• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:胡锦松

Refining:

Source

Submit Unfold

Co-

Submit Unfold

Language

Submit

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 5 >
Covert Communication in Cognitive Radio Networks with Poisson Distributed Jammers Scopus
期刊论文 | 2024 , 1-1 | IEEE Transactions on Wireless Communications
Abstract&Keyword Cite

Abstract :

This work proposes a covert communication scheme in a cognitive radio network where a secondary transmitter (ST) transmits confidential information to a secondary receiver under the cover of jammers with homogeneous Poisson point process. Specifically, we first analyze the detection performance of the primary transmitter (PT) and Willie under collaboration and non-collaboration modes. We then derive the covert transmission outage probability under ST&#x2019;s correct and incorrect decisions for whether PT transmits or not and obtain the expression for the effective covert rate (ECR). In order to maximize the ECR, we derive the optimal value of the time allocation ratio, based on which, we also derive the optimal value of ST&#x2019;s transmit power subject to the covertness constraint and some power constraints. Our examination shows the non-collaboration mode outperforms the collaboration mode in terms of achieving a higher ECR, because the uncertainty of the PTs transmission in the former one will cause confusion at Willie and lead to an increased detection error rate. In addition, the proposed scheme effectively increases the ECR when compared with the scheme without the jammer. IEEE

Keyword :

Autonomous aerial vehicles Autonomous aerial vehicles cognitive radio cognitive radio Collaboration Collaboration Covert communication Covert communication Error analysis Error analysis Interference Interference jammer jammer Jamming Jamming Poisson point process Poisson point process Radio transmitters Radio transmitters Trajectory Trajectory

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Hu, J. , Li, H. , Chen, Y. et al. Covert Communication in Cognitive Radio Networks with Poisson Distributed Jammers [J]. | IEEE Transactions on Wireless Communications , 2024 : 1-1 .
MLA Hu, J. et al. "Covert Communication in Cognitive Radio Networks with Poisson Distributed Jammers" . | IEEE Transactions on Wireless Communications (2024) : 1-1 .
APA Hu, J. , Li, H. , Chen, Y. , Shu, F. , Wang, J. . Covert Communication in Cognitive Radio Networks with Poisson Distributed Jammers . | IEEE Transactions on Wireless Communications , 2024 , 1-1 .
Export to NoteExpress RIS BibTex

Version :

多跳中继网络隐蔽通信设计与实验分析 PKU
期刊论文 | 2024 , 43 (02) , 13-17 | 实验室研究与探索
Abstract&Keyword Cite

Abstract :

针对随机分布多跳中继网络存在的通信安全问题,提出了一种基于强化学习的智能路径选择方案。该方案考虑单密钥和独立密钥传输2种情况,分别对监测者的检测性能进行了探究,并基于隐蔽约束确定了各中继的最佳功率分配。最后,基于强化学习技术实现了多跳网络传输路径的智能选择,以保证传输的隐蔽性,并最大化系统的隐蔽吞吐量。结果表明,单密钥方案所选路径倾向于绕开监测者所监测的区域,而独立密钥方案所选路径可以穿过监测者的监测区域,并且独立密钥所能达到的系统增益显著优于单密钥。

Keyword :

多跳中继 多跳中继 强化学习 强化学习 路径选择 路径选择 隐蔽通信 隐蔽通信

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 胡锦松 , 吴林梅 , 国明乾 et al. 多跳中继网络隐蔽通信设计与实验分析 [J]. | 实验室研究与探索 , 2024 , 43 (02) : 13-17 .
MLA 胡锦松 et al. "多跳中继网络隐蔽通信设计与实验分析" . | 实验室研究与探索 43 . 02 (2024) : 13-17 .
APA 胡锦松 , 吴林梅 , 国明乾 , 陈由甲 , 赵铁松 . 多跳中继网络隐蔽通信设计与实验分析 . | 实验室研究与探索 , 2024 , 43 (02) , 13-17 .
Export to NoteExpress RIS BibTex

