Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072644
Shengjun Ren, Siyang Han, Baoshuai Wang
Using millimeter-wave radar to scan and detect stationary and small foreign object debris (FOD) on an airport runway surface is a popular solution in civil aviation safety. In this paper, we proposed a novel FOD detection method based on pattern classification theory using bi-spectral features. Firstly, a non-parameter weighted generalized matched filtering (WGMF) is utilized to accomplish clutter suppression with low false alarm rate. Then low dimensional bi-spectral features are extracted from radar returns which are utilized to form the feature vector. Finally, support vector data description (SVDD) is used to accomplish FOD detection. Real airport data measured by 77GHz radar are used to validate the proposed method. Experimental results using a golf ball with a diameter of 43mm show that the proposed method can effectively detect the target with low false alarm rate.
{"title":"Stationary and Small Target Detection for Millimeter-Wave Radar","authors":"Shengjun Ren, Siyang Han, Baoshuai Wang","doi":"10.1109/ICCT56141.2022.10072644","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072644","url":null,"abstract":"Using millimeter-wave radar to scan and detect stationary and small foreign object debris (FOD) on an airport runway surface is a popular solution in civil aviation safety. In this paper, we proposed a novel FOD detection method based on pattern classification theory using bi-spectral features. Firstly, a non-parameter weighted generalized matched filtering (WGMF) is utilized to accomplish clutter suppression with low false alarm rate. Then low dimensional bi-spectral features are extracted from radar returns which are utilized to form the feature vector. Finally, support vector data description (SVDD) is used to accomplish FOD detection. Real airport data measured by 77GHz radar are used to validate the proposed method. Experimental results using a golf ball with a diameter of 43mm show that the proposed method can effectively detect the target with low false alarm rate.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The security protection of mobile Internet of Things (IoT) is becoming increasingly important. In the traditional Single Package Authorization (SPA) protocol, the authenticity of the terminal cannot be proved. This paper propose a Combined Public Key (CPK) and zero-trust based architecture to protect mobile IoT from identity forgery attacks. Specifically, we adopt an enhanced SPA protocol based on CPK, where the CPK matrix merges of multi-dimensional information about users, devices, events and time. In this way, every event is encrypted. Besides, through adopting CPK, the deficiency of subject authenticity proof in SPA can be compensated. Experiments verify the efficiency and validity of the proposed CPK-based SPA authentication method in comparison with the state-of-the-art SPA protocol.
{"title":"Enhanced Mobile IoT Security Protection Method Based on CPK and Zero Trust","authors":"Zi-Xiao Jia, Wei Wu, Zhe Jia, Xiaopeng Yang, Qiang Wang, Hao Li","doi":"10.1109/ICCT56141.2022.10073095","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073095","url":null,"abstract":"The security protection of mobile Internet of Things (IoT) is becoming increasingly important. In the traditional Single Package Authorization (SPA) protocol, the authenticity of the terminal cannot be proved. This paper propose a Combined Public Key (CPK) and zero-trust based architecture to protect mobile IoT from identity forgery attacks. Specifically, we adopt an enhanced SPA protocol based on CPK, where the CPK matrix merges of multi-dimensional information about users, devices, events and time. In this way, every event is encrypted. Besides, through adopting CPK, the deficiency of subject authenticity proof in SPA can be compensated. Experiments verify the efficiency and validity of the proposed CPK-based SPA authentication method in comparison with the state-of-the-art SPA protocol.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"12 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131126860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072913
Kun Zhang, Shengrong Zhang, Jun‐ming Huang, Chong Shen
With the development of economy and military in today's era, more and more fields have higher and higher requirements for the positioning accuracy of underwater vehicles. However, so far, the main way of underwater positioning still depends on the underwater acoustic positioning method under the background of geometric principle. At the same time, according to the size of different receiving acoustic array, it can be divided into the following three categories: long baseline positioning technology (LBL), short baseline positioning technology (SBL) and ultra short baseline positioning technology (USBL). The positioning system used in this paper is based on the long baseline positioning system.
