首页 > 最新文献

Array最新文献

英文 中文
Training a language model to learn the syntax of commands 训练语言模型以学习命令语法
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-03 DOI: 10.1016/j.array.2024.100355
Zafar Hussain , Jukka K. Nurminen , Perttu Ranta-aho

To protect systems from malicious activities, it is important to differentiate between valid and harmful commands. One way to achieve this is by learning the syntax of the commands, which is a complex task because of the expansive and evolving nature of command syntax. To address this, we harnessed the power of a language model. Our methodology involved constructing a specialized vocabulary from our commands dataset, and training a custom tokenizer with a Masked Language Model head, resulting in the development of a BERT-like language model. This model exhibits proficiency in learning command syntax by predicting masked tokens. In comparative analyses, our language model outperformed the Markov Model in categorizing commands using clustering algorithms (DBSCAN, HDBSCAN, OPTICS). The language model achieved higher Silhouette scores (0.72, 0.88, 0.85) compared to the Markov Model (0.53, 0.25, 0.06) and demonstrated significantly lower noise levels (2.63%, 5.39%, 8.49%) versus the Markov Model’s higher noise rates (9.31%, 29.85%, 50.35%). Further validation with manually crafted syntax and BERTScore assessments consistently produced metrics above 0.90 for precision, recall, and F1-score. Our language model excels at learning command syntax, enhancing protective measures against malicious activities.

要保护系统免受恶意活动的侵害,必须区分有效命令和有害命令。实现这一目标的方法之一是学习命令的语法,但由于命令语法的扩展性和演变性,这是一项复杂的任务。为此,我们利用了语言模型的强大功能。我们的方法包括从命令数据集中构建专门的词汇表,并使用屏蔽语言模型头训练自定义标记器,从而开发出类似于 BERT 的语言模型。该模型通过预测掩码标记来熟练学习命令语法。在比较分析中,我们的语言模型在使用聚类算法(DBSCAN、HDBSCAN、OPTICS)对命令进行分类方面的表现优于马尔可夫模型。与马尔可夫模型(0.53、0.25、0.06)相比,语言模型获得了更高的 Silhouette 分数(0.72、0.88、0.85),噪声水平(2.63%、5.39%、8.49%)也明显低于马尔可夫模型较高的噪声率(9.31%、29.85%、50.35%)。使用人工编写的语法和 BERTScore 评估进行进一步验证后,精确度、召回率和 F1 分数均超过了 0.90。我们的语言模型在学习命令语法方面表现出色,增强了针对恶意活动的保护措施。
{"title":"Training a language model to learn the syntax of commands","authors":"Zafar Hussain ,&nbsp;Jukka K. Nurminen ,&nbsp;Perttu Ranta-aho","doi":"10.1016/j.array.2024.100355","DOIUrl":"https://doi.org/10.1016/j.array.2024.100355","url":null,"abstract":"<div><p>To protect systems from malicious activities, it is important to differentiate between valid and harmful commands. One way to achieve this is by learning the syntax of the commands, which is a complex task because of the expansive and evolving nature of command syntax. To address this, we harnessed the power of a language model. Our methodology involved constructing a specialized vocabulary from our commands dataset, and training a custom tokenizer with a Masked Language Model head, resulting in the development of a BERT-like language model. This model exhibits proficiency in learning command syntax by predicting masked tokens. In comparative analyses, our language model outperformed the Markov Model in categorizing commands using clustering algorithms (DBSCAN, HDBSCAN, OPTICS). The language model achieved higher Silhouette scores (0.72, 0.88, 0.85) compared to the Markov Model (0.53, 0.25, 0.06) and demonstrated significantly lower noise levels (2.63%, 5.39%, 8.49%) versus the Markov Model’s higher noise rates (9.31%, 29.85%, 50.35%). Further validation with manually crafted syntax and BERTScore assessments consistently produced metrics above 0.90 for precision, recall, and F1-score. Our language model excels at learning command syntax, enhancing protective measures against malicious activities.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 ","pages":"Article 100355"},"PeriodicalIF":2.3,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000213/pdfft?md5=68aae0cad29d029f8b3ee94e2999445f&pid=1-s2.0-S2590005624000213-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141592737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy impact assessments in the wild: A scoping review 野外隐私影响评估:范围审查
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-02 DOI: 10.1016/j.array.2024.100356
Leonardo Horn Iwaya , Ala Sarah Alaqra , Marit Hansen , Simone Fischer-Hübner

Privacy Impact Assessments (PIAs) offer a process for assessing the privacy impacts of a project or system. As a privacy engineering strategy, they are one of the main approaches to privacy by design, supporting the early identification of threats and controls. However, there is still a shortage of empirical evidence on their use and proven effectiveness in practice. To better understand the current literature and research, this paper provides a comprehensive Scoping Review (ScR) on the topic of PIAs “in the wild,” following the well-established Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) guidelines. This ScR includes 45 studies, providing an extensive synthesis of the existing body of knowledge, classifying types of research and publications, appraising the methodological quality of primary research, and summarising the positive and negative aspects of PIAs in practice, as reported by those studies. This ScR also identifies significant research gaps (e.g., evidence gaps from contradictory results and methodological gaps from research design deficiencies), future research pathways, and implications for researchers, practitioners, and policymakers developing and using PIA frameworks. As we conclude, there is still a significant need for more primary research on the topic, both qualitative and quantitative. A critical appraisal of qualitative studies revealed deficiencies in the methodological quality, and only four quantitative studies were identified, suggesting that current primary research remains incipient. Nonetheless, PIAs can be regarded as a prominent sub-area in the broader field of empirical privacy engineering, in which further scientific research to support existing practices is needed.

