ACM Transactions on Intelligent Systems and Technology (TIST)最新文献

筛选
英文 中文
Detecting Extreme Traffic Events Via a Context Augmented Graph Autoencoder 通过上下文增强图自动编码器检测极端交通事件
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-05-31 DOI: 10.1145/3539735
Yue Hu, Ao Qu, D. Work
{"title":"Detecting Extreme Traffic Events Via a Context Augmented Graph Autoencoder","authors":"Yue Hu, Ao Qu, D. Work","doi":"10.1145/3539735","DOIUrl":"https://doi.org/10.1145/3539735","url":null,"abstract":"Accurate and timely detection of large events on urban transportation networks enables informed mobility management. This work tackles the problem of extreme event detection on large-scale transportation networks using origin-destination mobility data, which is now widely available. Such data is highly structured in time and space, but high dimensional and sparse. Current multivariate time series anomaly detection methods cannot fully address these challenges. To exploit the structure of mobility data, we formulate the event detection problem in a novel way, as detecting anomalies in a set of time-dependent directed weighted graphs. We further propose a Context augmented Graph Autoencoder (Con-GAE) model to solve the problem, which leverages graph embedding and context embedding techniques to capture the spatial and temporal patterns. Con-GAE adopts an autoencoder framework and detects anomalies via semi-supervised learning. The performance of the method is assessed on several city-scale travel-time datasets from Uber Movement, New York taxis, and Chicago taxis and compared to state-of-the-art approaches. The proposed Con-GAE can achieve an improvement in the area under the curve score as large as 0.15 over the second best method. We also discuss real-world traffic anomalies detected by Con-GAE.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132055312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Holistic Approach for Role Inference and Action Anticipation in Human Teams 人类团队中角色推断和行动预期的整体方法
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-05-28 DOI: 10.1145/3531230
Junyi Dong, Qingze Huo, Silvia Ferrari
{"title":"A Holistic Approach for Role Inference and Action Anticipation in Human Teams","authors":"Junyi Dong, Qingze Huo, Silvia Ferrari","doi":"10.1145/3531230","DOIUrl":"https://doi.org/10.1145/3531230","url":null,"abstract":"The ability to anticipate human actions is critical to many cyber-physical systems, such as robots and autonomous vehicles. Computer vision and sensing algorithms to date have focused on extracting and predicting visual features that are explicit in the scene, such as color, appearance, actions, positions, and velocities, using video and physical measurements, such as object depth and motion. Human actions, however, are intrinsically influenced and motivated by many implicit factors such as context, human roles and interactions, past experience, and inner goals or intentions. For example, in a sport team, the team strategy, player role, and dynamic circumstances driven by the behavior of the opponents, all influence the actions of each player. This article proposes a holistic framework for incorporating visual features, as well as hidden information, such as social roles, and domain knowledge. The approach, relying on a novel dynamic Markov random field (DMRF) model, infers the instantaneous team strategy and, subsequently, the players’ roles that are temporally evolving throughout the game. The results from the DMRF inference stage are then integrated with instantaneous visual features, such as individual actions and position, in order to perform holistic action anticipation using a multi-layer perceptron (MLP). The approach is demonstrated on the team sport of volleyball, by first training the DMRF and MLP offline with past videos, and, then, by applying them to new volleyball videos online. These results show that the method is able to infer the players’ roles with an average accuracy of 86.99%, and anticipate future actions over a sequence of up to 46 frames with an average accuracy of 80.50%. Additionally, the method predicts the onset and duration of each action achieving a mean relative error of 14.57% and 15.67%, respectively.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127344560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FLEE: A Hierarchical Federated Learning Framework for Distributed Deep Neural Network over Cloud, Edge, and End Device 基于云、边缘和终端设备的分布式深度神经网络分层联邦学习框架
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-05-17 DOI: 10.1145/3514501
Zhengyi Zhong, Weidong Bao, Ji Wang, Xiaomin Zhu, Xiongtao Zhang