Version :

Covert Transmission via Integrated Sensing and Communication Systems SCIE
期刊论文 | 2024 , 73 (3) , 4441-4446 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Abstract&Keyword Cite

Abstract :

Integrated Sensing and Communication (ISAC) Systems, which can support simultaneous information transmission and target detection, have been regarded as promising solutions for various emerging wireless network applications. In this work, a covert transmission system with the aid of the ISAC technique is proposed, where the radar intends to sense a target and send message to legitimate users covertly against the warden's surveillance with either perfect or imperfect channel state information (CSI) at the warden. We formulate a beamforming optimization problem for the dual-function signal used for sensing and communication to maximize the covert throughput, subject to a covertness constraint, a maximum transmit power constraint, and a radar detection constraint. We then determine the sufficient conditions under which the covert beamforming design problem can be solved by semidefinite relaxation (SDR). Numerical results show that the proposed covert ISAC system can guarantee covert transmission while ensuring a certain level of sensing performance, and there exists a performance trade-off between the considered radar detection and covert transmission.

Keyword :

beamforming design beamforming design Covert communications Covert communications integrated sensing and communication (ISAC) integrated sensing and communication (ISAC)

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Hu, Jinsong , Lin, Qingzhuan , Yan, Shihao et al. Covert Transmission via Integrated Sensing and Communication Systems [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2024 , 73 (3) : 4441-4446 .
MLA Hu, Jinsong et al. "Covert Transmission via Integrated Sensing and Communication Systems" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 73 . 3 (2024) : 4441-4446 .
APA Hu, Jinsong , Lin, Qingzhuan , Yan, Shihao , Zhou, Xiaobo , Chen, Youjia , Shu, Feng . Covert Transmission via Integrated Sensing and Communication Systems . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2024 , 73 (3) , 4441-4446 .
Export to NoteExpress RIS BibTex

Version :

Pareto-Optimal Multiagent Cooperative Caching Relying on Multipolicy Reinforcement Learning SCIE
期刊论文 | 2024 , 11 (5) , 7904-7917 | IEEE INTERNET OF THINGS JOURNAL
Abstract&Keyword Cite

Abstract :

Given the popularity of flawless telepresence and the resultants explosive growth of wireless video applications, besides handling the traffic surge, satisfying the demanding user requirements for video qualities has become another important goal of network operators. Inspired by this, cooperative edge caching intrinsically amalgamated with scalable video coding is investigated. Explicitly, the concept of a Pareto-optimal semi-distributed multiagent multipolicy deep reinforcement learning (SD-MAMP-DRL) algorithm is conceived for managing the cooperation of heterogeneous network nodes. To elaborate, a multipolicy reinforcement learning algorithm is proposed for finding the Pareto-optimal policies during the training phase, which balances the teletraffic versus the user experience tradeoff. Then the optimal policy/solution can be activated during the execution phase by appropriately selecting the associated weighting coefficient according to the dynamically fluctuating network traffic load. Our experimental results show that the proposed SD-MAMP- acrshort DRL algorithm: 1) achieves better performance than the benchmark algorithms and 2) obtains a near-complete Pareto front in various scenarios and selects the optimal solution by adaptively adjusting the above-mentioned pair of objectives.

Keyword :

