Frontiers of Computer Science最新文献

筛选
英文 中文
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain 基于区块链的物联网匿名认证和安全数据传输方案
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-023-2595-x
Xingxing Chen, Qingfeng Cheng, Weidong Yang, Xiangyang Luo
{"title":"An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain","authors":"Xingxing Chen, Qingfeng Cheng, Weidong Yang, Xiangyang Luo","doi":"10.1007/s11704-023-2595-x","DOIUrl":"https://doi.org/10.1007/s11704-023-2595-x","url":null,"abstract":"<p>With the widespread use of network infrastructures such as 5G and low-power wide-area networks, a large number of the Internet of Things (IoT) device nodes are connected to the network, generating massive amounts of data. Therefore, it is a great challenge to achieve anonymous authentication of IoT nodes and secure data transmission. At present, blockchain technology is widely used in authentication and s data storage due to its decentralization and immutability. Recently, Fan et al. proposed a secure and efficient blockchain-based IoT authentication and data sharing scheme. We studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT nodes. To overcome these security flaws, this paper proposes an enhanced authentication and data transmission scheme, which is verified by formal security proofs and informal security analysis. Furthermore, Scyther is applied to prove the security of the proposed scheme. Moreover, it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"4 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack FedDAA:保护隐私和抵御对抗性攻击的强大联合学习框架
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-023-2283-x
Shiwei Lu, Ruihu Li, Wenbin Liu
{"title":"FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack","authors":"Shiwei Lu, Ruihu Li, Wenbin Liu","doi":"10.1007/s11704-023-2283-x","DOIUrl":"https://doi.org/10.1007/s11704-023-2283-x","url":null,"abstract":"<p>Federated learning (FL) has emerged to break data-silo and protect clients’ privacy in the field of artificial intelligence. However, deep leakage from gradient (DLG) attack can fully reconstruct clients’ data from the submitted gradient, which threatens the fundamental privacy of FL. Although cryptology and differential privacy prevent privacy leakage from gradient, they bring negative effect on communication overhead or model performance. Moreover, the original distribution of local gradient has been changed in these schemes, which makes it difficult to defend against adversarial attack. In this paper, we propose a novel federated learning framework with model decomposition, aggregation and assembling (FedDAA), along with a training algorithm, to train federated model, where local gradient is decomposed into multiple blocks and sent to different proxy servers to complete aggregation. To bring better privacy protection performance to FedDAA, an indicator is designed based on image structural similarity to measure privacy leakage under DLG attack and an optimization method is given to protect privacy with the least proxy servers. In addition, we give defense schemes against adversarial attack in FedDAA and design an algorithm to verify the correctness of aggregated results. Experimental results demonstrate that FedDAA can reduce the structural similarity between the reconstructed image and the original image to 0.014 and remain model convergence accuracy as 0.952, thus having the best privacy protection performance and model training effect. More importantly, defense schemes against adversarial attack are compatible with privacy protection in FedDAA and the defense effects are not weaker than those in the traditional FL. Moreover, verification algorithm of aggregation results brings about negligible overhead to FedDAA.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"2 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139560062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EvolveKG: a general framework to learn evolving knowledge graphs EvolveKG:学习演化知识图谱的通用框架
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-022-2467-9
Jiaqi Liu, Zhiwen Yu, Bin Guo, Cheng Deng, Luoyi Fu, Xinbing Wang, Chenghu Zhou
