2019 IEEE Global Communications Conference (GLOBECOM)最新文献

筛选
英文 中文
Smart and Connected Scooter for People with Mobility Challenges 适合行动不便人士的智能互联滑板车
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014233
Kaikai Liu
{"title":"Smart and Connected Scooter for People with Mobility Challenges","authors":"Kaikai Liu","doi":"10.1109/GLOBECOM38437.2019.9014233","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014233","url":null,"abstract":"Despite the technical success of existing assistive technologies, for example, electric wheelchairs and scooters, they are still far from effective enough in helping the people with mobility challenges, for example, the elderly, blind, and disabled, navigate to their destinations in a hassle-free manner. While mobility scooters may help to improve the quality of life of their users, operating them is still challenging in many scenarios. Riders often face challenges in driving scooters in some indoor and crowded places, especially on sidewalks with numerous obstacles and other pedestrians. It is also hard to determine the right path, for example, sidewalks with ramps and no dead ends. People with certain disabilities, such as the blind, are often unable to drive their scooters well enough. In this paper, we propose to improve the safety and autonomy of navigation by designing a cutting-edge autonomous scooter, thus allowing people with mobility challenges to ambulate independently and safely in possibly unfamiliar surroundings. To solve the discrepancies of system complexity, sensing, and mapping we propose sensor fusion solutions and connected infrastructure for object localization and mapping under various spatial and lighting conditions. We propose to improve obstacle detection system by performing joint partitioning and deep learning based object detection. Our system design offers the advantages of being affordable, vendor-independent, discreet, noninvasive and unobtrusive.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"17 1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80801230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Cryptography Infrastructures in the Cloud 云中的安全加密基础设施
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014033
Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan, Lingchen Zhang
{"title":"Secure Cryptography Infrastructures in the Cloud","authors":"Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan, Lingchen Zhang","doi":"10.1109/GLOBECOM38437.2019.9014033","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014033","url":null,"abstract":"Information systems are deployed in clouds as virtual machines (VMs) for better agility, elasticity and reliability. It is necessary to safekeep their cryptographic keys, e.g., the private keys used in TLS and SSH, against various attacks. However, existing virtualization solutions do not improve the cryptography facilities of in-cloud systems. This paper presents SECRIN, a secure cryptography infrastructure for VMs in the cloud. SECRIN is composed of a) virtual cryptographic devices implemented in VM monitors (VMMs), and b) a device management tool integrated in the virtualization management system. A virtual device receives requests from VMs, computes with cryptographic keys within the VMM and returns results. The keys appear only in the VMM’s memory space, so that they are kept secret even if the VMs were compromised. With the management tool, the operator of virtualization management systems assigns virtual cryptographic devices to a VM as well as other resources, while the tenant (or owner) of a VM still holds proper controls on the keys. The virtual devices work compatibly with live migration, and the cryptographic computations are not interrupted when the VMs are moving from a host to another. We develop the SECRIN prototype with KVM- QEMU and oVirt. Experimental results show that, it works compatibly with existing virtualization solutions, provides reliable cryptographic computing services for applications, and is secure against attacks happening in VMs.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"12 3 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83519829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Air-to-Water Optical Wireless Communication Using SPADs 基于spad的空对水无线光通信性能分析
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013591
Pooya Nabavi, M. Yuksel
{"title":"Performance Analysis of Air-to-Water Optical Wireless Communication Using SPADs","authors":"Pooya Nabavi, M. Yuksel","doi":"10.1109/GLOBECOM38437.2019.9013591","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013591","url":null,"abstract":"Establishing highly reliable optical wireless communication links to submerged receivers exposed to insufficient light requires highly sensitive receivers with the ability to detect each photon carrying information. To this end, single photon avalanche diode (SPAD) receivers can be considered an appropriate option for the optical receiver system as they benefit from active quenching and biasing circuits, and offer a considerably high breaking voltage, providing the optical system with the ability to detect every single received photon in the ideal case. However, the sensitivity and bandwidth of the existing SPAD receivers have been limited by their dead time and limited photon detection efficiency. In this study, the performance of underwater SPAD receivers in detecting transmitted information from an optical transmitter located in the free space above the sea surface was assessed. To this end, the saddle-point approximation was used along with the Birnbaum-Saunders distribution to statistically model the fading coefficient of the air-to-water optical wireless communication channels and the statistical photon counting behavior of SPADs. The performance of the communication link was then assessed by obtaining the analytical relations for bit error rate. Finally, the results of numerical simulations are presented and the negative effects of dead time on information detection in the optical receiver system in various transmission bit rates are studied.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"42 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84624605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Deep Reinforcement Learning for Channel and Power Allocation in UAV-enabled IoT Systems 支持无人机的物联网系统中信道和功率分配的深度强化学习