Cooperative caching Cooperative caching Costs Costs Edge caching Edge caching multiagent reinforcement learning (MARL) multiagent reinforcement learning (MARL) multiobjective optimization multiobjective optimization Pareto front Pareto front Quality of experience Quality of experience Reinforcement learning Reinforcement learning scalable video coding (SVC) scalable video coding (SVC) Servers Servers Training Training Wireless communication Wireless communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Guo, Boyang , Chen, Youjia , Cheng, Peng et al. Pareto-Optimal Multiagent Cooperative Caching Relying on Multipolicy Reinforcement Learning [J]. | IEEE INTERNET OF THINGS JOURNAL , 2024 , 11 (5) : 7904-7917 .
MLA Guo, Boyang et al. "Pareto-Optimal Multiagent Cooperative Caching Relying on Multipolicy Reinforcement Learning" . | IEEE INTERNET OF THINGS JOURNAL 11 . 5 (2024) : 7904-7917 .
APA Guo, Boyang , Chen, Youjia , Cheng, Peng , Ding, Ming , Hu, Jinsong , Hanzo, Lajos . Pareto-Optimal Multiagent Cooperative Caching Relying on Multipolicy Reinforcement Learning . | IEEE INTERNET OF THINGS JOURNAL , 2024 , 11 (5) , 7904-7917 .
Export to NoteExpress RIS BibTex

Version :

Integrated Sensing, Communication and Computation for Over-the-Air Federated Learning in 6G Wireless Networks Scopus
期刊论文 | 2024 , 1-1 | IEEE Internet of Things Journal
Abstract&Keyword Cite

Abstract :

Federated Learning (FL), as a privacy-enhancing distributed learning paradigm, has recently attracted much attention in wireless systems. By providing communication and computation services, the base station (BS) helps participants collaboratively train a shared model without transmitting raw data. Concurrently, with the advent of integrated sensing and communication (ISAC) and the growing demand for sensing services, it is envisioned that BS will simultaneously serve sensing services, as well as communication and computation services, e.g., FL, in future 6G wireless networks. To this end, we provide a novel integrated sensing, communication and computation (ISCC) system, called Fed-ISCC, where BS conducts sensing and FL in the same time-frequency resource, and the over-the-air computation (AirComp) is adopted to enable fast model aggregation. To mitigate the interference between sensing and FL during uplink transmission, we propose a receive beamforming approach. Subsequently, we analyze the convergence of FL in the Fed-ISCC system, which reveals that the convergence of FL is hindered by device selection error and transmission error caused by sensing interference, channel fading and receiver noise. Based on this analysis, we formulate an optimization problem that considers the optimization of transceiver beamforming vectors and device selection strategy, with the goal of minimizing transmission and device selection errors while ensuring the sensing requirement. To address this problem, we propose a joint optimization algorithm that decouples it into two main problems and then solves them iteratively. Simulation results demonstrate that our proposed algorithm is superior to other comparison schemes and nearly attains the performance of ideal FL. IEEE

Keyword :

6G 6G Atmospheric modeling Atmospheric modeling Computational modeling Computational modeling Downlink Downlink Federated learning Federated learning integrated sensing and communication integrated sensing and communication Optimization Optimization over-the-air computation over-the-air computation Radar Radar Task analysis Task analysis Uplink Uplink

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Du, M. , Zheng, H. , Gao, M. et al. Integrated Sensing, Communication and Computation for Over-the-Air Federated Learning in 6G Wireless Networks [J]. | IEEE Internet of Things Journal , 2024 : 1-1 .
MLA Du, M. et al. "Integrated Sensing, Communication and Computation for Over-the-Air Federated Learning in 6G Wireless Networks" . | IEEE Internet of Things Journal (2024) : 1-1 .
APA Du, M. , Zheng, H. , Gao, M. , Feng, X. , Hu, J. , Chen, Y. . Integrated Sensing, Communication and Computation for Over-the-Air Federated Learning in 6G Wireless Networks . | IEEE Internet of Things Journal , 2024 , 1-1 .
Export to NoteExpress RIS BibTex

Version :

Perception-Driven Similarity-Clarity Tradeoff for Image Super-Resolution Quality Assessment EI
期刊论文 | 2024 , 34 (7) , 5897-5907 | IEEE Transactions on Circuits and Systems for Video Technology
Abstract&Keyword Cite

Abstract :

