International Journal of Network Management最新文献

筛选
英文 中文
Screen-shooting resistant robust document watermarking in the Discrete Fourier Transform domain 离散傅里叶变换域中的抗屏幕拍摄稳健文件水印技术
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-06-02 DOI: 10.1002/nem.2278
Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang, Hanzhou Wu
{"title":"Screen-shooting resistant robust document watermarking in the Discrete Fourier Transform domain","authors":"Yazhou Zhang,&nbsp;Chaoyue Huang,&nbsp;Shaoteng Liu,&nbsp;Leichao Huang,&nbsp;Tianshu Yang,&nbsp;Xinpeng Zhang,&nbsp;Hanzhou Wu","doi":"10.1002/nem.2278","DOIUrl":"10.1002/nem.2278","url":null,"abstract":"<p>Metaverse's augmented reality (AR) function allows virtual information to be seamlessly superimposed onto real scenes through the camera of a head-mounted device. However, this raises concerns about privacy protection and copyright authentication when transmitting cross-media information. Additionally, there is a risk of secret information leakage due to screen candid shooting in the real world. Ensuring information security and copyright authentication in case of unauthorized screen capturing is crucial. To prevent information loss and interference from cross-media transfer between screens and cameras, we implement digital watermarking for copyright protection. We have proposed an innovative framework for automatic document watermarking that can resist screen-shooting. Our approach involves embedding a ring watermark in the document underlay. On the extraction side, the watermark extraction process is divided into three key steps: automatic location, automatic correction, and automatic extraction. First, the document image is located in the covert photography. Then, perspective correction is performed based on the text line features of the document. Finally, the watermark information is extracted by combining the ring watermark features. Our method is capable of automatically extracting watermarks from covert photography while considering aspects such as concealment, robustness, and visual quality. The watermark is embedded in the document underlay, which ensures good visual quality and does not affect the normal reading and editing. We also propose various embedding strength schemes that can adapt to different usage scenarios, providing resistance to screen-shooting or screenshot attacks, as well as various noise attacks. Through extensive experiments, we have demonstrated the feasibility of the proposed automated framework and the robustness of the watermarking algorithm, as well as the superiority and broad application prospects of our method.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141273737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and light-weight patient survival prediction in Internet of Medical Things framework 医疗物联网框架中的安全轻量级患者生存预测
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-30 DOI: 10.1002/nem.2286
Shubh Mittal, Tisha Chawla, Saifur Rahman, Shantanu Pal, Chandan Karmakar
{"title":"A secure and light-weight patient survival prediction in Internet of Medical Things framework","authors":"Shubh Mittal,&nbsp;Tisha Chawla,&nbsp;Saifur Rahman,&nbsp;Shantanu Pal,&nbsp;Chandan Karmakar","doi":"10.1002/nem.2286","DOIUrl":"10.1002/nem.2286","url":null,"abstract":"<p>Thoracic surgeries in major lung resections for primary lung cancer are fraught with potential risks, emphasising the need to understand factors contributing to postoperative mortality. This study investigates the interplay of objective and subjective data in predicting postoperative outcomes to reduce data transmission costs in the Internet of Medical Things (IoMT). Objective metrics, such as forced vital capacity (FVC), offer consistent, quantifiable insights essential for predictive modelling. Conversely, subjective data derived from patient self-reports suggest that the patient's personal experiences are crucial for assessing the quality of life postsurgery. Utilising a dataset from the University of California, Irvine's Machine Learning Repository (UCI), 17 distinct attributes were examined. Using ensemble learning classifiers, the extra trees classifier is superior when utilising all features, achieving an accuracy of 0.92. Combining select subjective features, specifically PRE6, PRE8 and AGE (demographic), with objective data, yielded a comparable accuracy of 0.91. Feature importance analysis further highlights the significance of features like PRE5, PRE4 and AGE. This suggests potential redundancies in the full feature set, emphasising the importance of feature selection. Importantly, when compared with existing literature, this study's findings offer insights into the future of predictive modelling in thoracic surgeries, with implications for the rapidly evolving field of the IoMT.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2286","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure cross-chain transactions for medical data sharing in blockchain-based Internet of Medical Things 基于区块链的医疗物联网中医疗数据共享的安全跨链交易
