首页 > 最新文献

IEEE transactions on artificial intelligence最新文献

英文 中文
A Novel Applicable Shadow Resistant Neural Network Model for High-Efficiency Grid-Level Pavement Crack Detection 用于高效网格级路面裂缝检测的新型适用抗阴影神经网络模型
Pub Date : 2024-04-08 DOI: 10.1109/TAI.2024.3386149
Handuo Yang;Ju Huyan;Tao Ma;Yitao Song;Chengjia Han
To address two key challenges—limited grid-level detection capability and difficulty in detecting pavement cracks in complex environments, this study proposes a novel neural network model called CrackcellNet. This innovative model incorporates an output structure that enables end-to-end grid recognition and a module that enhances shadow image data to enhance crack detection. The model relies on the design of consecutive pooling layers to achieve adaptive target size grid output. By utilizing image fusion techniques, it enhances the quantity of shadow data in road surface detection. The results of ablation experiments indicate that the optimal configuration for CrackcellNet includes V-block and shadow augmentation operations, dilation rates of 1 or 2, and a convolutional layer in the CBA module. Through extensive experimentation, we have demonstrated that our model achieved an accuracy rate of 94.5% for grid-level crack detection and a F1 value of 0.839. Furthermore, practical engineering validation confirms the model's efficacy with an average PCIe of 0.045, providing valuable guidance for road maintenance decisions.
为了解决网格级检测能力有限和复杂环境下路面裂缝检测困难这两大难题,本研究提出了一种名为 CrackcellNet 的新型神经网络模型。这一创新模型包含一个可实现端到端网格识别的输出结构和一个可增强阴影图像数据以提高裂缝检测能力的模块。该模型依靠连续池化层的设计来实现自适应目标尺寸网格输出。通过利用图像融合技术,该模型增强了路面检测中阴影数据的数量。烧蚀实验结果表明,CrackcellNet 的最佳配置包括 V 块和阴影增强操作、1 或 2 的扩张率以及 CBA 模块中的卷积层。通过大量实验,我们证明了我们的模型在网格级裂纹检测方面达到了 94.5% 的准确率和 0.839 的 F1 值。此外,实际工程验证也证实了该模型的有效性,其平均 PCIe 为 0.045,为道路维护决策提供了宝贵的指导。
{"title":"A Novel Applicable Shadow Resistant Neural Network Model for High-Efficiency Grid-Level Pavement Crack Detection","authors":"Handuo Yang;Ju Huyan;Tao Ma;Yitao Song;Chengjia Han","doi":"10.1109/TAI.2024.3386149","DOIUrl":"https://doi.org/10.1109/TAI.2024.3386149","url":null,"abstract":"To address two key challenges—limited grid-level detection capability and difficulty in detecting pavement cracks in complex environments, this study proposes a novel neural network model called CrackcellNet. This innovative model incorporates an output structure that enables end-to-end grid recognition and a module that enhances shadow image data to enhance crack detection. The model relies on the design of consecutive pooling layers to achieve adaptive target size grid output. By utilizing image fusion techniques, it enhances the quantity of shadow data in road surface detection. The results of ablation experiments indicate that the optimal configuration for CrackcellNet includes V-block and shadow augmentation operations, dilation rates of 1 or 2, and a convolutional layer in the CBA module. Through extensive experimentation, we have demonstrated that our model achieved an accuracy rate of 94.5% for grid-level crack detection and a F1 value of 0.839. Furthermore, practical engineering validation confirms the model's efficacy with an average PCIe of 0.045, providing valuable guidance for road maintenance decisions.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4535-4549"},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prefetching-based Multiproposal Markov Chain Monte Carlo Algorithm 基于预取的多提案马尔可夫链蒙特卡洛算法
Pub Date : 2024-04-05 DOI: 10.1109/TAI.2024.3385384
Guifeng Ye;Shaowen Lu
Our proposed algorithm is a prefetching-based multiproposal Markov Chain Monte Carlo (PMP-MCMC) method that efficiently explores the target distribution by combining multiple proposals with the concept of prefetching. In our method, not all proposals are directly derived from the current state; some are derived from future states. This approach breaks through the inherent sequential characteristics of traditional MCMC algorithms. Compared with single-proposal and multiproposal methods, our approach speeds up by $K$ times and the burn-in period is reduced by a factor of $1/text{log}_{2}K$ maximally, where $K$ is the number of parallel computational units or processing cores. Compared with prefetching method, our method has increased the number of samples per iteration by a factor of $K/text{log}_{2}K$. Furthermore, the proposed method is general and can be integrated into MCMC variants such as Hamiltonian Monte Carlo (HMC). We have also applied this method to optimize the model parameters of neural networks and Bayesian inference and observed significant improvements in optimization performance.
