首页 > 最新文献

2022 14th International Conference on Communications (COMM)最新文献

英文 中文
5G Open Testbeds and Infrastructure extensions for NetApps advanced experiments NetApps高级实验的5G开放试验台和基础设施扩展
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817289
Marius Iordache, Cristian Patachia, Oana Badita, Bogdan Rusti, K. Trichias, J. Brenes
While 5G Non-Stand Alone (NSA) networks are quickly being deployed across multiple nations, providing a first sense of the capabilities of 5G connectivity, the adoption of 5G by various vertical industry sectors and its integration into their day-to-day operations is progressing slowly. This is partially due to the perceived complexity of deploying services over the 5G networks and due to the fact that the vertical stakeholders do not have a clear understanding of the potential and offerings of 5G. To address that, the concept of Network Applications (NetApps) is picking up steam which is set to assist with the deployment of vertical specific services and their seamless integration with 5G networks and vertical specific components. This paper, presents the work of the EU funded project VITAL-5G in deploying 5G Stand Alone (SA) testbeds in three real-life Transport & Logistics facilities across Europe, the necessary 5G network extensions and architectural considerations, their integration with a state-of-the-art experimentation platform and the use of NetApps to enable the seamless deployment of 5G-enabled vertical services.
虽然5G非独立(NSA)网络正在多个国家迅速部署,提供了5G连接能力的初步感觉,但各个垂直行业部门对5G的采用及其融入日常运营的进展缓慢。部分原因是由于在5G网络上部署服务的复杂性,以及垂直利益相关者对5G的潜力和产品没有清晰的了解。为了解决这个问题,网络应用程序(NetApps)的概念正在加速发展,该概念旨在帮助部署垂直特定服务,并与5G网络和垂直特定组件无缝集成。本文介绍了欧盟资助的VITAL-5G项目在欧洲三个现实生活中的运输和物流设施中部署5G独立(SA)测试平台的工作,必要的5G网络扩展和架构考虑因素,它们与最先进的实验平台的集成以及使用NetApps来实现5G垂直服务的无缝部署。
{"title":"5G Open Testbeds and Infrastructure extensions for NetApps advanced experiments","authors":"Marius Iordache, Cristian Patachia, Oana Badita, Bogdan Rusti, K. Trichias, J. Brenes","doi":"10.1109/comm54429.2022.9817289","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817289","url":null,"abstract":"While 5G Non-Stand Alone (NSA) networks are quickly being deployed across multiple nations, providing a first sense of the capabilities of 5G connectivity, the adoption of 5G by various vertical industry sectors and its integration into their day-to-day operations is progressing slowly. This is partially due to the perceived complexity of deploying services over the 5G networks and due to the fact that the vertical stakeholders do not have a clear understanding of the potential and offerings of 5G. To address that, the concept of Network Applications (NetApps) is picking up steam which is set to assist with the deployment of vertical specific services and their seamless integration with 5G networks and vertical specific components. This paper, presents the work of the EU funded project VITAL-5G in deploying 5G Stand Alone (SA) testbeds in three real-life Transport & Logistics facilities across Europe, the necessary 5G network extensions and architectural considerations, their integration with a state-of-the-art experimentation platform and the use of NetApps to enable the seamless deployment of 5G-enabled vertical services.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132913477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Analysis of Transport Layer Congestion on 5G Systems 5G系统传输层拥塞性能分析
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817358
Gordana Barb, Cristina Andras, Cornel Balint
The development of 5G networks is still ongoing. 5G networks connect data, applications, transport systems and people in smart networked communication environments. It will require various protocols to support its multiples features. One of these includes the transport protocol, which is designed to provide high-speed data rates up to 400Gbps. In this paper, an analysis of the performance of transport layer congestion on 5G systems using the two types of File Transfer Protocol (FTP) traffic is presented. The performance of the Transmission Control Protocol (TCP) protocol using metrics such as user and cell throughput, round trip time, delay, and Physical Resource Block (PRB) utilization was specifically analyzed. The simulation study shows the differences between File transfer protocol with TCP slow start and File transfer protocol without TCP slow start.
