首页 > 最新文献

IEEE Open Journal of the Computer Society最新文献

英文 中文
A Novel NFT Solution for Assets Digitization and Authentication in Cyber-Physical Systems: Blueprint and Evaluation 网络物理系统中资产数字化和身份验证的新型 NFT 解决方案:蓝图与评估
Pub Date : 2024-03-18 DOI: 10.1109/OJCS.2024.3378424
Usman Khalil;Mueen Uddin;Owais Ahmed Malik;Ong Wee Hong
The blueprint of the proposed Decentralized Smart City of Things (DSCoT) has been presented with smart contracts development and deployment for robust security of resources in the context of cyber-physical systems (CPS) for smart cities. Since non-fungibility provided by the ERC721 standard for the cyber-physical systems (CPSs) components such as the admin, user, and IoT-enabled smart device/s in literature is explicitly missing, the proposed DSCoT devised the functionality of identification and authentication of the assets. The proposed identification and authentication mechanism in cyber-physical systems (CPSs) employs smart contracts to generate an authentication access code based on extended non-fungible tokens (NFTs), which are used to authorize access to the corresponding assets. The evaluation and development of the extended NFT protocol for cyber-physical systems have been presented with the public and private blockchain deployments for evaluation comparison. The comparison demonstrated up to 96.69% promising results in terms of execution cost, efficiency, and time complexity compared to other proposed NFT-based solutions.
拟议的去中心化智能物联城市(DSCoT)蓝图已通过智能合约的开发和部署提出,以确保智能城市网络物理系统(CPS)中资源的稳健安全。由于ERC721标准为网络物理系统(CPS)组件(如文献中的管理员、用户和支持物联网的智能设备)提供的不可篡改性明确缺失,拟议的DSCoT设计了资产识别和认证功能。所提出的网络物理系统(CPS)中的识别和认证机制利用智能合约生成基于扩展不可伪造令牌(NFT)的认证访问代码,用于授权访问相应的资产。针对网络物理系统的扩展 NFT 协议的评估和开发已通过公共和私有区块链部署进行评估比较。对比结果表明,与其他基于 NFT 的解决方案相比,该方案在执行成本、效率和时间复杂性方面的优势高达 96.69%。
{"title":"A Novel NFT Solution for Assets Digitization and Authentication in Cyber-Physical Systems: Blueprint and Evaluation","authors":"Usman Khalil;Mueen Uddin;Owais Ahmed Malik;Ong Wee Hong","doi":"10.1109/OJCS.2024.3378424","DOIUrl":"10.1109/OJCS.2024.3378424","url":null,"abstract":"The blueprint of the proposed Decentralized Smart City of Things (DSCoT) has been presented with smart contracts development and deployment for robust security of resources in the context of cyber-physical systems (CPS) for smart cities. Since non-fungibility provided by the ERC721 standard for the cyber-physical systems (CPSs) components such as the admin, user, and IoT-enabled smart device/s in literature is explicitly missing, the proposed DSCoT devised the functionality of identification and authentication of the assets. The proposed identification and authentication mechanism in cyber-physical systems (CPSs) employs smart contracts to generate an authentication access code based on extended non-fungible tokens (NFTs), which are used to authorize access to the corresponding assets. The evaluation and development of the extended NFT protocol for cyber-physical systems have been presented with the public and private blockchain deployments for evaluation comparison. The comparison demonstrated up to 96.69% promising results in terms of execution cost, efficiency, and time complexity compared to other proposed NFT-based solutions.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"131-143"},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10474129","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140165630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures ALBERTA:变压器架构中基于算法的抗错能力
Pub Date : 2024-03-14 DOI: 10.1109/OJCS.2024.3400696
Haoxuan Liu;Vasu Singh;Michał Filipiuk;Siva Kumar Sastry Hari
Vision Transformers are being increasingly deployed in safety-critical applications that demand high reliability. Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. First, our work develops an efficient process of computing and ranking the resilience of transformers layers. Due to the large size of transformer models, applying traditional network redundancy to a subset of the most vulnerable layers provides high error coverage albeit with impractically high overhead. We address this shortcoming by providing a software-directed, checksum-based error detection technique aimed at protecting the most vulnerable general matrix multiply (GEMM) layers in the transformer models that use either floating-point or integer arithmetic. Results show that our approach achieves over 99% coverage for errors (single bit-flip fault model) that result in a mismatch with $< $0.2% and $< $0.01% computation and memory overheads, respectively. Lastly, we present the applicability of our framework in various modern GPU architectures under different numerical precisions. We introduce an efficient self-correction mechanism for resolving erroneous detection with an average of less than 2% overhead per error.
