Cognitive Computation最新文献

筛选
英文 中文
Towards Long-Term Remembering in Federated Continual Learning 在联合持续学习中实现长期记忆
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-21 DOI: 10.1007/s12559-024-10314-z
Ziqin Zhao, Fan Lyu, Linyan Li, Fuyuan Hu, Minming Gu, Li Sun
{"title":"Towards Long-Term Remembering in Federated Continual Learning","authors":"Ziqin Zhao, Fan Lyu, Linyan Li, Fuyuan Hu, Minming Gu, Li Sun","doi":"10.1007/s12559-024-10314-z","DOIUrl":"https://doi.org/10.1007/s12559-024-10314-z","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Background</h3><p>Federated Continual Learning (FCL) involves learning from distributed data on edge devices with incremental knowledge. However, current FCL methods struggle to retain long-term memories on the server.</p><h3 data-test=\"abstract-sub-heading\">Method</h3><p>In this paper, we introduce a method called Fisher INformation Accumulation Learning (FINAL) to address catastrophic forgetting in FCL. First, we accumulate a global Fisher with a federated Fisher information matrix formed from clients task by task to remember long-term knowledge. Second, we present a novel multi-node collaborative integration strategy to assemble the federated Fisher, which reveals the task-specific co-importance of parameters among clients. Finally, we raise a Fisher balancing method to combine the global Fisher and federated Fisher, avoiding neglecting new learning or causing catastrophic forgetting.</p><h3 data-test=\"abstract-sub-heading\">Results</h3><p>We conducted evaluations on four FCL datasets, and the findings demonstrate that the proposed FINAL effectively maintains long-term knowledge on the server.</p><h3 data-test=\"abstract-sub-heading\">Conclusions</h3><p>The exceptional performance of this method indicates its significant value for future FCL research.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems SPEI-FL:智能医疗系统中的无服务器隐私边缘智能联合学习
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-17 DOI: 10.1007/s12559-024-10310-3
Mahmuda Akter, Nour Moustafa, Benjamin Turnbull
{"title":"SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems","authors":"Mahmuda Akter, Nour Moustafa, Benjamin Turnbull","doi":"10.1007/s12559-024-10310-3","DOIUrl":"https://doi.org/10.1007/s12559-024-10310-3","url":null,"abstract":"<p>Smart healthcare systems promise significant benefits for fast and accurate medical decisions. However, working with personal health data presents new privacy issues and constraints that must be solved from a cybersecurity perspective. Edge intelligence-enabled federated learning is a new scheme that utilises decentralised computing that allows data analytics to be carried out at the edge of a network, enhancing data privacy. However, this scheme suffers from privacy attacks, including inference, free-riding, and man-in-the-middle attacks, especially with serverless computing for allocating resources to user needs. Edge intelligence-enabled federated learning requires client data insertion and deletion to authenticate genuine clients and a serverless computing capability to ensure the security of collaborative machine learning models. This work introduces a serverless privacy edge intelligence-based federated learning (SPEI-FL) framework to address these issues. SPEI-FL includes a federated edge aggregator and authentication method to improve the data privacy of federated learning and allow client adaptation and removal without impacting the overall learning processes. It also can classify intruders through serverless computing processes. The proposed framework was evaluated with the unstructured COVID-19 medical chest x-rays and MNIST digit datasets, and the structured BoT-IoT dataset. The performance of the framework is comparable with existing authentication methods and reported a higher accuracy than comparable methods (approximately 90% as compared with the 81% reported by peer methods). The proposed authentication method prevents the exposure of sensitive patient information during medical device authentication and would become the cornerstone of the next generation of medical security with serverless computing.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score 认知追踪数据轨迹:使用累积差异得分审核判别语言模型中的数据出处
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-14 DOI: 10.1007/s12559-024-10315-y
Zhirui Zeng, Jialing He, Tao Xiang, Ning Wang, Biwen Chen, Shangwei Guo
