首页 > 最新文献

IEEE Transactions on Services Computing最新文献

英文 中文
${sf PROPHET}$PROPHET: Explainable Predictive Process Monitoring With Heterogeneous Graph Neural Networks PROPHET:利用异构图神经网络进行可解释的预测性过程监控
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463487
Vincenzo Pasquadibisceglie;Raffaele Scaringi;Annalisa Appice;Giovanna Castellano;Donato Malerba
In this article, we introduce ${sf PROPHET}$, an innovative approach to predictive process monitoring based on Heterogeneous Graph Neural Networks. ${sf PROPHET}$ is designed to strike a balance between accurate predictions and interpretability, particularly focusing on the next-activity prediction task. For this purpose, we represent the event traces recorded for different business process executions as heterogeneous graphs within a multi-view learning scheme combined with a heterogeneous graph learning approach. Using heterogeneous Graph Attention Networks (GATs), we achieve good accuracy by incorporating different characteristics of several events into graphs with different node types and leveraging different types of graph links to express relationships between event characteristics, as well as relationships between events. In addition, the use of a GAT model enables the integration of a modified version of the GNN Explainer algorithm to add the explainable component to the predictive model. In particular, the GNN Explainer algorithm is modified to disclose explainable information related to characteristics, events and relationships between events that mainly influenced the prediction. Experiments with various benchmark event logs prove the accuracy of ${sf PROPHET}$ compared to several current state-of-the-art methods and draw insights from explanations recovered through the GNN Explainer algorithm.
在本文中,我们介绍了一种基于异构图神经网络的预测过程监控的创新方法${sf PROPHET}$。${sf PROPHET}$旨在在准确预测和可解释性之间取得平衡,特别是专注于下一个活动预测任务。为此,我们将为不同业务流程执行记录的事件跟踪表示为与异构图学习方法相结合的多视图学习方案中的异构图。使用异构图注意网络(GATs),我们通过将多个事件的不同特征合并到具有不同节点类型的图中,并利用不同类型的图链接来表达事件特征之间的关系以及事件之间的关系,从而获得了良好的准确性。此外,使用GAT模型可以集成修改版本的GNN解释器算法,从而将可解释组件添加到预测模型中。特别是,修改了GNN Explainer算法,以披露与主要影响预测的特征、事件和事件之间关系相关的可解释信息。与当前几种最先进的方法相比,使用各种基准事件日志进行的实验证明了${sf PROPHET}$的准确性,并从通过GNN解释器算法恢复的解释中获得见解。
{"title":"${sf PROPHET}$PROPHET: Explainable Predictive Process Monitoring With Heterogeneous Graph Neural Networks","authors":"Vincenzo Pasquadibisceglie;Raffaele Scaringi;Annalisa Appice;Giovanna Castellano;Donato Malerba","doi":"10.1109/TSC.2024.3463487","DOIUrl":"10.1109/TSC.2024.3463487","url":null,"abstract":"In this article, we introduce \u0000<inline-formula><tex-math>${sf PROPHET}$</tex-math></inline-formula>\u0000, an innovative approach to predictive process monitoring based on Heterogeneous Graph Neural Networks. \u0000<inline-formula><tex-math>${sf PROPHET}$</tex-math></inline-formula>\u0000 is designed to strike a balance between accurate predictions and interpretability, particularly focusing on the next-activity prediction task. For this purpose, we represent the event traces recorded for different business process executions as heterogeneous graphs within a multi-view learning scheme combined with a heterogeneous graph learning approach. Using heterogeneous Graph Attention Networks (GATs), we achieve good accuracy by incorporating different characteristics of several events into graphs with different node types and leveraging different types of graph links to express relationships between event characteristics, as well as relationships between events. In addition, the use of a GAT model enables the integration of a modified version of the GNN Explainer algorithm to add the explainable component to the predictive model. In particular, the GNN Explainer algorithm is modified to disclose explainable information related to characteristics, events and relationships between events that mainly influenced the prediction. Experiments with various benchmark event logs prove the accuracy of \u0000<inline-formula><tex-math>${sf PROPHET}$</tex-math></inline-formula>\u0000 compared to several current state-of-the-art methods and draw insights from explanations recovered through the GNN Explainer algorithm.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"4111-4124"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10684096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GDI: A Novel IoT Device Identification Framework via Graph Neural Network-Based Tensor Completion GDI:通过基于图神经网络的张量完成的新型物联网设备识别框架
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463496
Haoxuan Wang;Kun Xie;Xin Wang;Jigang Wen;Ruotian Xie;Zulong Diao;Wei Liang;Gaogang Xie;Jiannong Cao
Accurately identifying IoT device types is crucial for IoT security and resource management. However, existing traffic-based device identification algorithms incur high measurement, storage, and computation costs, as they continuously need to capture, store, and parse device traffic. To overcome these challenges, we propose an innovative framework that employs a discontinuous traffic measurement strategy, reducing the number of packets captured, stored, and parsed. To ensure accurate identification, we introduce several novel techniques. First, we propose a graph neural network-based tensor completion model to estimate missing traffic features in unmeasured time slots. Our model can utilize historical information to flexibly and efficiently estimate missing features. Second, we propose a convolutional neural network-based classifier for device identification. The classifier utilizes traffic features and node embeddings learned from the tensor completion model to achieve precise device identification. Through extensive experiments on real IoT traffic traces, we demonstrate that our framework achieves high accuracy while significantly reducing costs. For instance, by capturing only 30% of the packets, our framework can identify devices with a high accuracy of 0.9558. Moreover, compared to current tensor completion methods, our method can estimate missing values with higher accuracy and achieve a 1.53-fold speedup over the next-fastest baseline.