视觉变压器越来越多地部署在要求高可靠性的安全关键应用中。确保这些模型在gpu中的正确执行是至关重要的,尽管有可能出现短暂的硬件错误。我们提出了一种新的基于算法的弹性框架,称为ALBERTA,它允许我们执行端到端的弹性分析和基于变压器的体系结构的保护。首先,我们的工作开发了一种有效的计算和排列变压器层弹性的过程。由于变压器模型的规模很大,将传统的网络冗余应用于最脆弱层的子集提供了很高的错误覆盖率,尽管开销高得不切实际。我们通过提供一种软件导向的、基于校验和的错误检测技术来解决这一缺点,该技术旨在保护使用浮点或整数算法的变压器模型中最脆弱的通用矩阵乘法(GEMM)层。结果表明,我们的方法对导致与$<不匹配的错误(单比特翻转故障模型)的覆盖率超过99%;$0.2%及$<;计算和内存开销分别为0.01%。最后,我们介绍了我们的框架在不同数值精度下的各种现代GPU架构的适用性。我们引入了一种有效的自我纠正机制来解决错误检测,平均每个错误的开销低于2%。
{"title":"ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures","authors":"Haoxuan Liu;Vasu Singh;Michał Filipiuk;Siva Kumar Sastry Hari","doi":"10.1109/OJCS.2024.3400696","DOIUrl":"10.1109/OJCS.2024.3400696","url":null,"abstract":"Vision Transformers are being increasingly deployed in safety-critical applications that demand high reliability. Ensuring the correct execution of these models in GPUs is critical, despite the potential for transient hardware errors. We propose a novel algorithm-based resilience framework called ALBERTA that allows us to perform end-to-end resilience analysis and protection of transformer-based architectures. First, our work develops an efficient process of computing and ranking the resilience of transformers layers. Due to the large size of transformer models, applying traditional network redundancy to a subset of the most vulnerable layers provides high error coverage albeit with impractically high overhead. We address this shortcoming by providing a software-directed, checksum-based error detection technique aimed at protecting the most vulnerable general matrix multiply (GEMM) layers in the transformer models that use either floating-point or integer arithmetic. Results show that our approach achieves over 99% coverage for errors (single bit-flip fault model) that result in a mismatch with \u0000<inline-formula><tex-math>$&lt; $</tex-math></inline-formula>\u00000.2% and \u0000<inline-formula><tex-math>$&lt; $</tex-math></inline-formula>\u00000.01% computation and memory overheads, respectively. Lastly, we present the applicability of our framework in various modern GPU architectures under different numerical precisions. We introduce an efficient self-correction mechanism for resolving erroneous detection with an average of less than 2% overhead per error.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"85-96"},"PeriodicalIF":0.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10530530","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141060659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique 使用 ECC 和分割技术安全存储加密钱包种子短语
Pub Date : 2024-03-09 DOI: 10.1109/OJCS.2024.3398794
Syeda Tayyaba Bukhari;Muhammad Umar Janjua;Junaid Qadir
Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. As the use of blockchain technology and cryptocurrency wallets continues to grow in popularity, the potential for attacks on these wallets increases, as attackers seek to gain access to the large sums of cryptocurrency they contain. To mitigate these risks, it is important to conduct thorough security evaluations of wallets and implement strong protective measures. In recent years, there have been several incidents involving significant losses of cryptocurrency in crypto-wallets, and in this research, a comprehensive evaluation of seed phrase and password attack methods found in the published literature was conducted, and the topic was advanced by addressing the question of whether seed phrases are hackable. The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.
