{"title":"Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application","authors":"Tao Feng, Jie Wang, Lu Zheng","doi":"10.1016/j.pmcj.2024.101990","DOIUrl":"10.1016/j.pmcj.2024.101990","url":null,"abstract":"<div><div>Although the Internet of Things (IoT) brings efficiency and convenience to various aspects of people’s lives, security and privacy concerns persist as significant challenges. Certificateless Signatures eliminate digital certificate management and key escrow issues and can be well embedded in resource-constrained IoT devices for secure access control. Recently, Ma et al. designed an efficient and pair-free certificateless signature (CLS) scheme for IoT deployment. Unfortunately, We demonstrate that the scheme proposed by Ma et al. is susceptible to signature forgery attacks by Type-II adversaries. That is, a malicious-and-passive key generation center (KGC) can forge a legitimate signature for any message by modifying the system parameters without the user’s secret value. Therefore, their identity authentication scheme designed based on vehicular ad-hoc networks also cannot guarantee the claimed security. To address the security vulnerabilities, we designed a blockchain-enhanced and anonymous CLS scheme and proved its security under the Elliptic curve discrete logarithm (ECDL) hardness assumption. Compared to similar schemes, our enhanced scheme offers notable advantages in computational efficiency and communication overhead, as well as stronger security. In addition, a mutual authentication scheme that satisfies the cross-domain scenario is proposed to facilitate efficient mutual authentication and negotiated session key generation between smart devices and edge servers in different edge networks. Performance evaluation shows that our protocol achieves an effective trade-off between security and compute performance, with better applicability in IoT scenarios.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"105 ","pages":"Article 101990"},"PeriodicalIF":3.0,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142318677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salem Garfan , Bilal Bahaa Zaidan , Aws Alaa Zaidan , Sarah Qahtan , Hassan Abdulsattar Ibrahim , Muhammet Deveci , Seifedine Kadry , Sarbast Moslem , Weiping Ding
{"title":"Can smartphones serve as an instrument for driver behavior of intelligent transportation systems research? A systematic review: Challenges, motivations, and recommendations","authors":"Salem Garfan , Bilal Bahaa Zaidan , Aws Alaa Zaidan , Sarah Qahtan , Hassan Abdulsattar Ibrahim , Muhammet Deveci , Seifedine Kadry , Sarbast Moslem , Weiping Ding","doi":"10.1016/j.pmcj.2024.101978","DOIUrl":"10.1016/j.pmcj.2024.101978","url":null,"abstract":"<div><div>The increasing number of road accidents is a major issue in many countries. Studying drivers’ behaviour is essential to identify the key factors of these accidents. As improving sustainability can be reached by improving driving behaviour, this study aimed to review and thoroughly analyse current driver behaviour literature that focuses on smartphones and attempted to provide an understanding of various contextual fields in published studies through different open challenges encountered and recommendations to enhance this vital area. All articles about driver behaviour with the scope of using smartphone were searched systematically in four main databases, namely, IEEE Xplore, ScienceDirect, Scopus and Web of Science, from 2013 to 2023. The final set of 207 articles matched our inclusion and exclusion criteria. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology's utility, authors’ recommendations and substantial analysis of the previous studies are discussed based on five aspects (sample size, developed software, techniques used, smartphone sensor based and, available datasets). A proposed research methodology as new direction is provided to solve the gaps identified in the analysis. As a case study of the proposed methodology, the area of eco-driving behaviour is selected to address the current gaps in this area and assist in advancing it. This systematic review is expected to open opportunities for researchers and encourage them to work on the identified gaps.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"105 ","pages":"Article 101978"},"PeriodicalIF":3.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep reinforcement learning based mobility management in a MEC-Enabled cellular IoT network","authors":"Homayun Kabir , Mau-Luen Tham , Yoong Choon Chang , Chee-Onn Chow","doi":"10.1016/j.pmcj.2024.101987","DOIUrl":"10.1016/j.pmcj.2024.101987","url":null,"abstract":"<div><div>Mobile Edge Computing (MEC) has paved the way for new Cellular Internet of Things (CIoT) paradigm, where resource constrained CIoT Devices (CDs) can offload tasks to a computing server located at either a Base Station (BS) or an edge node. For CDs moving in high speed, seamless mobility is crucial during the MEC service migration from one base station (BS) to another. In this paper, we investigate the problem of joint power allocation and Handover (HO) management in a MEC network with a Deep Reinforcement Learning (DRL) approach. To handle the hybrid action space (continuous: power allocation and discrete: HO decision), we leverage Parameterized Deep Q-Network (P-DQN) to learn the near-optimal solution. Simulation results illustrate that the proposed algorithm (P-DQN) outperforms the conventional approaches, such as the nearest BS +random power and random BS +random power, in terms of reward, HO cost, and total power consumption. According to simulation results, HO occurs almost in the edge point of two BS, which means the HO is almost perfectly managed. In addition, the total power consumption is around 0.151 watts in P-DQN while it is about 0.75 watts in nearest BS +random power and random BS +random power.