Super-Resolution (SR) algorithms aim to enhance the resolutions of images. Massive deep-learning-based SR techniques have emerged in recent years. In such case, a visually appealing output may contain additional details compared with its reference image. Accordingly, fully referenced Image Quality Assessment (IQA) cannot work well; however, reference information remains essential for evaluating the qualities of SR images. This poses a challenge to SR-IQA: How to balance the referenced and no-reference scores for user perception? In this paper, we propose a Perception-driven Similarity-Clarity Tradeoff (PSCT) model for SR-IQA. Specifically, we investigate this problem from both referenced and no-reference perspectives, and design two deep-learning-based modules to obtain referenced and no-reference scores. We present a theoretical analysis based on Human Visual System (HVS) properties on their tradeoff and also calculate adaptive weights for them. Experimental results indicate that our PSCT model is superior to the state-of-the-arts on SR-IQA. In addition, the proposed PSCT model is also capable of evaluating quality scores in other image enhancement scenarios, such as deraining, dehazing and underwater image enhancement. The source code is available at https://github.com/kekezhang112/PSCT. © 1991-2012 IEEE.

Keyword :

Deep learning Deep learning Demulsification Demulsification Feature extraction Feature extraction Image enhancement Image enhancement Image quality Image quality Job analysis Job analysis Optical resolving power Optical resolving power Quality control Quality control

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhang, Keke , Zhao, Tiesong , Chen, Weiling et al. Perception-Driven Similarity-Clarity Tradeoff for Image Super-Resolution Quality Assessment [J]. | IEEE Transactions on Circuits and Systems for Video Technology , 2024 , 34 (7) : 5897-5907 .
MLA Zhang, Keke et al. "Perception-Driven Similarity-Clarity Tradeoff for Image Super-Resolution Quality Assessment" . | IEEE Transactions on Circuits and Systems for Video Technology 34 . 7 (2024) : 5897-5907 .
APA Zhang, Keke , Zhao, Tiesong , Chen, Weiling , Niu, Yuzhen , Hu, Jinsong , Lin, Weisi . Perception-Driven Similarity-Clarity Tradeoff for Image Super-Resolution Quality Assessment . | IEEE Transactions on Circuits and Systems for Video Technology , 2024 , 34 (7) , 5897-5907 .
Export to NoteExpress RIS BibTex

Version :

Minimizing Vulnerable Region for Near-Field Covert Communication Scopus
期刊论文 | 2024 , 1-6 | IEEE Transactions on Vehicular Technology
Abstract&Keyword Cite

Abstract :

The development of the extremely large-scale antenna array (ELAA) for the upcoming 6G technology indicates the significance of near-field communication. This work performs a near-field analysis to improve covertness when maximum ratio transmission (MRT) is employed with ELAA to send messages to the legitimate user. Specifically, we first derive the covertness constraint of the system by analyzing the beampattern. Based on this constraint, we introduce the concept of the vulnerable region, which is the region where covert communication is not achievable if a potential warden resides there. Furthermore, determining the vulnerable region involves deriving the range of distances by initially fixing the angle dimension, and then utilizing the covertness and the minimum effective throughput constraints to obtain the range of angle. The simulation results illustrate the efficacy of the determined vulnerable region in both distance and angle dimensions. As the azimuth angle or the distance between the legitimate user and the transmitter decreases, the area of the vulnerable region decreases. Additionally, increasing the number of warden&#x0027;s antennas or requiring a higher signal-to-noise ratio for legitimate user will expand the vulnerable region. IEEE

Keyword :

Antennas Antennas Array signal processing Array signal processing Covert communication Covert communication near-field communication near-field communication Signal to noise ratio Signal to noise ratio Throughput Throughput Transmitting antennas Transmitting antennas Vectors Vectors vulnerable region vulnerable region Wireless communication Wireless communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Hu, J. , Zhou, Y. , Zheng, H. et al. Minimizing Vulnerable Region for Near-Field Covert Communication [J]. | IEEE Transactions on Vehicular Technology , 2024 : 1-6 .
MLA Hu, J. et al. "Minimizing Vulnerable Region for Near-Field Covert Communication" . | IEEE Transactions on Vehicular Technology (2024) : 1-6 .
APA Hu, J. , Zhou, Y. , Zheng, H. , Chen, Y. , Shu, F. , Wang, J. . Minimizing Vulnerable Region for Near-Field Covert Communication . | IEEE Transactions on Vehicular Technology , 2024 , 1-6 .
Export to NoteExpress RIS BibTex