{"title":"FLEE: A Hierarchical Federated Learning Framework for Distributed Deep Neural Network over Cloud, Edge, and End Device","authors":"Zhengyi Zhong, Weidong Bao, Ji Wang, Xiaomin Zhu, Xiongtao Zhang","doi":"10.1145/3514501","DOIUrl":"https://doi.org/10.1145/3514501","url":null,"abstract":"With the development of smart devices, the computing capabilities of portable end devices such as mobile phones have been greatly enhanced. Meanwhile, traditional cloud computing faces great challenges caused by privacy-leakage and time-delay problems, there is a trend to push models down to edges and end devices. However, due to the limitation of computing resource, it is difficult for end devices to complete complex computing tasks alone. Therefore, this article divides the model into two parts and deploys them on multiple end devices and edges, respectively. Meanwhile, an early exit is set to reduce computing resource overhead, forming a hierarchical distributed architecture. In order to enable the distributed model to continuously evolve by using new data generated by end devices, we comprehensively consider various data distributions on end devices and edges, proposing a hierarchical federated learning framework FLEE, which can realize dynamical updates of models without redeploying them. Through image and sentence classification experiments, we verify that it can improve model performances under all kinds of data distributions, and prove that compared with other frameworks, the models trained by FLEE consume less global computing resource in the inference stage.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116066875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient Federated Matrix Factorization Against Inference Attacks 针对推理攻击的高效联邦矩阵分解
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-05-17 DOI: 10.1145/3501812
Di Chai, Leye Wang, Kai Chen, Qiang Yang
{"title":"Efficient Federated Matrix Factorization Against Inference Attacks","authors":"Di Chai, Leye Wang, Kai Chen, Qiang Yang","doi":"10.1145/3501812","DOIUrl":"https://doi.org/10.1145/3501812","url":null,"abstract":"Recommender systems typically require the revelation of users’ ratings to the recommender server, which will subsequently use these ratings to provide personalized services. However, such revelations make users vulnerable to a broader set of inference attacks, allowing the recommender server to learn users’ private attributes, e.g., age and gender. Therefore, in this paper, we propose an efficient federated matrix factorization method that protects users against inference attacks. The key idea is that we obfuscate one user’s rating to another such that the private attribute leakage is minimized under the given distortion budget, which bounds the recommending loss and overhead of system efficiency. During the obfuscation, we apply differential privacy to control the information leakage between the users. We also adopt homomorphic encryption to protect the intermediate results during training. Our framework is implemented and tested on real-world datasets. The result shows that our method can reduce up to 16.7% of inference attack accuracy compared to using no privacy protections.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128840713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving Availability of Vertical Federated Learning: Relaxing Inference on Non-overlapping Data 提高垂直联邦学习的可用性:放松对非重叠数据的推断
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-05-12 DOI: 10.1145/3501817
Zhenghang Ren, Liu Yang, Kai Chen
{"title":"Improving Availability of Vertical Federated Learning: Relaxing Inference on Non-overlapping Data","authors":"Zhenghang Ren, Liu Yang, Kai Chen","doi":"10.1145/3501817","DOIUrl":"https://doi.org/10.1145/3501817","url":null,"abstract":"Vertical Federated Learning (VFL) enables multiple parties to collaboratively train a machine learning model over vertically distributed datasets without data privacy leakage. However, there is a limitation of the current VFL solutions: current VFL models fail to conduct inference on non-overlapping samples during inference. This limitation seriously damages the VFL model’s availability because, in practice, overlapping samples may only take up a small portion of the whole data at each party which means a large part of inference tasks will fail. In this article, we propose a novel VFL framework which enables federated inference on non-overlapping data. Our framework regards the distributed features as privileged information which is available in the training period but disappears during inference. We distill the knowledge of such privileged features and transfer them to the parties’ local model which only processes local features. Furthermore, we adopt Oblivious Transfer (OT) to preserve data ID privacy during training and inference. Empirically, we evaluate the model on the real-world dataset collected from Criteo and Taobao. Besides, we also provide a security analysis of the proposed framework.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"63 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks 抗社会关系隐私攻击的效用感知和隐私保护轨迹综合模型
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-05-11 DOI: 10.1145/3495160
Z. Zheng, Zhetao Li, Jie Li, Hongbo Jiang, Tong Li, Bin Guo