准确识别物联网设备类型对于物联网安全和资源管理至关重要。但是,现有的基于流量的设备识别算法需要不断地捕获、存储和解析设备流量,因此产生了很高的测量、存储和计算成本。为了克服这些挑战,我们提出了一个采用不连续流量测量策略的创新框架,减少了捕获、存储和解析的数据包数量。为了保证准确的识别,我们引入了一些新的技术。首先,我们提出了一种基于图神经网络的张量补全模型来估计未测量时隙中缺失的交通特征。该模型可以利用历史信息灵活有效地估计缺失特征。其次,我们提出了一种基于卷积神经网络的设备识别分类器。该分类器利用从张量补全模型中学习到的流量特征和节点嵌入来实现精确的设备识别。通过对真实物联网流量轨迹的广泛实验,我们证明了我们的框架在显著降低成本的同时实现了高精度。例如,通过仅捕获30%的数据包,我们的框架可以以0.9558的高精度识别设备。此外,与目前的张量补全方法相比,我们的方法可以以更高的精度估计缺失值,并且比次快的基线实现1.53倍的加速。
{"title":"GDI: A Novel IoT Device Identification Framework via Graph Neural Network-Based Tensor Completion","authors":"Haoxuan Wang;Kun Xie;Xin Wang;Jigang Wen;Ruotian Xie;Zulong Diao;Wei Liang;Gaogang Xie;Jiannong Cao","doi":"10.1109/TSC.2024.3463496","DOIUrl":"10.1109/TSC.2024.3463496","url":null,"abstract":"Accurately identifying IoT device types is crucial for IoT security and resource management. However, existing traffic-based device identification algorithms incur high measurement, storage, and computation costs, as they continuously need to capture, store, and parse device traffic. To overcome these challenges, we propose an innovative framework that employs a discontinuous traffic measurement strategy, reducing the number of packets captured, stored, and parsed. To ensure accurate identification, we introduce several novel techniques. First, we propose a graph neural network-based tensor completion model to estimate missing traffic features in unmeasured time slots. Our model can utilize historical information to flexibly and efficiently estimate missing features. Second, we propose a convolutional neural network-based classifier for device identification. The classifier utilizes traffic features and node embeddings learned from the tensor completion model to achieve precise device identification. Through extensive experiments on real IoT traffic traces, we demonstrate that our framework achieves high accuracy while significantly reducing costs. For instance, by capturing only 30% of the packets, our framework can identify devices with a high accuracy of 0.9558. Moreover, compared to current tensor completion methods, our method can estimate missing values with higher accuracy and achieve a 1.53-fold speedup over the next-fastest baseline.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3713-3726"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Trustworthy and Adaptive Execution of Business Process Choreographies 实现业务流程编排的可信和自适应执行
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463427
Amina Brahem;Tiphaine Henry;Sami Bhiri;Thomas Devogele;Nizar Messai;Yacine Sam;Walid Gaaloul
Blockchain technologies have emerged to serve as a trust basis for the monitoring and execution of business processes, particularly business process choreographies. However, dealing with changes in smart contract-enabled business processes remains an open issue. For any required modification to an existing smart contract (SC), a new version of the SC with a new address is deployed on the blockchain and stored in a contract registry. Moreover, in a choreography, a change in a partner process might affect the processes of other partners, and thus, must be propagated to partners affected by the change. In this paper, we propose an approach overcoming the limitations of SCs and allowing for the change management of blockchain-enabled declarative business process choreographies modeled as DCR graphs. Our approach allows a partner in a running blockchain-based DCR choreography instance to change its private process. A change impacting other partners is propagated to their processes in a decentralized manner using a SC. The change propagation mechanism ensures the compatibility checks between public processes of the partners and the consistency between the private and public processes of one partner. We demonstrate the approach’s feasibility through an implemented prototype and its effectiveness via a set of evaluation tests.