Version :

Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks Scopus
期刊论文 | 2024 , 1-1 | IEEE Transactions on Network and Service Management
Abstract&Keyword Cite

Abstract :

Relying on a data-driven methodology, deep learning has emerged as a new approach for dynamic resource allocation in large-scale cellular networks. This paper proposes a knowledge-assisted domain adversarial network to reduce the number of poorly performing base stations (BSs) by dynamically allocating radio resources to meet real-time mobile traffic needs. Firstly, we calculate theoretical inter-cell interference and BS capacity using Voronoi tessellation and stochastic geometry, which are then incorporated into a neural network as key parameters. Secondly, following the practical assessment, a performance classifier evaluates BS performance based on given traffic-resource pairs as either poor or good. Most importantly, we use well-performing BSs as source domain data to reallocate the resources of poorly performing ones through the domain adversarial neural network. Our experimental results demonstrate that the proposed knowledge-assisted domain adversarial resource allocation (KDARA) strategy effectively decreases the number of poorly performing BSs in the cellular network, and in turn, outperforms other benchmark algorithms in terms of both the ratio of poor BSs and radio resource consumption. IEEE

Keyword :

domain adversarial network domain adversarial network Dynamic scheduling Dynamic scheduling knowledge-assisted knowledge-assisted Measurement Measurement Mobile big data Mobile big data Neural networks Neural networks Real-time systems Real-time systems resource allocation resource allocation Resource management Resource management transfer learning transfer learning Transfer learning Transfer learning Wireless networks Wireless networks

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Chen, Y. , Zheng, Y. , Xu, J. et al. Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks [J]. | IEEE Transactions on Network and Service Management , 2024 : 1-1 .
MLA Chen, Y. et al. "Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks" . | IEEE Transactions on Network and Service Management (2024) : 1-1 .
APA Chen, Y. , Zheng, Y. , Xu, J. , Lin, H. , Cheng, P. , Ding, M. et al. Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks . | IEEE Transactions on Network and Service Management , 2024 , 1-1 .
Export to NoteExpress RIS BibTex

Version :

A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles SCIE
期刊论文 | 2024 , 73 (5) , 6954-6967 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Abstract&Keyword Cite

Abstract :

The high-speed movement of Vehicle Users (VUs) in Cognitive Internet of Vehicles (CIoV) causes rapid changes in users location and path loss. In the case of imperfect control channels, the influence of high-speed movement increases the probability of error in sending local spectrum sensing decisions by VUs. On the other hand, Malicious Vehicle Users (MVUs) can launch Spectrum Sensing Data Falsification (SSDF) attacks to deteriorate the spectrum sensing decisions, mislead the final spectrum sensing decisions of Collaborative Spectrum Sensing (CSS), and bring serious security problems to the system. In addition, the high-speed movement can increases the concealment of the MVUs. In this paper, we study the scenario of VUs moving at high speeds, and data transmission in an imperfect control channel, and propose a blockchain-based method to defend against massive SSDF attacks in CIoV networks to prevennt independent and cooperative attacks from MVUs. The proposed method combines blockchain with spectrum sensing and spectrum access, abandons the decision-making mechanism of the Fusion Center (FC) in the traditional CSS, adopts distributed decision-making, and uses Prospect Theory (PT) modeling in the decision-making process, effectively improves the correct rate of final spectrum sensing decision in the case of multiple attacks. The local spectrum sensing decisions of VUs are packaged into blocks and uploaded after the final decision to achieve more accurate and secure spectrum sensing, and then identify MVUs by the reputation value. In addition, a smart contract that changes the mining difficulty of VUs based on their reputation values is proposed. It makes the mining difficulty of MVUs more difficult and effectively limits MVUs' access to the spectrum band. The final simulation results demonstrate the validity and superiority of the proposed method compared with traditional methods.

