alok Singh
{"title":"Grenade Explosion Method for Maximum Weight Clique Problem","authors":"Manohar Pallantla, Alok Singh","doi":"10.1007/978-3-642-32129-0_8","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_8","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"25 1","pages":"20-27"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73761024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Biology and Computation 数据驱动的生物学和计算
Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_6
R. Hariharan
{"title":"Data-Driven Biology and Computation","authors":"R. Hariharan","doi":"10.1007/978-3-642-32129-0_6","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_6","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"2 1","pages":"7"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77603450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Robust Microcontroller Based Intelligent Prosthetic Limb 基于鲁棒单片机的智能假肢的研制
Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_45
Anup Nandy, Soumik Mondal, P. Chakraborty, G. Nandi
{"title":"Development of a Robust Microcontroller Based Intelligent Prosthetic Limb","authors":"Anup Nandy, Soumik Mondal, P. Chakraborty, G. Nandi","doi":"10.1007/978-3-642-32129-0_45","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_45","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"68 1","pages":"452-462"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79879293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Dynamic Model of Blended Biogeography Based Optimization for Land Cover Feature Extraction 基于混合生物地理的土地覆盖特征提取动态优化模型
Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_7
Lavika Goel, D. Gupta, V. Panchal
{"title":"Dynamic Model of Blended Biogeography Based Optimization for Land Cover Feature Extraction","authors":"Lavika Goel, D. Gupta, V. Panchal","doi":"10.1007/978-3-642-32129-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_7","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"15 1","pages":"8-19"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79030066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Saturation Analysis of IEEE 802.11 EDCA for Ad Hoc Networks 面向Ad Hoc网络的IEEE 802.11 EDCA饱和分析
Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_42
A. Abbas, K. A. A. Soufy
{"title":"Saturation Analysis of IEEE 802.11 EDCA for Ad Hoc Networks","authors":"A. Abbas, K. A. A. Soufy","doi":"10.1007/978-3-642-32129-0_42","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_42","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"86 1","pages":"419-430"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79160667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
... International Conference on Contemporary Computing. IC3 (Conference)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1