区块链技术的出现是为了作为监视和执行业务流程(特别是业务流程编排)的信任基础。然而,处理支持智能合约的业务流程中的更改仍然是一个悬而未决的问题。对于现有智能合约(SC)的任何必要修改,将在区块链上部署具有新地址的新版本的SC,并存储在合约注册表中。此外,在编排中,合作伙伴流程中的更改可能会影响其他合作伙伴的流程,因此必须将更改传播给受此更改影响的合作伙伴。在本文中,我们提出了一种克服sc限制的方法,并允许将支持区块链的声明性业务流程编排建模为DCR图的变更管理。我们的方法允许基于区块链的DCR编排实例中的合作伙伴更改其私有流程。影响其他合作伙伴的更改使用SC以分散的方式传播到他们的流程中。更改传播机制确保合作伙伴的公共流程之间的兼容性检查以及一个合作伙伴的私有流程和公共流程之间的一致性。我们通过一个已实现的原型验证了该方法的可行性,并通过一组评估测试验证了其有效性。
{"title":"Towards a Trustworthy and Adaptive Execution of Business Process Choreographies","authors":"Amina Brahem;Tiphaine Henry;Sami Bhiri;Thomas Devogele;Nizar Messai;Yacine Sam;Walid Gaaloul","doi":"10.1109/TSC.2024.3463427","DOIUrl":"10.1109/TSC.2024.3463427","url":null,"abstract":"Blockchain technologies have emerged to serve as a trust basis for the monitoring and execution of business processes, particularly business process choreographies. However, dealing with changes in smart contract-enabled business processes remains an open issue. For any required modification to an existing smart contract (SC), a new version of the SC with a new address is deployed on the blockchain and stored in a contract registry. Moreover, in a choreography, a change in a partner process might affect the processes of other partners, and thus, must be propagated to partners affected by the change. In this paper, we propose an approach overcoming the limitations of SCs and allowing for the change management of blockchain-enabled declarative business process choreographies modeled as DCR graphs. Our approach allows a partner in a running blockchain-based DCR choreography instance to change its private process. A change impacting other partners is propagated to their processes in a decentralized manner using a SC. The change propagation mechanism ensures the compatibility checks between public processes of the partners and the consistency between the private and public processes of one partner. We demonstrate the approach’s feasibility through an implemented prototype and its effectiveness via a set of evaluation tests.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"4383-4396"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Serving DNN Inference With Fine-Grained Spatio-Temporal Sharing of GPU Servers 利用细粒度时空共享 GPU 服务器为 DNN 推理提供服务
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463429
Yaqiong Peng;Weiguo Gao;Haocheng Peng
Deep Neural Networks (DNNs) are commonly deployed as online inference services. To meet interactive latency requirements of requests, DNN services require the use of Graphics Processing Unit (GPU) to improve their responsiveness. The unique characteristics of inference workloads pose new challenges to manage GPU resources. First, the GPU scheduler needs to carefully manage requests to meet their latency targets. Second, a single inference task often underutilizes GPU resources. Third, the fluctuating patterns of inference workloads pose difficulties in determining the resources allocated to each DNN model. Therefore, it is critical for the GPU scheduler to maximize GPU utilization by collocating multiple DNN models without violating the latency Service-Level Objectives (SLOs) of requests. However, we find that existing works are not adequate for achieving this goal among latency-sensitive inference tasks. Hence, we propose FineST, a scheduling framework for serving DNNs with fine-grained spatio-temporal sharing of GPU inference servers. To maximize GPU utilization, FineST allocates intra-GPU computing resources from both spatial and temporal dimensions across DNNs in a cost-effective way, while predicting interference overheads under diverse consolidated executions for controlling SLO violation rates. Compared to a state-of-the-art work, FineST improves the peak throughput of serving heterogeneous DNNsby up to 64.7% under SLO constraints.
