Computer Supported Cooperative Work-The Journal of Collaborative Computing最新文献

筛选
英文 中文
Improving the Quality of Textual Adversarial Examples with Dynamic N-gram Based Attack 基于动态n图的攻击提高文本对抗示例的质量
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152569
Xiaojiao Xie, Pengwei Zhan
{"title":"Improving the Quality of Textual Adversarial Examples with Dynamic N-gram Based Attack","authors":"Xiaojiao Xie, Pengwei Zhan","doi":"10.1109/CSCWD57460.2023.10152569","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152569","url":null,"abstract":"Natural language models have been widely used for their impressive performance in various tasks, while their poor robustness also puts critical applications at high risk. These models are vulnerable to adversarial examples, which contain imperceptible noise that leads the model to wrong predictions. To ensure such malicious examples are imperceptible to humans, various word-level attack methods have been proposed. Previous works on word-level attacks attempt to generate adversarial examples by substituting words in sentences. They utilize different candidate substitution selection methods and substitution strategies to improve attack effectiveness and the quality of generated examples. However, previous works are all unigram-based attack methods, which ignore the connection between words. The unigram nature of these methods downgrades fluency, increases grammatical errors, and biases the semantics of adversarial examples, making adversarial examples easier to be detected by humans. In this paper, to improve the quality of textual adversarial examples and makes the adversarial example more imperceptible to human, we propose a black-box word-level attack method called Dynamic N-Gram Based Attack (DyGram). DyGram tokenizes the entire sentence into multiple n-gram units, rather than individual words as in previous works, and substitutes words in a sentence in descending order of n-gram unit importance. Extensive experiments demonstrate that DyGram achieves higher attack success rates than previous attack methods and improves the quality of generated adversarial examples in terms of the number of perturbed words, perplexity, grammatical correctness, and semantic similarity.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"53 1","pages":"594-599"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81156230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS and Fuzzy Logic Based Communication Handover Strategy in 5G Cellular Internet of Vehicles 基于QoS和模糊逻辑的5G蜂窝车联网通信切换策略
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152793
Bo Li, Zisu Na, Rongrong Qian, Hongwei Ding
{"title":"QoS and Fuzzy Logic Based Communication Handover Strategy in 5G Cellular Internet of Vehicles","authors":"Bo Li, Zisu Na, Rongrong Qian, Hongwei Ding","doi":"10.1109/CSCWD57460.2023.10152793","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152793","url":null,"abstract":"How to ensure the reliability of mixed communication between vehicle to vehicle and vehicle to road, and how to ensure seamless handover during communication in the Internet of Vehicles, is a research hotspot in 5G cellular Internet of Vehicles. This paper proposes a 5G cellular Internet of Vehicles communication handover strategy model for V2V (Vehicle to Vehicle) and V2I (Vehicle to Infrastructure) scenarios, which combines fuzzy logic and user satisfaction for obtaining quality of service, and can make intelligent decisions on handover trigger timing and handover targets based on various parameters in the wireless network, so that the vehicle can handover to the best service target in the process of vehicle terminal handover. The experimental study shows that the proposed method outperforms other common methods in terms of handover metrics such as handover trigger rate, handover times and quality of service compared to existing studies.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"1 1","pages":"1458-1463"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85417101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Subdomain Uncertainty-Guided Kriging Method with Subset Simulation for Reliability Estimation 基于子集仿真的子域不确定性引导Kriging可靠性估计方法
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152591
Dapeng Wang, H. Qiu, L. Gao
{"title":"A Subdomain Uncertainty-Guided Kriging Method with Subset Simulation for Reliability Estimation","authors":"Dapeng Wang, H. Qiu, L. Gao","doi":"10.1109/CSCWD57460.2023.10152591","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152591","url":null,"abstract":"Direct Monte Carlo Simulation for reliability estimation of rare failure event is challenged by the complicated performance function evaluations and large candidate sample pool. To address these challenges, a subdomain uncertainty- guided Kriging method with subset simulation is proposed. With a concise uncertainty assessment function, efficient subdomain uncertainty-guided sampling strategy is first developed to refine the Kriging model that is used to replace real performance function approximately. Moreover, the number of candidate samples required by subset simulation is also significantly reduced. By sequentially exploiting within the candidate sample pools generated in the first intermediate failure event and other intermediate failure events, an accurate Kriging model can be constructed subsequently. The ingenious method of coupling Kriging and subset simulation can greatly improve the efficiency of reliability estimation. Finally, three classical examples are investigated as benchmark to explore the performance of the proposed method. The comparison results demonstrate the good capability and applicability of the proposed method.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"20 1","pages":"1526-1531"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85501965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things in Power Systems: A Bibliometric Analysis 电力系统中的物联网:文献计量学分析
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152802
Yanhao Feng, Xiaojie Lin, Zitao Yu
