Journal of Information Security and Applications最新文献

筛选
英文 中文
One multi-receiver certificateless searchable public key encryption scheme for IoMT assisted by LLM 一种基于LLM的IoMT多接收方无证书可搜索公钥加密方案
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-03-07 DOI: 10.1016/j.jisa.2025.104011
Xiaoguang Liu , Peize Liu , Bo Yang , Yizhan Chen
{"title":"One multi-receiver certificateless searchable public key encryption scheme for IoMT assisted by LLM","authors":"Xiaoguang Liu ,&nbsp;Peize Liu ,&nbsp;Bo Yang ,&nbsp;Yizhan Chen","doi":"10.1016/j.jisa.2025.104011","DOIUrl":"10.1016/j.jisa.2025.104011","url":null,"abstract":"<div><div>The Internet of Medical Things (IoMT) has become widely adopted across the healthcare sector, offering transformative benefits. By utilizing a range of wearable medical devices and cloud servers, IoMT enables the rapid transmission of data over networks, which supports timely health monitoring and data-driven decision-making. In recent years, some applications have used the Large Language Model (LLM) to assist in diagnosis, significantly improving diagnostic efficiency in IoMT. However, secure transmission of sensitive medical information remains a key concern. To address this, we propose a multi-receiver certificateless searchable public key encryption (mCLSPE) scheme that leverages proxy re-encryption. This scheme not only addresses the inherent issues in searchable public key encryption (SPE) but also allows for more flexible addition of receivers and enhances data-sharing flexibility. The proposed scheme is proven secure in the random oracle model. The performance analysis shows that it has ideal comprehensive performance. The growth rate of communication overhead with the increase in users is significantly lower compared to other mCLSPE schemes. Finally, we design a specific IoMT assisted by LLM application scenario based on this scheme.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104011"},"PeriodicalIF":3.8,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the effects of neural network-based output prediction attacks on the design of symmetric-key ciphers 基于神经网络的输出预测攻击对对称密钥密码设计的影响
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-03-06 DOI: 10.1016/j.jisa.2025.104016
Hayato Watanabe , Ryoma Ito , Toshihiro Ohigashi
{"title":"On the effects of neural network-based output prediction attacks on the design of symmetric-key ciphers","authors":"Hayato Watanabe ,&nbsp;Ryoma Ito ,&nbsp;Toshihiro Ohigashi","doi":"10.1016/j.jisa.2025.104016","DOIUrl":"10.1016/j.jisa.2025.104016","url":null,"abstract":"<div><div>Proving resistance to conventional attacks, e.g., differential, linear, and integral attacks, is essential for designing a secure symmetric-key cipher. Recent advances in automatic search and deep learning-based methods have made this time-consuming task relatively easy, yet concerns persist over expertise requirements and potential oversights. To overcome these concerns, Kimura et al. proposed neural network-based output prediction (NN) attacks, offering simplicity, generality, and reduced coding mistakes. NN attacks could be helpful for designing secure symmetric-key ciphers, especially the S-box-based block ciphers. Inspired by their work, we first apply NN attacks to <span>Simon</span>, one of the AND-Rotation-XOR-based block ciphers, and identify structures susceptible to NN attacks and the vulnerabilities detected thereby. Next, we take a closer look at the vulnerable structures. The most vulnerable structure has the lowest diffusion property compared to others. This fact implies that NN attacks may detect such a property. We then focus on a biased event of the core function in vulnerable <span>Simon</span>-like ciphers and build effective linear approximations caused by such an event. Finally, we use these linear approximations to reveal that the vulnerable structures are more susceptible to a linear key recovery attack than the original one. We conclude that our analysis can be a solid step toward making NN attacks a helpful tool for designing a secure symmetric-key cipher.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104016"},"PeriodicalIF":3.8,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on machine unlearning: Techniques and new emerged privacy risks 关于机器学习的调查:技术和新出现的隐私风险
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-03-04 DOI: 10.1016/j.jisa.2025.104010
Hengzhu Liu , Ping Xiong , Tianqing Zhu , Philip S. Yu