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014055
Yang Cao, Lin Zhang, Ying-Chang Liang
{"title":"Deep Reinforcement Learning for Channel and Power Allocation in UAV-enabled IoT Systems","authors":"Yang Cao, Lin Zhang, Ying-Chang Liang","doi":"10.1109/GLOBECOM38437.2019.9014055","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014055","url":null,"abstract":"Unmanned aerial vehicles (UAVs) have recently been proposed as moving base stations to collect data from ground IoT nodes in remote areas. Since IoT nodes are normally battery-limited, energy efficiency is an important metric in IoT systems. In order to improve energy efficiency in UAV-enabled IoT systems, it is necessary to allocate both channels and transmit power properly for IoT nodes. Motivated by the superior performance of deep reinforcement learning (DRL) in decision-making tasks, we propose a DRL-based channel and power allocation framework in a UAV-enabled IoT system. With the proposed framework, the UAV-BS is able to intelligently allocate both channels and transmit power for uplink transmissions of IoT nodes to maximize the minimum energy-efficiency among all the IoT nodes. Simulation results validate the effectiveness of the proposed algorithm and show its superiority over the- state-of-the-arts.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88607290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
CNN-Based Respiration Rate Estimation in Indoor Environments via MIMO FMCW Radar 基于cnn的MIMO FMCW雷达室内呼吸速率估计
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013951
Kohei Yamamoto, Kentaroh Toyoda, T. Ohtsuki
{"title":"CNN-Based Respiration Rate Estimation in Indoor Environments via MIMO FMCW Radar","authors":"Kohei Yamamoto, Kentaroh Toyoda, T. Ohtsuki","doi":"10.1109/GLOBECOM38437.2019.9013951","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013951","url":null,"abstract":"Respiration is known to reflect our health condition, which motivates researchers to develop various radar-based respiration rate estimation methods. However, these conventional methods do not work, when a subject is not right in front of the radar. In this paper, we propose a novel CNN (Convolutional Neural Network)-based respiration rate estimation method in indoor environments via a MIMO (Multiple-Input Multiple-Output) FMCW (Frequency Modulated Continuous Wave) radar. A MIMO FMCW radar can estimate the DoA (Direction of Arrival) and the distance between a MIMO FMCW radar and an object. Thus, the respiration can be captured based on the phase variation at a subject's location. However, even when the advanced signal processing, e.g., MUSIC (MUltiple SIgnal Classification) algorithm, is used, it is difficult to estimate the DoA and the distance in indoor environments due to the large effect of multipath. To deal with this problem, in the proposed method, phase variations against various locations are calculated from the received signals of a MIMO FMCW radar, and then spectrograms are calculated from the phase variations. Each spectrogram is subsequently fed into the CNN that outputs the respiration rates, e.g., 0.1 Hz, 0.2 Hz, and non-respiration, i.e., a spectrogram without the effect of respiration, where is one of the deep learning techniques that have been successfully applied to the image recognition. Through the experiments we confirmed that except for when microwaves were not transmitted directly toward a subject's chest due to furniture, the proposed method accurately estimated the respiration rate, regardless of the situation.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89379607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Online VNF Chaining and Scheduling with Prediction: Optimality and Trade-Offs 带预测的在线VNF链和调度:最优性和权衡
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013961
Xi Huang, Simeng Bian, Xin Gao, Weijie Wu, Ziyu Shao, Yang Yang
{"title":"Online VNF Chaining and Scheduling with Prediction: Optimality and Trade-Offs","authors":"Xi Huang, Simeng Bian, Xin Gao, Weijie Wu, Ziyu Shao, Yang Yang","doi":"10.1109/GLOBECOM38437.2019.9013961","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013961","url":null,"abstract":"For NFV systems, the key design space includes the function chaining for network requests and resource scheduling for servers. The problem is challenging since NFV systems usually require multiple (often conflicting) design objectives and the computational efficiency of decision making with limited information. Besides, the limits and benefits of predictive scheduling to NFV systems still remain unexplored. In this paper, we propose POSCARS, an efficient, distributed, and online algorithm that achieves a tunable trade-off between various system metrics with stability guarantee, while exploiting the power of predictive scheduling. Using randomized load balancing techniques, we propose three variants of POSCARS to further reduce sampling overheads. Theoretical analysis and trace-driven simulations show that POSCARS and its variants require only mild-value of future information to achieve a near- optimal average system cost while effectively shortening the average request response time.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"41 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89400059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Blockchain Model for Fair Data Sharing in Deregulated Smart Grids 解除管制的智能电网中公平数据共享的区块链模型
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013372
Samuel Omaji, N. Javaid, M. Awais, Zeeshan Ahmed, Muhammad Imran, M. Guizani
