首页 > 最新文献

Journal of Information and Intelligence最新文献

英文 中文
A new lattice-based partially blind signature with more complete proof 一种新的基于网格的部分盲签名,具有更完整的证明
Pub Date : 2024-05-01 DOI: 10.1016/j.jiixd.2024.03.001
Peiyu Li , Juntao Gao , Xuelian Li

Partially blind signatures are introduced on the basis of blind signatures, which not only retain the advantages of blind signatures, but also solve the contradiction between anonymity and controllability in blind signatures. With the development of quantum computing technology, it becomes more urgent to construct secure partially blind signature schemes in quantum environments. In this paper, we present a new partially blind signature scheme and prove the security under the Ring-SIS assumption in the random oracle model. To avoid the restart problem of signature schemes caused by rejection sampling, a large number of random numbers are sampled in advance, so that they only need to be re-selected at the current stage without terminating the whole signature process when the conditions are not met. In addition, the hash tree technology is used to reduce communication costs and improve interactive performance. In order to avoid the errors in the security proof of the previous scheme, our proof builds upon and extends the modular framework for blind signatures of Hauck et al. and the correctness, partial blindness, and one-more unforgeability of the scheme are proved in detail according to the properties of the linear hash function.

部分盲签名是在盲签名的基础上引入的,它既保留了盲签名的优点,又解决了盲签名中匿名性和可控性的矛盾。随着量子计算技术的发展,构建量子环境下安全的部分盲签名方案变得更加迫切。本文提出了一种新的部分盲签名方案,并证明了随机甲骨文模型中 Ring-SIS 假设下的安全性。为了避免拒绝采样导致的签名方案重启问题,我们事先采样了大量随机数,因此只需在当前阶段重新选择随机数,而无需在条件不满足时终止整个签名过程。此外,哈希树技术的应用还降低了通信成本,提高了交互性能。为了避免之前方案的安全性证明中的错误,我们的证明基于并扩展了 Hauck 等人的盲签名模块化框架,并根据线性散列函数的特性详细证明了方案的正确性、部分盲性和一多不可伪造性。
{"title":"A new lattice-based partially blind signature with more complete proof","authors":"Peiyu Li ,&nbsp;Juntao Gao ,&nbsp;Xuelian Li","doi":"10.1016/j.jiixd.2024.03.001","DOIUrl":"10.1016/j.jiixd.2024.03.001","url":null,"abstract":"<div><p>Partially blind signatures are introduced on the basis of blind signatures, which not only retain the advantages of blind signatures, but also solve the contradiction between anonymity and controllability in blind signatures. With the development of quantum computing technology, it becomes more urgent to construct secure partially blind signature schemes in quantum environments. In this paper, we present a new partially blind signature scheme and prove the security under the Ring-SIS assumption in the random oracle model. To avoid the restart problem of signature schemes caused by rejection sampling, a large number of random numbers are sampled in advance, so that they only need to be re-selected at the current stage without terminating the whole signature process when the conditions are not met. In addition, the hash tree technology is used to reduce communication costs and improve interactive performance. In order to avoid the errors in the security proof of the previous scheme, our proof builds upon and extends the modular framework for blind signatures of Hauck et al. and the correctness, partial blindness, and one-more unforgeability of the scheme are proved in detail according to the properties of the linear hash function.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 3","pages":"Pages 236-252"},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000155/pdfft?md5=b4f02711a72cc18ef1aaa3009a5e29c6&pid=1-s2.0-S2949715924000155-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140272837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connecting the indispensable roles of IoT and artificial intelligence in smart cities: A survey 连接物联网和人工智能在智慧城市中不可或缺的作用:调查
Pub Date : 2024-05-01 DOI: 10.1016/j.jiixd.2024.01.003
Hoang Nguyen, Dina Nawara, Rasha Kashef

The pace of society development is faster than ever before, and the smart city paradigm has also emerged, which aims to enable citizens to live in more sustainable cities that guarantee well-being and a comfortable living environment. This has been done by a network of new technologies hosted in real time to track the activities and provide smart solutions for the incoming requests or problems of the citizens. One of the most often used methodologies for creating a smart city is the Internet of Things (IoT). Therefore, the IoT-enabled smart city research topic, which consists of many different domains such as transportation, healthcare, and agriculture, has recently attracted increasing attention in the research community. Further, advances in artificial intelligence (AI) significantly contribute to the growth of IoT. In this paper, we first present the smart city concept, the background of smart city development and the components of the IoT-based smart city. This is followed up by a literature review of the research literature on the most recent IoT-enabled smart cities developments and breakthroughs empowered by AI techniques to highlight the current stage, major trends and unsolved challenges of adopting AI-driven IoT technologies for the establishment of desirable smart cities. Finally, we summarize the paper with a discussion of future research to provide recommendations for research direction in the smart city domain.

