Forensic Science International-Digital Investigation最新文献

筛选
英文 中文
A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos 结合频域重构学习的双描述符,用于深度伪造视频中的人脸伪造检测
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-04-18 DOI: 10.1016/j.fsidi.2024.301747
Xin Jin , Nan Wu , Qian Jiang , Yuru Kou , Hanxian Duan , Puming Wang , Shaowen Yao
{"title":"A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos","authors":"Xin Jin ,&nbsp;Nan Wu ,&nbsp;Qian Jiang ,&nbsp;Yuru Kou ,&nbsp;Hanxian Duan ,&nbsp;Puming Wang ,&nbsp;Shaowen Yao","doi":"10.1016/j.fsidi.2024.301747","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301747","url":null,"abstract":"<div><p>Conventional face forgery detectors have primarily relied on image artifacts produced by deepfake video generation models. These methods have performed well when the training and test sets were derived from the same deepfake algorithm, but accuracy and generalizability remain a challenge for diverse datasets. In this study, both supervised and unsupervised approaches are proposed for more accurate detection in in-domain and cross-domain experiments. Specifically, two descriptors are introduced to extract rich information in the spatial domain to achieve higher accuracy. A frequency domain reconstruction module is then included to expand the representation space for facial features. A reconstruction method based on an auto-encoder was also applied to obtain a frequency domain coding vector. In this process, reconstruction learning was sufficient for extracting unknown information, while a combination with classification learning provided essential high-frequency pixel differences between real and fake samples, thus facilitating forgery identification. A series of validation experiments with large-scale benchmark datasets demonstrated that the proposed technique was superior to existing methods.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140605627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of IoT forensic frameworks 物联网取证框架比较研究
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-04-04 DOI: 10.1016/j.fsidi.2024.301748
Haroon Mahmood , Maliha Arshad , Irfan Ahmed , Sana Fatima , Hafeez ur Rehman
{"title":"Comparative study of IoT forensic frameworks","authors":"Haroon Mahmood ,&nbsp;Maliha Arshad ,&nbsp;Irfan Ahmed ,&nbsp;Sana Fatima ,&nbsp;Hafeez ur Rehman","doi":"10.1016/j.fsidi.2024.301748","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301748","url":null,"abstract":"<div><p>Internet of Things (IoT) systems often consist of heterogeneous, resource-constrained devices that generate massive amounts of data. This data is important for assessments, behaviour analysis, and decision-making. However, IoT devices are also susceptible to cyber-attacks, such as information theft, personal device intervention, and privacy invasion. In case of an incident, these devices are subject to digital forensic investigation to identify and analyze crimes and misuse. Over the years, several forensic frameworks and techniques have been proposed to facilitate the investigation of IoT networks and devices, but finding a perfect solution that covers the diversity of IoT devices and networks is still a research challenge.</p><p>In this study, we present a comparative analysis of existing forensic investigation frameworks and identify their strengths and weaknesses in handling forensic challenges of IoT devices. The study uses evaluation metrics of ten important parameters, including heterogeneity, scalability, and chain of custody, to thoroughly audit the effectiveness of these models. Our analysis concludes that the existing investigation frameworks do not cater to all requirements and aspects of IoT forensics. It further highlights the need for standard mechanisms to acquire and analyze digital artifacts in IoT devices.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140346838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Letter to editor regarding article, “digital forensics in healthcare: An analysis of data associated with a CPAP machine” 致编辑的信,内容涉及 "医疗保健领域的数字取证:CPAP机相关数据分析"
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-03-29 DOI: 10.1016/j.fsidi.2024.301749
Nishchal Soni, Chitra Barotia
{"title":"Letter to editor regarding article, “digital forensics in healthcare: An analysis of data associated with a CPAP machine”","authors":"Nishchal Soni,&nbsp;Chitra Barotia","doi":"10.1016/j.fsidi.2024.301749","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301749","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140328041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives 移动取证中的人工智能:现状调查、用例分析和人工智能调整目标
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-03-22 DOI: 10.1016/j.fsidi.2024.301737
Alexandros Vasilaras , Nikolaos Papadoudis , Panagiotis Rizomiliotis
{"title":"Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives","authors":"Alexandros Vasilaras ,&nbsp;Nikolaos Papadoudis ,&nbsp;Panagiotis Rizomiliotis","doi":"10.1016/j.fsidi.2024.301737","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301737","url":null,"abstract":"<div><p>As the capabilities and utility of Artificial Intelligence and Machine Learning systems continue to improve, they are expected to have an increasingly powerful influence in the digital forensic investigation process. The concurrent proliferation of mobile devices and rapid increase of forensic value of related artifacts creates the requirement for a comprehensive review of the current status of artificial intelligence software usage and usefulness in Mobile Forensics. In this context, we conducted a survey to evaluate the characteristics and properties of AI functions in mobile forensic software from the practitioners' perspective and enhance understanding to the work in the field. In this study, we evaluated the performance of image categorization software in digital forensics using a variety of evaluation metrics including accuracy, precision, recall, and F1-score, as well as the confusion matrix. In this research we also identify and integrate theoretical principles to conceptualize an AI Alignment framework pertaining to Mobile Forensics and Digital Forensics in general, in order to accurately