我们提出的算法是一种基于预取的多方案马尔可夫链蒙特卡罗(PMP-MCMC)方法,通过将多个方案与预取概念相结合,有效地探索目标分布。在我们的方法中,并非所有建议都直接来自当前状态;有些建议来自未来状态。这种方法突破了传统 MCMC 算法固有的顺序特性。与单提案法和多提案法相比,我们的方法速度提高了 $K$ 倍,烧入期最大缩短了 1/text{log}_{2}K$ 倍,其中 $K$ 是并行计算单元或处理核心的数量。与预取方法相比,我们的方法将每次迭代的样本数量增加了 $K/text{log}_{2}K$。此外,我们提出的方法具有通用性,可以集成到 MCMC 变体中,如汉密尔顿蒙特卡罗(HMC)。我们还将这种方法应用于优化神经网络和贝叶斯推理的模型参数,并观察到优化性能的显著提高。
{"title":"Prefetching-based Multiproposal Markov Chain Monte Carlo Algorithm","authors":"Guifeng Ye;Shaowen Lu","doi":"10.1109/TAI.2024.3385384","DOIUrl":"https://doi.org/10.1109/TAI.2024.3385384","url":null,"abstract":"Our proposed algorithm is a prefetching-based multiproposal Markov Chain Monte Carlo (PMP-MCMC) method that efficiently explores the target distribution by combining multiple proposals with the concept of prefetching. In our method, not all proposals are directly derived from the current state; some are derived from future states. This approach breaks through the inherent sequential characteristics of traditional MCMC algorithms. Compared with single-proposal and multiproposal methods, our approach speeds up by \u0000<inline-formula><tex-math>$K$</tex-math></inline-formula>\u0000 times and the burn-in period is reduced by a factor of \u0000<inline-formula><tex-math>$1/text{log}_{2}K$</tex-math></inline-formula>\u0000 maximally, where \u0000<inline-formula><tex-math>$K$</tex-math></inline-formula>\u0000 is the number of parallel computational units or processing cores. Compared with prefetching method, our method has increased the number of samples per iteration by a factor of \u0000<inline-formula><tex-math>$K/text{log}_{2}K$</tex-math></inline-formula>\u0000. Furthermore, the proposed method is general and can be integrated into MCMC variants such as Hamiltonian Monte Carlo (HMC). We have also applied this method to optimize the model parameters of neural networks and Bayesian inference and observed significant improvements in optimization performance.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4493-4505"},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retain and Adapt: Online Sequential EEG Classification With Subject Shift 保留和适应:带有受试者偏移的在线顺序脑电图分类
Pub Date : 2024-04-05 DOI: 10.1109/TAI.2024.3385390
Tiehang Duan;Zhenyi Wang;Li Shen;Gianfranco Doretto;Donald A. Adjeroh;Fang Li;Cui Tao
Large variance exists in Electroencephalogram (EEG) signals with its pattern differing significantly across subjects. It is a challenging problem to perform online sequential decoding of EEG signals across different subjects, where a sequence of subjects arrive in temporal order and no signal data is jointly available beforehand. The challenges include the following two aspects: 1) the knowledge learned from previous subjects does not readily fit to future subjects, and fast adaptation is needed in the process; and 2) the EEG classifier could drastically erase information of learnt subjects as learning progresses, namely catastrophic forgetting. Most existing EEG decoding explorations use sizable data for pretraining purposes, and to the best of our knowledge we are the first to tackle this challenging online sequential decoding setting. In this work, we propose a unified bi-level meta-learning framework that enables the EEG decoder to simultaneously perform fast adaptation on future subjects and retain knowledge of previous subjects. In addition, we extend to the more general subject-agnostic scenario and propose a subject shift detection algorithm for situations that subject identity and the occurrence of subject shifts are unknown. We conducted experiments on three public EEG datasets for both subject-aware and subject-agnostic scenarios. The proposed method demonstrates its effectiveness in most of the ablation settings, e.g. an improvement of 5.73% for forgetting mitigation and 3.50% for forward adaptation on SEED dataset for subject agnostic scenarios.
脑电图(EEG)信号存在很大差异,不同受试者的脑电图模式也大不相同。要对不同受试者的脑电信号进行在线顺序解码是一个极具挑战性的问题,因为受试者会按时间顺序依次到达,而事先并没有共同的信号数据。挑战包括以下两个方面:1) 从以前的受试者身上学到的知识并不容易适用于未来的受试者,因此在这一过程中需要快速适应;以及 2) 随着学习的进行,脑电图分类器可能会大幅删除所学受试者的信息,即灾难性遗忘。现有的脑电解码探索大多使用大量数据进行预训练,据我们所知,我们是第一个解决这种具有挑战性的在线顺序解码设置的人。在这项工作中,我们提出了一个统一的双层元学习框架,使脑电解码器能够同时对未来的研究对象进行快速适应,并保留以前研究对象的知识。此外,我们还将其扩展到更一般的主体不可知场景,并针对主体身份和主体偏移发生情况未知的情况提出了主体偏移检测算法。我们在三个公共脑电图数据集上进行了主体感知和主体无关场景的实验。所提出的方法在大多数消融设置中都证明了其有效性,例如,在不考虑主体的情况下,SEED 数据集的遗忘缓解率提高了 5.73%,前向适配率提高了 3.50%。
{"title":"Retain and Adapt: Online Sequential EEG Classification With Subject Shift","authors":"Tiehang Duan;Zhenyi Wang;Li Shen;Gianfranco Doretto;Donald A. Adjeroh;Fang Li;Cui Tao","doi":"10.1109/TAI.2024.3385390","DOIUrl":"https://doi.org/10.1109/TAI.2024.3385390","url":null,"abstract":"Large variance exists in Electroencephalogram (EEG) signals with its pattern differing significantly across subjects. It is a challenging problem to perform online sequential decoding of EEG signals across different subjects, where a sequence of subjects arrive in temporal order and no signal data is jointly available beforehand. The challenges include the following two aspects: 1) the knowledge learned from previous subjects does not readily fit to future subjects, and fast adaptation is needed in the process; and 2) the EEG classifier could drastically erase information of learnt subjects as learning progresses, namely catastrophic forgetting. Most existing EEG decoding explorations use sizable data for pretraining purposes, and to the best of our knowledge we are the first to tackle this challenging online sequential decoding setting. In this work, we propose a unified bi-level meta-learning framework that enables the EEG decoder to simultaneously perform fast adaptation on future subjects and retain knowledge of previous subjects. In addition, we extend to the more general subject-agnostic scenario and propose a subject shift detection algorithm for situations that subject identity and the occurrence of subject shifts are unknown. We conducted experiments on three public EEG datasets for both subject-aware and subject-agnostic scenarios. The proposed method demonstrates its effectiveness in most of the ablation settings, e.g. an improvement of 5.73% for forgetting mitigation and 3.50% for forward adaptation on SEED dataset for subject agnostic scenarios.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4479-4492"},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shuffled Grouping Cross-Channel Attention-Based Bilateral-Filter-Interpolation Deformable ConvNet With Applications to Benthonic Organism Detection 基于洗牌分组跨信道注意力的双边滤波插值变形 ConvNet 在底栖生物检测中的应用
