首页 > 最新文献

Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management最新文献

英文 中文
MUSE: A Multi-slice Joint Analysis Method for Spatial Transcriptomics Experiments. MUSE:一种用于空间转录组学实验的多层联合分析方法。
Ziheng Duan, Xi Li, Zhiqing Xiao, Rex Ying, Jing Zhang

Recent advances in spatial transcriptomics (ST) and cost reductions have enabled large-scale multi-slice ST data generation, enhancing the statistical power to detect subtle biological signals. However, cross-slice inconsistencies and data quality variability present significant analytical challenges. To overcome these limitations, we developed MUSE, a computational framework designed for multislice joint embedding, spatial domain identification, and gene expression imputation. Specifically, MUSE integrates a two-module architecture to ensure robust cross-slice alignment and data harmonization. The alignment module models each slice as a graph and employs optimal transport to align cells across slices while preserving spatial continuity. The optimization module further refines integration by incorporating an alignment loss, allowing lower-quality data to leverage structural information from higher-quality slices. Additionally, MUSE generates virtual neighbors from aligned cells, enriching contextual information and mitigating data sparsity. These design principles enable seamless integration with existing single-slice methods, extending their applicability to multi-slice ST analysis. To comprehensively evaluate its performance, we applied MUSE to 12 real and 48 simulated datasets spanning a range of data qualities. Across all metrics, MUSE consistently outperformed existing methods in cross-slice consistency, spatial domain identification, and gene expression imputation. To promote accessibility and adoption, we provide MUSE as an open-source software package. As multi-slice ST datasets become increasingly prevalent, MUSE provides a robust and extensible framework designed to effectively integrate growing numbers of slices, thereby advancing the analysis of tissue architectures and spatial gene expression in complex biological systems.

空间转录组学(ST)的最新进展和成本的降低使大规模的多层ST数据生成成为可能,增强了检测细微生物信号的统计能力。然而,横向切片的不一致性和数据质量的可变性带来了重大的分析挑战。为了克服这些限制,我们开发了MUSE,这是一个设计用于多层关节嵌入、空间域识别和基因表达植入的计算框架。具体来说,MUSE集成了一个双模块架构,以确保稳健的横切片对齐和数据协调。对齐模块将每个切片建模为一个图,并采用最佳传输在保持空间连续性的同时,跨切片对齐单元。优化模块通过纳入对齐损失进一步优化集成,允许低质量数据利用来自高质量切片的结构信息。此外,MUSE从对齐的单元生成虚拟邻居,丰富了上下文信息并减轻了数据稀疏性。这些设计原则可以与现有的单片方法无缝集成,扩展其适用于多片ST分析。为了全面评估其性能,我们将MUSE应用于12个真实数据集和48个模拟数据集,涵盖了一系列数据质量。在所有指标中,MUSE在横向切片一致性、空间域识别和基因表达插入方面始终优于现有方法。为了促进可访问性和采用,我们将MUSE作为开源软件包提供。随着多切片ST数据集的日益普及,MUSE提供了一个强大且可扩展的框架,旨在有效整合越来越多的切片,从而推进复杂生物系统中组织结构和空间基因表达的分析。
{"title":"MUSE: A Multi-slice Joint Analysis Method for Spatial Transcriptomics Experiments.","authors":"Ziheng Duan, Xi Li, Zhiqing Xiao, Rex Ying, Jing Zhang","doi":"10.1145/3746252.3761240","DOIUrl":"10.1145/3746252.3761240","url":null,"abstract":"<p><p>Recent advances in spatial transcriptomics (ST) and cost reductions have enabled large-scale multi-slice ST data generation, enhancing the statistical power to detect subtle biological signals. However, cross-slice inconsistencies and data quality variability present significant analytical challenges. To overcome these limitations, we developed MUSE, a computational framework designed for multislice joint embedding, spatial domain identification, and gene expression imputation. Specifically, MUSE integrates a two-module architecture to ensure robust cross-slice alignment and data harmonization. The alignment module models each slice as a graph and employs optimal transport to align cells across slices while preserving spatial continuity. The optimization module further refines integration by incorporating an alignment loss, allowing lower-quality data to leverage structural information from higher-quality slices. Additionally, MUSE generates virtual neighbors from aligned cells, enriching contextual information and mitigating data sparsity. These design principles enable seamless integration with existing single-slice methods, extending their applicability to multi-slice ST analysis. To comprehensively evaluate its performance, we applied MUSE to 12 real and 48 simulated datasets spanning a range of data qualities. Across all metrics, MUSE consistently outperformed existing methods in cross-slice consistency, spatial domain identification, and gene expression imputation. To promote accessibility and adoption, we provide MUSE as an open-source software package. As multi-slice ST datasets become increasingly prevalent, MUSE provides a robust and extensible framework designed to effectively integrate growing numbers of slices, thereby advancing the analysis of tissue architectures and spatial gene expression in complex biological systems.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2025 ","pages":"625-634"},"PeriodicalIF":0.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12790625/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145960854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing. 几秒钟的后门:通过模型编辑解锁大型预训练模型中的漏洞。
Dongliang Guo, Mengxuan Hu, Zihan Guan, Junfeng Guo, Thomas Hartvigsen, Sheng Li

