Journal of Networking and Network Applications最新文献

筛选
英文 中文
PTLchain: Privacy and Traceability Enhanced Scheme for Logistics by using Consortium Blockchain PTLchain:使用联盟区块链的物流隐私和可追溯性增强方案
Journal of Networking and Network Applications Pub Date : 2022-01-01 DOI: 10.33969/j-nana.2021.010403
Xiaoguo Lin, Xunbing Wang
{"title":"PTLchain: Privacy and Traceability Enhanced Scheme for Logistics by using Consortium Blockchain","authors":"Xiaoguo Lin, Xunbing Wang","doi":"10.33969/j-nana.2021.010403","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010403","url":null,"abstract":"In digital intelligence era, the authenticity , privacy and traceability of data are key factors in building a good logistics information system. However, current logistics system does not pay attention to protecting user’s privacy information, once the user’s privacy is leaked, it will seriously damage the interests of the user. Besides, when there is a logistics dispute, the logistics system cannot ensure the credibility of the traceable process, which reduces the security and availability of the system. Compared with the traditional logistics system, the blockchain-based logistics scheme ensures the security of users’ personal privacy, the authenticity and traceability of logistics information to a certain extent. However, most of the existing blockchain-based privacy-preserving logistics schemes only propose corresponding system models, which cannot be directly applied. Therefore, to address the leaking problems of logistics information in today’s logistics system and inefficiency in tracing the logistics delivery process, we propose a privacy and traceability enhanced scheme for logistics based on consortium blockchain. The blockchain guarantees the authenticity of logistics data through tamper-resistance and traceability, it avoids logistics information and transportation process tampering and supports efficient logistics traceability. Furthermore, we utilize asymmetric encryption and attribute-based encryption to encrypt users’ privacy and logistics information, to protect the private information and realize fine-grained access control. Finally, we implement the prototype system by Hyperledger Fabric platform, and give the performance evaluation to verify the feasibility and practical significance of our scheme.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124840411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive CMT-SCTP Scheme: A Reinforcement Learning Approach 自适应CMT-SCTP方案:一种强化学习方法
Journal of Networking and Network Applications Pub Date : 2022-01-01 DOI: 10.33969/j-nana.2021.010404
Deguang Wang, Mingze Wang, Tao Zhang, Shujie Yang, Changqiao Xu
{"title":"An Adaptive CMT-SCTP Scheme: A Reinforcement Learning Approach","authors":"Deguang Wang, Mingze Wang, Tao Zhang, Shujie Yang, Changqiao Xu","doi":"10.33969/j-nana.2021.010404","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010404","url":null,"abstract":"With the continuous increase of end users and types of services, the scale of the network has shown explosive growth, which has brought tremendous pressure and challenges to network data transmission. How to achieve high-quality data transmission has become a core issue. Single-path transmission has been difficult to meet the above requirements. The concurrent multipath transfer extension for stream control transmission protocol (CMT-SCTP), which supports multipath and independent data streams, can solve this problem. However, the current transmission path assessment scheme has too large granularity to make full use of the resources of the transition zone. Most studies ignore the different requirements of different services, a single transmission strategy, and the lack of an intelligent dynamic adjustment mechanism. Therefore, we designed a QCMT(Q-learning based CMT-SCTP) scheduling method. This method considers the multi-dimensional characteristics of the path and the characteristic preferences of different services, periodically evaluates and trains the reinforcement learning model for service adaptation, and makes scheduling decisions dynamically. Experimental results show that dynamic scheduling based on path parameters and service preferences can reduce message delay and improve network throughput.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129330614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Covert Communication With Truncated Channel Inversion Power Control in D2D Underlaid Cellular Networks 基于截断信道反转功率控制的D2D蜂窝网络隐蔽通信
Journal of Networking and Network Applications Pub Date : 2022-01-01 DOI: 10.33969/j-nana.2021.010405
Ranran Sun, Bin Yang