{"title":"Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score","authors":"Zhirui Zeng, Jialing He, Tao Xiang, Ning Wang, Biwen Chen, Shangwei Guo","doi":"10.1007/s12559-024-10315-y","DOIUrl":"https://doi.org/10.1007/s12559-024-10315-y","url":null,"abstract":"<p>The burgeoning practice of unauthorized acquisition and utilization of personal textual data (e.g., social media comments and search histories) by certain entities has become a discernible trend. To uphold data protection regulations such as the Asia–Pacific Privacy Initiative (APPI) and to identify instances of unpermitted exploitation of personal data, we propose a novel and efficient audit framework that helps users conduct cognitive analysis to determine if their textual data was used for data augmentation. and training a discriminative model. In particular, we focus on auditing models that use BERT as the backbone for discriminating text and are at the core of popular online services. We first propose an accumulated discrepancy score, which involves not only the response of the target model to the auditing sample but also the responses between pre-trained and finetuned models, to identify membership. We implement two types of audit methods (i.e., sample-level and user-level) according to our framework and conduct comprehensive experiments on two downstream applications to evaluate the performance. The experimental results demonstrate that our sample-level auditing achieves an AUC of 89.7% and an accuracy of 83%, whereas the user-level method can audit membership with an AUC of 89.7% and an accuracy of 88%. Additionally, we undertake an analysis of how augmentation methods impact auditing performance and expound upon the underlying reasons for these observations.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable Histopathology Image Classification with Self-organizing Maps: A Granular Computing Perspective 利用自组织图进行可解释的组织病理学图像分类:粒度计算视角
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-14 DOI: 10.1007/s12559-024-10312-1
Domenico Amato, Salvatore Calderaro, Giosué Lo Bosco, Riccardo Rizzo, Filippo Vella
{"title":"Explainable Histopathology Image Classification with Self-organizing Maps: A Granular Computing Perspective","authors":"Domenico Amato, Salvatore Calderaro, Giosué Lo Bosco, Riccardo Rizzo, Filippo Vella","doi":"10.1007/s12559-024-10312-1","DOIUrl":"https://doi.org/10.1007/s12559-024-10312-1","url":null,"abstract":"","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141342681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing Medical Imaging Through Generative Adversarial Networks: A Comprehensive Review and Future Prospects 通过生成式对抗网络推进医学成像:全面回顾与未来展望
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-13 DOI: 10.1007/s12559-024-10291-3
Abiy Abinet Mamo, Bealu Girma Gebresilassie, Aniruddha Mukherjee, Vikas Hassija, Vinay Chamola
{"title":"Advancing Medical Imaging Through Generative Adversarial Networks: A Comprehensive Review and Future Prospects","authors":"Abiy Abinet Mamo, Bealu Girma Gebresilassie, Aniruddha Mukherjee, Vikas Hassija, Vinay Chamola","doi":"10.1007/s12559-024-10291-3","DOIUrl":"https://doi.org/10.1007/s12559-024-10291-3","url":null,"abstract":"<p>In medical imaging, traditional methods have long been relied upon. However, the integration of Generative Adversarial Networks (GANs) has sparked a paradigm shift, ushering in a new era of innovation. Our comprehensive investigation explores the groundbreaking impact of GANs on medical imaging, examining the evolution from traditional techniques to GAN-driven approaches. Through meticulous analysis, we dissect various aspects of GANs, encompassing their taxonomy, historical progression, and diverse iterations such as Self-Attention GANs (SAGAN), Conditional GANs, and Progressive Growing GANs (PGGAN). Complemented by a practical case study, we scrutinize the extensive applications of GANs, spanning image generation, reconstruction, enhancement, segmentation, and super-resolution. Despite promising prospects, enduring challenges including data scarcity, interpretability issues, and ethical concerns persist. Looking ahead, we anticipate advancements in personalized and pathological image generation, cross-modal synthesis, real-time interactive image generation, and enhanced anomaly detection. Through this review, we underscore the transformative potential of GANs in reshaping medical imaging practices, while also outlining avenues for future research endeavors.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPD-NSL: A Two-Stage Brain Effective Connectivity Network Construction Method Based on Dynamic Bayesian Network CPD-NSL:基于动态贝叶斯网络的两阶段大脑有效连接网络构建方法
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-13 DOI: 10.1007/s12559-024-10296-y
Zhiqiong Wang, Qi Chen, Zhongyang Wang, Xinlei Wang, Luxuan Qu, Junchang Xin
