2021 IEEE Globecom Workshops (GC Wkshps)最新文献

筛选
英文 中文
Joint Deployment Design and Power Control for UAV-enabled Covert Communications 无人机隐蔽通信的联合部署设计和功率控制
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9682010
Ziheng Zhang, Yuchen Zhang, Sa Xiao, Jianquan Wang, Wanbin Tang
{"title":"Joint Deployment Design and Power Control for UAV-enabled Covert Communications","authors":"Ziheng Zhang, Yuchen Zhang, Sa Xiao, Jianquan Wang, Wanbin Tang","doi":"10.1109/GCWkshps52748.2021.9682010","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682010","url":null,"abstract":"Unmanned aerial vehicle (UAV) communications have become a promising technique to provide flexible and cost-effective connective service. However, due to its high chance of line-of-sight (LOS) links, UAV communications tend to be detected by the illegal adversaries, which degrades its safety level especially in military scenarios. In this paper, we investigate covert data transmission for UAV communications under the air-to-ground channel model with both LOS and non-line-of-sight components. We aim to maximize the transmit rate of UAV communications while prevent the existence of the transmission from being discovered by the adversary via joint the UAV deployment and transmit power control. We prove the transmit power control and the UAV deployment in the original optimization problem can be decoupled, and derive the closed-form optimal solutions to each sub-problem. Numerical results verify the effectiveness of the proposed algorithm.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"38 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72814901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AI-powered Infrastructures for Intelligence and Automation in Beyond-5G Systems 超5g系统中用于智能和自动化的人工智能基础设施
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9682117
L. Militano, Anastasios Zafeiropoulos, Eleni Fotopoulou, R. Bruschi, C. Lombardo, Andy Edmonds, S. Papavassiliou
{"title":"AI-powered Infrastructures for Intelligence and Automation in Beyond-5G Systems","authors":"L. Militano, Anastasios Zafeiropoulos, Eleni Fotopoulou, R. Bruschi, C. Lombardo, Andy Edmonds, S. Papavassiliou","doi":"10.1109/GCWkshps52748.2021.9682117","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682117","url":null,"abstract":"In this paper, a vision for beyond-5G systems is proposed where automation and intelligence in cloud-native infrastructures are in focus. Exploiting the convergence of cloud technologies at the edge and mobile communication networks, a set of technological solutions is discussed that will play a fundamental role on the path from 5G towards future 6G systems. Currently, a strong need is felt in the telecommunication world for greater automation to meet the extreme requirements expected for 6G applications. Artificial Intelligence (AI) is gaining momentum as one of the main enabling technologies for beyond-5G networks. Reinforcement Learning (RL) and Federated Learning (FL) are here proposed as technologies to enhance automation and improve the intelligence of orchestration mechanisms of both network services and applications. These technologies are brought together in a comprehensive cloud-native architectural vision to fill the gap between current 5G systems and AI-powered systems of the future.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"79 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83767096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
O-RAN AI/ML Workflow Implementation of Personalized Network Optimization via Reinforcement Learning 通过强化学习实现个性化网络优化的O-RAN AI/ML工作流
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9681936
Hoejoo Lee, Youngcheol Jang, Juhwan Song, Hunje Yeon
{"title":"O-RAN AI/ML Workflow Implementation of Personalized Network Optimization via Reinforcement Learning","authors":"Hoejoo Lee, Youngcheol Jang, Juhwan Song, Hunje Yeon","doi":"10.1109/GCWkshps52748.2021.9681936","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681936","url":null,"abstract":"In this paper, we study AI-based RAN technology for 5G and 6G networks that are more complex and difficult to analyze than previous generations to make the network more intelligent. We implement a reference AI/ML workflow using RAN Intelligent Controller (RIC) by referring to the AI/ML workflow architecture of O-RAN. We focus on the establishment of an online training environment based on the RIC platform. We use various open-source platforms to serve the ML model as an inference service and to build a Machine Learning (ML) training pipeline for online training. We train our own Reinforcement Learning (RL) model which controls function parameters in Distributed Unit (DU) to maximize total cell throughput. After training the model with data from a specific cell, it is deployed in a different environment. We demonstrate the effectiveness of our proposal by optimizing the model performance and executing the training pipeline for retraining the model using online workflow. As compared to the model before retraining, the total cell throughput has increased by 19.4% when controlled using the retrained model.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"11 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87524124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimal Geometry of Elliptical Target Localization 椭圆目标定位的最优几何
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9682134
Na Zhao, Yunlong Wang, Rico Mendrzik, Yuanpeng Liu, Qing Chang, Yuan Shen