Large pre-trained models have achieved notable success across a range of downstream tasks. However, recent research shows that a type of adversarial attack (i.e., backdoor attack) can manipulate the behavior of machine learning models through contaminating their training dataset, posing significant threat in the real-world application of large pre-trained model, especially for those customized models. Therefore, addressing the unique challenges for exploring vulnerability of pre-trained models is of paramount importance. Through empirical studies on the capability for performing backdoor attack in large pre-trained models (e.g., ViT), we find the following unique challenges of attacking large pre-trained models: 1) the inability to manipulate or even access large training datasets, and 2) the substantial computational resources required for training or fine-tuning these models. To address these challenges, we establish new standards for an effective and feasible backdoor attack in the context of large pre-trained models. In line with these standards, we introduce our EDT model, an Efficient, Data-free, Training-free backdoor attack method. Inspired by model editing techniques, EDT injects an editing-based lightweight codebook into the backdoor of large pre-trained models, which replaces the embedding of the poisoned image with the target image without poisoning the training dataset or training the victim model. Our experiments, conducted across various pre-trained models such as ViT, CLIP, BLIP, and stable diffusion, and on downstream tasks including image classification, image captioning, and image generation, demonstrate the effectiveness of our method. Our code is available at https://github.com/donglgcn/Editing/.

大型预训练模型在一系列下游任务中取得了显著的成功。然而,最近的研究表明,一种类型的对抗性攻击(即后门攻击)可以通过污染机器学习模型的训练数据集来操纵机器学习模型的行为,这对大型预训练模型的实际应用构成了重大威胁,特别是对那些定制模型。因此,解决探索预训练模型的脆弱性的独特挑战是至关重要的。通过对大型预训练模型(如ViT)执行后门攻击能力的实证研究,我们发现攻击大型预训练模型面临以下独特挑战:1)无法操纵甚至访问大型训练数据集;2)训练或微调这些模型所需的大量计算资源。为了应对这些挑战,我们在大型预训练模型的背景下建立了有效可行的后门攻击的新标准。根据这些标准,我们介绍了我们的EDT模型,一种高效、无数据、无训练的后门攻击方法。EDT受模型编辑技术的启发,在大型预训练模型的后门中注入基于编辑的轻量级代码本,在不毒害训练数据集或训练受害者模型的情况下,将有毒图像的嵌入替换为目标图像。我们在各种预训练模型(如ViT、CLIP、BLIP和稳定扩散)以及下游任务(包括图像分类、图像字幕和图像生成)上进行的实验证明了我们方法的有效性。我们的代码可在https://github.com/donglgcn/Editing/上获得。
{"title":"Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing.","authors":"Dongliang Guo, Mengxuan Hu, Zihan Guan, Junfeng Guo, Thomas Hartvigsen, Sheng Li","doi":"10.1145/3746252.3761408","DOIUrl":"10.1145/3746252.3761408","url":null,"abstract":"<p><p>Large pre-trained models have achieved notable success across a range of downstream tasks. However, recent research shows that a type of adversarial attack (<i>i.e.,</i> backdoor attack) can manipulate the behavior of machine learning models through contaminating their training dataset, posing significant threat in the real-world application of large pre-trained model, especially for those customized models. Therefore, addressing the unique challenges for exploring vulnerability of pre-trained models is of paramount importance. Through empirical studies on the capability for performing backdoor attack in large pre-trained models (<i>e.g.,</i> ViT), we find the following unique challenges of attacking large pre-trained models: 1) the inability to manipulate or even access large training datasets, and 2) the substantial computational resources required for training or fine-tuning these models. To address these challenges, we establish new standards for an effective and feasible backdoor attack in the context of large pre-trained models. In line with these standards, we introduce our EDT model, an <b>E</b>fficient, <b>D</b>ata-free, <b>T</b>raining-free backdoor attack method. Inspired by model editing techniques, EDT injects an editing-based lightweight codebook into the backdoor of large pre-trained models, which replaces the embedding of the poisoned image with the target image without poisoning the training dataset or training the victim model. Our experiments, conducted across various pre-trained models such as ViT, CLIP, BLIP, and stable diffusion, and on downstream tasks including image classification, image captioning, and image generation, demonstrate the effectiveness of our method. Our code is available at https://github.com/donglgcn/Editing/.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2025 ","pages":"750-760"},"PeriodicalIF":0.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12703712/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145770243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iMIRACLE: an Iterative Multi-View Graph Neural Network to Model Intercellular Gene Regulation from Spatial Transcriptomic Data. iMIRACLE:从空间转录组数据建立细胞间基因调控模型的迭代多视图图神经网络。
Ziheng Duan, Siwei Xu, Cheyu Lee, Dylan Riffle, Jing Zhang

