IET Blockchain最新文献

筛选
英文 中文
Blockchain transaction data mining and its applications 区块链交易数据挖掘及其应用
IET Blockchain Pub Date : 2024-07-29 DOI: 10.1049/blc2.12083
Jiajing Wu, Hong-Ning Dai, Qi Xuan, Radosław Michalski, Xi Chen
{"title":"Blockchain transaction data mining and its applications","authors":"Jiajing Wu, Hong-Ning Dai, Qi Xuan, Radosław Michalski, Xi Chen","doi":"10.1049/blc2.12083","DOIUrl":"https://doi.org/10.1049/blc2.12083","url":null,"abstract":"<p>Since the birth of blockchain as the underlying support technology for Bitcoin, blockchain technology has received widespread attention from academia and industry worldwide and is considered to have profound potential for disruptive change in areas such as finance, smart manufacturing, and the Internet of Things. As cryptocurrencies, smart contracts, decentralized applications and other derivatives continue to be generated on the blockchain, the volume of transaction data on the blockchain has been maintaining a high growth. With the help of this massive data, we can dig out the development rules of the blockchain, analyze the characteristics of different transactions, and then identify the abnormal behaviour on the blockchain to promote the green and sustainable development of the blockchain. Unfortunately, blockchain transaction data mining faces challenges, such as blockchain data heterogeneity, anonymity and decentralization as well as real-time and generality.</p><p>This special issue aims to provide an open venue for academic and industrial communities to present and discuss cutting-edge technologies and research results regarding blockchain transaction data mining and its applications. It solicits original high-quality papers with new transaction data acquisition tools, transaction network construction and mining methods, anomaly detection algorithms, etc.</p><p>In this Special Issue, we have received eight papers, all of which underwent peer review. Of the eight originally submitted papers, five have been accepted. The overall submissions were of high quality, which marks the success of this Special Issue. A brief presentation of each of the paper in this special issue follows.</p><p>Xiong et al. introduce a graph neural network-based phishing detection method for Ethereum, and conduct extensive experiments on the Ethereum dataset to verify the effectiveness of this scheme in identifying Ethereum phishing detection. The method introduces a feature learning algorithm named TransWalk and constructs an Ethereum phishing fraud detection framework utilizing a transaction-oriented biased sampling strategy for transaction networks and a multi-scale feature extraction method for Ethereum. Through more effective extraction of Ethereum transaction features, the framework aims to enhance phishing fraud detection performance. This work holds significant importance in the field of Ethereum ecosystem security. Access the full paper using the following link: https://doi.org/10.1049/blc2.12031.</p><p>Feng et al. propose a framework for detecting and repairing reentrancy vulnerabilities in smart contracts based on bytecode and vulnerability features. This framework aims to mitigate the losses incurred by reentrancy vulnerabilities in the digital currency economy and offers a more comprehensive solution for detecting and repairing such vulnerabilities. The proposed bytecode-level method overcomes challenges in detection and repair by integrating detecti","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"223-225"},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142160269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain
IET Blockchain Pub Date : 2024-07-15 DOI: 10.1049/blc2.12082
Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song
{"title":"Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain","authors":"Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song","doi":"10.1049/blc2.12082","DOIUrl":"https://doi.org/10.1049/blc2.12082","url":null,"abstract":"Airport checked luggage entails specific requirements for speed, stability, and reliability. The issue of abnormal retention of checked luggage presents a significant challenge to aviation safety and transportation efficiency. Traditional luggage monitoring systems exhibit limitations in terms of accuracy and timeliness. To address this challenge, this paper proposes a real‐time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. By eliminating cloud servers and deploying multiple edge servers to establish a private chain, images of anomalously retained luggage are encrypted and stored on the chain. Data users can verify the authenticity of accessed images through anti‐tampering algorithms, ensuring the security of data transmission and storage. The deployment of edge computing servers can significantly reduce algorithm latency and enhance real‐time performance. This solution employs computer vision technology and an edge computing framework to address the speed and stability of checked luggage transportation. Furthermore, blockchain technology greatly enhances system security during operation. A model trained on a sample set of 4600 images achieved a luggage recognition rate of 96.9% and an anomaly detection rate of 95.8% in simulated test videos.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"76 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141647467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data‐sharing strategies in medical consortium based on master‐slave multichain and federated learning 基于主从多链和联合学习的医疗联合体数据共享策略
