ACM Transactions on Internet Technology最新文献

筛选
英文 中文
Providing Realtime Support for Containerized Edge Services 为容器化边缘服务提供实时支持
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-09-04 DOI: 10.1145/3617123
Wenzhao Zhang, Yi Gao, Wei Dong
{"title":"Providing Realtime Support for Containerized Edge Services","authors":"Wenzhao Zhang, Yi Gao, Wei Dong","doi":"10.1145/3617123","DOIUrl":"https://doi.org/10.1145/3617123","url":null,"abstract":"Containers have emerged as a popular technology for edge computing platforms. Although there are varieties of container orchestration frameworks, e.g., Kubernetes to provide high-reliable services for cloud infrastructure, providing real-time support at the containerized edge systems (CESs) remains a challenge. In this paper, we propose EdgeMan, a holistic edge service management framework for CESs, which consists of (1) a model-assisted event-driven lightweight online scheduling algorithm to provide request-level execution plans; (2) a bottleneck-metric-aware progressive resource allocation mechanism to improve resource efficiency. We then build a testbed that installed three containerized services with different latency sensitivities for concrete evaluation. Besides, we adopt real-world data traces from Alibaba and Twitter for large-scale emulations. Extensive experiments demonstrate that the deadline miss ratio of time-sensitive services run with EdgeMan is reduced by 85.9% on average compared with that of existing methods in both industry and academia.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"1 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42734023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City 智慧城市无人机与5G边缘计算协同热点数据采集
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-08-23 DOI: 10.1145/3617373
Pei-Cheng Song, Jeng-Shyang Pan, H. Chao, S. Chu
{"title":"Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City","authors":"Pei-Cheng Song, Jeng-Shyang Pan, H. Chao, S. Chu","doi":"10.1145/3617373","DOIUrl":"https://doi.org/10.1145/3617373","url":null,"abstract":"The construction and governance of smart cities require the collaboration of different systems and different regions. How to realize the monitoring of abnormal hot spots through the collaboration of subsystems with limited resources is related to the stability and efficiency of the city. This work constructs a hot data processing framework for drones and 5G edge computing infrastructure, as well as an Ensemble Multi-Objective Cooperative Learning (EMOCL) method to process three different types of hot data. The data collection phase combines set operations with the 0-1 multi-knapsack model, and the cooperative learning phase realizes the degree of cooperation control while retaining the ability of independent optimization of the subsystem. Finally, the advantages of the framework are verified by hot data coverage and collaborative processing efficiency, resource use cost and balance.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48410095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Zero Trust Cybersecurity in the Internet of Things 基于区块链的物联网零信任网络安全
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-08-21 DOI: 10.1145/3594535
Shancang Li, Surya Nepal, T. Tryfonas, Hongwei Li
{"title":"Blockchain-based Zero Trust Cybersecurity in the Internet of Things","authors":"Shancang Li, Surya Nepal, T. Tryfonas, Hongwei Li","doi":"10.1145/3594535","DOIUrl":"https://doi.org/10.1145/3594535","url":null,"abstract":"The Internet of Things (IoT) connects a massive number of smart devices to the Internet, in which all data, applications, devices, and users require connectivity, security, and trust. Traditional security approaches assume that all participants within the network perimeter are trustworthy. However, in IoT environment data, applications, devices, and users are gradually moving outside the traditional trusted defence perimeter and have become a source of security risks. Unlike traditional security approaches, which are initially designed for the optimum protection and only act if a process is malicious, the zero-trust security framework upholds the “verify and never trust” principle. Zero trust-based approaches assume that everything within the system is untrustworthy and needs to be verified to prevent threats. Meanwhile, the blockchain technology shows promises on cyber security and several blockchain security mechanisms have been developed, including access management, user authentication, and transaction security. Due to its prowess in enhancing cyber security, blockchain can provide zero trust security framework with highly accessible and transparent security mechanisms via a visible blockchain, in which all transactions are visible to restricted operators. Zero-trust models can be secured further by a blockchain due to its sheer immutable nature and blockchain technology is expected to recognise them, authenticate their trust, and allow them access. Blockchain-enabled zero trust security can detect suspicious online transaction, isolate connection, and restrict access to the user. This special issue received in total 37 high-quality submissions. Per journal policy, it was ensured that handling editors did not have any potential conflict of interest with authors of submitted papers. All submitted papers were reviewed by at least three independent potential referees. The papers were evaluated for their rigor and quality, and also for their relevance to the theme of our special issue. After evaluating the overall scores, seven papers were selected by the guest editors and approved by the Editor-in-Chief for inclusion in this special issue. We will now briefly introduce the accepted papers.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 3"},"PeriodicalIF":5.3,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45223585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds 伪装网:安全的图像外包机密模型训练在云
