Information Sciences最新文献

筛选
英文 中文
Robust deep network learning of nonlinear regression tasks by parametric leaky exponential linear units (LELUs) and a diffusion metric 非线性回归任务的参数泄漏指数线性单元(LELUs)和扩散度量鲁棒深度网络学习
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-30 DOI: 10.1016/j.ins.2025.122739
Enda D.V. Bigarella
{"title":"Robust deep network learning of nonlinear regression tasks by parametric leaky exponential linear units (LELUs) and a diffusion metric","authors":"Enda D.V. Bigarella","doi":"10.1016/j.ins.2025.122739","DOIUrl":"10.1016/j.ins.2025.122739","url":null,"abstract":"<div><div>This document proposes a parametric activation function (<em>ac.f</em>) aimed at improving multidimensional nonlinear data regression. It is an established knowledge that nonlinear <em>ac.f</em>s are required for learning nonlinear datasets. This work shows that smoothness and gradient properties of the <em>ac.f</em> further impact the performance of large neural networks in terms of overfitting and sensitivity to model parameters. Smooth but vanishing-gradient <em>ac.f</em>s such as ELU or SiLU (Swish) have limited performance, and non-smooth <em>ac.f</em>s such as RELU and Leaky-RELU further impart discontinuity in the trained model. Improved performance is demonstrated with a smooth “Leaky Exponential Linear Unit”, with non-zero gradient that can be trained. A novel diffusion-loss metric is also proposed to gauge the performance of the trained models in terms of overfitting.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"725 ","pages":"Article 122739"},"PeriodicalIF":6.8,"publicationDate":"2025-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HP2: Hybrid and precision-guided filter pruning for CNN compression HP2:用于CNN压缩的混合和精确制导滤波器剪枝
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-30 DOI: 10.1016/j.ins.2025.122741
Zhichao Zhao , Shangwei Guo , Jialing He , Yafei Li , Run Wang , Tao Xiang
{"title":"HP2: Hybrid and precision-guided filter pruning for CNN compression","authors":"Zhichao Zhao ,&nbsp;Shangwei Guo ,&nbsp;Jialing He ,&nbsp;Yafei Li ,&nbsp;Run Wang ,&nbsp;Tao Xiang","doi":"10.1016/j.ins.2025.122741","DOIUrl":"10.1016/j.ins.2025.122741","url":null,"abstract":"<div><div>Filter pruning has emerged as a promising approach for compressing Convolutional Neural Network (CNN) models. However, existing methods often lack accuracy in evaluating filter importance and precision in on-demand filter pruning. In this paper, we address these limitations by proposing a novel Hybrid and Precision-guided filter Pruning method (HP<sup>2</sup>) for CNN compression, driven by two key observations. In particular, our method enhances filter importance evaluation and enables targeted filter pruning, allowing flexible reduction of computational complexity (FLOPs) or memory (parameters). We introduce the Hybrid Importance Score (HIS) to assess precise filter importance by leveraging both filter weights and activations. Moreover, we quantitatively analyze the intricate relationship between FLOPs and parameters, leading to an on-demand pruning strategy that further optimizes FLOPs or parameter reduction. Extensive experiments showcase the superiority of HP<sup>2</sup> over state-of-the-art CNN compression methods, particularly under high pruning ratios.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"725 ","pages":"Article 122741"},"PeriodicalIF":6.8,"publicationDate":"2025-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The envelope of one-dimensional discrete-time quantum walk 一维离散时间量子行走的包络
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-30 DOI: 10.1016/j.ins.2025.122722
Yunguo Lin , Shuiying Cai
{"title":"The envelope of one-dimensional discrete-time quantum walk","authors":"Yunguo Lin ,&nbsp;Shuiying Cai","doi":"10.1016/j.ins.2025.122722","DOIUrl":"10.1016/j.ins.2025.122722","url":null,"abstract":"<div><div>A mathematical model is presented for a one-dimensional discrete-time quantum walk, which is initiated from a quantum initial state and governed by a coin operator. When the coin operator is a flip operator, a path analysis formula is employed to compute the position probability distribution. For a general coin operator, matrix decomposition is utilized to transform it into the equivalent flip operator. When a walker undergoes <span><math><mi>n</mi></math></span> steps of evolution, it is observed that the probability of the walker occupying any given position exhibits the existence of both maximum and minimum values, irrespective of the quantum initial state. By linking these extreme positions together, a confined region is delineated, the boundary of which is designated as the envelope of the quantum walk. Remarkably, the envelope is independent of the quantum initial state. To facilitate the computation of this envelope, the relevant formulas are transformed into rational expressions, wherein both the numerators and denominators are represented by polynomials with even integer coefficients. These polynomials are classified to determine the coefficients of the numerator polynomials. An analysis is conducted to identify the location of the maximum value of the envelope, thereby examining the maximum value of the position probability distribution.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"726 ","pages":"Article 122722"},"PeriodicalIF":6.8,"publicationDate":"2025-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145247885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3WD-DRT: A three-way decision enhanced dynamic routing transformer for cost-sensitive multimodal sentiment analysis 3WD-DRT:用于成本敏感多模态情感分析的三向决策增强动态路由变压器
