IET Blockchain最新文献

筛选
英文 中文
Blockchain-based reliable image copyright protection 基于区块链的可靠图像版权保护
IET Blockchain Pub Date : 2023-03-02 DOI: 10.1049/blc2.12027
Xiangli Xiao, Xiaotong He, Yushu Zhang, Xuewen Dong, Lu-Xing Yang, Yong Xiang
{"title":"Blockchain-based reliable image copyright protection","authors":"Xiangli Xiao,&nbsp;Xiaotong He,&nbsp;Yushu Zhang,&nbsp;Xuewen Dong,&nbsp;Lu-Xing Yang,&nbsp;Yong Xiang","doi":"10.1049/blc2.12027","DOIUrl":"10.1049/blc2.12027","url":null,"abstract":"<p>The indiscriminate distribution of a large number of unlicensed images through the Internet seriously harms the benefits of image owners, which prompts the study of image copyright protection solutions. Existing blockchain-free solutions are limited to using centralized servers to store copyright information, leaving data vulnerable to being lost or tampered with by external attacks. Although the blockchain-based image copyright protection solutions are capable of addressing the above problem, improvements are needed in choosing a suitable blockchain platform and supporting integrated copyright life cycle management. To this end, this paper designs a blockchain-based reliable image copyright protection system named BB-RICP using Hyperledger Fabric. For one thing, the adoption of Fabric mitigates the limitations of other blockchain platforms represented by Ethereum in terms of efficiency, economy, and availability. For another, BB-RICP successes in achieving integrated copyright lifecycle management. In addition, BB-RICP achieves enhanced applicability performance by firstly introducing GM algorithms recommended by Chinese national standard and adapting the more consortium blockchain-oriented practical byzantine fault tolerance algorithm. Moreover, the adoption of spread spectrum watermarking brings convenience to users. Finally, Kubernetes is used to assist in the simulation of BB-RICP to verify that users can operate reliably in the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"222-237"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82819508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A decentralized crypto network with dynamic threshold change 具有动态阈值变化的去中心化加密网络
IET Blockchain Pub Date : 2023-02-21 DOI: 10.1049/blc2.12026
Wenpeng Song, Xin Pei, Ming Li
{"title":"A decentralized crypto network with dynamic threshold change","authors":"Wenpeng Song,&nbsp;Xin Pei,&nbsp;Ming Li","doi":"10.1049/blc2.12026","DOIUrl":"https://doi.org/10.1049/blc2.12026","url":null,"abstract":"<p>The threshold proxy re-encryption (tPRE) algorithm not only ensures the separation of data ownership and use right, but also prevents a single data proxy from doing evil. In order to avoid collusion of multiple data proxies, this paper constructs a decentralized crypto network (DCN) based on blockchain technology and tPRE. DCN is more than a key management system, while expanding the data storage capacity of blockchain network. Combined with existing distributed storage schemes, it can store massive data. Due to Byzantine failure in distributed networks, the data proxy nodes can join or leave at will. In order to ensure that the number of data proxy nodes in the DCN network meets the requirements of the re-encryption threshold, and the data authorization operation can be carried out smoothly, this paper presents a dynamic refresh method of tPRE fragments. When there are fragments that meet the threshold number in the network, the allocation of encrypted fragments can be adjusted non-interactivity and self-adaptively. Non-interactivity means that each data proxy node independently refreshes its old fragments into new fragments without collecting old fragments from other nodes in the DCN, and then distributes the new fragments to other data proxy nodes in the DCN. Self-adaptability refers to monitoring the changes of data proxy node sets in the DCN, and automatically refreshing fragments. Finally, the performance of critical algorithms is calculated in the proposal.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"116-122"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks 面向区块链的6G无线网络协同频谱感知位置隐私保护
IET Blockchain Pub Date : 2023-02-15 DOI: 10.1049/blc2.12025
Roopa Vuppula, Himansu Shekhar Pradhan