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-07-15 DOI: 10.1145/3609506
Keke Chen, Yuechun Gu, Sagar Sharma
{"title":"DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds","authors":"Keke Chen, Yuechun Gu, Sagar Sharma","doi":"10.1145/3609506","DOIUrl":"https://doi.org/10.1145/3609506","url":null,"abstract":"Large training data and expensive model tweaking are standard features of deep learning with images. As a result, data owners often utilize cloud resources to develop large-scale complex models, which also raises privacy concerns. Existing cryptographic solutions for training deep neural networks (DNNs) are too expensive, cannot effectively utilize cloud GPU resources, and also put a significant burden on client-side pre-processing. This article presents an image disguising approach: DisguisedNets, which allows users to securely outsource images to the cloud and enables confidential, efficient GPU-based model training. DisguisedNets uses a novel combination of image blocktization, block-level random permutation, and block-level secure transformations: random multidimensional projection (RMT) or AES pixel-level encryption (AES) to transform training data. Users can use existing DNN training methods and GPU resources without any modification to training models with disguised images. We have analyzed and evaluated the methods under a multi-level threat model and compared them with another similar method—InstaHide. We also show that the image disguising approach, including both DisguisedNets and InstaHide, can effectively protect models from model-targeted attacks.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 26"},"PeriodicalIF":5.3,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43414514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds 伪装网:安全的图像外包机密模型训练在云
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-07-15 DOI: https://dl.acm.org/doi/10.1145/3609506
Keke Chen, Yuechun Gu, Sagar Sharma
{"title":"DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds","authors":"Keke Chen, Yuechun Gu, Sagar Sharma","doi":"https://dl.acm.org/doi/10.1145/3609506","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3609506","url":null,"abstract":"<p>Large training data and expensive model tweaking are standard features of deep learning with images. As a result, data owners often utilize cloud resources to develop large-scale complex models, which also raises privacy concerns. Existing cryptographic solutions for training deep neural networks (DNNs) are too expensive, cannot effectively utilize cloud GPU resources, and also put a significant burden on client-side pre-processing. This paper presents an image disguising approach: DisguisedNets that allows users to securely outsource images to the cloud and enables confidential, efficient GPU-based model training. DisgisedNets use a novel combination of image blocktization, block-level random permutation, and block-level secure transformations: random multidimensional projection (RMT) or AES pixel-level encryption (AES) to transform training data. Users can use existing DNN training methods and GPU resources without any modification to training models with disguised images. We have analyzed and evaluated the methods under a multi-level threat model and compared them with another similar method – InstaHide. We also show that the image disguising approach, including both DisguisedNets and InstaHide, can effectively protect models from model-targeted attacks.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"19 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An End-to-End Trust Management Framework for Crowdsourced IoT Services 面向众包物联网服务的端到端信任管理框架
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-06-01 DOI: https://dl.acm.org/doi/10.1145/3600232
Mohammed Bahutair, Athman Bouguettaya
{"title":"An End-to-End Trust Management Framework for Crowdsourced IoT Services","authors":"Mohammed Bahutair, Athman Bouguettaya","doi":"https://dl.acm.org/doi/10.1145/3600232","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3600232","url":null,"abstract":"<p>We propose a novel end-to-end trust management framework for crowdsourced IoT services. The framework targets three main aspects: <i>trust assessment</i>, <i>trust information credibility and accuracy</i>, and <i>trust information storage</i>. We harness the <i>usage patterns</i> of IoT consumers to offer a trust assessment that <i>adapts</i> to IoT consumers’ uses. Additionally, our framework ascertains the <i>credibility</i> and <i>accuracy</i> of trust-related information before trust assessment. This is achieved by validating the data collected by IoT consumers and providers. In addition, our framework ensures the <i>contextual fairness</i> between IoT services and trust information. Moreover, we propose a blockchain-based trust information storage approach. Our proposed storage solution preserves the <i>integrity</i> and <i>availability</i> of trust information.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"67 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An End-to-end Trust Management Framework for Crowdsourced IoT Services 面向众包物联网服务的端到端信任管理框架