Pub Date : 2024-04-05 DOI: 10.1109/TAI.2024.3385387
Tingkai Chen;Ning Wang
In this article, to holistically tackle underwater detection degradation due to unknown geometric variation arising from scale, pose, viewpoint, and occlusion under low-contrast and color-distortion circumstances, a shuffled grouping cross-channel attention-based bilateral-filter-interpolation deformable ConvNet (SGCA-BDC) framework is established for benthonic organism detection (BOD). Main contributions are as follows: 1) By comprehensively considering spatial and feature similarities between offset and integral coordinate positions, the BDC with modulation weight mechanism is created, such that sampling ability of convolutional kernel for BO with unknown geometric variation can be adaptively augmented from spatial perspective; 2) By utilizing 1-D convolution to recalibrate channel weight for grouped subfeature via information entropy statistic technique, an SGCA module is innovated, such that seabed background noise can be suppressed from channel aspect; 3) The proposed SGCA-BDC scheme is eventually built in an organic manner by incorporating BDC and SGCA modules. Comprehensive experiments and comparisons demonstrate that the SGCA-BDC scheme remarkably outperforms typical detection approaches including Faster RCNN, SSD, YOLOv6, YOLOv7, YOLOv8, RetinaNet, and CenterNet in terms of mean average precision by 8.54%, 4.4%, 5.18%, 3.1%, 3.01%, 12.53%, and 7.09%, respectively.
本文从整体上解决了在低对比度和色彩失真情况下,由于尺度、姿态、视角和遮挡等未知几何变化引起的水下检测退化问题,建立了一种基于洗牌分组跨信道注意力的双边滤波插值可变形 ConvNet(SGCA-BDC)框架,用于底栖生物检测(BOD)。主要贡献如下1) 通过综合考虑偏移和积分坐标位置之间的空间和特征相似性,创建了具有调制权重机制的 BDC,从而可以从空间角度自适应地增强卷积核对未知几何变化的 BO 的采样能力;2) 利用一维卷积,通过信息熵统计技术重新校准分组子特征的信道权重,创新出 SGCA 模块,从而从信道方面抑制海底背景噪声; 3) 将 BDC 和 SGCA 模块有机结合,最终构建出 SGCA-BDC 方案。综合实验和比较表明,SGCA-BDC 方案的平均精度分别为 8.54%、4.4%、5.18%、3.1%、3.01%、12.53% 和 7.09%,明显优于 Faster RCNN、SSD、YOLOv6、YOLOv7、YOLOv8、RetinaNet 和 CenterNet 等典型检测方法。
{"title":"Shuffled Grouping Cross-Channel Attention-Based Bilateral-Filter-Interpolation Deformable ConvNet With Applications to Benthonic Organism Detection","authors":"Tingkai Chen;Ning Wang","doi":"10.1109/TAI.2024.3385387","DOIUrl":"https://doi.org/10.1109/TAI.2024.3385387","url":null,"abstract":"In this article, to holistically tackle underwater detection degradation due to unknown geometric variation arising from scale, pose, viewpoint, and occlusion under low-contrast and color-distortion circumstances, a shuffled grouping cross-channel attention-based bilateral-filter-interpolation deformable ConvNet (SGCA-BDC) framework is established for benthonic organism detection (BOD). Main contributions are as follows: 1) By comprehensively considering spatial and feature similarities between offset and integral coordinate positions, the BDC with modulation weight mechanism is created, such that sampling ability of convolutional kernel for BO with unknown geometric variation can be adaptively augmented from spatial perspective; 2) By utilizing 1-D convolution to recalibrate channel weight for grouped subfeature via information entropy statistic technique, an SGCA module is innovated, such that seabed background noise can be suppressed from channel aspect; 3) The proposed SGCA-BDC scheme is eventually built in an organic manner by incorporating BDC and SGCA modules. Comprehensive experiments and comparisons demonstrate that the SGCA-BDC scheme remarkably outperforms typical detection approaches including Faster RCNN, SSD, YOLOv6, YOLOv7, YOLOv8, RetinaNet, and CenterNet in terms of mean average precision by 8.54%, 4.4%, 5.18%, 3.1%, 3.01%, 12.53%, and 7.09%, respectively.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4506-4518"},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Unbiased Fuzzy Weighted Relative Error Support Vector Machine for Reverse Prediction of Concrete Components 用于反向预测混凝土构件的无偏模糊加权相对误差支持向量机
Pub Date : 2024-04-05 DOI: 10.1109/TAI.2024.3385386
Zongwen Fan;Jin Gou;Shaoyuan Weng
Concrete is a vital component in modern construction, prized for its strength, durability, and versatility. Accurately determining the quantities of concrete components is crucial in civil engineering applications to optimize resources (e.g., manpower and financial resources). In this article, we propose an unbiased fuzzy-weighted relative error support vector machine (UFW-RE-SVM) for reverse prediction of concrete components. First, we add an unbiased term to the target function of UFW-RE-SVM for obtaining an unbiased model. Second, we design a fuzzy-weighted operation to indicate sample importance by incorporating the fuzzy membership values into the UFW-RE-SVM. The $n$th root operation is introduced to address the exponential explosion issue in the fuzzy-weighted operation. Finally, considering the UFW-RE-SVM is sensitive to its hyperparameters for multioutput prediction, the whale optimization algorithm (WOA) is utilized for hyperparameter optimization for its effectiveness in optimization tasks. We design the fitness function based on the results from multiple components to balance the performance of multioutput predictions. Experimental results show that the performance of our proposed model outperforms existing works in predicting concrete components in terms of mean absolute relative error, standard deviation, and root mean square error. Further, the statistical test shows the WOA and two other metaheuristics can significantly improve the prediction performance. This indicates that the unbiased term, fuzzy-weighted operation, and WOA are effective for improving the proposed model for reverse prediction concrete components. With these promising results, the proposed model could provide decision-makers with a valuable tool for determining concrete component quantities based on desired concrete qualities.