社会发展的步伐比以往任何时候都要快,智能城市范例也应运而生,其目的是让市民能够生活在更可持续的城市中,保证幸福和舒适的生活环境。要做到这一点,就需要通过实时托管的新技术网络来跟踪市民的活动,并针对市民提出的要求或问题提供智能解决方案。物联网(IoT)是创建智慧城市最常用的方法之一。因此,由交通、医疗保健和农业等多个不同领域组成的物联网智能城市研究课题最近在研究界引起了越来越多的关注。此外,人工智能(AI)的进步也极大地促进了物联网的发展。在本文中,我们首先介绍了智慧城市的概念、智慧城市发展的背景以及基于物联网的智慧城市的组成部分。随后,我们对有关物联网支持的智慧城市的最新发展和人工智能技术带来的突破的研究文献进行了回顾,以强调采用人工智能驱动的物联网技术建立理想的智慧城市的现阶段、主要趋势和尚未解决的挑战。最后,我们通过对未来研究的讨论对本文进行总结,为智慧城市领域的研究方向提供建议。
{"title":"Connecting the indispensable roles of IoT and artificial intelligence in smart cities: A survey","authors":"Hoang Nguyen,&nbsp;Dina Nawara,&nbsp;Rasha Kashef","doi":"10.1016/j.jiixd.2024.01.003","DOIUrl":"10.1016/j.jiixd.2024.01.003","url":null,"abstract":"<div><p>The pace of society development is faster than ever before, and the smart city paradigm has also emerged, which aims to enable citizens to live in more sustainable cities that guarantee well-being and a comfortable living environment. This has been done by a network of new technologies hosted in real time to track the activities and provide smart solutions for the incoming requests or problems of the citizens. One of the most often used methodologies for creating a smart city is the Internet of Things (IoT). Therefore, the IoT-enabled smart city research topic, which consists of many different domains such as transportation, healthcare, and agriculture, has recently attracted increasing attention in the research community. Further, advances in artificial intelligence (AI) significantly contribute to the growth of IoT. In this paper, we first present the smart city concept, the background of smart city development and the components of the IoT-based smart city. This is followed up by a literature review of the research literature on the most recent IoT-enabled smart cities developments and breakthroughs empowered by AI techniques to highlight the current stage, major trends and unsolved challenges of adopting AI-driven IoT technologies for the establishment of desirable smart cities. Finally, we summarize the paper with a discussion of future research to provide recommendations for research direction in the smart city domain.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 3","pages":"Pages 261-285"},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000039/pdfft?md5=dbe5fc30bdb6ef659aea2a2609e4cf12&pid=1-s2.0-S2949715924000039-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructions of correlation immnue S-boxes with high nonlinearity 构建具有高非线性的相关模糊 S 框
Pub Date : 2024-05-01 DOI: 10.1016/j.jiixd.2024.01.005
Yanhan Ji , Zhuo Ma , Luyang Li , Yujuan Sun

S-boxes play a central role in the design of symmetric cipher schemes. For stream cipher applications, an S-box should satisfy several criteria such as high nonlinearity, balanceness, correlation immunity, and so on. In this paper, by using disjoint linear codes, a class of S-boxes possessing high nonlinearity and 1st-order correlation immunity is given. It is shown that the constructed correlation immune S-boxes can possess currently best known nonlinearity, which is confirmed by the example 1st-order correlation immune (12, 3) S-box with nonlinearity 2000. In addition, two other frameworks concerning the criteria of balanced and resiliency are obtained respectively.

S 盒在对称密码方案的设计中起着核心作用。在流密码应用中,S 盒应满足高非线性、平衡性、抗相关性等几个标准。本文通过使用不连续线性编码,给出了一类具有高非线性和一阶相关免疫的 S-盒。结果表明,所构建的相关免疫 S-box 可以拥有目前已知的最佳非线性度,这一点在非线性度为 2000 的一阶相关免疫 (12, 3) S-box 示例中得到了证实。此外,还分别获得了有关平衡和弹性标准的其他两个框架。
{"title":"Constructions of correlation immnue S-boxes with high nonlinearity","authors":"Yanhan Ji ,&nbsp;Zhuo Ma ,&nbsp;Luyang Li ,&nbsp;Yujuan Sun","doi":"10.1016/j.jiixd.2024.01.005","DOIUrl":"https://doi.org/10.1016/j.jiixd.2024.01.005","url":null,"abstract":"<div><p>S-boxes play a central role in the design of symmetric cipher schemes. For stream cipher applications, an S-box should satisfy several criteria such as high nonlinearity, balanceness, correlation immunity, and so on. In this paper, by using disjoint linear codes, a class of S-boxes possessing high nonlinearity and 1st-order correlation immunity is given. It is shown that the constructed correlation immune S-boxes can possess currently best known nonlinearity, which is confirmed by the example 1st-order correlation immune (12, 3) S-box with nonlinearity 2000. In addition, two other frameworks concerning the criteria of balanced and resiliency are obtained respectively.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 3","pages":"Pages 253-260"},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000052/pdfft?md5=ea4e350f6b9d3b0dd5bb671a433bf976&pid=1-s2.0-S2949715924000052-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141314093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KOGPSR: A 3D GPSR algorithm using adaptive Kalman prediction for FANETs with omnidirectional antenna KOGPSR:使用自适应卡尔曼预测的 3D GPSR 算法,适用于带有全向天线的 FANET
Pub Date : 2024-05-01 DOI: 10.1016/j.jiixd.2023.11.001
Zhongjie Wang, Yuhan Ruan, Yongzhao Li, Tao Li, Rui Zhang, Jian Liang