{"title":"A Blockchain Model for Fair Data Sharing in Deregulated Smart Grids","authors":"Samuel Omaji, N. Javaid, M. Awais, Zeeshan Ahmed, Muhammad Imran, M. Guizani","doi":"10.1109/GLOBECOM38437.2019.9013372","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013372","url":null,"abstract":"The emergence of smart home appliances has generated a high volume of data on smart meters belonging to different customers. However, customers can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage the customers' participation, this paper proposes an access control mechanism by fairly compensating customers for their participation in data sharing via blockchain using the concept of differential privacy. We addressed the computational issues of existing ethereum blockchain by proposing a proof of authority consensus protocol through the Pagerank mechanism in order to derive the reputation scores. Experimental results show the efficiency of the proposed model to minimize privacy risk, and maximize aggregator's profit. In addition, gas consumption, as well as the cost of the computational resources, is reduced.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81954054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Towards Robust Ensemble Defense Against Adversarial Examples Attack 针对对抗性示例攻击的鲁棒集成防御
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013408
Nag Mani, M. Moh, Teng-Sheng Moh
{"title":"Towards Robust Ensemble Defense Against Adversarial Examples Attack","authors":"Nag Mani, M. Moh, Teng-Sheng Moh","doi":"10.1109/GLOBECOM38437.2019.9013408","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013408","url":null,"abstract":"With recent advancements in the field of artificial intelligence, deep learning has created a niche in the technology space and is being actively used in autonomous and IoT systems globally. Unfortunately, these deep learning models have become susceptible to adversarial attacks that can severely impact its integrity. Research has shown that many state-of-the-art models are vulnerable to attacks by well- crafted adversarial examples. These adversarial examples are perturbed versions of clean data with a small amount of noise added to it. These adversarial samples are imperceptible to the human eye yet they can easily fool the targeted model. The exposed vulnerabilities of these models raise the question of their usability in safety-critical real-world applications such as autonomous driving and medical applications. In this work, we have documented the effectiveness of six different gradient-based adversarial attacks on ResNet image recognition model. Defending against these adversaries is challenging. Adversarial re-training has been one of the widely used defense technique. It aims at training a more robust model capable of handling the adversarial examples attack by itself. We showcase the limitations of traditional adversarial-retraining techniques that could be effective against some adversaries but does not protect against more sophisticated attacks. We present a new ensemble defense strategy using adversarial retraining technique that is capable of withstanding six adversarial attacks on cifar10 dataset with a minimum accuracy of 89.31%.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"120 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77306663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Phase Noise Model Selection for Sub-THz Communications 亚太赫兹通信的相位噪声模型选择
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013189
Simon Bicais, Jean-Baptiste Doré
{"title":"Phase Noise Model Selection for Sub-THz Communications","authors":"Simon Bicais, Jean-Baptiste Doré","doi":"10.1109/GLOBECOM38437.2019.9013189","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013189","url":null,"abstract":"To face the exponential data traffic growth, the sub-THz spectrum (100-300 GHz) is envisioned for wireless communications. However, sub-THz systems are critically impacted by the strong phase noise of high frequency oscillators. This paper discusses the appropriate choice of phase noise model for sub-THz communications. Two phase noise models are introduced and compared: one correlated, accurate but complex, and another uncorrelated, analytically simpler. The expression of the likelihood ratio enables us to propose an analytical condition to select the best of the two models for a measured oscillator spectral characteristic. Numerical simulations are performed with realistic phase noise generated according to a state-of-the-art sub-THz oscillator and show that an uncorrelated Gaussian process is appropriate to model the impact of phase noise in sub-THz systems. Eventually, the proposed results are applied to link adaptation in the presence of phase noise in order to choose the most robust scheme between a coherent and a differential modulation.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"55 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85321857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Secure Event Logging Using a Blockchain of Heterogeneous Computing Resources 使用异构计算资源区块链的安全事件日志记录
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013452
Konstandinos Koumidis, P. Kolios, G. Ellinas, C. Panayiotou
{"title":"Secure Event Logging Using a Blockchain of Heterogeneous Computing Resources","authors":"Konstandinos Koumidis, P. Kolios, G. Ellinas, C. Panayiotou","doi":"10.1109/GLOBECOM38437.2019.9013452","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013452","url":null,"abstract":"Secure logging is essential for the integrity and accountability of cyber-physical systems (CPS). To prevent modification of log files the integrity of data must be ensured. In this work, we propose a solution for secure event in cyberphysical systems logging based on the blockchain technology, by encapsulating event data in blocks. The proposed solution considers the real-time application constraints that are inherent in CPS monitoring and control functions by optimizing the heterogeneous resources governing blockchain computations. In doing so, the proposed blockchain mechanism manages to deliver events in hard-to-tamper ledger blocks that can be accessed and utilized by the various functions and components of the system. Performance analysis of the proposed solution is conducted through extensive simulation, demonstrating the effectiveness of the proposed approach in delivering blocks of events on time using the minimum computational resources.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"42 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90781679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信