Spatial transcriptomics has transformed genomic research by measuring spatially resolved gene expressions, allowing us to investigate how cells adapt to their microenvironment via modulating their expressed genes. This essential process usually starts from cell-cell communication (CCC) via ligand-receptor (LR) interaction, leading to regulatory changes within the receiver cell. However, few methods were developed to connect them to provide biological insights into intercellular regulation. To fill this gap, we propose iMiracle, an iterative multi-view graph neural network that models each cell's intercellular regulation with three key features. Firstly, iMiracle integrates inter- and intra-cellular networks to jointly estimate cell-type- and micro-environment-driven gene expressions. Optionally, it allows prior knowledge of intra-cellular networks as pre-structured masks to maintain biological relevance. Secondly, iMiracle employs iterative learning to overcome the sparsity of spatial transcriptomic data and gradually fill in the missing edges in the CCC network. Thirdly, iMiracle infers a cell-specific ligand-gene regulatory score based on the contributions of different LR pairs to interpret inter-cellular regulation. We applied iMiracle to nine simulated and eight real datasets from three sequencing platforms and demonstrated that iMiracle consistently outperformed ten methods in gene expression imputation and four methods in regulatory score inference. Lastly, we developed iMiracle as an open-source software and anticipate that it can be a powerful tool in decoding the complexities of inter-cellular transcriptional regulation.

空间转录组学通过测量空间分辨的基因表达改变了基因组研究,使我们能够研究细胞如何通过调节其表达的基因来适应其微环境。这一重要过程通常从细胞间通信(CCC)开始,通过配体-受体(LR)相互作用,导致受体细胞内的调节变化。然而,很少有方法将它们联系起来,以提供对细胞间调节的生物学见解。为了填补这一空白,我们提出了iMiracle,这是一个迭代的多视图神经网络,它通过三个关键特征来模拟每个细胞的细胞间调节。首先,iMiracle集成了细胞间和细胞内网络,共同估计细胞类型和微环境驱动的基因表达。可选地,它允许细胞内网络的先验知识作为预结构掩模,以保持生物学相关性。其次,iMiracle采用迭代学习克服空间转录组数据的稀疏性,逐步填补CCC网络中缺失的边缘。第三,iMiracle根据不同LR对的贡献推断出细胞特异性配体-基因调控评分,以解释细胞间调控。我们将iMiracle应用于来自三个测序平台的9个模拟数据集和8个真实数据集,并证明iMiracle在基因表达imputation方面始终优于10种方法,在调控评分推断方面优于4种方法。最后,我们开发了iMiracle作为开源软件,并预计它可以成为解码细胞间转录调控复杂性的强大工具。
{"title":"iMIRACLE: an Iterative Multi-View Graph Neural Network to Model Intercellular Gene Regulation from Spatial Transcriptomic Data.","authors":"Ziheng Duan, Siwei Xu, Cheyu Lee, Dylan Riffle, Jing Zhang","doi":"10.1145/3627673.3679574","DOIUrl":"10.1145/3627673.3679574","url":null,"abstract":"<p><p>Spatial transcriptomics has transformed genomic research by measuring spatially resolved gene expressions, allowing us to investigate how cells adapt to their microenvironment via modulating their expressed genes. This essential process usually starts from cell-cell communication (CCC) via ligand-receptor (LR) interaction, leading to regulatory changes within the receiver cell. However, few methods were developed to connect them to provide biological insights into intercellular regulation. To fill this gap, we propose iMiracle, an iterative multi-view graph neural network that models each cell's intercellular regulation with three key features. Firstly, iMiracle integrates inter- and intra-cellular networks to jointly estimate <i>cell-type</i>- and <i>micro-environment</i>-driven gene expressions. Optionally, it allows prior knowledge of intra-cellular networks as pre-structured masks to maintain biological relevance. Secondly, iMiracle employs iterative learning to overcome the sparsity of spatial transcriptomic data and gradually fill in the missing edges in the CCC network. Thirdly, iMiracle infers a cell-specific ligand-gene regulatory score based on the contributions of different LR pairs to interpret inter-cellular regulation. We applied iMiracle to nine simulated and eight real datasets from three sequencing platforms and demonstrated that iMiracle consistently outperformed ten methods in gene expression imputation and four methods in regulatory score inference. Lastly, we developed iMiracle as an open-source software and anticipate that it can be a powerful tool in decoding the complexities of inter-cellular transcriptional regulation.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2024 ","pages":"538-548"},"PeriodicalIF":0.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11639074/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142830917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Privacy Bound for Shuffle Model with Personalized Privacy. 增强隐私绑定的Shuffle模型与个性化隐私。
Yixuan Liu, Yuhan Liu, Li Xiong, Yujie Gu, Hong Chen

The shuffle model of Differential Privacy (DP) is an enhanced privacy protocol which significantly amplifies the central DP guarantee by anonymizing and shuffling the local randomized data. Yet, deriving a tight privacy bound is challenging due to its complicated randomization protocol. While most existing works focused on uniform local privacy settings, this work focuses on a more practical personalized privacy setting. To bound the privacy after shuffling, we need to capture the probability of each user generating clones of the neighboring data points and quantify the indistinguishability between two distributions of the number of clones on neighboring datasets. Existing works either inaccurately capture the probability or underestimate the indistinguishability. We develop a more precise analysis, which yields a general and tighter bound for arbitrary DP mechanisms. Firstly, we derive the clone-generating probability by hypothesis testing, which leads to a more accurate characterization of the probability. Secondly, we analyze the indistinguishability in the context of f -DP, where the convexity of the distributions is leveraged to achieve a tighter privacy bound. Theoretical and numerical results demonstrate that our bound remarkably outperforms the existing results in the literature. The code is publicly available at https://github.com/Emory-AIMS/HPS.git.