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"105 ","pages":"Article 101987"},"PeriodicalIF":3.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service placement strategies in mobile edge computing based on an improved genetic algorithm","authors":"Ruijuan Zheng, Junwei Xu, Xueqi Wang, Muhua Liu, Junlong Zhu","doi":"10.1016/j.pmcj.2024.101986","DOIUrl":"10.1016/j.pmcj.2024.101986","url":null,"abstract":"<div><div>In mobile edge computing (MEC), quality of service (QoS) is closely related to optimizing service placement strategies, which is crucial to providing efficient services that meet user needs. However, due to the mobility of users and the energy consumption limit of edge servers, the existing policies make it difficult to ensure the QoS level of users. In this paper, a novel genetic algorithm based on a simulated annealing algorithm is proposed to balance the QoS of users and the energy consumption of edge servers. Finally, the effectiveness of the algorithm is verified by experiments. The results show that the QoS value obtained by the proposed algorithm is closer to the maximum value, which has significant advantages in improving QoS value and resource utilization. In addition, in software development related to mobile edge computing, our algorithm helps improve the program’s running speed.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"105 ","pages":"Article 101986"},"PeriodicalIF":3.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142531087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security protocol for securing notifications about dangerous events in the agglomeration","authors":"Sabina Szymoniak","doi":"10.1016/j.pmcj.2024.101977","DOIUrl":"10.1016/j.pmcj.2024.101977","url":null,"abstract":"<div><p>Our everyday lives cannot function without intelligent devices, which create the so-called Internet of Things networks. Internet of Things devices have various sensors and software to manage the work environment and perform specific tasks without human intervention. Internet of Things networks require appropriate security at various levels of their operation. In this article, we present a new security protocol that protects communication in IoT networks and enables interconnected devices to communicate and exchange information to increase the security of people living in urban agglomerations. The Control Station device evaluates the collected data about events that may threaten the life or health of residents and then notifies the Emergency Notification Center about it. The protocol guarantees the security of devices and transmitted data. We verified this using automatic verification technology, formal verification using Burrows, Abadi and Needham logic and informal analysis. The proposed protocol ensures mutual authentication, anonymity and revocation. Also, it is resistant to Man-in-the-middle, modification, replay and impersonation attacks. Compared to other protocols, our solution uses simple cryptographic techniques that are lightweight, stable and do not cause problems related to high communication costs. It does not require specialist equipment, so we can implement it using typical hardware. At each stage of protocol execution, communication occurs between two entities, so it does not require interaction between different entities, which may limit its adaptability in the context of interoperability.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"105 ","pages":"Article 101977"},"PeriodicalIF":3.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224001020/pdfft?md5=3cef85ebf780a1e504204af1828772d5&pid=1-s2.0-S1574119224001020-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142242827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-aware human activity recognition for wearable devices: A comprehensive review","authors":"Chiara Contoli, Valerio Freschi, Emanuele Lattanzi","doi":"10.1016/j.pmcj.2024.101976","DOIUrl":"10.1016/j.pmcj.2024.101976","url":null,"abstract":"<div><p>With the rapid advancement of wearable devices, sensor-based human activity recognition has emerged as a fundamental research area with broad applications in various domains. While significant progress has been made in this research field, energy consumption remains a critical aspect that deserves special attention. Recognizing human activities while optimizing energy consumption is essential for prolonging device battery life, reducing charging frequency, and ensuring uninterrupted monitoring and functionality.</p><p>The primary objective of this survey paper is to provide a comprehensive review of energy-aware wearable human activity recognition techniques based on wearable sensors without considering vision-based systems. In particular, it aims to explore the state-of-the-art approaches and methodologies that integrate activity recognition with energy management strategies. Finally, by surveying the existing literature, this paper aims to shed light on the challenges, opportunities and potential solutions for energy-aware human activity recognition.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"104 ","pages":"Article 101976"},"PeriodicalIF":3.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224001019/pdfft?md5=3a75aef0c582dd105ddf3b32830e2e31&pid=1-s2.0-S1574119224001019-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jordan Sturtz , Kushal Kalyan Devalampeta Surendranath , Maxwell Sam , Xingang Fu , Chanakya Dinesh Hingu , Rajab Challoo , Letu Qingge
