With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining "endpoint" and "pipe" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.
{"title":"Research on Novel TLS Protocol Network Traffic Management and Monitoring Method","authors":"Yangyang Guan, Zhen Li, G. Xiong","doi":"10.1145/3558819.3558835","DOIUrl":"https://doi.org/10.1145/3558819.3558835","url":null,"abstract":"With the development of Internet technology, more and more websites use the novel TLS encryption technologies (such as TLS1.3, DOH, ESNI, etc.). The full encryption technology of network traffic brings great challenges to identify and prevent threats in encrypted traffic. In the face of new threat behavior, the traditional network management needs a long-term experimental process such as observation and analysis, feature extraction and online recognition. The whole process is time-consuming and labor-consuming. With the full encryption of the novel protocol, this confrontation will continue to escalate and unsustainable. This paper proposes a new idea of network management, which changes the traditional confrontation management into cooperation management, and can compromise privacy protection and network management. The main idea is to study the traffic management method combining \"endpoint\" and \"pipe\" and the novel protocol extension method. Securely transmit the secret key and data senseless decryption method through the hidden channel method to obtain the real URL access path of users. On this basis, this paper proposes and designs two traffic management methods: key acquisition and covert transmission method and TLS protocol upgrade implementation method. The first method requires the cooperation of the client. By studying the extension of the TLS protocol, we can decrypt the original traffic and realize network management; the second method requires the cooperation of the client and the server. By upgrading the handshake process and data of the TLS protocol transmission implementation, we can implement network management. On the network management side, it is necessary to decrypt and restore the network management packets, while the user request and response data cannot be decrypted. These two approaches are a novel solution idea under the popular application of novel protocols.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In response to the lack of private cloud evaluation methods used at this stage, the problem of mismatch between supply and demand for private cloud construction. A self-adaptive and scalable method for detecting the capabilities of private cloud systems is proposed. It can evaluate the capabilities of the Infrastructure as a Service (IaaS) cloud computing system. The capabilities of the Open-stack open source private cloud platform were evaluated using the proposed methods. According to the experimental results, the proposed method can accurately obtain the private cloud service capabilities, and the results are consistent with the user's actual test. This method has lower load generation cost and higher test efficiency. Comparing this method with Rally, the component that comes with Open-stack, the scalability and load dynamic simulation have been greatly improved.
{"title":"Private Cloud Platform Service Capability Test Method","authors":"Hongli Li, Haigen Yuan, Yi Wu","doi":"10.1145/3558819.3565148","DOIUrl":"https://doi.org/10.1145/3558819.3565148","url":null,"abstract":"In response to the lack of private cloud evaluation methods used at this stage, the problem of mismatch between supply and demand for private cloud construction. A self-adaptive and scalable method for detecting the capabilities of private cloud systems is proposed. It can evaluate the capabilities of the Infrastructure as a Service (IaaS) cloud computing system. The capabilities of the Open-stack open source private cloud platform were evaluated using the proposed methods. According to the experimental results, the proposed method can accurately obtain the private cloud service capabilities, and the results are consistent with the user's actual test. This method has lower load generation cost and higher test efficiency. Comparing this method with Rally, the component that comes with Open-stack, the scalability and load dynamic simulation have been greatly improved.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129768591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the continuous development of the network, various Internet Plus are constantly derived, but more and more network threats also arise spontaneously. Intrusion Detection Systems (IDS) have become an important part of defending against malicious network attacks due to their ability to take proactive defenses. This paper compares four malicious traffic detection algorithms based on machine learning: through feature extraction and normalization of the data, and then brought into the model for training, comparison and improvement. Finally, an IDS based on random forest algorithm is designed to identify malicious http requests and give network administrators a better feedback. The accuracy rate can reach 0.95, the recall rate can reach 0.96, and the f1 value can reach 0.95.
