首页 > 最新文献

IEEE Transactions on Reliability最新文献

英文 中文
A Review of Prognostics Methods for Electronic Packages: From a Structure-Aware System-Level Perspective 电子封装预测方法综述:从结构感知的系统级视角
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-24 DOI: 10.1109/TR.2025.3558449
Zihan Zhang;Alina Gorbunova;Keunho Rhew;Jianjun Shi
Prognostics for electronic packages is an evolving field critical to predicting the reliability and lifespan of electronic systems. This article proposes a novel “structure-aware system-level (SASL)” approach, addressing the limitations of traditional methods that treat components or subsystems as isolated black boxes. SASL examines how individual component degradation propagates, interacts within the package structure, and collectively determines the system's lifetime. The article reviews three key areas: component-level prognostics, package structure, and system-level analysis, offering guidance for future research. It advocates interdisciplinary collaboration to develop practical and interpretable prognostics methods, driving innovation in industries reliant on complex electronic systems.
电子封装预测是一个不断发展的领域,对预测电子系统的可靠性和寿命至关重要。本文提出了一种新颖的“结构感知系统级(SASL)”方法,解决了传统方法将组件或子系统视为孤立的黑盒的局限性。SASL检查单个组件的退化如何传播,如何在包结构中相互作用,以及如何共同决定系统的生命周期。本文回顾了三个关键领域:组件级预测、包结构和系统级分析,为未来的研究提供了指导。它提倡跨学科合作,开发实用和可解释的预测方法,推动依赖复杂电子系统的行业的创新。
{"title":"A Review of Prognostics Methods for Electronic Packages: From a Structure-Aware System-Level Perspective","authors":"Zihan Zhang;Alina Gorbunova;Keunho Rhew;Jianjun Shi","doi":"10.1109/TR.2025.3558449","DOIUrl":"https://doi.org/10.1109/TR.2025.3558449","url":null,"abstract":"Prognostics for electronic packages is an evolving field critical to predicting the reliability and lifespan of electronic systems. This article proposes a novel “structure-aware system-level (SASL)” approach, addressing the limitations of traditional methods that treat components or subsystems as isolated black boxes. SASL examines how individual component degradation propagates, interacts within the package structure, and collectively determines the system's lifetime. The article reviews three key areas: component-level prognostics, package structure, and system-level analysis, offering guidance for future research. It advocates interdisciplinary collaboration to develop practical and interpretable prognostics methods, driving innovation in industries reliant on complex electronic systems.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"4116-4130"},"PeriodicalIF":5.7,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-Grained Code Clone Detection by Keywords-Based Connection of Program Dependency Graph 基于关键字连接的程序依赖图细粒度代码克隆检测
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-17 DOI: 10.1109/TR.2025.3550747
Yueming Wu;Wenqi Suo;Siyue Feng;Cong Wu;Deqing Zou;Hai Jin
Code clone detection is intended to identify functionally similar code fragments, a matter of escalating significance in contemporary software engineering. Numerous methodologies have been proffered for the detection of code clones, among which graph-based approaches exhibit efficacy in addressing semantic code clones. However, they all only consider the feature extraction of a single sample and ignore the semantic connection between different samples, resulting in the detection effect being unsatisfactory. Simultaneously, the majority of existing methods can only ascertain the presence of clones, lacking the capability to provide nuanced insights into which lines of code exhibit greater similarity. In this article, we advocate a novel PDG-based semantic clone detection method, namely, Keybor which can locate specific cloned lines of code by providing a fine-grained analysis of clone pairs. The highlight of the approach is to consider keywords as a bridge to connect PDG nodes of the target program to retain more semantic information about the functional code. To examine the effectiveness of Keybor, we assess it on a widely used BigCloneBench dataset. Experimental results indicate that Keybor is superior to 14 advanced code clone detection tools (i.e., CCAligner, SourcererCC, Siamese, NIL, NiCad, LVMapper, CCFinder, CloneWorks, Oreo, Deckard, CCGraph, Code2Img, GPT-3.5-turbo, and GPT-4).