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-06-01 DOI: 10.1145/3600232
Mohammed Bahutair, A. Bouguettaya
{"title":"An End-to-end Trust Management Framework for Crowdsourced IoT Services","authors":"Mohammed Bahutair, A. Bouguettaya","doi":"10.1145/3600232","DOIUrl":"https://doi.org/10.1145/3600232","url":null,"abstract":"We propose a novel end-to-end trust management framework for crowdsourced Internet of Things (IoT) services. The framework targets three main aspects: trust assessment, trust information credibility and accuracy, and trust information storage. We harness the usage patterns of IoT consumers to offer a trust assessment that adapts to IoT consumers’ uses. Additionally, our framework ascertains the credibility and accuracy of trust-related information before trust assessment. This is achieved by validating the data collected by IoT consumers and providers. In addition, our framework ensures the contextual fairness between IoT services and trust information. Moreover, we propose a blockchain-based trust information storage approach. Our proposed storage solution preserves the integrity and availability of trust information.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 32"},"PeriodicalIF":5.3,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43502339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offering Two-Way Privacy for Evolved Purchase Inquiries 为进化的购买查询提供双向隐私
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-05-25 DOI: https://dl.acm.org/doi/10.1145/3599968
Jan Pennekamp, Markus Dahlmanns, Frederik Fuhrmann, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, Klaus Wehrle
{"title":"Offering Two-Way Privacy for Evolved Purchase Inquiries","authors":"Jan Pennekamp, Markus Dahlmanns, Frederik Fuhrmann, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, Klaus Wehrle","doi":"https://dl.acm.org/doi/10.1145/3599968","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3599968","url":null,"abstract":"<p>Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"38 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offering Two-Way Privacy for Evolved Purchase Inquiries 为进化的购买查询提供双向隐私
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-05-25 DOI: 10.1145/3599968
J. Pennekamp, M. Dahlmanns, Frederik Fuhrmann, T. Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, R. Schmitt, Klaus Wehrle
{"title":"Offering Two-Way Privacy for Evolved Purchase Inquiries","authors":"J. Pennekamp, M. Dahlmanns, Frederik Fuhrmann, T. Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, R. Schmitt, Klaus Wehrle","doi":"10.1145/3599968","DOIUrl":"https://doi.org/10.1145/3599968","url":null,"abstract":"Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46352687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services 《计算语言学在多媒体物联网服务中的应用》特刊特邀编辑简介
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2023-05-23 DOI: 10.1145/3591355
Quan Z. Sheng, A. K. Sangaiah, Ankit Chaudhary
{"title":"Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services","authors":"Quan Z. Sheng, A. K. Sangaiah, Ankit Chaudhary","doi":"10.1145/3591355","DOIUrl":"https://doi.org/10.1145/3591355","url":null,"abstract":"The Internet of Multimedia Things (IoMT) [4] is the combination of interfaces, protocols, and associated multimedia-related information, which enables advanced services and applications based on the human-to-device and device-to-device interactions in physical and virtual environments. The rapid growth in multimedia-on-demand traffic that refers to audio, video, and images has drastically shifted on the vision of the Internet of Things (IoT) [1, 5] from scalar to IoMT, which is an integral part of multimedia services such as real-time content delivery, online games, and video conferencing on the global Internet [3, 4]. Complementarily, Computational Linguistics (CL) [2] is an interdisciplinary research field concerned with the processing of languages by computers. Since machine translation began to emerge in the early 1970s, CL has grown and developed exponentially. Nevertheless, the combination of IoT-based multimedia with CL services has received less attention so far and has emerged as a new research paradigm for future computing applications. The future of smart IoMT devices with NLP is more important in real-time systems such as speech understanding, emotion recognition, and home automation. There are several issues and technical challenges that need attention from the research community. The rapid growth of multimedia IoT services (data abstraction, data sharing, data mining) has led the way to incorporating CL techniques to meet its requirements. This special issue presents multimedia IoT services in real-time systems and highlights the open research challenges to get advantageous use of CL.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 3"},"PeriodicalIF":5.3,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43193173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信