隐私影响评估 (PIA) 提供了一个评估项目或系统隐私影响的流程。作为一种隐私工程策略,隐私影响评估是通过设计实现隐私保护的主要方法之一,有助于及早识别威胁和控制措施。然而,关于它们的使用和在实践中被证明的有效性,仍然缺乏实证证据。为了更好地了解当前的文献和研究,本文按照成熟的系统综述和荟萃分析首选报告项目 (PRISMA) 指南,对 "野生 "的 PIA 主题进行了全面的范围界定综述 (SCR)。本系统综述包括 45 项研究,对现有知识体系进行了广泛综述,对研究和出版物类型进行了分类,对主要研究的方法论质量进行了评估,并总结了这些研究报告中 PIA 在实践中的积极和消极方面。本科学报告还指出了重要的研究缺口(例如,相互矛盾的结果造成的证据缺口和研究设计缺陷造成的方法缺口)、未来的研究路径,以及对研究人员、从业人员和政策制定者开发和使用 PIA 框架的影响。正如我们总结的那样,仍然非常需要对该主题进行更多的初级研究,包括定性和定量研究。对定性研究的批判性评估显示了方法论质量方面的缺陷,仅发现了四项定量研究,这表明当前的初级研究仍处于起步阶段。尽管如此,隐私影响评估可被视为更广泛的实证隐私工程领域中的一个突出子领域,需要进一步的科学研究来支持现有的做法。
{"title":"Privacy impact assessments in the wild: A scoping review","authors":"Leonardo Horn Iwaya ,&nbsp;Ala Sarah Alaqra ,&nbsp;Marit Hansen ,&nbsp;Simone Fischer-Hübner","doi":"10.1016/j.array.2024.100356","DOIUrl":"https://doi.org/10.1016/j.array.2024.100356","url":null,"abstract":"<div><p>Privacy Impact Assessments (PIAs) offer a process for assessing the privacy impacts of a project or system. As a privacy engineering strategy, they are one of the main approaches to privacy by design, supporting the early identification of threats and controls. However, there is still a shortage of empirical evidence on their use and proven effectiveness in practice. To better understand the current literature and research, this paper provides a comprehensive Scoping Review (ScR) on the topic of PIAs “in the wild,” following the well-established Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) guidelines. This ScR includes 45 studies, providing an extensive synthesis of the existing body of knowledge, classifying types of research and publications, appraising the methodological quality of primary research, and summarising the positive and negative aspects of PIAs in practice, as reported by those studies. This ScR also identifies significant research gaps (e.g., evidence gaps from contradictory results and methodological gaps from research design deficiencies), future research pathways, and implications for researchers, practitioners, and policymakers developing and using PIA frameworks. As we conclude, there is still a significant need for more primary research on the topic, both qualitative and quantitative. A critical appraisal of qualitative studies revealed deficiencies in the methodological quality, and only four quantitative studies were identified, suggesting that current primary research remains incipient. Nonetheless, PIAs can be regarded as a prominent sub-area in the broader field of empirical privacy engineering, in which further scientific research to support existing practices is needed.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 ","pages":"Article 100356"},"PeriodicalIF":2.3,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000225/pdfft?md5=fc78c3586c447695244b568609d2c91f&pid=1-s2.0-S2590005624000225-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141604898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical representation learning for next basket recommendation 用于下一个篮子推荐的分层表示学习
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-17 DOI: 10.1016/j.array.2024.100354
Wenhua Zeng , Junjie Liu , Bo Zhang

The task of next basket recommendation is pivotal for recommender systems. It involves predicting user actions, such as the next product purchase or movie selection, by exploring sequential purchase behavior and integrating users’ general preferences. These elements may converge and influence users’ subsequent choices. The challenge intensifies with the presence of varied user purchase sequences in the training set, as indiscriminate incorporation of these sequences can introduce superfluous noise. In response to these challenges, we propose an innovative approach: the Selective Hierarchical Representation Model (SHRM). This model effectively integrates transactional data and user profiles to discern both sequential purchase transactions and general user preferences. The SHRM’s adaptability, particularly in employing nonlinear aggregation operations on user representations, enables it to model complex interactions among various influencing factors. Notably, the SHRM employs a Recurrent Neural Network (RNN) to capture extended dependencies in recent purchasing activities. Moreover, it incorporates an innovative sequence similarity task, grounded in a k-plet sampling strategy. This strategy clusters similar sequences, significantly mitigating the learning process’s noise impact. Through empirical validation on three diverse real-world datasets, we demonstrate that our model consistently surpasses leading benchmarks across various evaluation metrics, establishing a new standard in next-basket recommendation.