混凝土是现代建筑的重要组成部分,因其强度、耐久性和多功能性而备受推崇。在土木工程应用中,准确确定混凝土构件的数量对于优化资源(如人力和财力)至关重要。在本文中,我们提出了一种用于反向预测混凝土构件的无偏模糊加权相对误差支持向量机(UFW-RE-SVM)。首先,我们在 UFW-RE-SVM 的目标函数中添加了一个无偏项,以获得一个无偏模型。其次,我们设计了一种模糊加权运算,通过将模糊成员值纳入 UFW-RE-SVM 来表示样本的重要性。为了解决模糊加权运算中的指数爆炸问题,我们引入了 $n$th 根运算。最后,考虑到 UFW-RE-SVM 对多输出预测的超参数很敏感,我们利用鲸鱼优化算法(WOA)进行超参数优化,以提高其在优化任务中的有效性。我们根据多个组件的结果设计拟合函数,以平衡多输出预测的性能。实验结果表明,在平均绝对相对误差、标准偏差和均方根误差方面,我们提出的模型在预测具体组件方面的性能优于现有的工作。此外,统计测试表明,WOA 和其他两种元启发式方法可以显著提高预测性能。这表明,无偏项、模糊加权运算和 WOA 对于改进反向预测混凝土构件的拟议模型是有效的。有了这些可喜的结果,所提出的模型可以为决策者提供一个有价值的工具,帮助他们根据所需的混凝土质量确定混凝土成分的数量。
{"title":"An Unbiased Fuzzy Weighted Relative Error Support Vector Machine for Reverse Prediction of Concrete Components","authors":"Zongwen Fan;Jin Gou;Shaoyuan Weng","doi":"10.1109/TAI.2024.3385386","DOIUrl":"https://doi.org/10.1109/TAI.2024.3385386","url":null,"abstract":"Concrete is a vital component in modern construction, prized for its strength, durability, and versatility. Accurately determining the quantities of concrete components is crucial in civil engineering applications to optimize resources (e.g., manpower and financial resources). In this article, we propose an unbiased fuzzy-weighted relative error support vector machine (UFW-RE-SVM) for reverse prediction of concrete components. First, we add an unbiased term to the target function of UFW-RE-SVM for obtaining an unbiased model. Second, we design a fuzzy-weighted operation to indicate sample importance by incorporating the fuzzy membership values into the UFW-RE-SVM. The \u0000<inline-formula><tex-math>$n$</tex-math></inline-formula>\u0000th root operation is introduced to address the exponential explosion issue in the fuzzy-weighted operation. Finally, considering the UFW-RE-SVM is sensitive to its hyperparameters for multioutput prediction, the whale optimization algorithm (WOA) is utilized for hyperparameter optimization for its effectiveness in optimization tasks. We design the fitness function based on the results from multiple components to balance the performance of multioutput predictions. Experimental results show that the performance of our proposed model outperforms existing works in predicting concrete components in terms of mean absolute relative error, standard deviation, and root mean square error. Further, the statistical test shows the WOA and two other metaheuristics can significantly improve the prediction performance. This indicates that the unbiased term, fuzzy-weighted operation, and WOA are effective for improving the proposed model for reverse prediction concrete components. With these promising results, the proposed model could provide decision-makers with a valuable tool for determining concrete component quantities based on desired concrete qualities.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4574-4584"},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prioritized Local Matching Network for Cross-Category Few-Shot Anomaly Detection 用于跨类别少镜头异常检测的优先级本地匹配网络
Pub Date : 2024-04-05 DOI: 10.1109/TAI.2024.3385743
Huilin Deng;Hongchen Luo;Wei Zhai;Yanming Guo;Yang Cao;Yu Kang
In response to the rapid evolution of products in industrial inspection, this article introduces the cross-category few-shot anomaly detection (C-FSAD) task, aimed at efficiently detecting anomalies in new object categories with minimal normal samples. However, the diversity of defects and significant visual distinctions among various objects hinder the identification of anomalous regions. To tackle this, we adopt a pairwise comparison between query and normal samples, establishing an intimate correlation through fine-grained correspondence. Specifically, we propose the prioritized local matching network (PLMNet), emphasizing local analysis of correlation, which includes three primary components: 1) Local perception network refines the initial matches through bidirectional local analysis; 2) step aggregation strategy employs multiple stages of local convolutional pooling to aggregate local insights; and 3) defect-sensitive Weight Learner adaptively enhances channels informative for defect structures, ensuring more discriminative representations of encoded context. Our PLMNet deepens the interpretation of correlations, from geometric cues to semantics, efficiently extracting discrepancies in feature space. Extensive experiments on two standard industrial anomaly detection benchmarks demonstrate our state-of-the-art performance in both detection and localization, with margins of 9.8% and 5.4%, respectively.