代码克隆检测旨在识别功能相似的代码片段,这在当代软件工程中具有越来越重要的意义。已有许多方法用于检测代码克隆,其中基于图的方法在处理语义代码克隆方面表现出有效性。然而,它们都只考虑单个样本的特征提取,忽略了不同样本之间的语义联系,导致检测效果不理想。同时,大多数现有的方法只能确定克隆的存在,缺乏对哪些代码行表现出更大的相似性提供细致洞察的能力。在本文中,我们提倡一种新的基于pdg的语义克隆检测方法,即Keybor,它可以通过对克隆对进行细粒度分析来定位特定的克隆代码行。该方法的重点是将关键字视为连接目标程序的PDG节点的桥梁,以保留有关功能代码的更多语义信息。为了检验Keybor的有效性,我们在一个广泛使用的BigCloneBench数据集上对其进行了评估。实验结果表明,Keybor优于14种高级代码克隆检测工具(CCAligner、SourcererCC、Siamese、NIL、NiCad、LVMapper、CCFinder、CloneWorks、Oreo、Deckard、CCGraph、Code2Img、GPT-3.5-turbo和GPT-4)。
{"title":"Fine-Grained Code Clone Detection by Keywords-Based Connection of Program Dependency Graph","authors":"Yueming Wu;Wenqi Suo;Siyue Feng;Cong Wu;Deqing Zou;Hai Jin","doi":"10.1109/TR.2025.3550747","DOIUrl":"https://doi.org/10.1109/TR.2025.3550747","url":null,"abstract":"Code clone detection is intended to identify functionally similar code fragments, a matter of escalating significance in contemporary software engineering. Numerous methodologies have been proffered for the detection of code clones, among which graph-based approaches exhibit efficacy in addressing semantic code clones. However, they all only consider the feature extraction of a single sample and ignore the semantic connection between different samples, resulting in the detection effect being unsatisfactory. Simultaneously, the majority of existing methods can only ascertain the presence of clones, lacking the capability to provide nuanced insights into which lines of code exhibit greater similarity. In this article, we advocate a novel PDG-based semantic clone detection method, namely, <italic>Keybor</i> which can locate specific cloned lines of code by providing a fine-grained analysis of clone pairs. The highlight of the approach is to consider keywords as a bridge to connect PDG nodes of the target program to retain more semantic information about the functional code. To examine the effectiveness of <italic>Keybor</i>, we assess it on a widely used <italic>BigCloneBench</i> dataset. Experimental results indicate that <italic>Keybor</i> is superior to 14 advanced code clone detection tools (i.e., <italic>CCAligner</i>, <italic>SourcererCC</i>, <italic>Siamese</i>, <italic>NIL</i>, <italic>NiCad</i>, <italic>LVMapper</i>, <italic>CCFinder</i>, <italic>CloneWorks</i>, <italic>Oreo</i>, <italic>Deckard</i>, <italic>CCGraph</i>, <italic>Code2Img</i>, <italic>GPT-3.5-turbo</i>, and <italic>GPT-4</i>).","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3427-3441"},"PeriodicalIF":5.7,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability Study of Critical Structural Redistribution Layers in Advanced Packaging: A Review 先进封装中关键结构重分布层可靠性研究综述
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-11 DOI: 10.1109/TR.2025.3556255
Jiajie Jin;Peisheng Liu;Yaohui Deng;Zhao Zhang
The continuous evolution of semiconductor packaging demands highly reliable redistribution layer (RDL) architectures to support next-generation electronic systems. However, ensuring RDL reliability remains a formidable challenge due to multiphysics interactions, including mechanical stress-induced fatigue, thermal expansion mismatches, and high-frequency signal integrity degradation. This article presents a comprehensive review of RDL reliability across mechanical, thermal, and electrical domains, identifying key failure mechanisms and research gaps. To address these challenges, we introduce an AI-driven optimization framework that integrates machine learning–assisted chip layout optimization, adaptive thermal management, and real-time signal integrity enhancement. Utilizing deep reinforcement learning and graph neural networks, this study demonstrates how AI can dynamically optimize RDL routing, enhance power distribution networks, and mitigate localized heating effects. Furthermore, we explore the integration of AI-driven predictive modeling into electronic design automation tools, enabling real-time multiphysics co-optimization of RDL architectures. This study establishes a structured framework for future research, bridging the gap between theoretical modeling and practical fabrication. By incorporating AI-assisted design methodologies, next-generation RDL architectures can achieve superior reliability, enhanced performance, and improved scalability, supporting applications in 5G communications, high-performance computing, and heterogeneous integration technologies.