区块链技术使用户能够通过使用数字钱包来控制和记录他们的加密货币交易。随着区块链技术和加密货币钱包的使用不断普及,这些钱包受到攻击的可能性也随之增加,因为攻击者试图获取其中包含的大量加密货币。为了降低这些风险,对钱包进行彻底的安全评估并实施强有力的保护措施非常重要。近年来,发生了多起涉及加密钱包中加密货币重大损失的事件,在这项研究中,对已发表文献中发现的种子短语和密码攻击方法进行了全面评估,并通过解决种子短语是否可黑客攻击的问题推进了该课题的研究。研究旨在使用椭圆曲线加密算法(ECC)在线存储种子短语,通过加密种子短语并使用分割技术存储加密钱包种子短语。研究得出的结论是,只有在种子短语的很大一部分已被知晓的情况下,才有可能入侵种子短语,但即使这样也需要大量的时间和计算能力。
{"title":"Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique","authors":"Syeda Tayyaba Bukhari;Muhammad Umar Janjua;Junaid Qadir","doi":"10.1109/OJCS.2024.3398794","DOIUrl":"10.1109/OJCS.2024.3398794","url":null,"abstract":"Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. As the use of blockchain technology and cryptocurrency wallets continues to grow in popularity, the potential for attacks on these wallets increases, as attackers seek to gain access to the large sums of cryptocurrency they contain. To mitigate these risks, it is important to conduct thorough security evaluations of wallets and implement strong protective measures. In recent years, there have been several incidents involving significant losses of cryptocurrency in crypto-wallets, and in this research, a comprehensive evaluation of seed phrase and password attack methods found in the published literature was conducted, and the topic was advanced by addressing the question of whether seed phrases are hackable. The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"278-289"},"PeriodicalIF":0.0,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10526424","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140928213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing 6G Network Performance: AI/ML Framework for Proactive Management and Dynamic Optimal Routing 提升 6G 网络性能:用于主动管理和动态优化路由的 AI/ML 框架
Pub Date : 2024-03-08 DOI: 10.1109/OJCS.2024.3398540
Petro Mushidi Tshakwanda;Sisay Tadesse Arzo;Michael Devetsikiotis
As 6G networks proliferate, they generate vast volumes of data and engage diverse devices, pushing the boundaries of traditional network management techniques. The limitations of these techniques underpin the need for a revolutionary shift towards AI/ML-based frameworks. This article introduces a transformative approach using our novel Speed-optimized LSTM (SP-LSTM) model, an embodiment of this crucial paradigm shift. We present a proactive strategy integrating predictive analytics and dynamic routing, underpinning efficient resource utilization and optimal network performance. This innovative, two-tiered system combines SP-LSTM networks and Reinforcement Learning (RL) for forecasting and dynamic routing. SP-LSTM models, boasting superior speed, predict potential network congestion, enabling preemptive action, while RL capitalizes on these forecasts to optimize routing and uphold network performance. This cutting-edge framework, driven by continuous learning and adaptation, mirrors the evolving nature of 6G networks, meeting the stringent requirements for ultra-low latency, ultra-reliability, and heterogeneity management. The expedited training and prediction times of SP-LSTM are game-changers, particularly in dynamic network environments where time is of the essence. Our work marks a significant stride towards integrating AI/ML in future network management, highlighting AI/ML's exceptional capacity to outperform conventional algorithms and drive innovative performance in 6G network management.
随着 6G 网络的普及,它们会产生大量数据并与各种设备接触,从而挑战传统网络管理技术的极限。这些技术的局限性决定了需要向基于人工智能/移动语言的框架进行革命性转变。本文介绍了一种使用我们新颖的速度优化 LSTM(SP-LSTM)模型的变革性方法,它体现了这一至关重要的模式转变。我们提出了一种整合了预测分析和动态路由的前瞻性策略,为高效利用资源和优化网络性能奠定了基础。这一创新的双层系统结合了 SP-LSTM 网络和强化学习 (RL),用于预测和动态路由选择。SP-LSTM 模型具有超快的速度,可以预测潜在的网络拥塞情况,从而采取先发制人的行动,而 RL 则利用这些预测来优化路由选择和维护网络性能。这种由持续学习和适应驱动的尖端框架反映了 6G 网络不断发展的特性,满足了对超低延迟、超高可靠性和异构管理的严格要求。SP-LSTM 的快速训练和预测时间改变了游戏规则,尤其是在时间至关重要的动态网络环境中。我们的工作标志着在未来网络管理中整合人工智能/移动语言方面迈出了重要一步,凸显了人工智能/移动语言超越传统算法和推动 6G 网络管理创新性能的卓越能力。
{"title":"Advancing 6G Network Performance: AI/ML Framework for Proactive Management and Dynamic Optimal Routing","authors":"Petro Mushidi Tshakwanda;Sisay Tadesse Arzo;Michael Devetsikiotis","doi":"10.1109/OJCS.2024.3398540","DOIUrl":"10.1109/OJCS.2024.3398540","url":null,"abstract":"As 6G networks proliferate, they generate vast volumes of data and engage diverse devices, pushing the boundaries of traditional network management techniques. The limitations of these techniques underpin the need for a revolutionary shift towards AI/ML-based frameworks. This article introduces a transformative approach using our novel Speed-optimized LSTM (SP-LSTM) model, an embodiment of this crucial paradigm shift. We present a proactive strategy integrating predictive analytics and dynamic routing, underpinning efficient resource utilization and optimal network performance. This innovative, two-tiered system combines SP-LSTM networks and Reinforcement Learning (RL) for forecasting and dynamic routing. SP-LSTM models, boasting superior speed, predict potential network congestion, enabling preemptive action, while RL capitalizes on these forecasts to optimize routing and uphold network performance. This cutting-edge framework, driven by continuous learning and adaptation, mirrors the evolving nature of 6G networks, meeting the stringent requirements for ultra-low latency, ultra-reliability, and heterogeneity management. The expedited training and prediction times of SP-LSTM are game-changers, particularly in dynamic network environments where time is of the essence. Our work marks a significant stride towards integrating AI/ML in future network management, highlighting AI/ML's exceptional capacity to outperform conventional algorithms and drive innovative performance in 6G network management.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"303-314"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10522874","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Gossip Algorithms for Large Scale Wireless Sensor Networks 大规模无线传感器网络流言算法的性能分析
