Yiwen Xu, Tariq M. Khan, Yang Song, Erik Meijering
{"title":"Edge deep learning in computer vision and medical diagnostics: a comprehensive survey","authors":"Yiwen Xu, Tariq M. Khan, Yang Song, Erik Meijering","doi":"10.1007/s10462-024-11033-5","DOIUrl":"10.1007/s10462-024-11033-5","url":null,"abstract":"<div><p>Edge deep learning, a paradigm change reconciling edge computing and deep learning, facilitates real-time decision making attuned to environmental factors through the close integration of computational resources and data sources. Here we provide a comprehensive review of the current state of the art in edge deep learning, focusing on computer vision applications, in particular medical diagnostics. An overview of the foundational principles and technical advantages of edge deep learning is presented, emphasising the capacity of this technology to revolutionise a wide range of domains. Furthermore, we present a novel categorisation of edge hardware platforms based on performance and usage scenarios, facilitating platform selection and operational effectiveness. Following this, we dive into approaches to effectively implement deep neural networks on edge devices, encompassing methods such as lightweight design and model compression. Reviewing practical applications in the fields of computer vision in general and medical diagnostics in particular, we demonstrate the profound impact edge-deployed deep learning models can have in real-life situations. Finally, we provide an analysis of potential future directions and obstacles to the adoption of edge deep learning, with the intention to stimulate further investigations and advancements of intelligent edge deep learning solutions. This survey provides researchers and practitioners with a comprehensive reference shedding light on the critical role deep learning plays in the advancement of edge computing applications.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11033-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A taxonomy of literature reviews and experimental study of deepreinforcement learning in portfolio management","authors":"Mohadese Rezaei, Hossein Nezamabadi-Pour","doi":"10.1007/s10462-024-11066-w","DOIUrl":"10.1007/s10462-024-11066-w","url":null,"abstract":"<div><p>Portfolio management involves choosing and actively overseeing various investment assets to meet an investor’s long-term financial goals, considering their risk tolerance and desired return potential. Traditional methods, like mean–variance analysis, often lack the flexibility needed to navigate the complexities of today’s financial markets. Recently, Deep Reinforcement Learning (DRL) has emerged as a promising approach, enabling continuous adjustments to investment strategies based on market feedback without explicit price predictions. This paper presents a comprehensive literature review of DRL applications in portfolio management, aimed at finance researchers, data scientists, AI experts, FinTech engineers, and students seeking advanced portfolio optimization methodologies. We also conducted an experimental study to evaluate five DRL algorithms—Advantage Actor-Critic (A2C), Deep Deterministic Policy Gradient (DDPG), Proximal Policy Optimization (PPO), Soft Actor-Critic (SAC), and Twin Delayed DDPG (TD3)—in managing a portfolio of 30 Dow Jones Industrial Average (DJIA) stocks. Their performance is compared with the DJIA index and traditional strategies, demonstrating DRL’s potential to improve portfolio outcomes while effectively managing risk.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11066-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhishek Upadhyay, Narendra Singh Chandel, Krishna Pratap Singh, Subir Kumar Chakraborty, Balaji M. Nandede, Mohit Kumar, A. Subeesh, Konga Upendar, Ali Salem, Ahmed Elbeltagi
{"title":"Deep learning and computer vision in plant disease detection: a comprehensive review of techniques, models, and trends in precision agriculture","authors":"Abhishek Upadhyay, Narendra Singh Chandel, Krishna Pratap Singh, Subir Kumar Chakraborty, Balaji M. Nandede, Mohit Kumar, A. Subeesh, Konga Upendar, Ali Salem, Ahmed Elbeltagi","doi":"10.1007/s10462-024-11100-x","DOIUrl":"10.1007/s10462-024-11100-x","url":null,"abstract":"<div><p>Plant diseases cause significant damage to agriculture, leading to substantial yield losses and posing a major threat to food security. Detection, identification, quantification, and diagnosis of plant diseases are crucial parts of precision agriculture and crop protection. Modernizing agriculture and improving production efficiency are significantly affected by using computer vision technology for crop disease diagnosis. This technology is notable for its non-destructive nature, speed, real-time responsiveness, and precision. Deep learning (DL), a recent breakthrough in computer vision, has become a focal point in agricultural plant protection that can minimize the biases of manually selecting disease spot features. This study reviews the techniques and tools used for automatic disease identification, state-of-the-art DL models, and recent trends in DL-based image analysis. The techniques, performance, benefits, drawbacks, underlying frameworks, and reference datasets of more than 278 research articles were