深度神经网络(dnn)通常被部署为在线推理服务。为了满足请求的交互延迟需求,DNN服务需要使用图形处理单元(GPU)来提高响应速度。推理工作负载的独特特性对GPU资源的管理提出了新的挑战。首先,GPU调度器需要仔细管理请求以满足其延迟目标。其次,单个推理任务往往未充分利用GPU资源。第三,推理工作负载的波动模式给确定分配给每个DNN模型的资源带来了困难。因此,对于GPU调度器来说,通过配置多个DNN模型而不违反请求的延迟服务水平目标(slo)来最大化GPU利用率是至关重要的。然而,我们发现现有的工作不足以在延迟敏感的推理任务中实现这一目标。因此,我们提出了FineST,这是一个调度框架,用于为dnn提供GPU推理服务器的细粒度时空共享。为了最大限度地提高GPU利用率,FineST以经济有效的方式从空间和时间维度分配GPU内部计算资源,同时预测不同合并执行下的干扰开销,以控制SLO违规率。与最先进的工作相比,FineST在SLO约束下将异构dnnsserver的峰值吞吐量提高了64.7%。
{"title":"Serving DNN Inference With Fine-Grained Spatio-Temporal Sharing of GPU Servers","authors":"Yaqiong Peng;Weiguo Gao;Haocheng Peng","doi":"10.1109/TSC.2024.3463429","DOIUrl":"10.1109/TSC.2024.3463429","url":null,"abstract":"<italic>Deep Neural Networks</i>\u0000 (DNNs) are commonly deployed as online inference services. To meet interactive latency requirements of requests, DNN services require the use of \u0000<italic>Graphics Processing Unit</i>\u0000 (GPU) to improve their responsiveness. The unique characteristics of inference workloads pose new challenges to manage GPU resources. First, the GPU scheduler needs to carefully manage requests to meet their latency targets. Second, a single inference task often underutilizes GPU resources. Third, the fluctuating patterns of inference workloads pose difficulties in determining the resources allocated to each DNN model. Therefore, it is critical for the GPU scheduler to maximize GPU utilization by collocating multiple DNN models without violating the latency \u0000<italic>Service-Level Objectives</i>\u0000 (SLOs) of requests. However, we find that existing works are not adequate for achieving this goal among latency-sensitive inference tasks. Hence, we propose FineST, a scheduling framework for serving DNNs with fine-grained spatio-temporal sharing of GPU inference servers. To maximize GPU utilization, FineST allocates intra-GPU computing resources from both spatial and temporal dimensions across DNNs in a cost-effective way, while predicting interference overheads under diverse consolidated executions for controlling SLO violation rates. Compared to a state-of-the-art work, FineST improves the peak throughput of serving heterogeneous DNNsby up to 64.7% under SLO constraints.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"4310-4323"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Security Analysis Methods of Smart Contracts 智能合约安全分析方法调查
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463394
Huijuan Zhu;Lei Yang;Liangmin Wang;Victor S. Sheng
Smart contracts have gained extensive adoption across diverse industries, including finance, supply chain, and the Internet of Things. Nevertheless, the surge in security incidents of smart contracts over recent years has led to substantial economic losses. Therefore, ensuring the security of smart contracts has become a critical and complex challenge in both academic and industrial domains. Based on 539 real-world security incidents in the Ethereum platform and audit reports from 10 authoritative auditing institutions, we summarize 27 types of exploited security vulnerabilities and draw insights into their principles, typical cases, relevant research and recommended prevention strategies. Besides, we also gather 7 other potentially threatening vulnerability types as supplements. On this basis, we conduct an in-depth analysis of the root causes of vulnerabilities and further formulate eight safety practical rules. Moreover, we perform a comprehensive review of 178 recent papers on smart contract security analysis, classifying detection methods into formal verification, fuzz testing, machine learning, program analysis, and others. For each category, we seize the specific detection tools and analyze them comprehensively. Then, we conduct an extensive analysis and synthesis from various angles, presenting a comprehensive overview of the current research landscape in smart contract security detection. We also discuss current on-chain and off-chain repair methods. Finally, this review outlines major challenges and highlights potential areas for future research in this field.
智能合约在金融、供应链和物联网等多个行业得到了广泛采用。然而,近年来智能合约安全事件激增,造成了巨大的经济损失。因此,确保智能合约的安全性已成为学术和工业领域的一个关键而复杂的挑战。基于以太坊平台539起真实安全事件和10家权威审计机构的审计报告,我们总结了27种被利用的安全漏洞类型,并对其原理、典型案例、相关研究和建议的防范策略进行了深入了解。此外,我们还收集了其他7种潜在威胁的漏洞类型作为补充。在此基础上,我们深入分析了漏洞产生的根源,并进一步制定了8条安全实践规则。此外,我们对最近关于智能合约安全分析的178篇论文进行了全面回顾,将检测方法分为形式验证、模糊测试、机器学习、程序分析等。对于每个类别,我们都抓住具体的检测工具,并对其进行综合分析。然后,我们从各个角度进行了广泛的分析和综合,全面概述了当前智能合约安全检测的研究格局。我们还讨论了当前的链上和链外修复方法。最后,本文概述了该领域未来研究的主要挑战和潜在领域。
{"title":"A Survey on Security Analysis Methods of Smart Contracts","authors":"Huijuan Zhu;Lei Yang;Liangmin Wang;Victor S. Sheng","doi":"10.1109/TSC.2024.3463394","DOIUrl":"10.1109/TSC.2024.3463394","url":null,"abstract":"Smart contracts have gained extensive adoption across diverse industries, including finance, supply chain, and the Internet of Things. Nevertheless, the surge in security incidents of smart contracts over recent years has led to substantial economic losses. Therefore, ensuring the security of smart contracts has become a critical and complex challenge in both academic and industrial domains. Based on 539 real-world security incidents in the Ethereum platform and audit reports from 10 authoritative auditing institutions, we summarize 27 types of exploited security vulnerabilities and draw insights into their principles, typical cases, relevant research and recommended prevention strategies. Besides, we also gather 7 other potentially threatening vulnerability types as supplements. On this basis, we conduct an in-depth analysis of the root causes of vulnerabilities and further formulate eight safety practical rules. Moreover, we perform a comprehensive review of 178 recent papers on smart contract security analysis, classifying detection methods into formal verification, fuzz testing, machine learning, program analysis, and others. For each category, we seize the specific detection tools and analyze them comprehensively. Then, we conduct an extensive analysis and synthesis from various angles, presenting a comprehensive overview of the current research landscape in smart contract security detection. We also discuss current on-chain and off-chain repair methods. Finally, this review outlines major challenges and highlights potential areas for future research in this field.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"4522-4539"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud 通过云实现可审计和保护隐私的在线医疗诊断服务
