Expert Systems最新文献

筛选
英文 中文
A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT) 基于深度学习的物联网(IoT)入侵检测系统综述
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-14 DOI: 10.1111/exsy.13726
Qasem Abu Al‐Haija, Ayat Droos
{"title":"A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT)","authors":"Qasem Abu Al‐Haija, Ayat Droos","doi":"10.1111/exsy.13726","DOIUrl":"https://doi.org/10.1111/exsy.13726","url":null,"abstract":"The proliferating popularity of Internet of Things (IoT) devices has led to wide‐scale networked system implementations across multiple disciplines, including transportation, medicine, smart homes, and many others. This unprecedented level of interconnectivity has introduced new security vulnerabilities and threats. Ensuring security in these IoT settings is crucial for protecting against malicious activities and safeguarding data. Real‐time identification and response to potential intrusions and attacks are essential, and intrusion detection systems (IDS) are pivotal in this process. However, the dynamic and diverse nature of the IoT environment presents significant challenges to existing IDS solutions, which are often based on rule‐based or statistical approaches. Deep learning, a subset of artificial intelligence, has shown great potential to enhance IDS in IoT. Deep learning models can identify complex patterns and characteristics by utilizing artificial neural networks, automatically building hierarchical representations from data. This capability results in more precise and efficient intrusion detection in IoT‐based systems. The primary aim of this survey is to present an extensive overview of the current research on deep learning and IDS in the IoT domain. By examining existing literature, discussing mainstream datasets, and highlighting current challenges and potential prospects, this survey provides valuable insights into the prevailing scenario and future directions for using deep learning in IDS for IoT. The findings from this research aim to enhance intrusion detection techniques in IoT environments and promote the development of more effective antimalware solutions against cyber threats targeting IoT device systems.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142254408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTFDN: An image copy‐move forgery detection method based on multi‐task learning MTFDN:基于多任务学习的图像复制移动伪造检测方法
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-14 DOI: 10.1111/exsy.13729
Peng Liang, Hang Tu, Amir Hussain, Ziyuan Li
{"title":"MTFDN: An image copy‐move forgery detection method based on multi‐task learning","authors":"Peng Liang, Hang Tu, Amir Hussain, Ziyuan Li","doi":"10.1111/exsy.13729","DOIUrl":"https://doi.org/10.1111/exsy.13729","url":null,"abstract":"Image copy‐move forgery, where an image region is copied and pasted within the same image, is a simple yet widely employed manipulation. In this paper, we rethink copy‐move forgery detection from the perspective of multi‐task learning and summarize two characteristics of this problem: (1) Homology and (2) Manipulated traces. Consequently, we propose a multi‐task forgery detection network (MTFDN) for image copy‐move forgery localization and source/target distinguishment. The network consists of a hard‐parameter sharing feature extractor, global forged homology detection (GFHD) and local manipulated trace detection (LMTD) modules. The difference of feature distribution between the GFHD module and the LMTD module is significantly reduced by sharing parameters. Experimental results on several benchmark copy‐move forgery datasets demonstrate the effectiveness of our proposed MTFDN.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142254409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STP‐CNN: Selection of transfer parameters in convolutional neural networks STP-CNN:选择卷积神经网络中的传递参数
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-12 DOI: 10.1111/exsy.13728
Otmane Mallouk, Nour‐Eddine Joudar, Mohamed Ettaouil
{"title":"STP‐CNN: Selection of transfer parameters in convolutional neural networks","authors":"Otmane Mallouk, Nour‐Eddine Joudar, Mohamed Ettaouil","doi":"10.1111/exsy.13728","DOIUrl":"https://doi.org/10.1111/exsy.13728","url":null,"abstract":"Nowadays, transfer learning has shown promising results in many applications. However, most deep transfer learning methods such as <jats:italic>parameter sharing</jats:italic> and <jats:italic>fine‐tuning</jats:italic> are still suffering from the lack of parameters transmission strategy. In this paper, we propose a new optimization model for parameter‐based transfer learning in convolutional neural networks named STP‐CNN. Indeed, we propose a Lasso transfer model supported by a regularization term that controls transferability. Moreover, we opt for the proximal gradient descent method to solve the proposed model. The suggested technique allows, under certain conditions, to control exactly which parameters, in each convolutional layer of the source network, which will be used directly or adjusted in the target network. Several experiments prove the performance of our model in locating the transferable parameters as well as improving the data classification.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142206574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Label distribution learning for compound facial expression recognition in‐the‐wild: A comparative study 用于野外复合面部表情识别的标签分布学习:比较研究