{"title":"A survey on machine unlearning: Techniques and new emerged privacy risks","authors":"Hengzhu Liu ,&nbsp;Ping Xiong ,&nbsp;Tianqing Zhu ,&nbsp;Philip S. Yu","doi":"10.1016/j.jisa.2025.104010","DOIUrl":"10.1016/j.jisa.2025.104010","url":null,"abstract":"<div><div>The explosive growth of machine learning has made it a critical infrastructure in the era of artificial intelligence. The extensive use of data poses a significant threat to individual privacy. Various countries have implemented corresponding laws, such as GDPR, to protect individuals’ data privacy and the right to be forgotten. This has made machine unlearning a research hotspot in the field of privacy protection in recent years, with the aim of efficiently removing the contribution and impact of individual data from trained models. The research in academia on machine unlearning has continuously enriched its theoretical foundation, and many methods have been proposed, targeting different data removal requests in various application scenarios. However, recently researchers have found potential privacy leakages of various of machine unlearning approaches, making the privacy preservation on machine unlearning area a critical topic. This paper provides an overview and analysis of the existing research on machine unlearning, aiming to present the current vulnerabilities of machine unlearning approaches. We analyze privacy risks in various aspects, including definitions, implementation methods, and real-world applications. Compared to existing reviews, we analyze the new challenges posed by the latest malicious attack techniques on machine unlearning from the perspective of privacy threats. We hope that this survey can provide an initial but comprehensive discussion on this new emerging area.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104010"},"PeriodicalIF":3.8,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143549581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Advancements in multimedia security in the context of artificial intelligence and cloud computing 社论:人工智能和云计算背景下多媒体安全的进展
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-03-01 DOI: 10.1016/j.jisa.2025.103964
Rajeev Kumar, Roberto Caldelli, Wong KokSheik, Ki-Hyun Jung, David Megías
{"title":"Editorial: Advancements in multimedia security in the context of artificial intelligence and cloud computing","authors":"Rajeev Kumar,&nbsp;Roberto Caldelli,&nbsp;Wong KokSheik,&nbsp;Ki-Hyun Jung,&nbsp;David Megías","doi":"10.1016/j.jisa.2025.103964","DOIUrl":"10.1016/j.jisa.2025.103964","url":null,"abstract":"<div><div>The rapid evolution of digital technologies and their seamless integration into everyday life have redefined how we create, share, and consume multimedia content. These advancements, coupled with the unprecedented growth in Artificial Intelligence (AI) and Cloud Computing, have provided users with unparalleled convenience and access to information. However, these innovations have also introduced significant challenges, including unauthorized use, privacy violations, and cyber threats. These issues necessitate advanced solutions to safeguard multimedia data. This special issue focuses on cutting-edge research addressing these challenges, presenting novel methodologies and frameworks to ensure multimedia security and resilience.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103964"},"PeriodicalIF":3.8,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143512055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient image encryption algorithm based on ECC and dynamic S-box 基于ECC和动态s盒的高效图像加密算法
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-02-28 DOI: 10.1016/j.jisa.2025.104004
Ghulam Murtaza , Umar Hayat
{"title":"Efficient image encryption algorithm based on ECC and dynamic S-box","authors":"Ghulam Murtaza ,&nbsp;Umar Hayat","doi":"10.1016/j.jisa.2025.104004","DOIUrl":"10.1016/j.jisa.2025.104004","url":null,"abstract":"<div><div>Image encryption is widely used to convert digital images into an unreadable form when data is transferred through open networks and the internet. However, traditional cryptosystems have small encryption key sizes and are unsuitable for real-time implementation because image pixels have high redundancy and large data capacity. We have designed an image cryptosystem to tackle the issues related to the smaller key size and plaintext attacks. There are three phases of our proposed image cryptosystem. A pseudo-random number generator is used in the first phase to diffuse the pixels of the plain image. A substitution box generator is designed in the second phase to generate substitution boxes with high nonlinearity. The last phase provides an image encryption technique to encrypt grayscale images. The proposed scheme encrypts images with an entropy value close to the optimal value, which increases security. The encryption algorithm requires 0.556 s to encrypt a <span><math><mrow><mn>256</mn><mo>×</mo><mn>256</mn></mrow></math></span> grayscale image. Further, extensive experiments show that the cryptosystem is highly sensitive to the input keys.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104004"},"PeriodicalIF":3.8,"publicationDate":"2025-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143520438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: The design paradigm of safe and secure defaults SoK:安全默认值的设计范例
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-02-26 DOI: 10.1016/j.jisa.2025.103989
Jukka Ruohonen