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463431
Xinzhe Zhang;Lei Wu;Zhien Liu;Hao Wang;Lijuan Xu;Songnian Zhang;Rongxing Lu
While online medical diagnosis provides significant convenience to users, it also incurs the risk of privacy breaches, which inspired the emergence of various privacy-preserving online medical schemes. Nonetheless, existing schemes either compromise partial privacy to third parties or rely on cryptographic methods with high computational complexity. In particular, they do not anticipate user’s disputes to the extent that there is no audit process to guarantee the correctness of the diagnosis results and the fairness of the schemes. Consequently, we propose an efficient and privacy-preserving online medical diagnosis scheme based on additive secret sharing (ASS). First, the anonymity of the user is provided in the medical diagnosis process, which ensures that the cloud cannot link the diagnosis results to the user. Then, we devise a minimum value protocol and a range comparison protocol to enhance the security of the online diagnosis. In addition, considering user’s disputes that arise in realistic scenarios (e.g., malicious users may cheat the diagnosis system for personal benefits), we construct a blockchain-based audit process to detect user’s behaviors and settle controversies. Finally, we demonstrate the security and efficiency of the proposed scheme with theoretical analysis and experimental evaluation.
在线医疗诊断在为用户提供极大便利的同时,也带来了隐私泄露的风险,这激发了各种保护隐私的在线医疗方案的出现。然而,现有的方案要么将部分隐私泄露给第三方,要么依赖于具有高计算复杂度的加密方法。特别是,它们没有预料到用户的争议,以至于没有审计过程来保证诊断结果的正确性和方案的公平性。因此,我们提出了一种基于加性秘密共享(ASS)的高效且隐私保护的在线医疗诊断方案。首先,在医疗诊断过程中提供了用户的匿名性,保证了云无法将诊断结果与用户联系起来。然后,我们设计了最小值协议和范围比较协议来提高在线诊断的安全性。此外,考虑到用户在现实场景中出现的争议(例如,恶意用户可能为了个人利益欺骗诊断系统),我们构建了基于区块链的审计流程,以检测用户的行为并解决争议。最后,通过理论分析和实验验证了该方案的安全性和有效性。
{"title":"Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud","authors":"Xinzhe Zhang;Lei Wu;Zhien Liu;Hao Wang;Lijuan Xu;Songnian Zhang;Rongxing Lu","doi":"10.1109/TSC.2024.3463431","DOIUrl":"10.1109/TSC.2024.3463431","url":null,"abstract":"While online medical diagnosis provides significant convenience to users, it also incurs the risk of privacy breaches, which inspired the emergence of various privacy-preserving online medical schemes. Nonetheless, existing schemes either compromise partial privacy to third parties or rely on cryptographic methods with high computational complexity. In particular, they do not anticipate user’s disputes to the extent that there is no audit process to guarantee the correctness of the diagnosis results and the fairness of the schemes. Consequently, we propose an efficient and privacy-preserving online medical diagnosis scheme based on additive secret sharing (ASS). First, the anonymity of the user is provided in the medical diagnosis process, which ensures that the cloud cannot link the diagnosis results to the user. Then, we devise a minimum value protocol and a range comparison protocol to enhance the security of the online diagnosis. In addition, considering user’s disputes that arise in realistic scenarios (e.g., malicious users may cheat the diagnosis system for personal benefits), we construct a blockchain-based audit process to detect user’s behaviors and settle controversies. Finally, we demonstrate the security and efficiency of the proposed scheme with theoretical analysis and experimental evaluation.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"4397-4410"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Real-Time Task Assignment for Mobile Crowdsourcing in Opportunistic Networks 为机会网络中的移动众包建立实时任务分配模型
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463419
Haruumi Imamura;Kazuya Sakai;Min-Te Sun;Wei-Shinn Ku;Jie Wu
Opportunistic network-based mobile crowdsourcing (MCS) outsources location-based human tasks to a crowd of workers, where workers with mobile devices opportunistically have contact with the server. While a number of task assignment algorithms have been proposed for different objectives, real-timeness is not considered. In this article, we are interested in real-time MCS (RT-MCS), in which tasks can be generated at any time step, and task assignment is performed in real-time. We first model an abstract RT-MCS and then instantiate the real-time task assignment problem for opportunistic network-based RT-MCS. A generic real-time task assignment (RTA) algorithm is designed based on the principle of the greedy approach, where each task is assigned to the best worker with the highest expected completion probability. To understand the fundamental performance issues, we formulate closed-form solutions for task completion probability as well as delay. In addition, we identify the critical condition that illuminates the busy state and the not-busy state of an RT-MCS. Furthermore, the analytical and simulation results demonstrate that our analysis yields close approximation of simulation results.
