Ieee-Caa Journal of Automatica Sinica最新文献

筛选
英文 中文
Synthesis of Optimal Stealthy Attacks against Diagnosability in Labeled Petri Nets 标记Petri网可诊断性最优隐身攻击的综合
IF 19.2 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-06-12 DOI: 10.1109/JAS.2025.125156
Ruotian Liu;Agostino Marcello Mangini;Maria Pia Fanti
{"title":"Synthesis of Optimal Stealthy Attacks against Diagnosability in Labeled Petri Nets","authors":"Ruotian Liu;Agostino Marcello Mangini;Maria Pia Fanti","doi":"10.1109/JAS.2025.125156","DOIUrl":"https://doi.org/10.1109/JAS.2025.125156","url":null,"abstract":"This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In particular, we focus on a stealthy replacement attack to alter or corrupt the observation of the system, in which the transition labels are replaced by others or empty string, and its attack stealthiness requires that the corrupted observations should be contained in the behavior of system. The aim of this work is, from an attacker viewpoint, to design a stealthy replacement attack for violating the diagnosability of system. To this end, we first build a new structure, called complete unfolded verifier, with the notion of a predefined elementary unsound path that leads to the violation of diagnosability, which is used to enumerate all the potential attacked paths to be transformed into elementary unsound ones. Then an optimal attack synthesis problem in terms of minimum energy cost is formulated by determining whether an elementary unsound path is generated via solving a set of integer nonlinear programming problems. Finally, we show that the nonlinear programming problems can be transformed into integer linear programming problems by introducing additional linear constraints. Examples are used to illustrate the proposed attack strategy.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 8","pages":"1661-1672"},"PeriodicalIF":19.2,"publicationDate":"2025-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144880577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Sliding Mode Control with Linear Extended State Observer for Active Magnetic Bearing-Rotor Systems 主动磁轴承-转子系统的线性扩展状态观测器自适应滑模控制
IF 19.2 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-06-12 DOI: 10.1109/JAS.2024.125037
Yaozhong Zheng;Hai-Tao Zhang;Ziheng Yu;Xiang Huang;Haichao Jiao;Han Ding
{"title":"Adaptive Sliding Mode Control with Linear Extended State Observer for Active Magnetic Bearing-Rotor Systems","authors":"Yaozhong Zheng;Hai-Tao Zhang;Ziheng Yu;Xiang Huang;Haichao Jiao;Han Ding","doi":"10.1109/JAS.2024.125037","DOIUrl":"https://doi.org/10.1109/JAS.2024.125037","url":null,"abstract":"Dear Editor, Active magnetic bearings (AMBs) are of considerable interest and significance in smart manufacturing due to their zero-friction and adaptivity to noncontact rotor rotations. This paper proposes an active levitation control algorithm based on adaptive sliding mode control (ASMC) equipped with linear extended state observer (LESO). Sufficient conditions are derived to guarantee the asymptotical stability of the associated closed-loop system. Experiments are conducted on a real AMB-rotor platform to demonstrate the effectiveness and superiority of the proposed algorithm.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 8","pages":"1736-1738"},"PeriodicalIF":19.2,"publicationDate":"2025-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11033722","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144880627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Distributed Algorithms for Aggregative Games 聚集博弈的分布式算法综述
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-04-15 DOI: 10.1109/JAS.2024.124998
Huaqing Li;Jun Li;Liang Ran;Lifeng Zheng;Tingwen Huang
{"title":"A Survey of Distributed Algorithms for Aggregative Games","authors":"Huaqing Li;Jun Li;Liang Ran;Lifeng Zheng;Tingwen Huang","doi":"10.1109/JAS.2024.124998","DOIUrl":"https://doi.org/10.1109/JAS.2024.124998","url":null,"abstract":"Game theory-based models and design tools have gained substantial prominence for controlling and optimizing behavior within distributed engineering systems due to the inherent distribution of decisions among individuals. In non-cooperative settings, aggregative games serve as a mathematical framework model for the interdependent optimal decision-making problem among a group of non-cooperative players. In such scenarios, each player's decision is influenced by an aggregation of all players' decisions. Nash equilibrium (NE) seeking in aggregative games has emerged as a vibrant topic driven by applications that harness the aggregation property. This paper presents a comprehensive overview of the current research on aggregative games with a focus on communication topology. A systematic classification is conducted on distributed algorithm research based on communication topologies such as undirected networks, directed networks, and time-varying networks. Furthermore, it sorts out the challenges and compares the algorithms' convergence performance. It also delves into real-world applications of distributed optimization techniques grounded in aggregative games. Finally, it proposes several challenges that can guide future research directions.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 5","pages":"859-871"},"PeriodicalIF":15.3,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144073003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Transactional-Behavior-Based Hierarchical Gated Network for Credit Card Fraud Detection 基于交易行为的分层门控网络信用卡欺诈检测