差分隐私(DP)的shuffle模型是一种增强的隐私协议,它通过对局部随机数据进行匿名化和shuffle,显著增强了中心DP保证。然而,由于其复杂的随机化协议,推导严格的隐私约束是具有挑战性的。虽然大多数现有的工作都集中在统一的本地隐私设置上,但这项工作侧重于更实用的个性化隐私设置。为了约束洗牌后的隐私,我们需要捕获每个用户生成相邻数据点克隆的概率,并量化相邻数据集中克隆数量的两个分布之间的不可区分性。现有的作品要么不准确地捕捉到这种可能性,要么低估了这种不可区分性。我们开发了一个更精确的分析,它为任意DP机构提供了一个一般和更严格的界。首先,我们通过假设检验推导出克隆产生的概率,从而得到更准确的概率表征。其次,我们分析了f -DP背景下的不可区分性,其中利用分布的凹凸性来实现更严格的隐私约束。理论和数值结果表明,我们的边界明显优于现有文献的结果。该代码可在https://github.com/Emory-AIMS/HPS.git上公开获得。
{"title":"Enhanced Privacy Bound for Shuffle Model with Personalized Privacy.","authors":"Yixuan Liu, Yuhan Liu, Li Xiong, Yujie Gu, Hong Chen","doi":"10.1145/3627673.3679911","DOIUrl":"10.1145/3627673.3679911","url":null,"abstract":"<p><p>The shuffle model of Differential Privacy (DP) is an enhanced privacy protocol which significantly amplifies the central DP guarantee by anonymizing and shuffling the local randomized data. Yet, deriving a tight privacy bound is challenging due to its complicated randomization protocol. While most existing works focused on uniform local privacy settings, this work focuses on a more practical personalized privacy setting. To bound the privacy after shuffling, we need to capture the probability of each user generating clones of the neighboring data points and quantify the indistinguishability between two distributions of the number of clones on neighboring datasets. Existing works either inaccurately capture the probability or underestimate the indistinguishability. We develop a more precise analysis, which yields a general and tighter bound for arbitrary DP mechanisms. Firstly, we derive the clone-generating probability by hypothesis testing, which leads to a more accurate characterization of the probability. Secondly, we analyze the indistinguishability in the context of <math><mi>f</mi></math> -DP, where the convexity of the distributions is leveraged to achieve a tighter privacy bound. Theoretical and numerical results demonstrate that our bound remarkably outperforms the existing results in the literature. The code is publicly available at https://github.com/Emory-AIMS/HPS.git.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2024 ","pages":"3907-3911"},"PeriodicalIF":0.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12094779/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144121635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
scACT: Accurate Cross-modality Translation via Cycle-consistent Training from Unpaired Single-cell Data. 摘要:从未配对的单细胞数据中通过循环一致训练进行准确的跨模态翻译。
Siwei Xu, Junhao Liu, Jing Zhang

Single-cell sequencing technologies have revolutionized genomics by enabling the simultaneous profiling of various molecular modalities within individual cells. Their integration, especially cross-modality translation, offers deep insights into cellular regulatory mechanisms. Many methods have been developed for cross-modality translation, but their reliance on scarce high-quality co-assay data limits their applicability. Addressing this, we introduce scACT, a deep generative model designed to extract cross-modality biological insights from unpaired single-cell data. scACT tackles three major challenges: aligning unpaired multi-modal data via adversarial training, facilitating cross-modality translation without prior knowledge via cycle-consistent training, and enabling interpretable regulatory interconnections explorations via in-silico perturbations. To test its performance, we applied scACT on diverse single-cell datasets and found it outperformed existing methods in all three tasks. Finally, we have developed scACT as an individual open-source software package to advance single-cell omics data processing and analysis within the research community.