下一篮子推荐任务对推荐系统至关重要。它涉及通过探索用户的连续购买行为并综合用户的一般偏好来预测用户的行为,如下一次购买产品或选择电影。这些因素可能会交汇在一起,影响用户的后续选择。如果训练集中存在不同的用户购买序列,挑战就会加剧,因为不加区分地纳入这些序列可能会带来多余的噪音。为了应对这些挑战,我们提出了一种创新方法:选择性分层表示模型(SHRM)。该模型有效地整合了交易数据和用户特征,既能辨别连续的购买交易,也能辨别一般的用户偏好。SHRM 具有很强的适应性,尤其是在用户表征上采用非线性聚合操作,使其能够模拟各种影响因素之间复杂的相互作用。值得注意的是,SHRM 采用了循环神经网络(RNN)来捕捉近期采购活动中的扩展依赖关系。此外,它还采用了创新性的序列相似性任务,以 k 小段抽样策略为基础。该策略对相似序列进行聚类,大大减轻了学习过程中的噪声影响。通过在三个不同的真实数据集上进行经验验证,我们证明了我们的模型在各种评估指标上始终超越领先基准,为下一篮子推荐建立了新的标准。
{"title":"Hierarchical representation learning for next basket recommendation","authors":"Wenhua Zeng ,&nbsp;Junjie Liu ,&nbsp;Bo Zhang","doi":"10.1016/j.array.2024.100354","DOIUrl":"https://doi.org/10.1016/j.array.2024.100354","url":null,"abstract":"<div><p>The task of next basket recommendation is pivotal for recommender systems. It involves predicting user actions, such as the next product purchase or movie selection, by exploring sequential purchase behavior and integrating users’ general preferences. These elements may converge and influence users’ subsequent choices. The challenge intensifies with the presence of varied user purchase sequences in the training set, as indiscriminate incorporation of these sequences can introduce superfluous noise. In response to these challenges, we propose an innovative approach: the Selective Hierarchical Representation Model (SHRM). This model effectively integrates transactional data and user profiles to discern both sequential purchase transactions and general user preferences. The SHRM’s adaptability, particularly in employing nonlinear aggregation operations on user representations, enables it to model complex interactions among various influencing factors. Notably, the SHRM employs a Recurrent Neural Network (RNN) to capture extended dependencies in recent purchasing activities. Moreover, it incorporates an innovative sequence similarity task, grounded in a k-plet sampling strategy. This strategy clusters similar sequences, significantly mitigating the learning process’s noise impact. Through empirical validation on three diverse real-world datasets, we demonstrate that our model consistently surpasses leading benchmarks across various evaluation metrics, establishing a new standard in next-basket recommendation.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 ","pages":"Article 100354"},"PeriodicalIF":2.3,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000201/pdfft?md5=78ee4b9a97b496d96fbd334c5bf79bfb&pid=1-s2.0-S2590005624000201-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141485906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive survey on image steganalysis using deep learning 利用深度学习进行图像隐写分析的综合调查
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-04 DOI: 10.1016/j.array.2024.100353
Ntivuguruzwa Jean De La Croix , Tohari Ahmad , Fengling Han

Steganalysis, a field devoted to detecting concealed information in various forms of digital media, including text, images, audio, and video files, has evolved significantly over time. This evolution aims to improve the accuracy of revealing potential hidden data. Traditional machine learning approaches, such as support vector machines (SVM) and ensemble classifiers (ECs), were previously employed in steganalysis. However, they demonstrated ineffective against contemporary and prevalent steganographic methods. The field of steganalysis has experienced noteworthy advancements by transitioning from traditional machine learning methods to deep learning techniques, resulting in superior outcomes. More specifically, deep learning-based steganalysis approaches exhibit rapid detection of steganographic payloads and demonstrate remarkable accuracy and efficiency across a spectrum of modern steganographic algorithms. This paper is dedicated to investigating recent developments in deep learning-based steganalysis schemes, exploring their evolution, and conducting a thorough analysis of the techniques incorporated in these schemes. Furthermore, the research aims to delve into the current trends in steganalysis, explicitly focusing on digital image steganography. By examining the latest techniques and methodologies, this work contributes to an enhanced understanding of the evolving landscape of steganalysis, shedding light on the advancements achieved through deep learning-based approaches.