IET Blockchain Pub Date : 2024-07-11 DOI: 10.1049/blc2.12075
Bohan Kang, Ning Zhang, Jianming Zhu
{"title":"Data‐sharing strategies in medical consortium based on master‐slave multichain and federated learning","authors":"Bohan Kang, Ning Zhang, Jianming Zhu","doi":"10.1049/blc2.12075","DOIUrl":"https://doi.org/10.1049/blc2.12075","url":null,"abstract":"In order to encourage participants to actively join the data sharing and to meet the distributed structure and privacy requirement in the medical consortium, the data‐sharing strategy based on the master‐slave multichain is presented in this paper. According to the different computing resources and the responsibility of participants, the adaptive Proof of Liveness and Quality consensus and hierarchical federated learning algorithm for master‐slave multichain are proposed. Meanwhile, by quantifying the utility function and the optimization constraint of participants, this paper designs the cooperative incentive mechanism of medical consortium in multi‐leader Stackelberg game to solve the optimal decision and pricing selection of the master‐slave multichain. The simulation experiments show that the proposed methods can decrease the training loss and improve the parameter accuracy by MedMINST datasets, as well as reach the optimal equilibrium in selection and pricing strategy in the system, guaranteeing the fairness of profit distribution for participants in master‐slave multichain.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"76 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RON‐based cross‐chain routing optimization strategy in metaverse 基于 RON 的元宇宙跨链路由优化策略
IET Blockchain Pub Date : 2024-06-10 DOI: 10.1049/blc2.12078
Junjie Huang, Liang Tan, Jianmei Xiao
{"title":"RON‐based cross‐chain routing optimization strategy in metaverse","authors":"Junjie Huang, Liang Tan, Jianmei Xiao","doi":"10.1049/blc2.12078","DOIUrl":"https://doi.org/10.1049/blc2.12078","url":null,"abstract":"Metaverse is a new ecology that integrates the digital world with the physical world, generates a mirror image of the real world based on digital twin technology, and guarantees the fairness of the virtual world through the trusted mechanism of blockchain. Cross‐chain communication technology is the key to realizing data circulation and collaborative processing between blockchains, which provides the communication foundation for the massive connection of blockchains in the metaverse. The current cross‐chain communication mode is dominated by direct‐connect routing, leading to network congestion and high propagation delay once the direct‐connect link fails and cannot be recovered quickly. To optimize direct‐connect routing, this paper proposed a cross‐chain routing optimization strategy based on RON (Resilient Overlay Network), that is, Cross‐Chain_RON, which firstly applies RON to reconstruct the direct‐connect routing model, and then selects the optimal link through the shortest‐path algorithm and policy routing, and combines with the RON performance database to improve the data transmission efficiency. Finally, the two communication modes were simulated by simulation tools. The experiments show that Cross‐Chain_RON outperforms the direct‐connect routing in terms of latency, rate of successful data transmission, and throughput in poor network environments, but at the expense of a certain amount of system overhead.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"122 37","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain end user adoption and societal challenges: Exploring privacy, rights, and security dimensions 区块链终端用户的采用和社会挑战:探索隐私、权利和安全问题
IET Blockchain Pub Date : 2024-05-07 DOI: 10.1049/blc2.12077
Salman Saleem Virani
{"title":"Blockchain end user adoption and societal challenges: Exploring privacy, rights, and security dimensions","authors":"Salman Saleem Virani","doi":"10.1049/blc2.12077","DOIUrl":"https://doi.org/10.1049/blc2.12077","url":null,"abstract":"The focus of this review article is on the societal problems and end user acceptance of blockchain technology. The paper begins by outlining the importance of blockchain in modernizing trust and data management systems and highlighting its rapid spread across numerous industries. In‐depth analysis of the adoption‐influencing aspects is done, which also lists the advantages and typical end‐user problems. It examines the privacy implications, restrictions on pseudonymity, and function of technologies that improve privacy, such as zero‐knowledge proofs, while also exploring the legal and regulatory environment around blockchain, putting a focus on digital identity, intellectual property, and data ownership. It also evaluates blockchain security features, such as flaws and risks associated with smart contracts, discusses best practices for boosting security, discusses the societal effects of blockchain, and makes suggestions for legislators, companies, and scholars. The use of blockchain technology and its effects on privacy, rights, and security are discussed in real‐world case studies as well.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141004248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging ontochains for distributed public transit ticketing: An investigation with the system for ticketing ubiquity with blockchains 利用区块链实现分布式公共交通票务:利用区块链实现票务无处不在的系统调查