单细胞测序技术通过能够同时分析单个细胞内的各种分子模式,彻底改变了基因组学。它们的整合,特别是跨模态翻译,提供了对细胞调控机制的深刻见解。已经开发了许多跨模态翻译方法,但它们对稀缺的高质量联合分析数据的依赖限制了它们的适用性。为了解决这个问题,我们引入了scACT,这是一个深度生成模型,旨在从未配对的单细胞数据中提取跨模态的生物学见解。scACT解决了三个主要挑战:通过对抗性训练对齐未配对的多模态数据,通过循环一致训练在没有先验知识的情况下促进跨模态翻译,以及通过计算机扰动实现可解释的调节互连探索。为了测试其性能,我们将scACT应用于不同的单细胞数据集,发现它在所有三个任务中都优于现有的方法。最后,我们开发了scACT作为一个独立的开源软件包,以促进研究社区内单细胞组学数据的处理和分析。
{"title":"scACT: Accurate Cross-modality Translation via Cycle-consistent Training from Unpaired Single-cell Data.","authors":"Siwei Xu, Junhao Liu, Jing Zhang","doi":"10.1145/3627673.3679576","DOIUrl":"10.1145/3627673.3679576","url":null,"abstract":"<p><p>Single-cell sequencing technologies have revolutionized genomics by enabling the simultaneous profiling of various molecular modalities within individual cells. Their integration, especially cross-modality translation, offers deep insights into cellular regulatory mechanisms. Many methods have been developed for cross-modality translation, but their reliance on scarce high-quality co-assay data limits their applicability. Addressing this, we introduce scACT, a deep generative model designed to extract cross-modality biological insights from unpaired single-cell data. scACT tackles three major challenges: aligning unpaired multi-modal data via adversarial training, facilitating cross-modality translation without prior knowledge via cycle-consistent training, and enabling interpretable regulatory interconnections explorations via in-silico perturbations. To test its performance, we applied scACT on diverse single-cell datasets and found it outperformed existing methods in all three tasks. Finally, we have developed scACT as an individual open-source software package to advance single-cell omics data processing and analysis within the research community.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2024 ","pages":"2722-2731"},"PeriodicalIF":0.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11611688/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142775547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HypMix: Hyperbolic Representation Learning for Graphs with Mixed Hierarchical and Non-hierarchical Structures. HypMix:混合层次和非层次结构图的双曲表示学习。
Eric W Lee, Bo Xiong, Carl Yang, Joyce C Ho

Heterogeneous networks contain multiple types of nodes and links, with some link types encapsulating hierarchical structure over entities. Hierarchical relationships can codify information such as subcategories or one entity being subsumed by another and are often used for organizing conceptual knowledge into a tree-structured graph. Hyperbolic embedding models learn node representations in a hyperbolic space suitable for preserving the hierarchical structure. Unfortunately, current hyperbolic embedding models only implicitly capture the hierarchical structure, failing to distinguish between node types, and they only assume a single tree. In practice, many networks contain a mixture of hierarchical and non-hierarchical structures, and the hierarchical relations may be represented as multiple trees with complex structures, such as sharing certain entities. In this work, we propose a new hyperbolic representation learning model that can handle complex hierarchical structures and also learn the representation of both hierarchical and non-hierarchic structures. We evaluate our model on several datasets, including identifying relevant articles for a systematic review, which is an essential tool for evidence-driven medicine and node classification.

异构网络包含多种类型的节点和链路,其中一些链路类型封装了实体之上的层次结构。层次关系可以编纂诸如子类别或一个实体被另一个实体所包含之类的信息,通常用于将概念性知识组织成树状结构图。双曲嵌入模型在适于保留层次结构的双曲空间中学习节点表示。不幸的是,目前的双曲嵌入模型只能隐式地捕获层次结构,无法区分节点类型,而且它们只假设一个树。在实践中,许多网络包含层次结构和非层次结构的混合,层次关系可以表示为具有复杂结构的多棵树,例如共享某些实体。在这项工作中,我们提出了一种新的双曲表示学习模型,它可以处理复杂的层次结构,也可以学习层次和非层次结构的表示。我们在几个数据集上评估了我们的模型,包括为系统评价识别相关文章,这是证据驱动医学和淋巴结分类的重要工具。
{"title":"HypMix: Hyperbolic Representation Learning for Graphs with Mixed Hierarchical and Non-hierarchical Structures.","authors":"Eric W Lee, Bo Xiong, Carl Yang, Joyce C Ho","doi":"10.1145/3627673.3679940","DOIUrl":"10.1145/3627673.3679940","url":null,"abstract":"<p><p>Heterogeneous networks contain multiple types of nodes and links, with some link types encapsulating hierarchical structure over entities. Hierarchical relationships can codify information such as subcategories or one entity being subsumed by another and are often used for organizing conceptual knowledge into a tree-structured graph. Hyperbolic embedding models learn node representations in a hyperbolic space suitable for preserving the hierarchical structure. Unfortunately, current hyperbolic embedding models only implicitly capture the hierarchical structure, failing to distinguish between node types, and they only assume a single tree. In practice, many networks contain a mixture of hierarchical and non-hierarchical structures, and the hierarchical relations may be represented as multiple trees with complex structures, such as sharing certain entities. In this work, we propose a new hyperbolic representation learning model that can handle complex hierarchical structures and also learn the representation of both hierarchical and non-hierarchic structures. We evaluate our model on several datasets, including identifying relevant articles for a systematic review, which is an essential tool for evidence-driven medicine and node classification.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2024 ","pages":"3852-3856"},"PeriodicalIF":0.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11867734/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143525478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Causality-Aware Spatiotemporal Graph Neural Networks for Spatiotemporal Time Series Imputation. 基于因果关系感知的时空图神经网络。
Baoyu Jing, Dawei Zhou, Kan Ren, Carl Yang