Nowadays, flying ad hoc network (FANET) has captured great attention for its huge potential in military and civilian applications. However, the high-speed movement of unmanned aerial vehicles (UAVs) in three-dimensional (3D) space leads to fast topology change in FANET and brings new challenges to traditional routing mechanisms. To improve the performance of packet transmission in the 3D high dynamic FANETs, we propose a 3D greedy perimeter stateless routing (GPSR) algorithm using adaptive Kalman prediction for FANETs with omnidirectional antenna (KOGPSR). Especially, in data forwarding part of the KOGPSR, we propose a new link metric for greedy forwarding based on a torus-shaped radiation pattern of the omnidirectional antenna of UAVs, and a restricted flooding strategy is introduced to solve the 3D void node problem in geographic routing. In addition, in order to enhance the accuracy of the location information of high dynamic UAVs, we design an adaptive Kalman algorithm to track and predict the motion of UAVs. Finally, a FANET simulation platform based on OPNET is built to depict the performance of the KOGPSR algorithm. The simulation results show that the proposed KOGPSR algorithm is more suitable for the actual 3D high dynamic FANET.

如今,飞行 ad hoc 网络(FANET)因其在军事和民用领域的巨大应用潜力而备受关注。然而,无人飞行器(UAV)在三维(3D)空间的高速运动导致 FANET 拓扑快速变化,给传统路由机制带来了新的挑战。为了提高三维高动态 FANET 中数据包传输的性能,我们提出了一种针对全向天线 FANET 的三维贪婪周边无状态路由(GPSR)算法(KOGPSR),该算法采用自适应卡尔曼预测。特别是在KOGPSR的数据转发部分,我们根据无人机全向天线的环形辐射模式提出了一种新的贪婪转发链路度量,并引入了一种限制性泛洪策略来解决地理路由中的三维空节点问题。此外,为了提高高动态无人机位置信息的准确性,我们设计了一种自适应卡尔曼算法来跟踪和预测无人机的运动。最后,我们建立了一个基于 OPNET 的 FANET 仿真平台来描述 KOGPSR 算法的性能。仿真结果表明,所提出的 KOGPSR 算法更适合实际的三维高动态 FANET。
{"title":"KOGPSR: A 3D GPSR algorithm using adaptive Kalman prediction for FANETs with omnidirectional antenna","authors":"Zhongjie Wang,&nbsp;Yuhan Ruan,&nbsp;Yongzhao Li,&nbsp;Tao Li,&nbsp;Rui Zhang,&nbsp;Jian Liang","doi":"10.1016/j.jiixd.2023.11.001","DOIUrl":"10.1016/j.jiixd.2023.11.001","url":null,"abstract":"<div><p>Nowadays, flying ad hoc network (FANET) has captured great attention for its huge potential in military and civilian applications. However, the high-speed movement of unmanned aerial vehicles (UAVs) in three-dimensional (3D) space leads to fast topology change in FANET and brings new challenges to traditional routing mechanisms. To improve the performance of packet transmission in the 3D high dynamic FANETs, we propose a 3D greedy perimeter stateless routing (GPSR) algorithm using adaptive Kalman prediction for FANETs with omnidirectional antenna (KOGPSR). Especially, in data forwarding part of the KOGPSR, we propose a new link metric for greedy forwarding based on a torus-shaped radiation pattern of the omnidirectional antenna of UAVs, and a restricted flooding strategy is introduced to solve the 3D void node problem in geographic routing. In addition, in order to enhance the accuracy of the location information of high dynamic UAVs, we design an adaptive Kalman algorithm to track and predict the motion of UAVs. Finally, a FANET simulation platform based on OPNET is built to depict the performance of the KOGPSR algorithm. The simulation results show that the proposed KOGPSR algorithm is more suitable for the actual 3D high dynamic FANET.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 3","pages":"Pages 191-208"},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000719/pdfft?md5=2b18cbef163ce52128b820ccdbf4100b&pid=1-s2.0-S2949715923000719-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138613868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DI-VTR: Dual inter-modal interaction model for video-text retrieval DI-VTR:用于视频文本检索的双模态交互模型
Pub Date : 2024-03-15 DOI: 10.1016/j.jiixd.2024.03.003

Video-text retrieval is a challenging task for multimodal information processing due to the semantic gap between different modalities. However, most existing methods do not fully mine the intra-modal interactions, as with the temporal correlation of video frames, which results in poor matching performance. Additionally, the imbalanced semantic information between videos and texts also leads to difficulty in the alignment of the two modalities. To this end, we propose a dual inter-modal interaction network for video-text retrieval, i.e., DI-VTR. To learn the intra-modal interaction of video frames, we design a contextual-related video encoder to obtain more fine-grained content-oriented video representations. We also propose a dual inter-modal interaction module to accomplish accurate multilingual alignment between the video and text modalities by introducing multilingual text to improve the representation ability of text semantic features. Extensive experimental results on commonly-used video-text retrieval datasets, including MSR-VTT, MSVD and VATEX, show that the proposed method achieves significantly improved performance compared with state-of-the-art methods.

