High-Confidence Computing最新文献

筛选
英文 中文
A Survey on Large Language Model (LLM) Security and Privacy: The Good, The Bad, and The Ugly 大型语言模型 (LLM) 安全与隐私调查:好、坏、丑
High-Confidence Computing Pub Date : 2024-03-01 DOI: 10.1016/j.hcc.2024.100211
Yifan Yao, Jinhao Duan, Kaidi Xu, Yuanfang Cai, Zhibo Sun, Yue Zhang
{"title":"A Survey on Large Language Model (LLM) Security and Privacy: The Good, The Bad, and The Ugly","authors":"Yifan Yao,&nbsp;Jinhao Duan,&nbsp;Kaidi Xu,&nbsp;Yuanfang Cai,&nbsp;Zhibo Sun,&nbsp;Yue Zhang","doi":"10.1016/j.hcc.2024.100211","DOIUrl":"https://doi.org/10.1016/j.hcc.2024.100211","url":null,"abstract":"<div><p>Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized natural language understanding and generation. They possess deep language comprehension, human-like text generation capabilities, contextual awareness, and robust problem-solving skills, making them invaluable in various domains (e.g., search engines, customer support, translation). In the meantime, LLMs have also gained traction in the security community, revealing security vulnerabilities and showcasing their potential in security-related tasks. This paper explores the intersection of LLMs with security and privacy. Specifically, we investigate how LLMs positively impact security and privacy, potential risks and threats associated with their use, and inherent vulnerabilities within LLMs. Through a comprehensive literature review, the paper categorizes the papers into “The Good” (beneficial LLM applications), “The Bad” (offensive applications), and “The Ugly” (vulnerabilities of LLMs and their defenses). We have some interesting findings. For example, LLMs have proven to enhance code security (code vulnerability detection) and data privacy (data confidentiality protection), outperforming traditional methods. However, they can also be harnessed for various attacks (particularly user-level attacks) due to their human-like reasoning abilities. We have identified areas that require further research efforts. For example, Research on model and parameter extraction attacks is limited and often theoretical, hindered by LLM parameter scale and confidentiality. Safe instruction tuning, a recent development, requires more exploration. We hope that our work can shed light on the LLMs’ potential to both bolster and jeopardize cybersecurity.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100211"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522400014X/pdfft?md5=1984f6886539e5ada13eeb8c49a9ef8b&pid=1-s2.0-S266729522400014X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140543306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey for light field super-resolution 光场超分辨率调查
High-Confidence Computing Pub Date : 2024-03-01 DOI: 10.1016/j.hcc.2024.100206
Mingyuan Zhao , Hao Sheng , Da Yang , Sizhe Wang , Ruixuan Cong , Zhenglong Cui , Rongshan Chen , Tun Wang , Shuai Wang , Yang Huang , Jiahao Shen
{"title":"A survey for light field super-resolution","authors":"Mingyuan Zhao ,&nbsp;Hao Sheng ,&nbsp;Da Yang ,&nbsp;Sizhe Wang ,&nbsp;Ruixuan Cong ,&nbsp;Zhenglong Cui ,&nbsp;Rongshan Chen ,&nbsp;Tun Wang ,&nbsp;Shuai Wang ,&nbsp;Yang Huang ,&nbsp;Jiahao Shen","doi":"10.1016/j.hcc.2024.100206","DOIUrl":"10.1016/j.hcc.2024.100206","url":null,"abstract":"<div><p>Compared to 2D imaging data, the 4D light field (LF) data retains richer scene’s structure information, which can significantly improve the computer’s perception capability, including depth estimation, semantic segmentation, and LF rendering. However, there is a contradiction between spatial and angular resolution during the LF image acquisition period. To overcome the above problem, researchers have gradually focused on the light field super-resolution (LFSR). In the traditional solutions, researchers achieved the LFSR based on various optimization frameworks, such as Bayesian and Gaussian models. Deep learning-based methods are more popular than conventional methods because they have better performance and more robust generalization capabilities. In this paper, the present approach can mainly divided into conventional methods and deep learning-based methods. We discuss these two branches in light field spatial super-resolution (LFSSR), light field angular super-resolution (LFASR), and light field spatial and angular super-resolution (LFSASR), respectively. Subsequently, this paper also introduces the primary public datasets and analyzes the performance of the prevalent approaches on these datasets. Finally, we discuss the potential innovations of the LFSR to propose the progress of our research field.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 1","pages":"Article 100206"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000096/pdfft?md5=71deba58809585186ae13284da5a82d9&pid=1-s2.0-S2667295224000096-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data cube-based storage optimization for resource-constrained edge computing 基于数据立方体的存储优化,适用于资源受限的边缘计算
