IEEE Wireless Communications最新文献

筛选
英文 中文
Task-Oriented Surveillance Framework for Virtual Emotion Informatics in Polygon Spaces 面向任务的多边形空间虚拟情感信息监控框架
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2023-06-01 DOI: 10.1109/MWC.001.2200454
Soo-Ryeon Lee, Seungheyon Lee, Yumin Choi, J. Ben-othman, L. Mokdad, Kwang-il Hwang, Hyunbum Kim
{"title":"Task-Oriented Surveillance Framework for Virtual Emotion Informatics in Polygon Spaces","authors":"Soo-Ryeon Lee, Seungheyon Lee, Yumin Choi, J. Ben-othman, L. Mokdad, Kwang-il Hwang, Hyunbum Kim","doi":"10.1109/MWC.001.2200454","DOIUrl":"https://doi.org/10.1109/MWC.001.2200454","url":null,"abstract":"Since the advent of high speed communications and reliable computing devices, it is indispensable to study how to process information and computations appropriately to deal with the requested tasks. In particular, for task-oriented environment, the virtual emotion informatics can be deliberated, which covers a series of detection, data sharing, transmission, governance, and management supported by numerous heterogeneous devices. In this study, we design a task-oriented surveillance framework for virtual emotion informatics through a cooperation of mobile robots and smart UAVs in polygon spaces. The devised framework essentially provides task-oriented virtual emotion security for the promising virtual emotion informatics. Also, we make a formal definition of the problem which pursues to minimize the number of system devices such that task-oriented virtual emotion security is satisfied in polygon spaces. To solve the problem, three different schemes are proposed and are performed through expansive simulations with various settings and scenarios in polygon spaces. Then their performances are evaluated with detailed discussions. In addition, we suggest promising research challenges and open issues toward new frontiers in virtual emotion informatics and its applications.","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"28 41","pages":"104-111"},"PeriodicalIF":12.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41256558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions 联合学习中的后门攻击和防御:现状、分类和未来方向
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2023-04-01 DOI: 10.1109/MWC.017.2100714
Xueluan Gong, Yanjiao Chen, Qian Wang, Weihan Kong
{"title":"Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions","authors":"Xueluan Gong, Yanjiao Chen, Qian Wang, Weihan Kong","doi":"10.1109/MWC.017.2100714","DOIUrl":"https://doi.org/10.1109/MWC.017.2100714","url":null,"abstract":"The federated learning framework is designed for massively distributed training of deep learning models among thousands of participants without compromising the privacy of their training datasets. The training dataset across participants usually has heterogeneous data distributions. Besides, the central server aggregates the updates provided by different parties, but has no visibility into how such updates are created. The inherent characteristics of federated learning may incur a severe security concern. The malicious participants can upload poisoned updates to introduce backdoored functionality into the global model, in which the backdoored global model will misclassify all the malicious images (i.e., attached with the backdoor trigger) into a false label but will behave normally in the absence of the backdoor trigger. In this work, we present a comprehensive review of the state-of-the-art backdoor attacks and defenses in federated learning. We classify the existing backdoor attacks into two categories: data poisoning attacks and model poisoning attacks, and divide the defenses into anomaly updates detection, robust federated training, and backdoored model restoration. We give a detailed comparison of both attacks and defenses through experiments. Lastly, we pinpoint a variety of potential future directions of both backdoor attacks and defenses in the framework of federated learning.","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"30 1","pages":"114-121"},"PeriodicalIF":12.9,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41396191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An Ultra-Lightweight Data-Aggregation Scheme with Deep Learning Security for Smart Grid 一种用于智能电网的具有深度学习安全性的超轻量级数据聚合方案
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2022-04-01 DOI: 10.1109/mwc.003.2100273
P. Gope, P. Sharma, B. Sikdar
