期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
温度对等钳蠊螨捕食腐食酪螨效率的影响 被引量:1
1
作者 郭蕾 郑大睿 吴洪基 《北京农学院学报》 2014年第1期74-76,共3页
等钳蠊螨Blattisocius dentriticus (Berlese)是腐食酪螨Tyrophagus putrescentiae(Schrank)的重要捕食螨,本文作者研究了等钳蠊螨雌成螨在6个温度下对腐食酪螨卵的捕食作用.结果表明,在不同温度下等钳蠊螨雌成螨对腐食酪螨卵的功... 等钳蠊螨Blattisocius dentriticus (Berlese)是腐食酪螨Tyrophagus putrescentiae(Schrank)的重要捕食螨,本文作者研究了等钳蠊螨雌成螨在6个温度下对腐食酪螨卵的捕食作用.结果表明,在不同温度下等钳蠊螨雌成螨对腐食酪螨卵的功能反应均属HollingⅡ型.在17~29℃范围内,等钳蠊螨雌成螨对腐食酪螨卵的瞬间攻击率随温度升高而升高,而处理时间随温度升高而缩短;温度超过29℃时,等钳蠊螨雌成螨对腐食酪螨卵的瞬间攻击率有所下降,处理时间也相应延长.研究结果表明温度对等钳蠊螨对腐食酪螨的捕食效率有着明显的影响. 展开更多
关键词 等钳蠊螨 腐食酪螨 捕食 温度 瞬间攻击率
下载PDF
基于概率模型的云辅助的轻量级无证书认证协议的形式化验证 被引量:2
2
作者 夏奴奴 杨晋吉 +1 位作者 赵淦森 莫晓珊 《计算机科学》 CSCD 北大核心 2019年第8期206-211,共6页
匿名WBANs通信技术是保护互联网用户和服务器间隐私的最有力手段之一,但匿名WBANs无证书认证协议的形式化验证仍是亟待解决的难题。采用概率模型检测的方法对一种基于云辅助的匿名WBANs的轻量级无证书认证协议建立离散时间马尔科夫链模... 匿名WBANs通信技术是保护互联网用户和服务器间隐私的最有力手段之一,但匿名WBANs无证书认证协议的形式化验证仍是亟待解决的难题。采用概率模型检测的方法对一种基于云辅助的匿名WBANs的轻量级无证书认证协议建立离散时间马尔科夫链模型,在协议建模的状态迁移中加入了攻击率,重点对攻击率进行定量分析,用概率计算树逻辑对协议属性进行描述,利用PRISM概率模型检验工具对协议进行定量分析和验证,并且与SIP协议进行性能方面的对比。验证结果表明:在匿名WBANs通信环境下,云辅助的轻量级无证书认证协议各实体间所受攻击率对协议的不可否认性、时延性和有效性有不同程度的影响,控制好攻击率可以提高协议安全性,这对医疗服务质量和实时监测效率的提高以及远程医学的基本需求有着极大的意义。 展开更多
关键词 模型检测 WBANs 攻击率 云辅助的轻量级无证书认证协议 PRISM
下载PDF
基于大数据分析技术的远程网络攻击防御软件开发与设计 被引量:3
3
作者 罗鑫 《信息与电脑》 2021年第19期136-138,共3页
针对攻击防御软件存在攻击拦截率较小的问题,笔者设计并开发一个基于大数据分析技术的远程网络攻击防御软件。首先,按照远程网络的运行模式建立抵御攻击干扰框架,构建一个漏洞攻击验证,利用大数据分析技术选择攻击特征;其次,使用NAPI(Ne... 针对攻击防御软件存在攻击拦截率较小的问题,笔者设计并开发一个基于大数据分析技术的远程网络攻击防御软件。首先,按照远程网络的运行模式建立抵御攻击干扰框架,构建一个漏洞攻击验证,利用大数据分析技术选择攻击特征;其次,使用NAPI(New Application Program Interface)技术与DPDK轮询驱动模式结合的形式,传输攻击属性的数据至大页内存内,输出映射关系的防御激活码,完成对防御软件的开发;最后,搭建远程网络攻击拓扑结构后,准备基于带内遥测技术的防御软件、基于OpenFlow协议的防御软件以及设计的防御软件参与测试。测试结果表明:设计的防御软件产生的攻击拦截率最大,防御效果最佳。 展开更多
关键词 大数据分析技术 远程网络 攻击防御软件 开发与设计 漏洞攻击验证 攻击拦截
下载PDF
异色瓢虫对豌豆修尾蚜的捕食功能反应 被引量:8
4
作者 杜军利 武德功 +2 位作者 黄保宏 黄伟东 王增霞 《草业科学》 CAS CSCD 2018年第7期1772-1779,共8页
为明确捕食性天敌昆虫异色瓢虫(Harmonia axyridis)对豆科植物重大害虫豌豆修尾蚜(Megoura japonica)的猎食能力,本研究在人工气候箱中[温度(24±1)℃,湿度(70%±10%),14h光照∶10h黑暗(14hL∶10hD),针对不同生育阶段的异色瓢... 为明确捕食性天敌昆虫异色瓢虫(Harmonia axyridis)对豆科植物重大害虫豌豆修尾蚜(Megoura japonica)的猎食能力,本研究在人工气候箱中[温度(24±1)℃,湿度(70%±10%),14h光照∶10h黑暗(14hL∶10hD),针对不同生育阶段的异色瓢虫分别设置了7个豌豆修尾蚜的密度梯度进行捕食试验,分析了异色瓢虫对豌豆修尾蚜的捕食功能反应。结果表明,不同生育阶段的异色瓢虫对豌豆修尾蚜的捕食能力差别较大,异色瓢虫雌成虫和4龄幼虫对豌豆修尾蚜的捕食能力较强,日最大捕食量分别为217.39和196.08头·日-1;处理蚜虫的时间较短,分别为0.004 6和0.005 1d。异色瓢虫各个生育阶段的捕食功能反应类型均属于HollingⅡ型圆盘方程;不同生育阶段的异色瓢虫对豌豆修尾蚜的寻找效应随着蚜虫密度的升高而降低。 展开更多
关键词 生物防治 日最大捕食量 捕食能力 寻找效应 蚕豆 处理时间 瞬时攻击率
下载PDF
Network efficiency analysis of Chinese inter-bank market 被引量:1
5
作者 李守伟 何建敏 庄亚明 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期494-497,共4页
The inter-bank market network models are constructed based on the inter-bank credit lending relationships, and the network efficiency characters of the Chinese inter-bank market are studied. Since it is impossible to ... The inter-bank market network models are constructed based on the inter-bank credit lending relationships, and the network efficiency characters of the Chinese inter-bank market are studied. Since it is impossible to obtain the specific credit data among banks, this paper estimates the inter-bank lending matrix based on the partial information of banks. Thus, directed network models of the Chinese inter-bank market are constructed by using the threshold method. The network efficiency