5G网络的发展仍在进行中。5G网络在智能网络通信环境中连接数据、应用、传输系统和人员。它将需要各种协议来支持其多种特性。其中之一包括传输协议,该协议旨在提供高达400Gbps的高速数据速率。本文分析了使用两种类型的文件传输协议(FTP)流量的5G系统上传输层拥塞的性能。使用诸如用户和单元吞吐量、往返时间、延迟和物理资源块(PRB)利用率等指标对传输控制协议(TCP)协议的性能进行了具体分析。仿真研究显示了带TCP慢启动的文件传输协议与不带TCP慢启动的文件传输协议的区别。
{"title":"Performance Analysis of Transport Layer Congestion on 5G Systems","authors":"Gordana Barb, Cristina Andras, Cornel Balint","doi":"10.1109/comm54429.2022.9817358","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817358","url":null,"abstract":"The development of 5G networks is still ongoing. 5G networks connect data, applications, transport systems and people in smart networked communication environments. It will require various protocols to support its multiples features. One of these includes the transport protocol, which is designed to provide high-speed data rates up to 400Gbps. In this paper, an analysis of the performance of transport layer congestion on 5G systems using the two types of File Transfer Protocol (FTP) traffic is presented. The performance of the Transmission Control Protocol (TCP) protocol using metrics such as user and cell throughput, round trip time, delay, and Physical Resource Block (PRB) utilization was specifically analyzed. The simulation study shows the differences between File transfer protocol with TCP slow start and File transfer protocol without TCP slow start.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Two-Stage Spatio- Temporal Vision Transformer for the Detection of Violent Scenes 用于暴力场景检测的两级时空视觉变换
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817200
M. Constantin, B. Ionescu
The rapid expansion and adoption of CCTV systems brings with itself a series of problems that, if remain unchecked, have the potential of hindering the advantages brought by such systems and reduce the effectiveness of this type of system in security surveillance scenarios. The possibly vast quantities of data associated with a CCTV system that covers a city or problematic areas of that city, venues, events, industrial sites or even smaller security perimeters can over-whelm the human operators and make it hard to distinguish important security events from the rest of the normal data. Therefore, the creation of automated systems that are able to provide operators with accurate alarms when certain events take place is of paramount importance, as this can heavily reduce their workload and improve the efficiency of the system. In this regard, we propose a Two-Stage Vision Transformer-based (2SViT) system for the detection of violent scenes. In this setup, the first stage handles frame-level processing, while the second stage processes temporal information by gathering frame-level features. We train and validate our proposed Transformer architecture on the popular XD- Violence dataset, while testing some size variations for the architecture, and show good results when compared with baseline scores.
闭路电视系统的迅速扩展和采用带来了一系列问题,如果不加以控制,可能会阻碍这种系统所带来的优势,降低这种系统在安全监控场景中的有效性。与CCTV系统相关的可能大量的数据覆盖了一个城市或该城市的问题区域、场地、活动、工业场所甚至更小的安全范围,这些数据可能会使人类操作员不堪重负,并且很难将重要的安全事件与其他正常数据区分开来。因此,创建能够在某些事件发生时为操作人员提供准确警报的自动化系统至关重要,因为这可以大大减少他们的工作量并提高系统的效率。在这方面,我们提出了一个基于两阶段视觉变压器(2SViT)的系统来检测暴力场景。在这种设置中,第一阶段处理帧级处理,而第二阶段通过收集帧级特征来处理时间信息。我们在流行的XD- Violence数据集上训练并验证了我们提出的Transformer体系结构,同时测试了该体系结构的一些大小变化,与基线分数相比显示出良好的结果。
{"title":"Two-Stage Spatio- Temporal Vision Transformer for the Detection of Violent Scenes","authors":"M. Constantin, B. Ionescu","doi":"10.1109/comm54429.2022.9817200","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817200","url":null,"abstract":"The rapid expansion and adoption of CCTV systems brings with itself a series of problems that, if remain unchecked, have the potential of hindering the advantages brought by such systems and reduce the effectiveness of this type of system in security surveillance scenarios. The possibly vast quantities of data associated with a CCTV system that covers a city or problematic areas of that city, venues, events, industrial sites or even smaller security perimeters can over-whelm the human operators and make it hard to distinguish important security events from the rest of the normal