We present Merlion, a system that enables end-users to build custom mobile applications by creating mashups from existing desktop applications. The original application executes on a machine running remote desktop software (such as VNC server) without any modifications. Users can utilize the Merlion Designer to select relevant visual regions of the original application and create an alternate layout that is more suitable to their circumstances (e.g. taking the screen real-estate of their mobile device into account). Once the custom application has been designed, the user can utilize the Merlion Runtime (running on the user's mobile device) to interact with their custom application. Merlion can improve user productivity by simplifying user interfaces, automate repetitive actions, make applications available across different mobile form factors, and can allow applications that work on different OS platforms to operate in concert. In this paper, we describe the design of the Merlion system, details of our initial prototype, and discussion of the benefits and challenges of our approach.
{"title":"Enabling mobile application mashups with Merlion","authors":"Iqbal Mohomed","doi":"10.1145/1734583.1734602","DOIUrl":"https://doi.org/10.1145/1734583.1734602","url":null,"abstract":"We present Merlion, a system that enables end-users to build custom mobile applications by creating mashups from existing desktop applications. The original application executes on a machine running remote desktop software (such as VNC server) without any modifications. Users can utilize the Merlion Designer to select relevant visual regions of the original application and create an alternate layout that is more suitable to their circumstances (e.g. taking the screen real-estate of their mobile device into account). Once the custom application has been designed, the user can utilize the Merlion Runtime (running on the user's mobile device) to interact with their custom application. Merlion can improve user productivity by simplifying user interfaces, automate repetitive actions, make applications available across different mobile form factors, and can allow applications that work on different OS platforms to operate in concert. In this paper, we describe the design of the Merlion system, details of our initial prototype, and discussion of the benefits and challenges of our approach.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"22 1","pages":"72-77"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84398597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeffrey Bickford, Ryan O'Hare, A. Baliga, V. Ganapathy, L. Iftode
Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems. In this paper, we focus on the threat posed by smart phone rootkits. Rootkits are malware that stealthily modify operating system code and data to achieve malicious goals, and have long been a problem for desktops. We use three example rootkits to show that smart phones are just as vulnerable to rootkits as desktop operating systems. However, the ubiquity of smart phones and the unique interfaces that they expose, such as voice, GPS and battery, make the social consequences of rootkits particularly devastating. We conclude the paper by identifying the challenges that need to be addressed to effectively detect rootkits on smart phones.
{"title":"Rootkits on smart phones: attacks, implications and opportunities","authors":"Jeffrey Bickford, Ryan O'Hare, A. Baliga, V. Ganapathy, L. Iftode","doi":"10.1145/1734583.1734596","DOIUrl":"https://doi.org/10.1145/1734583.1734596","url":null,"abstract":"Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems.\u0000 In this paper, we focus on the threat posed by smart phone rootkits. Rootkits are malware that stealthily modify operating system code and data to achieve malicious goals, and have long been a problem for desktops. We use three example rootkits to show that smart phones are just as vulnerable to rootkits as desktop operating systems. However, the ubiquity of smart phones and the unique interfaces that they expose, such as voice, GPS and battery, make the social consequences of rootkits particularly devastating. We conclude the paper by identifying the challenges that need to be addressed to effectively detect rootkits on smart phones.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"14 1","pages":"49-54"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87947496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Location-based social applications (LBSAs) rely on the location coordinates of the users to provide services. Today, smartphones using these applications act as simple clients and send out user locations to untrusted third-party servers. These servers have the application logic to provide the service, and in the process collect large amounts of user location information over time. This design, however, is shown to be susceptible to large-scale user privacy compromises even if several location cloaking techniques are employed. In this position paper, we argue that the LBSAs should adapt an approach where the untrusted third-party servers are treated simply as encrypted data stores, and the application functionality be moved to the client devices. The location coordinates are encrypted, when shared, and can be decrypted only by the users that the data is intended for. This approach significantly improves user location privacy. We argue that this approach not only improves privacy, but it is also flexible enough to support a wide variety of location-based applications used today. In this paper, we identify the key building blocks necessary to construct the applications in this approach, give examples of using the building blocks by constructing several applications, and outline the privacy properties provided by this approach. We believe our approach provides a practical alternative design for LBSAs that is deployable today.