由于不同模态之间存在语义差距,视频-文本检索是多模态信息处理中一项具有挑战性的任务。然而,现有的大多数方法并不能充分挖掘模态内的交互作用,如视频帧的时间相关性,从而导致匹配效果不佳。此外,视频和文本之间语义信息的不平衡也会导致两种模态难以对齐。为此,我们提出了一种用于视频-文本检索的双模态交互网络,即 DI-VTR。为了学习视频帧的模内交互,我们设计了一种与上下文相关的视频编码器,以获得更精细的面向内容的视频表示。我们还提出了双模态间交互模块,通过引入多语言文本来提高文本语义特征的表征能力,从而实现视频模态和文本模态之间的多语言精确对齐。在常用的视频-文本检索数据集(包括 MSR-VTT、MSVD 和 VATEX)上进行的大量实验结果表明,与最先进的方法相比,所提出的方法显著提高了性能。
{"title":"DI-VTR: Dual inter-modal interaction model for video-text retrieval","authors":"","doi":"10.1016/j.jiixd.2024.03.003","DOIUrl":"10.1016/j.jiixd.2024.03.003","url":null,"abstract":"<div><p>Video-text retrieval is a challenging task for multimodal information processing due to the semantic gap between different modalities. However, most existing methods do not fully mine the intra-modal interactions, as with the temporal correlation of video frames, which results in poor matching performance. Additionally, the imbalanced semantic information between videos and texts also leads to difficulty in the alignment of the two modalities. To this end, we propose a dual inter-modal interaction network for video-text retrieval, i.e., DI-VTR. To learn the intra-modal interaction of video frames, we design a contextual-related video encoder to obtain more fine-grained content-oriented video representations. We also propose a dual inter-modal interaction module to accomplish accurate multilingual alignment between the video and text modalities by introducing multilingual text to improve the representation ability of text semantic features. Extensive experimental results on commonly-used video-text retrieval datasets, including MSR-VTT, MSVD and VATEX, show that the proposed method achieves significantly improved performance compared with state-of-the-art methods.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 5","pages":"Pages 388-403"},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S294971592400026X/pdfft?md5=99a5f02c39ebbf60a2f3d5a6ebd243c0&pid=1-s2.0-S294971592400026X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140268908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on membership inference attacks and defenses in machine learning 机器学习中的成员推理攻击和防御调查
Pub Date : 2024-03-08 DOI: 10.1016/j.jiixd.2024.02.001

Membership inference (MI) attacks mainly aim to infer whether a data record was used to train a target model or not. Due to the serious privacy risks, MI attacks have been attracting a tremendous amount of attention in the research community. One existing work conducted — to our best knowledge — the first dedicated survey study in this specific area: The survey provides a comprehensive review of the literature during the period of 2017∼2021 (e.g., over 100 papers). However, due to the tremendous amount of progress (i.e., 176 papers) made in this area since 2021, the survey conducted by the one existing work has unfortunately already become very limited in the following two aspects: (1) Although the entire literature from 2017∼2021 covers 18 ways to categorize (all the proposed) MI attacks, the literature during the period of 2017∼2021, which was reviewed in the one existing work, only covered 5 ways to categorize MI attacks. With 13 ways missing, the survey conducted by the one existing work only covers 27% of the landscape (in terms of how to categorize MI attacks) if a retrospective view is taken. (2) Since the literature during the period of 2017∼2021 only covers 27% of the landscape (in terms of how to categorize), the number of new insights (i.e., why an MI attack could succeed) behind all the proposed MI attacks has been significantly increasing since year 2021. As a result, although none of the previous work has made the insights as a main focus of their studies, we found that the various insights leveraged in the literature can be broken down into 10 groups. Without making the insights as a main focus, a survey study could fail to help researchers gain adequate intellectual depth in this area of research. In this work, we conduct a systematic study to address these limitations. In particular, in order to address the first limitation, we make the 13 newly emerged ways to categorize MI attacks as a main focus on the study. In order to address the second limitation, we provide — to our best knowledge — the first review of the various insights leveraged in the entire literature. We found that the various insights leveraged in the literature can be broken down into 10 groups. Moreover, our survey also provides a comprehensive review of the existing defenses against MI attacks, the existing applications of MI attacks, the widely used datasets (e.g., 107 new datasets), and the evaluation metrics (e.g., 20 new evaluation metrics).