{"title":"EvolveKG: a general framework to learn evolving knowledge graphs","authors":"Jiaqi Liu, Zhiwen Yu, Bin Guo, Cheng Deng, Luoyi Fu, Xinbing Wang, Chenghu Zhou","doi":"10.1007/s11704-022-2467-9","DOIUrl":"https://doi.org/10.1007/s11704-022-2467-9","url":null,"abstract":"<p>A great many practical applications have observed knowledge evolution, i.e., continuous born of new knowledge, with its formation influenced by the structure of historical knowledge. This observation gives rise to evolving knowledge graphs whose structure temporally grows over time. However, both the modal characterization and the algorithmic implementation of evolving knowledge graphs remain unexplored. To this end, we propose EvolveKG–a general framework that enables algorithms in the static knowledge graphs to learn the evolving ones. EvolveKG quantifies the influence of a historical fact on a current one, called the effectiveness of the fact, and makes knowledge prediction by leveraging all the cross-time knowledge interaction. The novelty of EvolveKG lies in Derivative Graph–a weighted snapshot of evolution at a certain time. Particularly, each weight quantifies knowledge effectiveness through a temporarily decaying function of consistency and attenuation, two proposed factors depicting whether or not the effectiveness of a fact fades away with time. Besides, considering both knowledge creation and loss, we obtain higher prediction accuracy when the effectiveness of all the facts increases with time or remains unchanged. Under four real datasets, the superiority of EvolveKG is confirmed in prediction accuracy.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"93 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spreadsheet quality assurance: a literature review 电子表格质量保证:文献综述
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-023-2384-6
Pak-Lok Poon, Man Fai Lau, Yuen Tak Yu, Sau-Fun Tang
{"title":"Spreadsheet quality assurance: a literature review","authors":"Pak-Lok Poon, Man Fai Lau, Yuen Tak Yu, Sau-Fun Tang","doi":"10.1007/s11704-023-2384-6","DOIUrl":"https://doi.org/10.1007/s11704-023-2384-6","url":null,"abstract":"<p>Spreadsheets are very common for information processing to support decision making by both professional developers and non-technical end users. Moreover, business intelligence and artificial intelligence are increasingly popular in the industry nowadays, where spreadsheets have been used as, or integrated into, intelligent or expert systems in various application domains. However, it has been repeatedly reported that faults often exist in operational spreadsheets, which could severely compromise the quality of conclusions and decisions based on the spreadsheets. With a view to systematically examining this problem via survey of existing work, we have conducted a comprehensive literature review on the quality issues and related techniques of spreadsheets over a 35.5-year period (from January 1987 to June 2022) for target journals and a 10.5-year period (from January 2012 to June 2022) for target conferences. Among other findings, two major ones are: (a) Spreadsheet quality is best addressed throughout the whole spreadsheet life cycle, rather than just focusing on a few specific stages of the life cycle. (b) Relatively more studies focus on spreadsheet testing and debugging (related to fault detection and removal) when compared with spreadsheet specification, modeling, and design (related to development). As prevention is better than cure, more research should be performed on the early stages of the spreadsheet life cycle. Enlightened by our comprehensive review, we have identified the major research gaps as well as highlighted key research directions for future work in the area.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"16 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decoupled deep hough voting for point cloud registration 用于点云注册的解耦深度霍夫表决
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-023-2471-8
Mingzhi Yuan, Kexue Fu, Zhihao Li, Manning Wang
{"title":"Decoupled deep hough voting for point cloud registration","authors":"Mingzhi Yuan, Kexue Fu, Zhihao Li, Manning Wang","doi":"10.1007/s11704-023-2471-8","DOIUrl":"https://doi.org/10.1007/s11704-023-2471-8","url":null,"abstract":"<p>Estimating rigid transformation using noisy correspondences is critical to feature-based point cloud registration. Recently, a series of studies have attempted to combine traditional robust model fitting with deep learning. Among them, DHVR proposed a hough voting-based method, achieving new state-of-the-art performance. However, we find voting on rotation and translation simultaneously hinders achieving better performance. Therefore, we proposed a new hough voting-based method, which decouples rotation and translation space. Specifically, we first utilize hough voting and a neural network to estimate rotation. Then based on good initialization on rotation, we can easily obtain accurate rigid transformation. Extensive experiments on 3DMatch and 3DLoMatch datasets show that our method achieves comparable performances over the state-of-the-art methods. We further demonstrate the generalization of our method by experimenting on KITTI dataset.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"17 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group control for procedural rules: parameterized complexity and consecutive domains 程序规则的群体控制:参数化复杂性和连续域
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-023-2700-1
Yongjie Yang, Dinko Dimitrov