Pub Date : 2024-03-07 DOI: 10.1109/OJCS.2024.3397345
Sateeshkrishna Dhuli;Fouzul Atik;Anamika Chhabra;Prem Singh;Linga Reddy Cenkeramaddi
Gossip algorithms are often considered suitable for wireless sensor networks (WSNs) because of their simplicity, fault tolerance, and adaptability to network changes. They are based on the idea of distributed information dissemination, where each node in the network periodically sends its information to randomly selected neighbors, leading to a rapid spread of information throughout the network. This approach helps reduce the communication overhead and ensures robustness against node failures. They have been commonly employed in WSNs owing to their low communication overheads and scalability. The time required for every node in the network to converge to the average of its initial value is called the average time. The average time is defined in terms of the second-largest eigenvalue of a stochastic matrix. Thus, estimating and analyzing the average time required for large-scale WSNs is computationally complex. This study derives explicit expressions of average time for WSNs and studies the effect of various network parameters such as communication link failures, topology changes, long-range links, network dimension, node transmission range, and network size. Our theoretical expressions substantially reduced the computational complexity of computing the average time to $Oleft(n^{-3}right)$. Furthermore, numerical results reveal that the long-range links and node transmission range of WSNs can significantly reduce average time, energy consumption, and absolute error for gossip algorithms.
流言算法因其简单、容错和适应网络变化的能力,通常被认为适合无线传感器网络(WSN)。它们基于分布式信息传播的理念,即网络中的每个节点定期向随机选择的邻居发送信息,从而在整个网络中迅速传播信息。这种方法有助于减少通信开销,并确保对节点故障的鲁棒性。由于通信开销低、可扩展,WSN 普遍采用这种方法。网络中每个节点收敛到其初始值平均值所需的时间称为平均时间。平均时间是根据随机矩阵的第二大特征值定义的。因此,估算和分析大规模 WSN 所需的平均时间在计算上非常复杂。本研究得出了 WSN 平均时间的明确表达式,并研究了各种网络参数的影响,如通信链路故障、拓扑变化、远距离链路、网络维度、节点传输距离和网络规模。我们的理论表达式将计算平均时间的计算复杂度大幅降低到 $Oleft(n^{-3}right)$。此外,数值结果表明,WSN 的长程链路和节点传输距离可以显著减少八卦算法的平均时间、能耗和绝对误差。
{"title":"Performance Analysis of Gossip Algorithms for Large Scale Wireless Sensor Networks","authors":"Sateeshkrishna Dhuli;Fouzul Atik;Anamika Chhabra;Prem Singh;Linga Reddy Cenkeramaddi","doi":"10.1109/OJCS.2024.3397345","DOIUrl":"10.1109/OJCS.2024.3397345","url":null,"abstract":"Gossip algorithms are often considered suitable for wireless sensor networks (WSNs) because of their simplicity, fault tolerance, and adaptability to network changes. They are based on the idea of distributed information dissemination, where each node in the network periodically sends its information to randomly selected neighbors, leading to a rapid spread of information throughout the network. This approach helps reduce the communication overhead and ensures robustness against node failures. They have been commonly employed in WSNs owing to their low communication overheads and scalability. The time required for every node in the network to converge to the average of its initial value is called the average time. The average time is defined in terms of the second-largest eigenvalue of a stochastic matrix. Thus, estimating and analyzing the average time required for large-scale WSNs is computationally complex. This study derives explicit expressions of average time for WSNs and studies the effect of various network parameters such as communication link failures, topology changes, long-range links, network dimension, node transmission range, and network size. Our theoretical expressions substantially reduced the computational complexity of computing the average time to \u0000<inline-formula><tex-math>$Oleft(n^{-3}right)$</tex-math></inline-formula>\u0000. Furthermore, numerical results reveal that the long-range links and node transmission range of WSNs can significantly reduce average time, energy consumption, and absolute error for gossip algorithms.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"290-302"},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10521818","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140928391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research 面向物联网环境的通用量子区块链安全框架:架构、安全优势和未来研究
Pub Date : 2024-03-07 DOI: 10.1109/OJCS.2024.3397307
Mohammad Wazid;Ashok Kumar Das;Youngho Park
Quantum cryptography has the potential to secure the infrastructures that are vulnerable to various attacks, like classical attacks, including quantum-related attacks. Therefore, quantum cryptography seems to be a promising technology for the future secure online infrastructures and applications, like blockchain-based frameworks. In this article, we propose a generic quantum blockchain-envisioned security framework for an Internet of Things (IoT) environment. We then discuss some potential applications of the proposed framework. We also highlight the security advantages of quantum cryptography-based systems. We explain the working of blockchain, applications of blockchain, types of blockchain, the structure of blockchain, the structure of blockchain in a classical blockchain, and the structure of a block in a quantum blockchain context. Next, the adverse effects of quantum computing on the security of blockchain-based frameworks are highlighted. Furthermore, the comparisons of quantum cryptography-based security schemes, like quantum key distribution, quantum digital signature, and quantum hashing schemes, are provided. Finally, some future research directions related to the designed generic quantum blockchain-envisioned security framework for IoT are provided.