Keyword :

blockchain blockchain Blockchains Blockchains Cognitive Internet of Vehicles (CIoV) Cognitive Internet of Vehicles (CIoV) Data communication Data communication Decision making Decision making History History Internet of Vehicles Internet of Vehicles prospect theory (PT) prospect theory (PT) Sensors Sensors smart contract smart contract Smart contracts Smart contracts spectrum sensing data falsification (SSDF) attack spectrum sensing data falsification (SSDF) attack

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lin, Ruiquan , Li, Fushuai , Wang, Jun et al. A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2024 , 73 (5) : 6954-6967 .
MLA Lin, Ruiquan et al. "A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 73 . 5 (2024) : 6954-6967 .
APA Lin, Ruiquan , Li, Fushuai , Wang, Jun , Hu, Jinsong , Zhang, Zaichen , Wu, Liang . A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2024 , 73 (5) , 6954-6967 .
Export to NoteExpress RIS BibTex

Version :

Machine Learning Methods for Inferring the Number of UAV Emitters via Massive MIMO Receive Array SCIE
期刊论文 | 2023 , 7 (4) | DRONES
WoS CC Cited Count: 3
Abstract&Keyword Cite

Abstract :

To provide important prior knowledge for the direction of arrival (DOA) estimation of UAV emitters in future wireless networks, we present a complete DOA preprocessing system for inferring the number of emitters via a massive multiple-input multiple-output (MIMO) receive array. Firstly, in order to eliminate the noise signals, two high-precision signal detectors, the square root of the maximum eigenvalue times the minimum eigenvalue (SR-MME) and the geometric mean (GM), are proposed. Compared to other detectors, SR-MME and GM can achieve a high detection probability while maintaining extremely low false alarm probability. Secondly, if the existence of emitters is determined by detectors, we need to further confirm their number. Therefore, we perform feature extraction on the the eigenvalue sequence of a sample covariance matrix to construct a feature vector and innovatively propose a multi-layer neural network (ML-NN). Additionally, the support vector machine (SVM) and naive Bayesian classifier (NBC) are also designed. The simulation results show that the machine learning-based methods can achieve good results in signal classification, especially neural networks, which can always maintain the classification accuracy above 70% with the massive MIMO receive array. Finally, we analyze the classical signal classification methods, Akaike (AIC) and minimum description length (MDL). It is concluded that the two methods are not suitable for scenarios with massive MIMO arrays, and they also have much worse performance than machine learning-based classifiers.

Keyword :

emitter number detection emitter number detection information criterion information criterion machine learning machine learning massive MIMO massive MIMO threshold detection threshold detection unmanned aerial vehicle (UAV) unmanned aerial vehicle (UAV)

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Li, Yifan , Shu, Feng , Hu, Jinsong et al. Machine Learning Methods for Inferring the Number of UAV Emitters via Massive MIMO Receive Array [J]. | DRONES , 2023 , 7 (4) .
MLA Li, Yifan et al. "Machine Learning Methods for Inferring the Number of UAV Emitters via Massive MIMO Receive Array" . | DRONES 7 . 4 (2023) .
APA Li, Yifan , Shu, Feng , Hu, Jinsong , Yan, Shihao , Song, Haiwei , Zhu, Weiqiang et al. Machine Learning Methods for Inferring the Number of UAV Emitters via Massive MIMO Receive Array . | DRONES , 2023 , 7 (4) .
Export to NoteExpress RIS BibTex

Version :

10| 20| 50 per page
< Page ,Total 5 >

Export

Results:

Selected

to

Format:
Online/Total:896/7276410
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1