{"title":"Intrusion Detection System Based on Machine Learning","authors":"Bocheng Liu, Zhi-Yuan Huang, Zeguo Zhu","doi":"10.1145/3558819.3558840","DOIUrl":"https://doi.org/10.1145/3558819.3558840","url":null,"abstract":"With the continuous development of the network, various Internet Plus are constantly derived, but more and more network threats also arise spontaneously. Intrusion Detection Systems (IDS) have become an important part of defending against malicious network attacks due to their ability to take proactive defenses. This paper compares four malicious traffic detection algorithms based on machine learning: through feature extraction and normalization of the data, and then brought into the model for training, comparison and improvement. Finally, an IDS based on random forest algorithm is designed to identify malicious http requests and give network administrators a better feedback. The accuracy rate can reach 0.95, the recall rate can reach 0.96, and the f1 value can reach 0.95.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhihao Zhou, Jinxin Ma, Guangnian Wan, Li Su, Haitao Du, Baojiang Cui
With the advancement of 6G research, satellite-terrestrial integrated architecture has become a new important issue in the communications industry. This article first introduces the research status of satellite-terrestrial integrated architecture, including solutions proposed by international organizations such as 3GPP, ITU and ETSI. Then we proposed two block chain-based satellite-terrestrial integrated network security architectures. Finally, the article summarizes the development trend of satellite-terrestrial integrated network, and analyzes the challenges that the network faces in terms of resource coordination, management and unified access security.
{"title":"Research on 6G Satellite-Terrestrial Integrated Network Architecture","authors":"Zhihao Zhou, Jinxin Ma, Guangnian Wan, Li Su, Haitao Du, Baojiang Cui","doi":"10.1145/3558819.3565467","DOIUrl":"https://doi.org/10.1145/3558819.3565467","url":null,"abstract":"With the advancement of 6G research, satellite-terrestrial integrated architecture has become a new important issue in the communications industry. This article first introduces the research status of satellite-terrestrial integrated architecture, including solutions proposed by international organizations such as 3GPP, ITU and ETSI. Then we proposed two block chain-based satellite-terrestrial integrated network security architectures. Finally, the article summarizes the development trend of satellite-terrestrial integrated network, and analyzes the challenges that the network faces in terms of resource coordination, management and unified access security.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For the complex traffic road scenarios where the occluded pedestrians are difficult to be detected by detectors, Multi-Attention Context Network (MACNet) is proposed, aiming to use contextual information and attention mechanism to handle the occluded pedestrians. Firstly, we add the multi-attention context module to make the detector obtain richer contextual information and use its attention mechanism to learn different occlusion patterns. On this basis, add trainable parameters to combine the global context module with the multi-attention context module to establish an adaptive mutual supervision mechanism to further improve the feature extraction of obscured pedestrians. Finally, unreasonable samples and too small positive samples are ignored in the network training process to reduce the negative impact of such samples on the network training. Experimental results show that the proposed method reduces the detection miss rate in different scenarios, and the improvement of pedestrian detection miss rate in heavy occlusion is more obvious.
{"title":"Occluded Pedestrian Detection and Image Recognition with Multi-Attention Context Networks","authors":"Weidong Zha, Fang Wang, Jiesi Luo, Lin Hu","doi":"10.1145/3558819.3565199","DOIUrl":"https://doi.org/10.1145/3558819.3565199","url":null,"abstract":"For the complex traffic road scenarios where the occluded pedestrians are difficult to be detected by detectors, Multi-Attention Context Network (MACNet) is proposed, aiming to use contextual information and attention mechanism to handle the occluded pedestrians. Firstly, we add the multi-attention context module to make the detector obtain richer contextual information and use its attention mechanism to learn different occlusion patterns. On this basis, add trainable parameters to combine the global context module with the multi-attention context module to establish an adaptive mutual supervision mechanism to further improve the feature extraction of obscured pedestrians. Finally, unreasonable samples and too small positive samples are ignored in the network training process to reduce the negative impact of such samples on the network training. Experimental results show that the proposed method reduces the detection miss rate in different scenarios, and the improvement of pedestrian detection miss rate in heavy occlusion is more obvious.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132051512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a new form of fraud, telecom network fraud is characterized by remoteness and contactless. After collecting reports of telecom network fraud cases through the Internet and simulating the case datasets based on the report findings, this paper selects the datasets related to characteristics of the suspects for pre-processing and transformation, applies the association rule algorithm to telecom network fraud cases, and uses Apriori algorithm and FP-Growth algorithm to mine the valuable information of the characteristics of the suspects involved in telecom network fraud cases. By doing so, this paper discovers the association relationship between the characteristics of the suspects, and proposes relevant prevention suggestions on this basis to help combat telecom network fraud crimes. CCS concept •Computing methodologies∼Machine learning∼Machine learning approaches∼Rule learning