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-10 DOI: 10.1111/exsy.13724
Afifa Khelifa, Haythem Ghazouani, Walid Barhoumi
{"title":"Label distribution learning for compound facial expression recognition in‐the‐wild: A comparative study","authors":"Afifa Khelifa, Haythem Ghazouani, Walid Barhoumi","doi":"10.1111/exsy.13724","DOIUrl":"https://doi.org/10.1111/exsy.13724","url":null,"abstract":"Human emotional states encompass both basic and compound facial expressions. However, current works primarily focus on basic expressions, consequently neglecting the broad spectrum of human emotions encountered in practical scenarios. Compound facial expressions involve the simultaneous manifestation of multiple emotions on an individual's face. This phenomenon reflects the complexity and richness of human states, where facial features dynamically convey a combination of feelings. This study embarks on a pioneering exploration of Compound Facial Expression Recognition (CFER), with a distinctive emphasis on leveraging the Label Distribution Learning (LDL) paradigm. This strategic application of LDL aims to address the ambiguity and complexity inherent in compound expressions, marking a significant departure from the dominant Single Label Learning (SLL) and Multi‐Label Learning (MLL) paradigms. Within this framework, we rigorously investigate the potential of LDL for a critical challenge in Facial Expression Recognition (FER): recognizing compound facial expressions in uncontrolled environments. We utilize the recently introduced RAF‐CE dataset, meticulously designed for compound expression assessment. By conducting a comprehensive comparative analysis pitting LDL against conventional SLL and MLL approaches on RAF‐CE, we aim to definitively establish LDL's superiority in handling this complex task. Furthermore, we assess the generalizability of LDL models trained on RAF‐CE by evaluating their performance on the EmotioNet and RAF‐DB Compound datasets. This demonstrates their effectiveness without domain adaptation. To solidify these findings, we conduct a comprehensive comparative analysis of 12 cutting‐edge LDL algorithms on RAF‐CE, S‐BU3DFE, and S‐JAFFE datasets, providing valuable insights into the most effective LDL techniques for FER in‐the‐wild.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142206575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated learning‐driven dual blockchain for data sharing and reputation management in Internet of medical things 用于医疗物联网数据共享和声誉管理的联邦学习驱动双区块链
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-06 DOI: 10.1111/exsy.13714
Chenquan Gan, Xinghai Xiao, Qingyi Zhu, Deepak Kumar Jain, Akanksha Saini, Amir Hussain
{"title":"Federated learning‐driven dual blockchain for data sharing and reputation management in Internet of medical things","authors":"Chenquan Gan, Xinghai Xiao, Qingyi Zhu, Deepak Kumar Jain, Akanksha Saini, Amir Hussain","doi":"10.1111/exsy.13714","DOIUrl":"https://doi.org/10.1111/exsy.13714","url":null,"abstract":"In the Internet of Medical Things (IoMT), the vulnerability of federated learning (FL) to single points of failure, low‐quality nodes, and poisoning attacks necessitates innovative solutions. This article introduces a FL‐driven dual‐blockchain approach to address these challenges and improve data sharing and reputation management. Our approach comprises two blockchains: the Model Quality Blockchain (MQchain) and the Reputation Incentive Blockchain (RIchain). MQchain utilizes an enhanced Proof of Quality (PoQ) consensus algorithm to exclude low‐quality nodes from participating in aggregation, effectively mitigating single points of failure and poisoning attacks by leveraging node reputation and quality thresholds. In parallel, RIchain incorporates a reputation evaluation, incentive mechanism, and index query mechanism, allowing for rapid and comprehensive node evaluation, thus identifying high‐reputation nodes for MQchain. Security analysis confirms the theoretical soundness of the proposed method. Experimental evaluation using real medical datasets, specifically MedMNIST, demonstrates the remarkable resilience of our approach against attacks compared to three alternative methods.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142206576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TensorCRO: A TensorFlow‐based implementation of a multi‐method ensemble for optimization TensorCRO:基于 TensorFlow 的多方法优化组合实施方案
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-06 DOI: 10.1111/exsy.13713
A. Palomo‐Alonso, V. G. Costa, L. M. Moreno‐Saavedra, E. Lorente‐Ramos, J. Pérez‐Aracil, C. E. Pedreira, S. Salcedo‐Sanz