{"title":"Preserving privacy in location-based mobile social applications","authors":"Krishna P. N. Puttaswamy, Ben Y. Zhao","doi":"10.1145/1734583.1734585","DOIUrl":"https://doi.org/10.1145/1734583.1734585","url":null,"abstract":"Location-based social applications (LBSAs) rely on the location coordinates of the users to provide services. Today, smartphones using these applications act as simple clients and send out user locations to untrusted third-party servers. These servers have the application logic to provide the service, and in the process collect large amounts of user location information over time. This design, however, is shown to be susceptible to large-scale user privacy compromises even if several location cloaking techniques are employed. In this position paper, we argue that the LBSAs should adapt an approach where the untrusted third-party servers are treated simply as encrypted data stores, and the application functionality be moved to the client devices. The location coordinates are encrypted, when shared, and can be decrypted only by the users that the data is intended for. This approach significantly improves user location privacy. We argue that this approach not only improves privacy, but it is also flexible enough to support a wide variety of location-based applications used today. In this paper, we identify the key building blocks necessary to construct the applications in this approach, give examples of using the building blocks by constructing several applications, and outline the privacy properties provided by this approach. We believe our approach provides a practical alternative design for LBSAs that is deployable today.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"51 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peter Gilbert, Landon P. Cox, Jaeyeon Jung, D. Wetherall
Commodity mobile devices have been utilized as sensor nodes in a variety of domains, including citizen journalism, mobile social services, and domestic eldercare. In each of these domains, data integrity and device-owners' privacy are first-class concerns, but current approaches to secure sensing fail to balance these properties. External signing infrastructure cannot attest to the values generated by a device's sensing hardware, while trusted sensing hardware does not allow users to securely reduce the fidelity of readings in order to preserve their privacy. In this paper we examine the challenges posed by the potentially conflicting goals of data integrity and user privacy and propose a trustworthy mobile sensing platform which leverages inexpensive commodity Trusted Platform Module (TPM) hardware.
{"title":"Toward trustworthy mobile sensing","authors":"Peter Gilbert, Landon P. Cox, Jaeyeon Jung, D. Wetherall","doi":"10.1145/1734583.1734592","DOIUrl":"https://doi.org/10.1145/1734583.1734592","url":null,"abstract":"Commodity mobile devices have been utilized as sensor nodes in a variety of domains, including citizen journalism, mobile social services, and domestic eldercare. In each of these domains, data integrity and device-owners' privacy are first-class concerns, but current approaches to secure sensing fail to balance these properties. External signing infrastructure cannot attest to the values generated by a device's sensing hardware, while trusted sensing hardware does not allow users to securely reduce the fidelity of readings in order to preserve their privacy. In this paper we examine the challenges posed by the potentially conflicting goals of data integrity and user privacy and propose a trustworthy mobile sensing platform which leverages inexpensive commodity Trusted Platform Module (TPM) hardware.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"46 9 1","pages":"31-36"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82762182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Hull, X. Liu, B. Erol, J. Graham, Jorge Moraleda
We argue that the most desirable architecture for mobile image recognition runs the complete algorithm on the mobile device. Alternative solutions that run the recognizer on a remote server will not be as desirable because of the delay between image capture and receipt of a result that can cause users to abandon the technique. We present a method for mobile recognition of paper documents and an application to newspapers that lets readers retrieve electronic data linked to articles, photos, and advertisements. We show that the index for a reasonable collection of daily newspapers can be downloaded in less than a minute and will fit in the memory of today's mid-range smart phones. Experimental results show that the recognition system has an overall error rate of less than 1%. We achieved a run time of 1.2 secs. per image with a collection of 140 newspaper pages on an HTC-8282 Windows Mobile phone.