Spatiotemporal time series are usually collected via monitoring sensors placed at different locations, which usually contain missing values due to various failures, such as mechanical damages and Internet outages. Imputing the missing values is crucial for analyzing time series. When recovering a specific data point, most existing methods consider all the information relevant to that point regardless of the cause-and-effect relationship. During data collection, it is inevitable that some unknown confounders are included, e.g., background noise in time series and non-causal shortcut edges in the constructed sensor network. These confounders could open backdoor paths and establish non-causal correlations between the input and output. Over-exploiting these non-causal correlations could cause overfitting. In this paper, we first revisit spatiotemporal time series imputation from a causal perspective and show how to block the confounders via the frontdoor adjustment. Based on the results of frontdoor adjustment, we introduce a novel Causality-Aware Spatiotemporal Graph Neural Network (Casper), which contains a novel Prompt Based Decoder (PBD) and a Spatiotemporal Causal Attention (SCA). PBD could reduce the impact of confounders and SCA could discover the sparse causal relationships among embeddings. Theoretical analysis reveals that SCA discovers causal relationships based on the values of gradients. We evaluate Casper on three real-world datasets, and the experimental results show that Casper could outperform the baselines and could effectively discover the causal relationships.

时空时间序列通常是通过放置在不同位置的监测传感器收集的,这些传感器通常由于各种故障(如机械损坏和互联网中断)而包含缺失值。在分析时间序列时,输入缺失值是至关重要的。当恢复一个特定的数据点时,大多数现有的方法考虑与该点相关的所有信息,而不考虑因果关系。在数据采集过程中,不可避免地会包含一些未知的混杂因素,如时间序列中的背景噪声、构建的传感器网络中的非因果捷径边等。这些混杂因素可以打开后门,在输入和输出之间建立非因果关系。过度利用这些非因果相关性可能会导致过度拟合。在本文中,我们首先从因果关系的角度重新审视时空时间序列的imputation,并展示了如何通过前门调整来阻止混杂因素。在前门调整结果的基础上,我们引入了一种新的因果感知时空图神经网络(Casper),它包含了一种新的基于提示的解码器(PBD)和时空因果注意(SCA)。PBD可以减少混杂因素的影响,SCA可以发现嵌入之间的稀疏因果关系。理论分析表明,SCA基于梯度值发现因果关系。我们在三个真实数据集上对Casper进行了评估,实验结果表明Casper可以优于基线,并且可以有效地发现因果关系。
{"title":"Causality-Aware Spatiotemporal Graph Neural Networks for Spatiotemporal Time Series Imputation.","authors":"Baoyu Jing, Dawei Zhou, Kan Ren, Carl Yang","doi":"10.1145/3627673.3679642","DOIUrl":"10.1145/3627673.3679642","url":null,"abstract":"<p><p>Spatiotemporal time series are usually collected via monitoring sensors placed at different locations, which usually contain missing values due to various failures, such as mechanical damages and Internet outages. Imputing the missing values is crucial for analyzing time series. When recovering a specific data point, most existing methods consider all the information relevant to that point regardless of the cause-and-effect relationship. During data collection, it is inevitable that some unknown confounders are included, e.g., background noise in time series and non-causal shortcut edges in the constructed sensor network. These confounders could open backdoor paths and establish non-causal correlations between the input and output. Over-exploiting these non-causal correlations could cause overfitting. In this paper, we first revisit spatiotemporal time series imputation from a causal perspective and show how to block the confounders via the frontdoor adjustment. Based on the results of frontdoor adjustment, we introduce a novel Causality-Aware Spatiotemporal Graph Neural Network (Casper), which contains a novel Prompt Based Decoder (PBD) and a Spatiotemporal Causal Attention (SCA). PBD could reduce the impact of confounders and SCA could discover the sparse causal relationships among embeddings. Theoretical analysis reveals that SCA discovers causal relationships based on the values of gradients. We evaluate Casper on three real-world datasets, and the experimental results show that Casper could outperform the baselines and could effectively discover the causal relationships.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2024 ","pages":"1027-1037"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11876796/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143560258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Node Classification over Distributed Ego-Networks with Secure Contrastive Embedding Sharing. 基于安全对比嵌入共享的分布式自我网络的联邦节点分类。
Han Xie, Li Xiong, Carl Yang

Federated learning on graphs (a.k.a., federated graph learning- FGL) has recently received increasing attention due to its capacity to enable collaborative learning over distributed graph datasets without compromising local clients' data privacy. In previous works, clients of FGL typically represent institutes or organizations that possess sets of entire graphs (e.g., molecule graphs in biochemical research) or parts of a larger graph (e.g., sub-user networks of e-commerce platforms). However, another natural paradigm exists where clients act as remote devices retaining the graph structures of local neighborhoods centered around the device owners (i.e., ego-networks), which can be modeled for specific graph applications such as user profiling on social ego-networks and infection prediction on contact ego-networks. FGL in such novel yet realistic ego-network settings faces the unique challenge of incomplete neighborhood information for non-ego local nodes since they likely appear and have different sets of neighbors in multiple ego-networks. To address this challenge, we propose an FGL method for distributed ego-networks in which clients obtain complete neighborhood information of local nodes through sharing node embeddings with other clients. A contrastive learning mechanism is proposed to bridge the gap between local and global node embeddings and stabilize the local training of graph neural network models, while a secure embedding sharing protocol is employed to protect individual node identity and embedding privacy against the server and other clients. Comprehensive experiments on various distributed ego-network datasets successfully demonstrate the effectiveness of our proposed embedding sharing method on top of different federated model sharing frameworks, and we also provide discussions on the potential efficiency and privacy drawbacks of the method as well as their future mitigation.