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-23 DOI: 10.1002/nem.2279
Bohao Jiang, Chaoyang Li, Yu Tang, Xiangjun Xin
{"title":"Secure cross-chain transactions for medical data sharing in blockchain-based Internet of Medical Things","authors":"Bohao Jiang,&nbsp;Chaoyang Li,&nbsp;Yu Tang,&nbsp;Xiangjun Xin","doi":"10.1002/nem.2279","DOIUrl":"10.1002/nem.2279","url":null,"abstract":"<div>\u0000 \u0000 <p>Blockchain technology has greatly promoted the development of the Internet of Medical Things (IoMT) from a centralized form to a distributed form. However, with many independent blockchain-based IoMT (BIoMT) systems being established by different institutions, these heterogeneous blockchain systems have created a new “data islands” problem. This paper proposes a multi-chain fusion (MCF) multi-party governance model based on relay chain technology. The MCF model helps establish cross-chain interaction and communication among the multiple heterogeneous blockchain systems in different medical institutions through the cross-chain gateway. Meanwhile, by utilizing the inter-blockchain transfer protocol (IBTP), the MCF model takes responsibility for legitimacy verification and reliable routing of cross-chain transactions, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems. Then, an elliptic curve signature scheme is adopted to protect user privacy in cross-chain transactions, which helps establish transaction verification for the MCF model in BIoMT systems. Finally, several experiments are carried out to prove the feasibility of the cross-chain scheme and the security of the elliptic curve signature scheme, and the performance index of the cross-chain system is evaluated. The performance results show that the MCF model can provide secure and efficient cross-chain services for sharing medical data among heterogeneous BIoMT systems, thus addressing the “data islands problem” inherent in traditional blockchain-based medical systems.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141106809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transaction fee mechanisms with farsighted miners 有远见的矿工的交易费用机制
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-21 DOI: 10.1002/nem.2275
Jens Leth Hougaard, Mohsen Pourpouneh, Haiting Han
{"title":"Transaction fee mechanisms with farsighted miners","authors":"Jens Leth Hougaard,&nbsp;Mohsen Pourpouneh,&nbsp;Haiting Han","doi":"10.1002/nem.2275","DOIUrl":"10.1002/nem.2275","url":null,"abstract":"<p>We investigate the recent fee mechanism EIP1559 of the Ethereum network. Whereas previous studies have focused on myopic miners, we here focus on strategic miners in the sense of miners being able to reason about the future blocks. We derive expressions for optimal miner behavior (in terms of setting block sizes) in the case of two-block foresight and varying degrees of hashing power. Results indicate that a sufficiently large mining pool will have enough hashing power to gain by strategic foresight. We further use a simulation study to examine the impact of both two-block and three-block foresight. In particular, the simulation study indicates that for realistic levels of hashing power, mining pools do not gain from being able to reason more than two blocks ahead. Moreover, even though the presence of strategic miners increases the variation in block sizes and potentially empty blocks, overall system throughput tends to increase slightly compared with myopic mining. We further analyze the effect of varying the base fee updating rule.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141117411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Ponzi-like designs in stablecoins 利用稳定币中类似庞氏骗局的设计
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-19 DOI: 10.1002/nem.2277
Shange Fu, Qin Wang, Jiangshan Yu, Shiping Chen
{"title":"Leveraging Ponzi-like designs in stablecoins","authors":"Shange Fu,&nbsp;Qin Wang,&nbsp;Jiangshan Yu,&nbsp;Shiping Chen","doi":"10.1002/nem.2277","DOIUrl":"10.1002/nem.2277","url":null,"abstract":"<p>Stablecoin represents a unique subset of cryptocurrencies designed to offer price stability, achieved either through backing by specific assets or by employing algorithms that adjust their supply in response to market demand. In its landscape, algorithmic stablecoin is one special type that is not backed by any asset, and it stands to revolutionize the way a sovereign fiat operates. As implemented, algorithmic stablecoins are poorly stabilized in most cases; their prices easily deviate from the target or even fall into a catastrophic collapse