IF 3.2
High-Confidence Computing Pub Date : 2024-02-28 DOI: 10.1016/j.hcc.2024.100212
{"title":"Data cube-based storage optimization for resource-constrained edge computing","authors":"","doi":"10.1016/j.hcc.2024.100212","DOIUrl":"10.1016/j.hcc.2024.100212","url":null,"abstract":"<div><div>In the evolving landscape of the digital era, edge computing emerges as an essential paradigm, especially critical for low-latency, real-time applications and Internet of Things (IoT) environments. Despite its advantages, edge computing faces severe limitations in storage capabilities and is fraught with reliability issues due to its resource-constrained nature and exposure to challenging conditions. To address these challenges, this work presents a tailored storage mechanism for edge computing, focusing on space efficiency and data reliability. Our method comprises three key steps: relation factorization, column clustering, and erasure encoding with compression. We successfully reduce the required storage space by deconstructing complex database tables and optimizing data organization within these sub-tables. We further add a layer of reliability through erasure encoding. Comprehensive experiments on TPC-H datasets substantiate our approach, demonstrating storage savings of up to 38.35% and time efficiency improvements by 3.96x in certain cases. Furthermore, our clustering technique shows a potential for additional storage reduction up to 40.41%.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100212"},"PeriodicalIF":3.2,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140464490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An investigation of the private-attribute leakage in WiFi sensing 对 WiFi 传感中私人属性泄露的调查
IF 3.2
High-Confidence Computing Pub Date : 2024-02-03 DOI: 10.1016/j.hcc.2024.100209
{"title":"An investigation of the private-attribute leakage in WiFi sensing","authors":"","doi":"10.1016/j.hcc.2024.100209","DOIUrl":"10.1016/j.hcc.2024.100209","url":null,"abstract":"<div><div>WiFi sensing is critical to many applications, such as localization, human activity recognition, and contact-less health monitoring. With metaverse and ubiquitous sensing advances, WiFi sensing becomes increasingly imperative. However, as shown in this paper, WiFi sensing data leaks users’ private attributes (e.g., height, weight, and gender), violating increasingly stricter privacy protection laws and regulations. To demonstrate the leakage of private attributes in WiFi sensing, we investigate two public WiFi sensing datasets and apply a deep learning model to recognize users’ private attributes. Our experimental results clearly show that our model can identify users’ private attributes in WiFi sensing data collected by general WiFi applications, with almost 100% accuracy for gender inference, less than 4 cm error for height inference, and about 4 kg error for weight inference, respectively. Our finding calls for research efforts to preserve data privacy while enabling WiFi sensing-based applications.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100209"},"PeriodicalIF":3.2,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139817746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
H-hop independently submodular maximization problem with curvature 有曲率的 H 跳独立亚模态最大化问题
High-Confidence Computing Pub Date : 2024-02-02 DOI: 10.1016/j.hcc.2024.100208
Yang Lv , Chenchen Wu , Dachuan Xu , Ruiqi Yang
{"title":"H-hop independently submodular maximization problem with curvature","authors":"Yang Lv ,&nbsp;Chenchen Wu ,&nbsp;Dachuan Xu ,&nbsp;Ruiqi Yang","doi":"10.1016/j.hcc.2024.100208","DOIUrl":"10.1016/j.hcc.2024.100208","url":null,"abstract":"<div><p>The Connected Sensor Problem (CSP) presents a prevalent challenge in the realms of communication and Internet of Things (IoT) applications. Its primary aim is to maximize the coverage of users while maintaining connectivity among <em>K</em> sensors. Addressing the challenge of managing a large user base alongside a finite number of candidate locations, this paper proposes an extension to the CSP: the h-hop independently submodular maximization problem characterized by curvature <span><math><mi>α</mi></math></span>. We have developed an approximation algorithm that achieves a ratio of <span><math><mfrac><mrow><mn>1</mn><mo>−</mo><msup><mrow><mi>e</mi></mrow><mrow><mo>−</mo><mi>α</mi></mrow></msup></mrow><mrow><mrow><mo>(</mo><mn>2</mn><mi>h</mi><mo>+</mo><mn>3</mn><mo>)</mo></mrow><mi>α</mi></mrow></mfrac></math></span>. The efficacy of this algorithm is demonstrated on the CSP, where it shows superior performance over existing algorithms, marked by an average enhancement of 8.4%.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100208"},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000114/pdfft?md5=6545def2e75a2c91befd56e66f41423d&pid=1-s2.0-S2667295224000114-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139818439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bioinvasion risk analysis based on automatic identification system and marine ecoregion data 基于自动识别系统和海洋生态区数据的生物入侵风险分析