成员推断(MI)攻击的主要目的是推断数据记录是否用于训练目标模型。由于存在严重的隐私风险,MI 攻击在研究界引起了极大的关注。据我们所知,现有的一项工作是首次对这一特定领域进行专门调查研究:该调查对 2017-2021 年间的文献(如 100 多篇论文)进行了全面回顾。然而,由于 2021 年以来该领域取得的巨大进步(即 176 篇论文),现有的一项工作所进行的调查在以下两个方面已经变得非常有限:(1) 虽然 2017-2021 年期间的全部文献涵盖了 18 种 MI 攻击的分类方法(所有提议的),但现有的一项工作所回顾的 2017-2021 年期间的文献仅涵盖了 5 种 MI 攻击的分类方法。由于缺少 13 种方法,如果从回顾的角度来看,现有的一项工作所进行的调查只涵盖了(如何对 MI 攻击进行分类的)27% 的情况。(2)由于 2017 年至 2021 年期间的文献只覆盖了 27%的领域(在如何分类方面),因此自 2021 年以来,所有提出的 MI 攻击背后的新见解(即 MI 攻击为何能够成功)的数量一直在显著增加。因此,尽管之前的研究都没有将洞察力作为研究重点,但我们发现,文献中利用的各种洞察力可分为 10 组。如果不把洞察力作为研究重点,调查研究可能无法帮助研究人员在这一研究领域获得足够的知识深度。在这项工作中,我们针对这些局限性开展了一项系统研究。其中,针对第一个局限,我们将新出现的 13 种 MI 攻击分类方法作为研究重点。为了解决第二个局限性,据我们所知,我们首次对整个文献中利用的各种见解进行了回顾。我们发现,文献中的各种见解可分为 10 组。此外,我们的调查还全面回顾了针对 MI 攻击的现有防御、MI 攻击的现有应用、广泛使用的数据集(如 107 个新数据集)和评估指标(如 20 个新评估指标)。
{"title":"A survey on membership inference attacks and defenses in machine learning","authors":"","doi":"10.1016/j.jiixd.2024.02.001","DOIUrl":"10.1016/j.jiixd.2024.02.001","url":null,"abstract":"<div><p>Membership inference (MI) attacks mainly aim to infer whether a data record was used to train a target model or not. Due to the serious privacy risks, MI attacks have been attracting a tremendous amount of attention in the research community. One existing work conducted — to our best knowledge — the first dedicated survey study in this specific area: The survey provides a comprehensive review of the literature during the period of 2017∼2021 (e.g., over 100 papers). However, due to the tremendous amount of progress (i.e., 176 papers) made in this area since 2021, the survey conducted by the one existing work has unfortunately already become very limited in the following two aspects: (1) Although the entire literature from 2017∼2021 covers 18 ways to categorize (all the proposed) MI attacks, the literature during the period of 2017∼2021, which was reviewed in the one existing work, only covered 5 ways to categorize MI attacks. With 13 ways missing, the survey conducted by the one existing work only covers 27% of the landscape (in terms of how to categorize MI attacks) if a retrospective view is taken. (2) Since the literature during the period of 2017∼2021 only covers 27% of the landscape (in terms of how to categorize), the number of new insights (i.e., why an MI attack could succeed) behind all the proposed MI attacks has been significantly increasing since year 2021. As a result, although none of the previous work has made the insights as a main focus of their studies, we found that the various insights leveraged in the literature can be broken down into 10 groups. Without making the insights as a main focus, a survey study could fail to help researchers gain adequate intellectual depth in this area of research. In this work, we conduct a systematic study to address these limitations. In particular, in order to address the first limitation, we make the 13 newly emerged ways to categorize MI attacks as a main focus on the study. In order to address the second limitation, we provide — to our best knowledge — the first review of the various insights leveraged in the entire literature. We found that the various insights leveraged in the literature can be broken down into 10 groups. Moreover, our survey also provides a comprehensive review of the existing defenses against MI attacks, the existing applications of MI attacks, the widely used datasets (e.g., 107 new datasets), and the evaluation metrics (e.g., 20 new evaluation metrics).</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 5","pages":"Pages 404-454"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000064/pdfft?md5=a51bb65bff0598f8d5676e4453da8337&pid=1-s2.0-S2949715924000064-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140090679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight hardware implementation of CRYSTALS-Kyber CRYSTALS-Kyber 的轻量级硬件实现
Pub Date : 2024-03-01 DOI: 10.1016/j.jiixd.2024.02.004
Shiyang He , Hui Li , Fenghua Li , Ruhui Ma

