首页 > 最新文献

Tsinghua Science and Technology最新文献

英文 中文
Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks 边缘计算网络中区块链驱动的安全数据共享框架
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-30 DOI: 10.26599/TST.2024.9010051
Fuad A. M. Al-Yarimi;Ramzi Salah;Khaled Mohamoud
This study examines secure and effective data sharing methods for edge computing networks. Traditional methods of sharing data at the edge have issues with security, speed, and consensus. The goal is to develop a Blockchain-based Secure Data Sharing Framework (BSDSF) capable of improving data integrity, latency, and overall network efficiency for edge-cloud computing applications. BSDSF proposes using blockchain technology with Byzantine Fault Tolerance (BFT) and smart contract-based validation as a new method of secure data sharing. It has a two-tiered consensus protocol to meet the needs of edge computing, which requires instantaneous responses. BSDSF employs Byzantine fault tolerance to deal with errors and protect against attacks. Smart contracts automate validation and consensus operations, while edge computing processes data at the attack site. Node validation and failure detection methods monitor network quality and dependability, while system security ensures secure communication between nodes. BSDSF is an important step toward digital freedom and trust by protecting security and improving transaction reliability. The framework demonstrates a reduction in transaction latency by up to 30% and an increase in throughput by 25% compared to traditional edge computing models, positioning BSDSF as a pivotal solution for fostering digital freedom and trust in edge computing environments.
本研究探讨边缘计算网络安全有效的数据共享方法。在边缘共享数据的传统方法在安全性、速度和共识方面存在问题。目标是开发一个基于区块链的安全数据共享框架(BSDSF),能够改善边缘云计算应用程序的数据完整性、延迟和整体网络效率。BSDSF提出使用区块链技术与拜占庭容错(BFT)和基于智能合约的验证作为安全数据共享的新方法。它具有两层共识协议,以满足边缘计算的需求,需要即时响应。BSDSF采用拜占庭式容错来处理错误和防止攻击。智能合约自动化验证和共识操作,而边缘计算在攻击站点处理数据。节点验证和故障检测方法监控网络质量和可靠性,而系统安全性确保节点之间的安全通信。BSDSF通过保护安全性和提高交易可靠性,是迈向数字自由和信任的重要一步。与传统的边缘计算模型相比,该框架将事务延迟减少了30%,吞吐量增加了25%,将BSDSF定位为在边缘计算环境中促进数字自由和信任的关键解决方案。
{"title":"Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks","authors":"Fuad A. M. Al-Yarimi;Ramzi Salah;Khaled Mohamoud","doi":"10.26599/TST.2024.9010051","DOIUrl":"https://doi.org/10.26599/TST.2024.9010051","url":null,"abstract":"This study examines secure and effective data sharing methods for edge computing networks. Traditional methods of sharing data at the edge have issues with security, speed, and consensus. The goal is to develop a Blockchain-based Secure Data Sharing Framework (BSDSF) capable of improving data integrity, latency, and overall network efficiency for edge-cloud computing applications. BSDSF proposes using blockchain technology with Byzantine Fault Tolerance (BFT) and smart contract-based validation as a new method of secure data sharing. It has a two-tiered consensus protocol to meet the needs of edge computing, which requires instantaneous responses. BSDSF employs Byzantine fault tolerance to deal with errors and protect against attacks. Smart contracts automate validation and consensus operations, while edge computing processes data at the attack site. Node validation and failure detection methods monitor network quality and dependability, while system security ensures secure communication between nodes. BSDSF is an important step toward digital freedom and trust by protecting security and improving transaction reliability. The framework demonstrates a reduction in transaction latency by up to 30% and an increase in throughput by 25% compared to traditional edge computing models, positioning BSDSF as a pivotal solution for fostering digital freedom and trust in edge computing environments.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 3","pages":"978-997"},"PeriodicalIF":6.6,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10817767","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142905813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Air-Ground Coordination in Mobile Edge Computing: Key Technologies, Applications and Future Directions 移动边缘计算中地空协同:关键技术、应用及未来发展方向
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-30 DOI: 10.26599/TST.2024.9010142
Siqi Li;Guoqiang Liu;Li Li;Zhongyuan Zhang;Wenhao Fei;Haolong Xiang
In recent years, Mobile Edge Computing (MEC) has received extensive research attention due to its characteristics, such as real-time data processing and flexible application deployment. However, traditional MEC server deployment relies on the terrestrial Base Stations (BSs), resulting in high deployment costs and limited coverage range. In response to these challenges, air-ground coordination has emerged, which effectively combines the advantages of edge computing and Unmanned Aerial Vehicles (UAVs), providing an effective architecture for edge intelligence. By utilizing the flexibility of UAVs and empowering them into edge nodes with computing resources, the coverage range of MEC can be expanded, thereby reducing the reliance of edge devices on terrestrial BSs. Furthermore, leveraging terrestrial BSs as supplements to the computing power compensates for relatively limited computational capabilities of UAVs. Although extensive studies have been conducted on air-ground coordination, there are few related summaries of application technologies and prospects. Thus, the key technologies of air-ground coordination and applications are comprehensively reviewed in this paper. Finally, to provide guidance for interested researchers, the development trends and potential applications of air-ground coordination are explored.
