2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)最新文献

筛选
英文 中文
Are CAPTCHAs preventing robotic intrusion or accessibility for impaired users? 验证码是否可以防止机器人入侵或受损用户的访问权限?
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045468
Rudy Berton, O. Gaggi, A. Kolasinska, C. Palazzi, Giacomo Quadrio
{"title":"Are CAPTCHAs preventing robotic intrusion or accessibility for impaired users?","authors":"Rudy Berton, O. Gaggi, A. Kolasinska, C. Palazzi, Giacomo Quadrio","doi":"10.1109/CCNC46108.2020.9045468","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045468","url":null,"abstract":"Is the World Wide Web for everyone? Long story short: no and unfortunately it is not only a matter of infrastructures, level of instruction or economic conditions. People affected by visual impairments have often difficulties in navigating web pages for a wide range of reasons. One of the biggest obstacles nowadays is the use of CAPTCHAs, powerful tools against bot attacks but also potential virtual barriers for the aforementioned category of users. In this paper we tested various categories of CAPTCHAs with people affected by visual impairment and not, to understand how discriminatory can be these cybersecurity measures.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation and Analysis of Blockchain Based DApp for Secure Sharing of Students' Credentials 基于区块链的学生证书安全共享DApp的实现与分析
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045196
Raaj Anand Mishra, A. Kalla, Nimer Amol Singh, Madhusanka Liyanage
{"title":"Implementation and Analysis of Blockchain Based DApp for Secure Sharing of Students' Credentials","authors":"Raaj Anand Mishra, A. Kalla, Nimer Amol Singh, Madhusanka Liyanage","doi":"10.1109/CCNC46108.2020.9045196","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045196","url":null,"abstract":"The paper aims to resolve security issues revolving around the sharing of students' credentials by leveraging the blockchain technology. It proposes a novel blockchain-based architecture followed by its implementation as a decentralized application (DApp). Further, the cost & the performance analysis are carried out based on the experiments conducted.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121143648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Network Management - Edge and Cloud Computing The SliceNet Case 网络管理-边缘和云计算
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045678
M. B. Weiss, A. Gavras, Pablo Salva-Garcia, J. Alcaraz-Calero, Qi Wang
{"title":"Network Management - Edge and Cloud Computing The SliceNet Case","authors":"M. B. Weiss, A. Gavras, Pablo Salva-Garcia, J. Alcaraz-Calero, Qi Wang","doi":"10.1109/CCNC46108.2020.9045678","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045678","url":null,"abstract":"The new Fifth-Generation (5G) mobile networks entail next-generation network management solutions to manage both physical and virtual network infrastructures and services. The challenge is to effectively manage the increased complexity due to virtualization and softwarization, whilst attempting to reduce the operational costs for 5G operators. This paper focuses on the approach of the EU Horizon 2020 5G-PPP project SliceNet to meet this challenge. SliceNet is implementing an intelligence-based autonomic end-to-end slicing-friendly infrastructure for 5G networks. The paper describes SliceNet's virtualized Mobile/Multi-access Edge Computing (MEC) infrastructure segment as a solution to manage the combination of edge and cloud computing for the new services emerging on the vertical industries as part of the new 5G mobile networks. It presents the vision and recent development of the project on the MEC part of the architecture, and the artificial intelligence approach being investigated in the project. Moreover, the paper introduces three representative use cases to describe how the framework organizes between cloud and edge. These use cases show how the MEC and cloud computing can be combined for services in e-health, smart-grids, and smart-cities verticals.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116569242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Do Conversational Interfaces Kill Web Accessibility? 会话界面会扼杀网页可访问性吗?