{"title":"Application of Association Rules in Telecommunication Network Fraud Cases","authors":"Shuo Wen, Weiting Huang, Qi Wu, Jinying Zheng, Peixin Wang, Zhuolin Ye, Shangxuan Jiang","doi":"10.1145/3558819.3558820","DOIUrl":"https://doi.org/10.1145/3558819.3558820","url":null,"abstract":"As a new form of fraud, telecom network fraud is characterized by remoteness and contactless. After collecting reports of telecom network fraud cases through the Internet and simulating the case datasets based on the report findings, this paper selects the datasets related to characteristics of the suspects for pre-processing and transformation, applies the association rule algorithm to telecom network fraud cases, and uses Apriori algorithm and FP-Growth algorithm to mine the valuable information of the characteristics of the suspects involved in telecom network fraud cases. By doing so, this paper discovers the association relationship between the characteristics of the suspects, and proposes relevant prevention suggestions on this basis to help combat telecom network fraud crimes. CCS concept •Computing methodologies∼Machine learning∼Machine learning approaches∼Rule learning","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li-Hsien Chen, Weizhi Bao, Shaojie Peng, Minghua Yang, Ping Yan
In order to quickly and accurately identify the causes of the CINRAD radar faults, quickly troubleshoot them and make the radar return to normal operation. In this paper, an intelligent fault diagnosis method for the CINRAD radar was proposed by combining fault tree and Bayesian network. Firstly, a fault tree was constructed according to the constitution of the CINRAD radar and combined with a large number of fault cases, and then it was transformed into a Bayesian network model. finally, the CINRAD radar faults were quantitatively analyzed using Bayesian network and verified with actual maintenance cases of the CINRAD radar. The results showed that the fault diagnosis sequence values obtained by the fault diagnosis method designed in this paper were consistent with the actual maintenance sequence values, and the accuracy rate was 92.95%. The method can provide guidance for the fault maintenance of the CINRAD radar and has certain popularization value.
{"title":"Intelligent Fault Diagnosis of CINRAD Radar Based on Fault Tree and Bayesian Network","authors":"Li-Hsien Chen, Weizhi Bao, Shaojie Peng, Minghua Yang, Ping Yan","doi":"10.1145/3558819.3558831","DOIUrl":"https://doi.org/10.1145/3558819.3558831","url":null,"abstract":"In order to quickly and accurately identify the causes of the CINRAD radar faults, quickly troubleshoot them and make the radar return to normal operation. In this paper, an intelligent fault diagnosis method for the CINRAD radar was proposed by combining fault tree and Bayesian network. Firstly, a fault tree was constructed according to the constitution of the CINRAD radar and combined with a large number of fault cases, and then it was transformed into a Bayesian network model. finally, the CINRAD radar faults were quantitatively analyzed using Bayesian network and verified with actual maintenance cases of the CINRAD radar. The results showed that the fault diagnosis sequence values obtained by the fault diagnosis method designed in this paper were consistent with the actual maintenance sequence values, and the accuracy rate was 92.95%. The method can provide guidance for the fault maintenance of the CINRAD radar and has certain popularization value.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Under the background of the sharing economy, the online short-term rental market contains huge business opportunities, but the development of online short-term rental models in various regions is uneven, and there is a lack of reasonable pricing. Therefore, based on the Beijing Airbnb online short-term rental data set, this paper adopts the advanced machine learning method AutoGluon model to predict the price range, and finally analyzes the solvability of the model. First, data preprocessing is performed on the initial dataset. Second, an initial exploration of the data found that prices are correlated with housing type, location, and surrounding environment. Then, based on the existing features, an AutoGluon hedonic price model is established to predict the price range; finally, interpretable analysis of the model is performed to identify key factors. Geographical location and room type undoubtedly have the greatest impact on the online short-term rental market price, providing a reference for online short-term rental platforms and homeowners to reasonably customize house prices and improve service quality.