and are as a result often dismissed as a Ponzi scheme. However, what is the essence of Ponzi? In this paper, we try to clarify such a deceptive concept and reveal how algorithmic stablecoin works from a higher level. We find that Ponzi is basically a financial protocol that pays existing investors with funds collected from new ones. Running a Ponzi, however, does not necessarily imply that any participant is in any sense losing out, as long as the game can be perpetually rolled over. Economists call such realization as a <i>rational Ponzi game</i>. We accordingly propose a rational model in the context of algorithmic stablecoin and draw its holding conditions. We apply the model and use historical data to examine if the major types of algorithmic stablecoins meet the criteria for being a rational Ponzi game.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2277","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141123335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed algorithm with network-independent step-size and event-triggered mechanism for economic dispatch problem 经济调度问题的分布式算法,步长与网络无关,采用事件触发机制
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-16 DOI: 10.1002/nem.2276
Baitong Chen, Jianhua Yang, Wei Lu, Witold Pedrycz, Changhai Sun
{"title":"A distributed algorithm with network-independent step-size and event-triggered mechanism for economic dispatch problem","authors":"Baitong Chen,&nbsp;Jianhua Yang,&nbsp;Wei Lu,&nbsp;Witold Pedrycz,&nbsp;Changhai Sun","doi":"10.1002/nem.2276","DOIUrl":"10.1002/nem.2276","url":null,"abstract":"<p>The economic dispatch problem (EDP) poses a significant challenge in energy management for modern power systems, particularly as these systems undergo expansion. This growth escalates the demand for communication resources and increases the risk of communication failures. To address this challenge, we propose a distributed algorithm with network-independent step sizes and an event-triggered mechanism, which reduces communication requirements and enhances adaptability. Unlike traditional methods, our algorithm uses network-independent step sizes derived from each agent's local cost functions, thus eliminating the need for detailed network topology knowledge. The theoretical derivation identifies a range of step size values that depend solely on the objective function's strong convexity and the gradient's Lipschitz continuity. Furthermore, the proposed algorithm is shown to achieve a linear convergence rate, assuming the event triggering threshold criteria are met for linear convergence. Numerical experiments further validate the effectiveness and advantages of our proposed distributed algorithm by demonstrating its ability to maintain good convergence characteristics while reducing communication frequency.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140969790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving data aggregation achieving completeness of data queries in smart grid 保护隐私的数据聚合实现智能电网数据查询的完整性
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-13 DOI: 10.1002/nem.2273
Xinyang Li, Meng Zhao, Yong Ding, Changsong Yang, Huiyong Wang, Hai Liang, Yujue Wang
{"title":"Privacy-preserving data aggregation achieving completeness of data queries in smart grid","authors":"Xinyang Li,&nbsp;Meng Zhao,&nbsp;Yong Ding,&nbsp;Changsong Yang,&nbsp;Huiyong Wang,&nbsp;Hai Liang,&nbsp;Yujue Wang","doi":"10.1002/nem.2273","DOIUrl":"10.1002/nem.2273","url":null,"abstract":"<p>In smart grid systems, the control center formulates strategies and provides services by analyzing electricity consumption data. However, ensuring the privacy and security of user data is a critical concern. While traditional data aggregation schemes can provide a certain level of privacy protection for users, they also impose limitations on the control center's access to fine-grained data. To address these challenges, we propose a privacy-preserving data aggregation scheme supporting data query (PAQ). We designed a multi-level data aggregation mechanism based on Paillier semi-homomorphic encryption to achieve efficient aggregation of user data in the control center. Additionally, a data query mechanism based on electricity consumption intervals is introduced, allowing the control center to query aggregated ciphertexts for different user categories from outsourced data on the cloud server. Security analysis demonstrates that PAQ design effectively solves security issues in data aggregation and query processes. Performance analysis indicates that the proposed scheme outperforms existing solutions in terms of efficiency.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of security options for message protocols: A comparative analysis 信息协议安全选项的性能:比较分析
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-13 DOI: 10.1002/nem.2274