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045477
M. Furini, S. Mirri, M. Montangero, Catia Prandi
{"title":"Do Conversational Interfaces Kill Web Accessibility?","authors":"M. Furini, S. Mirri, M. Montangero, Catia Prandi","doi":"10.1109/CCNC46108.2020.9045477","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045477","url":null,"abstract":"Conversational interfaces are making web accessibility studies obsolete. Long-time has passed since the introduction of graphical interfaces. They revolutionized the way people used the computer. The desktop metaphor popularized and made easy access to the software but did not consider the specific needs of people with some form of sight and/or motion impairments. Accessibility, at that time, was a minor issue. The web changed everything and empathized the need to include people. Researchers from around the world began working on accessibility, which is still an issue on the agenda of many scientific labs. Despite this, we observe that today, with the diffusion of conversational interfaces, there is less need to bother about colors, fonts, size and many other visual features. Indeed, people might access to web contents through voice interaction. No need to see the graphic interface or to use input devices requiring the use of hands. The voice is everything you need, and accessibility has never been easier. Conversational interfaces are about to revolutionize accessibility and in this provocative paper, we show benefits, problems, and open issues that happen when these interfaces meet accessibility requirements.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Spectrum Reuse among Aerial and Ground Users in mmWave Cellular Networks in Urban Settings 城市毫米波蜂窝网络中空中和地面用户的频谱重用
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045290
Simran Singh, Sri Latha Sunkara, Ismail Güvenç, Arupjyoti Bhuyan, H. Dai, M. Sichitiu
{"title":"Spectrum Reuse among Aerial and Ground Users in mmWave Cellular Networks in Urban Settings","authors":"Simran Singh, Sri Latha Sunkara, Ismail Güvenç, Arupjyoti Bhuyan, H. Dai, M. Sichitiu","doi":"10.1109/CCNC46108.2020.9045290","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045290","url":null,"abstract":"To address the demands for more capacity and higher data rates, the fifth generation network (5G) technology is being developed and gradually rolled out by major cellular carriers. Millimeter wave (mmWave) systems and unmanned aerial vehicles (UAVs) are two critical enablers of 5G. To ease the integration of 5G into existing networks, it is essential to study how base stations (BSs) can be used to serve both ground and aerial users simultaneously in a mmWave network. In this work, we consider BSs equipped with two antennas- one tilted down to serve ground users and another tilted up to serve aerial users. Using ray tracing simulations, we investigate the ideal tilt of these two antennas. Our results indicate that reusing the spectrum effectively in urban environments requires an understanding of the interplay between the effects of shadowing due to buildings, ground reflections, beam orientation, BS separation, interference between the two beams, and UAV heights. Specifically, to simultaneously serve UAVs at a height of 200 m and ground users, it is desirable to use a BS equipped with one antenna tilted up at 30 degrees and another tilted down at of 10 degrees. This achieves the best compromise between the above effects for the simulation configuration considered in this paper. Further, it was observed that the aerial and ground users are, in some scenarios, actually better served by the antenna not meant for them.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122484771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
TOM: a self-trained Tomography solution for Overlay networks Monitoring TOM:用于覆盖网络监测的自训练断层扫描解决方案
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045301
M. Rahali, Jean-Michel Sanner, G. Rubino
{"title":"TOM: a self-trained Tomography solution for Overlay networks Monitoring","authors":"M. Rahali, Jean-Michel Sanner, G. Rubino","doi":"10.1109/CCNC46108.2020.9045301","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045301","url":null,"abstract":"Network tomography is a discipline that aims to infer the internal network characteristics from end-to-end correlated measurements performed at the network edge. This work presents a new tomography approach for link metrics inference in an SDN/NFV environment (even if it can be exported outside this field) that we called TOM (Tomography for Overlay networks Monitoring). In such an environment, we are particularly interested in supervising network slicing, a recent tool enabling to create multiple virtual networks for different applications and QoS constraints on a Telco infrastructure. The goal is to infer the underlay resources states from the measurements performed in the overlay structure. We model the inference task as a regression problem that we solve following a Neural Network approach. Since getting labeled data for the training phase can be costly, our procedure generates artificial data for the training phase. By creating a large set of random training examples, the Neural Network learns the relations between the measures done at path and link levels. This approach takes advantage of efficient Machine Learning solutions to solve a classic inference problem. Simulations with a public dataset show very promising results compared to statistical-based methods. We explored mainly additive metrics such as delays or logs of loss rates, but the approach can also be used for non-additive ones such as bandwidth.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Cooperative Physical Layer Scene-Awareness Scheme for Visible Light Communications 一种用于可见光通信的协同物理层场景感知方案
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045589
Hamid Hosseinianfar, M. Brandt-Pearce
{"title":"A Cooperative Physical Layer Scene-Awareness Scheme for Visible Light Communications","authors":"Hamid Hosseinianfar, M. Brandt-Pearce","doi":"10.1109/CCNC46108.2020.9045589","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045589","url":null,"abstract":"In this paper, we develop an object detection method that takes advantage of the blockage status of line-of sight (LOS) links between the user devices and transceivers on the ceiling to locate an object. The target objects are modeled as cylinders with random radii. Simulation results show that the root-mean-squared error can be less than 2 cm and 1 cm for estimating the center and the radius of the object, respectively.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134294378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A blockchain-based mechanism for secure data exchange in smart grid protection systems 智能电网保护系统中基于区块链的安全数据交换机制