analyzed and subsequently highlighted in accordance with the architecture of computer vision and deep learning models. Key findings include the effectiveness of imaging techniques and sensors like RGB, multispectral, and hyperspectral cameras for early disease detection. Researchers also evaluated various DL architectures, such as convolutional neural networks, vision transformers, generative adversarial networks, vision language models, and foundation models. Moreover, the study connects academic research with practical agricultural applications, providing guidance on the suitability of these models for production environments. This comprehensive review offers valuable insights into the current state and future directions of deep learning in plant disease detection, making it a significant resource for researchers, academicians, and practitioners in precision agriculture.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11100-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advancements in securing federated learning with IDS: a comprehensive review of neural networks and feature engineering techniques for malicious client detection","authors":"Naila Latif, Wenping Ma, Hafiz Bilal Ahmad","doi":"10.1007/s10462-024-11082-w","DOIUrl":"10.1007/s10462-024-11082-w","url":null,"abstract":"<div><p>Federated Learning (FL) is a technique that can learn a global machine-learning model at a central server by aggregating locally trained models. This distributed machine-learning approach preserves the privacy of local models. However, FL systems are inherently vulnerable to significant security challenges such as cyber-attacks, handling non-independent and identically distributed (non-IID) data, and data privacy concerns. This systematic literature review addresses these issues by examining advanced neural network models, feature engineering methods, and privacy-preserving techniques within intrusion detection systems (IDS) for FL environments. These are key elements for improving the security of FL systems. To the best of our knowledge, this review is among the first to comprehensively explore the combined impacts of these technologies. We analyzed 88 studies published between 2021 and October 2024. This study offers valuable insights for future research directions, including scaling FL in a real-world environment.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11082-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142963029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jebran Khan, Kashif Ahmad, Senthil Kumar Jagatheesaperumal, Kyung-Ah Sohn
{"title":"Textual variations in social media text processing applications: challenges, solutions, and trends","authors":"Jebran Khan, Kashif Ahmad, Senthil Kumar Jagatheesaperumal, Kyung-Ah Sohn","doi":"10.1007/s10462-024-11071-z","DOIUrl":"10.1007/s10462-024-11071-z","url":null,"abstract":"<div><p>Being an informal communication source, social media text is susceptible to several intentional and unintentional textual variations. These variations lead to various out-of-vocabulary (OOV) words, making social media text processing more challenging. This work analyses and discusses such challenges by providing a detailed overview of different sources of intentional and unintentional OOV words and associated challenges. We provide a detailed survey of pre-processing techniques, including traditional and application-specific methods proposed in the literature to handle intentional and unintentional textual variations, while highlighting their pros and cons. The paper analyses the implications of text normalization (standardization) in different social media text-processing applications. Moreover, the paper provides an overview of the recent challenges and trends in handling social media textual variations, and it is expected to provide a baseline for future research.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11071-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142963028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alberto Blanco-Justicia, Najeeb Jebreel, Benet Manzanares-Salor, David Sánchez, Josep Domingo-Ferrer, Guillem Collell, Kuan Eeik Tan
{"title":"Digital forgetting in large language models: a survey of unlearning methods","authors":"Alberto Blanco-Justicia, Najeeb Jebreel, Benet Manzanares-Salor, David Sánchez, Josep Domingo-Ferrer, Guillem Collell, Kuan Eeik Tan","doi":"10.1007/s10462-024-11078-6","DOIUrl":"10.1007/s10462-024-11078-6","url":null,"abstract":"<div><p>Large language models (LLMs) have become the state of the art in natural language processing. The massive adoption of generative LLMs and the capabilities they have shown have prompted public concerns regarding their impact on the labor market, privacy, the use of copyrighted work, and how these models align with human ethics and the rule of law. As a response, new regulations are being pushed, which require developers and service providers to evaluate, monitor, and forestall or at least mitigate the risks posed by their models. One mitigation strategy is digital forgetting: given a model with undesirable knowledge or behavior, the goal is to obtain a new model where the detected issues are no longer present. Digital forgetting is usually enforced via machine unlearning techniques, which modify trained machine learning models for them to behave as models trained on a subset of the original training data. In this work, we describe the motivations and desirable properties of digital forgetting when applied to LLMs, and we survey recent works on machine unlearning. Specifically, we propose a taxonomy of unlearning methods based on the reach and depth of the modifications done on the models, we discuss and compare the effectiveness of machine unlearning methods for LLMs proposed so far, and we survey their evaluation. Finally, we describe open problems of machine unlearning applied to LLMs and we put forward recommendations for developers and practitioners.