半导体封装的不断发展需要高度可靠的再分配层(RDL)架构来支持下一代电子系统。然而,由于多物理场相互作用,包括机械应力引起的疲劳、热膨胀不匹配和高频信号完整性退化,确保RDL的可靠性仍然是一项艰巨的挑战。本文全面回顾了RDL在机械、热学和电气领域的可靠性,确定了关键的失效机制和研究空白。为了应对这些挑战,我们引入了一个人工智能驱动的优化框架,该框架集成了机器学习辅助的芯片布局优化、自适应热管理和实时信号完整性增强。利用深度强化学习和图形神经网络,本研究展示了人工智能如何动态优化RDL路由,增强配电网络,并减轻局部热效应。此外,我们探索了将人工智能驱动的预测建模集成到电子设计自动化工具中,从而实现RDL架构的实时多物理场协同优化。本研究为未来的研究建立了一个结构化的框架,弥合了理论建模和实际制造之间的差距。通过结合人工智能辅助设计方法,下一代RDL架构可以实现卓越的可靠性、增强的性能和改进的可扩展性,支持5G通信、高性能计算和异构集成技术的应用。
{"title":"Reliability Study of Critical Structural Redistribution Layers in Advanced Packaging: A Review","authors":"Jiajie Jin;Peisheng Liu;Yaohui Deng;Zhao Zhang","doi":"10.1109/TR.2025.3556255","DOIUrl":"https://doi.org/10.1109/TR.2025.3556255","url":null,"abstract":"The continuous evolution of semiconductor packaging demands highly reliable redistribution layer (RDL) architectures to support next-generation electronic systems. However, ensuring RDL reliability remains a formidable challenge due to multiphysics interactions, including mechanical stress-induced fatigue, thermal expansion mismatches, and high-frequency signal integrity degradation. This article presents a comprehensive review of RDL reliability across mechanical, thermal, and electrical domains, identifying key failure mechanisms and research gaps. To address these challenges, we introduce an AI-driven optimization framework that integrates machine learning–assisted chip layout optimization, adaptive thermal management, and real-time signal integrity enhancement. Utilizing deep reinforcement learning and graph neural networks, this study demonstrates how AI can dynamically optimize RDL routing, enhance power distribution networks, and mitigate localized heating effects. Furthermore, we explore the integration of AI-driven predictive modeling into electronic design automation tools, enabling real-time multiphysics co-optimization of RDL architectures. This study establishes a structured framework for future research, bridging the gap between theoretical modeling and practical fabrication. By incorporating AI-assisted design methodologies, next-generation RDL architectures can achieve superior reliability, enhanced performance, and improved scalability, supporting applications in 5G communications, high-performance computing, and heterogeneous integration technologies.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3371-3382"},"PeriodicalIF":5.7,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Adaptive System-Level Fault Self-Diagnosis Algorithm and Its Applications 一种新的自适应系统级故障自诊断算法及其应用
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-09 DOI: 10.1109/TR.2025.3553903
Fuxing Liao;Jiafei Liu;Chia-Wei Lee;Sun-Yuan Hsieh;Jingli Wu
With the application and rapid development of high-performance computing and cloud computing technology, the scale of the interconnection network has appeared to grow exponentially. Network attacks have become increasingly sophisticated and stealthy. To reach a high reliable network system, widespread attention has been paid to fault diagnosis. In this article, we put forward a reliable and adaptive self-diagnosis strategy, the $h$-extra $r$-component conditional diagnosability, denoted by $ct_{r}^{h}(G)$. Then, we provide a theoretical derivation to characterize the $h$-extra $r$-component conditional diagnosability of bubble sort networks $B_{n}$ under the PMC model. Furthermore, we develop a fast and adaptive fault self-diagnosis algorithm FAFD-PMC to detect all faulty units. Extensive experiments are implemented and applied to synthetic networks and real networks in terms of accuracy (ACCR), true negative rate, false positive rate, recall, and precision, which demonstrates the ACCR/efficiency of our algorithm.
随着高性能计算和云计算技术的应用和快速发展,互联网络的规模呈指数级增长。网络攻击变得越来越复杂和隐蔽。为了实现网络系统的高可靠性,故障诊断技术受到了广泛的关注。本文提出了一种可靠的自适应自诊断策略,即$h$-额外$r$-分量条件可诊断性,用$ct_{r}^{h}(G)$表示。然后,我们给出了PMC模型下泡排序网络$B_{n}$ h$-额外$r$-分量条件可诊断性的理论推导。在此基础上,提出了一种快速、自适应的故障自诊断算法FAFD-PMC。在合成网络和真实网络中进行了大量的实验,并在准确率(ACCR)、真阴性率、假阳性率、召回率和精度方面进行了应用,证明了我们的算法的ACCR/效率。
{"title":"A Novel Adaptive System-Level Fault Self-Diagnosis Algorithm and Its Applications","authors":"Fuxing Liao;Jiafei Liu;Chia-Wei Lee;Sun-Yuan Hsieh;Jingli Wu","doi":"10.1109/TR.2025.3553903","DOIUrl":"https://doi.org/10.1109/TR.2025.3553903","url":null,"abstract":"With the application and rapid development of high-performance computing and cloud computing technology, the scale of the interconnection network has appeared to grow exponentially. Network attacks have become increasingly sophisticated and stealthy. To reach a high reliable network system, widespread attention has been paid to fault diagnosis. In this article, we put forward a reliable and adaptive self-diagnosis strategy, the <inline-formula><tex-math>$h$</tex-math></inline-formula>-extra <inline-formula><tex-math>$r$</tex-math></inline-formula>-component conditional diagnosability, denoted by <inline-formula><tex-math>$ct_{r}^{h}(G)$</tex-math></inline-formula>. Then, we provide a theoretical derivation to characterize the <inline-formula><tex-math>$h$</tex-math></inline-formula>-extra <inline-formula><tex-math>$r$</tex-math></inline-formula>-component conditional diagnosability of bubble sort networks <inline-formula><tex-math>$B_{n}$</tex-math></inline-formula> under the PMC model. Furthermore, we develop a fast and adaptive fault self-diagnosis algorithm FAFD-PMC to detect all faulty units. Extensive experiments are implemented and applied to synthetic networks and real networks in terms of accuracy (ACCR), true negative rate, false positive rate, recall, and precision, which demonstrates the ACCR/efficiency of our algorithm.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"4294-4305"},"PeriodicalIF":5.7,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insights From Bugs in FPGA High-Level Synthesis Tools: An Empirical Study of Bambu Bugs FPGA高级合成工具中bug的见解:Bambu bug的实证研究