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-04-15 DOI: 10.1109/JAS.2025.125243
Yu Xie;MengChu Zhou;Guanjun Liu;Lifei Wei;Honghao Zhu;Pasquale De Meo
{"title":"A Transactional-Behavior-Based Hierarchical Gated Network for Credit Card Fraud Detection","authors":"Yu Xie;MengChu Zhou;Guanjun Liu;Lifei Wei;Honghao Zhu;Pasquale De Meo","doi":"10.1109/JAS.2025.125243","DOIUrl":"https://doi.org/10.1109/JAS.2025.125243","url":null,"abstract":"The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit card companies have used rule-based approaches to detect fraudulent transactions, but these have proven inadequate due to the complexity of fraud strategies and have been replaced by much more powerful solutions based on machine learning or deep learning algorithms. Despite significant progress, the current approaches to fraud detection suffer from a number of limitations: for example, it is unclear whether some transaction features are more effective than others in discriminating fraudulent transactions, and they often neglect possible correlations among transactions, even though they could reveal illicit behaviour. In this paper, we propose a novel credit card fraud detection (CCFD) method based on a transaction behaviour-based hierarchical gated network. First, we introduce a feature-oriented extraction module capable of identifying key features from original transactions, and such analysis is effective in revealing the behavioural characteristics of fraudsters. Second, we design a transaction-oriented extraction module capable of capturing the correlation between users' historical and current transactional behaviour. Such information is crucial for revealing users' sequential behaviour patterns. Our approach, called transactional-behaviour-based hierarchical gated network model (TbHGN), extracts two types of new transactional features, which are then combined in a feature interaction module to learn the final transactional representations used for CCFD. We have conducted extensive experiments on a real-world credit card transaction dataset with an increase in average F1 between 1.42% and 6.53% and an improvement in average AUC between 0.63% and 2.78% over the state of the art.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1489-1503"},"PeriodicalIF":15.3,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Algorithms Based on Double-Integral Coevolutionary Neurodynamics in Deep Learning 深度学习中基于双积分协同进化神经动力学的优化算法
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-04-15 DOI: 10.1109/JAS.2025.125210
Dan Su;Jie Han;Chunhua Yang;Weihua Gui
{"title":"Optimization Algorithms Based on Double-Integral Coevolutionary Neurodynamics in Deep Learning","authors":"Dan Su;Jie Han;Chunhua Yang;Weihua Gui","doi":"10.1109/JAS.2025.125210","DOIUrl":"https://doi.org/10.1109/JAS.2025.125210","url":null,"abstract":"Deep neural networks are increasingly exposed to attack threats, and at the same time, the need for privacy protection is growing. As a result, the challenge of developing neural networks that are both robust and capable of strong generalization while maintaining privacy becomes pressing. Training neural networks under privacy constraints is one way to minimize privacy leakage, and one way to do this is to add noise to the data or model. However, noise may cause gradient directions to deviate from the optimal trajectory during training, leading to unstable parameter updates, slow convergence, and reduced model generalization capability. To overcome these challenges, we propose an optimization algorithm based on double-integral coevolutionary neurodynamics (DICND), designed to accelerate convergence and improve generalization in noisy conditions. Theoretical analysis proves the global convergence of the DICND algorithm and demonstrates its ability to converge to near-global minima efficiently under noisy conditions. Numerical simulations and image classification experiments further confirm the DICND algorithm's significant advantages in enhancing generalization performance.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 6","pages":"1236-1245"},"PeriodicalIF":15.3,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144281238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Event-Triggered Nash Equilibrium Seeking for Aggregative Game with Second-Order Dynamics 二阶动力学聚集对策的分布式事件触发纳什均衡寻求