{"title":"Group control for procedural rules: parameterized complexity and consecutive domains","authors":"Yongjie Yang, Dinko Dimitrov","doi":"10.1007/s11704-023-2700-1","DOIUrl":"https://doi.org/10.1007/s11704-023-2700-1","url":null,"abstract":"<p>We consider GROUP CONTROL BY ADDING INDIVIDUALS (GCAI) in the setting of group identification for two procedural rules—the consensus-start-respecting rule and the liberal-start-respecting rule. It is known that GCAI for both rules are NP-hard, but whether they are fixed-parameter tractable with respect to the number of distinguished individuals remained open. We resolve both open problems in the affirmative. In addition, we strengthen the NP-hardness of GCAI by showing that, with respect to the natural parameter the number of added individuals, GCAI for both rules are W[2]-hard. Notably, the W[2]-hardness for the liberal-start-respecting rule holds even when restricted to a very special case where the qualifications of individuals satisfy the so-called consecutive ones property. However, for the consensus-start-respecting rule, the problem becomes polynomial-time solvable in this special case. We also study a dual restriction where the disqualifications of individuals fulfill the consecutive ones property, and show that under this restriction GCAI for both rules turn out to be polynomial-time solvable. Our reductions for showing W[2]-hardness also imply several algorithmic lower bounds.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"6 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139560068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid memory architecture supporting fine-grained data migration 支持细粒度数据迁移的混合内存架构
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-023-2675-y
Ye Chi, Jianhui Yue, Xiaofei Liao, Haikun Liu, Hai Jin
{"title":"A hybrid memory architecture supporting fine-grained data migration","authors":"Ye Chi, Jianhui Yue, Xiaofei Liao, Haikun Liu, Hai Jin","doi":"10.1007/s11704-023-2675-y","DOIUrl":"https://doi.org/10.1007/s11704-023-2675-y","url":null,"abstract":"<p>Hybrid memory systems composed of dynamic random access memory (DRAM) and Non-volatile memory (NVM) often exploit page migration technologies to fully take the advantages of different memory media. Most previous proposals usually migrate data at a granularity of 4 KB pages, and thus waste memory bandwidth and DRAM resource. In this paper, we propose Mocha, a non-hierarchical architecture that organizes DRAM and NVM in a flat address space physically, but manages them in a cache/memory hierarchy. Since the commercial NVM device-Intel Optane DC Persistent Memory Modules (DCPMM) actually access the physical media at a granularity of 256 bytes (an Optane block), we manage the DRAM cache at the 256-byte size to adapt to this feature of Optane. This design not only enables fine-grained data migration and management for the DRAM cache, but also avoids write amplification for Intel Optane DCPMM. We also create an <i>Indirect Address Cache</i> (IAC) in <i>Hybrid Memory Controller</i> (HMC) and propose a reverse address mapping table in the DRAM to speed up address translation and cache replacement. Moreover, we exploit a utility-based caching mechanism to filter cold blocks in the NVM, and further improve the efficiency of the DRAM cache. We implement Mocha in an architectural simulator. Experimental results show that Mocha can improve application performance by 8.2% on average (up to 24.6%), reduce 6.9% energy consumption and 25.9% data migration traffic on average, compared with a typical hybrid memory architecture–HSCC.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"13 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139559906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protein acetylation sites with complex-valued polynomial model 采用复值多项式模型的蛋白质乙酰化位点
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-023-2640-9
Wenzheng Bao, Bin Yang
{"title":"Protein acetylation sites with complex-valued polynomial model","authors":"Wenzheng Bao, Bin Yang","doi":"10.1007/s11704-023-2640-9","DOIUrl":"https://doi.org/10.1007/s11704-023-2640-9","url":null,"abstract":"<p>Protein acetylation refers to a process of adding acetyl groups (CH3CO-) to lysine residues on protein chains. As one of the most commonly used protein post-translational modifications, lysine acetylation plays an important role in different organisms. In our study, we developed a human-specific method which uses a cascade classifier of complex-valued polynomial model (CVPM), combined with sequence and structural feature descriptors to solve the problem of imbalance between positive and negative samples. Complex-valued gene expression programming and differential evolution are utilized to search the optimal CVPM model. We also made a systematic and comprehensive analysis of the acetylation data and the prediction results. The performances of our proposed method aie 79.15% in <i>S</i><sub><i>p</i></sub>, 78.17% in <i>S</i><sub><i>n</i></sub>, 78.66% in <i>ACC</i> 78.76% in <i>F</i>1, and 0.5733 in <i>MCC</i>, which performs better than other state-of-the-art methods.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"387 1 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139560065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating BERT inference with GPU-efficient exit prediction 利用 GPU 高效出口预测加速 BERT 推断