基于网络的机会性移动众包(MCS)将基于位置的人工任务外包给一群工作人员,其中拥有移动设备的工作人员可以机会地与服务器联系。虽然针对不同的目标提出了许多任务分配算法,但没有考虑实时性。在本文中,我们对实时MCS (RT-MCS)感兴趣,在实时MCS中,可以在任何时间步长生成任务,并且实时执行任务分配。首先建立了一个抽象的RT-MCS模型,然后实例化了基于机会网络的RT-MCS的实时任务分配问题。基于贪心算法的原理,设计了一种通用的实时任务分配算法,将每个任务分配给期望完成概率最高的最佳工人。为了理解基本的性能问题,我们制定了任务完成概率和延迟的封闭形式的解决方案。此外,我们还确定了反映RT-MCS繁忙状态和非繁忙状态的临界条件。此外,分析和仿真结果表明,我们的分析与仿真结果非常接近。
{"title":"Modeling Real-Time Task Assignment for Mobile Crowdsourcing in Opportunistic Networks","authors":"Haruumi Imamura;Kazuya Sakai;Min-Te Sun;Wei-Shinn Ku;Jie Wu","doi":"10.1109/TSC.2024.3463419","DOIUrl":"10.1109/TSC.2024.3463419","url":null,"abstract":"Opportunistic network-based mobile crowdsourcing (MCS) outsources location-based human tasks to a crowd of workers, where workers with mobile devices opportunistically have contact with the server. While a number of task assignment algorithms have been proposed for different objectives, real-timeness is not considered. In this article, we are interested in real-time MCS (RT-MCS), in which tasks can be generated at any time step, and task assignment is performed in real-time. We first model an abstract RT-MCS and then instantiate the real-time task assignment problem for opportunistic network-based RT-MCS. A generic real-time task assignment (RTA) algorithm is designed based on the principle of the greedy approach, where each task is assigned to the best worker with the highest expected completion probability. To understand the fundamental performance issues, we formulate closed-form solutions for task completion probability as well as delay. In addition, we identify the critical condition that illuminates the busy state and the not-busy state of an RT-MCS. Furthermore, the analytical and simulation results demonstrate that our analysis yields close approximation of simulation results.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3942-3955"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link Traffic-Delay Mapping Model Learning Based on Multi-Class Samples in Software-Defined Networks 基于软件定义网络多类样本的链路流量-延迟映射模型学习
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463198
Xinchang Zhang;Maoli Wang;Yuanjie Zheng;Dongjie Liu
Delays are crucial factors in the service management of networks, especially software-defined networks. Unfortunately, it is very difficult to accurately model a traffic-delay mapping without any assumptions on an uncertain network. In this article, we present a machine learning-based solution to generate a mapping between link traffic and link delay in software-defined networks. The proposed solution only requires a small number of link delay samples from the production network. The small number of link delay samples is not sufficient for learning link traffic-delay mapping. To solve the above problem, we extend the link delay-related data via a sample transfer method and a distributed path delay data collection method without the assistance of the controller. We design a link traffic-delay mapping learning solution using the above three classes of data. This solution uses a traffic segment-based statistical mechanism to deduce the mean link delay effectively from the collected path delay information and implements effective sample transfer via a distance-based approximation. On the basis of specially designed deep learning structures and training procedures, the proposed learning solution effectively builds traffic-delay mapping models using the samples transferred from an experimental network and the samples of the production network.