data. Therefore, the creation of automated systems that are able to provide operators with accurate alarms when certain events take place is of paramount importance, as this can heavily reduce their workload and improve the efficiency of the system. In this regard, we propose a Two-Stage Vision Transformer-based (2SViT) system for the detection of violent scenes. In this setup, the first stage handles frame-level processing, while the second stage processes temporal information by gathering frame-level features. We train and validate our proposed Transformer architecture on the popular XD- Violence dataset, while testing some size variations for the architecture, and show good results when compared with baseline scores.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi Wideband Stacked Cylindrical-Rectangular DRA for S, C, X, and Ku Applications 用于S, C, X和Ku应用的多宽带堆叠圆柱-矩形DRA
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817187
Farah S. Hasan, Saja R. Aldabes, Yanal S. Faouri
This paper proposes a quad-wideband stacked dielectric resonator antenna intended for modern communications. Bandwidth enhancement methods were used to configure antenna characteristics. The DRA consists of several dielectric resonators to form a special shape installed on a grooved ground. Four wide bands were achieved, the first band ranging (3.82 − 4.52) GHz with fractional bandwidth of 16.78 %, the second band covers (5.05–6.77) GHz with fractional bandwidth of 28.9 %, the third band covers (7.76–9.47) GHz with fractional bandwidth 19.8 % and the fourth is ranging (12.66 – 14.98) GHz with fractional bandwidth 16.78 %. Several antenna results are studied for a complete understanding of the proposed antenna behavior.
提出了一种适用于现代通信的四宽带堆叠介质谐振器天线。采用带宽增强方法配置天线特性。DRA由几个介电谐振器组成,形成一个特殊的形状,安装在沟槽地面上。实现了4个宽带,第一频段覆盖(3.82 ~ 4.52)GHz,分数带宽为16.78%;第二频段覆盖(5.05 ~ 6.77)GHz,分数带宽为28.9%;第三频段覆盖(7.76 ~ 9.47)GHz,分数带宽为19.8%;第四频段覆盖(12.66 ~ 14.98)GHz,分数带宽为16.78%。为了全面了解所提出的天线行为,研究了几个天线结果。
{"title":"Multi Wideband Stacked Cylindrical-Rectangular DRA for S, C, X, and Ku Applications","authors":"Farah S. Hasan, Saja R. Aldabes, Yanal S. Faouri","doi":"10.1109/comm54429.2022.9817187","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817187","url":null,"abstract":"This paper proposes a quad-wideband stacked dielectric resonator antenna intended for modern communications. Bandwidth enhancement methods were used to configure antenna characteristics. The DRA consists of several dielectric resonators to form a special shape installed on a grooved ground. Four wide bands were achieved, the first band ranging (3.82 − 4.52) GHz with fractional bandwidth of 16.78 %, the second band covers (5.05–6.77) GHz with fractional bandwidth of 28.9 %, the third band covers (7.76–9.47) GHz with fractional bandwidth 19.8 % and the fourth is ranging (12.66 – 14.98) GHz with fractional bandwidth 16.78 %. Several antenna results are studied for a complete understanding of the proposed antenna behavior.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"25 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116700166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Capsule Networks to Classify Digitally Modulated Signals with Raw I/Q Data 用胶囊网络对原始I/Q数据的数字调制信号进行分类
Pub Date : 2022-05-19 DOI: 10.1109/COMM54429.2022.9817229
James A. Latshaw, D. Popescu, John A. Snoap, C. Spooner
Machine learning has become a powerful tool for solving problems in various engineering and science areas, including the area of communication systems. This paper presents the use of capsule networks for classification of digitally modulated signals using the I/Q signal components. The generalization ability of a trained capsule network to correctly classify the classes of digitally modulated signals that it has been trained to recognize is also studied by using two different datasets that contain similar classes of digitally modulated signals but that have been generated independently. Results indicate that the capsule networks are able to achieve high classification accuracy. However, these networks are susceptible to the datashift problem which will be discussed in this paper.