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-022-2341-9
{"title":"Accelerating BERT inference with GPU-efficient exit prediction","authors":"","doi":"10.1007/s11704-022-2341-9","DOIUrl":"https://doi.org/10.1007/s11704-022-2341-9","url":null,"abstract":"<h3>Abstract</h3> <p>BERT is a representative pre-trained language model that has drawn extensive attention for significant improvements in downstream Natural Language Processing (NLP) tasks. The complex architecture and massive parameters bring BERT competitive performance but also result in slow speed at model inference time. To speed up BERT inference, FastBERT realizes adaptive inference with an acceptable drop in accuracy based on knowledge distillation and the early-exit technique. However, many factors may limit the performance of FastBERT, such as the teacher classifier that is not knowledgeable enough, the batch size shrinkage and the redundant computation of student classifiers. To overcome these limitations, we propose a new BERT inference method with GPU-Efficient Exit Prediction (GEEP). GEEP leverages the <em>shared exit loss</em> to simplify the training process of FastBERT from two steps into only one step and makes the teacher classifier more knowledgeable by feeding diverse Transformer outputs to the teacher classifier. In addition, the <em>exit layer prediction</em> technique is proposed to utilize a GPU hash table to handle the token-level exit layer distribution and to sort test samples by predicted exit layers. In this way, GEEP can avoid batch size shrinkage and redundant computation of student classifiers. Experimental results on twelve public English and Chinese NLP datasets prove the effectiveness of the proposed approach. The source codes of GEEP will be released to the public upon paper acceptance.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"58 3 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139560064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A disk I/O optimized system for concurrent graph processing jobs 针对并发图形处理工作的磁盘 I/O 优化系统
IF 4.2 3区 计算机科学
Frontiers of Computer Science Pub Date : 2024-01-22 DOI: 10.1007/s11704-023-2361-0
Xianghao Xu, Fang Wang, Hong Jiang, Yongli Cheng, Dan Feng, Peng Fang
{"title":"A disk I/O optimized system for concurrent graph processing jobs","authors":"Xianghao Xu, Fang Wang, Hong Jiang, Yongli Cheng, Dan Feng, Peng Fang","doi":"10.1007/s11704-023-2361-0","DOIUrl":"https://doi.org/10.1007/s11704-023-2361-0","url":null,"abstract":"<p>In order to analyze and process the large graphs with high cost efficiency, researchers have developed a number of out-of-core graph processing systems in recent years based on just one commodity computer. On the other hand, with the rapidly growing need of analyzing graphs in the real-world, graph processing systems have to efficiently handle massive concurrent graph processing (CGP) jobs. Unfortunately, due to the inherent design for single graph processing job, existing out-of-core graph processing systems usually incur unnecessary data accesses and severe competition of I/O bandwidth when handling the CGP jobs. In this paper, we propose GraphCP, a disk I/O optimized out-of-core graph processing system that efficiently supports the processing of CGP jobs. GraphCP proposes a benefit-aware sharing execution model to share the I/O access and processing of graph data among the CGP jobs and adaptively schedule the graph data loading based on the states of vertices, which efficiently overcomes above challenges faced by existing out-of-core graph processing systems. Moreover, GraphCP adopts a dependency-based future-vertex updating model so as to reduce disk I/Os in the future iterations. In addition, GraphCP organizes the graph data with a Source-Sorted Sub-Block graph representation for better processing capacity and I/O access locality. Extensive evaluation results show that GraphCP is 20.5× and 8.9× faster than two out-of-core graph processing systems GridGraph and GraphZ, and 3.5× and 1.7× faster than two state-of-art concurrent graph processing systems Seraph and GraphSO.</p>","PeriodicalId":12640,"journal":{"name":"Frontiers of Computer Science","volume":"13 1","pages":""},"PeriodicalIF":4.2,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139560066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信