图上的联邦学习(又名联邦图学习- FGL)最近受到越来越多的关注,因为它能够在不损害本地客户端的数据隐私的情况下,在分布式图数据集上进行协作学习。在之前的工作中,FGL的客户通常代表拥有完整图集(如生化研究中的分子图)或更大图的部分(如电子商务平台的子用户网络)的机构或组织。然而,存在另一种自然范例,即客户端充当远程设备,保留以设备所有者(即自我网络)为中心的本地社区的图形结构,这可以为特定的图形应用程序建模,例如社交自我网络上的用户分析和接触自我网络上的感染预测。在这种新颖而现实的自我网络环境下,FGL面临着非自我局部节点邻居信息不完整的独特挑战,因为它们可能在多个自我网络中出现并拥有不同的邻居集。为了解决这一挑战,我们提出了一种用于分布式自我网络的FGL方法,其中客户端通过与其他客户端共享节点嵌入来获取本地节点的完整邻域信息。提出了一种对比学习机制来弥合局部和全局节点嵌入之间的差距,稳定图神经网络模型的局部训练,同时采用安全嵌入共享协议来保护单个节点的身份和嵌入隐私不受服务器和其他客户端的影响。在各种分布式自我网络数据集上的综合实验成功地证明了我们提出的嵌入共享方法在不同联邦模型共享框架之上的有效性,我们还讨论了该方法的潜在效率和隐私缺陷以及未来的缓解措施。
{"title":"Federated Node Classification over Distributed Ego-Networks with Secure Contrastive Embedding Sharing.","authors":"Han Xie, Li Xiong, Carl Yang","doi":"10.1145/3627673.3679834","DOIUrl":"https://doi.org/10.1145/3627673.3679834","url":null,"abstract":"<p><p>Federated learning on graphs (a.k.a., federated graph learning- FGL) has recently received increasing attention due to its capacity to enable collaborative learning over distributed graph datasets without compromising local clients' data privacy. In previous works, clients of FGL typically represent institutes or organizations that possess sets of entire graphs (e.g., molecule graphs in biochemical research) or parts of a larger graph (e.g., sub-user networks of e-commerce platforms). However, another natural paradigm exists where clients act as remote devices retaining the graph structures of local neighborhoods centered around the device owners (i.e., ego-networks), which can be modeled for specific graph applications such as user profiling on social ego-networks and infection prediction on contact ego-networks. FGL in such novel yet realistic ego-network settings faces the unique challenge of incomplete neighborhood information for non-ego local nodes since they likely appear and have different sets of neighbors in multiple ego-networks. To address this challenge, we propose an FGL method for distributed ego-networks in which clients obtain complete neighborhood information of local nodes through sharing node embeddings with other clients. A contrastive learning mechanism is proposed to bridge the gap between local and global node embeddings and stabilize the local training of graph neural network models, while a secure embedding sharing protocol is employed to protect individual node identity and embedding privacy against the server and other clients. Comprehensive experiments on various distributed ego-network datasets successfully demonstrate the effectiveness of our proposed embedding sharing method on top of different federated model sharing frameworks, and we also provide discussions on the potential efficiency and privacy drawbacks of the method as well as their future mitigation.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2024 ","pages":"2607-2617"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11606401/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142775542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Health Data Sharing with Fine-Grained Privacy. 以细粒度隐私实现健康数据共享。
Luca Bonomi, Sepand Gousheh, Liyue Fan

Sharing health data is vital in advancing medical research and transforming knowledge into clinical practice. Meanwhile, protecting the privacy of data contributors is of paramount importance. To that end, several privacy approaches have been proposed to protect individual data contributors in data sharing, including data anonymization and data synthesis techniques. These approaches have shown promising results in providing privacy protection at the dataset level. In this work, we study the privacy challenges in enabling fine-grained privacy in health data sharing. Our work is motivated by recent research findings, in which patients and healthcare providers may have different privacy preferences and policies that need to be addressed. Specifically, we propose a novel and effective privacy solution that enables data curators (e.g., healthcare providers) to protect sensitive data elements while preserving data usefulness. Our solution builds on randomized techniques to provide rigorous privacy protection for sensitive elements and leverages graphical models to mitigate privacy leakage due to dependent elements. To enhance the usefulness of the shared data, our randomized mechanism incorporates domain knowledge to preserve semantic similarity and adopts a block-structured design to minimize utility loss. Evaluations with real-world health data demonstrate the effectiveness of our approach and the usefulness of the shared data for health applications.