隐分析(Steganalysis)是一个致力于检测各种形式数字媒体(包括文本、图像、音频和视频文件)中隐藏信息的领域,随着时间的推移已经有了长足的发展。这一演变旨在提高揭示潜在隐藏数据的准确性。传统的机器学习方法,如支持向量机(SVM)和集合分类器(ECs),曾被用于隐写分析。然而,这些方法对当代流行的隐写方法无效。通过从传统的机器学习方法过渡到深度学习技术,隐写分析领域取得了显著的进步,取得了卓越的成果。更具体地说,基于深度学习的隐写分析方法能快速检测到隐写有效载荷,并在各种现代隐写算法中表现出卓越的准确性和效率。本文致力于研究基于深度学习的隐写分析方案的最新发展,探索其演变过程,并对这些方案中采用的技术进行全面分析。此外,研究还旨在深入探讨当前隐写术的发展趋势,并明确将重点放在数字图像隐写术上。通过研究最新的技术和方法,这项工作有助于加深对不断发展的隐写术的理解,并阐明通过基于深度学习的方法所取得的进步。
{"title":"Comprehensive survey on image steganalysis using deep learning","authors":"Ntivuguruzwa Jean De La Croix ,&nbsp;Tohari Ahmad ,&nbsp;Fengling Han","doi":"10.1016/j.array.2024.100353","DOIUrl":"https://doi.org/10.1016/j.array.2024.100353","url":null,"abstract":"<div><p>Steganalysis, a field devoted to detecting concealed information in various forms of digital media, including text, images, audio, and video files, has evolved significantly over time. This evolution aims to improve the accuracy of revealing potential hidden data. Traditional machine learning approaches, such as support vector machines (SVM) and ensemble classifiers (ECs), were previously employed in steganalysis. However, they demonstrated ineffective against contemporary and prevalent steganographic methods. The field of steganalysis has experienced noteworthy advancements by transitioning from traditional machine learning methods to deep learning techniques, resulting in superior outcomes. More specifically, deep learning-based steganalysis approaches exhibit rapid detection of steganographic payloads and demonstrate remarkable accuracy and efficiency across a spectrum of modern steganographic algorithms. This paper is dedicated to investigating recent developments in deep learning-based steganalysis schemes, exploring their evolution, and conducting a thorough analysis of the techniques incorporated in these schemes. Furthermore, the research aims to delve into the current trends in steganalysis, explicitly focusing on digital image steganography. By examining the latest techniques and methodologies, this work contributes to an enhanced understanding of the evolving landscape of steganalysis, shedding light on the advancements achieved through deep learning-based approaches.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100353"},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000195/pdfft?md5=3dd7fe4cac4a2f244f4a326af65ea83d&pid=1-s2.0-S2590005624000195-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141292436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYZE-AD: A comparative analysis of novel AI approaches for early Alzheimer’s detection ANALYZE-AD:早期阿尔茨海默病检测的新型人工智能方法比较分析
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-03 DOI: 10.1016/j.array.2024.100352
Mritunjoy Chakraborty, Nishat Naoal, Sifat Momen, Nabeel Mohammed

Alzheimer’s disease, characterized by progressive and irreversible deterioration of cognitive functions, represents a significant health concern, particularly among older adults, as it stands as the foremost cause of dementia. Despite its debilitating nature, early detection of Alzheimer’s disease holds considerable advantages for affected individuals. This study investigates machine-learning methodologies for the early diagnosis of Alzheimer’s disease, utilizing datasets sourced from OASIS and ADNI. The initial classification methods consist of a 5-class ADNI classification and a 3-class OASIS classification. Three unique methodologies encompass binary-class inter-dataset models, which involve training on a single dataset and subsequently testing on another dataset for both ADNI and OASIS datasets. Additionally, a hybrid dataset model is also considered. The proposed methodology entails the concatenation of both datasets, followed by shuffling and subsequently conducting training and testing on the amalgamated dataset. The findings demonstrate impressive levels of accuracy, as Light Gradient Boosting Machine (LGBM) achieved a 99.63% accuracy rate for 5-class ADNI classification and a 95.75% accuracy rate by Multilayer Perceptron (MLP) for 3-class OASIS classification, both when hyperparameter tweaking was implemented. The K-nearest neighbor algorithm demonstrated exceptional performance, achieving an accuracy of 87.50% in ADNI-OASIS (2 Class) when utilizing the Select K Best method. The Gaussian Naive Bayes algorithm demonstrated exceptional performance in the OASIS-ADNI approach, attaining an accuracy of 77.97% using Chi-squared feature selection. The accuracy achieved by the Hybrid method, which utilized LGBM with hyperparameter optimization, was 99.21%. Furthermore, the utilization of Explainable AI approaches, particularly Lime, was implemented in order to augment the interpretability of the model.