{"title":"CPD-NSL: A Two-Stage Brain Effective Connectivity Network Construction Method Based on Dynamic Bayesian Network","authors":"Zhiqiong Wang, Qi Chen, Zhongyang Wang, Xinlei Wang, Luxuan Qu, Junchang Xin","doi":"10.1007/s12559-024-10296-y","DOIUrl":"https://doi.org/10.1007/s12559-024-10296-y","url":null,"abstract":"<p>Current brain science reveals that the connectivity patterns of the human brain are constantly changing when performing different tasks. Thus, brain effective connectivity networks based on non-stationary assumption can describe such neurodynamics better than the ones based on stationary assumption. However, existing methods for inferring non-stationary brain effective connectivity networks are committed to estimating the change points and network structures simultaneously. It is even worse that these methods will inevitably focus on one part of the estimation process and lead to the deviation of the results obtained by the other part. Then, the construction results of non-stationary brain effective connectivity networks cannot accurately reflect the real brain dynamics. In this paper, a novel approach to constructing non-stationary brain effective connectivity networks is proposed, namely CPD-NSL. It involves two stages including change point detection and network structure learning. In the first stage, the latent block model is used, and then the improved forward-backward search method is used to construct the stationary networks between adjacent change points in the network structure learning part. Finally, the constructed stationary networks are arranged in chronological order to obtain the final time-varying brain effective connectivity network. CPD-NSL is validated using simulated data as well as real fMRI data from HCP public datasets. The results show that CPD-NSL can restore the real network more accurately and consume less time. Experimental results on both simulated and real data demonstrate the effectiveness of the proposed method in constructing non-stationary state brain effective connectivity networks.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141512676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Memristors Based Echo State Network Model Inspired by the Brain’s Uni-hemispheric Slow-Wave Sleep Characteristics 受大脑单半球慢波睡眠特性启发、基于新型 Memristors 的回声状态网络模型
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-10 DOI: 10.1007/s12559-024-10265-5
Jingyu Sun, Lixiang Li, Haipeng Peng, Yin Meng
{"title":"A Novel Memristors Based Echo State Network Model Inspired by the Brain’s Uni-hemispheric Slow-Wave Sleep Characteristics","authors":"Jingyu Sun, Lixiang Li, Haipeng Peng, Yin Meng","doi":"10.1007/s12559-024-10265-5","DOIUrl":"https://doi.org/10.1007/s12559-024-10265-5","url":null,"abstract":"","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141361963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS 工业 CPS 中生成式人工智能和认知计算驱动的入侵检测系统
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-10 DOI: 10.1007/s12559-024-10309-w
Shareeful Islam, D. Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, A. N. Islam
{"title":"Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS","authors":"Shareeful Islam, D. Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, A. N. Islam","doi":"10.1007/s12559-024-10309-w","DOIUrl":"https://doi.org/10.1007/s12559-024-10309-w","url":null,"abstract":"","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Leakage Delays on Bifurcation in Fractional-Order Bidirectional Associative Memory Neural Networks with Five Neurons and Discrete Delays 泄漏延迟对具有五个神经元和离散延迟的分数阶双向联想记忆神经网络分岔的影响
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-05 DOI: 10.1007/s12559-024-10305-0
Yangling Wang, Jinde Cao, Chengdai Huang
{"title":"Effect of Leakage Delays on Bifurcation in Fractional-Order Bidirectional Associative Memory Neural Networks with Five Neurons and Discrete Delays","authors":"Yangling Wang, Jinde Cao, Chengdai Huang","doi":"10.1007/s12559-024-10305-0","DOIUrl":"https://doi.org/10.1007/s12559-024-10305-0","url":null,"abstract":"<p>As is well known that time delays are inevitable in practice due to the finite switching speed of amplifiers and information transmission between neurons. So the study on the Hopf bifurcation of delayed neural networks has aroused extensive attention in recent years. However, it’s worth mentioning that only the communication delays between neurons were generally considered in most existing relevant literatures. Actually, it has been proven that a kind of so-called leakage delays cannot be ignored because the self-decay process of a neuron’s action potential is not instantaneous in hardware implementation of neural networks. Though leakage delays have been taken into account in a few more recent works concerning the Hopf bifurcation of fractional-order bidirectional associative memory neural networks, the addressed neural networks were low-dimension or the involved time delays were single. In this paper, we propose a five-neuron fractional-order bidirectional