Computer Science Review最新文献

筛选
英文 中文
A systematic review of quantum image processing: Representation, applications and future perspectives 量子图像处理的系统综述:表征、应用和未来展望
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-05-06 DOI: 10.1016/j.cosrev.2025.100763
Umar Farooq , Parvinder Singh , Atul Kumar
{"title":"A systematic review of quantum image processing: Representation, applications and future perspectives","authors":"Umar Farooq ,&nbsp;Parvinder Singh ,&nbsp;Atul Kumar","doi":"10.1016/j.cosrev.2025.100763","DOIUrl":"10.1016/j.cosrev.2025.100763","url":null,"abstract":"<div><div>Quantum image processing uses quantum hardware to revolutionize the storage, recovery, processing, and security of quantum images across diverse applications. Although researchers have explored various facets of quantum image processing, a comprehensive systematic literature review encompassing all domains is essential for theoretical and experimental progress. This article aims to bridge this gap by systematically analyzing advancements in this field, drawing insights from a thorough review of 135 research articles published beyond 2003. Our study examines core components of quantum image processing, such as quantum image representations, advanced algorithms, transformative techniques like Quantum Fourier and Wavelet Transforms, and robust security measures. It further explores the synergy between quantum machine learning and image processing for improved classification and recognition. In addition, the study also discusses the limitations of existing research, summarizes its essential aspects, highlights gaps and challenges, and finally, provides recommendations for future research and innovations.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100763"},"PeriodicalIF":13.3,"publicationDate":"2025-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143906539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review of few-shot object detection on aerial imagery 航空图像上的小镜头目标检测技术综述
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-05-02 DOI: 10.1016/j.cosrev.2025.100760
Khang Nguyen , Nhat-Thanh Huynh , Duc-Thanh Le , Dien-Thuc Huynh , Thi-Thanh-Trang Bui , Truong Dinh , Khanh-Duy Nguyen , Tam V. Nguyen
{"title":"A comprehensive review of few-shot object detection on aerial imagery","authors":"Khang Nguyen ,&nbsp;Nhat-Thanh Huynh ,&nbsp;Duc-Thanh Le ,&nbsp;Dien-Thuc Huynh ,&nbsp;Thi-Thanh-Trang Bui ,&nbsp;Truong Dinh ,&nbsp;Khanh-Duy Nguyen ,&nbsp;Tam V. Nguyen","doi":"10.1016/j.cosrev.2025.100760","DOIUrl":"10.1016/j.cosrev.2025.100760","url":null,"abstract":"<div><div>With the development of technology, drones, and satellites play an important role in human life. Related research problems receive great attention, especially in the computer vision community. Notably, the object detection models on aerial imagery take part in many applications in both civil and military domains. Although it has great potential and has achieved many achievements, it cannot be denied that object detection faces many challenges such as the small size and the quality of training datasets. The few-shot paradigm was explored to tackle that challenge. In this paper, we intensively investigate 55 state-of-the-art few-shot object detection methods using many different learning styles such as meta-learning and transfer learning. Moreover, we analyzed 12 aerial imagery datasets and benchmarked state-of-the-art methods on three popular datasets, namely, DIOR, NWPU VHR-10, and DOTA. These datasets reflect the richness of classes and the complexity of real-world conditions. From the experimental results and analysis, we discuss insights and pave the way to the future outlook of this research.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100760"},"PeriodicalIF":13.3,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143899493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Beauty and the Beast: A survey on process algebras and cybersecurity 美女与野兽:过程代数与网络安全的调查
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-04-23 DOI: 10.1016/j.cosrev.2025.100758
Gabriele Costa, Silvia De Francisci, Rocco De Nicola
{"title":"The Beauty and the Beast: A survey on process algebras and cybersecurity","authors":"Gabriele Costa,&nbsp;Silvia De Francisci,&nbsp;Rocco De Nicola","doi":"10.1016/j.cosrev.2025.100758","DOIUrl":"10.1016/j.cosrev.2025.100758","url":null,"abstract":"<div><div>Process algebras (PAs) provide the mathematical foundation for several verification techniques and have profoundly influenced many areas of computer science. One of the main reasons for their success is their compact yet expressive and flexible syntax, which allows for the modeling of the relevant aspects of computation while abstracting away the irrelevant ones. Cybersecurity is no exception, and most authors acknowledge the importance of PAs in this field. However, estimating the impact of PAs is not trivial.