{"title":"An Ultra-Lightweight Data-Aggregation Scheme with Deep Learning Security for Smart Grid","authors":"P. Gope, P. Sharma, B. Sikdar","doi":"10.1109/mwc.003.2100273","DOIUrl":"https://doi.org/10.1109/mwc.003.2100273","url":null,"abstract":"Various smart meter data aggregation protocols have been developed in the literature to address the rising privacy threats against customers' energy consumption data. However, most of these protocols require a smart meter (installed at the consumer's end) to either maintain a secret key or to run an authenticated key establishment scheme for interacting with the aggregator. Both of these approaches create additional requirements for the system. To address this issue, this article first proposes a machine-learning-based ultra-light-weight data aggregation scheme for smart grids that does not require a secret key to be maintained for communicating with the aggregator. In particular, unlike existing data aggregation schemes, in the proposed data aggregation scheme, neither the server nor the smart meter needs to store any secret. Instead, for every round of data aggregation, each smart meter uses an embedded PUF for generating a unique random response for a given challenge. On the other hand, the server maintains a PUF model for each smart meter for producing the same random response. This unique secret key is used to ensure the privacy of the metering data. Next, we propose an optimized data aggregation scheme using collaborative learning to enhance the performance of the proposed scheme.","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"29 1","pages":"30-36"},"PeriodicalIF":12.9,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41353580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
From Resource Auction to Service Auction: An Auction Paradigm Shift in Wireless Networks 从资源拍卖到服务拍卖:无线网络拍卖模式的转变
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2022-02-22 DOI: 10.1109/MWC.005.2100627
Xianhao Chen, Yiqin Deng, Guangyu Zhu, Danxin Wang, Ya-Nan Fang
{"title":"From Resource Auction to Service Auction: An Auction Paradigm Shift in Wireless Networks","authors":"Xianhao Chen, Yiqin Deng, Guangyu Zhu, Danxin Wang, Ya-Nan Fang","doi":"10.1109/MWC.005.2100627","DOIUrl":"https://doi.org/10.1109/MWC.005.2100627","url":null,"abstract":"In 5G and beyond, newly emerging services, such as edge computing/intelligence services, may demand the provisioning of heterogeneous communications, computing, and storage (CCS) resources on and across network entities multiple hops apart. In such cases, traditional resource-oriented auction schemes, where buyers place bids on resources, may not be effective in providing end-to-end (E2E) quality of service (QoS) guarantees. To overcome these limitations, in this article, we discuss the concept of E2E service auction where the auction commodities are E2E services rather than a certain resource. Under this framework, buyers simply bid for services with E2E QoS requirements without having to know the inner working (how to select and valuate resources behind). To guarantee E2E QoS for winning bids while ensuring essential economic properties, E2E service auction requires addressing the joint problem of network optimization and auction design with both economic and QoS constraints. To substantiate the mechanism design, we illustrate how to devise E2E service auctions for edge computing systems under various scenarios. We also identify the research opportunities on E2E service auction mechanism design for other critical use cases, including edge intelligence.","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"29 1","pages":"185-191"},"PeriodicalIF":12.9,"publicationDate":"2022-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41360861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Unmanned Aerial Vehicle Swarm-Enabled Edge Computing: Potentials, Promising Technologies, and Challenges 无人机集群边缘计算:潜力、有前景的技术和挑战
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2022-01-21 DOI: 10.1109/MWC.103.2100286
Wei Wu, Fuhui Zhou, Baoyun Wang, Qi-hui Wu, Chao Dong, R. Hu
{"title":"Unmanned Aerial Vehicle Swarm-Enabled Edge Computing: Potentials, Promising Technologies, and Challenges","authors":"Wei Wu, Fuhui Zhou, Baoyun Wang, Qi-hui Wu, Chao Dong, R. Hu","doi":"10.1109/MWC.103.2100286","DOIUrl":"https://doi.org/10.1109/MWC.103.2100286","url":null,"abstract":"Unmanned aerial vehicle (UAV) swarm enabled edge computing is envisioned to be promising in the sixth generation wireless communication networks due to their wide application sensories and flexible deployment. However, most of the existing works focus on edge computing enabled by a single or a small scale UAVs, which are very different from UAV swarm-enabled edge computing. In order to facilitate the practical applications of UAV swarm-enabled edge computing, the state of the art research is presented in this article. The potential applications, architectures and implementation considerations are illustrated. Moreover, the promising enabling technologies for UAV swarm-enabled edge computing are discussed. Furthermore, we outline challenges and open issues in order to shed light on the future research directions.","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"29 1","pages":"78-85"},"PeriodicalIF":12.9,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41443448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution 分散式频谱接入系统:愿景、挑战和区块链解决方案
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2021-12-10 DOI: 10.1109/MWC.101.2100354
Yang Xiao, Shanghao Shi, W. Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. T. Hou, Jeffrey H. Reed