{"title":"The hedonic price model of online short-term rental market based on machine learning","authors":"Jin Xin, Lei Xue","doi":"10.1145/3558819.3565227","DOIUrl":"https://doi.org/10.1145/3558819.3565227","url":null,"abstract":"Under the background of the sharing economy, the online short-term rental market contains huge business opportunities, but the development of online short-term rental models in various regions is uneven, and there is a lack of reasonable pricing. Therefore, based on the Beijing Airbnb online short-term rental data set, this paper adopts the advanced machine learning method AutoGluon model to predict the price range, and finally analyzes the solvability of the model. First, data preprocessing is performed on the initial dataset. Second, an initial exploration of the data found that prices are correlated with housing type, location, and surrounding environment. Then, based on the existing features, an AutoGluon hedonic price model is established to predict the price range; finally, interpretable analysis of the model is performed to identify key factors. Geographical location and room type undoubtedly have the greatest impact on the online short-term rental market price, providing a reference for online short-term rental platforms and homeowners to reasonably customize house prices and improve service quality.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127914724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The policy administrator is a zero trust dynamic authority determination component, which is mainly responsible for the management, storage and evaluation of policies. Aiming at the evaluation of the security and effectiveness of the policies in the policy administrator, this paper proposes to introduce the policy model online service verification component in the policy administrator. First, the policy file is formalized into a policy instance logic specification through logical abstraction, and then the policy instance logic specification Perform model check with the policy abstract logic specification developed by the policy designer to realize the pre-check verification of the consistency of the police file. After the completion of the pre-check and verification, the policy will be executed for the policy manager to make a decision on the execution point of the policy. At this time, the system operating state data intercepted by the policy enforcement point and the embedded system's security, compliance, and legal treaty form process specifications are used to perform model post-check to achieve the security and alarm after the implementation of the policy. Through the combination of pre-check and post-check, the evaluation and testing of the policy and effectiveness of the zero-trust security policy are finally realized.
{"title":"The Runtime model checking Method for Zero Trust Security Policy","authors":"Zhi Niu, Luming Dong, Yong Zhu","doi":"10.1145/3558819.3558821","DOIUrl":"https://doi.org/10.1145/3558819.3558821","url":null,"abstract":"The policy administrator is a zero trust dynamic authority determination component, which is mainly responsible for the management, storage and evaluation of policies. Aiming at the evaluation of the security and effectiveness of the policies in the policy administrator, this paper proposes to introduce the policy model online service verification component in the policy administrator. First, the policy file is formalized into a policy instance logic specification through logical abstraction, and then the policy instance logic specification Perform model check with the policy abstract logic specification developed by the policy designer to realize the pre-check verification of the consistency of the police file. After the completion of the pre-check and verification, the policy will be executed for the policy manager to make a decision on the execution point of the policy. At this time, the system operating state data intercepted by the policy enforcement point and the embedded system's security, compliance, and legal treaty form process specifications are used to perform model post-check to achieve the security and alarm after the implementation of the policy. Through the combination of pre-check and post-check, the evaluation and testing of the policy and effectiveness of the zero-trust security policy are finally realized.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Microblog has been widely used as a social network information exchange, communication and dissemination platform, but the dissemination of false information on the microblog has brought many undesirable problems to the society and has become the focus of government and social concern and monitoring. This paper firstly establishes a game benefit matrix to describe the individual choice strategy between government regulation departments and users for false information, and then establishes a replicated dynamic equation to solve the game model to obtain the individual stable game strategy, and finally derives the corresponding evolution equation according to the dynamic equation and conducts data evolution simulation analysis to give the guiding significance of the corresponding model and get the law of false information dissemination mode and the countermeasure and suggestions for regulation.
{"title":"Simulation Study on the Evolution of Social Network False Information Dissemination","authors":"Dezhi Wei, Lina Lin","doi":"10.1145/3558819.3558829","DOIUrl":"https://doi.org/10.1145/3558819.3558829","url":null,"abstract":"Microblog has been widely used as a social network information exchange, communication and dissemination platform, but the dissemination of false information on the microblog has brought many undesirable problems to the society and has become the focus of government and social concern and monitoring. This paper firstly establishes a game benefit matrix to describe the individual choice strategy between government regulation departments and users for false information, and then establishes a replicated dynamic equation to solve the game model to obtain the individual stable game strategy, and finally derives the corresponding evolution equation according to the dynamic equation and conducts data evolution simulation analysis to give the guiding significance of the corresponding model and get the law of false information dissemination mode and the countermeasure and suggestions for regulation.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}