{"title":"Covert Communication With Truncated Channel Inversion Power Control in D2D Underlaid Cellular Networks","authors":"Ranran Sun, Bin Yang","doi":"10.33969/j-nana.2021.010405","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010405","url":null,"abstract":"Device-to-device (D2D) underlaid cellular networks are regarded as an emerging network structure in the 5G systems. We study the covert communication of such networks consisting of a base station BS, a cellular user Alice, a D2D pair with a transmitter Dt and a receiver Dr , and a warden W illie. To conduct the covert communication, Alice adopts the truncated channel inversion power control (CIPC) to hide itself from W illie, where the received signal power at BS is fixed avoiding channel estimation for decoding Alice’s signal. Meanwhile, the interference generated by the D2D pair reusing the spectrum of Alice is exploited to confuse W illie. To understand the fundamental covert rate performance in the considered network, we first provide a theoretical model for characterizing the detection error probability of W illie as well as the effective covert rate at BS under the truncated CIPC scheme. Based on the main results, we then explore the effective covert rate maximization under the constraint of the detection error probability to identify the optimal truncated CIPC scheme designing and interference management. Finally, extensive numerical results are presented to illustrate the impacts of the truncated CIPC and interference from Dt on the covert performance.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130495665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sustainable Intrusion Detection with New Attack Classification in Private Clouds 私有云中基于新攻击分类的可持续入侵检测
Journal of Networking and Network Applications Pub Date : 2022-01-01 DOI: 10.33969/j-nana.2021.010402
Yu Jing, Zhiwei Zhang, Tianzhu Hu, Zhaoyang Li, Senpeng Liu
{"title":"Sustainable Intrusion Detection with New Attack Classification in Private Clouds","authors":"Yu Jing, Zhiwei Zhang, Tianzhu Hu, Zhaoyang Li, Senpeng Liu","doi":"10.33969/j-nana.2021.010402","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010402","url":null,"abstract":"Traditional data-driven intrusion detection systems (IDSs) are typically based on the recognition of some specific features, regulations or patterns belonging to the well-defined known attacks, so they cannot separate new or unknown attacks from abnormities and may even confuse new attacks and legitimate behaviors. With the development of artificial intelligence (AI) technology, it becomes the mainstream technology to improve the detection performance of intrusion detection system. However, the available AI-driven IDSs can hardly classify different types of new attacks separated from abnormities, and they are usually not dedicated to the private cloud, edge or fog computing environments, where the update of the new attack recognition can be very different from that of the public environments. In this article, we present a novel sustainable and AI-driven intrusion detection scheme to support the classification of new attacks in the private clouds. We first adopt the convolutional neural network algorithm to recognize the known attacks, and then propose a new model of recognition and classification for unknown attacks based on network behaviors. We further propose a new approach to update the attacks recognition model for the private clouds. Finally, we provide extensive experiment results to demonstrate that our proposed scheme outperforms the previous IDSs in terms of attack detection accuracy, attack classification accuracy and updating efficiency.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Instruction Sender Authentication Utilizing Touch Screen Operation Action Fingerprint for UAV Systems 基于触摸屏操作动作指纹的无人机指令发送者身份验证
Journal of Networking and Network Applications Pub Date : 2022-01-01 DOI: 10.33969/j-nana.2021.010406
Guozhu Zhao, Pinchang Zhang
{"title":"Instruction Sender Authentication Utilizing Touch Screen Operation Action Fingerprint for UAV Systems","authors":"Guozhu Zhao, Pinchang Zhang","doi":"10.33969/j-nana.2021.010406","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010406","url":null,"abstract":"Instruction sender authentication of UAV (Unmanned Aerial Vehicle) control is critical for the secure operation of UAV systems. By exploring user touch action characteristics of the user interaction with the UAV control mobile terminal, this paper proposes a novel instruction sender continuous authentication framework for UAV control systems. In particular, we first obtain the touch screen data in real time from the interaction with the mobile device screen of a user when he controls the UAV. Then we create a polynomial to fit the touch trajectory on the screen of the user, and use the least square method to obtain the optimal estimate of the polynomial coefficients. Finally, we mark the grid area covered by the polynomial to extract the user’s touch screen operation action fingerprint(OAF), and employ the fuzzy extractor method to realize the identity authentication of the sender with certain error tolerance. Extensive experiments are conducted to illustrate the authentication performance of the proposed authentication framework in terms of false acceptance rate, false rejection rate and equal-error rate.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130531865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Viewport-Driven Adaptive 360◦ Live Streaming Optimization Framework 视口驱动的自适应360◦直播优化框架
