IEEE Transactions on Industrial Cyber-Physical Systems最新文献

筛选
英文 中文
Data-Driven Group Formation Control of Cyber-Physical Systems via Distributed Cloud Computing 基于分布式云计算的信息物理系统数据驱动群体编队控制
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-04-16 DOI: 10.1109/TICPS.2025.3561726
Hongru Ren;Yinren Long;Hongyi Li;Tingwen Huang
{"title":"Data-Driven Group Formation Control of Cyber-Physical Systems via Distributed Cloud Computing","authors":"Hongru Ren;Yinren Long;Hongyi Li;Tingwen Huang","doi":"10.1109/TICPS.2025.3561726","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3561726","url":null,"abstract":"This paper investigates the group formation control problem for cyber-physical systems (CPSs) with random communication constraints. The distributed cloud computing system is constructed to divide agents into groups and establish communication between agents. A data-driven predictive control strategy is proposed by combining networked predictive control and model-free adaptive control method. The desired group formation control performance can be achieved and the three-channel random communication constraints of CPSs are actively compensated. Thisstrategy does not require the system model and relies solely on the system's I/O data for adaptive learning. Further analyses concludes the conditions for simultaneous reach stability and group formation of the closed-loop CPSs using the data-driven predictive control strategy. The effectiveness of the proposed strategy is validated by simulation results.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"341-350"},"PeriodicalIF":0.0,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143892423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Relative-Error-Dependent TOD Protocol for Cyber-Physical Systems Under an Event-Triggered Communication 事件触发通信下网络物理系统的相对错误依赖TOD协议
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-04-03 DOI: 10.1109/TICPS.2025.3557733
Hongchenyu Yang;Chen Peng;Engang Tian
{"title":"A Relative-Error-Dependent TOD Protocol for Cyber-Physical Systems Under an Event-Triggered Communication","authors":"Hongchenyu Yang;Chen Peng;Engang Tian","doi":"10.1109/TICPS.2025.3557733","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3557733","url":null,"abstract":"To deal with different data magnitudes or measurement units of different system nodes, a novel relative-error-dependent try-once-discard (RED-TOD) communication protocol with event-triggered detectors is proposed to improve the accuracy and reliability of node selection for band-limited cyber-physical systems. With the combined effect of the absolute error and the relative error, a novel node activation condition is proposed to comprehensively reflect and fairly compare node transmission requirements. Under such a stricter scheduling rule, the node selection is more accurate as required and the available communication bandwidth is utilized with higher efficiency. Moreover, periodic sampling module and event-triggered detectors are placed before RED-TOD scheduling scheme to deal with redundancy and inaccurate transmissions of the existing variable sampling scheme. Taking the proposed scheduling scheme and non-small network-induced delay into account, an impulsive closed-loop system model is well established. Sufficient criteria for input-to-state stabilization are derived by employing the Lyapunov-Krasovskii functional approach. A searching algorithm is also presented to co-design optimized scheduler parameters and controller gains. Furthermore, to avoid continuous calculations, the next transmission instant and the dormant period of the event-triggered detector are predicted according to the present information carried by each node. Finally, an illustrative example is employed to demonstrate the effectiveness and superiority of the proposed scheduling method.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"318-328"},"PeriodicalIF":0.0,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143839956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GenAI-Based Privacy-Preserving Transfer Learning 基于遗传算法的隐私保护迁移学习
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-04-02 DOI: 10.1109/TICPS.2025.3556993
Mostafa Hussien;Mohamed Cheriet;Kim Khoa Nguyen;Adel Larabi;Jungyeon Baek