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-30 DOI: 10.1016/j.ins.2025.122704
Haoyu Jiang , Xiaoliang Chen , Duoqian Miao , Hongyun Zhang , Xiaolin Qin , Shangyi Du , Peng Lu
{"title":"3WD-DRT: A three-way decision enhanced dynamic routing transformer for cost-sensitive multimodal sentiment analysis","authors":"Haoyu Jiang ,&nbsp;Xiaoliang Chen ,&nbsp;Duoqian Miao ,&nbsp;Hongyun Zhang ,&nbsp;Xiaolin Qin ,&nbsp;Shangyi Du ,&nbsp;Peng Lu","doi":"10.1016/j.ins.2025.122704","DOIUrl":"10.1016/j.ins.2025.122704","url":null,"abstract":"<div><div>Accurately interpreting human emotion from language, facial expressions, and vocal tones remains a fundamental challenge in artificial intelligence. Current Multimodal Sentiment Analysis (MSA) models often struggle with two key issues. First, their static fusion strategies fail to handle conflicting modalities, such as sarcasm. Second, their standard loss functions ignore the asymmetric risks of severe misjudgments. To address these limitations, we propose the Three-Way Decision Enhanced Dynamic Routing Transformer (3WD-DRT), a framework operating on a \"quality-aware, decision-driven\" principle. It dynamically assesses each modality’s quality using a three-way decision gate, implemented via a dedicated MLP, to partition information into acceptance, deferment, or rejection pathways. This enables the model to amplify informative signals, moderately scale uncertain ones (deferment), and attenuate noisy or misleading ones. We also introduce a novel cost-sensitive loss function that imposes greater penalties on major semantic errors, such as polarity misclassifications. This approach better aligns the model’s training objective with human perception. Extensive experiments on CH-SIMS, CH-SIMSv2, MOSI, and MOSEI datasets show that 3WD-DRT consistently outperforms state-of-the-art methods, setting new benchmarks with F1-scores of 87.08 % on MOSI and 88.26 % on MOSEI. This work provides a robust solution for MSA, fostering more nuanced and reliable emotionally-aware AI systems.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"725 ","pages":"Article 122704"},"PeriodicalIF":6.8,"publicationDate":"2025-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145270808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information suppression in large language models: Auditing, quantifying, and characterizing censorship in DeepSeek 大型语言模型中的信息抑制:审计、量化和描述DeepSeek中的审查制度
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-29 DOI: 10.1016/j.ins.2025.122702
Peiran Qiu , Siyi Zhou , Emilio Ferrara
{"title":"Information suppression in large language models: Auditing, quantifying, and characterizing censorship in DeepSeek","authors":"Peiran Qiu ,&nbsp;Siyi Zhou ,&nbsp;Emilio Ferrara","doi":"10.1016/j.ins.2025.122702","DOIUrl":"10.1016/j.ins.2025.122702","url":null,"abstract":"<div><div>This study examines information suppression mechanisms in DeepSeek, an open-source large language model (LLM) developed in China. We propose an auditing framework to evaluate the censorship in the model through analyzing the response alignment with the corresponding chain of thought (CoT). By comparing model responses to 646 politically sensitive topics with those to non-politically sensitive topics, our audit unveils evidence of semantic-level information suppression in DeepSeek: sensitive content often appears within the model’s internal reasoning but is omitted or rephrased in the final output. Specifically, DeepSeek suppresses references to transparency, government accountability, and civic mobilization, while occasionally amplifying language aligned with state propaganda. This study underscores the need for systematic auditing of alignment, content moderation, information suppression, and censorship practices implemented into widely-adopted AI models, to ensure transparency, accountability, and equitable access to unbiased information obtained by means of these systems.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"724 ","pages":"Article 122702"},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145222976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedPure: Data poisoning attack detection and purification for federated skeleton-based action recognition FedPure:基于联邦骨架的动作识别的数据中毒攻击检测和净化
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-29 DOI: 10.1016/j.ins.2025.122733
Min Hyuk Kim , Eun-Gi Lee , Seok Bong Yoo