IET Blockchain Pub Date : 2024-05-07 DOI: 10.1049/blc2.12071
J. Preece, Christopher R. Morris, John M. Easton
{"title":"Leveraging ontochains for distributed public transit ticketing: An investigation with the system for ticketing ubiquity with blockchains","authors":"J. Preece, Christopher R. Morris, John M. Easton","doi":"10.1049/blc2.12071","DOIUrl":"https://doi.org/10.1049/blc2.12071","url":null,"abstract":"Transport ticketing systems are crucial for enabling seamless, efficient, and sustainable mobility. However, traditional ticketing systems face limitations such as ticket fraud, lack of interoperability, and the inability to adapt to changes in the dynamic transport networks they issue tickets for. This paper presents new approaches to the system for ticketing ubiquity with blockchains (STUB), a novel smart transport ticketing solution that employs ontochains, a hybrid data structure combining blockchains and ontologies to form a type of distributed knowledge graph. STUB aims to address these limitations by providing a secure, transparent, and flexible platform for ticket issuance, validation, and management. We describe the key components and workflow of the STUB system, highlighting the use of transport network ontologies for modelling complex relationships within transportation systems and blockchain technologies for transport network ontology's state. Additionally, the implementation of Merkle proofs for efficient and secure validation between on‐chain and off‐chain ontological data is discussed. Finally, a simulated toy example is used as a lightweight proof‐of‐concept to demonstrate these capabilities. The proposed STUB system has the potential to significantly impact the future of transportation ticketing by offering a more seamless, interoperable, and user‐friendly experience whilst addressing the challenges associated with traditional ticketing systems.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"96 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141003526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing smart contract security: Leveraging pre‐trained language models for advanced vulnerability detection 增强智能合约的安全性:利用预训练语言模型进行高级漏洞检测
IET Blockchain Pub Date : 2024-03-29 DOI: 10.1049/blc2.12072
Fei He, Fei Li, Peili Liang
{"title":"Enhancing smart contract security: Leveraging pre‐trained language models for advanced vulnerability detection","authors":"Fei He, Fei Li, Peili Liang","doi":"10.1049/blc2.12072","DOIUrl":"https://doi.org/10.1049/blc2.12072","url":null,"abstract":"The burgeoning interest in decentralized applications (Dapps), spurred by advancements in blockchain technology, underscores the critical role of smart contracts. However, many Dapp users, often without deep knowledge of smart contracts, face financial risks due to hidden vulnerabilities. Traditional methods for detecting these vulnerabilities, including manual inspections and automated static analysis, are plagued by issues such as high rates of false positives and overlooked security flaws. To combat this, the article introduces an innovative approach using the bidirectional encoder representations from transformers (BERT)‐ATT‐BiLSTM model for identifying potential weaknesses in smart contracts. This method leverages the BERT pre‐trained model to discern semantic features from contract opcodes, which are then refined using a Bidirectional Long Short‐Term Memory Network (BiLSTM) and augmented by an attention mechanism that prioritizes critical features. The goal is to improve the model's generalization ability and enhance detection accuracy. Experiments on various publicly available smart contract datasets confirm the model's superior performance, outperforming previous methods in key metrics like accuracy, F1‐score, and recall. This research not only offers a powerful tool to bolster smart contract security, mitigating financial risks for average users, but also serves as a valuable reference for advancements in natural language processing and deep learning.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"44 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140368230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A trusted and regulated data trading scheme based on blockchain and zero‐knowledge proof 基于区块链和零知识证明的可信和受监管的数据交易计划
IET Blockchain Pub Date : 2024-03-11 DOI: 10.1049/blc2.12070
Dongmei Li, Xiaohui Ke, Xiaomei Zhang, Yujin Zhang