measures and the effects of random attacks and selective attacks on the global efficiency of the inter-bank network are analyzed based on the network models of the inter-bank market. Empirical results suggest that the efficiency measures are sensitive to the threshold, and that the global efficiency is little affected by random attacks, while it is highly sensitive to selective attacks. Properties such as inter-bank market network efficiency would be useful for risk management and stability of the inter-bank market. 展开更多
关键词 inter-bank market network efficiency ATTACK
下载PDF
ASSESSMENT OF AIRCRAFT COMBAT SURVIVABILITY ENHANCED BY COMBINED RADAR STEALTH AND ONBOARD ELECTRONIC ATTACK 被引量:1
6
作者 黄俊 武哲 +1 位作者 向锦武 朱荣昌 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2000年第2期150-156,共7页
The combat survivability is an essential factor to be considered in the development of recent military aircraft. Radar stealth and onboard electronic attack are two major techniques for the reduction of aircraft susce... The combat survivability is an essential factor to be considered in the development of recent military aircraft. Radar stealth and onboard electronic attack are two major techniques for the reduction of aircraft susceptibility. A tactical scenario for a strike mission is presented. The effect of aircraft radar cross section on the detection probability of a threat radar, as well as that of onboard jammer, are investigated. The guidance errors of radar guided surface to air missile and anti aircraft artillery, which are disturbed by radar cross section reduction or jammer radiated power and both of them are determined. The probability of aircraft kill given a single shot is calculated and finally the sortie survivability of an attack aircraft in a supposed hostile thread environment worked out. It is demonstrated that the survivability of a combat aircraft will be greatly enhanced by the combined radar stealth and onboard electronic attack, and the evaluation metho dology is effective and applicable. 展开更多
关键词 combat survivability radar cross section electronic attack detection guidance error
下载PDF
在防治玉米虫害方面必须寻找新的替代品
7
《新农药》 2002年第5期13-13,共1页
关键词 防治 玉米 虫害 攻击率 生长季节
下载PDF
Low-Rate DoS Attack Flows Filtering Based on Frequency Spectral Analysis 被引量:4
8
作者 Zhijun Wu Minxiao Wang +1 位作者 Changcan Yan Meng Yue 《China Communications》 SCIE CSCD 2017年第6期98-112,共15页
In frequency domain,the power spectrum of Low-rate denial of service(LDoS) attacks is totally spread into the spectrum of normal traffic.It is a challenging task to detect and filter LDoS attack flows from the normal ... In frequency domain,the power spectrum of Low-rate denial of service(LDoS) attacks is totally spread into the spectrum of normal traffic.It is a challenging task to detect and filter LDoS attack flows from the normal traffic.Based on the analysis of LDoS attack flows and legitimate TCP traffic in time and frequency domains,the periodicity of the TCP traffic and LDoS attack flows is explored to facilitate the research of network traffic processing.Hence,an approach of LDoS attack flow filtering based on frequency spectrum analysis is proposed.In this approach,the TCP traffic and LDoS attack flows are transformed from the time domain into the