我们认为移动图像识别最理想的架构是在移动设备上运行完整的算法。在远程服务器上运行识别器的替代解决方案并不理想,因为图像捕获和接收结果之间的延迟可能导致用户放弃该技术。我们提出了一种移动识别纸质文档的方法和一种报纸应用程序,让读者检索与文章、照片和广告相关的电子数据。我们展示了一个合理的日报集合的索引可以在不到一分钟的时间内下载,并且将适合今天的中档智能手机的内存。实验结果表明,该识别系统的总体错误率小于1%。我们实现了1.2秒的运行时间。在HTC-8282 Windows Mobile手机上收集140个报纸页面的图片。
{"title":"Mobile image recognition: architectures and tradeoffs","authors":"J. Hull, X. Liu, B. Erol, J. Graham, Jorge Moraleda","doi":"10.1145/1734583.1734604","DOIUrl":"https://doi.org/10.1145/1734583.1734604","url":null,"abstract":"We argue that the most desirable architecture for mobile image recognition runs the complete algorithm on the mobile device. Alternative solutions that run the recognizer on a remote server will not be as desirable because of the delay between image capture and receipt of a result that can cause users to abandon the technique. We present a method for mobile recognition of paper documents and an application to newspapers that lets readers retrieve electronic data linked to articles, photos, and advertisements. We show that the index for a reasonable collection of daily newspapers can be downloaded in less than a minute and will fit in the memory of today's mid-range smart phones. Experimental results show that the recognition system has an overall error rate of less than 1%. We achieved a run time of 1.2 secs. per image with a collection of 140 newspaper pages on an HTC-8282 Windows Mobile phone.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"20 1","pages":"84-88"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73027897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera. This paper presents a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We present two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.
{"title":"I am a sensor, and I approve this message","authors":"S. Saroiu, A. Wolman","doi":"10.1145/1734583.1734593","DOIUrl":"https://doi.org/10.1145/1734583.1734593","url":null,"abstract":"Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera.\u0000 This paper presents a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We present two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"36 1","pages":"37-42"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88814836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing architectures for the generation and verification of such location proofs have limited flexibility. For example, they do not support the proactive gathering of location proofs, where, at the time of acquiring a location proof, a user does not yet know for which application or service she will use this proof. Supporting proactive location proofs is challenging because these proofs might enable proof issuers to track a user or they might violate a user's location privacy by revealing more information about a user's location than strictly necessary to an application. We present six essential design goals that a flexible location proof architecture should meet. Furthermore, we introduce a location proof architecture that realizes our design goals and that includes user anonymity and location privacy as key design components, as opposed to previous proposals. Finally, we demonstrate how some of the design goals can be achieved by adopting proper cryptographic techniques.
{"title":"Proving your location without giving up your privacy","authors":"Wanying Luo, U. Hengartner","doi":"10.1145/1734583.1734586","DOIUrl":"https://doi.org/10.1145/1734583.1734586","url":null,"abstract":"Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing architectures for the generation and verification of such location proofs have limited flexibility. For example, they do not support the proactive gathering of location proofs, where, at the time of acquiring a location proof, a user does not yet know for which application or service she will use this proof. Supporting proactive location proofs is challenging because these proofs might enable proof issuers to track a user or they might violate a user's location privacy by revealing more information about a user's location than strictly necessary to an application. We present six essential design goals that a flexible location proof architecture should meet. Furthermore, we introduce a location proof architecture that realizes our design goals and that includes user anonymity and location privacy as key design components, as opposed to previous proposals. Finally, we demonstrate how some of the design goals can be achieved by adopting proper cryptographic techniques.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"80 1 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89428410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Networked devices like desktop computers and mobile phones make it possible for people to access any of the billions of web pages available on the Internet. However, mobile devices are fundamentally different from desktop PCs in terms of input speeds, screen size, and network speeds, making it harder in practice to find information when on the go. In this paper, we introduce GurunGo, a system that monitors a person's activities on their PC for mobile data types---kinds of data likely to be useful to a person when mobile---and then proactively copies these snippets of data onto his mobile device, thus making it easier to find that information when mobile. Our initial prototype finds and extracts mobile data types from web pages that are browsed on a desktop computer, annotates it with additional relevant information, and copies it to a mobile device in the background. We discuss the design and implementation of GurunGo, as well as some of the tradeoffs and design rationale.