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-04-15 DOI: 10.1109/JAS.2024.124830
Yi Huang;Jian Sun;Qing Fei
{"title":"Distributed Event-Triggered Nash Equilibrium Seeking for Aggregative Game with Second-Order Dynamics","authors":"Yi Huang;Jian Sun;Qing Fei","doi":"10.1109/JAS.2024.124830","DOIUrl":"https://doi.org/10.1109/JAS.2024.124830","url":null,"abstract":"Dear Editor, This letter studies the distributed Nash equilibrium seeking problem of aggregative game, in which the decision of each player obeys second-order dynamics and is constrained by nonidentical convex sets. To seek the generalized Nash equilibrium (GNE), a projection-based distributed algorithm via constant step-sizes is developed with linear convergence. In particular, a variable tracking technique is incorporated to estimate the aggregative function, and an event-triggered mechanism is designed to reduce the communication cost. Finally, a numerical example demonstrates the theoretical results.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 7","pages":"1519-1521"},"PeriodicalIF":15.3,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10965922","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144536433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unified Output Feedback Based Prescribed Performance Consensus Tracking Control of Heterogeneous Multi-Agent Systems 基于统一输出反馈的异构多智能体系统预定性能一致性跟踪控制
IF 19.2 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-04-15 DOI: 10.1109/JAS.2024.125094
Dahui Luo;Yujuan Wang;Frank L. Lewis;Yongduan Song
{"title":"Unified Output Feedback Based Prescribed Performance Consensus Tracking Control of Heterogeneous Multi-Agent Systems","authors":"Dahui Luo;Yujuan Wang;Frank L. Lewis;Yongduan Song","doi":"10.1109/JAS.2024.125094","DOIUrl":"https://doi.org/10.1109/JAS.2024.125094","url":null,"abstract":"This paper proposes an output-feedback based prescribed performance consensus tracking control methodology for a class of heterogeneous multi-agent systems (HMASs) with inconsistent system structure, where the performance behavior is allowed to be different from that of each other. Both the heterogeneous system structures and the nonidentical performance requirements make the control problem much more challenging than that of MASs with identical structure and performance requirement. This is mainly due to the coupling effect of the system dynamics and performance restriction of each agent in the cooperative control action. The key to solve this problem is to introduce a dual-phase performance-guaranteed method, in which the consensus tracking error is decomposed into auxiliary tracking error and filter tracking error and then the whole performance control is decomposed into two phases. By confining the two errors respectively, the practical tracking error can be proved to be explicitly confined within an arbitrarily given performance envelope by merely adjusting the design parameters rather than modifying control structure. Moreover, the prescribed performance control (PPC) result is not only uniform with any initial conditions and design parameters, allowing it to be global, but also unifying both the global and semi-global result into one frame, distinguishing itself from most existing PPC works where either only global or only semi-global result is guaranteed. Finally, the effectiveness of the proposed control scheme is confirmed by the simulation conducted on a group of tunnel-diode circuits (TDC).","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 8","pages":"1636-1647"},"PeriodicalIF":19.2,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144887868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Type Feature Fusion Network Based on Importance Weighting for Occluded Human Pose Estimation 基于重要性加权的多类型特征融合网络遮挡人体姿态估计
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-04-01 DOI: 10.1109/JAS.2024.124953
Jiahong Jiang;Nan Xia;Siyao Zhou
{"title":"A Multi-Type Feature Fusion Network Based on Importance Weighting for Occluded Human Pose Estimation","authors":"Jiahong Jiang;Nan Xia;Siyao Zhou","doi":"10.1109/JAS.2024.124953","DOIUrl":"https://doi.org/10.1109/JAS.2024.124953","url":null,"abstract":"Human pose estimation is a challenging task in computer vision. Most algorithms perform well in regular scenes, but lack good performance in occlusion scenarios. Therefore, we propose a multi-type feature fusion network based on importance weighting, which consists of three modules. In the first module, we propose a multi-resolution backbone with two feature enhancement sub-modules, which can extract features from different scales and enhance the feature expression ability. In the second module, we enhance the expressiveness of keypoint features by suppressing obstacle features and compensating for the unique and shared attributes of keypoints and topology. In the third module, we perform importance weighting on the adjacency matrix to enable it to describe the correlation among nodes, thereby improving the feature extraction ability. We conduct comparative experiments on the keypoint detection datasets of common objects in Context 2017 (COCO2017), COCO-Whole-body and CrowdPose, achieving the accuracy of 78.9%, 67.1% and 77.6%, respectively. Additionally, a series of ablation experiments are designed to show the performance of our work. Finally, we present the visualization of different scenarios to verify the effectiveness of our work.