{"title":"Blockchain-oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks","authors":"Roopa Vuppula,&nbsp;Himansu Shekhar Pradhan","doi":"10.1049/blc2.12025","DOIUrl":"https://doi.org/10.1049/blc2.12025","url":null,"abstract":"<p>In this article, the authors proposed a novel blockchain-oriented location privacy-preserving (BoLPP) for the Cooperative Spectrum Sensing (CSS) in 6G networks. In order to attain the sustainability of privacy and security for 6G wireless networks, it is a great challenge in this sensing as it faces various malicious attacks while the secondary user (SU) is active. To tackle these issues, the authors proposed a novel framework for blockchain-oriented Cognitive Radio Networks (CRNs) for CSS using an energy detection technique. Moreover, the authors implemented another novel paradigm BoLPP, to attain the privacy of SUs location for CSS in 6G networks. This approach preserves the SUs’ location and makes the BoLPP framework immune to all malicious attackers. The simulation results have been undergone based on the performance metrics such as response time, consistency, probability of false alarm, frame loss (%), average network throughput, energy efficiency, and security. The outcomes reveal that the proposed scheme achieves high security, privacy, energy efficiency, average network throughput, and low probability of false alarm and frame loss (%) when compared with the existing frameworks such as Friend or Foe (FoF) and Tidal Trust Algorithm (TTA) mechanisms. It is observed that the proposed BoLPP mechanism provides better security and privacy in 6G wireless networks.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 2","pages":"74-97"},"PeriodicalIF":0.0,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness 瀑布:Gozalandia。分布式协议,快速终结,安全性和活跃性
IET Blockchain Pub Date : 2023-01-28 DOI: 10.1049/blc2.12023
Sergii Grybniak, Yevhen Leonchyk, Igor Mazurok, Oleksandr Nashyvan, Ruslan Shanin
{"title":"Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness","authors":"Sergii Grybniak,&nbsp;Yevhen Leonchyk,&nbsp;Igor Mazurok,&nbsp;Oleksandr Nashyvan,&nbsp;Ruslan Shanin","doi":"10.1049/blc2.12023","DOIUrl":"10.1049/blc2.12023","url":null,"abstract":"<p>A consensus protocol is a crucial mechanism of distributed networks by which nodes can coordinate their actions and the current state of data. This article describes a BlockDAG consensus algorithm based on the Proof of Stake approach. The protocol provides network participants with cross-voting for the order of blocks, which, in the case of a fair vote, guarantees a quick consensus. Under conditions of dishonest behavior, cross-voting ensures that violations will be quickly detected. In addition, the protocol assumes the existence of a Coordinating network containing information about the approved ordering, which qualitatively increases security and also serves to improve network synchronization.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 4","pages":"182-193"},"PeriodicalIF":0.0,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89577277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An access control model for data security sharing cross-domain in consortium blockchain 联盟区块链中跨域数据安全共享的访问控制模型
IET Blockchain Pub Date : 2023-01-06 DOI: 10.1049/blc2.12022
Yang Liu, Weidong Yang, Yanlin Wang, Yang Liu
{"title":"An access control model for data security sharing cross-domain in consortium blockchain","authors":"Yang Liu,&nbsp;Weidong Yang,&nbsp;Yanlin Wang,&nbsp;Yang Liu","doi":"10.1049/blc2.12022","DOIUrl":"https://doi.org/10.1049/blc2.12022","url":null,"abstract":"<p>With the rapid increment of the demand for data sharing among parties, data is considered a cornerstone component to provide value in the big data environment. Concerns regarding sharing data security have impeded the development of cross-domain data interaction. Therefore, an access control model for data security sharing cross-domain is proposed, Fabric-ABAC, that is based on Hyperledger Fabric and Attribute-based Access Control (ABAC). In order to solve the data security challenges caused by a trusted central organization implementation, a distributed environment is constructed that consists of stakeholders among parties. The unified attribute model is designed for multi-environment combined with smart contracts. Fabric-ABAC realizes multi-level, fine-grained, and auditable access control, enabling data security through automatic permission verification. Considering the ledger is visible to all participants in consortium blockchain, it is necessary to protect the confidentiality of sensitive data. Thus, Proxy Re-Encryption (PRE), which is implemented by smart contracts, is adopted in the scheme to realize the ciphertext interaction without the third party. The security of PRE and the access control model used in Fabric-ABAC is discussed to show that a secure environment for data sharing is provided. Moreover, the completeness of the implementation and effectiveness of the system performance in the multi-domain environment is demonstrated in the experimental results.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"18-34"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A remote and cost-optimized voting system using blockchain and smart contract 使用区块链和智能合约的远程成本优化投票系统