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11078-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142963030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shorouk E. El-deep, Amr A. Abohany, Karam M. Sallam, Amr A. Abd El-Mageed
{"title":"A comprehensive survey on impact of applying various technologies on the internet of medical things","authors":"Shorouk E. El-deep, Amr A. Abohany, Karam M. Sallam, Amr A. Abd El-Mageed","doi":"10.1007/s10462-024-11063-z","DOIUrl":"10.1007/s10462-024-11063-z","url":null,"abstract":"<div><p>This paper explores the transformative impact of the Internet of Medical Things (IoMT) on healthcare. By integrating medical equipment and sensors with the internet, IoMT enables real-time monitoring of patient health, remote patient care, and individualized treatment plans. IoMT significantly improves several healthcare domains, including managing chronic diseases, patient safety, and drug adherence, resulting in better patient outcomes and reduced expenses. Technologies like blockchain, Artificial Intelligence (AI), and cloud computing further boost IoMT’s capabilities in healthcare. Blockchain enhances data security and interoperability, AI analyzes massive volumes of health data to find patterns and make predictions, and cloud computing offers scalable and cost-effective data processing and storage. Therefore, this paper provides a comprehensive review of the Internet of Things (IoT) and IoMT-based edge-intelligent smart healthcare, focusing on publications published between 2018 and 2024. The review addresses numerous studies on IoT, IoMT, AI, edge and cloud computing, security, Deep Learning, and blockchain. The obstacles facing IoMT are also covered in this paper, including interoperability issues, regulatory compliance, and privacy and data security concerns. Finally, recommendations for further studies are provided.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11063-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI evaluation of ChatGPT and human generated image/textual contents by bipolar generalized fuzzy hypergraph","authors":"Abbas Amini, Narjes Firouzkouhi, Wael Farag, Omar Ali, Isam Zabalawi, Bijan Davvaz","doi":"10.1007/s10462-024-11015-7","DOIUrl":"10.1007/s10462-024-11015-7","url":null,"abstract":"<div><p>Artificial Intelligence (AI) tools, i.e., ChatGPT (Chat Generative Pre-Trained Transformer), are positively and negatively revolutionizing the culture of industries, science, and education. The main objectives of this study are to address uncertainty and vagueness in ChatGPT systems, apply bipolarity as two-sided states of data, model generalized graph-based network with derivations, develop bipolar multi-dimensional fuzzy relation, advance entropy metrics for quantifying ambiguity, cluster entities based on level cuts, present pattern recognition in terms of statistical correlation coefficient, analyze speech recognition framework, and schedule online surgeries on the basis of blockchain technology. The outlined innovation pinpoints on the self-evaluation of ChatGPT systems, merging the bipolarity and generalized fuzzy hypergraph approach, developing the interpretation of graph-based patterns, and benchmarking the AI analysis and metrics advancement. To assess the efficiency of AI bipolar generalized fuzzy hypergraph (BGFH) model, the key conceptual benchmarks are clustering technique for detecting patterns and similar groups of data, statistical methods for the analysis of pattern recognition, and entropy metrics for quantifying the fuzziness within a system. This layout furnishes important characteristics such as union, intersection, complement, homomorphism, isomorphism, verifying the overlapping (intersection) and complement of two strong BGFHs as a strong BGFH. In addition, certain specifications of reflexive, symmetric, transitive, overlapping and integration, are defined using bipolar multi-dimensional fuzzy relation. Eleven classes are derived based on different values within <span>(tin [0,1])</span> and <span>(sin [-1,0],)</span> classifying analogous data that aids the similarity detection of generated outputs. Through this approach, a new pattern recognition is used as a data evaluation technique to intelligently facilitate the process in terms of correlation coefficient. It is revealed that the highest magnitude of 0.145 is adopted for patterns <span>(C_{1})</span> and <i>D</i>, indicating the most positive correlation between patterns, while patterns <span>(C_{4})</span> and <i>D</i> with the value of <span>(-0.35)</span> are negatively correlated. The