2018 27th International Conference on Computer Communication and Networks (ICCCN)最新文献

筛选
英文 中文
A Novel Data Secure Deletion Scheme for Mobile Devices 一种新的移动设备数据安全删除方案
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487366
Minshen Wang, Jinbo Xiong, Rong Ma, Qi Li, Biao Jin
{"title":"A Novel Data Secure Deletion Scheme for Mobile Devices","authors":"Minshen Wang, Jinbo Xiong, Rong Ma, Qi Li, Biao Jin","doi":"10.1109/ICCCN.2018.8487366","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487366","url":null,"abstract":"With the widespread adoption of mobile devices, an increasingly number of personal data are stored in mobile devices that using flash memory as storage medium. Personal data privacy may also be leaked because of unauthorized access or resale of mobile devices. How to effectively protect users' data privacy and securely delete invalid data, which brings a great challenge to the data secure deletion in flash memory. In order to tackle these problems, we propose a novel data secure deletion scheme based on key derivation encryption algorithm for mobile devices. Firstly, we construct a node key tree based on flash hierarchical structure, and propose a key derivation encryption algorithm to generate data key to encrypt user data. Furthermore, we combine partial block erasure with partial key deletion method to delete both the ciphertext data and the partial key component after expired. The security analysis shows that the proposed scheme is able to implement data privacy protect and secure deletion of invalid data. Performance analysis and experimental results indicate that the proposed scheme is effective and efficient.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134240613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Pricing Based Cost-Aware Dynamic Resource Management for Cooperative Cloudlets in Edge Computing 边缘计算中基于价格感知的协同云资源动态管理
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487452
Xili Wan, Jia Yin, Xinjie Guan, Guangwei Bai, Baek-Young Choi
{"title":"A Pricing Based Cost-Aware Dynamic Resource Management for Cooperative Cloudlets in Edge Computing","authors":"Xili Wan, Jia Yin, Xinjie Guan, Guangwei Bai, Baek-Young Choi","doi":"10.1109/ICCCN.2018.8487452","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487452","url":null,"abstract":"Mobile edge computing (MEC) attracts a growing interests as its benefits for computation intensive and delay sensitive tasks. As an essential component in MEC architecture, cloudlet handles the computing tasks of applications offloaded from mobile devices, and pushes contents close to the mobile users, in order to improve the quality of experience, as well as application deployment and delivery efficiency. Existing work mostly focuses on cloudlet placement and assumes that the capacities of cloudlets are given and fixed, while little work has been done on resource allocation and scheduling among the cloudlets. Aiming to minimize the operator''s cost while preserving user experience, we proposes a pricing based cost-aware dynamic resource management framework (DRMF) for cooperative cloudlets with a centralized controller. Specifically, to stimulate the cooperation between cloudlets and the controller, we formulate the interactions as a Stackelberg game to minimize the cloudlets cost and increase the utility of the cloudlet-based edge computing system by eventually determining the amount of physical resources assigned to each cloudlet during deployment phase and the amount of resources shared among cooperated cloudlets during operation phase. Additionally, two algorithms have been proposed targeting latency-sensitive scenario and computation-intensive scenario, respectively. Evaluations validate the existence of Subgame Perfect Equilibrium (SPE), and show that the dynamic resource management framework could save the cost compared to static allocation.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134447627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Edge Device Centric E-Health Interconnection Architecture 以边缘设备为中心的电子健康互联架构
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487458
W. Liu, E. K. Park, S. S. Zhu, U. Krieger
{"title":"An Edge Device Centric E-Health Interconnection Architecture","authors":"W. Liu, E. K. Park, S. S. Zhu, U. Krieger","doi":"10.1109/ICCCN.2018.8487458","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487458","url":null,"abstract":"This paper presents our edge device centric architecture as a new system solution for internet e-Health objects interconnection and service delivery. The new approach was designed to enable new embedded health objects, to meet the growth in edge devices, to provide secure operations, as well as to establish a new e-Health interactive norms. It is going to enable the Internet of Things in the e-Health industry with diverse edge devices and embedded managed objects being integrated at the core interconnection.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122836587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices 资源受限物联网设备的概率位置估计与模型检验
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487444
Toshifusa Sekizawa, T. Mikoshi, Masataka Nagura, Ryo Watanabe, Qian Chen