{"title":"Research on Trajectory Smoothing Optimization Algorithm of Underwater Long Baseline Positioning System","authors":"Kun Zhang, Shengrong Zhang, Jun‐ming Huang, Chong Shen","doi":"10.1109/ICCT56141.2022.10072913","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072913","url":null,"abstract":"With the development of economy and military in today's era, more and more fields have higher and higher requirements for the positioning accuracy of underwater vehicles. However, so far, the main way of underwater positioning still depends on the underwater acoustic positioning method under the background of geometric principle. At the same time, according to the size of different receiving acoustic array, it can be divided into the following three categories: long baseline positioning technology (LBL), short baseline positioning technology (SBL) and ultra short baseline positioning technology (USBL). The positioning system used in this paper is based on the long baseline positioning system.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073185
Yongqiang Cheng, Xiaoqiang Hua, Hao Wu, Hongqiang Wang
The locally most powerful (LMP) test for weak signal detection is studied from a information-geometric perspective. In such a framework, the LMP test is identified as the norm of natural whitened gradient on the statistical manifold consisting of a family of parametric probability distributions, which indicates that the LMP test pursues the steepest learning directions from the null hypothesis to the empirical distribution of the observed data on the manifold. A concrete geometrical interpretation of the LMP test in the theory of information geometry is presented, which leads to an immediate extension of the LMP test to a vector valued parameter case. Example of multi-component sinusoidal signal detection under low SNR conditions confirms a practical importance of the extended test.
{"title":"Information Geometry of the Locally Most Powerful Test","authors":"Yongqiang Cheng, Xiaoqiang Hua, Hao Wu, Hongqiang Wang","doi":"10.1109/ICCT56141.2022.10073185","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073185","url":null,"abstract":"The locally most powerful (LMP) test for weak signal detection is studied from a information-geometric perspective. In such a framework, the LMP test is identified as the norm of natural whitened gradient on the statistical manifold consisting of a family of parametric probability distributions, which indicates that the LMP test pursues the steepest learning directions from the null hypothesis to the empirical distribution of the observed data on the manifold. A concrete geometrical interpretation of the LMP test in the theory of information geometry is presented, which leads to an immediate extension of the LMP test to a vector valued parameter case. Example of multi-component sinusoidal signal detection under low SNR conditions confirms a practical importance of the extended test.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073375
Xiaohong Nie, Chao Yang, Lina Wang, Jing Zhang, Lin Zheng
With the increasement of frequency band and platform mobility, communication system faces more severe time-frequency double dispersion influence. Folded chirp-rate shift keying (FCrSK) modulation technique has been proposed to solve communication transmission problem in high dynamic doppler channel owe to its time-frequency shift invariance. However, it dose not consider some influence of time-frequency dual selective channel (TDSC). In this paper, spectrum structure of FCrSK after dechirp will be deduced in TDSC and a decision criterion for FCrSK is designed from spectral energy concentration to utilize multipath energy. And this decision criterion is more suitable for FCrSK in TDSC than frequency domain peak to average ratio (FPAR). Besides, the system has no rely on channel state information and has better performance at high SNR in TDSC than Lora. Furthermore, it is superior to Lora in and time-varing doppler channel. So FCrSK with this criterion can provide a good way for high reliability and low latency communication in future.
{"title":"Designing of Decision Criterion on FCrSK in Time-Frequency Dual Selective Channel","authors":"Xiaohong Nie, Chao Yang, Lina Wang, Jing Zhang, Lin Zheng","doi":"10.1109/ICCT56141.2022.10073375","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073375","url":null,"abstract":"With the increasement of frequency band and platform mobility, communication system faces more severe time-frequency double dispersion influence. Folded chirp-rate shift keying (FCrSK) modulation technique has been proposed to solve communication transmission problem in high dynamic doppler channel owe to its time-frequency shift invariance. However, it dose not consider some influence of time-frequency dual selective channel (TDSC). In this paper, spectrum structure of FCrSK after dechirp will be deduced in TDSC and a decision criterion for FCrSK is designed from spectral energy concentration to utilize multipath energy. And this decision criterion is more suitable for FCrSK in TDSC than frequency domain peak to average ratio (FPAR). Besides, the system has no rely on channel state information and has better performance at high SNR in TDSC than Lora. Furthermore, it is superior to Lora in and time-varing doppler channel. So FCrSK with this criterion can provide a good way for high reliability and low latency communication in future.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131328499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072854
Zhixiang Xu, Ning Wu, Fang Zhou, Fen Ge
Persistent fault attack is a powerful attack technology to recover key information by using persistent fault and statistical methods. It can be applied to the key recovery realized by block cipher look-up table. Its biggest advantage is that the key information can be recovered only by one failure injection, and persistent fault attack can be applied to the classic block cipher protection implementation such as detection technology and mask technology. Nevertheless, the classic fault attack protection technology still improves the difficulty of persistent fault attack. The detection and infection technologies increase the number of ciphertext required to extract the correct key by a constant multiple, which will hinder the attack in the actual scene. Real time health detection of S-box is an effective means to prevent persistent fault attacks. Once the injected fault of S-box is detected, reset, restart or refuse to continue encryption. However, this defense strategy is not effective against multiple persistent fault attacks without changing the secret key. Persistent fault attack makes full use of the double mapping property of S-box, so health detection based on the double mapping property of S-box is an efficient protection method. Compared with the traditional detection method, the 255 times XOR method proposed in this paper has low cost and high efficiency, and the single byte modification of S-box after inspection can effectively mislead the encrypted data obtained by the attacker, even if this data is extremely useful to attackers. The research results of this paper show that the proposed defense scheme can effectively resist three secret key analysis strategies of persistent fault attack.