frequency domain.Then the round-trip time(RTT) is estimated by using frequency domain search method.Analysis of amplitude spectrum shows that TCP traffic energy is mainly concentrated on the points of n/RTT.Therefore,a comb filter using infinite impulse response(IIR) filter is designed to filter out the LDoS attack flows in frequency domain,while most legitimate TCP traffic energy at the points of n/RTT are pass through.Experimental results show that the maximum pass rate for legitimate TCP traffic reaches 92.55%,while the maximum filtration rate of LDoS attack flows reaches 81.36%.The proposed approach can effectively filter the LDoS attack flows while less impact on the legitimate TCP traffic. 展开更多
关键词 low-rate denial of service (ldos) spectrmn analysis infinite impulse response (iir) filter FILTERING
下载PDF
Game Theory Based False Negative Probability of Embedded Watermark Under Unintentional and Steganalysis Attacks 被引量:1
9
作者 HU Ziquan SHE Kun +1 位作者 WANG Jianghua TANG Jianguo 《China Communications》 SCIE CSCD 2014年第5期114-123,共10页
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how... Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 展开更多
关键词 digital watermarking false negative probability game theory watermark capacity steganalysis attack.
下载PDF
Collision-Based Chosen-Message Simple Power Clustering Attack Algorithm 被引量:1
10
作者 陈艾东 许森 +1 位作者 陈运 秦志光 《China Communications》 SCIE CSCD 2013年第5期114-119,共6页
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is dif... Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%. 展开更多
关键词 crypt analysis side channel attack collision attack chosen-message attack clustering algorithm
下载PDF
PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION
11
作者 ZhaoShengmei LiFei ZhengBaoyu 《Journal of Electronics(China)》 2005年第1期85-89,共5页
A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys... A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy. 展开更多
关键词 Attack strategy Quantum Key Distribution(QKD) Probabilistic cloning machine No-cloning theorem
下载PDF
A Website Security Risk Assessment Method Based on the I-BAG Model
12
作者 Lin Liu Liang Liu +2 位作者 Cheng Huang Zhao Zhang Yong Fang 《China Communications》 SCIE CSCD 2016年第5期172-181,共10页
In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesi... In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk. 展开更多
关键词 web security risk assessment attack graph Bayesian network
下载PDF
Research on Route Planning Method Based on Active-Attack Strategy
13
作者 刘新艳 黄显林 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期289-292,共4页
Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good pro... Aimed at modern high-density,high overlapped and powerful antipersonnel stealthy penetration environment,route planning techniques on active-attack strategy were thoroughly and further studied,in order to get good probability of survival and perfect efficiency of task accomplishment.It provides a new thought for and a new solution to the application of route planning in new era. 展开更多
关键词 route planning stealthy penetration active-attack strategy ammunition equivalence curve/line ratio
下载PDF
Cooperative spectrum sensing algorithm based on bilateral threshold selection against Byzantine attack
14