{"title":"GenAI-Based Privacy-Preserving Transfer Learning","authors":"Mostafa Hussien;Mohamed Cheriet;Kim Khoa Nguyen;Adel Larabi;Jungyeon Baek","doi":"10.1109/TICPS.2025.3556993","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3556993","url":null,"abstract":"The rapid advancement of 5G technology has significantly accelerated the development of 6G standards, driving the need for even faster and more reliable connectivity. In this evolving landscape, the Integrated Sensing Digital Framework (ISDF) promises to revolutionize Industrial Cyber-Physical Systems (ICPS) by enabling unmatched real-time data acquisition, paving the way for groundbreaking advancements. ICPS nodes operate in diverse environments with varying levels of data availability. High-quality predictive models require large volumes of data, which may be abundant at some nodes and scarce at others. Instance-based transfer learning can address this disparity by transferring data from nodes with abundant data to those with limited data. However, this approach risks breaching data privacy, especially in sensitive ICPS applications such as industrial IoT (IIoT). To tackle this issue, we propose a novel privacy-preserving transfer learning approach based on generative models, specifically Generative Adversarial Networks (GANs). In this approach, a GAN is trained at a central center or node with access to large volumes of data. The generative model of the GAN is then transferred to nodes with data scarcity. Extensive experimental results on several real-world traffic load datasets confirm the effectiveness of this approach, highlighting its potential to enhance data-driven decision-making in ICPS while preserving data privacy.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"329-340"},"PeriodicalIF":0.0,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NGMO: A Novel Geometric Mean Optimizer for Intrusion Detection in Industrial Cyber-Physical Systems NGMO:一种用于工业信息物理系统入侵检测的新型几何平均优化器
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-04-01 DOI: 10.1109/TICPS.2025.3556034
Yunhang Yao;Zhiyong Zhang;Kejing Zhao;Peng Wang;Ruirui Wu
{"title":"NGMO: A Novel Geometric Mean Optimizer for Intrusion Detection in Industrial Cyber-Physical Systems","authors":"Yunhang Yao;Zhiyong Zhang;Kejing Zhao;Peng Wang;Ruirui Wu","doi":"10.1109/TICPS.2025.3556034","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3556034","url":null,"abstract":"Industrial cyber-physical systems (CPS) are experiencing various malicious attacks and encountering increasing security challenges. Although machine learning-based intrusion detection systems can help users quickly detect attacks in industrial CPS, feature redundancy and the tuning of model hyperparameters hinder further detection performance. In this study, a Novel Geometric Mean Optimizer (NGMO) is designed to filter redundant industrial features while optimizing the hyperparameters of model. The proposed NGMO incorporates good point sets and dynamic opposition learning strategies during the population initialization and generation hopping phases to enhance the search capabilities of algorithm. Furthermore, the NGMO is combined with three gradient boosting decision tree models for intrusion detection in industrial CPS. Finally, four datasets from industrial scenarios and a real-world case are used to evaluate the effectiveness of NGMO. The experimental results show that NGMO can reduce time consumption while improving model detection accuracy. Therefore, the proposed NGMO can effectively enhance the security of industrial CPS.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"296-308"},"PeriodicalIF":0.0,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143817857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iCPS-DL: A Description Language for Autonomic Industrial Cyber-Physical Systems 自主工业信息物理系统的描述语言
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-03-31 DOI: 10.1109/TICPS.2025.3556065
Dimitrios Kouzapas;Christos Panayiotou;Demetrios G. Eliades
{"title":"iCPS-DL: A Description Language for Autonomic Industrial Cyber-Physical Systems","authors":"Dimitrios Kouzapas;Christos Panayiotou;Demetrios G. Eliades","doi":"10.1109/TICPS.2025.3556065","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3556065","url":null,"abstract":"Modern industrial systems require frequent updates to their cyber and physical infrastructures, often demanding considerable reconfiguration effort. This paper introduces the <italic>industrial Cyber-Physical Systems Description Language</i>, <inline-formula><tex-math>${mathsf{iCPS}}$</tex-math></inline-formula>-<inline-formula><tex-math>${mathsf{DL}}$</tex-math></inline-formula>, which enables autonomic reconfigurations for industrial Cyber-Physical Systems. The <inline-formula><tex-math>${mathsf{iCPS}}$</tex-math></inline-formula>-<inline-formula><tex-math>${mathsf{DL}}$</tex-math></inline-formula> maps an industrial process using semantics for physical and cyber-physical components, a state estimation model, and agent interactions. A novel aspect is using communication semantics to ensure <italic>live</i> interaction among distributed agents. Reasoning on the semantic description facilitates the configuration of the industrial process control loop. A Water Distribution Networks domain case study demonstrates <inline-formula><tex-math>${mathsf{iCPS}}$</tex-math></inline-formula>-<inline-formula><tex-math>${mathsf{DL}}$</tex-math></inline-formula>’s application.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"309-317"},"PeriodicalIF":0.0,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143835457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Resilience Enhancement With Cross-Domain Software-Defined Network for Cyber-Physical Microgrids Against Denial of Service Attacks 利用跨域软件定义网络增强网络物理微电网的网络韧性,抵御拒绝服务攻击