determine specific AI strategy objectives and potential solutions to the current technical and administrative landscape. We emphasized the importance of interpretability and transparency in AI systems and the need for a comprehensive approach to understanding the reasoning behind the software's decisions. Additionally, we highlighted the importance of robustness in image categorization software, as well as the consideration of AI governance and standardized procedures concepts. Our results show that the accuracy and robustness of the image categorization software have a significant impact on the outcome of legal cases and that the software should be designed with interpretability, transparency, and robustness in mind. Through the examination of the survey responses, the evaluation of the image categorization software and research literature, we explore existing and potential approaches to aligned Artificial Intelligence and analyze their contribution to the forensic examination of cases.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140187930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video source camera identification using fusion of texture features and noise fingerprint 利用纹理特征和噪声指纹融合技术识别视频源摄像头
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-03-18 DOI: 10.1016/j.fsidi.2024.301746
Tigga Anmol, K. Sitara
{"title":"Video source camera identification using fusion of texture features and noise fingerprint","authors":"Tigga Anmol,&nbsp;K. Sitara","doi":"10.1016/j.fsidi.2024.301746","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301746","url":null,"abstract":"<div><p>In Video forensics, the objective of Source Camera Identification (SCI) is to identify and verify the origin of a video that is under investigation. This aids the investigator to trace the video to its owner or narrow down the search space for identifying the offender. Nowadays, it is easy to record and share videos via internet or social media with smartphones. The availability of sophisticated video editing tools and software allow offenders to modify video's context. Thus, identifying the right source camera that was used to capture the video becomes complicated and strenuous. Existing methods based on video metadata information are no longer reliable as it could be modified or stripped off. Better forensic procedures are therefore required to prove the authenticity and integrity of the video that will be used as evidence in court of law. Certain inherent camera sensor properties such as, subtle traces of Photo Response Non-Uniformity (PRNU) are present in all captured videos due to unnoticeable defect during the manufacture of camera's sensor. These properties are used in SCI to classify devices or models as they are unique. In this work, we focus on SCI from videos or Video Source Camera Identification (VSCI) to verify the authenticity of videos. PRNU can be affected by highly textured content or post-processing when computed from a set of flat field images. To mitigate these effects, Higher Order Wavelet Statistics (HOWS) information from PRNU of a video I-frame is combined with information from two other texture features i.e., Local Binary Pattern (LBP) and Gray Level Co-occurrence Matrix (GLCM). The extracted feature vector is fused via concatenation and fed to Support Vector Machine (SVM) classifier to perform training and testing for VSCI. Experimental evaluation of our proposed method on videos from different publicly available datasets show the effectiveness of our method in terms of accuracy, resource efficiency, and complexity.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140159952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Letter to editor regarding article, “The effects of document's format, size, and storage media on memory forensics” 就文章 "文件格式、大小和存储介质对内存取证的影响 "致编辑的信
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-03-14 DOI: 10.1016/j.fsidi.2024.301745
Nishchal Soni
{"title":"Letter to editor regarding article, “The effects of document's format, size, and storage media on memory forensics”","authors":"Nishchal Soni","doi":"10.1016/j.fsidi.2024.301745","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301745","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140122260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag 电子证据袋:基于梅克尔树的弹性容器,作为通用数字证据袋
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-03-13 DOI: 10.1016/j.fsidi.2024.301725
Jaehyeok Han , Mee Lan Han , Sangjin Lee , Jungheum Park
{"title":"ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag","authors":"Jaehyeok Han ,&nbsp;Mee Lan Han ,&nbsp;Sangjin Lee ,&nbsp;Jungheum Park","doi":"10.1016/j.fsidi.2024.301725","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301725","url":null,"abstract":"<div><p>Unique traits generated automatically or artificially, such as firewall logs, OS event logs, and various metadata, are well hidden in the digital evidence that cannot be easily perceived by the investigator in some cases. Digital data is invisible, and it is necessary that attention is focused on traditional management with integrity because of the involvement of various stakeholders in the secure preservation and analysis of the forensic process. Similar to file formats, digital evidence bags (DEB), such as E01 and L01, are widely used to contain digital data for certain facilities in a raw format, which also include metadata. The DEB can provide a way to obtain data through selective imaging, extracting and collecting only the parts necessary from the extensive data for proof. However, it cannot flexibly handle information obtained from large amounts of data or when sensitive data is involved or destroy superfluous materials that must be protected. Therefore, in this study, we propose a new container format based on the Merkle tree, which is used as a universal DEB. The proposed ECo-Bag can store physical and logical images from the storage medium, bit streams transmitted over networks, file segments in the cloud or distributed system, secondary outcomes, and metadata. Furthermore, it can support operations to destruct or seal the data initially collected while verifying the data integrity and tracking the provenance within the chain of custody. Thus, it is expected to contribute to the elastic management of addition and deletion of evidence in digital investigation and e-discovery.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140122261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some areas where digital forensics can support the addressing of legal challenges linked to forensic genetic genealogy 数字取证可支持应对与法医遗传系谱有关的法律挑战的一些领域