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-08 DOI: 10.1109/TR.2025.3547739
Zun Wang;He Jiang;Xiaochen Li;Shikai Guo;Xu Zhao;Yi Zhang
High-level synthesis (HLS) tools have been widely used in field-programmable gate array (FPGA) design to convert C/C++ code to hardware description language code. Unfortunately, HLS tools are susceptible to bugs, which can introduce serious vulnerabilities in FPGA products, leading to substantial losses. However, the characteristics of these bugs (e.g., root causes and bug-prone stages) have never been systematically studied, which significantly hinders developers from effectively handling HLS tool bugs. To this end, we conduct the first empirical study to uncover HLS tool bug characteristics. We collect 349 bugs of a widely used HLS tool, namely Bambu. We study the root causes, buggy stages, and bug fixes of these bugs by applying a multiperson collaboration method. Finally, 13 valuable findings are summarized. We find 14 categories of root causes in Bambu bugs; most bugs (22.1%) are caused by incorrect implementation of IR processing; the front end of Bambu is more bug-prone; to fix these bugs, 2.27 files and 80.19 lines of code need to be modified on average. We also present the insights gained from 95 Vitis HLS bugs. From these findings, we suggest that developers could use an on-the-fly code generator configuration method to generate suitable testing programs for HLS tool bug detection and apply large language models to assist in fixing HLS tool bugs.
高级综合(High-level synthesis, HLS)工具广泛应用于现场可编程门阵列(FPGA)设计中,用于将C/ c++代码转换为硬件描述语言代码。不幸的是,HLS工具容易受到错误的影响,这可能会在FPGA产品中引入严重的漏洞,导致巨大的损失。然而,这些bug的特征(例如,根本原因和bug易发阶段)从未被系统地研究过,这极大地阻碍了开发人员有效地处理HLS工具bug。为此,我们进行了首次实证研究,揭示了HLS工具的bug特征。我们收集了一个被广泛使用的HLS工具Bambu的349个bug。我们通过应用多人协作方法研究这些错误的根源、错误阶段和错误修复。最后,总结了13个有价值的发现。我们在Bambu bug中发现了14类根本原因;大多数错误(22.1%)是由于不正确地实现IR处理引起的;Bambu的前端更容易出现bug;为了修复这些bug,平均需要修改2.27个文件和80.19行代码。我们还介绍了从95个Vitis HLS漏洞中获得的见解。根据这些发现,我们建议开发人员可以使用动态代码生成器配置方法来生成适合HLS工具错误检测的测试程序,并应用大型语言模型来帮助修复HLS工具错误。
{"title":"Insights From Bugs in FPGA High-Level Synthesis Tools: An Empirical Study of Bambu Bugs","authors":"Zun Wang;He Jiang;Xiaochen Li;Shikai Guo;Xu Zhao;Yi Zhang","doi":"10.1109/TR.2025.3547739","DOIUrl":"https://doi.org/10.1109/TR.2025.3547739","url":null,"abstract":"High-level synthesis (HLS) tools have been widely used in field-programmable gate array (FPGA) design to convert C/C++ code to hardware description language code. Unfortunately, HLS tools are susceptible to bugs, which can introduce serious vulnerabilities in FPGA products, leading to substantial losses. However, the characteristics of these bugs (e.g., root causes and bug-prone stages) have never been systematically studied, which significantly hinders developers from effectively handling HLS tool bugs. To this end, we conduct the first empirical study to uncover HLS tool bug characteristics. We collect 349 bugs of a widely used HLS tool, namely Bambu. We study the root causes, buggy stages, and bug fixes of these bugs by applying a multiperson collaboration method. Finally, 13 valuable findings are summarized. We find 14 categories of root causes in Bambu bugs; most bugs (22.1%) are caused by incorrect implementation of IR processing; the front end of Bambu is more bug-prone; to fix these bugs, 2.27 files and 80.19 lines of code need to be modified on average. We also present the insights gained from 95 Vitis HLS bugs. From these findings, we suggest that developers could use an on-the-fly code generator configuration method to generate suitable testing programs for HLS tool bug detection and apply large language models to assist in fixing HLS tool bugs.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3341-3355"},"PeriodicalIF":5.7,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stealthy Query-Efficient OpaqueAttack Against Interpretable Deep Learning 针对可解释深度学习的隐形查询高效不透明攻击
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-02 DOI: 10.1109/TR.2025.3551717
Eldor Abdukhamidov;Mohammed Abuhamad;Simon S. Woo;Eric Chan-Tin;Tamer Abuhmed
Deep neural network (DNN) models are susceptible to adversarial samples in white-box and opaqueenvironments. Although previous studies have shown high attack success rates, coupling DNN models with interpretation models could offer a sense of security when a human expert is involved. However, in white-box environments, interpretable deep learning systems (IDLSes) have been shown to be vulnerable to malicious manipulations. As access to the components of IDLSes is limited in opaquesettings, it becomes more challenging for the adversary to fool the system. In this work, we propose a Query-efficient Score-based opaque attack against IDLSes, which requires no knowledge of the target model and its coupled interpretation model. By continuously refining the adversarial samples created based on feedback scores from the IDLS, our approach effectively reduces the number of model queries and navigates the search space to identify perturbations that can fool the system. We evaluate the attack's effectiveness on four convolutional neural network (CNN) models and two interpretation models, using both ImageNet and CIFAR datasets. Our results show that the proposed approach is query-efficient with a high attack success rate that can reach more than 95%, and an average transferability success rate of 69%. We have also demonstrated that our attack is resilient against various preprocessing defense techniques.