阿尔茨海默病的特点是认知功能进行性和不可逆的退化,是一个重大的健康问题,尤其是在老年人中,因为它是痴呆症的首要病因。尽管阿尔茨海默病会使人衰弱,但早期发现阿尔茨海默病对患者有很大好处。本研究利用来自 OASIS 和 ADNI 的数据集,研究了早期诊断阿尔茨海默病的机器学习方法。最初的分类方法包括 5 级 ADNI 分类和 3 级 OASIS 分类。三种独特的方法包括二元类数据集间模型,即在一个数据集上进行训练,然后在另一个数据集上对 ADNI 和 OASIS 数据集进行测试。此外,还考虑了混合数据集模型。所提出的方法需要将两个数据集合并,然后进行洗牌,随后在合并后的数据集上进行训练和测试。研究结果表明,光梯度提升机(LGBM)对 5 类 ADNI 分类的准确率达到了 99.63%,多层感知器(MLP)对 3 类 OASIS 分类的准确率达到了 95.75%,这两种方法在实施超参数调整时都达到了令人印象深刻的准确率水平。K 近邻算法表现优异,在使用选择 K 最佳方法时,ADNI-OASIS(2 类)的准确率达到 87.50%。高斯直觉贝叶斯算法在 OASIS-ADNI 方法中表现出色,使用奇平方特征选择法获得了 77.97% 的准确率。利用 LGBM 和超参数优化的混合方法达到了 99.21% 的准确率。此外,为了增强模型的可解释性,还采用了可解释人工智能方法,特别是 Lime。
{"title":"ANALYZE-AD: A comparative analysis of novel AI approaches for early Alzheimer’s detection","authors":"Mritunjoy Chakraborty,&nbsp;Nishat Naoal,&nbsp;Sifat Momen,&nbsp;Nabeel Mohammed","doi":"10.1016/j.array.2024.100352","DOIUrl":"10.1016/j.array.2024.100352","url":null,"abstract":"<div><p>Alzheimer’s disease, characterized by progressive and irreversible deterioration of cognitive functions, represents a significant health concern, particularly among older adults, as it stands as the foremost cause of dementia. Despite its debilitating nature, early detection of Alzheimer’s disease holds considerable advantages for affected individuals. This study investigates machine-learning methodologies for the early diagnosis of Alzheimer’s disease, utilizing datasets sourced from OASIS and ADNI. The initial classification methods consist of a 5-class ADNI classification and a 3-class OASIS classification. Three unique methodologies encompass binary-class inter-dataset models, which involve training on a single dataset and subsequently testing on another dataset for both ADNI and OASIS datasets. Additionally, a hybrid dataset model is also considered. The proposed methodology entails the concatenation of both datasets, followed by shuffling and subsequently conducting training and testing on the amalgamated dataset. The findings demonstrate impressive levels of accuracy, as Light Gradient Boosting Machine (LGBM) achieved a 99.63% accuracy rate for 5-class ADNI classification and a 95.75% accuracy rate by Multilayer Perceptron (MLP) for 3-class OASIS classification, both when hyperparameter tweaking was implemented. The K-nearest neighbor algorithm demonstrated exceptional performance, achieving an accuracy of 87.50% in ADNI-OASIS (2 Class) when utilizing the Select K Best method. The Gaussian Naive Bayes algorithm demonstrated exceptional performance in the OASIS-ADNI approach, attaining an accuracy of 77.97% using Chi-squared feature selection. The accuracy achieved by the Hybrid method, which utilized LGBM with hyperparameter optimization, was 99.21%. Furthermore, the utilization of Explainable AI approaches, particularly Lime, was implemented in order to augment the interpretability of the model.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100352"},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000183/pdfft?md5=e9c710d51ce1b8bb949bd1c6ac280602&pid=1-s2.0-S2590005624000183-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141276619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of YOLOv5 and YOLOv8 for corrosion segmentation tasks in metal surfaces YOLOv5 和 YOLOv8 在金属表面腐蚀细分任务中的比较研究
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-01 DOI: 10.1016/j.array.2024.100351
Edmundo Casas , Leo Ramos , Cristian Romero , Francklin Rivas-Echeverría

This study delves into the comparative efficacy of YOLOv5 and YOLOv8 in corrosion segmentation tasks. We employed three unique datasets, comprising 4942, 5501, and 6136 images, aiming to thoroughly evaluate the models’ adaptability and robustness in diverse scenarios. The assessment metrics included precision, recall, F1-score, and mean average precision. Furthermore, graphical tests offered a visual perspective on the segmentation capabilities of each architecture. Our results highlight YOLOv8’s superior speed and segmentation accuracy across datasets, further corroborated by graphical evaluations. These visual assessments were instrumental in emphasizing YOLOv8’s proficiency in handling complex corroded surfaces. However, in the largest dataset, both models encountered challenges, particularly with overlapping bounding boxes. YOLOv5 notably lagged, struggling to achieve the performance standards set by YOLOv8, especially with irregular corroded surfaces. In conclusion, our findings underscore YOLOv8’s enhanced capabilities, establishing it as a preferable choice for real-world corrosion detection tasks. This research thus offers invaluable insights, poised to redefine corrosion management strategies and guide future explorations in corrosion identification.