{"title":"FedPure: Data poisoning attack detection and purification for federated skeleton-based action recognition","authors":"Min Hyuk Kim ,&nbsp;Eun-Gi Lee ,&nbsp;Seok Bong Yoo","doi":"10.1016/j.ins.2025.122733","DOIUrl":"10.1016/j.ins.2025.122733","url":null,"abstract":"<div><div>Skeleton-based action recognition (SAR) often requires centralized skeleton data, raising serious privacy concerns in deployment scenarios such as healthcare or surveillance. Federated learning (FL) allows SAR models to be trained without sharing raw data and has therefore become an attractive approach for privacy-sensitive, distributed applications such as camera-enabled devices, human–robot interaction, and security monitoring. However, FL-based SAR remains vulnerable to data poisoning attacks. We propose a data poisoning attack detection and purification method for federated SAR, called FedPure. FedPure introduces a fused transform prototype representation, which combines global perspective transforms with subregion transforms to capture spatiotemporal cues. This design enables precise inter-client correlation analysis for malicious client detection. Moreover, a detector comprising inter-client spatiotemporal matching is designed to analyze the correlation between pseudo skeleton data. Furthermore, FedPure improves model robustness by purifying the malicious clients using a disentangled feature-based purifier to maintain data diversity. The experimental results on diverse adversarial attacks, including FGSM, PGD, C&amp;W, Bone Length Attack, and Hard No Box Attack, confirm that FedPure outperforms existing models in SAR accuracy. By providing an integrated detection-and-purification pipeline tailored to federated SAR, FedPure narrows a key gap in privacy-preserving training, enabling safer application of FL-based action recognition. Our code is publicly available at <span><span>https://github.com/alsgur0720/fedpure</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"725 ","pages":"Article 122733"},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145271321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing usability in face privacy protection via vision-language guided diffusion model 通过视觉语言引导扩散模型增强人脸隐私保护的可用性
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-29 DOI: 10.1016/j.ins.2025.122736
Zhifeng Xu, Peiyao Yuan, Yiru Zhao, Lei Zhao
{"title":"Enhancing usability in face privacy protection via vision-language guided diffusion model","authors":"Zhifeng Xu,&nbsp;Peiyao Yuan,&nbsp;Yiru Zhao,&nbsp;Lei Zhao","doi":"10.1016/j.ins.2025.122736","DOIUrl":"10.1016/j.ins.2025.122736","url":null,"abstract":"<div><div>With the development of the Internet, a large number of images containing faces are widely shared on social media, leading to increased risks of face-based identity tracking and privacy breaches. Face de-identification serves as a privacy protection technique that conceals identifiable personal information in images. Recent advancements in generative model-based face de-identification methods have made progress in ensuring privacy while preserving image usability. However, challenges remain in enhancing the usability. Specifically, current methods often generate images with noticeable artifacts or struggle to preserve the original semantic information, which can hinder the practical applications in various computer vision tasks. In this paper, we propose a vision-language understanding-guided diffusion model for face de-identification. Our method incorporates a semantic preservation module and an identity protection module to guide the diffusion model in generating de-identified images. The semantic preservation module leverages a vision-language model to retain the sentence-level semantic information of the original image. The identity protection module perturbs the identity representation to ensure privacy. We train and evaluate our method on different datasets, and the experimental results demonstrate that, while ensuring privacy protection, our method not only surpasses existing methods in image quality but also outperforms them across multiple fine-grained utility tasks.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"725 ","pages":"Article 122736"},"PeriodicalIF":6.8,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145270813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proactive mission-time-efficient coverage path planning using hierarchical heuristics 使用分层启发式的主动任务-时间效率覆盖路径规划
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-27 DOI: 10.1016/j.ins.2025.122696
Junghwan Gong, Moses O. Oluma, Seunghwan Lee
{"title":"Proactive mission-time-efficient coverage path planning using hierarchical heuristics","authors":"Junghwan Gong,&nbsp;Moses O. Oluma,&nbsp;Seunghwan Lee","doi":"10.1016/j.ins.2025.122696","DOIUrl":"10.1016/j.ins.2025.122696","url":null,"abstract":"<div><div>Ensuring efficient and reliable autonomous coverage in large-scale environments remains a persistent challenge, particularly owing to the battery limitations of robotic systems. To address this challenge, this study proposes a novel, proactive energy-aware coverage path planning (CPP) framework that considers traveling and charging durations in a unified manner. The proposed method explicitly models realistic battery dynamics, including nonlinear charging and discharging behaviors. To render the problem practically solvable, it is decomposed into a hierarchical two-stage structure. Each stage is addressed using a well-suited heuristic: Ant Colony Optimization (ACO) for generating coverage paths, and a Genetic Algorithm (GA) for scheduling recharging actions. In contrast