深度神经网络(DNN)模型在白盒和不透明环境中容易受到对抗性样本的影响。虽然之前的研究表明攻击成功率很高,但当有人类专家参与时,将DNN模型与解释模型相结合可以提供一种安全感。然而,在白盒环境中,可解释深度学习系统(IDLSes)已被证明容易受到恶意操纵。由于对idlse组件的访问在不透明设置中受到限制,攻击者要欺骗系统变得更具挑战性。在这项工作中,我们提出了一种针对idlse的基于查询效率分数的不透明攻击,该攻击不需要了解目标模型及其耦合解释模型。通过不断改进基于IDLS反馈分数创建的对抗性样本,我们的方法有效地减少了模型查询的数量,并导航搜索空间以识别可能欺骗系统的扰动。我们使用ImageNet和CIFAR数据集,在四种卷积神经网络(CNN)模型和两种解释模型上评估了攻击的有效性。结果表明,该方法具有较高的查询效率,攻击成功率可达95%以上,平均可转移成功率为69%。我们还证明了我们的攻击对各种预处理防御技术具有弹性。
{"title":"Stealthy Query-Efficient OpaqueAttack Against Interpretable Deep Learning","authors":"Eldor Abdukhamidov;Mohammed Abuhamad;Simon S. Woo;Eric Chan-Tin;Tamer Abuhmed","doi":"10.1109/TR.2025.3551717","DOIUrl":"https://doi.org/10.1109/TR.2025.3551717","url":null,"abstract":"Deep neural network (DNN) models are susceptible to adversarial samples in white-box and opaqueenvironments. Although previous studies have shown high attack success rates, coupling DNN models with interpretation models could offer a sense of security when a human expert is involved. However, in white-box environments, interpretable deep learning systems (IDLSes) have been shown to be vulnerable to malicious manipulations. As access to the components of IDLSes is limited in opaquesettings, it becomes more challenging for the adversary to fool the system. In this work, we propose a <italic>Qu</i>ery-efficient <italic>Score</i>-based opaque attack against IDLSes, which requires no knowledge of the target model and its coupled interpretation model. By continuously refining the adversarial samples created based on feedback scores from the IDLS, our approach effectively reduces the number of model queries and navigates the search space to identify perturbations that can fool the system. We evaluate the attack's effectiveness on four convolutional neural network (CNN) models and two interpretation models, using both ImageNet and CIFAR datasets. Our results show that the proposed approach is query-efficient with a high attack success rate that can reach more than 95%, and an average transferability success rate of 69%. We have also demonstrated that our attack is resilient against various preprocessing defense techniques.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3484-3498"},"PeriodicalIF":5.7,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Physical-Statistical Framework on Complex Mechanical System Fault Isolation 复杂机械系统故障隔离的物理统计框架
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-01 DOI: 10.1109/TR.2025.3549216
Bingxin Yan;Qiuzhuang Sun;Lijuan Shen;Xiaobing Ma
Supervisory control and data acquisition (SCADA) data from a complex mechanical system, such as a high-speed train power bogie, nonpower bogie, and wind turbine, are widely used for anomaly detection and fault isolation. The SCADA data include measurements of process variables and exogenous covariates for key components in the system. The process variables refer to the performance characteristics of the key component while the exogenous covariates are working loads or working conditions of the complex mechanical system. Dominated by such physical mechanisms as dynamic motion laws of the system, there are complex relationships between the process variables and covariates, that complicate anomaly detection and fault isolation. To solve this problem, we propose a framework that integrates physical knowledge and statistical learning. We first build a spline model to capture the relationship between process variables and exogenous covariates. To make the model interpretable, we use physical knowledge to impose constraints on the model parameters. We then conduct anomaly detection at a system level based on the physical-statistical regression model. Once an anomaly is detected, we propose a Lasso-based method to isolate the faulty components. Our fault isolation method does not require historical failure data or knowing the true number of faulty components. Real-world case studies on power bogies from high-speed trains illustrate the advantages of our framework: the best benchmark achieves at least 2.50% lower F1-score in anomaly detection and 6.01% lower F1-score in fault isolation compared to our method.