{"title":"Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices","authors":"Toshifusa Sekizawa, T. Mikoshi, Masataka Nagura, Ryo Watanabe, Qian Chen","doi":"10.1109/ICCCN.2018.8487444","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487444","url":null,"abstract":"The Internet of Things (IoT) has been applied to home/office, healthcare, intelligent transportation and agriculture systems. The new IoT technology are growing rapidly and will play an essential role in our future societal lifestyle, economy and business. Currently, power hungry and radio wave interference are two big challenges hindering the IoT development. In this study, we propose a Markov localization algorithm to estimate positions of IoT devices considering various gateway allocation scenarios in a widespread and boundaryless field. We adopt the model-checking technique to validate the convergence of positions of the IoT devices. Our approach can accurately identify positions of IoT devices and connect each IoT node to its nearest gateways for sending sensing data and receiving commands from the cloud computing resources. We use a cattle-breeding IoT network as a case study to validate the proposed approach,which reduces IoT power consumption while enhancing the connectivity of the network. Additionally, we also discuss how to apply this simple approach to real-world IoT networks such as smart home and vehicular ad-hoc networks.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128019123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LTE Transmission in Unlicensed Bands: Evaluating the Impact over Clear Channel Assessment 非授权频带的LTE传输:评估对清晰信道评估的影响
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487321
Babak Mafakheri, L. Goratti, R. Riggio, C. Buratti, S. Reisenfeld
{"title":"LTE Transmission in Unlicensed Bands: Evaluating the Impact over Clear Channel Assessment","authors":"Babak Mafakheri, L. Goratti, R. Riggio, C. Buratti, S. Reisenfeld","doi":"10.1109/ICCCN.2018.8487321","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487321","url":null,"abstract":"Among the significant advances in mobile network technology, as evident in the latest 3GPP releases, one of the most notable is the possibility to do aggregation between licensed and unlicensed carriers. With LTE transmitting over unlicensed bands, obvious concerns of a fair co- existence with other preexisting technologies have risen up. In this study, we aim to evaluate the impact of LTE transmission on the key mechanism of Clear Channel Assessment (CCA), which is common to several unlicensed systems, amongst which Wi-Fi is the most notable. Relying on the statistical tool of stochastic geometry and a semianalytical approach, we will obtain the probabilities of Wi-Fi preamble false alarm and detection under a wide set of realistic propagation effects, such as path-loss and Rayleigh distributed fading. Above all, we will model the effect of a single LTE downlink interfering transmission, as well as the aggregate interference effect. Hence, we shall be able to evaluate the modified energy detection threshold that has been long debated between 3GPP and IEEE 802.11 Working Groups.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RoVEr: Robust and Verifiable Erasure Code for Hadoop Distributed File Systems 面向Hadoop分布式文件系统的健壮且可验证的Erasure Code
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487406
Teng Wang, Son Nam Nguyen, Jiayin Wang, Tengpeng Li, Xiaoqian Zhang, N. Mi, Bin Zhao, B. Sheng
{"title":"RoVEr: Robust and Verifiable Erasure Code for Hadoop Distributed File Systems","authors":"Teng Wang, Son Nam Nguyen, Jiayin Wang, Tengpeng Li, Xiaoqian Zhang, N. Mi, Bin Zhao, B. Sheng","doi":"10.1109/ICCCN.2018.8487406","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487406","url":null,"abstract":"Erasure Coding based Storage (ECS) is replacing tradition replica-based systems because of its low storage overhead. In an ECS, however, every task needs to fetch remote pieces of data for its execution, and data verification is missing in the current framework. As security issues keep rising and there have been security incidents occurred in big data platforms, the compromised nodes in a computing cluster may manipulate its hosted data fed for other nodes yielding misleading results. Without replicas, it is quite challenging to efficiently verify the data integrity in ECS. In this paper, we develop ROVER, which is an efficient and verifiable ECS for big data platforms. In ROVER, every piece of data is monitored by its checksums stored on a set of witnesses. Bloom filter technique is used on each witness to efficiently keep the records of the checksums. The data verification is based on the majority voting. ROVER also supports a quick reconstruction of Bloom Filter when a node recovers from a failure. We present a complete system framework, security analysis, and a guideline for setting the parameters. The implementation and evaluation show that ROVER is robust and efficient against the attack from the compromised nodes.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the Optimal Platform Configuration for Power-Constrained HPC Workflows 探索功率受限HPC工作流的最佳平台配置
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487322
Kun Tang, Xubin He, Saurabh Gupta, Sudharshan S. Vazhkudai, Devesh Tiwari
{"title":"Exploring the Optimal Platform Configuration for Power-Constrained HPC Workflows","authors":"Kun Tang, Xubin He, Saurabh Gupta, Sudharshan S. Vazhkudai, Devesh Tiwari","doi":"10.1109/ICCCN.2018.8487322","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487322","url":null,"abstract":"In high-performance computing (HPC) workflows, data analytics is typically utilized to gain insights from scientific simulations. Approaching the era of exascale, online analysis is gaining popularity due to the savings of I/O to persistent storage. As computing capability keeps growing, power consumption is becoming critical to HPC facilities. Enforcing power limits is emerging as a practical trend for power-constrained HPC facilities. However, it remains unclear how to choose the appropriate power limits for various HPC workflows and how to distribute the power limit of a workflow between simulation and analysis. In addition, given a power limit, it is unclear what the optimal scales and power capping levels are for various workflows, especially when taking reliability into account. In order to resolve these issues in power-constrained HPC, in this paper, we propose a reliability-aware model to determine the aforementioned platform configurations for HPC workflows. We also validate our model and present model-driven studies for a wide range of real-system scenarios. Our study reveals interesting insights about how platform configuration affects the performance and energy efficiency of HPC workflows under power constraints.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117292695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Task Scheduling with Optimized Transmission Time in Collaborative Cloud-Edge Learning 协同云边缘学习中传输时间优化的任务调度