本研究深入探讨了 YOLOv5 和 YOLOv8 在腐蚀分割任务中的功效对比。我们采用了三个独特的数据集,包括 4942、5501 和 6136 幅图像,旨在全面评估模型在不同场景下的适应性和鲁棒性。评估指标包括精度、召回率、F1-分数和平均精度。此外,图形测试还从视觉角度展示了每个架构的分割能力。我们的结果凸显了 YOLOv8 在不同数据集上的卓越速度和分割精度,图形评估进一步证实了这一点。这些视觉评估有助于突出 YOLOv8 在处理复杂腐蚀表面方面的能力。不过,在最大的数据集中,两个模型都遇到了挑战,尤其是在处理重叠边界框时。YOLOv5 明显落后,难以达到 YOLOv8 设定的性能标准,尤其是在处理不规则腐蚀表面时。总之,我们的研究结果凸显了 YOLOv8 的强大功能,使其成为实际腐蚀检测任务的首选。因此,这项研究提供了宝贵的见解,有望重新定义腐蚀管理策略,并指导未来的腐蚀识别探索。
{"title":"A comparative study of YOLOv5 and YOLOv8 for corrosion segmentation tasks in metal surfaces","authors":"Edmundo Casas ,&nbsp;Leo Ramos ,&nbsp;Cristian Romero ,&nbsp;Francklin Rivas-Echeverría","doi":"10.1016/j.array.2024.100351","DOIUrl":"10.1016/j.array.2024.100351","url":null,"abstract":"<div><p>This study delves into the comparative efficacy of YOLOv5 and YOLOv8 in corrosion segmentation tasks. We employed three unique datasets, comprising 4942, 5501, and 6136 images, aiming to thoroughly evaluate the models’ adaptability and robustness in diverse scenarios. The assessment metrics included precision, recall, F1-score, and mean average precision. Furthermore, graphical tests offered a visual perspective on the segmentation capabilities of each architecture. Our results highlight YOLOv8’s superior speed and segmentation accuracy across datasets, further corroborated by graphical evaluations. These visual assessments were instrumental in emphasizing YOLOv8’s proficiency in handling complex corroded surfaces. However, in the largest dataset, both models encountered challenges, particularly with overlapping bounding boxes. YOLOv5 notably lagged, struggling to achieve the performance standards set by YOLOv8, especially with irregular corroded surfaces. In conclusion, our findings underscore YOLOv8’s enhanced capabilities, establishing it as a preferable choice for real-world corrosion detection tasks. This research thus offers invaluable insights, poised to redefine corrosion management strategies and guide future explorations in corrosion identification.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100351"},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000171/pdfft?md5=9e4e2adc95d4bf31d6930cbc85e19fa3&pid=1-s2.0-S2590005624000171-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inter-model interpretability: Self-supervised models as a case study 模型间的可解释性:自我监督模型案例研究
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-18 DOI: 10.1016/j.array.2024.100350
Ahmad Mustapha , Wael Khreich , Wes Masri

Since early machine learning models, metrics such as accuracy and precision have been the de facto way to evaluate and compare trained models. However, a single metric number does not fully capture model similarities and differences, especially in the computer vision domain. A model with high accuracy on a certain dataset might provide a lower accuracy on another dataset without further insights. To address this problem, we build on a recent interpretability technique called Dissect to introduce inter-model interpretability, which determines how models relate or complement each other based on the visual concepts they have learned (such as objects and materials). Toward this goal, we project 13 top-performing self-supervised models into a Learned Concepts Embedding (LCE) space that reveals proximities among models from the perspective of learned concepts. We further crossed this information with the performance of these models on four computer vision tasks and 15 datasets. The experiment allowed us to categorize the models into three categories and revealed the type of visual concepts different tasks required for the first time. This is a step forward for designing cross-task learning algorithms.

自早期的机器学习模型以来,准确率和精确度等指标一直是评估和比较训练模型的事实方法。然而,单一的指标数字并不能完全反映模型的异同,尤其是在计算机视觉领域。在某个数据集上具有高精确度的模型,在另一个数据集上可能会提供较低的精确度,而不会有进一步的深入了解。为了解决这个问题,我们在最近一种名为 "剖析"(Dissect)的可解释性技术的基础上,引入了模型间的可解释性,这种可解释性决定了模型如何根据所学的视觉概念(如物体和材料)相互关联或互补。为了实现这一目标,我们将 13 个表现最佳的自监督模型投影到学习概念嵌入(LCE)空间中,从学习概念的角度揭示模型之间的近似性。我们进一步将这些信息与这些模型在四项计算机视觉任务和 15 个数据集上的表现进行了比较。通过实验,我们将模型分为三类,并首次揭示了不同任务所需的视觉概念类型。这为设计跨任务学习算法迈出了一步。
{"title":"Inter-model interpretability: Self-supervised models as a case study","authors":"Ahmad Mustapha ,&nbsp;Wael Khreich ,&nbsp;Wes Masri","doi":"10.1016/j.array.2024.100350","DOIUrl":"https://doi.org/10.1016/j.array.2024.100350","url":null,"abstract":"<div><p>Since early machine learning models, metrics such as accuracy and precision have been the de facto way to evaluate and compare trained models. However, a single metric number does not fully capture model similarities and differences, especially in the computer vision domain. A model with high accuracy on a certain dataset might provide a lower accuracy on another dataset without further insights. To address this problem, we build on a recent interpretability technique called Dissect to introduce <em>inter-model interpretability</em>, which determines how models relate or complement each other based on the visual concepts they have learned (such as objects and materials). Toward this goal, we project 13 top-performing self-supervised models into a Learned Concepts Embedding (LCE) space that reveals proximities among models from the perspective of learned concepts. We further crossed this information with the performance of these models on four computer vision tasks and 15 datasets. The experiment allowed us to categorize the models into three categories and revealed the type of visual concepts different tasks required for the first time. This is a step forward for designing cross-task learning algorithms.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100350"},"PeriodicalIF":0.0,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S259000562400016X/pdfft?md5=33f9642cc8597d6783b926660acecf8c&pid=1-s2.0-S259000562400016X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network intrusion detection leveraging multimodal features 利用多模态特征进行网络入侵检测
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-16 DOI: 10.1016/j.array.2024.100349
Aklil Kiflay, Athanasios Tsokanos, Mahmood Fazlali, Raimund Kirner

Network Intrusion Detection Systems (NIDSes) are essential for safeguarding critical information systems. However, the lack of adaptability of Machine Learning (ML) based NIDSes to different environments could cause slow adoption. In this paper, we propose a multimodal NIDS that combines flow and payload features to detect cyber-attacks. The focus of the paper is to evaluate the use of multimodal traffic features in detecting attacks, but not on a practical online implementation. In the multimodal NIDS, two random forest models are trained to classify network traffic using selected flow-based features and the first few bytes of protocol payload, respectively. Predictions from the two models are combined using a soft voting approach to get the final traffic classification results. We evaluate the multimodal NIDS using flow-based features and the corresponding payloads extracted from Packet Capture (PCAP) files of a publicly available UNSW-NB15 dataset. The experimental results show that the proposed multimodal NIDS can detect most attacks with average Accuracy, Recall, Precision and F1 scores ranging from 98% to 99% using only six flow-based traffic features, and the first 32 bytes of protocol payload. The proposed multimodal NIDS provides a reliable approach to detecting cyber-attacks in different environments.