{"title":"Internet of Things in Power Systems: A Bibliometric Analysis","authors":"Yanhao Feng, Xiaojie Lin, Zitao Yu","doi":"10.1109/CSCWD57460.2023.10152802","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152802","url":null,"abstract":"The Internet of Things (IoT) has gained lots of attention in the past decade and has shown huge potential in the integration of power systems to build a smart grid architecture and to achieve a paradigm transformation. This paper first proposed a typical architecture of IoT in power systems. To reveal the research status, literature development, cooperative relationship, hotspots of techniques, and the research trend, a bibliometric analysis from 1196 papers in the WoS database was done. Finally, several research trends were concluded based on the bibliometric analysis. This paper, for the first time, provided a systematic review of the hotspots in the field of IoT in power systems for more than a decade. Additionally, this paper provided a clear understanding of the history and outlook of the development of the IoT in power systems.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"26 1","pages":"1427-1432"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84605425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic accident location study based on AD-DBSCAN Algorithm with Adaptive Parameters 基于自适应参数AD-DBSCAN算法的交通事故定位研究
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152613
Xijun Zhang, Jin Su, Hong Zhang, Xianli Zhang, Xuanbing Chen, Yong Cui
{"title":"Traffic accident location study based on AD-DBSCAN Algorithm with Adaptive Parameters","authors":"Xijun Zhang, Jin Su, Hong Zhang, Xianli Zhang, Xuanbing Chen, Yong Cui","doi":"10.1109/CSCWD57460.2023.10152613","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152613","url":null,"abstract":"Aiming at the shortcomings of the traditional Density-Based Spatial Clustering of Applications with Noise -DBSCAN algorithm such as insignificant clustering effect and the choice of parameter combinations. This paper proposes an AD-DBSCAN algorithm with adaptive parameters, which makes the algorithm more difficult in the selection of the parameters. By establishing a DBSCAN algorithm model to adapt to finding the optimal distance threshold and the minimum number of neighbor points, the clustering is more accurate, and the noise point identified in the data is more accurate. Through the observation of the calculation model of the Calinski-Harabasz index, the evaluation index of the clustering algorithm, the selection of the optimal best distance threshold and the minimum number of neighborhood points, the accuracy of noise point recognition is improved by 5 times in the clustering algorithm, and the Calinski-Harabasz index improved by about 39.84%. The applicability of the algorithm in clustering the locations of urban road traffic accidents is verified.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"32 1","pages":"1160-1165"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84688528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The trip to WiFi indoor localization across a decade — A systematic review 十年来WiFi室内定位之旅——系统回顾
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152700
Shuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong
{"title":"The trip to WiFi indoor localization across a decade — A systematic review","authors":"Shuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong","doi":"10.1109/CSCWD57460.2023.10152700","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152700","url":null,"abstract":"With the rapid advancement of smartphones and other mobile devices, an ever-increasing desire for wireless indoor localization has emerged. This technology is capable of determining the position of a user or device in an indoor setting and facilitating an array of captivating applications. Due to the low cost and wide availability of WiFi, WiFi-based indoor localization has received considerable attention and has become a prominent research focus in recent times. We have distilled that an ideal WiFi-based indoor localization system is anticipated to meet three criteria: high-accuracy, pervasiveness, and easy-deployment. Nevertheless, it is not a trivial task to satisfy all three criteria simultaneously. This document scrutinizes the key issues, basic models, and current methods for WiFi indoor localization with the objective of highlighting the underlying principles and challenges. Finally, this manuscript pinpoints the prospective research paths for WiFi indoor localization.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"R-27 1","pages":"642-647"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84747513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-scale Convolutional Feature Approximation for Defocus Blur Detection 散焦模糊检测的多尺度卷积特征逼近
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152667
Rui Huang, Huan Lu, Yan Xing, Wei Fan
{"title":"Multi-scale Convolutional Feature Approximation for Defocus Blur Detection","authors":"Rui Huang, Huan Lu, Yan Xing, Wei Fan","doi":"10.1109/CSCWD57460.2023.10152667","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152667","url":null,"abstract":"Deep learning technology has promoted the performance of defocus blur detection. However, blur detectors suffer from background clutter, scale ambiguity and blurred boundaries of the defocus blur regions. To conquer these issues, previous methods propose to use multi-scale image patches or images for blur detection, which costs much computation time. In this paper, we propose a deep neural network that takes a single-scale image as input to generate robust defocus blur detection. Specifically, we first extract multi-scale convolutional features by a feature extraction network. And then we resize the convolutional features of each layer by a fixed ratio to approximate convolutional features that extracted from a resized image with the same ratio. By approximation, it not only generates features extracted from a scaled image but also reduces the computation of feature extraction from multi-scale images. We concatenate the features extracted from the original image with the approximated features at the corresponding layers by convolutional layers to increase the blur distinguish ability. We gradually fuse the convolutional features from top-to-bottom by Conv-LSTMs to refine the blur predictions. We compare our method with nine state-of-the-art defocus blur detectors on two defocus blur detection benchmark datasets. Experiment results demonstrate the effectiveness of our proposed defocus blur detector.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"156 1","pages":"1172-1177"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79876407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Social Relations with Graph-Based and Global Attention 用基于图和全局关注的方法理解社会关系
