2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)最新文献

筛选
英文 中文
Towards Secure and Scalable UWB-based Positioning Systems 迈向安全且可扩展的超宽带定位系统
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00039
Michael Stocker, Bernhard Großwindhager, C. Boano, K. Römer
{"title":"Towards Secure and Scalable UWB-based Positioning Systems","authors":"Michael Stocker, Bernhard Großwindhager, C. Boano, K. Römer","doi":"10.1109/MASS50613.2020.00039","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00039","url":null,"abstract":"Positioning systems based on ultra-wideband (UWB) technology are becoming ubiquitous and enable a plethora of attractive Internet of Things applications, ranging from smart access and asset tracking to the navigation of autonomous vehicles. As these positioning systems are often deployed over large areas, the focus of UWB-based research has recently shifted to the development of scalable solutions that can offer a high positioning accuracy for countless tags while maximizing energyefficiency. At the same time, as positioning systems are increasingly used in safety-critical settings, several academic efforts and the standardization activities of the IEEE $802. 15.4 z$ working group have laid the foundations for a secure distance estimation using UWB technology. Unfortunately, these two endeavours have followed independent tracks that do not blend together. In this paper, we highlight this issue and describe the challenge of securing modern UWB-based positioning systems that are designed with scalability in mind. We first illustrate how the use of unidirectional communications, the need for synchronized anchors, and the use of quasi-simultaneous responses, which are common features of recent scalable UWB systems based on timedifference-of-arrival, make these solutions vulnerable to several attacks, despite the use of IEEE $802. 15.4 z$. After carrying out a security analysis and describing how scalable UWB systems are exposed to several attacks, we devise a number of design concepts to counteract the identified attacks and secure these systems.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Offloading Federated Learning Task to Edge Computing with Trust Execution Environment 基于可信执行环境的边缘计算卸载联邦学习任务
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00066
Shifu Dong, Deze Zeng, Lin Gu, Song Guo
{"title":"Offloading Federated Learning Task to Edge Computing with Trust Execution Environment","authors":"Shifu Dong, Deze Zeng, Lin Gu, Song Guo","doi":"10.1109/MASS50613.2020.00066","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00066","url":null,"abstract":"Federated Learning (FL) takes advantage of distributed data to jointly train a global deep learning model on many clients, without revealing local data to the central server for privacy guarantee. However, due to the heterogeneity of the FL clients, some poor performance clients may become stragglers, impeding the global training process. It is desirable to offload these stragglers’ tasks to some high performance servers, but this is at the risk of data privacy leakage. To mitigate such problem, we introduce the edge servers empowered by Trusted Execution Environment (TEE) to securely help the FL clients with poor performance. With the consideration of limited computation resource in TEE, we further investigate how to select the clients for help. Considering the time-varying processing capabilities on the FL clients, we propose an exploration-exploitation based client selection algorithm. Via evaluating our algorithm in a practical FL training task, the experiments show that the proposed algorithm indeed accelerate training process thanks to its efficient client selection.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125471254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Malware Detection Approach Using Malware Images and Autoencoders 一种使用恶意软件图像和自动编码器的恶意软件检测方法
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00009
Xiang Jin, X. Xing, Haroon Elahi, Guojun Wang, Hai Jiang
{"title":"A Malware Detection Approach Using Malware Images and Autoencoders","authors":"Xiang Jin, X. Xing, Haroon Elahi, Guojun Wang, Hai Jiang","doi":"10.1109/MASS50613.2020.00009","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00009","url":null,"abstract":"Most machine learning-based malware detection systems use various supervised learning methods to classify different instances of software as benign or malicious. This approach provides no information regarding the behavioral characteristics of malware. It also requires a large amount of training data and is prone to labeling difficulties and can reduce accuracy due to redundant training data. Therefore, we propose a malware detection method based on deep learning, which uses malware images and a set of autoencoders to detect malware. The method is to design an autoencoder to learn the functional characteristics of malware, and then to observe the reconstruction error of autoencoder to realize the classification and detection of malware and benign software. The proposed approach achieves 93% accuracy and comparatively better F1-score values while detecting malware and needs little training data when compared with traditional malware detection systems.