网络入侵检测系统(NIDS)对于保护关键信息系统至关重要。然而,基于机器学习(ML)的网络入侵检测系统缺乏对不同环境的适应性,这可能会导致采用速度缓慢。在本文中,我们提出了一种多模式 NIDS,它结合了流量和有效载荷特征来检测网络攻击。本文的重点是评估多模态流量特征在检测攻击中的应用,而不是实际的在线实施。在多模态 NIDS 中,训练了两个随机森林模型,分别使用选定的基于流量的特征和协议有效载荷的前几个字节对网络流量进行分类。使用软投票方法将两个模型的预测结果结合起来,得到最终的流量分类结果。我们使用从公开的 UNSW-NB15 数据集的数据包捕获(PCAP)文件中提取的基于流量的特征和相应的有效载荷对多模态 NIDS 进行了评估。实验结果表明,拟议的多模态 NIDS 只需使用六个基于流量的特征和协议有效载荷的前 32 个字节,就能检测到大多数攻击,平均准确率、召回率、精确率和 F1 分数介于 98% 到 99% 之间。所提出的多模式 NIDS 为检测不同环境中的网络攻击提供了一种可靠的方法。
{"title":"Network intrusion detection leveraging multimodal features","authors":"Aklil Kiflay,&nbsp;Athanasios Tsokanos,&nbsp;Mahmood Fazlali,&nbsp;Raimund Kirner","doi":"10.1016/j.array.2024.100349","DOIUrl":"10.1016/j.array.2024.100349","url":null,"abstract":"<div><p>Network Intrusion Detection Systems (NIDSes) are essential for safeguarding critical information systems. However, the lack of adaptability of Machine Learning (ML) based NIDSes to different environments could cause slow adoption. In this paper, we propose a multimodal NIDS that combines flow and payload features to detect cyber-attacks. The focus of the paper is to evaluate the use of multimodal traffic features in detecting attacks, but not on a practical online implementation. In the multimodal NIDS, two random forest models are trained to classify network traffic using selected flow-based features and the first few bytes of protocol payload, respectively. Predictions from the two models are combined using a soft voting approach to get the final traffic classification results. We evaluate the multimodal NIDS using flow-based features and the corresponding payloads extracted from Packet Capture (PCAP) files of a publicly available UNSW-NB15 dataset. The experimental results show that the proposed multimodal NIDS can detect most attacks with average Accuracy, Recall, Precision and F<span><math><msub><mrow></mrow><mrow><mn>1</mn></mrow></msub></math></span> scores ranging from 98% to 99% using only six flow-based traffic features, and the first 32 bytes of protocol payload. The proposed multimodal NIDS provides a reliable approach to detecting cyber-attacks in different environments.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100349"},"PeriodicalIF":0.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000158/pdfft?md5=571a5eb4d14694ec615bacb4ecbc6a5f&pid=1-s2.0-S2590005624000158-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141029468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
D2MNet for music generation joint driven by facial expressions and dance movements 由面部表情和舞蹈动作驱动的联合音乐生成 D2MNet
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-05 DOI: 10.1016/j.array.2024.100348
Jiang Huang, Xianglin Huang, Lifang Yang, Zhulin Tao

In general, dance is always associated with music to improve stage performance effect. As we know, artificial music arrangement consumes a lot of time and manpower. While automatic music arrangement based on input dance video perfectly solves this problem. In the cross-modal music generation task, we take advantage of the complementary information between two input modalities of facial expressions and dance movements. Then we present Dance2MusicNet (D2MNet), an autoregressive generation model based on dilated convolution, which adopts two feature vectors, dance style and beats, as control signals to generate real and diverse music that matches dance video. Finally, a comprehensive evaluation method for qualitative and quantitative experiment is proposed. Compared to baseline methods, D2MNet outperforms better in all evaluating metrics, which clearly demonstrates the effectiveness of our framework.