IF 3.2
High-Confidence Computing Pub Date : 2024-02-02 DOI: 10.1016/j.hcc.2024.100210
Hongwei Shi , Chenyu Wang , Hang Zhao , Shengling Wang , Yixian Chen
{"title":"Bioinvasion risk analysis based on automatic identification system and marine ecoregion data","authors":"Hongwei Shi ,&nbsp;Chenyu Wang ,&nbsp;Hang Zhao ,&nbsp;Shengling Wang ,&nbsp;Yixian Chen","doi":"10.1016/j.hcc.2024.100210","DOIUrl":"10.1016/j.hcc.2024.100210","url":null,"abstract":"<div><div>The global maritime trade plays a key role in propagating alien aquatic invasive species, which incurs side effects in terms of environment, human health and economy. The existing biosecurity methods did not take into account the invaded risk as well as the diffusion of invasive species at the same time, which may lead to inadequate bioinvasion control. In addition, the lack of considering the impact of bioinvasion control on shipping also makes their methods cost-ineffective. To solve the problems of the existing methods, we employ the automatic identification system (AIS) data, the ballast water data and the water temperature &amp; salinity data to construct two networks: the species invasion network (SIN) and the global shipping network (GSN). The former is used to analyze the potential of a port in propagating marine invasive species while the latter is employed to evaluate the shipping importance of ports. Based on the analysis of SIN and GSN, two categories of biosecurity triggering mechanisms are proposed. The first category takes into consideration both being bioinvaded and spreading invasive species and the second one concerns the shipping value of each port besides its invasion risk. A lot of case studies have been done to discover the key ports needed to be controlled preferentially under the guide of the proposed biosecurity triggering mechanisms. Finally, our correlation analysis shows that closeness is most highly correlated to the invasion risk.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 4","pages":"Article 100210"},"PeriodicalIF":3.2,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139816780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic anomaly detection algorithm for CAN bus using similarity analysis 使用相似性分析的 CAN 总线流量异常检测算法
IF 3.2
High-Confidence Computing Pub Date : 2024-01-24 DOI: 10.1016/j.hcc.2024.100207
{"title":"Traffic anomaly detection algorithm for CAN bus using similarity analysis","authors":"","doi":"10.1016/j.hcc.2024.100207","DOIUrl":"10.1016/j.hcc.2024.100207","url":null,"abstract":"<div><p>Recently, vehicles have experienced a rise in networking and informatization, leading to increased security concerns. As the most widely used automotive bus network, the Controller Area Network (CAN) bus is vulnerable to attacks, as security was not considered in its original design. This paper proposes SIDuBzip2, a traffic anomaly detection method for the CAN bus based on the bzip2 compression algorithm. The proposed method utilizes the pseudo-periodic characteristics of CAN bus traffic, constructing time series of CAN IDs and calculating the similarity between adjacent time series to identify abnormal traffic. The method consists of three parts: the conversion of CAN ID values to characters, the calculation of similarity based on bzip2 compression, and the optimal solution of model parameters. The experimental results demonstrate that the proposed SIDuBzip2 method effectively detects various attacks, including Denial of Service , replay, basic injection, mixed injection, and suppression attacks. In addition, existing CAN bus traffic anomaly detection methods are compared with the proposed method in terms of performance and delay, demonstrating the feasibility of the proposed method.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100207"},"PeriodicalIF":3.2,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000102/pdfft?md5=b2ff302140dd063117041177fe6d1399&pid=1-s2.0-S2667295224000102-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure blockchain bidding auction protocol against malicious adversaries 抵御恶意对手的安全区块链竞价拍卖协议
High-Confidence Computing Pub Date : 2024-01-11 DOI: 10.1016/j.hcc.2024.100201
Xiaobing Dai , Jiajing Liu , Xin Liu , Xiaofen Tu , Ruexue Wang