IET Blockchain Pub Date : 2023-01-05 DOI: 10.1049/blc2.12021
Mohammad Nabiluzzaman Neloy, Md. Abdul Wahab, Sheikh Wasif, Abdulla All Noman, Mustafizur Rahaman, Tahmid Hasan Pranto, A. K. M. Bahalul Haque, Rashedur M. Rahman
{"title":"A remote and cost-optimized voting system using blockchain and smart contract","authors":"Mohammad Nabiluzzaman Neloy,&nbsp;Md. Abdul Wahab,&nbsp;Sheikh Wasif,&nbsp;Abdulla All Noman,&nbsp;Mustafizur Rahaman,&nbsp;Tahmid Hasan Pranto,&nbsp;A. K. M. Bahalul Haque,&nbsp;Rashedur M. Rahman","doi":"10.1049/blc2.12021","DOIUrl":"https://doi.org/10.1049/blc2.12021","url":null,"abstract":"<p>Traditional voting procedures are non-remote, time-consuming, and less secure. While the voter believes their vote was submitted successfully, the authority does not provide evidence that the vote was counted and tallied. In most cases, the anonymity of a voter is also not sure, as the voter's details are included in the ballot papers. Many voters consider this voting system untrustworthy and manipulative, discouraging them from voting, and consequently, an election loses a significant number of participants. Although the inclusion of electronic voting systems (EVS) has increased efficiency; however, it has raised concerns over security, legitimacy, and transparency. To mitigate these problems, blockchain technology has been leveraged and smart contract facilities with a combination of artificial intelligence (AI) to propose a remote voting system that makes the overall voting procedure transparent, semi-decentralized, and secure. In addition, a system that aids in boosting the number of turnouts in an election through an incentivization policy for the voters have also developed. Through the proposed virtual campaigning feature, the authority can generate a decent amount of revenue, which downsizes the overall cost of an election. To reduce the associated cost of transactions using smart contracts, this system implements a hybrid storage system where only a few cardinal data are stored in the blockchain network.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain technology in energy systems: A state-of-the-art review 能源系统中的区块链技术:最新综述
IET Blockchain Pub Date : 2022-12-21 DOI: 10.1049/blc2.12020
Moein Choobineh, Ali Arabnya, Behrouz Sohrabi, Amin Khodaei, Aleksi Paaso
{"title":"Blockchain technology in energy systems: A state-of-the-art review","authors":"Moein Choobineh,&nbsp;Ali Arabnya,&nbsp;Behrouz Sohrabi,&nbsp;Amin Khodaei,&nbsp;Aleksi Paaso","doi":"10.1049/blc2.12020","DOIUrl":"https://doi.org/10.1049/blc2.12020","url":null,"abstract":"<p>Blockchain is a powerful technology to facilitate decarbonization, decentralization, digitalization, and democratization (4D's) of the energy systems of the future. The 4D's are the driving forces of transition into new energy systems that are more sustainable, resilient, efficient, and equitable. Although this technology can be applied to a wide spectrum of applications in the power sector, a set of challenges and limitations still need to be addressed to facilitate a full-scope implementation in energy systems. This paper presents an overview of blockchain technology from its inception through its most recent evolution and presents a thematic review of state of the art in the application of this technology in power systems. Further, it addresses the barriers preventing the power sector from large-scale, full-scope adoption of this technology. Finally, the emerging blockchain trends in the near future will be discussed and its potential to facilitate a secure, decentralized energy trading platform will be investigated.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"3 1","pages":"35-59"},"PeriodicalIF":0.0,"publicationDate":"2022-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50148411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Building trust via blockchain in UAV-assisted ultra-dense 6G cellular networks 在无人机辅助的超密集6G蜂窝网络中通过区块链建立信任
IET Blockchain Pub Date : 2022-12-05 DOI: 10.1049/blc2.12018
Taotao Wang, Long Shi, Jessie Hui Wang, Zhe Wang, Xiumei Deng, Jun Li, Shengli Zhang