一般来说,舞蹈总是与音乐联系在一起,以提高舞台表演效果。众所周知,人工编曲需要耗费大量的时间和人力。而基于输入舞蹈视频的自动编曲则完美地解决了这一问题。在跨模态音乐生成任务中,我们利用了面部表情和舞蹈动作两种输入模态之间的互补信息。然后,我们提出了基于扩张卷积的自回归生成模型 Dance2MusicNet(D2MNet),该模型采用舞蹈风格和节拍两个特征向量作为控制信号,生成与舞蹈视频匹配的真实而多样的音乐。最后,提出了定性和定量实验的综合评估方法。与基线方法相比,D2MNet 在所有评价指标上的表现都更好,这清楚地表明了我们框架的有效性。
{"title":"D2MNet for music generation joint driven by facial expressions and dance movements","authors":"Jiang Huang,&nbsp;Xianglin Huang,&nbsp;Lifang Yang,&nbsp;Zhulin Tao","doi":"10.1016/j.array.2024.100348","DOIUrl":"https://doi.org/10.1016/j.array.2024.100348","url":null,"abstract":"<div><p>In general, dance is always associated with music to improve stage performance effect. As we know, artificial music arrangement consumes a lot of time and manpower. While automatic music arrangement based on input dance video perfectly solves this problem. In the cross-modal music generation task, we take advantage of the complementary information between two input modalities of facial expressions and dance movements. Then we present Dance2MusicNet (D2MNet), an autoregressive generation model based on dilated convolution, which adopts two feature vectors, dance style and beats, as control signals to generate real and diverse music that matches dance video. Finally, a comprehensive evaluation method for qualitative and quantitative experiment is proposed. Compared to baseline methods, D2MNet outperforms better in all evaluating metrics, which clearly demonstrates the effectiveness of our framework.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100348"},"PeriodicalIF":0.0,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000146/pdfft?md5=57bcf00a132e600642ca5c16a65b9121&pid=1-s2.0-S2590005624000146-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140893510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences 提高人脸检测效率:利用分类网络降低误报率
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-04-29 DOI: 10.1016/j.array.2024.100347
Jianlin Zhang , Chen Hou , Xu Yang , Xuechao Yang , Wencheng Yang , Hui Cui

The advancement of convolutional neural networks (CNNs) has markedly progressed in the field of face detection, significantly enhancing accuracy and recall metrics. Precision and recall remain pivotal for evaluating CNN-based detection models; however, there is a prevalent inclination to focus on improving true positive rates at the expense of addressing false positives. A critical issue contributing to this discrepancy is the lack of pseudo-face images within training and evaluation datasets. This deficiency impairs the regression capabilities of detection models, leading to numerous erroneous detections and inadequate localization. To address this gap, we introduce the WIDERFACE dataset, enriched with a considerable number of pseudo-face images created by amalgamating human and animal facial features. This dataset aims to bolster the detection of false positives during training phases. Furthermore, we propose a new face detection architecture that incorporates a classification model into the conventional face detection model to diminish the false positive rate and augment detection precision. Our comparative analysis on the WIDERFACE and other renowned datasets reveals that our architecture secures a lower false positive rate while preserving the true positive rate in comparison to existing top-tier face detection models.

卷积神经网络(CNN)的发展在人脸检测领域取得了显著进步,大大提高了准确率和召回率指标。精确度和召回率仍然是评估基于卷积神经网络的检测模型的关键;然而,人们普遍倾向于以牺牲误报率为代价来提高真阳性率。造成这种差异的一个关键问题是训练和评估数据集中缺乏伪人脸图像。这一缺陷损害了检测模型的回归能力,导致大量错误检测和定位不足。为了弥补这一不足,我们引入了 WIDERFACE 数据集,其中包含大量通过合并人类和动物面部特征创建的伪人脸图像。该数据集旨在加强训练阶段的误报检测。此外,我们还提出了一种新的人脸检测架构,在传统的人脸检测模型中加入了分类模型,以降低误报率并提高检测精度。我们在 WIDERFACE 和其他著名数据集上进行的对比分析表明,与现有的顶级人脸检测模型相比,我们的架构在保证真阳性率的同时,还能降低假阳性率。
{"title":"Advancing face detection efficiency: Utilizing classification networks for lowering false positive incidences","authors":"Jianlin Zhang ,&nbsp;Chen Hou ,&nbsp;Xu Yang ,&nbsp;Xuechao Yang ,&nbsp;Wencheng Yang ,&nbsp;Hui Cui","doi":"10.1016/j.array.2024.100347","DOIUrl":"https://doi.org/10.1016/j.array.2024.100347","url":null,"abstract":"<div><p>The advancement of convolutional neural networks (CNNs) has markedly progressed in the field of face detection, significantly enhancing accuracy and recall metrics. Precision and recall remain pivotal for evaluating CNN-based detection models; however, there is a prevalent inclination to focus on improving true positive rates at the expense of addressing false positives. A critical issue contributing to this discrepancy is the lack of pseudo-face images within training and evaluation datasets. This deficiency impairs the regression capabilities of detection models, leading to numerous erroneous detections and inadequate localization. To address this gap, we introduce the WIDERFACE dataset, enriched with a considerable number of pseudo-face images created by amalgamating human and animal facial features. This dataset aims to bolster the detection of false positives during training phases. Furthermore, we propose a new face detection architecture that incorporates a classification model into the conventional face detection model to diminish the false positive rate and augment detection precision. Our comparative analysis on the WIDERFACE and other renowned datasets reveals that our architecture secures a lower false positive rate while preserving the true positive rate in comparison to existing top-tier face detection models.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100347"},"PeriodicalIF":0.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000134/pdfft?md5=be911996c21c7c166881a8828f984b70&pid=1-s2.0-S2590005624000134-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140825066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Array
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1