{"title":"TensorCRO: A TensorFlow‐based implementation of a multi‐method ensemble for optimization","authors":"A. Palomo‐Alonso, V. G. Costa, L. M. Moreno‐Saavedra, E. Lorente‐Ramos, J. Pérez‐Aracil, C. E. Pedreira, S. Salcedo‐Sanz","doi":"10.1111/exsy.13713","DOIUrl":"https://doi.org/10.1111/exsy.13713","url":null,"abstract":"This paper presents a novel implementation of the Coral Reef Optimization with Substrate Layers (CRO‐SL) algorithm. Our approach, which we call TensorCRO, takes advantage of the TensorFlow framework to represent CRO‐SL as a series of tensor operations, allowing it to run on GPU and search for solutions in a faster and more efficient way. We evaluate the performance of the proposed implementation across a wide range of benchmark functions commonly used in optimization research (such as the Rastrigin, Rosenbrock, Ackley, and Griewank functions), and we show that GPU execution leads to considerable speedups when compared to its CPU counterpart. Then, when comparing TensorCRO to other state‐of‐the‐art optimization algorithms (such as the Genetic Algorithm, Simulated Annealing, and Particle Swarm Optimization), the results show that TensorCRO can achieve better convergence rates and solutions than other algorithms within a fixed execution time, given that the fitness functions are also implemented on TensorFlow. Furthermore, we also evaluate the proposed approach in a real‐world problem of optimizing power production in wind farms by selecting the locations of turbines; in every evaluated scenario, TensorCRO outperformed the other meta‐heuristics and achieved solutions close to the best known in the literature. Overall, our implementation of the CRO‐SL algorithm in TensorFlow GPU provides a new, fast, and efficient approach to solving optimization problems, and we believe that the proposed implementation has significant potential to be applied in various domains, such as engineering, finance, and machine learning, where optimization is often used to solve complex problems. Furthermore, we propose that this implementation can be used to optimize models that cannot propagate an error gradient, which is an excellent choice for non‐gradient‐based optimizers.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142206593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One‐step multiple kernel k‐means clustering based on block diagonal representation 基于块对角线表示的一步多核 K 均值聚类法
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-05 DOI: 10.1111/exsy.13720
Cuiling Chen, Zhi Li
{"title":"One‐step multiple kernel k‐means clustering based on block diagonal representation","authors":"Cuiling Chen, Zhi Li","doi":"10.1111/exsy.13720","DOIUrl":"https://doi.org/10.1111/exsy.13720","url":null,"abstract":"Multiple kernel <jats:italic>k</jats:italic>‐means clustering (MKKC) can efficiently incorporate multiple base kernels to generate an optimal kernel. Many existing MKKC methods all need two‐step operation: learning clustering indicator matrix and performing clustering on it. However, the optimal clustering results of two steps are not equivalent to those of original problem. To address this issue, in this paper we propose a novel method named one‐step multiple kernel <jats:italic>k</jats:italic>‐means clustering based on block diagonal representation (OS‐MKKC‐BD). By imposing a block diagonal constraint on the product of indicator matrix and its transpose, this method can encourage the indicator matrix to be block diagonal. Then the indicator matrix can produce explicit clustering indicator, so as to implement one‐step clustering, which avoids the disadvantage of two‐step operation. Furthermore, a simple kernel weighting strategy is used to obtain an optimal kernel, which boosts the quality of optimal kernel. In addition, a three‐step iterative algorithm is designed to solve the corresponding optimization problem, where the Riemann conjugate gradient iterative method is used to solve the optimization problem of the indicator matrix. Finally, by extensive experiments on eleven real data sets and comparison of clustering results with 10 MKC methods, it is concluded that OS‐MKKC‐BD is effective.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142206596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new method based on generative adversarial networks for multivariate time series prediction 基于生成式对抗网络的多变量时间序列预测新方法
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-05 DOI: 10.1111/exsy.13700
Xiwen Qin, Hongyu Shi, Xiaogang Dong, Siqi Zhang