to conventional reactive approaches that respond only after the battery level becomes critical, the proposed method schedules recharging actions in advance, aiming to reduce the overall mission time proactively and strategically. Extensive simulations in synthetic, real-world-acquired, and real-world-based obstacle-rich coverage environments validate the effectiveness of the proposed method. The results demonstrate a mission time reduction of up to 24.66 %, with consistent improvements in energy reliability across varying charging station densities. These findings highlight the practicality of the proposed method as a global scheduler for real-world deployment in energy-constrained environments. Furthermore, this framework lays the foundation for extensions to multi-robot systems, enabling scalable, adaptive, and mission-time-efficient coordination in large-scale autonomous missions.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"725 ","pages":"Article 122696"},"PeriodicalIF":6.8,"publicationDate":"2025-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145227738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Language-based opacity in modular discrete event systems: Compositional secret-based verification using labeled petri nets 模块化离散事件系统中基于语言的不透明性:使用标记petri网的基于组合秘密的验证
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-27 DOI: 10.1016/j.ins.2025.122701
Salwa Habbachi , Imen Ben Hafaiedh , Zhiwu Li
{"title":"Language-based opacity in modular discrete event systems: Compositional secret-based verification using labeled petri nets","authors":"Salwa Habbachi ,&nbsp;Imen Ben Hafaiedh ,&nbsp;Zhiwu Li","doi":"10.1016/j.ins.2025.122701","DOIUrl":"10.1016/j.ins.2025.122701","url":null,"abstract":"<div><div>This work focuses on verifying language-based opacity within modular discrete-event systems. We consider a distributed system that is modeled as a composition of multiple interacting modules, each modeled by a labeled Petri net. Ensuring confidentiality in such systems is critical for cyber-physical systems and industrial networks, where unauthorized inference of sensitive data can lead to security breaches. We introduce a new definition of language-based opacity for modular systems and propose three secret-based verification methods that avoid the construction of the monolithic system through parallel composition. Our approach includes three methods: (1) global secret verification via observer synchronization; (2) local, module-level secret verification; and (3) an iterative composition optimization that avoids building the entire modular system, yielding significant computational savings. Experimental results on a benchmark smart manufacturing system demonstrate the practical efficiency of our approach, showing orders-of-magnitude improvement in verification time and memory usage over traditional monolithic approaches.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"724 ","pages":"Article 122701"},"PeriodicalIF":6.8,"publicationDate":"2025-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145222973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social-semantic enhanced dual-intent hypergraph collaborative filtering 社会语义增强的双意图超图协同过滤
IF 6.8 1区 计算机科学
Information Sciences Pub Date : 2025-09-27 DOI: 10.1016/j.ins.2025.122714
Xianji Cui , Jinhua Zhang , Yan Lan , Shan Huang
{"title":"Social-semantic enhanced dual-intent hypergraph collaborative filtering","authors":"Xianji Cui ,&nbsp;Jinhua Zhang ,&nbsp;Yan Lan ,&nbsp;Shan Huang","doi":"10.1016/j.ins.2025.122714","DOIUrl":"10.1016/j.ins.2025.122714","url":null,"abstract":"<div><div>Recommender systems provide personalized recommendations by modeling user–item interactions, where disentangling users’ intents is critical for improving recommendation accuracy. While existing intent modeling methods aim to capture fine-grained intent representations, they face two challenges: 1) Neglecting the influence of social semantics on modeling fine-grained intents; 2) Implicit data sparsity and intent redundancy limiting intent characterization. To tackle these challenges, we propose a Social-Semantic Enhanced Dual-Intent Hypergraph Collaborative Filtering (SDIHGCF) model. Specifically, SDIHGCF constructs hypergraph structures to preserve social semantics among users, items, and groups. It encodes features from both social and interest perspectives to achieve user and item representations that integrate individual intent, which signifies private preferences, and collective intent, which denotes overall awareness. To mitigate data sparsity and intent redundancy, where one intent can be represented by others, we use graph contrastive regularization to enforce consistency among users, items, intents, and interactions. Additionally, a bidirectional contrastive learning loss is proposed to enhance intent alignment. Experiments on four datasets demonstrate that SDIHGCF outperforms existing methods, offering novel insights into fine-grained intent modeling.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"725 ","pages":"Article 122714"},"PeriodicalIF":6.8,"publicationDate":"2025-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145270812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信