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 4","pages":"789-805"},"PeriodicalIF":15.3,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143748740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Spacecraft Formation Control Under False Data Injection Attack: A Cross Layer Fuzzy Game Approach 虚假数据注入攻击下的多航天器编队控制:一种跨层模糊对策方法
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-04-01 DOI: 10.1109/JAS.2024.124872
Yifan Zhong;Yuan Yuan;Huanhuan Yuan;Mengbi Wang;Huaping Liu
{"title":"Multi-Spacecraft Formation Control Under False Data Injection Attack: A Cross Layer Fuzzy Game Approach","authors":"Yifan Zhong;Yuan Yuan;Huanhuan Yuan;Mengbi Wang;Huaping Liu","doi":"10.1109/JAS.2024.124872","DOIUrl":"https://doi.org/10.1109/JAS.2024.124872","url":null,"abstract":"In this paper, we address a cross-layer resilient control issue for a kind of multi-spacecraft system (MSS) under attack. Attackers with bad intentions use the false data injection (FDI) attack to prevent the MSS from reaching the goal of consensus. In order to ensure the effectiveness of the control, the embedded defender in MSS preliminarily allocates the defense resources among spacecrafts. Then, the attacker selects its target spacecrafts to mount FDI attack to achieve the maximum damage. In physical layer, a Nash equilibrium (NE) control strategy is proposed for MSS to quantify system performance under the effect of attacks by solving a game problem. In cyber layer, a fuzzy Stackelberg game framework is used to examine the rivalry process between the attacker and defender. The strategies of both attacker and defender are given based on the analysis of physical layer and cyber layer. Finally, a simulation example is used to test the viability of the proposed cross layer fuzzy game algorithm.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 4","pages":"776-788"},"PeriodicalIF":15.3,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143748842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dissecting and Mitigating Semantic Discrepancy in Stable Diffusion for Image-to-Image Translation 图像到图像翻译中稳定扩散的语义差异分析与缓解
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-04-01 DOI: 10.1109/JAS.2024.124800
Yifan Yuan;Guanqun Yang;James Z. Wang;Hui Zhang;Hongming Shan;Fei-Yue Wang;Junping Zhang
{"title":"Dissecting and Mitigating Semantic Discrepancy in Stable Diffusion for Image-to-Image Translation","authors":"Yifan Yuan;Guanqun Yang;James Z. Wang;Hui Zhang;Hongming Shan;Fei-Yue Wang;Junping Zhang","doi":"10.1109/JAS.2024.124800","DOIUrl":"https://doi.org/10.1109/JAS.2024.124800","url":null,"abstract":"Finding suitable initial noise that retains the original image's information is crucial for image-to-image (I2I) translation using text-to-image (T2I) diffusion models. A common approach is to add random noise directly to the original image, as in SDEdit. However, we have observed that this can result in “semantic discrepancy” issues, wherein T2I diffusion models mis-interpret the semantic relationships and generate content not present in the original image. We identify that the noise introduced by SDEdit disrupts the semantic integrity of the image, leading to unintended associations between unrelated regions after U-Net upsampling. Building on the widely-used latent diffusion model, Stable Diffusion, we propose a training-free, plug-and-play method to alleviate semantic discrepancy and enhance the fidelity of the translated image. By leveraging the deterministic nature of denoising diffusion implicit models (DDIMs) inversion, we correct the erroneous features and correlations from the original generative process with accurate ones from DDIM inversion. This approach alleviates semantic discrepancy and surpasses recent DDIM-inversion-based methods such as PnP with fewer priors, achieving a speedup of 11.2 times in experiments conducted on COCO, ImageNet, and ImageNet-R datasets across multiple I2I translation tasks. The codes are available at https://github.com/Sherlockyyf/Semantic_Discrepancy.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 4","pages":"705-718"},"PeriodicalIF":15.3,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143748843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信