{"title":"A trusted and regulated data trading scheme based on blockchain and zero‐knowledge proof","authors":"Dongmei Li, Xiaohui Ke, Xiaomei Zhang, Yujin Zhang","doi":"10.1049/blc2.12070","DOIUrl":"https://doi.org/10.1049/blc2.12070","url":null,"abstract":"To meet the demand for high‐quality healthcare services, data trading can effectively promote the circulation of medical data and improve the level of healthcare services. To address the existing problems of data regulation difficulties and data privacy leakage in medical data trading, a trusted and regulated data trading scheme based on blockchain and zero‐knowledge proof is proposed. In this scheme, a regulatory institution is introduced to control the issuance of authorized tokens and ensure the controllability of data sharing activities. The blockchain takes over the task of generating public parameters to reduce the computational overhead of the system. Based on homomorphic proxy re‐encryption technology, users can perform data analysis in the cloud to ensure data security. Smart contracts and zero‐knowledge proof technology can automatically verify the validity of data to protect the rights and interests of data users; at the same time, efficient consensus algorithms can also increase the rate of transactions processed by the blockchain system. Finally, as the security and performance analysis shows, the scheme in this paper has better security, higher efficiency and more comprehensive functions.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"27 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140252141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art ArtProtect:基于区块链和 NFC 的实物艺术品防伪系统
IET Blockchain Pub Date : 2024-02-28 DOI: 10.1049/blc2.12069
Cindy Handoko Tantowibowo, Wei‐Chuen Yau
{"title":"ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art","authors":"Cindy Handoko Tantowibowo, Wei‐Chuen Yau","doi":"10.1049/blc2.12069","DOIUrl":"https://doi.org/10.1049/blc2.12069","url":null,"abstract":"Counterfeit artwork presents a significant risk to copyright holders and the economy. Without expertise in art, it is not straightforward to distinguish an artwork counterfeit from a genuine piece. This work designs and implements a reliable solution that enables users with near‐field communication‐enabled Android smartphones to verify artwork authenticity by accessing its respective certificate of authenticity stored in the Ethereum blockchain. To represent a physical artwork, the artwork image and metadata are stored in an inter‐planetary file system and minted as an ERC721 non‐fungible token to a smart contract deployed in Ethereum Rinkeby Testnet. The mobile app ArtProtect was developed to generate certificate of authenticity based on each non‐fungible token fetched through OpenSea Testnet API. Users access this information by scanning an near‐field communication tag embedded into the artwork. The content of the tag is signed by the respective artwork's artist and responsible agent by using Ethereum signing with their Ethereum wallet accounts. Through testing and analysis, the implemented work is secure, tamper‐evident, usable, flexible, and inexpensive to be applied to a real‐world scenario.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"11 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140419886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain for finance: A survey 区块链金融:一项调查
IET Blockchain Pub Date : 2024-02-27 DOI: 10.1049/blc2.12067
Hanjie Wu, Qian Yao, Zhenguang Liu, Butian Huang, Yuan Zhuang, Huayun Tang, Erwu Liu
{"title":"Blockchain for finance: A survey","authors":"Hanjie Wu,&nbsp;Qian Yao,&nbsp;Zhenguang Liu,&nbsp;Butian Huang,&nbsp;Yuan Zhuang,&nbsp;Huayun Tang,&nbsp;Erwu Liu","doi":"10.1049/blc2.12067","DOIUrl":"10.1049/blc2.12067","url":null,"abstract":"<p>As an innovative technology for enhancing authenticity, security, and risk management, blockchain is being widely adopted in trade and finance systems. The unique capabilities of blockchain, such as immutability and transparency, enable new business models of distributed data storage, point-to-point transactions, and decentralized autonomous organizations. Here, the authors focus on blockchain-based securities trading, in which blockchain technology plays a vital role in financial services as it ultimately lifts trust and frees the need for third-party verification by using consensus-based verification. The 12 most popular blockchain platforms are investigated and 6 platforms that are related to finance are elaborated on, seeking to provide a panorama of securities trading practices. Meanwhile, this survey provides a comprehensive summary of blockchain-based securities trading applications. Numerous practical applications of blockchain-based securities trading are gathered and they are categorized into four distinct categories. For each category, a typical example is introduced and how blockchain contributes to solving the key problems faced by FinTech companies and researchers explained. Finally, interesting observations are provided ranging from mainstream blockchain-based financial institutions to security issues of decentralized finance applications, aiming to picture the current blockchain ecosystem in finance.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 2","pages":"101-123"},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140425324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信