The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future. Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post-quantum cryptographic (PQC) algorithms worldwide. CRYSTALS-Kyber was selected as the standard of PQC algorithm after 3 rounds of evaluation. Meanwhile considering the large resource consumption of current implementation, this paper presents a lightweight architecture for ASICs and its implementation on FPGAs for prototyping. In this implementation, a novel compact modular multiplication unit (MMU) and compression/decompression module is proposed to save hardware resources. We put forward a specially optimized schoolbook polynomial multiplication (SPM) instead of number theoretic transform (NTT) core for polynomial multiplication, which can reduce about 74% SLICE cost. We also use signed number representation to save memory resources. In addition, we optimize the hardware implementation of the Hash module, which cuts off about 48% of FF consumption by register reuse technology. Our design can be implemented on Kintex-7 (XC7K325T-2FFG900I) FPGA for prototyping, which occupations of 4777/4993 LUTs, 2661/2765 FFs, 1395/1452 SLICEs, 2.5/2.5 BRAMs, and 0/0 DSP respective of client/server side. The maximum clock frequency can reach at 244 ​MHz. As far as we know, our design consumes the least resources compared with other existing designs, which is very friendly to resource-constrained devices.

未来,基于整数因式分解和离散对数的加密算法的安全性将受到量子计算机的威胁。自2016年12月起,美国国家标准与技术研究院(NIST)开始在全球范围内征集后量子密码算法(PQC)。经过3轮评审,CRYSTALS-Kyber被选为PQC算法标准。同时,考虑到目前的实现方式需要消耗大量资源,本文提出了一种适用于 ASIC 的轻量级架构,并将其实现在 FPGA 上,用于原型开发。在实现过程中,我们提出了一种新颖紧凑的模块化乘法单元(MMU)和压缩/解压缩模块,以节省硬件资源。我们提出了一个专门优化的校本多项式乘法(SPM)来代替多项式乘法的数论变换(NTT)核,这可以减少约 74% 的 SLICE 成本。我们还使用有符号数表示法来节省内存资源。此外,我们还优化了哈希模块的硬件实现,通过寄存器重用技术减少了约 48% 的 FF 消耗。我们的设计可在 Kintex-7 (XC7K325T-2FFG900I) FPGA 上实现,用于原型开发,它占用 4777/4993 个 LUT、2661/2765 个 FF、1395/1452 个 SLICE、2.5/2.5 个 BRAM 以及客户端/服务器端各自的 0/0 个 DSP。最高时钟频率可达 244 MHz。据我们所知,与其他现有设计相比,我们的设计消耗的资源最少,这对资源有限的设备非常友好。
{"title":"A lightweight hardware implementation of CRYSTALS-Kyber","authors":"Shiyang He ,&nbsp;Hui Li ,&nbsp;Fenghua Li ,&nbsp;Ruhui Ma","doi":"10.1016/j.jiixd.2024.02.004","DOIUrl":"10.1016/j.jiixd.2024.02.004","url":null,"abstract":"<div><p>The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future. Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post-quantum cryptographic (PQC) algorithms worldwide. CRYSTALS-Kyber was selected as the standard of PQC algorithm after 3 rounds of evaluation. Meanwhile considering the large resource consumption of current implementation, this paper presents a lightweight architecture for ASICs and its implementation on FPGAs for prototyping. In this implementation, a novel compact modular multiplication unit (MMU) and compression/decompression module is proposed to save hardware resources. We put forward a specially optimized schoolbook polynomial multiplication (SPM) instead of number theoretic transform (NTT) core for polynomial multiplication, which can reduce about 74% SLICE cost. We also use signed number representation to save memory resources. In addition, we optimize the hardware implementation of the Hash module, which cuts off about 48% of FF consumption by register reuse technology. Our design can be implemented on Kintex-7 (XC7K325T-2FFG900I) FPGA for prototyping, which occupations of 4777/4993 LUTs, 2661/2765 FFs, 1395/1452 SLICEs, 2.5/2.5 BRAMs, and 0/0 DSP respective of client/server side. The maximum clock frequency can reach at 244 ​MHz. As far as we know, our design consumes the least resources compared with other existing designs, which is very friendly to resource-constrained devices.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 2","pages":"Pages 167-176"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S294971592400009X/pdfft?md5=554b4ca1fa191ff4a92f726744e62d79&pid=1-s2.0-S294971592400009X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling security, privacy, and ethical concerns of ChatGPT 揭示 ChatGPT 的安全、隐私和道德问题
Pub Date : 2024-03-01 DOI: 10.1016/j.jiixd.2023.10.007
Xiaodong Wu, Ran Duan, Jianbing Ni

This paper delves into the realm of ChatGPT, an AI-powered chatbot that utilizes topic modeling and reinforcement learning to generate natural responses. Although ChatGPT holds immense promise across various industries, such as customer service, education, mental health treatment, personal productivity, and content creation, it is essential to address its security, privacy, and ethical implications. By exploring the upgrade path from GPT-1 to GPT-4, discussing the model's features, limitations, and potential applications, this study aims to shed light on the potential risks of integrating ChatGPT into our daily lives. Focusing on security, privacy, and ethics issues, we highlight the challenges these concerns pose for widespread adoption. Finally, we analyze the open problems in these areas, calling for concerted efforts to ensure the development of secure and ethically sound large language models.