{"title":"Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks","authors":"Z. Zheng, Zhetao Li, Jie Li, Hongbo Jiang, Tong Li, Bin Guo","doi":"10.1145/3495160","DOIUrl":"https://doi.org/10.1145/3495160","url":null,"abstract":"For academic research and business intelligence, trajectory data has been widely collected and analyzed. Releasing trajectory data to a third party may lead to serious privacy leakage, which has spawned considerable researches on trajectory privacy protection technology. However, existing work suffers from several shortcomings. They either focus on point-based location privacy, ignoring the spatio-temporal correlations among locations within a trajectory, or they protect the privacy of each user separately without considering privacy leakage of the social relationship between trajectories of different users. Besides, they fail to balance privacy protection and data utility. Motivated by these limitations, in this article, we propose S3T-Trajectory, which is a utility-aware and privacy-preserving trajectory synthesis model that Resists social relationship privacy attacks. Specifically, we first develop a time-dependent Markov chain based on an adaptive spatio-temporal discrete grid to efficiently and accurately capture human mobility behavior. Then, we propose three mobility feature metrics from spatio-temporal, semantic, and social dimensions. On the basis of the metrics, we construct a bi-level optimization problem to accomplish the utility-aware and privacy-preserving trajectory synthesizing. The upper-level objective guarantees data utility and the lower-level optimization problems (or upper-level constraints) provides two-layer privacy protection for S3T-Trajectory, i.e., resisting location inference attacks and social relationship privacy attacks. We conduct extensive experiments on large-scale real-world datasets loc-Gowalla and loc-Brightkite. The experimental results demonstrate the effectiveness and robustness of S3TTrajectory. Compared with the baseline models, S3TTrajectory achieves between 7.8% and 23.8% performance improvement in resisting social relationship privacy attacks and achieves at least 5.19% improvement regarding data utility.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125439457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Federated Learning for Electronic Health Records 电子健康记录的联邦学习
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-05-02 DOI: 10.1145/3514500
Trung Kien Dang, Xiang Lan, J. Weng, Mengling Feng
{"title":"Federated Learning for Electronic Health Records","authors":"Trung Kien Dang, Xiang Lan, J. Weng, Mengling Feng","doi":"10.1145/3514500","DOIUrl":"https://doi.org/10.1145/3514500","url":null,"abstract":"In data-driven medical research, multi-center studies have long been preferred over single-center ones due to a single institute sometimes not having enough data to obtain sufficient statistical power for certain hypothesis testings as well as predictive and subgroup studies. The wide adoption of electronic health records (EHRs) has made multi-institutional collaboration much more feasible. However, concerns over infrastructures, regulations, privacy, and data standardization present a challenge to data sharing across healthcare institutions. Federated Learning (FL), which allows multiple sites to collaboratively train a global model without directly sharing data, has become a promising paradigm to break the data isolation. In this study, we surveyed existing works on FL applications in EHRs and evaluated the performance of current state-of-the-art FL algorithms on two EHR machine learning tasks of significant clinical importance on a real world multi-center EHR dataset.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129935663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Jointly Optimizing Expressional and Residual Models for 3D Facial Expression Removal 联合优化三维面部表情去除的表情和残差模型
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-04-29 DOI: 10.1145/3533312
Qian Zheng, Yueming Wang, Zhenfang Hu, X. Zhang, Zhao-Rong Wu, Gang Pan
{"title":"Jointly Optimizing Expressional and Residual Models for 3D Facial Expression Removal","authors":"Qian Zheng, Yueming Wang, Zhenfang Hu, X. Zhang, Zhao-Rong Wu, Gang Pan","doi":"10.1145/3533312","DOIUrl":"https://doi.org/10.1145/3533312","url":null,"abstract":"This article proposes a facial expression removal method to recover a 3D neutral face from a single 3D expressional or non-neutral face. We treat a 3D non-neutral face as the sum of its neutral one and the residual. This can be satisfied if the correspondence between 3D vertices of expressional faces and those of neutral faces is established. We propose a non-rigid deformation method to establish the correspondence between 3D faces. Then, according to algebra inequality, the minimization of a neutral face model can be replaced by the minimization of its upper bound, i.e., the errors of an expressional face model and a residual model. Thus, we co-optimize the representation errors of the latter two models and build the relationship between the representation coefficients of the two models. Given an expressional face as the input, its corresponding neutral face can be inferred by the associative representation parameters in these two models. In the testing stage, we use an iterative joint fitting scheme to obtain a more accurate recovery. Extensive experiments are conducted to evaluate our method. The results show that our method obtains considerably better performance than existing methods in terms of average root mean square errors and recognition rates, and also better visual effects.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116200509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crowd Flow Prediction for Irregular Regions with Semantic Graph Attention Network 基于语义图注意网络的不规则区域人群流量预测
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-04-25 DOI: 10.1145/3501805