{"title":"A Defense Method Against Persistent Fault Attack","authors":"Zhixiang Xu, Ning Wu, Fang Zhou, Fen Ge","doi":"10.1109/ICCT56141.2022.10072854","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072854","url":null,"abstract":"Persistent fault attack is a powerful attack technology to recover key information by using persistent fault and statistical methods. It can be applied to the key recovery realized by block cipher look-up table. Its biggest advantage is that the key information can be recovered only by one failure injection, and persistent fault attack can be applied to the classic block cipher protection implementation such as detection technology and mask technology. Nevertheless, the classic fault attack protection technology still improves the difficulty of persistent fault attack. The detection and infection technologies increase the number of ciphertext required to extract the correct key by a constant multiple, which will hinder the attack in the actual scene. Real time health detection of S-box is an effective means to prevent persistent fault attacks. Once the injected fault of S-box is detected, reset, restart or refuse to continue encryption. However, this defense strategy is not effective against multiple persistent fault attacks without changing the secret key. Persistent fault attack makes full use of the double mapping property of S-box, so health detection based on the double mapping property of S-box is an efficient protection method. Compared with the traditional detection method, the 255 times XOR method proposed in this paper has low cost and high efficiency, and the single byte modification of S-box after inspection can effectively mislead the encrypted data obtained by the attacker, even if this data is extremely useful to attackers. The research results of this paper show that the proposed defense scheme can effectively resist three secret key analysis strategies of persistent fault attack.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115362435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072617
Zhenyu Tang, Zhang Tao, Xiaomeng Yang, Lei Qian
Aiming at the problem of the recognition accuracy degradation caused by the channel noise inconsistency between the signal of the radiation source to be identified and the trained radiation source dataset, this paper proposes an individual identification method of radiation sources based on subdomain adaptation. First, the radiation source signal is spliced into IQ images to generate a feature data set. Then the improved Resnet-50 network which has been pre-trained on the image set is utilised to extract the common characteristics of the source and target domains. Finally, the local maximum mean difference adaptive layer is added. By calculating the pseudo-labels in the target domain to match the conditional distribution distance, the difference in the characteristic distribution of sub-type radiation sources under different signal-to-noise ratio (SNR) can be reduced, and the model recognition accuracy can be improved. The experimental findings reveal that the proposed method greatly increases the accuracy of the individual radiation source identification technique based on the deep neural network. Under the condition that the SNR of the signal to be detected increases or falls by 4 dB compared to the training dataset, the identification accuracy of the approach suggested in this study improves by 11.4 percent and 12.7 percent respectively compared with the model Resnet-50.