{"title":"Building trust via blockchain in UAV-assisted ultra-dense 6G cellular networks","authors":"Taotao Wang,&nbsp;Long Shi,&nbsp;Jessie Hui Wang,&nbsp;Zhe Wang,&nbsp;Xiumei Deng,&nbsp;Jun Li,&nbsp;Shengli Zhang","doi":"10.1049/blc2.12018","DOIUrl":"10.1049/blc2.12018","url":null,"abstract":"<p>The ultra-dense deployment of unmanned aerial vehicles (UAVs) as mobile small cell base stations (SBS) is expected to support ultra-high-speed, ultra-reliable, and ultra-low-latency wireless connections in sixth generation (6G) wireless cellular networks. Inevitably, the explosively increasing number of SBSs each with ever-shrinking cell size will result in the spectrum scarcity and pose critical challenges to the spectrum management. Towards the centralized spectrum management system, a third-party authority is employed to coordinate the spectrum sensing, sharing, and allocation among participants. However, a centralized authority is vulnerable to numerous security threats, such as single point of failure, denial of service attacks, and privacy disclosure, and cannot guarantee fair and efficient spectrum management without mutual trusts among participants. To address these problems, a novel framework of blockchain-aided spectrum management is designed to securely record the spectrum auction data and spectrum allocation data in the decentralized spectrum sharing. Moreover, a trust management scheme is proposed to evaluate the trusts of all UAVs participating in the decentralized spectrum sharing, where the trust increase depends on legal use of spectrum allocation and honest report of spectrum sensing. In particular, it is shown that the proposed trust management can not only incentivize the UAVs to comply with the legal rule of spectrum sharing in blockchain, but also punish the malicious behaviour that either violates the spectrum sharing rule or provides misleading spectrum sensing results.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"2 3-4","pages":"67-76"},"PeriodicalIF":0.0,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83048462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey of cyber attacks on blockchain based IoT systems for industry 4.0 工业4.0基于区块链的物联网系统的网络攻击调查
IET Blockchain Pub Date : 2022-11-19 DOI: 10.1049/blc2.12017
Aarju Dixit, A. Trivedi, W. W. Godfrey
{"title":"A survey of cyber attacks on blockchain based IoT systems for industry 4.0","authors":"Aarju Dixit, A. Trivedi, W. W. Godfrey","doi":"10.1049/blc2.12017","DOIUrl":"https://doi.org/10.1049/blc2.12017","url":null,"abstract":"","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89418153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bitcoin transactions as a graph 比特币交易的图表
IET Blockchain Pub Date : 2022-09-08 DOI: 10.1049/blc2.12016
Zhensheng Di, Guan Wang, Lili Jia, Zhuoyi Chen
{"title":"Bitcoin transactions as a graph","authors":"Zhensheng Di,&nbsp;Guan Wang,&nbsp;Lili Jia,&nbsp;Zhuoyi Chen","doi":"10.1049/blc2.12016","DOIUrl":"10.1049/blc2.12016","url":null,"abstract":"<p>Nowadays, blockchain is an upcoming area for researchers from different research fields. Bitcoin, as the first successful cryptocurrency, has accumulated numerous data after its existence. Here, the Bitcoin transaction graph from a graph theory perspective is investigated with more available data given now. This paper mainly focuses on the transaction graph and provides researchers with both practical and theoretical sides of the data. Several existent measurements and some newer ones are first computed and analysed. These measurements help to interpret the transaction graph more extensively. A new modified Buckley–Osthus random graph model is proposed, and a simulation of the Chung–Lu model is attempted to represent the Bitcoin transaction network. Some suggestions are given to improve the modified Buckley–Osthus model and point out the pros and cons of these random graph models. Moreover, the experiments show that scale-free networks are fundamentally not a good model for Bitcoin transaction networks considering all the data, but the mechanics of preferential attachment is crucial. How to proceed with Bitcoin transaction graph theory from both theoretical and experimental perspectives for future studies is also discussed and analysed.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"2 3-4","pages":"57-66"},"PeriodicalIF":0.0,"publicationDate":"2022-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75220088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信