Fuxian Li, Jie Feng, Huan Yan, Depeng Jin, Yong Li
{"title":"Crowd Flow Prediction for Irregular Regions with Semantic Graph Attention Network","authors":"Fuxian Li, Jie Feng, Huan Yan, Depeng Jin, Yong Li","doi":"10.1145/3501805","DOIUrl":"https://doi.org/10.1145/3501805","url":null,"abstract":"It is essential to predict crowd flow precisely in a city, which is practically partitioned into irregular regions based on road networks and functionality. However, prior works mainly focus on grid-based crowd flow prediction, where a city is divided into many regular grids. Although Convolutional Neural Netwok (CNN) is powerful to capture spatial dependence from grid-based Euclidean data, it fails to tackle non-Euclidean data, which reflect the correlations among irregular regions. Besides, prior works fail to jointly capture the hierarchical spatio-temporal dependence from both regular and irregular regions. Finally, the correlations among regions are time-varying and functionality-related. However, the combination of dynamic and semantic attributes of regions are ignored by related works. To address the above challenges, in this article, we propose a novel model to tackle the flow prediction task for irregular regions. First, we employ CNN and Graph Neural Network (GNN) to capture micro and macro spatial dependence among grid-based regions and irregular regions, respectively. Further, we think highly of the dynamic inter-region correlations and propose a location-aware and time-aware graph attention mechanism named Semantic Graph Attention Network (Semantic-GAT), based on dynamic node attribute embedding and multi-view graph reconstruction. Extensive experimental results based on two real-life datasets demonstrate that our model outperforms 10 baselines by reducing the prediction error around 8%.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124016023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Introduction to the Special Issue on Intelligent Trajectory Analytics: Part II 智能轨迹分析特刊导论:第二部分
ACM Transactions on Intelligent Systems and Technology (TIST) Pub Date : 2022-04-22 DOI: 10.1145/3510021
Kai Zheng, Yong Li, C. Shahabi, Hongzhi Yin
{"title":"Introduction to the Special Issue on Intelligent Trajectory Analytics: Part II","authors":"Kai Zheng, Yong Li, C. Shahabi, Hongzhi Yin","doi":"10.1145/3510021","DOIUrl":"https://doi.org/10.1145/3510021","url":null,"abstract":"We are delighted to present this special issue on Intelligent Trajectory Analytics. Over the past decades, a broad range of techniques have been proposed for processing, managing, and mining trajectory data. It has enabled and helped government agencies and businesses to better understand the mobility behavior of their citizens and customers, which is crucial for a variety of applications such as smart city and transportation, public health and safety, environmental management, and location-based services. The purpose of this special issue is to provide a forum for researchers and practitioners in academia and industry to present their latest research findings and engineering experiences in developing cutting-edge techniques for intelligent trajectory data analytics. This special issue consists of two parts. In Part II, the guest editors selected 10 contributions that cover varying topics within this theme, such as trajectory quality management, trajectory search and mining, trajectory privacy protection, and novel trajectory-based applications. Zhao et al. in “Efficient and Effective Similar Subtrajectory Search: A Spatial-aware Comprehension Approach” address the similar subtrajectory search problem with the Graph Neural Network framework, which contains four modules including a spatial-aware grid embedding module, a trajectory embedding module, a query-context trajectory fusion module, and a span prediction module. Sharma et al. in “Analyzing Trajectory Gaps to Find Possible Rendezvous Region” propose a refined algorithm to find a potential rendezvous region and an optimal temporal range to improve computational efficiency. Theoretical evaluation of the algorithm’s correctness and completeness along with a time complexity analysis is also provided. Zheng et al. in “Supply-demand-aware Deep Reinforcement Learning for Dynamic Fleet Management” use a deep Q-network with action sampling policy, called AS-DQN, to learn an optimal dispatching policy and further utilize a dueling network architecture to improve the performance of AS-DQN. Wang et al. in “Multivariate Correlation-aware Spatio-temporal Graph Convolutional Networks for Multi-scale Traffic Prediction” study the problem of multivariate correlation-aware multi-scale traffic flow prediction and propose a feature correlation-aware spatio-temporal graph convolutional network to effectively address it. Wang et al. in “Integrate Algorithmic Sampling-based Motion Planning with Learning in Autonomous Driving” integrate algorithmic motion planning with learning models to improve the performance of sampling-basedmotion planning (SBMP) for autonomous driving in highway traffic scenarios.","PeriodicalId":123526,"journal":{"name":"ACM Transactions on Intelligent Systems and Technology (TIST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114751445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信