{"title":"Individual Recognition Method of Radiation Source Based on Deep Subdomain Adaptation Network","authors":"Zhenyu Tang, Zhang Tao, Xiaomeng Yang, Lei Qian","doi":"10.1109/ICCT56141.2022.10072617","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072617","url":null,"abstract":"Aiming at the problem of the recognition accuracy degradation caused by the channel noise inconsistency between the signal of the radiation source to be identified and the trained radiation source dataset, this paper proposes an individual identification method of radiation sources based on subdomain adaptation. First, the radiation source signal is spliced into IQ images to generate a feature data set. Then the improved Resnet-50 network which has been pre-trained on the image set is utilised to extract the common characteristics of the source and target domains. Finally, the local maximum mean difference adaptive layer is added. By calculating the pseudo-labels in the target domain to match the conditional distribution distance, the difference in the characteristic distribution of sub-type radiation sources under different signal-to-noise ratio (SNR) can be reduced, and the model recognition accuracy can be improved. The experimental findings reveal that the proposed method greatly increases the accuracy of the individual radiation source identification technique based on the deep neural network. Under the condition that the SNR of the signal to be detected increases or falls by 4 dB compared to the training dataset, the identification accuracy of the approach suggested in this study improves by 11.4 percent and 12.7 percent respectively compared with the model Resnet-50.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fronthaul network is an essential way to improve the comprehensive performance of beyond fifth generation (B5G) communication network. Space-wavelength division multiplexing (SWDM) can effectively improve its capacity, and quantum key distribution technique can provide unconditional information security for it. In quantum secured SWDM B5G fronthaul network, quantum signals are affected by noises generated by classical signals, such as spontaneous Raman scattering, four-wave mixing and inter-core crosstalk. Evaluating these noises in real-time will increase the time delay of the whole network. In this paper, we propose two machine learning (ML) models (XGBoost and LightGBM) to predict these noises. Simulation results show that the ML models can reduce the noise evaluation time by up to 98.8%. Besides, the available channel predicting accuracy rate is close to 100%. The minimum noise predicting accuracy rate increases with the increasement of the channel occupancy rate and can reach 100% when channel occupancy is higher than 80%.
{"title":"Noise Prediction Based on Machine Learning in Quantum Secured SWDM B5G Fronthaul Networks","authors":"ChengLong Wang, Yongmei Sun, Weiwen Kong, Yaoxian Gao","doi":"10.1109/ICCT56141.2022.10073419","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073419","url":null,"abstract":"The fronthaul network is an essential way to improve the comprehensive performance of beyond fifth generation (B5G) communication network. Space-wavelength division multiplexing (SWDM) can effectively improve its capacity, and quantum key distribution technique can provide unconditional information security for it. In quantum secured SWDM B5G fronthaul network, quantum signals are affected by noises generated by classical signals, such as spontaneous Raman scattering, four-wave mixing and inter-core crosstalk. Evaluating these noises in real-time will increase the time delay of the whole network. In this paper, we propose two machine learning (ML) models (XGBoost and LightGBM) to predict these noises. Simulation results show that the ML models can reduce the noise evaluation time by up to 98.8%. Besides, the available channel predicting accuracy rate is close to 100%. The minimum noise predicting accuracy rate increases with the increasement of the channel occupancy rate and can reach 100% when channel occupancy is higher than 80%.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073166
ZhiJiang Chen, Lei Lei, Xiaoqin Song
In order to solve the problems of high cost, poor mobility and difficulty in coping with emergency in large-scale deployment of fixed edge computing nodes in mobile edge computing(MEC), an unmanned aerial vehicle(UAV)-assist task offloading algorithm is proposed to meet the need of computing-intensive and delay-sensitive mobile services. Considering constraints such as the flight range, flight speed of multiple UAVs and system fairness among users, the method aims to minimize the weighted sum of the average computing delay of users and the UAV's energy consumption. This non-convex and NP-hard problem is transformed into a partially observed Markov decision process, and we propose a multi-agent deep deterministic policy gradient algorithm to get optimal offloading decision and UAV flight trajectory. Simulation results show that the proposed algorithm outperforms the baseline algorithm in terms of fairness of mobile service terminals, average system delay and total energy consumption of multiple UAVs.
{"title":"Multi-agent DDPG Enpowered UAV Trajectory Optimization for Computation Task Offloading","authors":"ZhiJiang Chen, Lei Lei, Xiaoqin Song","doi":"10.1109/ICCT56141.2022.10073166","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073166","url":null,"abstract":"In order to solve the problems of high cost, poor mobility and difficulty in coping with emergency in large-scale deployment of fixed edge computing nodes in mobile edge computing(MEC), an unmanned aerial vehicle(UAV)-assist task offloading algorithm is proposed to meet the need of computing-intensive and delay-sensitive mobile services. Considering constraints such as the flight range, flight speed of multiple UAVs and system fairness among users, the method aims to minimize the weighted sum of the average computing delay of users and the UAV's energy consumption. This non-convex and NP-hard problem is transformed into a partially observed Markov decision process, and we propose a multi-agent deep deterministic policy gradient algorithm to get optimal offloading decision and UAV flight trajectory. Simulation results show that the proposed algorithm outperforms the baseline algorithm in terms of fairness of mobile service terminals, average system delay and total energy consumption of multiple UAVs.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123438516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}