Wesley dos Reis Bezerra, Fernando Koch, Carlos Becker Westphall
{"title":"Performance of security options for message protocols: A comparative analysis","authors":"Wesley dos Reis Bezerra,&nbsp;Fernando Koch,&nbsp;Carlos Becker Westphall","doi":"10.1002/nem.2274","DOIUrl":"10.1002/nem.2274","url":null,"abstract":"<p>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASMTP: Anonymous secure messaging token-based protocol assisted data security in swarm of unmanned aerial vehicles ASMTP:基于匿名安全信息令牌的协议,辅助无人机群的数据安全
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-10 DOI: 10.1002/nem.2271
Kayalvizhi Manikandan, Ramamoorthy Sriramulu
{"title":"ASMTP: Anonymous secure messaging token-based protocol assisted data security in swarm of unmanned aerial vehicles","authors":"Kayalvizhi Manikandan,&nbsp;Ramamoorthy Sriramulu","doi":"10.1002/nem.2271","DOIUrl":"10.1002/nem.2271","url":null,"abstract":"<p>Swarm of Unmanned Aerial Vehicles (UAVs) broaden the field of application in various fields like military surveillance, crop monitoring in agriculture, combat operations, etc. Unfortunately, they are becoming increasingly susceptible to security attacks, such as jamming, information leakage and spoofing, as they become more common and in more demand. So, there is a wider need for UAVs, which requires the design of strong security procedures to fend off such attacks and security dangers. Even though several studies focused on security aspects, many questions remain unanswered, particularly in the areas of secure UAV-to-UAV communication, support for perfect forward secrecy and non-repudiation. In a battle situation, it is extremely important to close these gaps. The security requirements for the UAV communication protocol in a military setting were the focus of this study. In this paper, we present the issues faced by the UAV swarm, especially during military surveillance operations. To secure the communication link in UAV, a new protocol for UAV Swarm communication is proposed with anonymous secure messaging token-based protocol (ASMTP). The proposed protocol secures UAV-to-base station communication and safeguards the metadata of the sender and receiver nodes. The proposed model maintains the confidentiality, integrity and availability of data in the UAV Swarm and achieves robustness. In addition, it provides a different strategy for the cybersecurity gaps in the swarm of UAVs during military surveillance and combat operations.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-protected object detection through trustworthy image fusion 通过可信图像融合进行受隐私保护的物体检测
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2024-05-09 DOI: 10.1002/nem.2270
Chao Zhang, Jinmei Zhang, Lijun Yun, Jun Zhang, Junbo Su
{"title":"Privacy-protected object detection through trustworthy image fusion","authors":"Chao Zhang,&nbsp;Jinmei Zhang,&nbsp;Lijun Yun,&nbsp;Jun Zhang,&nbsp;Junbo Su","doi":"10.1002/nem.2270","DOIUrl":"10.1002/nem.2270","url":null,"abstract":"<p>The neural network-based technologies have emerged as a potent method for image fusion, object detection, and other computer vision tasks as the rapid development of deep learning. Multi-band infrared images, in particular, capture a more extensive range of radiation details and information compared to conventional single-band infrared images. Consequently, the fusion of multi-band infrared images can provide more features for object detection. However, it is crucial to consider that infrared images may contain sensitive information, potentially leading to privacy concerns. Ensuring datasets privacy protection plays a crucial role in the fusion and tracking process. To address both the need for improved detection performance and the necessity for privacy protection in the infrared environment, we proposed a procedure for object detection based on multi-band infrared image datasets and utilized the transfer learning technique to migrate knowledge learned from external infrared data to internal infrared data, thereby training the infrared image fusion model and detection model. The procedure consists of several steps: (1) data preprocessing of multi-band infrared images, (2) multi-band infrared image fusion, and (3) object detection. Standard evaluation metrics for image fusion and object detection ensure the authenticity of the experiments. The comprehensive validation experiments demonstrate the effectiveness of the proposed procedure in object detection tasks. Furthermore, the transfer learning can train our datasets and update the model without exposing the original data. This aspect of transfer learning is particularly beneficial for maintaining the privacy of multi-band infrared images during the fusion and detection processes.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信