机器学习已经成为解决各种工程和科学领域问题的强大工具,包括通信系统领域。本文介绍了利用胶囊网络对I/Q信号分量进行数字调制信号分类的方法。通过使用两个不同的数据集,研究了经过训练的胶囊网络正确分类已训练识别的数字调制信号类别的泛化能力,这两个数据集包含相似类别的数字调制信号,但它们是独立生成的。结果表明,胶囊网络能够达到较高的分类精度。然而,这些网络容易受到数据转移问题的影响,这将在本文中讨论。
{"title":"Using Capsule Networks to Classify Digitally Modulated Signals with Raw I/Q Data","authors":"James A. Latshaw, D. Popescu, John A. Snoap, C. Spooner","doi":"10.1109/COMM54429.2022.9817229","DOIUrl":"https://doi.org/10.1109/COMM54429.2022.9817229","url":null,"abstract":"Machine learning has become a powerful tool for solving problems in various engineering and science areas, including the area of communication systems. This paper presents the use of capsule networks for classification of digitally modulated signals using the I/Q signal components. The generalization ability of a trained capsule network to correctly classify the classes of digitally modulated signals that it has been trained to recognize is also studied by using two different datasets that contain similar classes of digitally modulated signals but that have been generated independently. Results indicate that the capsule networks are able to achieve high classification accuracy. However, these networks are susceptible to the datashift problem which will be discussed in this paper.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unsupervised Abnormal Traffic Detection through Topological Flow Analysis 基于拓扑流分析的无监督异常流量检测
Pub Date : 2022-05-14 DOI: 10.48550/arXiv.2205.07109
Paul Irofti, Andrei Puatracscu, Andrei Iulian Hiji
Cyberthreats are a permanent concern in our modern technological world. In the recent years, sophisticated traffic analysis techniques and anomaly detection (AD) algorithms have been employed to face the more and more subversive adversarial attacks. A malicious intrusion, defined as an invasive action in-tending to illegally exploit private resources, manifests through unusual data traffic and/or abnormal connectivity pattern. Despite the plethora of statistical or signature-based detectors currently provided in the literature, the topological connectivity component of a malicious flow is less exploited. Furthermore, a great proportion of the existing statistical intrusion detectors are based on supervised learning, that relies on labeled data. By viewing network flows as weighted directed interactions between a pair of nodes, in this paper we present a simple method that facilitate the use of connectivity graph features in unsupervised anomaly detection algorithms. We test our methodology on real network traffic datasets and observe several improvements over standard AD.
网络威胁是现代科技世界的一个长期问题。近年来,复杂的流量分析技术和异常检测(AD)算法被用于应对越来越多的颠覆性对抗性攻击。恶意入侵是一种旨在非法利用私有资源的入侵行为,表现为异常的数据流量和/或异常的连接模式。尽管目前文献中提供了大量的统计或基于签名的检测器,但恶意流的拓扑连接组件很少被利用。此外,现有的统计入侵检测器的很大一部分是基于监督学习,它依赖于标记数据。通过将网络流视为一对节点之间的加权有向交互,本文提出了一种简单的方法,便于在无监督异常检测算法中使用连接图特征。我们在真实的网络流量数据集上测试了我们的方法,并观察到与标准AD相比的一些改进。
{"title":"Unsupervised Abnormal Traffic Detection through Topological Flow Analysis","authors":"Paul Irofti, Andrei Puatracscu, Andrei Iulian Hiji","doi":"10.48550/arXiv.2205.07109","DOIUrl":"https://doi.org/10.48550/arXiv.2205.07109","url":null,"abstract":"Cyberthreats are a permanent concern in our modern technological world. In the recent years, sophisticated traffic analysis techniques and anomaly detection (AD) algorithms have been employed to face the more and more subversive adversarial attacks. A malicious intrusion, defined as an invasive action in-tending to illegally exploit private resources, manifests through unusual data traffic and/or abnormal connectivity pattern. Despite the plethora of statistical or signature-based detectors currently provided in the literature, the topological connectivity component of a malicious flow is less exploited. Furthermore, a great proportion of the existing statistical intrusion detectors are based on supervised learning, that relies on labeled data. By viewing network flows as weighted directed interactions between a pair of nodes, in this paper we present a simple method that facilitate the use of connectivity graph features in unsupervised anomaly detection algorithms. We test our methodology on real network traffic datasets and observe several improvements over standard AD.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116467993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 14th International Conference on Communications (COMM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1