Journal of Networking and Network Applications Pub Date : 2022-01-01 DOI: 10.33969/j-nana.2021.010401
Shuai Peng, Jialu Hu, Han Xiao, Shujie Yang, Changqiao Xu
{"title":"Viewport-Driven Adaptive 360◦ Live Streaming Optimization Framework","authors":"Shuai Peng, Jialu Hu, Han Xiao, Shujie Yang, Changqiao Xu","doi":"10.33969/j-nana.2021.010401","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010401","url":null,"abstract":"Virtual reality (VR) video streaming and 360◦ panoramic video have received extensive attention in recent years, which can bring users an immersive experience. However, the ultra-high bandwidth and ultra-low latency requirements of virtual reality video or 360◦ panoramic video also put tremendous pressure on the carrying capacity of the current network. In fact, since the user’s field of view (a.k.a viewport) is limited when watching a panoramic video and users can only watch about 20%∼30% of the video content, it is not necessary to directly transmit all high-resolution content to the user. Therefore, predicting the user’s future viewing viewport can be crucial for selective streaming and further bitrate decisions. Combined with the tile-based adaptive bitrate (ABR) algorithm for panoramic video, video content within the user’s viewport can be transmitted at a higher resolution, while areas outside the viewport can be transmitted at a lower resolution. This paper mainly proposes a viewport-driven adaptive 360◦ live streaming optimization framework, which combines viewport prediction and ABR algorithm to optimize the transmission of live 360◦ panoramic video. However, existing viewport prediction always suffers from low prediction accuracy and does not support real-time performance. With the advantage of convolutional network (CNN) in image processing and long short-term memory (LSTM) in temporal series processing, we propose an online-updated viewport prediction model called LiveCL which mainly utilizes CNN to extract the spatial characteristics of video frames and LSTM to learn the temporal characteristics of the user’s viewport trajectories. With the help of the viewport prediction and ABR algorithm, unnecessary bandwidth consumption can be effectively reduced. The main contributions of this work include: (1) a framework for 360◦ video transmission is proposed; (2) an online real-time viewport prediction model called LiveCL is proposed to optimize 360◦ video transmission combined with a novel ABR algorithm, which outperforms the existing model. Based on the public 360◦ video dataset, the tile accuracy, recall, precision, and frame accuracy of LiveCL are better than those of the latest model. Combined with related adaptive bitrate algorithms, the proposed viewport prediction model can reduce the transmission bandwidth by about 50%.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116696683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Qualitative Parameter Analysis for Botrytis cinerea Forecast Modelling Using IoT Sensor Networks 基于物联网传感器网络的灰霉病预测模型的定性参数分析
Journal of Networking and Network Applications Pub Date : 2021-08-03 DOI: 10.20944/preprints202108.0072.v1
N. Gligoric, Tomo Popović, D. Drajić, Spasenija Gajinov, S. Krco
{"title":"Qualitative Parameter Analysis for Botrytis cinerea Forecast Modelling Using IoT Sensor Networks","authors":"N. Gligoric, Tomo Popović, D. Drajić, Spasenija Gajinov, S. Krco","doi":"10.20944/preprints202108.0072.v1","DOIUrl":"https://doi.org/10.20944/preprints202108.0072.v1","url":null,"abstract":"This paper presents the evaluation of a fungal disease forecast model in vineyards for qualitative parameter analysis using the data from off the shelf sensors, i.e. temperature and air relative humidity, rain precipitation, and leaf wetness. The rules for the fungal disease models are digitalized as a decision support tool that serve as an indicator to farmers for the need of spraying of the chemical substances to ensure the best growing condition and suppress the level of parasites. The temperature and humidity contexts are used interchangeably in practice to detect the risk of the disease occurrence. By taking into account a number of influences on these parameters collected from the shelf sensors, new topics for research in the multidimensional field of precision agriculture emerge. In this study, the impact of the humidity is evaluated by assessing how different humidity parameters correlate with the accuracy of the Botrytis cinerea fungi forecast. Each humidity parameter has it’s own threshold that triggers the second step of the disease modeling - risk index based on the temperature. The research showed that for humidity a low-cost relative humidity sensor can detect in average 14.61% risk values, a leaf wetness sensor an additional 3.99% risk cases, and finally, a precipitation sensor will detect only an additional 0.59% risk cases.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Integrated Assessment Scheme of Network Infrastructure Following Security Standards and Specifications 遵循安全标准规范的网络基础设施综合评估方案
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020301
Zhaoyang Li, Hao Duan, Jiarui Lei, Zijiang Yang, Feng Lin, Yumei Li, Zhiwei Zhang