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487352
Yutao Huang, Yifei Zhu, Xiaoyi Fan, Xiaoqiang Ma, Fangxin Wang, Jiangchuan Liu, Ziyi Wang, Yong Cui
{"title":"Task Scheduling with Optimized Transmission Time in Collaborative Cloud-Edge Learning","authors":"Yutao Huang, Yifei Zhu, Xiaoyi Fan, Xiaoqiang Ma, Fangxin Wang, Jiangchuan Liu, Ziyi Wang, Yong Cui","doi":"10.1109/ICCCN.2018.8487352","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487352","url":null,"abstract":"Deep learning has been applied in many recent advanced applications in the field of transportation, finance and medicine. These applications require significant computation resources and large-scale training samples. Cloud becomes a natural choice for conducting these learning tasks due to its abundant resources. However, deeper penetration of deep learning techniques in mission critical applications, like driverless car, calls for stricter time requirement to guarantee its interaction and larger amount of dataset for training to guarantee its accuracy, which cannot be easily satisfied by the cloud and makes the network transmission become the bottleneck. Edge learning emerges to be a promising direction to reduce data transmission time by processing and compressing the raw data at the edge of the network, while brings the concern of accuracy reduction at the meantime. To balance this tradeoff under cloud-edge architecture, we study a task scheduling problem for reducing weighted transmission time which takes learning accuracy into consideration. We also propose efficient scheduling algorithms which are able to achieve up to 50% reduction in makespan with extensive trace-driven simulations.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Multi-Dimension Threat Situation Assessment Based on Network Security Attributes 基于网络安全属性的多维威胁态势评估
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487387
Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
{"title":"Multi-Dimension Threat Situation Assessment Based on Network Security Attributes","authors":"Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv","doi":"10.1109/ICCCN.2018.8487387","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487387","url":null,"abstract":"Cyber-attacks become more and more complex, but the network situation assessment based on log analysis cannot meet the security requirements because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in network. What's more, the most common attacks, identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. The multi-dimension threat situation assessment method based on network security attributes is proposed in this paper. Firstly, it gives an adaptive Common Vulnerability Scoring System (CVSS) calculation, which considers asset value as environment metric. Secondly, it collects deterioration rate of properties by sensors in hosts and network, that aims at assessing the time and level of DDoS attacks. Thirdly, it adopts the distribution of asset value in security attributes considering the features of attacks and network, which aims at assessing and showing the whole situation. Experiments demonstrate that the results show the primary threat and security requirement of network. By comparison and analytic study, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116108758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multicast Rate Adaptation in WLAN via NDN 基于NDN的无线局域网组播速率自适应
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487358
Fa-deng Wu, Wang Yang, Zhenyu Fan, Kaijin Tian
{"title":"Multicast Rate Adaptation in WLAN via NDN","authors":"Fa-deng Wu, Wang Yang, Zhenyu Fan, Kaijin Tian","doi":"10.1109/ICCCN.2018.8487358","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487358","url":null,"abstract":"Multicast rate adaptation in WLAN has become a hot topic from the research community. However, wireless IP multicast lacks in feedback mechanism from the receiver and also no retransmission mechanism from packet loss. To achieve multicast reliability, multicast data is always transmitted at the basic data rate (e.g., 1Mbps for 802.11b). Moreover, wireless NDN multicast is essentially different from traditional wireless IP multicast. NDN multicast composition is based on Pending Interest Table (PIT) state information, which significantly increases the dynamics of the multicast groups. In this paper, we propose a multicast rate adaptation scheme to dynamically select the multicast transmission rate for NDN multicast communication. We present a mapping mechanism between the PIT entry and the MAC address of the station. To reduce the multicast transmission time, we propose a multi-rate multicast transmission scheme for the dynamic NDN multicast groups. In addition, we use the NDN caching mechanism to improve the reliability and reduce the transmission delay when the multicast data loss. Simulation results show that the proposed multicast rate adaptation scheme can effectively reduce transmission time while achieving lower delay and packet loss rate.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信