associative memory neural network model, which includes leakage delays and discrete communication delays to meet the characteristics of real neural networks better. Then we use the stability theory of fractional differential equations and Hopf bifurcation theory to investigate its dynamic behavior of Hopf bifurcation. The Hopf bifurcation of the proposed model are studied by taking the involved two different leakage delays as the bifurcation parameter respectively, and two kinds of sufficient conditions for Hopf bifurcation are obtained. A numerical example as well as its simulation plots and phase portraits are given at last. Our results indicate that a Hopf bifurcation rises near the zero equilibrium point when the leakage delay reaches its critical value which is given by an explicit formula. Particularly, the results of numerical simulations show that the leakage delay would narrow the stability region of the proposed system and make the Hopf bifurcation occur earlier.</p>","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141257565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Based Deep Learning for COVID-19 Detection Using Respiratory Sound Signals 利用呼吸声信号进行基于优化的 COVID-19 检测深度学习
IF 5.4 3区 计算机科学
Cognitive Computation Pub Date : 2024-06-01 DOI: 10.1007/s12559-024-10300-5
Jawad Ahmad Dar, Kamal Kr Srivastava, Sajaad Ahmed Lone
{"title":"Optimization Based Deep Learning for COVID-19 Detection Using Respiratory Sound Signals","authors":"Jawad Ahmad Dar, Kamal Kr Srivastava, Sajaad Ahmed Lone","doi":"10.1007/s12559-024-10300-5","DOIUrl":"https://doi.org/10.1007/s12559-024-10300-5","url":null,"abstract":"<p>The COVID-19 prediction process is more indispensable to handle the spread and death occurred rate because of COVID-19. However, early and precise prediction of COVID-19 is more difficult, because of different sizes and resolutions of input image. Thus, these challenges and problems experienced by traditional COVID-19 detection methods are considered as major motivation to develop SJHBO-based Deep Q Network. The classification issue of respiratory sound has perceived a great focus from the clinical scientists as well as the community of medical researcher in the previous year for the identification of COVID-19 disease. The major contribution of this research is to design an effectual COVID-19 detection model using devised SJHBO-based Deep Q Network. In this paper, the COVID-19 detection is carried out by the deep learning with optimization technique, namely Snake Jaya Honey Badger Optimization (SJHBO) algorithm-driven Deep Q Network. Here, the SJHBO algorithm is the incorporation of Jaya Honey Badger Optimization (JHBO) along with Snake optimization (SO). Here, the COVID-19 is detected by the Deep Q Network wherein the weights of Deep Q Network are tuned by the SJHBO algorithm. Moreover, JHBO is modelled by hybrids, which are the Jaya algorithm and Honey Badger Optimization (HBO) algorithm. Furthermore, the features, such as spectral contrast, Mel frequency cepstral coefficients (MFCC), empirical mode decomposition (EMD) algorithm, spectral flux, fast Fourier transform (FFT), spectral roll-off, spectral centroid, zero-crossing rate, root mean square energy, spectral bandwidth, spectral flatness, power spectral density, mobility complexity, fluctuation index and relative amplitude, are mined for enlightening the detection performance. The developed method realized the better performance based on the accuracy, sensitivity and specificity of 0.9511, 0.9506 and 0.9469. All test results are validated with the k-fold cross validation method in order to make an assessment of the generalizability of these results. Statistical analysis is performed to analyze the performance of the proposed method based on testing accuracy, sensitivity and specificity. Hence, this paper presents the newly devised SJHBO-based Deep Q-Net for COVID-19 detection. This research considers the audio samples as an input, which is acquired from the Coswara dataset. The SJHBO-based Deep Q network approach is developed for COVID-19 detection. The developed approach can be extended by including other hybrid optimization algorithms as well as other features that can be extracted for further improving the detection performance. The proposed COVID-19 detection method is useful in various applications, like medical and so on. Developed SJHBO-enabled Deep Q network for COVID-19 detection: An effective COVID-19 detection technique is introduced based on hybrid optimization–driven deep learning model. The Deep Q Network is used for detecting COVID-19, which classifies the feature vector ","PeriodicalId":51243,"journal":{"name":"Cognitive Computation","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信