{"title":"SoK: The design paradigm of safe and secure defaults","authors":"Jukka Ruohonen","doi":"10.1016/j.jisa.2025.103989","DOIUrl":"10.1016/j.jisa.2025.103989","url":null,"abstract":"<div><div>In security engineering, including software security engineering, there is a well-known design paradigm telling to prefer safe and secure defaults. The paper presents a systematization of knowledge (SoK) of this paradigm by the means of a systematic mapping study and a scoping review of relevant literature. According to the mapping and review, the paradigm has been extensively discussed, used, and developed further since the late 1990s. Partially driven by the insecurity of the Internet of things, the volume of publications has accelerated from the circa mid-2010s onward. The publications reviewed indicate that the paradigm has been adopted in numerous different contexts. It has also been expanded with security design principles not originally considered when the paradigm was initiated in the mid-1970s. Among the newer principles are an “off by default” principle, various overriding and fallback principles, as well as those related to the zero trust model. The review also indicates problems developers and others have faced with the paradigm.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 103989"},"PeriodicalIF":3.8,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143487141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MA_BiRAE - Malware analysis and detection technique using adversarial learning and deep learning 使用对抗学习和深度学习的恶意软件分析和检测技术
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-02-25 DOI: 10.1016/j.jisa.2025.104009
Surbhi Prakash, Amar Kumar Mohapatra
{"title":"MA_BiRAE - Malware analysis and detection technique using adversarial learning and deep learning","authors":"Surbhi Prakash,&nbsp;Amar Kumar Mohapatra","doi":"10.1016/j.jisa.2025.104009","DOIUrl":"10.1016/j.jisa.2025.104009","url":null,"abstract":"<div><div>Malware attacks are frequently increasing due to the growing use of handheld gadgets, especially Android phones. Hackers try to access smartphones through a variety of techniques, including the theft of information, tracking, and deceptive advertising. There are various techniques for malware analysis and detection, but some issues, like low performance, computational complexity, overfitting, and so on, have been identified while detecting malware and training data. To address these issues, the proposed technique is designed to achieve efficient malware detection. Initially, data is collected from the Aposemat IoT-23 and Bot-IoT datasets, and the Adaptative Perturbation Pattern Method (Ap2 m) is used to generate constrained adversarial samples. Evasion attacks are used to examine regular adversarial training, while Improved Random Forest (IRF) is used for modeling and fine-tuning. The deep Residual Convolutional Neural Network (deep RCNet) is utilized to extract the features. Finally, the Multi-head Attention-based Bidirectional Residual Autoencoder (MA_BiRAE) model is used for malware detection. The performance of the proposed technique is compared to various existing models to determine its superiority. The proposed technique is evaluated using two datasets: the Aposemat IoT-23 dataset and the Bot-IoT dataset. The proposed technique achieves an accuracy of 99.63% for the Aposemat IoT-23 dataset and 99.11% for the Bot-IoT dataset.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104009"},"PeriodicalIF":3.8,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143478879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible data hiding in encrypted image using bit-plane based label-map encoding with optimal block size 使用最优块大小的基于位平面的标签映射编码在加密图像中隐藏可逆数据
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-02-24 DOI: 10.1016/j.jisa.2025.104005
Ankur , Rajeev Kumar , Ajay K. Sharma
{"title":"Reversible data hiding in encrypted image using bit-plane based label-map encoding with optimal block size","authors":"Ankur ,&nbsp;Rajeev Kumar ,&nbsp;Ajay K. Sharma","doi":"10.1016/j.jisa.2025.104005","DOIUrl":"10.1016/j.jisa.2025.104005","url":null,"abstract":"<div><div>In today’s digital landscape, maintaining the confidentiality and privacy of sensitive information has become an essential requirement. For this, Reversible data hiding in encrypted images (RDHEI) has garnered considerable attention as it enables embedding of large amounts of secret data in encrypted images without requiring knowledge of the original image contents. To further increase the embedding capacity (EC) while maintaining security, this paper presents a new bit-plane-based RDHEI using label-map encoding with optimal block size. The proposed method employs a hybrid predictor to generate a low-magnitude difference image, which is transformed into highly compressible bit-plane-wise label-maps. A novel block-based label-map encoding is also introduced, which optimally represents these label-maps as bit-streams to significantly reduce their size. These bit-streams are embedded in the original encrypted image to guide the data hider, ensuring complete reversibility and lossless extraction at the receiving end. Extensive experimentation shows that the proposed method achieves an average embedding rate of 3.8770 bpp for BOSSBase and 3.7944 bpp for BOWS-2, outperforming state-of-the-art RDHEI methods. Further, the method ensures lossless reconstruction of the original image and error-free extraction of hidden data while demonstrating strong resilience against malicious attacks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104005"},"PeriodicalIF":3.8,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143474283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fed-GWAS: Privacy-preserving individualized incentive-based cross-device federated GWAS learning Fed-GWAS:基于隐私保护的个性化激励跨设备联合GWAS学习