近年来,移动边缘计算(Mobile Edge Computing, MEC)以其数据处理实时、应用部署灵活等特点受到了广泛的研究关注。然而,传统的MEC服务器部署依赖于地面基站,部署成本高,覆盖范围有限。为了应对这些挑战,地空协同应运而生,它有效地结合了边缘计算和无人机的优势,为边缘智能提供了有效的架构。通过利用无人机的灵活性,并将其赋予具有计算资源的边缘节点,可以扩大MEC的覆盖范围,从而减少边缘设备对地面基站的依赖。此外,利用地面卫星导航系统作为计算能力的补充,弥补了无人机相对有限的计算能力。虽然对地空协调进行了广泛的研究,但对其应用技术和前景的总结却很少。因此,本文对地空协调的关键技术及其应用进行了综述。最后,探讨了地空协调的发展趋势和潜在应用,为有兴趣的研究人员提供指导。
{"title":"A Review on Air-Ground Coordination in Mobile Edge Computing: Key Technologies, Applications and Future Directions","authors":"Siqi Li;Guoqiang Liu;Li Li;Zhongyuan Zhang;Wenhao Fei;Haolong Xiang","doi":"10.26599/TST.2024.9010142","DOIUrl":"https://doi.org/10.26599/TST.2024.9010142","url":null,"abstract":"In recent years, Mobile Edge Computing (MEC) has received extensive research attention due to its characteristics, such as real-time data processing and flexible application deployment. However, traditional MEC server deployment relies on the terrestrial Base Stations (BSs), resulting in high deployment costs and limited coverage range. In response to these challenges, air-ground coordination has emerged, which effectively combines the advantages of edge computing and Unmanned Aerial Vehicles (UAVs), providing an effective architecture for edge intelligence. By utilizing the flexibility of UAVs and empowering them into edge nodes with computing resources, the coverage range of MEC can be expanded, thereby reducing the reliance of edge devices on terrestrial BSs. Furthermore, leveraging terrestrial BSs as supplements to the computing power compensates for relatively limited computational capabilities of UAVs. Although extensive studies have been conducted on air-ground coordination, there are few related summaries of application technologies and prospects. Thus, the key technologies of air-ground coordination and applications are comprehensively reviewed in this paper. Finally, to provide guidance for interested researchers, the development trends and potential applications of air-ground coordination are explored.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 3","pages":"1359-1386"},"PeriodicalIF":6.6,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10817761","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142905817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Integrated Blockchain Framework for Secure Data Sharing in IoT Fog Computing 物联网雾计算中安全数据共享的集成区块链框架
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-30 DOI: 10.26599/TST.2024.9010082
Peda Narayana Bathula;M. Sreenivasulu
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things (IoT) devices. This article addresses the privacy and security issues brought up by data sharing in the context of IoT fog computing. The suggested framework, called “BlocFogSec”, secures key management and data sharing through blockchain consensus and smart contracts. Unlike existing solutions, BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing, while employing a consensus protocol to validate transactions and maintain blockchain integrity. To process and store data effectively at the network edge, the framework makes use of fog computing, notably reducing latency and raising throughput. BlocFogSec successfully blocks unauthorized access and data breaches by restricting transactions to authorized nodes. In addition, the framework uses a consensus protocol to validate and add transactions to the blockchain, guaranteeing data accuracy and immutability. To compare BlocFogSec's performance to that of other models, a number of simulations are conducted. The simulation results indicate that BlocFogSec consistently outperforms existing models, such as Security Services for Fog Computing (SSFC) and Blockchain-based Key Management Scheme (BKMS), in terms of throughput (up to 5135 bytes per second), latency (as low as 7 ms), and resource utilization (70% to 92%). The evaluation also takes into account attack defending accuracy (up to 100%), precision (up to 100%), and recall (up to 99.6%), demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.