延迟是网络服务管理的关键因素,尤其是软件定义网络。不幸的是,在不确定网络上,不做任何假设的情况下,很难准确地建立交通延迟映射模型。在本文中,我们提出了一种基于机器学习的解决方案来生成软件定义网络中链路流量和链路延迟之间的映射。提出的解决方案只需要从生产网络中获取少量的链路延迟样本。链路延迟样本数量少,不足以学习链路流量-延迟映射。为了解决上述问题,我们在没有控制器辅助的情况下,通过样本传输方法和分布式路径延迟数据采集方法扩展链路延迟相关数据。我们利用以上三类数据设计了一个链路交通延迟映射学习方案。该解决方案使用基于流量段的统计机制,从收集到的路径延迟信息中有效地推断出平均链路延迟,并通过基于距离的近似实现有效的样本传输。在特殊设计的深度学习结构和训练过程的基础上,该学习方案利用实验网络和生产网络的样本有效地构建交通延迟映射模型。
{"title":"Link Traffic-Delay Mapping Model Learning Based on Multi-Class Samples in Software-Defined Networks","authors":"Xinchang Zhang;Maoli Wang;Yuanjie Zheng;Dongjie Liu","doi":"10.1109/TSC.2024.3463198","DOIUrl":"10.1109/TSC.2024.3463198","url":null,"abstract":"Delays are crucial factors in the service management of networks, especially software-defined networks. Unfortunately, it is very difficult to accurately model a traffic-delay mapping without any assumptions on an uncertain network. In this article, we present a machine learning-based solution to generate a mapping between link traffic and link delay in software-defined networks. The proposed solution only requires a small number of link delay samples from the production network. The small number of link delay samples is not sufficient for learning link traffic-delay mapping. To solve the above problem, we extend the link delay-related data via a sample transfer method and a distributed path delay data collection method without the assistance of the controller. We design a link traffic-delay mapping learning solution using the above three classes of data. This solution uses a traffic segment-based statistical mechanism to deduce the mean link delay effectively from the collected path delay information and implements effective sample transfer via a distance-based approximation. On the basis of specially designed deep learning structures and training procedures, the proposed learning solution effectively builds traffic-delay mapping models using the samples transferred from an experimental network and the samples of the production network.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3869-3886"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-Network Computing Empowered Mobile Edge Offloading Architecture for Internet of Things 面向物联网的网内计算移动边缘卸载架构
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463475
Di Wu;Zunliang Wang;Huijiang Pan;Haipeng Yao;Tianle Mai;Song Guo
In recent years, the rapid growth of Internet of Things (IoT) devices and applications has posed significant challenges for existing Mobile Edge Computing (MEC) architectures. The inherent latency uncertainties in MEC architectures make it difficult to support latency-sensitive applications such as autonomous vehicles. Additionally, the increasing number of connected devices has led to substantial challenges in terms of limited throughput for MEC servers. With the recent advancements in programmable network hardware, such as SmartNICs and programmable switches, the Network-based Computing (NBC) paradigm has gained widespread attention. Leveraging line-rate processing capabilities, NBC offers a promising solution for high throughput and low latency processing. This paper aims to explore the potential benefits and challenges of incorporating NBC into existing MEC architectures. The feasibility of our proposed architecture is evaluated using two use cases, Linear Quadratic Regulator (LQR) control and Complex Event Processing (CEP), demonstrating significant improvements in latency performance.
近年来,物联网(IoT)设备和应用的快速增长对现有的移动边缘计算(MEC)架构提出了重大挑战。MEC架构中固有的延迟不确定性使得它难以支持自动驾驶汽车等对延迟敏感的应用。此外,连接设备数量的增加导致了MEC服务器有限吞吐量方面的重大挑战。随着最近可编程网络硬件(如smartnic和可编程交换机)的进步,基于网络的计算(network -based Computing, NBC)范式得到了广泛的关注。利用线速率处理能力,NBC为高吞吐量和低延迟处理提供了一个很有前途的解决方案。本文旨在探讨将NBC整合到现有MEC架构中的潜在好处和挑战。我们提出的架构的可行性使用两个用例进行了评估,线性二次调节器(LQR)控制和复杂事件处理(CEP),显示了延迟性能的显着改善。
{"title":"In-Network Computing Empowered Mobile Edge Offloading Architecture for Internet of Things","authors":"Di Wu;Zunliang Wang;Huijiang Pan;Haipeng Yao;Tianle Mai;Song Guo","doi":"10.1109/TSC.2024.3463475","DOIUrl":"10.1109/TSC.2024.3463475","url":null,"abstract":"In recent years, the rapid growth of Internet of Things (IoT) devices and applications has posed significant challenges for existing Mobile Edge Computing (MEC) architectures. The inherent latency uncertainties in MEC architectures make it difficult to support latency-sensitive applications such as autonomous vehicles. Additionally, the increasing number of connected devices has led to substantial challenges in terms of limited throughput for MEC servers. With the recent advancements in programmable network hardware, such as SmartNICs and programmable switches, the Network-based Computing (NBC) paradigm has gained widespread attention. Leveraging line-rate processing capabilities, NBC offers a promising solution for high throughput and low latency processing. This paper aims to explore the potential benefits and challenges of incorporating NBC into existing MEC architectures. The feasibility of our proposed architecture is evaluated using two use cases, Linear Quadratic Regulator (LQR) control and Complex Event Processing (CEP), demonstrating significant improvements in latency performance.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3817-3829"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service Workflow Activity Input/Output Parameters Recommendation Method by Combining Transformer and Weighted HITS 结合变换器和加权 HITS 的服务工作流程活动输入/输出参数推荐方法