{"title":"Optimal Geometry of Elliptical Target Localization","authors":"Na Zhao, Yunlong Wang, Rico Mendrzik, Yuanpeng Liu, Qing Chang, Yuan Shen","doi":"10.1109/GCWkshps52748.2021.9682134","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682134","url":null,"abstract":"This letter unifies the optimal geometry analysis for elliptical target localization by a new notion called virtual agents (VAs), which allows the conversion of a bi-static time-of-arrival (TOA) measurement to a direct TOA measurement with equivalent Fisher information. Using the notion of VAs, we determine the optimal geometries with different types of measurements based on D-optimality. In particular, the optimal geometry is attained when the angles between transmitter-to-target and target-to-agent directions are ±π/3 for the TOA case, or the agents have an equal angular spacing around the target with equal ranging information intensity (RII) for the angle-of-arrival (AOA) case. Moreover, we also show that for the TOA/AOA fusion case, the optimal geometry occurs if the transmitter, agents, and target are collinear under both single-agent with arbitrary RII and multi-agent with identical RII between two measurements conditions. Finally, numerical results are given to validate our theoretical analysis.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"60 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87527930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI Based Algorithm-Hardware Separation for IoV Security 基于AI的车联网安全算法-硬件分离
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9681992
M. Aman, B. Sikdar
{"title":"AI Based Algorithm-Hardware Separation for IoV Security","authors":"M. Aman, B. Sikdar","doi":"10.1109/GCWkshps52748.2021.9681992","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681992","url":null,"abstract":"The Internet of vehicles is emerging as an exciting application to improve safety and providing better services in the form of active road signs, pay-as-you-go insurance, electronic toll, and fleet management. Internet connected vehicles are exposed to new attack vectors in the form of cyber threats and with the increasing trend of cyber attacks, the success of autonomous vehicles depends on their security. Existing techniques for IoV security are based on the un-realistic assumption that all the vehicles are equipped with the same hardware (at least in terms of computational capabilities). However, the hardware platforms used by various vehicle manufacturers are highly heterogeneous. Therefore, a security protocol designed for IoVs should be able to detect the computational capabilities of the underlying platform and adjust the security primitives accordingly. To solve this issue, this paper presents a technique for algorithm-hardware separation for IoV security. The proposed technique uses an iterative routine and the corresponding execution time to detect the computational capabilities of a hardware platform using an artificial intelligence based inference engine. The results on three different commonly used micro-controllers show that the proposed technique can effectively detect the type of hardware platform with up to 100% accuracy.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"100 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85846087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Resource Allocation in NOMA-assisted D2D Communication with Imperfect Channel State 非完美信道状态下noma辅助D2D通信的最优资源分配
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9681954
Rajesh Gupta, S. Tanwar
{"title":"Optimal Resource Allocation in NOMA-assisted D2D Communication with Imperfect Channel State","authors":"Rajesh Gupta, S. Tanwar","doi":"10.1109/GCWkshps52748.2021.9681954","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681954","url":null,"abstract":"Device-to-device communication (D2D) is a promising technology of fifth-generation (5G) networks to maximize spectral efficiency. It permits direct communication between the mobile devices if they are in proximity by ignoring the base station. Despite improving spectral efficiency, it also improves the system data rate, minimizes the communication latency, and reduces the burden on the base station (for data uplink and downlink). The existing communication majorly focused on orthogonal multiple access (OMA), which serves one user at a time for spectrum sharing. To improve the spectral efficiency, non-orthogonal multiple access (NOMA) schemes can be employed that serve multiple users for spectrum sharing. NOMA drastically improves the spectrum sharing, but the devices can cause more interference that degrades overall the network performance. But, successive interference cancellation (SIC) of NOMA mitigates the interference issues and improves the system’s signal to interference noise ratio (SINR). Further, the system’s sum rate and secrecy capacity can be improved with a matching-based algorithm for optimal power allocation. This improves the overall sum rate, which further improves the system’s secrecy capacity against the number of eavesdroppers. Finally, the performance, i.e., overall sum rate and average secrecy capacity of the proposed system is evaluated by considering varying numbers of cellular users, D2D groups, and eavesdroppers.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86993117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cell On/Off Parameter Optimization for Saving Energy via Reinforcement Learning 基于强化学习节能的细胞开/关参数优化
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9682160
Minsuk Choi, Kyungrae Kim, Hongjun Jang, Hyokyung Woo, Joan S. Pujol Roig, Yue Wang, Hunje Yeon, Sunghyun Choi, Seowoo Jang
{"title":"Cell On/Off Parameter Optimization for Saving Energy via Reinforcement Learning","authors":"Minsuk Choi, Kyungrae Kim, Hongjun Jang, Hyokyung Woo, Joan S. Pujol Roig, Yue Wang, Hunje Yeon, Sunghyun Choi, Seowoo Jang","doi":"10.1109/GCWkshps52748.2021.9682160","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682160","url":null,"abstract":"Energy cost accounts for a large portion of expenses when operating a cellular mobile network, and it is expected to increase further to support advanced communication features and more base stations as the network evolves. In this work, we address energy saving by turning off cells while minimizing the impact on the performance of the network. However, the challenge here is to optimally and safely manage a cell on/off operation depending on the states of and demands to the networks as they may vary in a wide range in general. In order to be adaptive to the circumstances that a base station is posed and to requirements from its service provider, reinforcement learning-based approaches are used in this work to train personalized or customized neural policies, which operate the cell on/off algorithm. It is shown with a replicative simulator, which has the capability to reproduce the states and behaviors of real RANs (Radio Access Network) using the real data extracted from them, that our approach achieves maximum gain in energy saving while satisfying given constraints on the performance. Also, we propose a couple of operational modes to balance between the performance of energy saving and the cost for running the solution. Through training and evaluation on simple yet demonstrative scenarios, we demonstrate that our approach provides customized solutions and propose various operational options that a service provider can choose from.