量子密码学有可能保护易受各种攻击(如经典攻击,包括与量子有关的攻击)的基础设施的安全。因此,对于未来的安全在线基础设施和应用(如基于区块链的框架)来说,量子密码学似乎是一项大有可为的技术。在本文中,我们为物联网(IoT)环境提出了一个通用的量子区块链安全框架。然后,我们讨论了拟议框架的一些潜在应用。我们还强调了基于量子密码学的系统的安全优势。我们解释了区块链的工作原理、区块链的应用、区块链的类型、区块链的结构、经典区块链中的区块链结构以及量子区块链中的区块结构。接下来,重点介绍了量子计算对基于区块链框架的安全性的不利影响。此外,还比较了基于量子密码学的安全方案,如量子密钥分发、量子数字签名和量子散列方案。最后,介绍了与所设计的物联网通用量子区块链安全框架相关的一些未来研究方向。
{"title":"Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research","authors":"Mohammad Wazid;Ashok Kumar Das;Youngho Park","doi":"10.1109/OJCS.2024.3397307","DOIUrl":"10.1109/OJCS.2024.3397307","url":null,"abstract":"Quantum cryptography has the potential to secure the infrastructures that are vulnerable to various attacks, like classical attacks, including quantum-related attacks. Therefore, quantum cryptography seems to be a promising technology for the future secure online infrastructures and applications, like blockchain-based frameworks. In this article, we propose a generic quantum blockchain-envisioned security framework for an Internet of Things (IoT) environment. We then discuss some potential applications of the proposed framework. We also highlight the security advantages of quantum cryptography-based systems. We explain the working of blockchain, applications of blockchain, types of blockchain, the structure of blockchain, the structure of blockchain in a classical blockchain, and the structure of a block in a quantum blockchain context. Next, the adverse effects of quantum computing on the security of blockchain-based frameworks are highlighted. Furthermore, the comparisons of quantum cryptography-based security schemes, like quantum key distribution, quantum digital signature, and quantum hashing schemes, are provided. Finally, some future research directions related to the designed generic quantum blockchain-envisioned security framework for IoT are provided.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"248-267"},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10521804","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on the use of Federated Learning in Privacy-Preserving Recommender Systems 关于在隐私保护推荐系统中使用联合学习的调查
Pub Date : 2024-03-02 DOI: 10.1109/OJCS.2024.3396344
Christos Chronis;Iraklis Varlamis;Yassine Himeur;Aya N. Sayed;Tamim M. AL-Hasan;Armstrong Nhlabatsi;Faycal Bensaali;George Dimitrakopoulos
In the age of information overload, recommender systems have emerged as essential tools, assisting users in decision-making processes by offering personalized suggestions. However, their effectiveness is contingent on the availability of large amounts of user data, raising significant privacy and security concerns. This review article presents an extended analysis of recommender systems, elucidating their importance and the growing apprehensions regarding privacy and data security. Federated Learning (FL), a privacy-preserving machine learning approach, is introduced as a potential solution to these challenges. Consequently, the potential benefits and implications of integrating FL with recommender systems are explored and an overview of FL, its types, and key components, are provided. Further, the privacy-preserving techniques inherent to FL are discussed, demonstrating how they contribute to secure recommender systems. By illustrating case studies and significant research contributions, the article showcases the practical feasibility and benefits of combining FL with recommender systems. Despite the promising benefits, challenges, and limitations exist in the practical deployment of FL in recommender systems. This review outlines these hurdles, bringing to light the security considerations crucial in this context and offering a balanced perspective. In conclusion, the article signifies the potential of FL in transforming recommender systems, paving the path for future research directions in this intersection of technologies.