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1109/TSC.2024.3463425
Yuanyuan Zhou;Zhijun Ding;Changjun Jiang
Each activity in the service workflow interacts with services as required to meet complex business needs and quickly adapt to market changes. The design of each activity's input/output interface parameters influences whether it can successfully map to appropriate and interactive services. In practice, suitable activity interface parameters should possess 3-features: $realism$, $relevance$, and $compatibility$, as popular parameters originating from the real world and closely related to activity semantics are apt to match user-expected services. However, existing research requires expert specification or ontology-based inference, resulting in outdated, inconsistent parameters that lack necessary elements, making it challenging to match expected services. Therefore, we propose an automated method combining Transformer and weighted HITS to recommend interface parameters with 3-features on activity function requirement. It filters similar Endpoints (EPs) based on the activity's semantics by supervised Transformer-based learning of multi-domain APIs and unsupervised EPs matching. Next, a node-weighted heterogeneous graph is built based on similar EPs and their interface parameter relationships. We then apply a node-weighted HITS to explore mutual gain relationships within the graph and calculate parameter compatibilities. Finally, a top-$k$ non-redundant compatible parameter list and corresponding different formats are recommended for the activity. The method's effectiveness and efficiency are verified using a real API service dataset from RapidAPI.
服务工作流中的每个活动根据需要与服务交互,以满足复杂的业务需求并快速适应市场变化。每个活动的输入/输出接口参数的设计会影响它是否能够成功地映射到适当的交互式服务。在实践中,合适的活动接口参数应该具备3个特征:$现实性$、$相关性$和$兼容性$,因为流行的参数来源于现实世界,与活动语义密切相关,容易匹配用户期望的服务。然而,现有的研究需要专家规范或基于本体的推理,导致过时、不一致的参数缺乏必要的元素,使其难以匹配预期的服务。因此,我们提出了一种结合Transformer和加权HITS的自动化方法来推荐具有3个特征的活动功能需求接口参数。它通过对多域api的监督式学习和无监督式端点匹配来过滤基于活动语义的相似端点(EPs)。其次,基于相似EPs及其接口参数关系构建节点加权异构图;然后,我们应用节点加权HITS来探索图中的互增益关系并计算参数兼容性。最后,为该活动推荐了一个top-$k$非冗余兼容参数表和相应的不同格式。通过RapidAPI提供的API服务数据集验证了该方法的有效性和高效性。
{"title":"Service Workflow Activity Input/Output Parameters Recommendation Method by Combining Transformer and Weighted HITS","authors":"Yuanyuan Zhou;Zhijun Ding;Changjun Jiang","doi":"10.1109/TSC.2024.3463425","DOIUrl":"10.1109/TSC.2024.3463425","url":null,"abstract":"Each activity in the service workflow interacts with services as required to meet complex business needs and quickly adapt to market changes. The design of each activity's input/output interface parameters influences whether it can successfully map to appropriate and interactive services. In practice, suitable activity interface parameters should possess 3-features: \u0000<inline-formula><tex-math>$realism$</tex-math></inline-formula>\u0000, \u0000<inline-formula><tex-math>$relevance$</tex-math></inline-formula>\u0000, and \u0000<inline-formula><tex-math>$compatibility$</tex-math></inline-formula>\u0000, as popular parameters originating from the real world and closely related to activity semantics are apt to match user-expected services. However, existing research requires expert specification or ontology-based inference, resulting in outdated, inconsistent parameters that lack necessary elements, making it challenging to match expected services. Therefore, we propose an automated method combining Transformer and weighted HITS to recommend interface parameters with 3-features on activity function requirement. It filters similar Endpoints (EPs) based on the activity's semantics by supervised Transformer-based learning of multi-domain APIs and unsupervised EPs matching. Next, a node-weighted heterogeneous graph is built based on similar EPs and their interface parameter relationships. We then apply a node-weighted HITS to explore mutual gain relationships within the graph and calculate parameter compatibilities. Finally, a top-\u0000<inline-formula><tex-math>$k$</tex-math></inline-formula>\u0000 non-redundant compatible parameter list and corresponding different formats are recommended for the activity. The method's effectiveness and efficiency are verified using a real API service dataset from RapidAPI.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"4296-4309"},"PeriodicalIF":5.5,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Services Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1