</div><div>In this survey, we consider lines of research that employ PAs to address security problems. Our systematization of knowledge aims to assess and measure the impact of PAs. To achieve this goal, we start by briefly reviewing the evolution of PAs. Then, we analyze the literature by mapping each contribution to three cybersecurity sub-fields: <em>secure development</em>, <em>attack modeling</em>, and <em>vulnerability assessment</em>. Our methodology follows the chronological development of process algebras and identifies the emerging features specifically introduced for dealing with security problems. Although our analysis confirms that PAs have been greatly influential in general, it provides a fine-grained understanding of how PAs have shaped research in cybersecurity. Interestingly, our work highlights that some application areas remain underexplored, thus providing the research community with valuable insights on future directions.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100758"},"PeriodicalIF":13.3,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143864756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on aspect sentiment triplet extraction methods and challenges 面向情感三元提取方法及挑战综述
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-04-23 DOI: 10.1016/j.cosrev.2025.100761
Wang Zou , Xia Sun , Xiaodi Zhao , Jun Feng , Yunfei Long , Yaqiong Xing
{"title":"A survey on aspect sentiment triplet extraction methods and challenges","authors":"Wang Zou ,&nbsp;Xia Sun ,&nbsp;Xiaodi Zhao ,&nbsp;Jun Feng ,&nbsp;Yunfei Long ,&nbsp;Yaqiong Xing","doi":"10.1016/j.cosrev.2025.100761","DOIUrl":"10.1016/j.cosrev.2025.100761","url":null,"abstract":"<div><div>Aspect-based sentiment analysis (ABSA) has gradually become an important technique for mining online reviews and is widely popular across various domains, such as producer–consumer, pharmaceutical reviews, political campaigns, and celebrity popularity. Aspect sentiment triplet extraction (ASTE) is a core technique within the ABSA, as it automatically extracts aspect terms, opinion terms, and sentiment polarity triplets from textual data. Since the ASTE task is a relatively recent research direction, there is still a lack of comprehensive summaries and syntheses of the research in this task. To address this issue, this paper provides a comprehensive introduction to various methods, performance evaluations, challenges, and future research directions for the ASTE task. Specifically, we categorize the current ASTE approaches into six types: Pipeline, End-to-end, Generative, MRC-based, Table-filling, and Span-based methods. Subsequently, we provide a detailed introduction to the characteristics of each method, along with their strengths and weaknesses. Additionally, we organize the performance of these methods on two benchmark datasets, ASTE-Data-v1 and ASTE-Data-v2. Finally, we discuss the challenges faced in current work and potential future directions.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100761"},"PeriodicalIF":13.3,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143859282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages 弥合差距:高资源语言和低资源语言的文档检索技术调查
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-04-16 DOI: 10.1016/j.cosrev.2025.100756
Samreen Kazi , Shakeel Khoja , Ali Daud
{"title":"Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages","authors":"Samreen Kazi ,&nbsp;Shakeel Khoja ,&nbsp;Ali Daud","doi":"10.1016/j.cosrev.2025.100756","DOIUrl":"10.1016/j.cosrev.2025.100756","url":null,"abstract":"<div><div>With the increasing need for efficient document retrieval in low-resource languages (LRLs), traditional retrieval methods struggle to overcome linguistic challenges such as data scarcity, morphological complexity, and orthographic variations. To address this, hybrid and neural ranking approaches have been explored, integrating statistical retrieval with transformer-based models to enhance search accuracy. Unlike high-resource languages, LRL retrieval requires specialized strategies, including cross-lingual retrieval, domain adaptation, and culturally aware search mechanisms. This article provides a comprehensive review of document retrieval in LRLs, covering classical models, deep learning-based techniques, and their adaptation to resource-constrained languages. A structured taxonomy is introduced, classifying retrieval methods based on model architectures, linguistic processing, and ranking strategies.The paper concludes by highlighting key challenges, benchmarking efforts, and future directions for improving retrieval effectiveness in LRLs.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100756"},"PeriodicalIF":13.3,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143833854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey with critical analysis for deepfake speech detection 对深度假语音检测的全面调查和批判性分析
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-04-16 DOI: 10.1016/j.cosrev.2025.100757