{"title":"A new method based on generative adversarial networks for multivariate time series prediction","authors":"Xiwen Qin, Hongyu Shi, Xiaogang Dong, Siqi Zhang","doi":"10.1111/exsy.13700","DOIUrl":"https://doi.org/10.1111/exsy.13700","url":null,"abstract":"Multivariate time series have more complex and high‐dimensional characteristics, which makes it difficult to analyze and predict the data accurately. In this paper, a new multivariate time series prediction method is proposed. This method is a generative adversarial networks (GAN) method based on Fourier transform and bi‐directional gated recurrent unit (Bi‐GRU). First, the Fourier transform is utilized to extend the data features, which helps the GAN to better learn the distributional features of the original data. Second, in order to guide the model to fully learn the distribution of the original time series data, Bi‐GRU is introduced as the generator of GAN. To solve the problems of mode collapse and gradient vanishing that exist in GAN, Wasserstein distance is used as the loss function of GAN. Finally, the proposed method is used for the prediction of air quality, stock price and RMB exchange rate. The experimental results show that the model can effectively predict the trend of the time series compared with the other nine baseline models. It significantly improves the accuracy and flexibility of multivariate time series forecasting and provides new ideas and methods for accurate time series forecasting in industrial, financial and environmental fields.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142226348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACRES: A framework for (semi)automatic generation of rule‐based expert systems with uncertainty from datasets ACRES:从数据集(半)自动生成具有不确定性的基于规则的专家系统的框架
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-05 DOI: 10.1111/exsy.13723
Konstantinos Kovas, Ioannis Hatzilygeroudis
{"title":"ACRES: A framework for (semi)automatic generation of rule‐based expert systems with uncertainty from datasets","authors":"Konstantinos Kovas, Ioannis Hatzilygeroudis","doi":"10.1111/exsy.13723","DOIUrl":"https://doi.org/10.1111/exsy.13723","url":null,"abstract":"Traditionally, the design of an expert system involves acquiring knowledge, in the form of symbolic rules, directly from the expert(s), which is a complex and time‐consuming task. Although expert systems approach is quite old, it is still present, especially where explicit knowledge representation and reasoning, which assure interpretability and explainability, are necessary. Therefore, machine learning methods have been devised to extract rules from data, to facilitate that task. However, those methods are quite inflexible in adapting to the application domain and provide no help in designing the expert system. In this work, we present a framework and corresponding tool, namely ACRES, for semi‐automatically generating expert systems from datasets. ACRES allows for data preprocessing, which helps in structuring knowledge in the form of a tree, called rule hierarchy, which represents (possible) dependencies among data variables and is used for rule formation. This improves interpretability and explainability of the produced systems. We have also designed and evaluated alternative methods for rule extraction from data and for calculation and use of certainty factors, to represent uncertainty; CFs can be dynamically updated. Experimental results on seven well‐known datasets show that the proposed rule extraction methods are comparable to other popular machine learning approaches like decision trees, CART, JRip, PART, Random Forest, and so on, for the classification task. Finally, we give insights on two applications of ACRES.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142206594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative evaluation of Large Language Models using key metrics and emerging tools 使用关键指标和新兴工具对大型语言模型进行比较评估
IF 3.3 4区 计算机科学
Expert Systems Pub Date : 2024-09-04 DOI: 10.1111/exsy.13719
Sarah McAvinue, Kapal Dev
{"title":"Comparative evaluation of Large Language Models using key metrics and emerging tools","authors":"Sarah McAvinue, Kapal Dev","doi":"10.1111/exsy.13719","DOIUrl":"https://doi.org/10.1111/exsy.13719","url":null,"abstract":"This research involved designing and building an interactive generative AI application to conduct a comparative analysis of two advanced Large Language Models (LLMs), GPT‐4, and Claude 2, using Langsmith evaluation tools. The project was developed to explore the potential of LLMs in facilitating postgraduate course recommendations within a simulated environment at Munster Technological University (MTU). Designed for comparative analysis, the application enables testing of GPT‐4 and Claude 2 and can be hosted flexibly on either Amazon Web Services (AWS) or Azure. It utilizes advanced natural language processing and retrieval‐augmented generation (RAG) techniques to process proprietary data tailored to postgraduate needs. A key component of this research was the rigorous assessment of the LLMs using the Langsmith evaluation tool against both customized and standard benchmarks. The evaluation focused on metrics such as bias, safety, accuracy, cost, robustness, and latency. Additionally, adaptability covering critical features like language translation and internet access, was independently researched since the Langsmith tool does not evaluate this metric. This ensures a holistic assessment of the LLM's capabilities.","PeriodicalId":51053,"journal":{"name":"Expert Systems","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142206595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信