{"title":"Accelerating the neural network controller embedded implementation on FPGA with novel dropout techniques for a solar inverter","authors":"Jordan Sturtz , Kushal Kalyan Devalampeta Surendranath , Maxwell Sam , Xingang Fu , Chanakya Dinesh Hingu , Rajab Challoo , Letu Qingge","doi":"10.1016/j.pmcj.2024.101975","DOIUrl":"10.1016/j.pmcj.2024.101975","url":null,"abstract":"<div><p>Accelerating neural network (NN) controllers is important for improving the performance, efficiency, scalability, and reliability of real-time systems, particularly in resource-constrained embedded systems. This paper introduces a novel weight-dropout method for training neural network controllers in real-time closed-loop systems, aimed at accelerating the embedded implementation for solar inverters. The core idea is to eliminate small-magnitude weights during training, thereby reducing the number of necessary connections while ensuring the network’s convergence. To maintain convergence, only non-diagonal elements of the weight matrices were dropped. This dropout technique was integrated into the Levenberg–Marquardt and Forward Accumulation Through Time algorithms, resulting in more efficient training for trajectory tracking. We executed the proposed training algorithm with dropout on the AWS cloud, observing a performance increase of approximately four times compared to local execution. Furthermore, implementing the neural network controller on the Intel Cyclone V Field Programmable Gate Array (FPGA) demonstrates significant improvements in computational and resource efficiency due to the proposed dropout technique leading to sparse weight matrices. This optimization enhances the suitability of the neural network controller for embedded environments. In comparison to Sturtz et al. (2023), which dropped 11 weights, our approach eliminated 18 weights, significantly boosting resource efficiency. This resulted in a 16.40% reduction in Adaptive Logic Modules (ALMs), decreasing the count to 47,426.5. Combinational Look-Up Tables (LUTs) and dedicated logic registers saw reductions of 17.80% and 15.55%, respectively. However, the impact on block memory bits is minimal, showing only a 1% improvement, indicating that memory resources are less affected by weight dropout. In contrast, the usage of Memory 10 Kilobits (MK10s) dropped from 97 to 87, marking a 10% improvement. We also propose an adaptive dropout technique to further improve the previous results.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"104 ","pages":"Article 101975"},"PeriodicalIF":3.0,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142040615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Angelo Trotta , Federico Montori , Leonardo Ciabattini , Giulio Billi , Luciano Bononi , Marco Di Felice
{"title":"Edge human activity recognition using federated learning on constrained devices","authors":"Angelo Trotta , Federico Montori , Leonardo Ciabattini , Giulio Billi , Luciano Bononi , Marco Di Felice","doi":"10.1016/j.pmcj.2024.101972","DOIUrl":"10.1016/j.pmcj.2024.101972","url":null,"abstract":"<div><p>Human Activity Recognition (HAR) using wearable Internet of Things (IoT) devices represents a well investigated researched field encompassing various application domains. Many current approaches rely on cloud-based methodologies for gathering data from diverse users, resulting in the creation of extensive training datasets. Although this strategy facilitates the application of powerful Machine Learning (ML) techniques, it raises significant privacy concerns, which can become particularly severe given the sensitivity of HAR data. Moreover, the labeling process can be extremely time-consuming and even more challenging for IoT wearable devices due to the absence of efficient input systems. In this paper, we address both aforementioned challenges by designing, implementing, and validating edge-based Human Activity Recognition (HAR) systems that operate on resource-constrained IoT devices, which relies on the utilization of Self-Organizing Maps (SOM) for activity detection. We incorporate a feature selection process before training to reduce data dimensionality and, consequently, the SOM size, aligning with the resource limitations of wearable IoT devices. Additionally, we explore the application of Federated Learning (FL) techniques for HAR tasks, enabling new users to leverage SOM models trained by others on their respective datasets. Our federated Extreme Edge (EE)-aware HAR system is implemented on a wearable IoT device and rigorously tested against state-of-the-art and experimental datasets. The results demonstrate that our C++-based SOM implementation achieves a consistent reduction in model size compared to state-of-the-art approaches. Furthermore, our findings highlight the effectiveness of the FL-based approach in overcoming personalized training challenges, particularly in onboarding scenarios.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"104 ","pages":"Article 101972"},"PeriodicalIF":3.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157411922400097X/pdfft?md5=00c8c39b201e7dc11581a2c5474e3422&pid=1-s2.0-S157411922400097X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142001976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ziran Min , Swapna Gokhale , Shashank Shekhar , Charif Mahmoudi , Zhuangwei Kang , Yogesh Barve , Aniruddha Gokhale