随着物联网(IoT)设备数量的不断增加,安全数据共享在雾计算中的重要性日益增加。本文讨论了物联网雾计算背景下数据共享带来的隐私和安全问题。该框架被称为“BlocFogSec”,通过区块链共识和智能合约确保密钥管理和数据共享。与现有解决方案不同,BlocFogSec利用两种类型的智能合约进行安全密钥交换和数据共享,同时采用共识协议来验证交易并保持区块链完整性。为了在网络边缘有效地处理和存储数据,该框架利用了雾计算,显著降低了延迟并提高了吞吐量。通过将交易限制在授权节点上,BlocFogSec成功阻止了未经授权的访问和数据泄露。此外,该框架使用共识协议来验证事务并将其添加到区块链中,从而保证了数据的准确性和不变性。为了将BlocFogSec的性能与其他模型进行比较,进行了大量的仿真。模拟结果表明,在吞吐量(高达5135字节每秒)、延迟(低至7毫秒)和资源利用率(70%至92%)方面,BlocFogSec始终优于现有模型,如雾计算安全服务(SSFC)和基于区块链的密钥管理方案(BKMS)。评估还考虑了攻击防御的准确性(高达100%),精度(高达100%)和召回率(高达99.6%),证明了BlocFogSec在识别和预防潜在攻击方面的有效性。
{"title":"An Integrated Blockchain Framework for Secure Data Sharing in IoT Fog Computing","authors":"Peda Narayana Bathula;M. Sreenivasulu","doi":"10.26599/TST.2024.9010082","DOIUrl":"https://doi.org/10.26599/TST.2024.9010082","url":null,"abstract":"The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things (IoT) devices. This article addresses the privacy and security issues brought up by data sharing in the context of IoT fog computing. The suggested framework, called “BlocFogSec”, secures key management and data sharing through blockchain consensus and smart contracts. Unlike existing solutions, BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing, while employing a consensus protocol to validate transactions and maintain blockchain integrity. To process and store data effectively at the network edge, the framework makes use of fog computing, notably reducing latency and raising throughput. BlocFogSec successfully blocks unauthorized access and data breaches by restricting transactions to authorized nodes. In addition, the framework uses a consensus protocol to validate and add transactions to the blockchain, guaranteeing data accuracy and immutability. To compare BlocFogSec's performance to that of other models, a number of simulations are conducted. The simulation results indicate that BlocFogSec consistently outperforms existing models, such as Security Services for Fog Computing (SSFC) and Blockchain-based Key Management Scheme (BKMS), in terms of throughput (up to 5135 bytes per second), latency (as low as 7 ms), and resource utilization (70% to 92%). The evaluation also takes into account attack defending accuracy (up to 100%), precision (up to 100%), and recall (up to 99.6%), demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 3","pages":"957-977"},"PeriodicalIF":6.6,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10817699","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142905887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Quantum Enabled Machine Algorithm by Universal Features for Predicting Botnet Attacks in Digital Twin Enabled IoT Networks 基于通用特征的高效量子机器算法用于预测数字孪生物联网中僵尸网络攻击
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-30 DOI: 10.26599/TST.2024.9010052
Katta Rajesh Babu;Naramula Venkatesh;K. Shashidhar;Yellampalli Dasaratha Rami Reddy;K. Naga Prakash
In this manuscript, the authors introduce a quantum enabled Reinforcement Algorithm by Universal Features (REMF) as a lightweight solution designed to identify and assess the impact of botnet attacks on 5G Internet of Things (IoT) networks. REMF's primary objective is the swift detection of botnet assaults and their effects, aiming to prevent the initiation of such attacks. The algorithm introduces a novel adaptive classification boosting through reinforcement learning, training on values derived from universal features extracted from network transactions within a given training corpus. During the prediction phase, REMF assesses the Botnet attack confidence of feature values obtained from unlabeled network transactions. It then compares these botnet attack confidence values with the botnet attack confidence of optimal features derived during the training phase to predict the potential impact of the botnet attack, categorizing it as high, moderate, low, or not-an-attack (normal). The performance evaluation results demonstrate that REMF achieves the highest decision accuracy, displaying maximum sensitivity and specificity in predicting the scope of botnet attacks at an early stage. The experimental study illustrates that REMF outperforms existing detection techniques for predicting botnet attacks.