在信息过载的时代,推荐系统已成为必不可少的工具,它通过提供个性化建议来帮助用户做出决策。然而,它们的有效性取决于大量用户数据的可用性,从而引发了对隐私和安全的严重关切。这篇评论文章对推荐系统进行了深入分析,阐明了推荐系统的重要性以及人们对隐私和数据安全日益增长的担忧。联邦学习(FL)是一种保护隐私的机器学习方法,作为应对这些挑战的潜在解决方案被引入。因此,本文探讨了将联合学习与推荐系统集成的潜在好处和影响,并概述了联合学习及其类型和主要组成部分。此外,还讨论了 FL 所固有的隐私保护技术,展示了这些技术如何为安全的推荐系统做出贡献。通过案例研究和重大研究成果,文章展示了将 FL 与推荐系统相结合的实际可行性和好处。尽管FL在推荐系统中的实际应用前景广阔,但也存在挑战和局限性。这篇综述概述了这些障碍,揭示了在此背景下至关重要的安全考虑因素,并提供了一个平衡的视角。最后,文章指出了 FL 在改变推荐系统方面的潜力,为这一技术交叉领域的未来研究方向铺平了道路。
{"title":"A Survey on the use of Federated Learning in Privacy-Preserving Recommender Systems","authors":"Christos Chronis;Iraklis Varlamis;Yassine Himeur;Aya N. Sayed;Tamim M. AL-Hasan;Armstrong Nhlabatsi;Faycal Bensaali;George Dimitrakopoulos","doi":"10.1109/OJCS.2024.3396344","DOIUrl":"10.1109/OJCS.2024.3396344","url":null,"abstract":"In the age of information overload, recommender systems have emerged as essential tools, assisting users in decision-making processes by offering personalized suggestions. However, their effectiveness is contingent on the availability of large amounts of user data, raising significant privacy and security concerns. This review article presents an extended analysis of recommender systems, elucidating their importance and the growing apprehensions regarding privacy and data security. Federated Learning (FL), a privacy-preserving machine learning approach, is introduced as a potential solution to these challenges. Consequently, the potential benefits and implications of integrating FL with recommender systems are explored and an overview of FL, its types, and key components, are provided. Further, the privacy-preserving techniques inherent to FL are discussed, demonstrating how they contribute to secure recommender systems. By illustrating case studies and significant research contributions, the article showcases the practical feasibility and benefits of combining FL with recommender systems. Despite the promising benefits, challenges, and limitations exist in the practical deployment of FL in recommender systems. This review outlines these hurdles, bringing to light the security considerations crucial in this context and offering a balanced perspective. In conclusion, the article signifies the potential of FL in transforming recommender systems, paving the path for future research directions in this intersection of technologies.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"227-247"},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10517657","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140840647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hand Gesture Recognition for Multi-Culture Sign Language Using Graph and General Deep Learning Network 利用图谱和通用深度学习网络识别多文化手语的手势
Pub Date : 2024-02-28 DOI: 10.1109/OJCS.2024.3370971
Abu Saleh Musa Miah;Md. Al Mehedi Hasan;Yoichi Tomioka;Jungpil Shin
Hand gesture-based Sign Language Recognition (SLR) serves as a crucial communication bridge between hard of hearing and non-deaf individuals. The absence of a universal sign language (SL) leads to diverse nationalities having various cultural SLs, such as Korean, American, and Japanese sign language. Existing SLR systems perform well for their cultural SL but may struggle with other or multi-cultural sign languages (McSL). To address these challenges, this paper introduces a novel end-to-end SLR system called GmTC, designed to translate McSL into equivalent text for enhanced understanding. Here, we employed a Graph and General deep-learning network as two stream modules to extract effective features. In the first stream, produce a graph-based feature by taking advantage of the superpixel values and the graph convolutional network (GCN), aiming to extract distance-based complex relationship features among the superpixel. In the second stream, we extracted long-range and short-range dependency features using attention-based contextual information that passes through multi-stage, multi-head self-attention (MHSA), and CNN modules. Combining these features generates final features that feed into the classification module. Extensive experiments with five culture SL datasets with high-performance accuracy compared to existing state-of-the-art models in individual domains affirming superiority and generalizability.