高速列车动力转向架、非动力转向架、风力发电机组等复杂机械系统的监控与数据采集(SCADA)数据被广泛用于异常检测和故障隔离。SCADA数据包括系统中关键组件的过程变量和外生协变量的测量。过程变量是指关键部件的性能特征,外生协变量是指复杂机械系统的工作载荷或工作条件。在系统动态运动规律等物理机制的主导下,过程变量和协变量之间存在复杂的关系,给异常检测和故障隔离带来了困难。为了解决这个问题,我们提出了一个整合物理知识和统计学习的框架。我们首先建立一个样条模型来捕捉过程变量和外生协变量之间的关系。为了使模型可解释,我们使用物理知识对模型参数施加约束。然后,我们根据物理统计回归模型在系统级进行异常检测。一旦检测到异常,我们提出了一种基于lasso的方法来隔离故障组件。我们的故障隔离方法不需要历史故障数据,也不需要知道故障部件的真实数量。对高速列车动力转向架的实际案例研究表明了我们的框架的优势:与我们的方法相比,最佳基准在异常检测方面至少降低了2.50%的f1分数,在故障隔离方面至少降低了6.01%的f1分数。
{"title":"A Physical-Statistical Framework on Complex Mechanical System Fault Isolation","authors":"Bingxin Yan;Qiuzhuang Sun;Lijuan Shen;Xiaobing Ma","doi":"10.1109/TR.2025.3549216","DOIUrl":"https://doi.org/10.1109/TR.2025.3549216","url":null,"abstract":"Supervisory control and data acquisition (SCADA) data from a complex mechanical system, such as a high-speed train power bogie, nonpower bogie, and wind turbine, are widely used for anomaly detection and fault isolation. The SCADA data include measurements of process variables and exogenous covariates for key components in the system. The process variables refer to the performance characteristics of the key component while the exogenous covariates are working loads or working conditions of the complex mechanical system. Dominated by such physical mechanisms as dynamic motion laws of the system, there are complex relationships between the process variables and covariates, that complicate anomaly detection and fault isolation. To solve this problem, we propose a framework that integrates physical knowledge and statistical learning. We first build a spline model to capture the relationship between process variables and exogenous covariates. To make the model interpretable, we use physical knowledge to impose constraints on the model parameters. We then conduct anomaly detection at a system level based on the physical-statistical regression model. Once an anomaly is detected, we propose a Lasso-based method to isolate the faulty components. Our fault isolation method does not require historical failure data or knowing the true number of faulty components. Real-world case studies on power bogies from high-speed trains illustrate the advantages of our framework: the best benchmark achieves at least 2.50% lower F1-score in anomaly detection and 6.01% lower F1-score in fault isolation compared to our method.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"4091-4105"},"PeriodicalIF":5.7,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience Assessment for Hybrid AC/DC Cyber-Physical Power Systems Under Cascading Failures 级联故障下交直流网络物理混合电力系统的恢复能力评估
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-01 DOI: 10.1109/TR.2025.3550523
Kaishun Xiahou;Wei Du;Xingye Xu;Zhenjia Lin;Yang Liu;Zhaoxi Liu;Qiuwei Wu
This article presents a resilience assessment approach for hybrid ac/dc cyber-physical power system (CPPS), proposing a comprehensive assessment index called cascading failure recovery index (CFRI) that simultaneously considers the system scale and load level in the cascading failure recovery process. First, correlation characteristic matrix-based modeling framework is developed to capture the characteristics of multidimensional heterogeneous power systems, providing a clear description of the cyber-physical coupling network. Besides, the proposed CFRI incorporates cyber-physical coordinated attacks to assess the robustness of hybrid ac/dc power systems under different attack scenarios. The CFRI takes into account the number of nodes, branches, and load levels, enabling an accurate assessment of the disconnection degree and recovery capability of CPPS in case of cascading failures. Finally, simulation studies are conducted on a IEEE 39-bus power system modified with dc transmission lines to validate the effectiveness of the proposed method.