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-03-04 DOI: 10.1109/TICPS.2025.3548006
Jiahong Dai;Zhongmin Dai;Vrizlynn L. L. Thing
{"title":"Cyber-Resilience Enhancement With Cross-Domain Software-Defined Network for Cyber-Physical Microgrids Against Denial of Service Attacks","authors":"Jiahong Dai;Zhongmin Dai;Vrizlynn L. L. Thing","doi":"10.1109/TICPS.2025.3548006","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3548006","url":null,"abstract":"In Cyber-Physical Systems, maintaining cyber-resilience is critical due to the prevailing asymmetry that benefits attackers, especially concerning Denial of Service attacks that target system availability. In response, this paper introduces a cross-domain approach, utilizing Software-Defined Networking to adapt communication topology and control gain scheduling, thereby enhancing cyber-resilience against attacks. A cyber-resilience validation platform is developed, integrating hardware-in-the-loop with domain-specific simulation tools, to ensure accurate replication of real-world cyber-physical scenarios. An integral aspect of this framework is the real-time exploitation of metrics for agile responses to attacks. Validating our approach with an IEEE 34-bus test feeder for the physical domain and Cisco Modeling Lab for the cyber domain shows a 43% to 66% reduction in average latency compared to scenarios without our proposal during attacks, alongside enhanced rewards in both communication and physical networks. These findings accentuate the efficacy of the proposed cross-domain SDN approach in enhancing the cyber-resilience.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"273-284"},"PeriodicalIF":0.0,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143698348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encrypted Model Reference Adaptive Control With False Data Injection Attack Resilience via Somewhat Homomorphic Encryption-Based Overflow Trap 通过基于某种同态加密的溢出陷阱,加密模型参考自适应控制可抵御虚假数据注入攻击
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-03-03 DOI: 10.1109/TICPS.2025.3546887
Jacob Blevins;Jun Ueda
{"title":"Encrypted Model Reference Adaptive Control With False Data Injection Attack Resilience via Somewhat Homomorphic Encryption-Based Overflow Trap","authors":"Jacob Blevins;Jun Ueda","doi":"10.1109/TICPS.2025.3546887","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3546887","url":null,"abstract":"Cloud-based control is prevalent in many modern control applications. Such applications require security for the sake of data secrecy and system safety. The presented research proposes an encrypted adaptive control framework that can be secured for cloud computing with encryption and without issues caused by encryption overflow and large execution delays. This objective is accomplished by implementing a somewhat homomorphic encryption (SHE) scheme on a modified model reference adaptive controller with accompanying encryption parameter tuning rules. Additionally, this paper proposes a virtual false data injection attack (FDIA) trap based on the SHE scheme. The trap guarantees a probability of attack detection by the adjustment of encryption parameters, thus protecting the system from malicious third parties. The formulated algorithm is then simulated, verifying that after tuning encryption parameters, the encrypted controller produces desired plant outputs while guaranteeing detection or compensation of FDIAs. With the utilization of this novel control framework, adaptively controlled systems will maintain data confidentiality and integrity against malicious adversaries.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"262-272"},"PeriodicalIF":0.0,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143654959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Detection of Cyber-Physical Attacks on Smart-IP-Camera Using Network and Telemetry Data 基于网络和遥测数据的智能ip摄像机网络物理攻击实时检测
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-02-21 DOI: 10.1109/TICPS.2025.3544128
Anakhi Hazarika;Nikumani Choudhury;Lei Shu;Qin Su