共享健康数据对于推进医学研究和将知识转化为临床实践至关重要。同时,保护数据贡献者的隐私至关重要。为此,已经提出了几种隐私方法来保护数据共享中的个人数据贡献者,包括数据匿名化和数据合成技术。这些方法在数据集级别提供隐私保护方面显示出了有希望的结果。在这项工作中,我们研究了在健康数据共享中实现细粒度隐私的隐私挑战。我们的工作是由最近的研究结果推动的,在这些研究结果中,患者和医疗保健提供者可能有不同的隐私偏好和需要解决的政策。具体而言,我们提出了一种新颖有效的隐私解决方案,使数据管理者(如医疗保健提供者)能够在保持数据有用性的同时保护敏感数据元素。我们的解决方案建立在随机技术的基础上,为敏感元素提供严格的隐私保护,并利用图形模型来减少因依赖元素而导致的隐私泄露。为了增强共享数据的有用性,我们的随机化机制结合了领域知识来保持语义相似性,并采用块结构设计来最大限度地减少效用损失。对真实世界健康数据的评估表明了我们方法的有效性以及共享数据对健康应用的有用性。
{"title":"Enabling Health Data Sharing with Fine-Grained Privacy.","authors":"Luca Bonomi, Sepand Gousheh, Liyue Fan","doi":"10.1145/3583780.3614864","DOIUrl":"10.1145/3583780.3614864","url":null,"abstract":"<p><p>Sharing health data is vital in advancing medical research and transforming knowledge into clinical practice. Meanwhile, protecting the privacy of data contributors is of paramount importance. To that end, several privacy approaches have been proposed to protect individual data contributors in data sharing, including data anonymization and data synthesis techniques. These approaches have shown promising results in providing privacy protection at the dataset level. In this work, we study the privacy challenges in enabling fine-grained privacy in health data sharing. Our work is motivated by recent research findings, in which patients and healthcare providers may have different privacy preferences and policies that need to be addressed. Specifically, we propose a novel and effective privacy solution that enables data curators (e.g., healthcare providers) to protect sensitive data elements while preserving data usefulness. Our solution builds on randomized techniques to provide rigorous privacy protection for sensitive elements and leverages graphical models to mitigate privacy leakage due to dependent elements. To enhance the usefulness of the shared data, our randomized mechanism incorporates domain knowledge to preserve semantic similarity and adopts a block-structured design to minimize utility loss. Evaluations with real-world health data demonstrate the effectiveness of our approach and the usefulness of the shared data for health applications.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2023 ","pages":"131-141"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10601092/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71429999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MedCV: An Interactive Visualization System for Patient Cohort Identification from Medical Claim Data. MedCV:从医疗索赔数据中识别患者队列的交互式可视化系统。
Ashis Kumar Chanda, Tian Bai, Brian L Egleston, Slobodan Vucetic

Healthcare providers generate a medical claim after every patient visit. A medical claim consists of a list of medical codes describing the diagnosis and any treatment provided during the visit. Medical claims have been popular in medical research as a data source for retrospective cohort studies. This paper introduces a medical claim visualization system (MedCV) that supports cohort selection from medical claim data. MedCV was developed as part of a design study in collaboration with clinical researchers and statisticians. It helps a researcher to define inclusion rules for cohort selection by revealing relationships between medical codes and visualizing medical claims and patient timelines. Evaluation of our system through a user study indicates that MedCV enables domain experts to define high-quality inclusion rules in a time-efficient manner.

医疗保健提供者在每次患者就诊后生成医疗索赔。医疗索赔包括描述诊断和就诊期间提供的任何治疗的医疗代码列表。医学索赔作为回顾性队列研究的数据来源在医学研究中很受欢迎。本文介绍了一个医疗索赔可视化系统(MedCV),该系统支持从医疗索赔数据中进行队列选择。MedCV是与临床研究人员和统计学家合作开发的设计研究的一部分。它通过揭示医疗代码之间的关系以及可视化医疗索赔和患者时间表,帮助研究人员定义队列选择的纳入规则。通过用户研究对我们的系统进行的评估表明,MedCV使领域专家能够以高效的方式定义高质量的包含规则。
{"title":"MedCV: An Interactive Visualization System for Patient Cohort Identification from Medical Claim Data.","authors":"Ashis Kumar Chanda,&nbsp;Tian Bai,&nbsp;Brian L Egleston,&nbsp;Slobodan Vucetic","doi":"10.1145/3511808.3557157","DOIUrl":"10.1145/3511808.3557157","url":null,"abstract":"<p><p>Healthcare providers generate a medical claim after every patient visit. A medical claim consists of a list of medical codes describing the diagnosis and any treatment provided during the visit. Medical claims have been popular in medical research as a data source for retrospective cohort studies. This paper introduces a medical claim visualization system (MedCV) that supports cohort selection from medical claim data. MedCV was developed as part of a design study in collaboration with clinical researchers and statisticians. It helps a researcher to define inclusion rules for cohort selection by revealing relationships between medical codes and visualizing medical claims and patient timelines. Evaluation of our system through a user study indicates that MedCV enables domain experts to define high-quality inclusion rules in a time-efficient manner.</p>","PeriodicalId":74507,"journal":{"name":"Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management","volume":"2022 ","pages":"4828-4832"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9830554/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9098325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the ... ACM International Conference on Information & Knowledge Management. ACM International Conference on Information and Knowledge Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1