Lam Pham , Phat Lam , Dat Tran , Hieu Tang , Tin Nguyen , Alexander Schindler , Florian Skopik , Alexander Polonsky , Hai Canh Vu
{"title":"A comprehensive survey with critical analysis for deepfake speech detection","authors":"Lam Pham ,&nbsp;Phat Lam ,&nbsp;Dat Tran ,&nbsp;Hieu Tang ,&nbsp;Tin Nguyen ,&nbsp;Alexander Schindler ,&nbsp;Florian Skopik ,&nbsp;Alexander Polonsky ,&nbsp;Hai Canh Vu","doi":"10.1016/j.cosrev.2025.100757","DOIUrl":"10.1016/j.cosrev.2025.100757","url":null,"abstract":"<div><div>Thanks to advancements in deep learning, speech generation systems now power a variety of real-world applications, such as text-to-speech for individuals with speech disorders, voice chatbots in call centers, cross-linguistic speech translation, etc. While these systems can autonomously generate human-like speech and replicate specific voices, they also pose risks when misused for malicious purposes. This motivates the research community to develop models for detecting synthesized speech (e.g., fake speech) generated by deep-learning-based models, referred to as the Deepfake Speech Detection task. As the Deepfake Speech Detection task has emerged in recent years, there are not many survey papers proposed for this task. Additionally, existing surveys for the Deepfake Speech Detection task tend to summarize techniques used to construct a Deepfake Speech Detection system rather than providing a thorough analysis. This gap motivated us to conduct a comprehensive survey, providing a critical analysis of the challenges and developments in Deepfake Speech Detection (This work is a part of our projects of STARLIGHT, EUCINF, and DEFAME FAKEs). Our survey is innovatively structured, offering an in-depth analysis of current challenge competitions, public datasets, and the deep-learning techniques that provide enhanced solutions to address existing challenges in the field. From our analysis, we propose hypotheses on leveraging and combining specific deep learning techniques to improve the effectiveness of Deepfake Speech Detection systems. Beyond conducting a survey, we perform extensive experiments to validate these hypotheses and propose a highly competitive model for the task of Deepfake Speech Detection. Given the analysis and the experimental results, we finally indicate potential and promising research directions for the Deepfake Speech Detection task.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100757"},"PeriodicalIF":13.3,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143838005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in image encryption: A comprehensive review of design principles and performance metrics 图像加密的进展:对设计原则和性能指标的全面回顾
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-04-11 DOI: 10.1016/j.cosrev.2025.100759
Biswarup Yogi , Ajoy Kumar Khan
{"title":"Advancements in image encryption: A comprehensive review of design principles and performance metrics","authors":"Biswarup Yogi ,&nbsp;Ajoy Kumar Khan","doi":"10.1016/j.cosrev.2025.100759","DOIUrl":"10.1016/j.cosrev.2025.100759","url":null,"abstract":"<div><div>With the rise of digital image sharing in fields like healthcare, defence, and multimedia, strong image encryption is needed to protect sensitive information. This study provides a detailed overview of the analysis of image encryption algorithms, focusing on their design principles and performance metrics. This study covers different encryption methods, from traditional symmetric and asymmetric to modern chaos-based and quantum encryption. The design principles include substitution-permutation, diffusion, and key generation strategies. They are carefully evaluated to understand their actual input towards achieving high security. This study discusses key performance metrics such as encryption speed, sensitivity to key changes, statistical and differential attacks, computational complexity, and efficiency required to analyze the feasibility of various algorithms in practical applications. Explores issues such as the balance between security and resource limits, scalability, and adaptability to new threats. The analysis highlights the strengths and weaknesses of existing techniques, providing useful insights for developing next-generation encryption methods for specific applications. The combination of theoretical concepts along with performance evaluations presented in this work thus provides a significant and valuable reference source for research and practice aimed at designing effective yet secure image encryption algorithms in this rapidly growing world of technology.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100759"},"PeriodicalIF":13.3,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143815567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on quantum-safe blockchain security infrastructure 量子安全区块链安全基础设施研究
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-04-10 DOI: 10.1016/j.cosrev.2025.100752
Arya Wicaksana