在这份手稿中,作者介绍了一种基于通用特征(REMF)的量子强化算法,作为一种轻量级解决方案,旨在识别和评估僵尸网络攻击对5G物联网(IoT)网络的影响。REMF的主要目标是快速检测僵尸网络攻击及其影响,旨在防止此类攻击的发起。该算法通过强化学习引入了一种新的自适应分类提升方法,对给定训练语料库中从网络交易中提取的通用特征衍生的值进行训练。在预测阶段,REMF评估从未标记的网络事务中获得的特征值的僵尸网络攻击置信度。然后将这些僵尸网络攻击置信度值与在训练阶段获得的最优特征的僵尸网络攻击置信度进行比较,以预测僵尸网络攻击的潜在影响,将其分类为高、中、低或非攻击(正常)。性能评估结果表明,REMF在早期预测僵尸网络攻击范围方面具有最高的决策精度,最大的灵敏度和特异性。实验研究表明,REMF在预测僵尸网络攻击方面优于现有的检测技术。
{"title":"An Efficient Quantum Enabled Machine Algorithm by Universal Features for Predicting Botnet Attacks in Digital Twin Enabled IoT Networks","authors":"Katta Rajesh Babu;Naramula Venkatesh;K. Shashidhar;Yellampalli Dasaratha Rami Reddy;K. Naga Prakash","doi":"10.26599/TST.2024.9010052","DOIUrl":"https://doi.org/10.26599/TST.2024.9010052","url":null,"abstract":"In this manuscript, the authors introduce a quantum enabled Reinforcement Algorithm by Universal Features (REMF) as a lightweight solution designed to identify and assess the impact of botnet attacks on 5G Internet of Things (IoT) networks. REMF's primary objective is the swift detection of botnet assaults and their effects, aiming to prevent the initiation of such attacks. The algorithm introduces a novel adaptive classification boosting through reinforcement learning, training on values derived from universal features extracted from network transactions within a given training corpus. During the prediction phase, REMF assesses the Botnet attack confidence of feature values obtained from unlabeled network transactions. It then compares these botnet attack confidence values with the botnet attack confidence of optimal features derived during the training phase to predict the potential impact of the botnet attack, categorizing it as high, moderate, low, or not-an-attack (normal). The performance evaluation results demonstrate that REMF achieves the highest decision accuracy, displaying maximum sensitivity and specificity in predicting the scope of botnet attacks at an early stage. The experimental study illustrates that REMF outperforms existing detection techniques for predicting botnet attacks.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 3","pages":"947-956"},"PeriodicalIF":6.6,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10817765","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142905888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MDGCN-Lt: Fair Web API Classification with Sparse and Heterogeneous Data Based on Deep GCN MDGCN-Lt:基于深度GCN的稀疏异构数据公平Web API分类
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-30 DOI: 10.26599/TST.2024.9010026
Boyuan Yan;Yankun Zhang;Wenwen Gong;Haoyang Wan;Wenwei Wang;Weiyi Zhong;Caixia Bu
Developers integrate web Application Programming Interfaces (APIs) into edge applications, enabling data expansion to the edge computing area for comprehensive coverage of devices in that region. To develop edge applications, developers search API categories to select APIs that meet specific functionalities. Therefore, the accurate classification of APIs becomes critically important. However, existing approaches, as evident on platforms like programableweb.com, face significant challenges. Firstly, sparsity in API data reduces classification accuracy in works focusing on single-dimensional API information. Secondly, the multidimensional and heterogeneous structure of web APIs adds complexity to data mining tasks, requiring sophisticated techniques for effective integration and analysis of diverse data aspects. Lastly, the long-tailed distribution of API data introduces biases, compromising the fairness of classification efforts. Addressing these challenges, we propose MDGCN-Lt, an API classification approach offering flexibility in using multi-dimensional heterogeneous data. It tackles data sparsity through deep graph convolutional networks, exploring high-order feature interactions among API nodes. MDGCN-Lt employs a loss function with logit adjustment, enhancing efficiency in handling long-tail data scenarios. Empirical results affirm our approach's superiority over existing methods.
开发人员将web应用程序编程接口(api)集成到边缘应用程序中,使数据扩展到边缘计算区域,从而全面覆盖该区域的设备。为了开发边缘应用程序,开发人员搜索API类别以选择满足特定功能的API。因此,原料药的准确分类变得至关重要。然而,现有的方法,如programableweb.com等平台所示,面临着巨大的挑战。首先,API数据的稀疏性降低了关注一维API信息的工作的分类精度。其次,web api的多维和异构结构增加了数据挖掘任务的复杂性,需要复杂的技术来有效集成和分析不同的数据方面。最后,API数据的长尾分布引入了偏差,损害了分类工作的公平性。为了应对这些挑战,我们提出了MDGCN-Lt,这是一种API分类方法,可以灵活地使用多维异构数据。它通过深度图卷积网络解决数据稀疏问题,探索API节点之间的高阶特征交互。MDGCN-Lt采用logit调整的损失函数,提高了处理长尾数据场景的效率。实证结果肯定了我们的方法优于现有方法。