为了应对工业检测中产品的快速发展,本文介绍了跨类别少镜头异常检测(C-FSAD)任务,旨在用最少的正常样本高效检测新对象类别中的异常。然而,缺陷的多样性和不同物体之间的显著视觉差异阻碍了异常区域的识别。为了解决这个问题,我们采用了查询样本和正常样本之间的配对比较,通过细粒度的对应关系建立密切的相关性。具体来说,我们提出了优先本地匹配网络(PLMNet),强调对相关性的本地分析,包括三个主要部分:1)本地感知网络通过双向本地分析完善初始匹配;2)阶跃聚合策略采用多级本地卷积池来聚合本地洞察力;3)缺陷敏感的权重学习器(Weight Learner)自适应地增强缺陷结构的信息通道,确保编码上下文的表征更具区分性。我们的 PLMNet 深化了从几何线索到语义的相关性解释,有效地提取了特征空间中的差异。在两个标准工业异常检测基准上进行的广泛实验证明了我们在检测和定位方面的一流性能,误差率分别为 9.8% 和 5.4%。
{"title":"Prioritized Local Matching Network for Cross-Category Few-Shot Anomaly Detection","authors":"Huilin Deng;Hongchen Luo;Wei Zhai;Yanming Guo;Yang Cao;Yu Kang","doi":"10.1109/TAI.2024.3385743","DOIUrl":"https://doi.org/10.1109/TAI.2024.3385743","url":null,"abstract":"In response to the rapid evolution of products in industrial inspection, this article introduces the cross-category few-shot anomaly detection (C-FSAD) task, aimed at efficiently detecting anomalies in new object categories with minimal normal samples. However, the diversity of defects and significant visual distinctions among various objects hinder the identification of anomalous regions. To tackle this, we adopt a pairwise comparison between query and normal samples, establishing an intimate correlation through fine-grained correspondence. Specifically, we propose the prioritized local matching network (PLMNet), emphasizing local analysis of correlation, which includes three primary components: 1) Local perception network refines the initial matches through bidirectional local analysis; 2) step aggregation strategy employs multiple stages of local convolutional pooling to aggregate local insights; and 3) defect-sensitive Weight Learner adaptively enhances channels informative for defect structures, ensuring more discriminative representations of encoded context. Our PLMNet deepens the interpretation of correlations, from geometric cues to semantics, efficiently extracting discrepancies in feature space. Extensive experiments on two standard industrial anomaly detection benchmarks demonstrate our state-of-the-art performance in both detection and localization, with margins of 9.8% and 5.4%, respectively.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4550-4561"},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IOTM: Iterative Optimization Trigger Method—A Runtime Data-Free Backdoor Attacks on Deep Neural Networks IOTM:迭代优化触发法--深度神经网络的无运行时数据后门攻击
Pub Date : 2024-04-04 DOI: 10.1109/TAI.2024.3384938
Iram Arshad;Saeed Hamood Alsamhi;Yuansong Qiao;Brian Lee;Yuhang Ye
Deep neural networks are susceptible to various backdoor attacks, such as training time attacks, where the attacker can inject a trigger pattern into a small portion of the dataset to control the model's predictions at runtime. Backdoor attacks are dangerous because they do not degrade the model's performance. This article explores the feasibility of a new type of backdoor attack, a data-free backdoor. Unlike traditional backdoor attacks that require poisoning data and injection during training, our approach, the iterative optimization trigger method (IOTM), enables trigger generation without compromising the integrity of the models and datasets. We propose an attack based on an IOTM technique, guided by an adaptive trigger generator (ATG) and employing a custom objective function. ATG dynamically refines the trigger using feedback from the model's predictions. We empirically evaluated the effectiveness of IOTM with three deep learning models (CNN, VGG16, and ResNet18) using the CIFAR10 dataset. The achieved runtime-attack success rate (R-ASR) varies across different classes. For some classes, the R-ASR reached 100%; whereas, for others, it reached 62%. Furthermore, we conducted an ablation study to investigate critical factors in the runtime backdoor, including optimizer, weight, “REG,” and trigger visibility on R-ASR using the CIFAR100 dataset. We observed significant variations in the R-ASR by changing the optimizer, including Adam and SGD, with and without momentum. The R-ASR reached 81.25% with the Adam optimizer, whereas the SGD with momentum and without results reached 46.87% and 3.12%, respectively.