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"821 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Online Energy-efficient Scheduling Algorithm for Renewable Energy-powered Roadside units in VANETs VANETs中可再生能源驱动的路边装置在线节能调度算法
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00068
Vivek Sethi, Sujata Pal, Avani Vyas
{"title":"Online Energy-efficient Scheduling Algorithm for Renewable Energy-powered Roadside units in VANETs","authors":"Vivek Sethi, Sujata Pal, Avani Vyas","doi":"10.1109/MASS50613.2020.00068","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00068","url":null,"abstract":"Road-side unit (RSU) plays an important role in providing connectivity among the vehicles on the road. In rural areas, RSUs are powered using renewable energy, such as solar or wind energy. Hence, the energy consumption across such RSUs should be efficient i.e., energy consumption at RSUs should be minimized and no RSU gets over-utilized while others are under-utilized. The amount of energy consumption depends upon the scheduling of different kinds of data requests at RSU. In this paper, we propose a scheduling architecture for minimizing energy consumption at RSU and attaining uniform energy consumption across neighboring RSUs. This, in turn, increases the request fulfillment percentage at RSUs. The proposed architecture categorizes the incoming request as a Traditional (less computation) or a Smart request (high computation). Two approaches- Hard-deadline Less Computation requirement Approach (HLCA) and Soft-deadline High Computation requirement Approach (SHCA) are proposed for addressing Traditional and Smart data requests, respectively. In HLCA approach, the receiving RSU uses the scheduling metric to select the servicing RSU for request fulfillment. We prove by analysis, how scheduling metric helps in minimizing and achieving uniform energy consumption across the RSUs. In SHCA approach, Fog computing is used for handling high computation requests. Energy consumption at RSUs is further optimized by using Auction game-based relay vehicle selection mechanism. Simulation results demonstrate that our proposed approaches achieve uniform energy consumption across multiple RSUs and 10% more efficient than scheduling algorithms for single RSU model such as Nearest Fastest Set Scheduler (NFS).","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Direction Finding with UWB and BLE: A Comparative Study 超宽带测向与低频段测向的比较研究
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00016
L. Botler, Michael Spörk, K. Diwold, K. Römer
{"title":"Direction Finding with UWB and BLE: A Comparative Study","authors":"L. Botler, Michael Spörk, K. Diwold, K. Römer","doi":"10.1109/MASS50613.2020.00016","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00016","url":null,"abstract":"Using Angle-of-Arrival based on Phase-Difference-of-Arrival is a recent trend in indoor positioning. Although the basic techniques for direction estimation have been known and used for a long time in different application scenarios (e.g., RADAR), the complexity of Phase-Difference-of-Arrival transceivers discouraged its use for indoor applications. This scenario changed with the recent development of modern chips at competitive prices. Specifically, two ubiquitous technologies in the context of indoor positioning, namely Bluetooth Low Energy (BLE) and Ultra-Wideband (UWB), currently feature Angle-of-Arrival estimation. In this paper we compare these two technologies regarding their potential for indoor positioning based on a fair evaluation of their performance for estimating Angle-of-Arrival in five different realistic setups. The results obtained are compared with existing studies when available. Our results show that Ultra-Wideband is, in general, more accurate and precise, especially when subject to multipath interference. Additionally, we discuss possible approaches to improve the accuracy and precision of Angle-of-Arrival estimation using BLE, such as the impact of increasing the number of antenna elements. By using UWB, we achieved an angular accuracy of up to 5° even under obstructed LOS and multipath, while an overall mean error of nearly 25° was obtained with BLE in an outdoor scenario without obstacles.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