{"title":"Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution","authors":"Yang Xiao, Shanghao Shi, W. Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. T. Hou, Jeffrey H. Reed","doi":"10.1109/MWC.101.2100354","DOIUrl":"https://doi.org/10.1109/MWC.101.2100354","url":null,"abstract":"Spectrum access system (SAS) is widely considered the de facto solution to coordinating dynamic spectrum sharing (DSS) and protecting incumbent users. The current SAS paradigm prescribed by the FCC for the CBRS band and standardized by the WInnForum follows a centralized service model in that a spectrum user subscribes to a SAS server for spectrum allocation service. This model, however, neither tolerates SAS server failures (crash or Byzantine) nor resists dishonest SAS administrators, leading to serious concerns about SAS system reliability and trustworthiness. This is especially concerning for the evolving DSS land-scape where an increasing number of SAS service providers and heterogeneous user requirements are coming up. To address these challenges, we propose a novel blockchain-based decentralized SAS architecture called BD-SAS that provides SAS services securely and efficiently, without relying on the trust of each individual SAS server for the overall system trustworthiness. In BD-SAS, a global blockchain (G-Chain) is used for spectrum regulatory compliance while smart contract-enabled local blockchains (L-Chains) are instantiated in individual spectrum zones for automating spectrum access assignment per user request. We hope our vision of a decentralized SAS, the BD-SAS architecture, and discussion on future challenges can open up a new direction toward reliable spectrum management in a decentralized manner.","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"29 1","pages":"220-228"},"PeriodicalIF":12.9,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41455491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Secure and Reliable Transfer Learning Framework for 6G-Enabled Internet of Vehicles 基于6G的车联网安全可靠的迁移学习框架
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2021-11-10 DOI: 10.1109/MWC.004.2100542
Minrui Xu, D. Hoang, Jiawen Kang, D. Niyato, Qiang Yan, Dong In Kim
{"title":"Secure and Reliable Transfer Learning Framework for 6G-Enabled Internet of Vehicles","authors":"Minrui Xu, D. Hoang, Jiawen Kang, D. Niyato, Qiang Yan, Dong In Kim","doi":"10.1109/MWC.004.2100542","DOIUrl":"https://doi.org/10.1109/MWC.004.2100542","url":null,"abstract":"In the coming 6G era, Internet of Vehicles (IoV) has been evolving towards 6G-enabled IoV with super-high data rate, seamless networking coverage, and ubiquitous intelligence by Artificial Intelligence (AI). Transfer Learning (TL) has great potential to empower promising 6G-enabled IoV, such as smart driving assistance, with its outstanding features including enhancing the quality and quantity of training data, speeding up learning processes, and reducing computing demands. Although TL had been widely adopted in wireless applications (e.g., spectrum management and caching), its reliability and security in 6G-enabled IoV were still not well investigated. For instance, malicious vehicles in source domains may transfer and share untrustworthy models (i.e., knowledge) about connection availability to target domains, thus adversely affecting the performance of learning processes. Therefore, it is important to select and also incentivize trustworthy vehicles to participate in TL. In this article, we first introduce the integration of TL and 6G-enabled IoV and provide TL applications for 6G-enabled IoV. We then design a secure and reliable transfer learning framework by using reputation to evaluate the reliability of pre-trained models and utilizing the consortium blockchain to achieve secure and efficient decentralized reputation management. Moreover, a deep learning-based auction scheme for the TL model market is designed to motivate high-reputation vehicles to participate in model sharing. Finally, the simulation results demonstrate that the proposed framework is secure and reliable with well-designed incentives for TL in 6G-enabled IoV.","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"29 1","pages":"132-139"},"PeriodicalIF":12.9,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41351303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
When UAV Meets IRS: Expanding Air-Ground Networks via Passive Reflection 当无人机遇到IRS:通过被动反射扩展空地网络
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2021-10-01 DOI: 10.1109/MWC.010.2000528
Xiaowei Pang, Min Sheng, Nan Zhao, Jie Tang, D. Niyato, Kai‐Kit Wong