{"title":"An Integrated Assessment Scheme of Network Infrastructure Following Security Standards and Specifications","authors":"Zhaoyang Li, Hao Duan, Jiarui Lei, Zijiang Yang, Feng Lin, Yumei Li, Zhiwei Zhang","doi":"10.33969/j-nana.2022.020301","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020301","url":null,"abstract":"In this intelligent era, with deeper research, faster development, and wider application of information technologies, the network infrastructure plays one more and more important role in data communication and processing that affects almost every field worldwide. Correspondingly, cyberspace security, especially the security of network infrastructure has become elementary for countries and companies. Then, various security standards and specifications have been proposed to guide network infrastructure’s design, development, and operation. Consequently, it is the key to assess whether a network infrastructure is compliant with the related standards and specifications. However, most of the existing security assessment schemes are manual, that is, testers should check all issues depending on their understanding of the network infrastructures and related documents. That results in the lack of accuracy, continuity as well as comprehensiveness. Therefore, in this paper, we propose an Al-based network infrastructure security assessment (ISA-CN) scheme, which concerns China’s current fundamental network infrastructure security assessment related standards and specifications and evaluates the object’s security states with multi-dimensional automatically monitored network traffic data continuously and comprehensively. The analytical and experimental results show that our ISA-CN scheme is suitable for the assessment of real-world network infrastructure systems.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Transcoding Task Offloading and Routing Decision-Making Scheme in Live Transmission Architecture Based on Computing Power Network 基于计算能力网络的实时传输体系结构转码任务分流与路由决策方案
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2023.030103
Zitong Li
{"title":"A Transcoding Task Offloading and Routing Decision-Making Scheme in Live Transmission Architecture Based on Computing Power Network","authors":"Zitong Li","doi":"10.33969/j-nana.2023.030103","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030103","url":null,"abstract":"In recent years, there has been a significant increase in the demand for high-bit-rate live broadcast services, which has led to the widespread use of edge transcoding technology. Edge transcoding can effectively reduce the throughput of streaming media transmission, making it a popular and extensively researched technology. However, due to the real-time requirements of live broadcasting, the edge server needs to have the sufficient computing power to ensure low-latency calculations, which makes computing power allocation and traffic distribution become quite difficult. Inspired by the real-time and flexible computing power scheduling ability of the Computing Power Network, this paper explores reasonable edge task offloading and efficient traffic routing path planning to ensure overall low latency. This paper proposes a live stream transmission architecture based on the computing power network to solve the problems mentioned above to some degree. The paper first models the computing power network in the scene and then designs a task offloading algorithm based on Deep Reinforcement Learning (DQN) to determine the device for executing the computing task. Furthermore, a hybrid Simulated Annealing Genetic Algorithm (SAGA) is proposed for routing decisions. The effectiveness and superiority of the scheme are validated through simulation experiments.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Maximum Likelihood Estimation for Multiple Transmitter Locations 多发射机位置最大似然估计的性能分析
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010203
Xiaoli Hu, P. Ho, Limei Peng
{"title":"Performance Analysis of Maximum Likelihood Estimation for Multiple Transmitter Locations","authors":"Xiaoli Hu, P. Ho, Limei Peng","doi":"10.33969/j-nana.2021.010203","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010203","url":null,"abstract":"The paper considers the consistence condition of Maximum Likelihood (ML) estimation for multiple transmitter locations in a wireless network with cooperative receiver nodes. It is found that the location set of receiver nodes should not locate (or asymptotically in some sense) merely in an algebraic curve of order 2M −1 if there are totally M transmitters. A sufficient condition for consistence of the ML estimation for M transmitters is that the limit set of locations contains a subset, comprised of (2M2 −M +2) points, which is non-C-2M-co-curved, a notion given by Definition IV-B. This condition can be compared to the persistent excitation condition used to guarantee the convergence of least squares algorithm. Numerical experiments are designed to demonstrate the theoretical discoveries in both positive and negative aspects.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信