本文深入探讨了 ChatGPT 这一人工智能驱动的聊天机器人领域,它利用话题建模和强化学习生成自然的回复。虽然 ChatGPT 在客户服务、教育、心理健康治疗、个人生产力和内容创建等各行各业都大有可为,但解决其安全、隐私和道德问题也至关重要。通过探索从 GPT-1 到 GPT-4 的升级路径,讨论该模型的特点、局限性和潜在应用,本研究旨在揭示将 ChatGPT 集成到我们日常生活中的潜在风险。我们将重点放在安全、隐私和道德问题上,强调这些问题给广泛应用带来的挑战。最后,我们分析了这些领域的未决问题,呼吁大家齐心协力,确保开发出安全且符合道德规范的大型语言模型。
{"title":"Unveiling security, privacy, and ethical concerns of ChatGPT","authors":"Xiaodong Wu,&nbsp;Ran Duan,&nbsp;Jianbing Ni","doi":"10.1016/j.jiixd.2023.10.007","DOIUrl":"10.1016/j.jiixd.2023.10.007","url":null,"abstract":"<div><p>This paper delves into the realm of ChatGPT, an AI-powered chatbot that utilizes topic modeling and reinforcement learning to generate natural responses. Although ChatGPT holds immense promise across various industries, such as customer service, education, mental health treatment, personal productivity, and content creation, it is essential to address its security, privacy, and ethical implications. By exploring the upgrade path from GPT-1 to GPT-4, discussing the model's features, limitations, and potential applications, this study aims to shed light on the potential risks of integrating ChatGPT into our daily lives. Focusing on security, privacy, and ethics issues, we highlight the challenges these concerns pose for widespread adoption. Finally, we analyze the open problems in these areas, calling for concerted efforts to ensure the development of secure and ethically sound large language models.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 2","pages":"Pages 102-115"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715923000707/pdfft?md5=d54b43065c82b1dd4241ba7d67e27d46&pid=1-s2.0-S2949715923000707-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BloomDT - An improved privacy-preserving decision tree inference scheme BloomDT - 一种改进的隐私保护决策树推理方案
Pub Date : 2024-03-01 DOI: 10.1016/j.jiixd.2024.02.003
Sean Lalla, Rongxing Lu, Yunguo Guan, Songnian Zhang

Outsourcing decision tree models to cloud servers can allow model providers to distribute their models at scale without purchasing dedicated hardware for model hosting. However, model providers may be forced to disclose private model details when hosting their models in the cloud. Due to the time and monetary investments associated with model training, model providers may be reluctant to host their models in the cloud due to these privacy concerns. Furthermore, clients may be reluctant to use these outsourced models because their private queries or their results may be disclosed to the cloud servers. In this paper, we propose BloomDT, a privacy-preserving scheme for decision tree inference, which uses Bloom filters to hide the original decision tree's structure, the threshold values of each node, and the order in which features are tested while maintaining reliable classification results that are secure even if the cloud servers collude. Our scheme's security and performance are verified through rigorous testing and analysis.

将决策树模型外包给云服务器可以让模型提供商大规模分发模型,而无需购买专用硬件来托管模型。不过,模型提供商在云端托管模型时可能会被迫披露私人模型细节。由于与模型训练相关的时间和金钱投资,模型提供商可能会因为这些隐私问题而不愿将其模型托管到云中。此外,客户可能也不愿意使用这些外包模型,因为他们的私人查询或结果可能会泄露给云服务器。在本文中,我们提出了一种用于决策树推理的隐私保护方案--BloomDT,它使用 Bloom 过滤器来隐藏原始决策树的结构、每个节点的阈值以及测试特征的顺序,同时保持可靠的分类结果,即使云服务器串通一气也不会泄露。通过严格的测试和分析,我们验证了该方案的安全性和性能。
{"title":"BloomDT - An improved privacy-preserving decision tree inference scheme","authors":"Sean Lalla,&nbsp;Rongxing Lu,&nbsp;Yunguo Guan,&nbsp;Songnian Zhang","doi":"10.1016/j.jiixd.2024.02.003","DOIUrl":"10.1016/j.jiixd.2024.02.003","url":null,"abstract":"<div><p>Outsourcing decision tree models to cloud servers can allow model providers to distribute their models at scale without purchasing dedicated hardware for model hosting. However, model providers may be forced to disclose private model details when hosting their models in the cloud. Due to the time and monetary investments associated with model training, model providers may be reluctant to host their models in the cloud due to these privacy concerns. Furthermore, clients may be reluctant to use these outsourced models because their private queries or their results may be disclosed to the cloud servers. In this paper, we propose BloomDT, a privacy-preserving scheme for decision tree inference, which uses Bloom filters to hide the original decision tree's structure, the threshold values of each node, and the order in which features are tested while maintaining reliable classification results that are secure even if the cloud servers collude. Our scheme's security and performance are verified through rigorous testing and analysis.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 2","pages":"Pages 130-147"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000088/pdfft?md5=7d9b7fbb49ca778f809e1f16a75c50b6&pid=1-s2.0-S2949715924000088-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140469188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical and privacy-preserving geo-social-based POI recommendation 基于地理社交的实用且保护隐私的 POI 推荐
Pub Date : 2024-03-01 DOI: 10.1016/j.jiixd.2024.01.001
Qi Xu , Hui Zhu , Yandong Zheng , Fengwei Wang , Le Gao