深度神经网络容易受到各种后门攻击,例如训练时间攻击,攻击者可以在一小部分数据集中注入触发模式,从而在运行时控制模型的预测。后门攻击非常危险,因为它们不会降低模型的性能。本文探讨了一种新型后门攻击--无数据后门--的可行性。传统的后门攻击需要在训练过程中毒化数据和注入数据,而我们的方法--迭代优化触发法(IOTM)--可以在不损害模型和数据集完整性的情况下生成触发器。我们提出了一种基于 IOTM 技术的攻击方法,它由自适应触发器(ATG)引导,并采用自定义目标函数。ATG 利用来自模型预测的反馈动态完善触发器。我们利用 CIFAR10 数据集,通过三种深度学习模型(CNN、VGG16 和 ResNet18)对 IOTM 的有效性进行了实证评估。不同类别的运行时间攻击成功率(R-ASR)各不相同。对于某些类别,R-ASR 达到 100%;而对于其他类别,R-ASR 则为 62%。此外,我们还利用 CIFAR100 数据集开展了一项消融研究,以调查运行时后门的关键因素,包括优化器、权重、"REG "和触发器可见性对 R-ASR 的影响。通过改变优化器(包括 Adam 和 SGD),我们观察到 R-ASR 在有动量和无动量的情况下有明显变化。使用 Adam 优化器时,R-ASR 达到 81.25%,而使用 SGD 时,有动量和无动量的 R-ASR 分别为 46.87% 和 3.12%。
{"title":"IOTM: Iterative Optimization Trigger Method—A Runtime Data-Free Backdoor Attacks on Deep Neural Networks","authors":"Iram Arshad;Saeed Hamood Alsamhi;Yuansong Qiao;Brian Lee;Yuhang Ye","doi":"10.1109/TAI.2024.3384938","DOIUrl":"https://doi.org/10.1109/TAI.2024.3384938","url":null,"abstract":"Deep neural networks are susceptible to various backdoor attacks, such as training time attacks, where the attacker can inject a trigger pattern into a small portion of the dataset to control the model's predictions at runtime. Backdoor attacks are dangerous because they do not degrade the model's performance. This article explores the feasibility of a new type of backdoor attack, a \u0000<italic>data-free</i>\u0000 backdoor. Unlike traditional backdoor attacks that require poisoning data and injection during training, our approach, the iterative optimization trigger method (IOTM), enables trigger generation without compromising the integrity of the models and datasets. We propose an attack based on an IOTM technique, guided by an adaptive trigger generator (ATG) and employing a custom objective function. ATG dynamically refines the trigger using feedback from the model's predictions. We empirically evaluated the effectiveness of IOTM with three deep learning models (CNN, VGG16, and ResNet18) using the CIFAR10 dataset. The achieved runtime-attack success rate (R-ASR) varies across different classes. For some classes, the R-ASR reached 100%; whereas, for others, it reached 62%. Furthermore, we conducted an ablation study to investigate critical factors in the runtime backdoor, including optimizer, weight, “REG,” and trigger visibility on R-ASR using the CIFAR100 dataset. We observed significant variations in the R-ASR by changing the optimizer, including Adam and SGD, with and without momentum. The R-ASR reached 81.25% with the Adam optimizer, whereas the SGD with momentum and without results reached 46.87% and 3.12%, respectively.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4562-4573"},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Robust and Efficient Defensive System Using Hybrid Adversarial Attack 利用混合对抗攻击构建稳健高效的防御系统
Pub Date : 2024-04-02 DOI: 10.1109/TAI.2024.3384337
Rachel Selva Dhanaraj;M. Sridevi
Adversarial attack is a method used to deceive machine learning models, which offers a technique to test the robustness of the given model, and it is vital to balance robustness with accuracy. Artificial intelligence (AI) researchers are constantly trying to find a better balance to develop new techniques and approaches to minimize loss of accuracy and increase robustness. To address these gaps, this article proposes a hybrid adversarial attack strategy by utilizing the Fast Gradient Sign Method and Projected Gradient Descent effectively to compute the perturbations that deceive deep neural networks, thus quantifying robustness without compromising its accuracy. Three distinct datasets—CelebA, CIFAR-10, and MNIST—were used in the extensive experiment, and six analyses were carried out to assess how well the suggested technique performed against attacks and defense mechanisms. The proposed model yielded confidence values of 99.99% for the MNIST dataset, 99.93% for the CelebA dataset, and 99.99% for the CIFAR-10 dataset. Defense study revealed that the proposed model outperformed previous models with a robust accuracy of 75.33% for the CelebA dataset, 55.4% for the CIFAR-10 dataset, and 98.65% for the MNIST dataset. The results of the experiment demonstrate that the proposed model is better than the other existing methods in computing the adversarial test and improvising the robustness of the system, thereby minimizing the accuracy loss.