{"title":"MDGCN-Lt: Fair Web API Classification with Sparse and Heterogeneous Data Based on Deep GCN","authors":"Boyuan Yan;Yankun Zhang;Wenwen Gong;Haoyang Wan;Wenwei Wang;Weiyi Zhong;Caixia Bu","doi":"10.26599/TST.2024.9010026","DOIUrl":"https://doi.org/10.26599/TST.2024.9010026","url":null,"abstract":"Developers integrate web Application Programming Interfaces (APIs) into edge applications, enabling data expansion to the edge computing area for comprehensive coverage of devices in that region. To develop edge applications, developers search API categories to select APIs that meet specific functionalities. Therefore, the accurate classification of APIs becomes critically important. However, existing approaches, as evident on platforms like programableweb.com, face significant challenges. Firstly, sparsity in API data reduces classification accuracy in works focusing on single-dimensional API information. Secondly, the multidimensional and heterogeneous structure of web APIs adds complexity to data mining tasks, requiring sophisticated techniques for effective integration and analysis of diverse data aspects. Lastly, the long-tailed distribution of API data introduces biases, compromising the fairness of classification efforts. Addressing these challenges, we propose MDGCN-Lt, an API classification approach offering flexibility in using multi-dimensional heterogeneous data. It tackles data sparsity through deep graph convolutional networks, exploring high-order feature interactions among API nodes. MDGCN-Lt employs a loss function with logit adjustment, enhancing efficiency in handling long-tail data scenarios. Empirical results affirm our approach's superiority over existing methods.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 3","pages":"1294-1314"},"PeriodicalIF":6.6,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10817770","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142905808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEFOG: Deep Learning with Attention Mechanism Enabled Cross-Age Face Recognition 深度学习与注意机制支持跨年龄人脸识别
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-30 DOI: 10.26599/TST.2024.9010107
Biaokai Zhu;Lu Li;Xiaochun Hu;Fulin Wu;Zhaojie Zhang;Shengnan Zhu;Yanxi Wang;Jiali Wu;Jie Song;Feng Li;Sanman Liu;Jumin Zhao
As individuals age, their facial features change, which can hinder the accuracy of face recognition technology. To address this challenge, a new cross-age face recognition algorithm, leveraging deep learning and a loss function (Loss), has been proposed in this article. The Retinaface algorithm detects faces in images, while the Resnet-50 model is enhanced by incorporating an attention mechanism and improved softmax loss (Arcface) to extract facial features. This approach has been tested on publicly available and custom-built datasets, and its performance has been compared to other cross-age face recognition techniques. The results show that the model effectively recognizes faces across different age groups.
随着个人年龄的增长,他们的面部特征会发生变化,这可能会影响人脸识别技术的准确性。为了应对这一挑战,本文提出了一种新的跨年龄人脸识别算法,该算法利用深度学习和损失函数(loss)。retaface算法在图像中检测人脸,而Resnet-50模型通过纳入注意机制和改进的softmax loss (Arcface)来提取面部特征。该方法已在公开可用和定制的数据集上进行了测试,并将其性能与其他跨年龄人脸识别技术进行了比较。结果表明,该模型能有效识别不同年龄段的人脸。
{"title":"DEFOG: Deep Learning with Attention Mechanism Enabled Cross-Age Face Recognition","authors":"Biaokai Zhu;Lu Li;Xiaochun Hu;Fulin Wu;Zhaojie Zhang;Shengnan Zhu;Yanxi Wang;Jiali Wu;Jie Song;Feng Li;Sanman Liu;Jumin Zhao","doi":"10.26599/TST.2024.9010107","DOIUrl":"https://doi.org/10.26599/TST.2024.9010107","url":null,"abstract":"As individuals age, their facial features change, which can hinder the accuracy of face recognition technology. To address this challenge, a new cross-age face recognition algorithm, leveraging deep learning and a loss function (Loss), has been proposed in this article. The Retinaface algorithm detects faces in images, while the Resnet-50 model is enhanced by incorporating an attention mechanism and improved softmax loss (Arcface) to extract facial features. This approach has been tested on publicly available and custom-built datasets, and its performance has been compared to other cross-age face recognition techniques. The results show that the model effectively recognizes faces across different age groups.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 3","pages":"1342-1358"},"PeriodicalIF":6.6,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10817764","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142905819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Security for CR-NOMA Network with Cooperative Jamming 具有合作干扰功能的 CR-NOMA 网络的物理层安全性
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-09 DOI: 10.26599/TST.2023.9010128
Meiling Li;Peng Xue;Hu Yuan;Yuxing Han
Cooperative jamming can effectively combat eavesdropping in physical layer security communication without affecting the legal receiver and improve the security performance of the system. This paper introduces cooperative jamming to cognitive radio (CR) networks with non-orthogonal multiple access (NOMA) technology. The secure performance of the considered CR and NOMA (CR-NOMA) network is evaluated using two modes: non-cooperative jamming and cooperative jamming. In particular, the secrecy outage probabilities (SOPs) of the primary user (PU) in the two modes are derived under Rician fading channels, based on which, the influences of the transmission signal-to-noise ratio (SNR) of secondary users (SUs), the number of SUs, the secrecy rate, and the power allocation coefficient on the SOPs of PU are analyzed thereafter. Both analysis and simulation results show that cooperative jamming effectively prevents eavesdropping behaviour, which reduces the SOP of PU compared to non-cooperative jamming. We also show that the transmission SNR, the number of SUs, the secrecy rate, and the power distribution coefficients greatly influence performance improvement.