With the rapid development of location-based services and online social networks, POI recommendation services considering geographic and social factors have received extensive attention. Meanwhile, the vigorous development of cloud computing has prompted service providers to outsource data to the cloud to provide POI recommendation services. However, there is a degree of distrust of the cloud by service providers. To protect digital assets, service providers encrypt data before outsourcing it. However, encryption reduces data availability, making it more challenging to provide POI recommendation services in outsourcing scenarios. Some privacy-preserving schemes for geo-social-based POI recommendation have been presented, but they have some limitations in supporting group query, considering both geographic and social factors, and query accuracy, making these schemes impractical. To solve this issue, we propose two practical and privacy-preserving geo-social-based POI recommendation schemes for single user and group users, which are named GSPR-S and GSPR-G. Specifically, we first utilize the quad tree to organize geographic data and the MinHash method to index social data. Then, we apply BGV fully homomorphic encryption to design some private algorithms, including a private max/min operation algorithm, a private rectangular set operation algorithm, and a private rectangular overlapping detection algorithm. After that, we use these algorithms as building blocks in our schemes for efficiency improvement. According to security analysis, our schemes are proven to be secure against the honest-but-curious cloud servers, and experimental results show that our schemes have good performance.

随着基于位置的服务和在线社交网络的快速发展,考虑地理和社交因素的 POI 推荐服务受到广泛关注。与此同时,云计算的蓬勃发展也促使服务提供商将数据外包给云,以提供 POI 推荐服务。然而,服务提供商对云存在一定程度的不信任。为了保护数字资产,服务提供商会在外包数据前对其进行加密。然而,加密降低了数据的可用性,使得在外包场景中提供 POI 推荐服务更具挑战性。目前已经提出了一些基于地理社交的 POI 推荐的隐私保护方案,但这些方案在支持群组查询、考虑地理和社交因素以及查询准确性方面存在一些局限性,使得这些方案不切实际。为了解决这个问题,我们提出了两种实用且能保护隐私的基于地理社交的 POI 推荐方案,分别适用于单个用户和群体用户,分别命名为 GSPR-S 和 GSPR-G。具体来说,我们首先利用四叉树来组织地理数据,并利用 MinHash 方法来索引社交数据。然后,我们应用 BGV 全同态加密技术设计了一些私有算法,包括私有最大/最小运算算法、私有矩形集运算算法和私有矩形重叠检测算法。之后,我们将这些算法作为我们方案的构建模块,以提高效率。根据安全性分析,我们的方案被证明可以安全地对抗诚实但好奇的云服务器,实验结果表明我们的方案具有良好的性能。
{"title":"Practical and privacy-preserving geo-social-based POI recommendation","authors":"Qi Xu ,&nbsp;Hui Zhu ,&nbsp;Yandong Zheng ,&nbsp;Fengwei Wang ,&nbsp;Le Gao","doi":"10.1016/j.jiixd.2024.01.001","DOIUrl":"10.1016/j.jiixd.2024.01.001","url":null,"abstract":"<div><p>With the rapid development of location-based services and online social networks, POI recommendation services considering geographic and social factors have received extensive attention. Meanwhile, the vigorous development of cloud computing has prompted service providers to outsource data to the cloud to provide POI recommendation services. However, there is a degree of distrust of the cloud by service providers. To protect digital assets, service providers encrypt data before outsourcing it. However, encryption reduces data availability, making it more challenging to provide POI recommendation services in outsourcing scenarios. Some privacy-preserving schemes for geo-social-based POI recommendation have been presented, but they have some limitations in supporting group query, considering both geographic and social factors, and query accuracy, making these schemes impractical. To solve this issue, we propose two practical and privacy-preserving geo-social-based POI recommendation schemes for single user and group users, which are named GSPR-S and GSPR-G. Specifically, we first utilize the quad tree to organize geographic data and the MinHash method to index social data. Then, we apply BGV fully homomorphic encryption to design some private algorithms, including a private max/min operation algorithm, a private rectangular set operation algorithm, and a private rectangular overlapping detection algorithm. After that, we use these algorithms as building blocks in our schemes for efficiency improvement. According to security analysis, our schemes are proven to be secure against the honest-but-curious cloud servers, and experimental results show that our schemes have good performance.</p></div>","PeriodicalId":100790,"journal":{"name":"Journal of Information and Intelligence","volume":"2 2","pages":"Pages 148-166"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2949715924000015/pdfft?md5=a2e0865bfbb9a59bb240fc8da82554c1&pid=1-s2.0-S2949715924000015-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139395049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information and Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1