{"title":"A survey on quantum-safe blockchain security infrastructure","authors":"Arya Wicaksana","doi":"10.1016/j.cosrev.2025.100752","DOIUrl":"10.1016/j.cosrev.2025.100752","url":null,"abstract":"<div><div>Security infrastructure is vital in blockchain for its decentralized and distributed characteristics. Blockchain security infrastructure comprises several components: cryptographic algorithms, consensus protocols, key and identity management, network architecture, and smart contract deployment and execution. These components are vulnerable to the advancement of quantum computing and the realization of more powerful quantum computers. Classical security countermeasures used across the entire blockchain security infrastructure are exposed to quantum computing attacks. The exploitation is catastrophic to the sustainability of blockchain research and applications. This paper outlines the blockchain security infrastructure and quantum-safe solutions. The promising quantum-resistant cryptographic algorithms released by the National Institute of Standards and Technology (NIST) are evaluated for their relevance and use in blockchain security infrastructure. This paper also discusses the practical implementation and adoption of quantum-safe solutions for blockchain security infrastructure, including recent developments on the quantum-safe blockchain. The holy grail in adopting quantum-safe solutions for blockchain security infrastructure solutions is without sacrificing scalability and decentralization.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100752"},"PeriodicalIF":13.3,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143807674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques 赋予大型语言模型以边缘智能:边缘高效llm和技术的调查
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-04-09 DOI: 10.1016/j.cosrev.2025.100755
Rui Wang, Zhiyong Gao, Liuyang Zhang, Shuaibing Yue, Ziyi Gao
{"title":"Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques","authors":"Rui Wang,&nbsp;Zhiyong Gao,&nbsp;Liuyang Zhang,&nbsp;Shuaibing Yue,&nbsp;Ziyi Gao","doi":"10.1016/j.cosrev.2025.100755","DOIUrl":"10.1016/j.cosrev.2025.100755","url":null,"abstract":"<div><div>Large language models (LLMs) have showcased exceptional capabilities across various natural language processing (NLP) tasks in recent years, such as machine translation, text summarization, and question answering. Despite their impressive performance, the deployment of these models on edge devices, such as mobile phones, IoT devices, and edge computing nodes, is significantly hindered by their substantial computational and memory requirements. This survey provides a comprehensive overview of the state-of-the-art techniques and strategies for enabling efficient inference of LLMs on edge devices. We explore approaches including the development of small language models (SLMs), model compression techniques, inference optimization strategies, and dedicated frameworks for edge deployment. Our goal is to highlight the advancements and ongoing challenges in this field, offering valuable insights for researchers and practitioners striving to bring the power of LLMs to edge environments.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100755"},"PeriodicalIF":13.3,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143799152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ML-based sensor data deception targeting cyber–physical systems: A review 针对网络物理系统的基于ml的传感器数据欺骗:综述
IF 13.3 1区 计算机科学
Computer Science Review Pub Date : 2025-04-03 DOI: 10.1016/j.cosrev.2025.100753
Nektaria Kaloudi , Jingyue Li
{"title":"The ML-based sensor data deception targeting cyber–physical systems: A review","authors":"Nektaria Kaloudi ,&nbsp;Jingyue Li","doi":"10.1016/j.cosrev.2025.100753","DOIUrl":"10.1016/j.cosrev.2025.100753","url":null,"abstract":"<div><div>The security of cyber–physical systems is crucial due to their critical applications. The increasing success of machine learning (ML) has raised growing concerns about its impact on the cybersecurity of cyber–physical systems. Although several studies have assessed the cybersecurity of cyber–physical systems, there remains a lack of systematic understanding of how ML techniques can contribute to the use of deception on these systems. In this study, we aim to systematize findings on the use of ML for sensor data deception in both attack and defense scenarios. We analyzed 13 offensive and 3 defensive approaches that leverage ML for sensor data deception targeting cyber–physical systems. We summarized the offensive and defensive sensor data deception implementations with impact on cyber–physical systems at the system level, and the mechanisms to defend offensive deception. Additionally, we provide key insights and outline challenges intended to guide future research on defending against ML-based cyber deception in cyber–physical systems.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100753"},"PeriodicalIF":13.3,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143768232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信