results verify that the entropy measure of visual data (0.75) is higher than the entropy measure of textual data with the value of 0.68, indicating more vagueness and ambiguity in visual generated systems. The corresponding textual data <span>(E^{P}(U))</span> and <span>(E^{N}(U))</span> are, respectively, calculated as 0.62 and 0.45 for human-created contents and ChatGPT-generated contents, whilst for visual data, the entropy measures <span>(E^{P}(U))</span> and <span>(E^{N}(U))</span> are, respectively, 0.25 and 0.66, showing the higher values for the entropy measure of ChatGPT-generated visual data compared to the ChatGPT-generated textual data. In relation to the speech re","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11015-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shen Si-Ma, Han-Ming Liu, Hong-Xiang Zhan, Zhao-Fa Liu, Gang Guo, Cong Yu, Peng-Cheng Hu
{"title":"Efficient maximum iterations for swarm intelligence algorithms: a comparative study","authors":"Shen Si-Ma, Han-Ming Liu, Hong-Xiang Zhan, Zhao-Fa Liu, Gang Guo, Cong Yu, Peng-Cheng Hu","doi":"10.1007/s10462-024-11104-7","DOIUrl":"10.1007/s10462-024-11104-7","url":null,"abstract":"<div><p>A swarm intelligence algorithm usually iterates many times to approximate the optimum to obtain the solution of a problem. The maximum iteration is influenced by many factors such as the algorithm itself, problem types, as well as dimensions and search space sizes of decision variables. There are few existing studies on efficient maximum iterations, especially a large-scale study on comparison for different problem types. By dividing three CEC benchmark sets into several problem types, this study made a large-scale performance comparison of 123 common swarm intelligence algorithms from several views. The experimental results show that for low-dimensionality, wide search space, and/or simple- and medium-complex problems, about a quarter of the algorithms are concentrated in iterations of about 30 ~ 80, while most algorithms for other types of problems tend to have as many iterations as possible. By and large, for the Classical set, large iterations are beneficial for improving the performance of most algorithms, while less than half of the algorithms for CEC 2019 and CEC 2022 do so. And, the efficient iterations of excellent algorithms are about 300 on low dimensionality, wide search space and simple-complexity problems, while other types are as large as possible. In terms of algorithm speed, LSO, DE and RSA are the fastest on all the three benchmark sets, and the runtime of all algorithms is almost linearly related to the maximum iterations. Although the conclusions largely depend on the problem types, we believe that an efficient iteration is necessary to optimize algorithm performance.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11104-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hengnian Qi, Hao Yang, Zhaojiang Wang, Jiabin Ye, Qiuyi Xin, Chu Zhang, Qing Lang
{"title":"AncientGlyphNet: an advanced deep learning framework for detecting ancient Chinese characters in complex scene","authors":"Hengnian Qi, Hao Yang, Zhaojiang Wang, Jiabin Ye, Qiuyi Xin, Chu Zhang, Qing Lang","doi":"10.1007/s10462-024-11095-5","DOIUrl":"10.1007/s10462-024-11095-5","url":null,"abstract":"<div><p>Detecting ancient Chinese characters in various media, including stone inscriptions, calligraphy, and couplets, is challenging due to the complex backgrounds and diverse styles. This study proposes an advanced deep-learning framework for detecting ancient Chinese characters in complex scenes to improve detection accuracy. First, the framework introduces an Ancient Character Haar Wavelet Transform downsampling block (ACHaar), effectively reducing feature maps’ spatial resolution while preserving key ancient character features. Second, a Glyph Focus Module (GFM) is introduced, utilizing attention mechanisms to enhance the processing of deep semantic information and generating ancient character feature maps that emphasize horizontal and vertical features through a four-path parallel strategy. Third, a Character Contour Refinement Layer (CCRL) is incorporated to sharpen the edges of characters. Additionally, to train and validate the model, a dedicated dataset was constructed, named Huzhou University-Ancient Chinese Character Dataset for Complex Scenes (HUSAM-SinoCDCS), comprising images of stone inscriptions, calligraphy, and couplets. Experimental results demonstrated that the proposed method outperforms previous text detection methods on the HUSAM-SinoCDCS dataset, with accuracy improved by 1.36–92.84%, recall improved by 2.24–85.61%, and F1 score improved by 1.84–89.08%. This research contributes to digitizing ancient Chinese character artifacts and literature, promoting the inheritance and dissemination of traditional Chinese character culture. The source code and the HUSAM-SinoCDCS dataset can be accessed at https://github.com/youngbbi/AncientGlyphNet and https://github.com/youngbbi/HUSAM-SinoCDCS.</p></div>","PeriodicalId":8449,"journal":{"name":"Artificial Intelligence Review","volume":"58 3","pages":""},"PeriodicalIF":10.7,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10462-024-11095-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}