基于手势的手语识别(SLR)是连接重听者和非聋人的重要沟通桥梁。由于缺乏通用手语(SL),不同民族有不同的文化手语,如韩国手语、美国手语和日本手语。现有的 SLR 系统在处理其文化手语时表现良好,但在处理其他手语或多文化手语 (McSL) 时可能会遇到困难。为了应对这些挑战,本文介绍了一种名为 GmTC 的新型端到端 SLR 系统,旨在将 McSL 翻译成等效文本,以增强理解能力。在这里,我们采用了图形和通用深度学习网络作为两个流模块来提取有效的特征。在第一个数据流中,利用超像素值和图卷积网络(GCN)生成基于图的特征,旨在提取超像素之间基于距离的复杂关系特征。在第二个流程中,我们通过多阶段、多头自我注意(MHSA)和 CNN 模块,利用基于注意力的上下文信息提取长程和短程依赖关系特征。将这些特征组合起来,就能生成最终特征,并将其输入分类模块。在五个文化SL数据集上进行了广泛的实验,与各个领域现有的先进模型相比,其准确性表现出色,这肯定了其优越性和通用性。
{"title":"Hand Gesture Recognition for Multi-Culture Sign Language Using Graph and General Deep Learning Network","authors":"Abu Saleh Musa Miah;Md. Al Mehedi Hasan;Yoichi Tomioka;Jungpil Shin","doi":"10.1109/OJCS.2024.3370971","DOIUrl":"10.1109/OJCS.2024.3370971","url":null,"abstract":"Hand gesture-based Sign Language Recognition (SLR) serves as a crucial communication bridge between hard of hearing and non-deaf individuals. The absence of a universal sign language (SL) leads to diverse nationalities having various cultural SLs, such as Korean, American, and Japanese sign language. Existing SLR systems perform well for their cultural SL but may struggle with other or multi-cultural sign languages (McSL). To address these challenges, this paper introduces a novel end-to-end SLR system called GmTC, designed to translate McSL into equivalent text for enhanced understanding. Here, we employed a Graph and General deep-learning network as two stream modules to extract effective features. In the first stream, produce a graph-based feature by taking advantage of the superpixel values and the graph convolutional network (GCN), aiming to extract distance-based complex relationship features among the superpixel. In the second stream, we extracted long-range and short-range dependency features using attention-based contextual information that passes through multi-stage, multi-head self-attention (MHSA), and CNN modules. Combining these features generates final features that feed into the classification module. Extensive experiments with five culture SL datasets with high-performance accuracy compared to existing state-of-the-art models in individual domains affirming superiority and generalizability.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"144-155"},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10452793","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140008733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model 评估区块链上的加密货币市场风险:使用 ARMA-GARCH-VaR 模型的实证研究
Pub Date : 2024-02-27 DOI: 10.1109/OJCS.2024.3370603
Yongrong Huang;Huiqing Wang;Zhide Chen;Chen Feng;Kexin Zhu;Xu Yang;Wencheng Yang
Cryptocurrency, a novel digital asset within the blockchain technology ecosystem, has recently garnered significant attention in the investment world. Despite its growing popularity, the inherent volatility and instability of cryptocurrency investments necessitate a thorough risk evaluation. This study utilizes the Autoregressive Moving Average (ARMA) model combined with the Generalized Autoregressive Conditionally Heteroscedastic (GARCH) model to analyze the volatility of three major cryptocurrencies—Bitcoin (BTC), Ethereum (ETH), and Binance Coin (BNB)—over a period from January 1, 2017, to October 29, 2022. The dataset comprises daily closing prices, offering a comprehensive view of the market's fluctuations. Our analysis revealed that the value-at-risk (VaR) curves for these cryptocurrencies demonstrate significant volatility, encompassing a broad spectrum of returns. The overall risk profile is relatively high, with ETH exhibiting the highest risk, followed by BTC and BNB. The ARMA-GARCH-VaR model has proven effective in quantifying and assessing the market risks associated with cryptocurrencies, providing valuable insights for investors and policymakers in navigating the complex landscape of digital assets.
加密货币是区块链技术生态系统中的一种新型数字资产,最近在投资界引起了极大的关注。尽管加密货币越来越受欢迎,但由于其固有的波动性和不稳定性,有必要对其进行全面的风险评估。本研究利用自回归移动平均(ARMA)模型结合广义自回归条件异方差(GARCH)模型,分析了三种主要加密货币--比特币(BTC)、以太坊(ETH)和 Binance Coin(BNB)--在 2017 年 1 月 1 日至 2022 年 10 月 29 日期间的波动性。数据集包括每日收盘价,提供了市场波动的全面视图。我们的分析表明,这些加密货币的风险价值(VaR)曲线显示出显著的波动性,涵盖了广泛的回报范围。整体风险状况相对较高,其中 ETH 的风险最高,其次是 BTC 和 BNB。事实证明,ARMA-GARCH-VaR 模型可以有效量化和评估与加密货币相关的市场风险,为投资者和政策制定者驾驭数字资产的复杂局面提供有价值的见解。
{"title":"Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model","authors":"Yongrong Huang;Huiqing Wang;Zhide Chen;Chen Feng;Kexin Zhu;Xu Yang;Wencheng Yang","doi":"10.1109/OJCS.2024.3370603","DOIUrl":"10.1109/OJCS.2024.3370603","url":null,"abstract":"Cryptocurrency, a novel digital asset within the blockchain technology ecosystem, has recently garnered significant attention in the investment world. Despite its growing popularity, the inherent volatility and instability of cryptocurrency investments necessitate a thorough risk evaluation. This study utilizes the Autoregressive Moving Average (ARMA) model combined with the Generalized Autoregressive Conditionally Heteroscedastic (GARCH) model to analyze the volatility of three major cryptocurrencies—Bitcoin (BTC), Ethereum (ETH), and Binance Coin (BNB)—over a period from January 1, 2017, to October 29, 2022. The dataset comprises daily closing prices, offering a comprehensive view of the market's fluctuations. Our analysis revealed that the value-at-risk (VaR) curves for these cryptocurrencies demonstrate significant volatility, encompassing a broad spectrum of returns. The overall risk profile is relatively high, with ETH exhibiting the highest risk, followed by BTC and BNB. The ARMA-GARCH-VaR model has proven effective in quantifying and assessing the market risks associated with cryptocurrencies, providing valuable insights for investors and policymakers in navigating the complex landscape of digital assets.