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-02-22 DOI: 10.1016/j.jisa.2025.104002
Omid Torki , Maede Ashouri-Talouki , Mina Alishahi
{"title":"Fed-GWAS: Privacy-preserving individualized incentive-based cross-device federated GWAS learning","authors":"Omid Torki ,&nbsp;Maede Ashouri-Talouki ,&nbsp;Mina Alishahi","doi":"10.1016/j.jisa.2025.104002","DOIUrl":"10.1016/j.jisa.2025.104002","url":null,"abstract":"<div><div>The widespread availability of DNA sequencing technology has led to the genetic sequences of individuals becoming accessible data, creating opportunities to identify the genetic factors underlying various diseases. In particular, Genome-Wide Association Studies (GWAS) seek to identify Single Nucleotide Polymorphism (SNPs) associated with a specific phenotype. Although sharing such data offers valuable insights, it poses a significant challenge due to both privacy concerns and the large size of the data involved. To address these challenges, in this paper, we propose a novel framework that combines both federated learning and blockchain as a platform for conducting GWAS studies with the participation of single individuals. The proposed framework offers a mutually beneficial solution where individuals participating in the GWAS study receive insurance credit to avail medical services while research and treatment centers benefit from the study data. To safeguard model parameters and prevent inference attacks, a secure aggregation protocol has been developed. The evaluation results demonstrate the scalability and efficiency of the proposed framework in terms of runtime and communication, outperforming existing solutions.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 104002"},"PeriodicalIF":3.8,"publicationDate":"2025-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143463734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel improvements and extensions of the extractable results about (leakage-resilient) privacy schemes with imperfect randomness 具有不完全随机性的(弹性泄漏)隐私方案可提取结果的新改进和扩展
IF 3.8 2区 计算机科学
Journal of Information Security and Applications Pub Date : 2025-02-21 DOI: 10.1016/j.jisa.2025.104008
Yanqing Yao , Zhoujun Li
{"title":"Novel improvements and extensions of the extractable results about (leakage-resilient) privacy schemes with imperfect randomness","authors":"Yanqing Yao ,&nbsp;Zhoujun Li","doi":"10.1016/j.jisa.2025.104008","DOIUrl":"10.1016/j.jisa.2025.104008","url":null,"abstract":"<div><div>Traditional cryptographic primitives usually take for granted the availability of perfect randomness. Unfortunately, in reality one must deal with various imperfect randomness (e.g., physical sources, secrets with partial leakage, biometric data). Bosley and Dodis in TCC’07 [BD07] proposed that private-key encryption requires extractable randomness and hoped their result would arouse more interest in exploring the extent to which cryptographic primitives can be grounded on imperfect randomness. Aggarwal et al. in TCC’22 [ACOR22] observed leakage-resilient secret sharing requires extractable randomness. Partially motivated by these, we study improvements and extensions of the extractable results proposed before. We consider the generalized (leakage-resilient) privacy schemes (including encryption, perfectly binding commitment, threshold secret sharing). We get the new results below. Firstly, we explore extractable results about the generalized privacy schemes using two methods: one is an improved and generalized method based on [BD07] by combining different Chernoff Bounds; the other creatively employs Lemma 3 of [ACOR22]. Afterwards, we improve and extend the above results grounded on the Rényi entropy. In particular, (a) substituting the collision entropy for the min-entropy, we obtain tighter bounds than the counterpart of Lemma 3 in [ACOR22]; (b) replacing the min-entropy with the Rényi entropy, we give a tricky and detailed proof for generalized version of Lemma 4 of [ACOR22], while the coupling argument in that proof of [ACOR22] is used directly without explanation, which is unclear and hard to understand. Finally, we propose the extractable results about the generalized leakage-resilient privacy schemes using two methods: one extends Theorem 1(a) of [BD07]; the other uses more generalized, more intuitive, and simpler proof ideas than the counterpart of [ACOR22]. Furthermore, we present concrete and essential restrictions on the parameters by proving the main theorem other than [ACOR22] that proposed unspecific parameters.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 104008"},"PeriodicalIF":3.8,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143452761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信