本文提出了一种交直流网络物理混合电力系统(CPPS)的弹性评估方法,提出了一种同时考虑系统规模和级联故障恢复过程中的负荷水平的综合评估指标——级联故障恢复指数(CFRI)。首先,建立了基于相关特征矩阵的多维异构电力系统建模框架,对信息物理耦合网络进行了清晰的描述。此外,所提出的CFRI纳入了网络物理协同攻击,以评估混合交直流电力系统在不同攻击场景下的鲁棒性。CFRI综合考虑了节点数量、分支数量和负载级别,能够准确评估CPPS在级联故障情况下的断连程度和恢复能力。最后,在采用直流输电线路改造的IEEE 39总线电力系统上进行了仿真研究,验证了所提方法的有效性。
{"title":"Resilience Assessment for Hybrid AC/DC Cyber-Physical Power Systems Under Cascading Failures","authors":"Kaishun Xiahou;Wei Du;Xingye Xu;Zhenjia Lin;Yang Liu;Zhaoxi Liu;Qiuwei Wu","doi":"10.1109/TR.2025.3550523","DOIUrl":"https://doi.org/10.1109/TR.2025.3550523","url":null,"abstract":"This article presents a resilience assessment approach for hybrid ac/dc cyber-physical power system (CPPS), proposing a comprehensive assessment index called cascading failure recovery index (CFRI) that simultaneously considers the system scale and load level in the cascading failure recovery process. First, correlation characteristic matrix-based modeling framework is developed to capture the characteristics of multidimensional heterogeneous power systems, providing a clear description of the cyber-physical coupling network. Besides, the proposed CFRI incorporates cyber-physical coordinated attacks to assess the robustness of hybrid ac/dc power systems under different attack scenarios. The CFRI takes into account the number of nodes, branches, and load levels, enabling an accurate assessment of the disconnection degree and recovery capability of CPPS in case of cascading failures. Finally, simulation studies are conducted on a IEEE 39-bus power system modified with dc transmission lines to validate the effectiveness of the proposed method.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3442-3453"},"PeriodicalIF":5.7,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Meaningful Issue–Solution Pair From Collaborative Developer Live Chats 从协作开发人员实时聊天中提取有意义的问题-解决方案对
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-04-01 DOI: 10.1109/TR.2025.3550412
Jiawen Shen;Shikai Guo;Longfeng Chen;Chen Wu;Hui Li;Chenchen Li
The live chats of developers often contain meaningful information in the form of issue–solution pairs. The issue–solution pairs can offer helpful references to others who seek solutions for the similar issues, which can improve software development efficiency by facilitating issue solving. However, previous approaches such as ISPY still struggle with unsatisfactory extraction accuracy, due to the entanglement and complexity of issue-solution pairs' feature information. To address these challenges, we propose an approach named IS-Hunter for mining issue-solution pairs from real-time chat data. Specifically, IS-Hunter consists of four main components: the data preprocessing component disentangles and denoises raw chat logs, the utterance embedding component embeds utterances into vectors that subsequent components can easily process, the feature extraction component obtains textual, heuristic, and contextual feature that determines whether an utterance is topic-relevant, and the issue–solution pair prediction component predicts the utterance whether is an issue or a solution. The experimental results show that the performance of IS-Hunter outperforms the baseline methods in issue-detection and solution-extraction in terms of Precision, Recall, and F1-score. Compared with baseline methods, in issue-detection, IS-Hunter, respectively, achieves an average precision, recall, and F1-score of 0.74, 0.74, and 0.74, and it marks an obvious 4.23% improvement over the state-of-the-art approaches. Simultaneously, in solution-extraction, IS-Hunter achieves an average precision, recall, and F1-score of 0.83, 0.90, and 0.86 which is 4.88% higher than the best baseline methods.
开发人员的实时聊天通常以问题-解决方案对的形式包含有意义的信息。问题-解决对可以为其他寻求类似问题解决方案的人提供有益的参考,从而通过促进问题的解决来提高软件开发效率。然而,由于问题-解决方案对特征信息的纠缠性和复杂性,先前的方法如ISPY仍然难以达到令人满意的提取精度。为了应对这些挑战,我们提出了一种名为IS-Hunter的方法,用于从实时聊天数据中挖掘问题-解决方案对。具体来说,is - hunter由四个主要组件组成:数据预处理组件对原始聊天日志进行解卷积和去噪;话语嵌入组件将话语嵌入到后续组件可以轻松处理的向量中;特征提取组件获取文本、启发式和上下文特征,确定话语是否与主题相关;问题-解决方案对预测组件预测话语是问题还是解决方案。实验结果表明,IS-Hunter在问题检测和解决方案提取方面的精度、召回率和f1分数均优于基线方法。与基线方法相比,在问题检测方面,IS-Hunter的平均准确率、召回率和f1得分分别为0.74、0.74和0.74,比目前最先进的方法提高了4.23%。同时,在溶液提取方面,is - hunter的平均精密度、召回率和f1分数分别为0.83、0.90和0.86,比最佳基线方法提高了4.88%。