协同干扰可以在不影响合法接收方的情况下,有效地打击物理层安全通信中的窃听行为,提高系统的安全性能。介绍了基于非正交多址(NOMA)技术的认知无线电(CR)网络协同干扰问题。采用非合作干扰和合作干扰两种模式对CR-NOMA网络的安全性能进行了评估。特别推导了两种模式下主用户在衰落信道下的保密中断概率(SOPs),在此基础上分析了副用户的传输信噪比(SNR)、副用户个数、保密率和功率分配系数对主用户保密中断概率的影响。分析和仿真结果表明,与非合作干扰相比,合作干扰有效地防止了窃听行为,降低了PU的SOP。我们还表明,传输信噪比、单元数量、保密率和功率分配系数对性能的提高有很大影响。
{"title":"Physical Layer Security for CR-NOMA Network with Cooperative Jamming","authors":"Meiling Li;Peng Xue;Hu Yuan;Yuxing Han","doi":"10.26599/TST.2023.9010128","DOIUrl":"https://doi.org/10.26599/TST.2023.9010128","url":null,"abstract":"Cooperative jamming can effectively combat eavesdropping in physical layer security communication without affecting the legal receiver and improve the security performance of the system. This paper introduces cooperative jamming to cognitive radio (CR) networks with non-orthogonal multiple access (NOMA) technology. The secure performance of the considered CR and NOMA (CR-NOMA) network is evaluated using two modes: non-cooperative jamming and cooperative jamming. In particular, the secrecy outage probabilities (SOPs) of the primary user (PU) in the two modes are derived under Rician fading channels, based on which, the influences of the transmission signal-to-noise ratio (SNR) of secondary users (SUs), the number of SUs, the secrecy rate, and the power allocation coefficient on the SOPs of PU are analyzed thereafter. Both analysis and simulation results show that cooperative jamming effectively prevents eavesdropping behaviour, which reduces the SOP of PU compared to non-cooperative jamming. We also show that the transmission SNR, the number of SUs, the secrecy rate, and the power distribution coefficients greatly influence performance improvement.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 2","pages":"708-720"},"PeriodicalIF":6.6,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10786938","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wearable Continuous Blood Pressure Monitoring Based on Pulsatile Cycle Volume Adjustment Method 基于脉动周期量调节法的可穿戴式连续血压监测系统
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-09 DOI: 10.26599/TST.2024.9010043
Pang Wu;Zhongrui Bai;Pan Xia;Lirui Xu;Peng Wang;Xianxiang Chen;Lidong Du;Ziqing Hei;Weifeng Yao;Xiaoran Li;Zhan Zhao;Zhen Fang
Accurate and portable Blood Pressure (BP) monitoring is vital for managing cardiovascular diseases. However, existing wearable continuous BP monitoring technologies are often inaccurate and rely on external calibration, limiting their practical application in continuous BP monitoring. To address this challenge, we have developed a Wearable continuous non-invasive BP Monitor (WeBPM) equipped with a finger cuff sensor, capable of monitoring BP continuously and accurately within medical-grade precision. WeBPM integrates advanced finger oscillographic BP measurement technology to provide reliable self-calibration functionality. Moreover, Pulsatile Cycle Volume Adjustment Method (PCVAM) we proposed for the closed-loop phase can continuously track changes in vasomotor tone under a controlled frequency based on pulsatile cycles, thereby enabling continuous BP measurement. In comparative experiments with the Nexfin monitor, WeBPM demonstrates excellent performance in induced dynamic BP experiments, with measurement errors of (-1.4 ± 6.24) mmHg for Systolic BP (SBP) and (-0.82 ± 4.83) mmHg for Diastolic BP (DBP). Additionally, compared to clinical invasive reference measurements, WeBPM's SBP and DBP measurement errors are (-1.74 ± 4.9) mmHg and (0.37 ± 3.28) mmHg, respectively, further proving its outstanding performance. These results highlight WeBPM's potential in personalized health management and remote monitoring, offering a new solution for continuous non-invasive BP monitoring.