对抗性攻击是一种用于欺骗机器学习模型的方法,它提供了一种测试给定模型鲁棒性的技术,而平衡鲁棒性与准确性至关重要。人工智能(AI)研究人员一直在努力寻找更好的平衡点,以开发新的技术和方法,尽量减少准确性损失,提高鲁棒性。针对这些差距,本文提出了一种混合对抗攻击策略,利用快速梯度符号法和投射梯度下降法有效计算欺骗深度神经网络的扰动,从而在不影响其准确性的情况下量化鲁棒性。在广泛的实验中使用了三个不同的数据集--CelebA、CIFAR-10 和 MNIST,并进行了六项分析,以评估所建议的技术在应对攻击和防御机制方面的表现。在 MNIST 数据集、CelebA 数据集和 CIFAR-10 数据集上,建议模型的置信度分别为 99.99%、99.93% 和 99.99%。防御研究表明,所提出的模型优于之前的模型,在 CelebA 数据集上的稳健准确率为 75.33%,在 CIFAR-10 数据集上的稳健准确率为 55.4%,在 MNIST 数据集上的稳健准确率为 98.65%。实验结果表明,所提出的模型在计算对抗测试和提高系统鲁棒性方面优于其他现有方法,从而最大限度地减少了准确率损失。
{"title":"Building a Robust and Efficient Defensive System Using Hybrid Adversarial Attack","authors":"Rachel Selva Dhanaraj;M. Sridevi","doi":"10.1109/TAI.2024.3384337","DOIUrl":"https://doi.org/10.1109/TAI.2024.3384337","url":null,"abstract":"Adversarial attack is a method used to deceive machine learning models, which offers a technique to test the robustness of the given model, and it is vital to balance robustness with accuracy. Artificial intelligence (AI) researchers are constantly trying to find a better balance to develop new techniques and approaches to minimize loss of accuracy and increase robustness. To address these gaps, this article proposes a hybrid adversarial attack strategy by utilizing the Fast Gradient Sign Method and Projected Gradient Descent effectively to compute the perturbations that deceive deep neural networks, thus quantifying robustness without compromising its accuracy. Three distinct datasets—CelebA, CIFAR-10, and MNIST—were used in the extensive experiment, and six analyses were carried out to assess how well the suggested technique performed against attacks and defense mechanisms. The proposed model yielded confidence values of 99.99% for the MNIST dataset, 99.93% for the CelebA dataset, and 99.99% for the CIFAR-10 dataset. Defense study revealed that the proposed model outperformed previous models with a robust accuracy of 75.33% for the CelebA dataset, 55.4% for the CIFAR-10 dataset, and 98.65% for the MNIST dataset. The results of the experiment demonstrate that the proposed model is better than the other existing methods in computing the adversarial test and improvising the robustness of the system, thereby minimizing the accuracy loss.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4470-4478"},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally 对抗式机器学习促进社会公益:将对手重塑为盟友
Pub Date : 2024-04-01 DOI: 10.1109/TAI.2024.3383407
Shawqi Al-Maliki;Adnan Qayyum;Hassan Ali;Mohamed Abdallah;Junaid Qadir;Dinh Thai Hoang;Dusit Niyato;Ala Al-Fuqaha
Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples—input samples that have been perturbed to force DNN-based models to make errors. As a result, adversarial machine learning (AdvML) has gained a lot of attention, and researchers have investigated these vulnerabilities in various settings and modalities. In addition, DNNs have also been found to incorporate embedded bias and often produce unexplainable predictions, which can result in antisocial AI applications. The emergence of new AI technologies that leverage large language models (LLMs), such as ChatGPT and GPT-4, increases the risk of producing antisocial applications at scale. AdvML for social good (AdvML4G) is an emerging field that repurposes the AdvML bug to invent prosocial applications. Regulators, practitioners, and researchers should collaborate to encourage the development of prosocial applications and hinder the development of antisocial ones. In this work, we provide the first comprehensive review of the emerging field of AdvML4G. This paper encompasses a taxonomy that highlights the emergence of AdvML4G, a discussion of the differences and similarities between AdvML4G and AdvML, a taxonomy covering social good-related concepts and aspects, an exploration of the motivations behind the emergence of AdvML4G at the intersection of ML4G and AdvML, and an extensive summary of the works that utilize AdvML4G as an auxiliary tool for innovating prosocial applications. Finally, we elaborate upon various challenges and open research issues that require significant attention from the research community.
深度神经网络(DNN)是机器学习领域近期取得的许多进展背后的推动力。然而,研究表明,深度神经网络很容易受到对抗性示例的影响--对抗性示例是指对输入样本进行扰动,迫使基于深度神经网络的模型出错。因此,对抗式机器学习(AdvML)受到了广泛关注,研究人员在各种环境和模式下对这些弱点进行了研究。此外,人们还发现 DNN 包含嵌入式偏差,经常产生无法解释的预测,这可能导致反社会的人工智能应用。利用大型语言模型(LLM)(如 ChatGPT 和 GPT-4)的新人工智能技术的出现,增加了大规模生产反社会应用的风险。AdvML for social good(AdvML4G)是一个新兴领域,它重新利用 AdvML bug 来发明亲社会应用。监管者、从业者和研究人员应通力合作,鼓励开发亲社会应用,阻止开发反社会应用。在这项工作中,我们首次全面回顾了 AdvML4G 这一新兴领域。本文包括一个强调 AdvML4G 出现的分类法、一个关于 AdvML4G 和 AdvML 之间异同的讨论、一个涵盖社会公益相关概念和方面的分类法、一个关于 AdvML4G 在 ML4G 和 AdvML 交汇处出现背后动机的探讨,以及一个关于利用 AdvML4G 作为创新亲社会应用的辅助工具的作品的广泛总结。最后,我们阐述了需要研究界高度重视的各种挑战和开放研究课题。