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"86 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84038340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coverage Analysis of Blockchain-enabled Wireless IoMT Networks 基于区块链的无线IoMT网络覆盖分析
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9682144
Xuran Li, Hongning Dai, Jie Tian, Dehuan Wan, Dengwang Li
{"title":"Coverage Analysis of Blockchain-enabled Wireless IoMT Networks","authors":"Xuran Li, Hongning Dai, Jie Tian, Dehuan Wan, Dengwang Li","doi":"10.1109/GCWkshps52748.2021.9682144","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682144","url":null,"abstract":"The blockchain-enabled wireless Internet of medical things (IoMT) system has recently drawn extensive attention due to the provision of highly-secured healthcare services. However, multiple simultaneous transmissions in blockchain-enabled IoMT (BC-IoMT) networks can cause interference, consequently degrading the overall performance of the system. It is necessary to investigate the performance of BC-IoMT networks. In this paper, we propose a novel analytical framework for wireless BCIoMT networks with consideration of both the spatial model on geographical random distribution of IoMT users and the temporal model on stochastic nature of data block transmission. With this framework, we derive a closed-form expression of the coverage probability in the wireless BC-IoMT network. Our extensive simulation results verify the accuracy of our theoretical analysis. From the analytical framework, we find that the path loss effect, the number of interfering medical sensor devices, and the threshold of successful transmission have a significant impact on the coverage performance of wireless BC-IoMT networks.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"13 4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91000497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twin-empowered Network Slicing in B5G Networks: Experience-driven approach B5G网络中基于数字孪生的网络切片:体验驱动的方法
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9682073
F. Naeem, Georges Kaddoum, M. Tariq
{"title":"Digital Twin-empowered Network Slicing in B5G Networks: Experience-driven approach","authors":"F. Naeem, Georges Kaddoum, M. Tariq","doi":"10.1109/GCWkshps52748.2021.9682073","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682073","url":null,"abstract":"Network slicing is considered a promising networking pillar of efficient resource management in beyond 5G (B5G) networks. However, the dynamic and complex characteristics of future networks pose challenges in designing novel resource allocation techniques due to the stringent quality of service (QoS) requirements and virtualized network infrastructures. To solve this issue, we propose a digital twin (DT)-enabled deep distributional Q-network (DDQN) framework that constructs a digital mirror of the physical slicing-enabled network to simulate its complex environment and predict the dynamic characteristics of the network. The DT of network slicing is expressed as a graph, and a graph neural network (GNN) is developed to learn the complicated relationships of the network slice. The graph-based network states are forwarded to the DDQN agent to learn the optimal network slicing policy. Through simulations, it is demonstrated that the proposed technique can satisfy the stringent QoS requirements and achieve near-optimal performance in a dynamic B5G network.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"27 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81445613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks 基于深度学习的3D波束成形在5G及以后无线网络中的安全通信
2021 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2021-12-01 DOI: 10.1109/GCWkshps52748.2021.9681960
Helin Yang, Kwok-Yan Lam, Jiangtian Nie, Jun Zhao, S. Garg, Liang Xiao, Zehui Xiong, M. Guizani
{"title":"3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks","authors":"Helin Yang, Kwok-Yan Lam, Jiangtian Nie, Jun Zhao, S. Garg, Liang Xiao, Zehui Xiong, M. Guizani","doi":"10.1109/GCWkshps52748.2021.9681960","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681960","url":null,"abstract":"Three-dimensional (3D) beamforming is a potential technique to enhance communication security of new generation networks such as 5G and beyond. However, it is difficult to achieve optimal beamforming due to the challenges of nonconvex optimization problem and imperfect channel state information (CSI). To tackle this problem, this paper proposes a novel deep learning-based 3D beamforming scheme, where a deep neural network (DNN) is trained to optimize the beamforming design for wireless signals in order to guard against eavesdropper under the imperfect CSI. With our approach, the system is capable of training the DNN model offline, and the trained model can then be adopted to instantaneously select the 3D secure beamforming matrix for achieving the maximum secrecy rate of the system, which is measured by the signal received by eavesdroppers outside the path of the beam. Simulation results demonstrate that the proposed solution outperforms the classical deep learning algorithm and 2D beamforming solution in terms of the secrecy rate and robust performance.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"80 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80026300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信