准确、便携的血压监测对心血管疾病的管理至关重要。然而,现有的可穿戴式连续血压监测技术往往不准确,依赖于外部校准,限制了其在连续血压监测中的实际应用。为了应对这一挑战,我们开发了一种可穿戴式连续无创血压监测仪(WeBPM),配备了指套传感器,能够在医疗级精度范围内连续准确地监测血压。WeBPM集成了先进的手指示波器BP测量技术,提供可靠的自校准功能。此外,我们提出的闭环相位脉冲周期音量调节方法(PCVAM)可以在基于脉冲周期的控制频率下连续跟踪血管舒缩张力的变化,从而实现连续的血压测量。在与Nexfin监护仪的对比实验中,WeBPM在诱导动态血压实验中表现优异,收缩压(SBP)测量误差为(-1.4±6.24)mmHg,舒张压(DBP)测量误差为(-0.82±4.83)mmHg。此外,与临床有创参考测量相比,WeBPM的收缩压和舒张压测量误差分别为(-1.74±4.9)mmHg和(0.37±3.28)mmHg,进一步证明了其卓越的性能。这些结果突出了WeBPM在个性化健康管理和远程监测方面的潜力,为持续无创血压监测提供了新的解决方案。
{"title":"Wearable Continuous Blood Pressure Monitoring Based on Pulsatile Cycle Volume Adjustment Method","authors":"Pang Wu;Zhongrui Bai;Pan Xia;Lirui Xu;Peng Wang;Xianxiang Chen;Lidong Du;Ziqing Hei;Weifeng Yao;Xiaoran Li;Zhan Zhao;Zhen Fang","doi":"10.26599/TST.2024.9010043","DOIUrl":"https://doi.org/10.26599/TST.2024.9010043","url":null,"abstract":"Accurate and portable Blood Pressure (BP) monitoring is vital for managing cardiovascular diseases. However, existing wearable continuous BP monitoring technologies are often inaccurate and rely on external calibration, limiting their practical application in continuous BP monitoring. To address this challenge, we have developed a Wearable continuous non-invasive BP Monitor (WeBPM) equipped with a finger cuff sensor, capable of monitoring BP continuously and accurately within medical-grade precision. WeBPM integrates advanced finger oscillographic BP measurement technology to provide reliable self-calibration functionality. Moreover, Pulsatile Cycle Volume Adjustment Method (PCVAM) we proposed for the closed-loop phase can continuously track changes in vasomotor tone under a controlled frequency based on pulsatile cycles, thereby enabling continuous BP measurement. In comparative experiments with the Nexfin monitor, WeBPM demonstrates excellent performance in induced dynamic BP experiments, with measurement errors of (-1.4 ± 6.24) mmHg for Systolic BP (SBP) and (-0.82 ± 4.83) mmHg for Diastolic BP (DBP). Additionally, compared to clinical invasive reference measurements, WeBPM's SBP and DBP measurement errors are (-1.74 ± 4.9) mmHg and (0.37 ± 3.28) mmHg, respectively, further proving its outstanding performance. These results highlight WeBPM's potential in personalized health management and remote monitoring, offering a new solution for continuous non-invasive BP monitoring.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 2","pages":"650-669"},"PeriodicalIF":6.6,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10786939","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Maximum Vertex (k,ℓ)-Biplex Computation on Bipartite Graphs 双向图上的高效最大顶点 (k,ℓ)- 双工计算
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-09 DOI: 10.26599/TST.2024.9010009
Hongru Zhou;Shengxin Liu;Ruidi Cao
Cohesive subgraph search is a fundamental problem in bipartite graph analysis. Given integers $k$ and ℓ, a (k,ℓ)-biplex is a cohesive structure which requires each vertex to disconnect at most $k$ or $l$ vertices in the other side. Computing (k,ℓ)-biplexes has been a popular research topic in recent years and has various applications. However, most existing studies considered the problem of finding (k, ℓ)-biplex with the largest number of edges. In this paper, we instead consider another variant and focus on the maximum vertex (k, ℓ)-biplex problem which aims to search for a (k, ℓ)-biplex with the maximum cardinality. We first show that this problem is Non-deterministic Polynomial-time hard (NP-hard) for any positive integers $k$ and ℓ while max{k, ℓ} is at least 3. Guided by this negative result, we design an efficient branch-and-bound algorithm with a novel framework. In particular, we introduce a branching strategy based on whether there is a pivot in the current set, with which our proposed algorithm has the time complexity of γnnO(1), where γ< 2. In addition, we also apply multiple speed-up techniques and various pruning strategies. Finally, we conduct extensive experiments on various real datasets which demonstrate the efficiency of our proposed algorithm in terms of running time.