{"title":"Real-Time Detection of Cyber-Physical Attacks on Smart-IP-Camera Using Network and Telemetry Data","authors":"Anakhi Hazarika;Nikumani Choudhury;Lei Shu;Qin Su","doi":"10.1109/TICPS.2025.3544128","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3544128","url":null,"abstract":"Cyber-physical attacks on edge devices involve exploiting vulnerabilities in both the cyber (software, network) and physical (hardware) components of these devices. The consequences of these attacks include compromising user privacy and intruding into devices, leading to physical damage or disruption of services. Smart cameras are such devices as a part of the broader Internet of Things (IoT) ecosystem and are susceptible to various cyber-physical security threats. To mitigate these cyber-physical threats, manufacturers and users implement security best practices, including regular software updates, strong authentication mechanisms, encryption, and physical security measures. However, traditional methods are insufficient to detect anomalies in the face of evolving cyber-physical threats in real-time as they often rely on predefined rules. Machine learning (ML) based approaches learn from the data and adapt to changing attack patterns, enhancing the security of smart cameras against cyber-physical attacks. In this work, an ML-based adaptive security framework is proposed for smart cameras to dynamically adjust security measures in real-time processing for quick threat detection and immediate responses in case of security breaches or anomalies. A novel model, termed IALSTM (Inference Aware LSTM), is proposed to effectively implement edge-based smart security measures on resource-constrained edge computing devices. Additionally, classical ML algorithms are employed to analyze metrics related to environmental conditions.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"251-261"},"PeriodicalIF":0.0,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Resilient Control of Cyber-Physical Multi-Agent Systems Under Attacks 攻击下网络物理多智能体系统的分布式弹性控制
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-02-18 DOI: 10.1109/TICPS.2025.3543291
Yong Xu;Wenyu Zhang;Yifang Zhang;Zheng-Guang Wu
{"title":"Distributed Resilient Control of Cyber-Physical Multi-Agent Systems Under Attacks","authors":"Yong Xu;Wenyu Zhang;Yifang Zhang;Zheng-Guang Wu","doi":"10.1109/TICPS.2025.3543291","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3543291","url":null,"abstract":"This paper delves into the distributed resilient state estimation-based secure control in multi-agent systems under false-data injection attacks. Firstly, we propose a novel adaptive distributed output observer approach that is based on resilient outputs. The key feature of our proposed observer is its sole dependence on the coefficients of the minimal polynomial of the leader's system matrix, rather than on individual entries of the leader's system. Subsequently, to identify the target attacker, we assign both trust and confidence values to each agent and its neighbors, thereby enabling attack detection and localization. Furthermore, we propose a distributed finite-time resilient control strategy, grounded in trust and confidence, to safeguard against attackers while ensuring secure output estimation and maintaining a bounded upper limit for finite-time convergence. Additionally, we introduce a piecewise function-based approximation method to achieve a less conservative upper bound for the convergence time, compared to traditional methods. Finally, we provide a numerical example to demonstrate the effectiveness of our proposed theoretical analysis.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"241-250"},"PeriodicalIF":0.0,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Encoding-Based Privacy-Preserving Security Control Strategy Under Stealthy Attacks 隐身攻击下基于编码的隐私保护安全控制策略
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2025-02-13 DOI: 10.1109/TICPS.2025.3542039
Jian Liu;Shuailong Wang;Lijuan Zha;Jinliang Liu;Engang Tian
{"title":"An Encoding-Based Privacy-Preserving Security Control Strategy Under Stealthy Attacks","authors":"Jian Liu;Shuailong Wang;Lijuan Zha;Jinliang Liu;Engang Tian","doi":"10.1109/TICPS.2025.3542039","DOIUrl":"https://doi.org/10.1109/TICPS.2025.3542039","url":null,"abstract":"This paper focuses on the privacy-preserving security control issue for cyber-physical systems (CPSs) via an encoding-decoding communication scheme (EDCS). To considerably contemplate the delayed data acquisition and analysis, the integral measurement model is established, which is governed by the function related to system states within a certain period. The EDCS designed has a certain resistant to the non-ideal communication network with limited bandwidth capacity and fading channels. Then the controller is constructed by utilizing the decoding data. Furthermore, in the controller-to-actuator channel, assuming the stealthy false data injection attacks occur randomly and the injected pseudo data is associated with transmission data that has been eavesdropped. By virtue of deriving sufficient conditions, the CPS with EDCS can achieve input-to-state stability as well as the corresponding controller and observer gain parameters are acquired. Eventually, the effectiveness of the designed EDCS and control algorithm is illustrated by a case study involving an autonomous underwater vehicle system.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"3 ","pages":"208-217"},"PeriodicalIF":0.0,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信