{"title":"Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally","authors":"Shawqi Al-Maliki;Adnan Qayyum;Hassan Ali;Mohamed Abdallah;Junaid Qadir;Dinh Thai Hoang;Dusit Niyato;Ala Al-Fuqaha","doi":"10.1109/TAI.2024.3383407","DOIUrl":"https://doi.org/10.1109/TAI.2024.3383407","url":null,"abstract":"Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples—input samples that have been perturbed to force DNN-based models to make errors. As a result, adversarial machine learning (AdvML) has gained a lot of attention, and researchers have investigated these vulnerabilities in various settings and modalities. In addition, DNNs have also been found to incorporate embedded bias and often produce unexplainable predictions, which can result in antisocial AI applications. The emergence of new AI technologies that leverage large language models (LLMs), such as ChatGPT and GPT-4, increases the risk of producing antisocial applications at scale. AdvML for social good (AdvML4G) is an emerging field that repurposes the AdvML bug to invent prosocial applications. Regulators, practitioners, and researchers should collaborate to encourage the development of prosocial applications and hinder the development of antisocial ones. In this work, we provide the first comprehensive review of the emerging field of AdvML4G. This paper encompasses a taxonomy that highlights the emergence of AdvML4G, a discussion of the differences and similarities between AdvML4G and AdvML, a taxonomy covering social good-related concepts and aspects, an exploration of the motivations behind the emergence of AdvML4G at the intersection of ML4G and AdvML, and an extensive summary of the works that utilize AdvML4G as an auxiliary tool for innovating prosocial applications. Finally, we elaborate upon various challenges and open research issues that require significant attention from the research community.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 9","pages":"4322-4343"},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142165062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain-Inspired Evolutionary Architectures for Spiking Neural Networks 尖峰神经网络的脑启发进化架构
Pub Date : 2024-03-31 DOI: 10.1109/TAI.2024.3407033
Wenxuan Pan;Feifei Zhao;Zhuoya Zhao;Yi Zeng
The intricate and distinctive evolutionary topology of the human brain enables it to execute multiple cognitive tasks simultaneously, and this automated evolutionary process of biological networks motivates our investigation into efficient architecture optimization for spiking neural networks (SNNs). Diverging from traditional manual-designed and hierarchical network architecture search (NAS), we advance the evolution of SNN architecture by integrating local, brain region-inspired modular structures with global cross-module connectivity. Locally, the brain region-inspired module consists of multiple neural motifs with excitatory and inhibitory connections; globally, free connections among modules, including long-term cross-module feedforward and feedback connections are evolved. We introduce an efficient multiobjective evolutionary algorithm that leverages a few-shot predictor, endowing SNNs with high performance and low energy consumption. Extensive experiments across both static (CIFAR10, CIFAR100) and neuromorphic (CIFAR10-DVS, DVS128-Gesture) datasets reveal that the proposed model significantly exhibits robustness while maintaining consistent and exceptional performance. This study pioneers in searching for optimal neural architectures for SNNs by integrating the human brain's advanced connectivity and modular organization into SNN optimization, thereby contributing valuable perspectives to the development of brain-inspired artificial intelligence.
人脑复杂而独特的进化拓扑结构使其能够同时执行多项认知任务,这种生物网络的自动进化过程促使我们对尖峰神经网络(SNN)的高效架构优化进行研究。与传统的人工设计和分层网络架构搜索(NAS)不同,我们通过整合局部脑区启发的模块结构和全局跨模块连接,推进尖峰神经网络架构的进化。从局部来看,受脑区启发的模块由具有兴奋和抑制连接的多个神经图案组成;从全局来看,模块之间的自由连接,包括长期的跨模块前馈和反馈连接得到了进化。我们引入了一种高效的多目标进化算法,该算法利用少量预测器,赋予 SNNs 高性能和低能耗。在静态(CIFAR10、CIFAR100)和神经形态(CIFAR10-DVS、DVS128-Gesture)数据集上进行的广泛实验表明,所提出的模型在保持稳定和卓越性能的同时,显著地表现出了鲁棒性。这项研究开创性地将人脑的高级连接性和模块化组织整合到 SNN 优化中,为 SNN 寻找最佳神经架构,从而为脑启发人工智能的发展提供了宝贵的视角。
{"title":"Brain-Inspired Evolutionary Architectures for Spiking Neural Networks","authors":"Wenxuan Pan;Feifei Zhao;Zhuoya Zhao;Yi Zeng","doi":"10.1109/TAI.2024.3407033","DOIUrl":"https://doi.org/10.1109/TAI.2024.3407033","url":null,"abstract":"The intricate and distinctive evolutionary topology of the human brain enables it to execute multiple cognitive tasks simultaneously, and this automated evolutionary process of biological networks motivates our investigation into efficient architecture optimization for spiking neural networks (SNNs). Diverging from traditional manual-designed and hierarchical network architecture search (NAS), we advance the evolution of SNN architecture by integrating local, brain region-inspired modular structures with global cross-module connectivity. Locally, the brain region-inspired module consists of multiple neural motifs with excitatory and inhibitory connections; globally, free connections among modules, including long-term cross-module feedforward and feedback connections are evolved. We introduce an efficient multiobjective evolutionary algorithm that leverages a few-shot predictor, endowing SNNs with high performance and low energy consumption. Extensive experiments across both static (CIFAR10, CIFAR100) and neuromorphic (CIFAR10-DVS, DVS128-Gesture) datasets reveal that the proposed model significantly exhibits robustness while maintaining consistent and exceptional performance. This study pioneers in searching for optimal neural architectures for SNNs by integrating the human brain's advanced connectivity and modular organization into SNN optimization, thereby contributing valuable perspectives to the development of brain-inspired artificial intelligence.","PeriodicalId":73305,"journal":{"name":"IEEE transactions on artificial intelligence","volume":"5 11","pages":"5760-5770"},"PeriodicalIF":0.0,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE transactions on artificial intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1