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045368
Dimitrios Sikeridis, A. Bidram, M. Devetsikiotis, M. Reno
{"title":"A blockchain-based mechanism for secure data exchange in smart grid protection systems","authors":"Dimitrios Sikeridis, A. Bidram, M. Devetsikiotis, M. Reno","doi":"10.1109/CCNC46108.2020.9045368","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045368","url":null,"abstract":"Distribution and transmission protection systems are considered vital parts of modern smart grid ecosystems due to their ability to isolate faulted segments and preserve the operation of critical loads. Current protection schemes increasingly utilize cognitive methods to proactively modify their actions according to extreme power system changes. However, the effectiveness and robustness of these information-driven solutions rely entirely on the integrity, authenticity, and confidentiality of the data and control signals exchanged on the underlying relay communication networks. In this paper, we outline a scalable adaptive protection platform for distribution systems, and introduce a novel blockchain-based distributed network architecture to enhance data exchange security among the smart grid protection relays. The proposed mechanism utilizes a tiered blockchain architecture to counter the current technology limitations providing low latency with better scalability. The decentralized nature removes singular points of failure or contamination, enabling direct secure communication between smart grid relays. We also present a security analysis that demonstrates how the proposed framework prohibits any alterations on the blockchain ledger providing integrity and authenticity of the exchanged data (e.g., realtime measurements/relay settings). Finally, the performance of the proposed approach is evaluated through simulation on a blockchain benchmarking framework with the results demonstrating a promising solution for secure smart grid protection system communication.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Long-Range MIMO Channel Prediction Using Recurrent Neural Networks 基于递归神经网络的远程MIMO信道预测
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045219
Wei Jiang, Mathias Strufe, H. Schotten
{"title":"Long-Range MIMO Channel Prediction Using Recurrent Neural Networks","authors":"Wei Jiang, Mathias Strufe, H. Schotten","doi":"10.1109/CCNC46108.2020.9045219","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045219","url":null,"abstract":"Outdated channel state information (CSI) has a severely negative impact on the performance of a wide variety of adaptive transmission systems. Channel prediction is an effective method that can directly improve the quality of CSI. To realize the full potential of adaptive systems, the prediction horizon should be long enough to at least compensate for the time delay. In this paper, therefore, we focus on the problem of long-range prediction (LRP), i.e., how to forecast fading channels as far ahead as possible. Two different LRP approaches - Multi-Step Prediction and Fading Signal Processing - are proposed for the predictors based on classical Kalman filter and recently proposed recurrent neural networks. As an application example, we present an LRP-aided transmit antenna selection system, whose performance in noisy and correlated channels is evaluated. Numerical results reveal that the RNN predictor can achieve a comparable performance with respect to the classical predictor, while avoiding its drawbacks in parameter estimation and multi-step processing.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114579190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Intelligent and Adaptive Machine Learning-based Algorithm for Power Saving in Mobile Hotspot 基于智能自适应机器学习的移动热点省电算法
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2020-01-01 DOI: 10.1109/CCNC46108.2020.9045535
Kavin Kumar Thangadorai, Raj Kumar Saranappa, Abdus Sarif Ahmed, K. Murugesan, Manbir Singh Soni, Radhika Mundra, Manjunath Neelappa Sataraddi, Srihari Sriram, Varun Singh, B. S. Kumar, Mayuresh Patil, D. Das
{"title":"Intelligent and Adaptive Machine Learning-based Algorithm for Power Saving in Mobile Hotspot","authors":"Kavin Kumar Thangadorai, Raj Kumar Saranappa, Abdus Sarif Ahmed, K. Murugesan, Manbir Singh Soni, Radhika Mundra, Manjunath Neelappa Sataraddi, Srihari Sriram, Varun Singh, B. S. Kumar, Mayuresh Patil, D. Das","doi":"10.1109/CCNC46108.2020.9045535","DOIUrl":"https://doi.org/10.1109/CCNC46108.2020.9045535","url":null,"abstract":"In current Wi-Fi technology trend, Mobile Hotspot (MHS) or Soft Access Point (S-AP) is an integral part of our day-to-day life. At any time, MHS could be enabled as Wi-Fi Hotspot in mobility devices (smart phone, tablet) with cellular backhaul network (3G/4G/5G) and provides Internet access to client devices such as laptop, TV etc. Unlike Wi-Fi Access Point, which is typically a powered device, MHS is enabled as battery-operated device. In addition, MHS consumes higher power and reported as one of the primary Voice of Customer (VoC) issue. Due to high power consumption, many customers are skeptical about MHS feature and its continuous usage. Apart from few literatures, there is no specific IEEE 802.11 standard for MHS and its power management. In this paper, we have proposed a Machine Learning (ML) based Intelligent MHS Power Save (I-MHSPS) algorithm using Wi-Fi parameters such as RSSI, SNR, TX power and channel condition. In addition, we have used other contextual parameters such as client behavior, battery level, application usage and internet backhaul to improve the accuracy of our algorithm. In I-MHSPS, we have proposed Intelligent Transmit Power Control (I-TPC): MHS TX power regulation based on client vicinity, Intelligent Ultra Power Save (I-UPS): Applying different system power level for MHS operation and Intelligent Low Power Encryption (I-LPE): Enabling low power encryption for short range MHS. In our first experiment with I-TPC idea has reduced power consumption by 10-16% approximately when compared to existing methodologies. In second experiment for I-UPS, we have applied different system power levels for MHS operation and achieved power saving around 22% without any performance degradation. Further, in third experiment, using I-LPE method, we have observed the power required for encryption of data packets reduced by 20%.","PeriodicalId":443862,"journal":{"name":"2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115347630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信