内聚子图搜索是二叉图分析中的一个基本问题。给定整数 $k$ 和 ℓ,(k,ℓ)-双联图是一种内聚结构,它要求每个顶点最多断开另一侧的 $k$ 或 $l$ 顶点。计算 (k,ℓ)-biplexes 是近年来的热门研究课题,并有多种应用。然而,现有的大多数研究都考虑了寻找具有最多边的 (k, ℓ) 双链体的问题。在本文中,我们转而考虑另一种变体,并将重点放在最大顶点(k, ℓ)双链体问题上,该问题旨在寻找具有最大心数的(k, ℓ)双链体。我们首先证明,对于任何正整数 $k$ 和 ℓ,当 max{k, ℓ} 至少为 3 时,该问题都是非确定性多项式时间难(NP-hard)问题。特别是,我们引入了一种基于当前集合中是否存在枢轴的分支策略,有了这种策略,我们提出的算法的时间复杂度为 γnnO(1),其中 γ< 2。此外,我们还应用了多种加速技术和各种剪枝策略。最后,我们在各种真实数据集上进行了大量实验,证明了我们提出的算法在运行时间方面的效率。
{"title":"Efficient Maximum Vertex (k,ℓ)-Biplex Computation on Bipartite Graphs","authors":"Hongru Zhou;Shengxin Liu;Ruidi Cao","doi":"10.26599/TST.2024.9010009","DOIUrl":"https://doi.org/10.26599/TST.2024.9010009","url":null,"abstract":"Cohesive subgraph search is a fundamental problem in bipartite graph analysis. Given integers \u0000<tex>$k$</tex>\u0000 and ℓ, a (k,ℓ)-biplex is a cohesive structure which requires each vertex to disconnect at most \u0000<tex>$k$</tex>\u0000 or \u0000<tex>$l$</tex>\u0000 vertices in the other side. Computing (k,ℓ)-biplexes has been a popular research topic in recent years and has various applications. However, most existing studies considered the problem of finding (k, ℓ)-biplex with the largest number of edges. In this paper, we instead consider another variant and focus on the maximum vertex (k, ℓ)-biplex problem which aims to search for a (k, ℓ)-biplex with the maximum cardinality. We first show that this problem is Non-deterministic Polynomial-time hard (NP-hard) for any positive integers \u0000<tex>$k$</tex>\u0000 and ℓ while max{k, ℓ} is at least 3. Guided by this negative result, we design an efficient branch-and-bound algorithm with a novel framework. In particular, we introduce a branching strategy based on whether there is a pivot in the current set, with which our proposed algorithm has the time complexity of γ\u0000<sup>n</sup>\u0000n\u0000<sup>O(1)</sup>\u0000, where γ< 2. In addition, we also apply multiple speed-up techniques and various pruning strategies. Finally, we conduct extensive experiments on various real datasets which demonstrate the efficiency of our proposed algorithm in terms of running time.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 2","pages":"569-584"},"PeriodicalIF":6.6,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10786929","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DPN: Dynamics Priori Networks for Radiology Report Generation DPN:用于放射报告生成的动态先验网络
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2024-12-09 DOI: 10.26599/TST.2023.9010134
Bokai Yang;Hongyang Lei;Huazhen Huang;Xinxin Han;Yunpeng Cai
Radiology report generation is of significant importance. Unlike standard image captioning tasks, radiology report generation faces more pronounced visual and textual biases due to constrained data availability, making it increasingly reliant on prior knowledge in this context. In this paper, we introduce a radiology report generation network termed Dynamics Priori Networks (DPN), which leverages a dynamic knowledge graph and prior knowledge. Concretely, we establish an adaptable graph network and harness both medical domain knowledge and expert insights to enhance the model's intelligence. Notably, we introduce an image-text contrastive module and an image-text matching module to enhance the quality of the generated results. Our method is evaluated on two widely available datasets: X-ray collection from Indiana University (IU X-ray) and Medical Information Mart for Intensive Care, Chest X-Ray (MIMIC-CXR), where it demonstrates superior performance, particularly excelling in critical metrics.
放射学报告生成非常重要。与标准的图像标题任务不同,由于数据可用性的限制,放射学报告生成面临着更明显的视觉和文本偏差,因此在这种情况下越来越依赖于先验知识。在本文中,我们介绍了一种称为动态先验网络(DPN)的放射学报告生成网络,它利用了动态知识图谱和先验知识。具体来说,我们建立了一个可适应的图网络,并利用医学领域知识和专家见解来增强模型的智能性。值得注意的是,我们引入了图像-文本对比模块和图像-文本匹配模块,以提高生成结果的质量。我们的方法在两个广泛可用的数据集上进行了评估:我们的方法在两个广泛使用的数据集上进行了评估:印第安纳大学的 X 射线集(IU X-ray)和重症监护医学信息中心的胸部 X 射线集(MIMIC-CXR),在这两个数据集上,我们的方法表现出了卓越的性能,尤其是在关键指标方面。
{"title":"DPN: Dynamics Priori Networks for Radiology Report Generation","authors":"Bokai Yang;Hongyang Lei;Huazhen Huang;Xinxin Han;Yunpeng Cai","doi":"10.26599/TST.2023.9010134","DOIUrl":"https://doi.org/10.26599/TST.2023.9010134","url":null,"abstract":"Radiology report generation is of significant importance. Unlike standard image captioning tasks, radiology report generation faces more pronounced visual and textual biases due to constrained data availability, making it increasingly reliant on prior knowledge in this context. In this paper, we introduce a radiology report generation network termed Dynamics Priori Networks (DPN), which leverages a dynamic knowledge graph and prior knowledge. Concretely, we establish an adaptable graph network and harness both medical domain knowledge and expert insights to enhance the model's intelligence. Notably, we introduce an image-text contrastive module and an image-text matching module to enhance the quality of the generated results. Our method is evaluated on two widely available datasets: X-ray collection from Indiana University (IU X-ray) and Medical Information Mart for Intensive Care, Chest X-Ray (MIMIC-CXR), where it demonstrates superior performance, particularly excelling in critical metrics.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 2","pages":"600-609"},"PeriodicalIF":6.6,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10786932","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Tsinghua Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1