FD-UWA: Full-Duplex Underwater Acoustic Comms via Self-Interference Cancellation in Space FD-UWA:通过空间自干扰抵消的全双工水声通信
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00040
Yung-Ting Hsieh, M. Rahmati, D. Pompili
{"title":"FD-UWA: Full-Duplex Underwater Acoustic Comms via Self-Interference Cancellation in Space","authors":"Yung-Ting Hsieh, M. Rahmati, D. Pompili","doi":"10.1109/MASS50613.2020.00040","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00040","url":null,"abstract":"Traditionally, underwater acoustic communications is half duplex, i.e., the hydrophones and transducers operate in non-overlapping time-slots/frequency-bands in one direction at a time or frequency. To double the spectral efficiency and allow simultaneous transmission and reception in Full-Duplex mode (FD), a Self-Interference Cancellation (SIC) technique in space is introduced and deployed. Specifically, a novel underwater acoustic system is proposed to perform FD-SIC efficiently via an integrated design combining underwater Acoustic Vector Sensor (AVS) and Phased Array Transducer (PAT) to realize spatial SIC. The energy focusing function of the Beamformer (BF) helps PAT avoid self and mutual spatial interference. The AVS keeps updating the direction of arrival information to let BF adjust the steering angle via an adaptive protocol. The proposal is evaluated and verified via simulations in realistic underwater acoustic channels and is able to achieve 59 dB SIC at 80 kHz steering angle at -5 ° and at least 37 dB within the steering angle region before the input of digital SIC. This indicates that the design is a promising solution for the chosen angle region to perform spatial SIC as well as to prevent the grating lobe interference. The design is being experimentally validated using the data collected from an underwater testbed and implemented on an Field Programmable Gate Array (FPGA) board that provides energy efficiency and real-time processing capabilities.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132185029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring and Optimizing Cell Selection of NB-IoT Network NB-IoT网络小区选择的测量与优化
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00061
Liqian Shen, Xiangmao Chang, Yusheng Qiu, G. Xing, Deliang Yang
{"title":"Measuring and Optimizing Cell Selection of NB-IoT Network","authors":"Liqian Shen, Xiangmao Chang, Yusheng Qiu, G. Xing, Deliang Yang","doi":"10.1109/MASS50613.2020.00061","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00061","url":null,"abstract":"Narrowband-Internet of Things (NB-IoT) is an emerging cellular communication technology designed for low power wide area applications. Cell selection determines the channel of user device and hence is an important issue in cellular networks. In this paper, we take the first attempt to examine and optimize the the cell selection in NB-IoT networks by field measurement. We conduct measurements at 30 different locations which involve 5 typical application scenarios of NB-IoT. Two kinds of NB-IoT modules and two network operators are also involved in the measurements. We find three potential issues on the cell selection of the User Equipment (UE) through the measurements. We propose an adaptive cell selection approach to optimize the cell selection of UE. The simulation test based on real-world measurement data shows that the cell selected by the adaptive approach can improve the coverage level and reduce the power consumption for UE.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DOSP: Data Dissemination with Optimized and Secured Path for Ad-hoc Vehicular Communication Networks 基于优化和安全路径的自组织车辆通信网络数据传播
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00025
K. Tripathi, A. Yadav, S. Sharma
{"title":"DOSP: Data Dissemination with Optimized and Secured Path for Ad-hoc Vehicular Communication Networks","authors":"K. Tripathi, A. Yadav, S. Sharma","doi":"10.1109/MASS50613.2020.00025","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00025","url":null,"abstract":"Timely delivery of critical information and data may reduce the chances of road accidents using vehicular adhoc networks. The vehicular ad-hoc network uses the multihop data dissemination technique due to the limited transmission capabilities of the vehicles. The dynamic topology of the network due to the presence of highly mobile vehicles experiences frequent path disconnections in the communication network. Due to these challenges, the timely delivery of messages to the intended recipient is still a challenging issue. The core attention of this work is to report the timely message delivery problem in the vehicular communication network. In this work, we proposed a secure and optimized data routing technique using cross-layer optimization for the heterogeneous ad-hoc network. Firstly we calculate the trust value of nodes based on the entity-centric trust model. Further, we estimate the link durability and probability of collision in the network of vehicles. Our prime aim is to increase the link reliability and duration to deliver the message on time. We also minimize the probability of data collision and improve the delivery ratio of the network. The proposed optimized data dissemination model has been tested with several network parameters. The experimental results show significant improvements in terms of minimized delay, packet loss ratio.