{"title":"Extracting Meaningful Issue–Solution Pair From Collaborative Developer Live Chats","authors":"Jiawen Shen;Shikai Guo;Longfeng Chen;Chen Wu;Hui Li;Chenchen Li","doi":"10.1109/TR.2025.3550412","DOIUrl":"https://doi.org/10.1109/TR.2025.3550412","url":null,"abstract":"The live chats of developers often contain meaningful information in the form of issue–solution pairs. The issue–solution pairs can offer helpful references to others who seek solutions for the similar issues, which can improve software development efficiency by facilitating issue solving. However, previous approaches such as ISPY still struggle with unsatisfactory extraction accuracy, due to the entanglement and complexity of issue-solution pairs' feature information. To address these challenges, we propose an approach named <italic>IS-Hunter</i> for mining issue-solution pairs from real-time chat data. Specifically, <italic>IS-Hunter</i> consists of four main components: the data preprocessing component disentangles and denoises raw chat logs, the utterance embedding component embeds utterances into vectors that subsequent components can easily process, the feature extraction component obtains textual, heuristic, and contextual feature that determines whether an utterance is topic-relevant, and the issue–solution pair prediction component predicts the utterance whether is an issue or a solution. The experimental results show that the performance of IS-Hunter outperforms the baseline methods in issue-detection and solution-extraction in terms of Precision, Recall, and F1-score. Compared with baseline methods, in issue-detection, IS-Hunter, respectively, achieves an average precision, recall, and F1-score of 0.74, 0.74, and 0.74, and it marks an obvious 4.23% improvement over the state-of-the-art approaches. Simultaneously, in solution-extraction, IS-Hunter achieves an average precision, recall, and F1-score of 0.83, 0.90, and 0.86 which is 4.88% higher than the best baseline methods.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3600-3614"},"PeriodicalIF":5.7,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FNS-CATF-CAC: An Efficient Crosstalk Avoidance Code to Reduce the Switching Activity in TSV Arrays FNS-CATF-CAC:一种有效的串扰避免码,以减少TSV阵列中的切换活动
IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-03-31 DOI: 10.1109/TR.2025.3550972
Chen Wei;Xiaole Cui
The through silicon via (TSV) arrays play the role of vertical electrical interconnections in the 3-D stacked integrated circuits. However, the coupling crosstalk between the adjacent TSVs increases the interconnection delay and deteriorates the signal integrity in TSV arrays. The crosstalk avoidance code (CAC) techniques based on the Fibonacci numeral system (FNS) or the improved FNS are capable of mitigating the crosstalk in TSV arrays, but the existing schemes are hindered by the hardware overhead, crosstalk suppression ability and switching activity. This article proposes the FNS-based cyclic adjacent transition free CAC with the ouroboros mapping rule for the rectangular and hexagonal TSV arrays. The proposed scheme can reduce the crosstalk even in the presence of the edge effect. Compared with the previous methods, the proposed scheme consumes significantly small hardware overhead in large-scale arrays. And the proposed method can reduce the switching activity on TSVs, thereby alleviating the power consumption in TSV arrays.
通过硅孔(TSV)阵列在三维堆叠集成电路中起着垂直电互连的作用。然而,相邻TSV之间的耦合串扰增加了TSV阵列的互连延迟,降低了信号的完整性。基于斐波那契数系统(FNS)或改进FNS的串扰避免码(CAC)技术能够缓解TSV阵列中的串扰,但现有方案受硬件开销、串扰抑制能力和切换活动的限制。针对矩形和六边形TSV阵列,提出了一种基于fns的循环相邻无跃迁CAC算法。该方案可以在存在边缘效应的情况下减小串扰。与以前的方法相比,该方案在大规模阵列中消耗的硬件开销明显小。该方法可以减少TSV上的开关活动,从而降低TSV阵列的功耗。
{"title":"FNS-CATF-CAC: An Efficient Crosstalk Avoidance Code to Reduce the Switching Activity in TSV Arrays","authors":"Chen Wei;Xiaole Cui","doi":"10.1109/TR.2025.3550972","DOIUrl":"https://doi.org/10.1109/TR.2025.3550972","url":null,"abstract":"The through silicon via (TSV) arrays play the role of vertical electrical interconnections in the 3-D stacked integrated circuits. However, the coupling crosstalk between the adjacent TSVs increases the interconnection delay and deteriorates the signal integrity in TSV arrays. The crosstalk avoidance code (CAC) techniques based on the Fibonacci numeral system (FNS) or the improved FNS are capable of mitigating the crosstalk in TSV arrays, but the existing schemes are hindered by the hardware overhead, crosstalk suppression ability and switching activity. This article proposes the FNS-based cyclic adjacent transition free CAC with the ouroboros mapping rule for the rectangular and hexagonal TSV arrays. The proposed scheme can reduce the crosstalk even in the presence of the edge effect. Compared with the previous methods, the proposed scheme consumes significantly small hardware overhead in large-scale arrays. And the proposed method can reduce the switching activity on TSVs, thereby alleviating the power consumption in TSV arrays.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 3","pages":"3856-3870"},"PeriodicalIF":5.7,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144998073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Reliability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1