{"title":"GurunGo: coupling personal computers and mobile devices through mobile data types","authors":"I. González, Jason I. Hong","doi":"10.1145/1734583.1734600","DOIUrl":"https://doi.org/10.1145/1734583.1734600","url":null,"abstract":"Networked devices like desktop computers and mobile phones make it possible for people to access any of the billions of web pages available on the Internet. However, mobile devices are fundamentally different from desktop PCs in terms of input speeds, screen size, and network speeds, making it harder in practice to find information when on the go. In this paper, we introduce GurunGo, a system that monitors a person's activities on their PC for mobile data types---kinds of data likely to be useful to a person when mobile---and then proactively copies these snippets of data onto his mobile device, thus making it easier to find that information when mobile. Our initial prototype finds and extracts mobile data types from web pages that are browsed on a desktop computer, annotates it with additional relevant information, and copies it to a mobile device in the background. We discuss the design and implementation of GurunGo, as well as some of the tradeoffs and design rationale.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"9 1","pages":"66-71"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87121483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Hosio, Marko Jurmu, Hannu Kukka, J. Riekki, T. Ojala
Proliferation of large public displays in urban cityscape gives rise to applications distributed between public displays and mobile devices. However, real deployment of distributed applications on top of this new infrastructure is challenging as no commonly accepted architectural solutions exist to rely on. In this paper, we present a platform supporting distributed application user interfaces on interactive large public screens and personal mobile devices. We demonstrate the functionality and potential of our approach by presenting a deployment of the platform with multiple distributed applications in authentic setting in a city center. We found this platform feasible to deploy interactive, appealing services on top of, and a non-cost information pick-up service as the most appealing to users.
{"title":"Supporting distributed private and public user interfaces in urban environments","authors":"S. Hosio, Marko Jurmu, Hannu Kukka, J. Riekki, T. Ojala","doi":"10.1145/1734583.1734590","DOIUrl":"https://doi.org/10.1145/1734583.1734590","url":null,"abstract":"Proliferation of large public displays in urban cityscape gives rise to applications distributed between public displays and mobile devices. However, real deployment of distributed applications on top of this new infrastructure is challenging as no commonly accepted architectural solutions exist to rely on. In this paper, we present a platform supporting distributed application user interfaces on interactive large public screens and personal mobile devices. We demonstrate the functionality and potential of our approach by presenting a deployment of the platform with multiple distributed applications in authentic setting in a city center. We found this platform feasible to deploy interactive, appealing services on top of, and a non-cost information pick-up service as the most appealing to users.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"74 2 1","pages":"25-30"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88258152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The first GSM standard was published in 1989 [10], fully two decades ago. Since then, cryptanalysis has weakened or broken significant parts of the original specification. Yet many of these compromised pieces remain in common use, particularly throughout the developing world. This state of affairs presents a significant risk given the recent proliferation of high visibility and high value targets within the branchless banking space in the developing world such as M-PESA, GCASH, mChek, and Zap, each of which makes use of SIM Toolkit (STK) security measures, but in an obfuscated manner. This paper will present an overview of recent developments in GSM security and outline the need for increased cooperation and standardization in the face of rapidly eroding security measures currently in place for 2G GSM.
{"title":"Stragglers of the herd get eaten: security concerns for GSM mobile banking applications","authors":"Michael Paik","doi":"10.1145/1734583.1734597","DOIUrl":"https://doi.org/10.1145/1734583.1734597","url":null,"abstract":"The first GSM standard was published in 1989 [10], fully two decades ago. Since then, cryptanalysis has weakened or broken significant parts of the original specification. Yet many of these compromised pieces remain in common use, particularly throughout the developing world.\u0000 This state of affairs presents a significant risk given the recent proliferation of high visibility and high value targets within the branchless banking space in the developing world such as M-PESA, GCASH, mChek, and Zap, each of which makes use of SIM Toolkit (STK) security measures, but in an obfuscated manner.\u0000 This paper will present an overview of recent developments in GSM security and outline the need for increased cooperation and standardization in the face of rapidly eroding security measures currently in place for 2G GSM.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"279 1","pages":"54-59"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84660957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}