{"title":"When UAV Meets IRS: Expanding Air-Ground Networks via Passive Reflection","authors":"Xiaowei Pang, Min Sheng, Nan Zhao, Jie Tang, D. Niyato, Kai‐Kit Wong","doi":"10.1109/MWC.010.2000528","DOIUrl":"https://doi.org/10.1109/MWC.010.2000528","url":null,"abstract":"Thanks to their flexibility and mobility, unmanned aerial vehicles (UAVs) have been widely applied in wireless networks. However, UAV communications may suffer from blockage and eavesdropping in practical scenarios due to the complex environment. Taking the recent advances in intelligent reflecting surface (IRS) to reconfigure the propagation environments, in this article, we employ IRS to enhance the performance of UAV-aided air-ground networks. First, we overview the combination of UAV and IRS, by introducing the diverse applications of IRS and the appealing advantages of UAV, and highlighting the benefits of combining them. Then, we investigate two case studies where the UAV trajectory, the transmit beamforming and the IRS passive beamforming are jointly optimized. In the first case study, by equipping the IRS on a UAV, the average achievable rate of the relaying network is maximized. In the second one, the IRS is deployed to assist the UAV-ground communication while combating the adversarial eavesdropper. Simulation results are provided to demonstrate the performance enhancement resulting from combining UAV and IRS in air-ground networks. Finally, we shed light on some challenging issues to be resolved for practical implementations in this direction.","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"28 1","pages":"164-170"},"PeriodicalIF":12.9,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41446929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 133
A Hybrid Wired/Wireless Deterministic Network for Smart Grid. 面向智能电网的有线/无线混合确定性网络。
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2021-06-01 DOI: 10.1109/mwc.001.2000493
Bin Hu, Hamid Gharavi
{"title":"A Hybrid Wired/Wireless Deterministic Network for Smart Grid.","authors":"Bin Hu,&nbsp;Hamid Gharavi","doi":"10.1109/mwc.001.2000493","DOIUrl":"https://doi.org/10.1109/mwc.001.2000493","url":null,"abstract":"<p><p>With the rapid growth of time-critical applications in smart grid, robotics, autonomous vehicles, and industrial automation, demand for high reliability, low latency and strictly bounded jitter is sharply increasing. High-precision time synchronization communications, such as Time Triggered Ethernet (TTE), have been successfully developed for wired networks. However, the high cost of deploying additional equipment and extra wiring limits the scalability of these networks. Therefore, in this article, a hybrid wired/wireless high-precision time synchronization network based on a combination of high-speed TTE and 5G Ultra-Reliable and Low-Latency Communications (URLLC) is proposed. The main motivation is to comply with the low latency, low jitter, and high reliability requirements of time critical applications, such as smart grid synchrophasor communications. Therefore, in the proposed hybrid network architecture, a high-speed TTE is considered as the main bus (i.e., backbone network), whereas a Precision Time Protocol (PTP) aided 5G-URLLC-based wireless access is used as a sub-network. The main challenge is to achieve interoperability between the PTP aided URLLC and the TTE, while ensuring high precision timing and synchronization. The simulation results demonstrate the impact of the PTP-aided URLLC in maintaining network reliability, latency, and jitter in full coordination with the TTE-network.</p>","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"28 3","pages":""},"PeriodicalIF":12.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/mwc.001.2000493","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10865293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Information-Centric Networking in Wireless Environments: Security Risks and Challenges. 无线环境中的信息中心网络:安全风险与挑战。
IF 12.9 1区 计算机科学
IEEE Wireless Communications Pub Date : 2021-01-01 Epub Date: 2021-04-06 DOI: 10.1109/mwc.001.2000245
Boubakr Nour, Spyridon Mastorakis, Rehmat Ullah, Nicholas Stergiou
{"title":"Information-Centric Networking in Wireless Environments: Security Risks and Challenges.","authors":"Boubakr Nour,&nbsp;Spyridon Mastorakis,&nbsp;Rehmat Ullah,&nbsp;Nicholas Stergiou","doi":"10.1109/mwc.001.2000245","DOIUrl":"https://doi.org/10.1109/mwc.001.2000245","url":null,"abstract":"<p><p>Information-Centric Networking (ICN) has emerged as a paradigm to cope with the lack of built-in security primitives and efficient mechanisms for content distribution of today's Internet. However, deploying ICN in a wireless environment poses a different set of challenges compared to a wired environment, especially when it comes to security. In this paper, we present the security issues that may arise and the attacks that may occur from different points of view when ICN is deployed in wireless environments. The discussed attacks may target both applications and the ICN network itself by exploiting elements of the ICN architecture, such as content names and in-network content caches. Furthermore, we discuss potential solutions to the presented issues and countermeasures to the presented attacks. Finally, we identify future research opportunities and directions.</p>","PeriodicalId":13342,"journal":{"name":"IEEE Wireless Communications","volume":"28 2","pages":"121-127"},"PeriodicalIF":12.9,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/mwc.001.2000245","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39290718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信