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152575
Hanqing Li, Niannian Chen
{"title":"Understanding Social Relations with Graph-Based and Global Attention","authors":"Hanqing Li, Niannian Chen","doi":"10.1109/CSCWD57460.2023.10152575","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152575","url":null,"abstract":"Social relations, as the basic relationships in our daily life, are a phenomenon unique to human society that shows how people interact in society. Social relations understanding is to infer the existing social relationships between individuals in a given scenario, which is crucial for us to analyze social behavior. Existing research methods are usually limited to extracting features of characters and related entities, which limits the scope of attention and may miss important clues such as interactions between characters. In this paper, we propose a global attention mechanism that adaptively grasps scenes, objects, and human interactions for reasoning about social relationships. We propose an end-to-end global attention network, which consists of three modules, namely, a convolutional attention module, a graph inference module, and an attentional inference module. The visual and location information is first extracted by the convolutional attention module as the feature information of the person pairs, then it is made to process the relationships between character nodes on the graph inference network, and finally, the attention is fully utilized to classify the social relationships. Extensive experiments on the PISC and PIPA datasets show that our proposed method outperforms the state-of-the-art methods in terms of accuracy.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"1 1","pages":"41-46"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80530826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covertness Analysis of Snowflake Proxy Request 雪花代理请求的隐蔽性分析
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152736
Yibo Xie, Gaopeng Gou, G. Xiong, Zhuguo Li, Mingxin Cui
{"title":"Covertness Analysis of Snowflake Proxy Request","authors":"Yibo Xie, Gaopeng Gou, G. Xiong, Zhuguo Li, Mingxin Cui","doi":"10.1109/CSCWD57460.2023.10152736","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152736","url":null,"abstract":"Snowflake is a special proxy system against IP-based network blocking. As its IP addresses refresh frequently, faster than IP blacklist’s update, users can exploit it to access blocked websites. To block snowflake, existing methods focus on detecting snowflake proxies. But they are susceptible to various factors, for example, proxy’s location and version. In the paper, we propose a new manner to block snowflake. We observe that to adapt fast IP changes, users need to request latest proxies from proxy database before using snowflake. Thus, adversaries can block snowflake by detecting proxy request instead of proxy itself. To verify our method, we analyse covertness of snowflake proxy requests, that has been protected by imitating normal web requests. After comparing with typical web requests, we find the imitation is vulnerable in packet size, direction, time and network speed, such as, the latency time is higher than normal obviously. Using the four vulnerabilities, we train machine learning algorithm to detect snowflake proxy requests in reality. Experimental results demonstrate that proxy request can be detected accurately across different versions at the beginning of connection. In conclusion, our work paves a new way to block snowflake.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"21 1","pages":"1802-1807"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73063725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial and Channel Exchange based on EfficientNet for Detecting Changes of Remote Sensing Images 基于effentnet的遥感图像变化检测空间与信道交换
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152771
Renfang Wang, Zijian Yang, Hong Qiu, X. Liu, Dun Wu
{"title":"Spatial and Channel Exchange based on EfficientNet for Detecting Changes of Remote Sensing Images","authors":"Renfang Wang, Zijian Yang, Hong Qiu, X. Liu, Dun Wu","doi":"10.1109/CSCWD57460.2023.10152771","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152771","url":null,"abstract":"Change detection is an important branch in remote sensing image processing. Deep learning has been widely used in this field. In particular, a wide variety of attention mechanisms have made great achievements. However, some models have become increasingly complex and large, often unfeasible for edge applications. This poses a major obstacle to industrial applications. In this paper, to solve the above challenges, we propose a Lightweight network structure to improve results while taking into account efficiency. Specifically, first, the shallow features are extracted by using the spatial exchange and change exchange of the down-sampling bi-temporal channel of the three-layer EfficientNet backbone network, and then the shallow features are used for low-dimensional skip-connection. After that, a hybrid dual-temporal data module is designed to mix the dual-temporal phase into a single image, then the high-dimensional low-pixel image is restored through the up-sampling. Finally the final change map is generated through the pixel-level classifier. Our method was evaluated on public datasets by evaluation indicators such as OA, IoU, F1, Recall, Precision.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"8 1","pages":"1595-1600"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73225305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信