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Trustworthy Blockchain based framework for Impregnable IoV in Edge Computing 基于可信赖区块链的边缘计算中坚不可摧的物联网框架
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00013
Pralay Kumar Lahiri, Debashis Das, W. Mansoor, Sourav Banerjee, Pushpita Chatterjee
{"title":"A Trustworthy Blockchain based framework for Impregnable IoV in Edge Computing","authors":"Pralay Kumar Lahiri, Debashis Das, W. Mansoor, Sourav Banerjee, Pushpita Chatterjee","doi":"10.1109/MASS50613.2020.00013","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00013","url":null,"abstract":"The concept behind the Internet of Things (IoT) is taking everything and connecting to the internet so that all devices would be able to send and receive data online. Internet of Vehicles (IoV) is a key component of smart city which is an outcome of IoT. Nowadays the concept of IoT has plaid an important role in our daily life in different sectors like healthcare, agriculture, smart home, wearable, green computing, smart city applications, etc. The emerging IoV is facing a lack of rigor in data processing, limitation of anonymity, privacy, scalability, security challenges. Due to vulnerability IoV devices must face malicious hackers. Nowadays with the help of blockchain (BC) technology energy system become more intelligent, eco-friendly, transparent, energy efficient. This paper highlights two major challenges i.e. scalability and security issues. The flavor of edge computing (EC) considered here to deal with the scalability issue. A BC is a public, shared database that records transactions between two parties that confirms owners through cryptography. After a transaction is validated and cryptographically verified generates “block” on the BC and transactions are ordered chronologically and cannot be altered. Implementing BC and smart contracts technologies will bring security features for IoV. It plays a role to implement the rules and policies to govern the IoV information and transactions and keep them into the BC to secure the data and for future uses.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121856574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identification of Defective Nodes in Cyber-Physical Systems 网络物理系统中缺陷节点的识别
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) Pub Date : 2020-12-01 DOI: 10.1109/MASS50613.2020.00012
Vidushi Agarwal, Sujata Pal, Neeraj Sharma, Vivek Sethi
{"title":"Identification of Defective Nodes in Cyber-Physical Systems","authors":"Vidushi Agarwal, Sujata Pal, Neeraj Sharma, Vivek Sethi","doi":"10.1109/MASS50613.2020.00012","DOIUrl":"https://doi.org/10.1109/MASS50613.2020.00012","url":null,"abstract":"Cyber-physical systems (CPSs) comprise physical systems or objects incorporated with computing functionalities and data storage systems. Different sensor nodes in a CPS communicate with each other and devices like actuators and microcontrollers regulate the physical systems through smart algorithms. Efficient communication and networking algorithms play a critical role in supporting smooth interaction between the cyber and physical worlds. Internet of Things (IoT) belongs to the physical part of CPS. In the physical part, the sensor nodes are connected with each other and each node sends data to the root node through their respective parent node in a multi-hop manner. The physical devices in a CPS may stop sensing the environment due to logical and physical failures. To solve this, we propose a real time defective nodes detection scheme (R2D) in a cyber-physical system. The root node of the CPS gathers sensed data, detects the defective nodes and performs data analysis in the cyber part of the CPS. The results show that our proposed R2D protocol achieves a 10.2% higher packet delivery ratio and a 12.5% increase in throughput as compared to the flooding approach. Moreover, an improvement by almost 50% in throughput is observed when compared to RPL with an increase in packet loss rate of 20%.","PeriodicalId":105795,"journal":{"name":"2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121276096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信