{"title":"Enhancing 5G network slicing for IoT traffic with a novel clustering framework","authors":"Ziran Min , Swapna Gokhale , Shashank Shekhar , Charif Mahmoudi , Zhuangwei Kang , Yogesh Barve , Aniruddha Gokhale","doi":"10.1016/j.pmcj.2024.101974","DOIUrl":"10.1016/j.pmcj.2024.101974","url":null,"abstract":"<div><p>The current extensive deployment of IoT devices, crucial for enhancing smart computing applications in diverse domains, necessitates the utilization of essential 5G features, notably network slicing, to ensure the provision of distinct and reliable services. However, the voluminous, dynamic, and varied nature of IoT traffic introduces complexities in network flow classification, traffic analysis, and the accurate determination of network requirements. These complexities pose a significant challenge in effectively provisioning 5G network slices across various applications. To address this, we propose an innovative approach for network traffic classification, comprising a pipeline that integrates Principal Component Analysis (PCA) with KMeans clustering and the Hellinger distance measure. The application of PCA as the initial step effectively reduces the dimensionality of the data while retaining most of the original information, which significantly lowers the computational demands for the subsequent KMeans clustering phase. KMeans, an unsupervised learning method, eliminates the labor-intensive and error-prone process of data labeling. Following this, a Hellinger distance-based recursive KMeans algorithm is employed to merge similar clusters, aiding in the determination of the optimal number of clusters. This results in final clustering outcomes that are both compact and intuitively interpretable, overcoming the inherent limitations of the traditional KMeans algorithm, such as its sensitivity to initial conditions and the requirement for manually specifying the number of clusters. An evaluation of our method using a real-world IoT dataset has shown that our pipeline can efficiently represent the dataset in three distinct clusters. The characteristics of these clusters can be readily understood and directly correlated with various types of network slices in the 5G network, demonstrating the efficacy of our approach in managing the complexities of IoT traffic for 5G network slice provisioning.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"104 ","pages":"Article 101974"},"PeriodicalIF":3.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000993/pdfft?md5=35a9df2be399c91dc234552871f71dd2&pid=1-s2.0-S1574119224000993-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142001958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiroo Bekku, Taiga Kume, Akira Tsuge, Jin Nakazawa
{"title":"A stable and efficient dynamic ensemble method for pothole detection","authors":"Hiroo Bekku, Taiga Kume, Akira Tsuge, Jin Nakazawa","doi":"10.1016/j.pmcj.2024.101973","DOIUrl":"10.1016/j.pmcj.2024.101973","url":null,"abstract":"<div><p>Roads can develop potholes over time, posing hazards to traffic. However, regular road damage inspections is challenging due to the high cost of road surveys. By applying object detection models on footage acquired from dashboard cameras installed in garbage trucks that operate across the city, we can conduct road surveys at a low cost. In our previous work we introduced the Ensemble of Classification Mechanisms (ECM), which suppresses false positives by cross-verifying objects detected by an object detection model using a different image classification model. However, ECM faces challenges in achieving both fast inference speed and high detection performance simultaneously. It also struggles in environments where roads vary in their suitability for false positive suppression. To address these issues, we propose the Dynamic Ensemble of Classification Mechanisms (DynamicECM). This approach utilizes ECM selectively, enabling stable inference with minimal false positive suppression. To evaluate our new method, we constructed an evaluation dataset comprising objects that cause false positives in pothole detection. Our experiments demonstrate that ECM achieves higher precision, average precision (AP), and F1 scores compared to existing methods. Furthermore, DynamicECM improves the trade-off between speed and detection performance, outperforming ECM, and achieves stable inference even in challenging datasets where ECM would falter. Our method is highly scalable and expected to contribute to the stability and efficiency of inference across various object detection models. In our previous work we developed an Ensemble of Classification Mechanisms (ECM), which suppresses false positives by rechecking objects detected by an object detector with a different image classification model. However, ECM cannot achieve both fast inference speed and high detection performance at the same time. It also struggles in environments that have a mixture of roads suitable for false positive suppression and unsuited for false positive suppression. To solve these problems, we propose “Dynamic Ensemble of Classification Mechanisms”. Since this method uses ECM only when deemed necessary, stable inference can be achieved efficiently without excessive suppression of false positives. In order to evaluate our new method, we constructed an evaluation dataset that includes objects that cause false positives in pothole detection. Our evaluation experiments show that ECM achieves higher precision, AP, and F1 compared to existing methods. In addition, DynamicECM improves the trade-off between speed and detection performance better than ECM, and achieves stable inference on datasets that would ECM would struggle on. Our method is highly scalable and expected to contribute to the stability and efficiency of inference for various object detection models.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"104 ","pages":"Article 101973"},"PeriodicalIF":3.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}