{"title":"Secure blockchain bidding auction protocol against malicious adversaries","authors":"Xiaobing Dai ,&nbsp;Jiajing Liu ,&nbsp;Xin Liu ,&nbsp;Xiaofen Tu ,&nbsp;Ruexue Wang","doi":"10.1016/j.hcc.2024.100201","DOIUrl":"10.1016/j.hcc.2024.100201","url":null,"abstract":"<div><p>In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100201"},"PeriodicalIF":0.0,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000047/pdfft?md5=319168477025da7fd78f5308eb341778&pid=1-s2.0-S2667295224000047-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139635497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cognitive spectrum allocation scheme for data transmission in smart distribution grids 用于智能配电网数据传输的认知频谱分配方案
High-Confidence Computing Pub Date : 2024-01-11 DOI: 10.1016/j.hcc.2024.100198
Zhongguo Zhou , You Li , Ziming Zhu , Qinghe Gao , Sisi Xiao , Tao Yan , Yan Huo
{"title":"A cognitive spectrum allocation scheme for data transmission in smart distribution grids","authors":"Zhongguo Zhou ,&nbsp;You Li ,&nbsp;Ziming Zhu ,&nbsp;Qinghe Gao ,&nbsp;Sisi Xiao ,&nbsp;Tao Yan ,&nbsp;Yan Huo","doi":"10.1016/j.hcc.2024.100198","DOIUrl":"10.1016/j.hcc.2024.100198","url":null,"abstract":"<div><p>As the communication needs in the smart distribution grid continue to rise, using existing resources to meet this growing demand poses a significant challenge. This paper researches on spectrum allocation strategies utilizing cognitive radio (CR) technology. We consider a model containing strong time-sensitive and regular communication service requirements such as distribution terminal communication services, which can be seen as a user with primary data (PD) and weak time-sensitive services such as power quality monitoring, which can be seen as a user with secondary data (SD). To fit the diversity of services in smart distribution grids (SDGs), we formulate an optimization problem with two indicators, including the sum of SD transmission rates and the maximum latency of them. Then, we analyze the two convex sub-problems and utilize convex optimization methods to obtain the optimal power and frequency bandwidth allocation for the users with SD. The simulation results indicate that, when the available transmission power of SD is low, <em>Maximization of Transmission Sum Rate</em> (MTSR) achieves lower maximum transmit time. Conversely, when the available transmission power is high, the performance of <em>Minimization of the Maximum Latency</em> (MML) is better, compared with MTSR.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 3","pages":"Article 100198"},"PeriodicalIF":0.0,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000011/pdfft?md5=1b5e9cb9577d5d4bd670a7738919fe96&pid=1-s2.0-S2667295224000011-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139632186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of fault tolerant consensus in wireless networks 无线网络容错共识调查
High-Confidence Computing Pub Date : 2024-01-09 DOI: 10.1016/j.hcc.2024.100202
Yifei Zou , Li Yang , Guanlin Jing , Ruirui Zhang , Zhenzhen Xie , Huiqun Li , Dongxiao Yu
{"title":"A survey of fault tolerant consensus in wireless networks","authors":"Yifei Zou ,&nbsp;Li Yang ,&nbsp;Guanlin Jing ,&nbsp;Ruirui Zhang ,&nbsp;Zhenzhen Xie ,&nbsp;Huiqun Li ,&nbsp;Dongxiao Yu","doi":"10.1016/j.hcc.2024.100202","DOIUrl":"10.1016/j.hcc.2024.100202","url":null,"abstract":"<div><p>Wireless networks have become integral to modern communication systems, enabling the seamless exchange of information across a myriad of applications. However, the inherent characteristics of wireless channels, such as fading, interference, and openness, pose significant challenges to achieving fault-tolerant consensus within these networks. Fault-tolerant consensus, a critical aspect of distributed systems, ensures that network nodes collectively agree on a consistent value even in the presence of faulty or compromised components. This survey paper provides a comprehensive overview of fault-tolerant consensus mechanisms specifically tailored for wireless networks. We explore the diverse range of consensus protocols and techniques that have been developed to address the unique challenges of wireless environments. The paper systematically categorizes these consensus mechanisms based on their underlying principles, communication models, and fault models. It investigates how these mechanisms handle various types of faults, including communication errors, node failures, and malicious attacks. It highlights key use cases, such as sensor networks, Internet of Things (IoT) applications, wireless blockchain, and vehicular networks, where fault-tolerant consensus plays a pivotal role in ensuring reliable and accurate data dissemination.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100202"},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000059/pdfft?md5=7d04cf1493be0e5575ab310a74881d83&pid=1-s2.0-S2667295224000059-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139457898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信