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"83-94"},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10449426","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139987737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling the Connection Between Malware and Pirated Software in Southeast Asian Countries: A Case Study 揭示东南亚国家恶意软件与盗版软件之间的联系:案例研究
Pub Date : 2024-02-09 DOI: 10.1109/OJCS.2024.3364576
Asif Iqbal;Muhammad Naveed Aman;Ramkumar Rejendran;Biplab Sikdar
Pirated software is an attractive choice for cybercriminals seeking to spread malicious software, known as malware. This paper attempts to quantify the occurrence of malware concealed within pirated software. We collected samples of pirated software from various sources from Southeast Asian countries, including hard disk drives, optical discs purchased in eight different countries, and online platforms using peer-to-peer services. Our dataset comprises a total of 750 pirated software samples. To analyze these samples, we employed seven distinct antivirus (AV) engines. The malware identified by the AV engines was classified into four categories: adware, Trojans, viruses, and a miscellaneous category termed others. Our findings reveal that adware and Trojans are the most prevalent types of malware, with average infection rates of 34% and 35%, respectively, among our pirated software samples. Notably, our evaluation of AV detection performance highlights variations in sensitivity, ranging from a high of 132% to a low of 30% across all AV engines. Furthermore, upon installing pirated software, the most adversely affected operating system settings are the firewall and user account control configurations. Given the potential for malware to steal information or create malicious backdoors, its high prevalence within pirated software poses a substantial security risk to end users.
盗版软件是网络犯罪分子传播恶意软件(即恶意软件)的一个极具吸引力的选择。本文试图量化隐藏在盗版软件中的恶意软件的发生率。我们从东南亚国家的各种来源收集盗版软件样本,包括硬盘驱动器、在八个不同国家购买的光盘以及使用点对点服务的在线平台。我们的数据集共包含 750 个盗版软件样本。为了分析这些样本,我们使用了七个不同的反病毒(AV)引擎。这些反病毒引擎识别出的恶意软件被分为四类:广告软件、木马、病毒和其他杂项。我们的研究结果表明,广告软件和木马是最常见的恶意软件类型,在盗版软件样本中的平均感染率分别为 34% 和 35%。值得注意的是,我们对反病毒软件检测性能的评估突出显示了灵敏度的差异,所有反病毒软件引擎的灵敏度最高为 132%,最低为 30%。此外,安装盗版软件后,受影响最大的操作系统设置是防火墙和用户账户控制配置。鉴于恶意软件有可能窃取信息或创建恶意后门,其在盗版软件中的高流行率给最终用户带来了巨大的安全风险。
{"title":"Unveiling the Connection Between Malware and Pirated Software in Southeast Asian Countries: A Case Study","authors":"Asif Iqbal;Muhammad Naveed Aman;Ramkumar Rejendran;Biplab Sikdar","doi":"10.1109/OJCS.2024.3364576","DOIUrl":"https://doi.org/10.1109/OJCS.2024.3364576","url":null,"abstract":"Pirated software is an attractive choice for cybercriminals seeking to spread malicious software, known as malware. This paper attempts to quantify the occurrence of malware concealed within pirated software. We collected samples of pirated software from various sources from Southeast Asian countries, including hard disk drives, optical discs purchased in eight different countries, and online platforms using peer-to-peer services. Our dataset comprises a total of 750 pirated software samples. To analyze these samples, we employed seven distinct antivirus (AV) engines. The malware identified by the AV engines was classified into four categories: adware, Trojans, viruses, and a miscellaneous category termed others. Our findings reveal that adware and Trojans are the most prevalent types of malware, with average infection rates of 34% and 35%, respectively, among our pirated software samples. Notably, our evaluation of AV detection performance highlights variations in sensitivity, ranging from a high of 132% to a low of 30% across all AV engines. Furthermore, upon installing pirated software, the most adversely affected operating system settings are the firewall and user account control configurations. Given the potential for malware to steal information or create malicious backdoors, its high prevalence within pirated software poses a substantial security risk to end users.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"62-72"},"PeriodicalIF":0.0,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10430375","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139937097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Open Journal of the Computer Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1