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-03-07 DOI: 10.1016/j.fsidi.2024.301696
Mònika Nogel
{"title":"Some areas where digital forensics can support the addressing of legal challenges linked to forensic genetic genealogy","authors":"Mònika Nogel","doi":"10.1016/j.fsidi.2024.301696","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301696","url":null,"abstract":"<div><p>Forensic genetic genealogy (FGG), also known as investigative genetic genealogy (IGG), produces investigative leads in criminal cases where unidentified DNA is discovered at the crime scene and does not match any profiles in criminal databases. It works by comparing crime scene DNA samples to public or private genealogical databases to identify potential familial relationships and narrow down suspects or identify unknown individuals. Although the fields of FGG and digital forensics (DF) work with different types of evidence and techniques, and consequently develop independently, they share several common characteristics. This study aims to demonstrate that despite their independent development and differences, the experiences of progress in DF field can be utilized in some respects, especially concerning the protection of the rights of the individuals concerned. The aim of this article is to outline some areas where DF can provide assistance in dealing with ethical and social challenges that FGG must address.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140052429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WARNE: A stalkerware evidence collection tool WARNE:跟踪软件证据收集工具
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301677
Philippe Mangeard, Bhaskar Tejaswi, Mohammad Mannan, Amr Youssef
{"title":"WARNE: A stalkerware evidence collection tool","authors":"Philippe Mangeard,&nbsp;Bhaskar Tejaswi,&nbsp;Mohammad Mannan,&nbsp;Amr Youssef","doi":"10.1016/j.fsidi.2023.301677","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301677","url":null,"abstract":"<div><p>Intimate partner violence (IPV) is a form of abuse in romantic relationships, more frequently, against the female partner. IPV can vary in severity and frequency, ranging from emotional abuse or stalking to recurring and severe violent episodes over a long period. Easy access to stalkerware apps helps foster such behaviors by allowing non-tech-savvy individuals to spy on their victims. These apps offer features for discreetly monitoring and remotely controlling compromised mobile devices, thereby infringing the victim's privacy and the security of their data. In this work, we investigate methods for gathering evidence about an abuser and the stalkerware they employ on a victim's device. We develop a semi-automated tool intended for use by investigators, helping them to analyze Android phones for potential threats in cases of IPV stalkerware. As a first step towards this goal, we perform an experimental privacy and security study to investigate currently available stalkerware apps. We specifically study the vectors through which vulnerabilities found in stalkerware apps could be exploited by investigators, allowing them to gather information about the IPV services, IPV abusers, and the victims' stolen data. We then design and implement a tool called <span>WARNE</span>, leveraging the identified flaws to facilitate the information and evidence collection process. In our experiments, we identified 50 unique stalkerware apps and their corresponding download websites that are still reachable, including one available on the Google Play Store. Among these apps, we found 30 that were free or offered a free trial. We enumerated and experimentally verified several invasive capabilities offered by these apps to clearly identify the severe privacy risks posed by them. We also found that most stalkerware apps store private information locally on the compromised device, potentially giving away information about the abuser. Our evidence-gathering tool found data related to the abuser and/or the stalkerware company, such as account credentials, dashboard URLs, and API tokens in 20 apps out of 30 tested apps. We hope our tool will help IPV victims and investigators against the growing threat of stalkerware abuse.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723001968/pdfft?md5=1b6f141e02aa6980d7dac8f91ca37e2d&pid=1-s2.0-S2666281723001968-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FAIRness in digital forensics datasets’ metadata – and how to improve it 数字取证数据集元数据的公平与公正性--以及如何加以改进
IF 2 4区 医学
Forensic Science International-Digital Investigation Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301681
Samuele Mombelli , James R. Lyle , Frank Breitinger
{"title":"FAIRness in digital forensics datasets’ metadata – and how to improve it","authors":"Samuele Mombelli ,&nbsp;James R. Lyle ,&nbsp;Frank Breitinger","doi":"10.1016/j.fsidi.2023.301681","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301681","url":null,"abstract":"<div><p>The availability of research data (datasets) and compliance with FAIR principles—Findability, Accessibility, Interoperability, and Reusability—is critical to progressing digital forensics. This study evaluates metadata completeness and assesses the alignment with the FAIR principles using all 212 datasets from NIST's Computer Forensic Reference DataSet Portal (CFReDS). The findings underscore deficiencies in metadata quality and FAIR compliance, emphasizing the need for improved data management standards. Based on our critical review, we then propose and discuss various approaches to improve the status quo.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723002007/pdfft?md5=178027a9ec5ec54778a3d61f51e304b0&pid=1-s2.0-S2666281723002007-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信