作者 Zhu Hancheng Song Tiecheng +2 位作者 Wu Jun Li Xi Hu Jing 《Journal of Southeast University(English Edition)》 EI CAS 2018年第4期439-443,共5页
To deal with Byzantine attacks in 5 G cognitive radio networks,a bilateral threshold selection-based algorithm is proposed in the spectrum sensing process. In each round,secondary uses( SUs) first submit the energy va... To deal with Byzantine attacks in 5 G cognitive radio networks,a bilateral threshold selection-based algorithm is proposed in the spectrum sensing process. In each round,secondary uses( SUs) first submit the energy values and instantaneous detection signal-to-noise ratios( SNRs) to the fusion center( FC). According to detection SNRs,the FC conducts normalization calculations on the energy values. Then,the FC makes a sort operation for these normalized energy values and traverses all the possible mid-points between these sorted normalized energy values to maximize the classification accuracy of each SU. Finally,by introducing the recognition probability and misclassification probability,the distributions of the normalized energy values are analyzed and the bilateral threshold of classification accuracy is obtained via a target misclassification probability. Hence,the blacklist of malicious secondary users( MSUs) is obtained. Simulation results show that the proposed scheme outperforms the current mainstream schemes in correct sensing probability,false alarm probability and detection probability. 展开更多
关键词 cognitive radio Byzantine attack bilateral threshold misclassification probability recognition probability
下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
15
作者 LI Jianwu FENG Zebing +1 位作者 FENG Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
下载PDF
虫龄对蠋蝽捕食斜纹夜蛾幼虫行为参数的影响 被引量:19
16
作者 杨志浩 孟玲 李保平 《生态学杂志》 CAS CSCD 北大核心 2019年第11期3376-3381,共6页
捕食行为是评价捕食性天敌控制害虫作用的重要依据,常用的数学模型估计捕食行为参数或者在没有植物存在的微生境中直接观测捕食行为的方法,往往会高估或低估捕食性天敌的控害作用。为评价龄期如何影响蠋蝽(Arma chinensis)对斜纹夜蛾(Sp... 捕食行为是评价捕食性天敌控制害虫作用的重要依据,常用的数学模型估计捕食行为参数或者在没有植物存在的微生境中直接观测捕食行为的方法,往往会高估或低估捕食性天敌的控害作用。为评价龄期如何影响蠋蝽(Arma chinensis)对斜纹夜蛾(Spodoptera litura)幼虫的捕食作用,本研究将蠋蝽不同龄期若虫(2、3、4和5龄)和斜纹夜蛾不同龄期幼虫(1、2、3和4龄)交叉组合为16个处理,接至盆栽大豆(Glycine max)苗上,连续观测蠋蝽若虫的捕食行为,分析在遭遇不同龄期猎物时蠋蝽若虫的捕食行为随自身龄期增大的变化趋势。结果表明:在遭遇1、2或4龄斜纹夜蛾幼虫时,蠋蝽若虫的处理猎物时间随自身龄期增大表现出二次方曲线下降的趋势;在遭遇3龄幼虫时,处理时间表现出三次方曲线性下降的趋势。在遭遇2、3或4龄斜纹夜蛾幼虫时,蠋蝽若虫的捕食量随自身龄期增长表现出直线增大的趋势;在遭遇1龄幼虫时捕食量表现出"中间高两端低"的变化趋势。蠋蝽若虫的刺扎次数不受自身龄期的影响,仅受斜纹夜蛾幼虫龄期的影响。在遭遇2龄斜纹夜蛾幼虫时,蠋蝽若虫的捕食成功率仅随自身龄期增大呈直线上升趋势;在遭遇1、3、4龄幼虫时,捕食成功率与自身龄期无关。研究结果说明,在利用捕食行为参数评价蠋蝽对斜纹夜蛾幼虫的捕食作用时,需同时考虑蠋蝽和猎物的虫龄大小。 展开更多
关键词 蠋蝽 功能反应 捕食者-猎物互作 捕食性蝽 处理时间 攻击率
原文传递
Ultraviolet reflection enhances the risk of predation in a vertebrate
17
作者 Ricarda MODARRESSIE IngolfE RICK Theo C. M. BAKKER 《Current Zoology》 SCIE CAS CSCD 2013年第2期151-159,共9页
Many animals are sensitive to ultraviolet light and also possess UV-reflective regions on their body surface. Individu- als reflecting UV have been shown to be preferred during social interactions such as mate choice ... Many animals are sensitive to ultraviolet light and also possess UV-reflective regions on their body surface. Individu- als reflecting UV have been shown to be preferred during social interactions such as mate choice or shoaling decisions. However, whether those body UV-reflections enhance also the conspicuousness to UV-sensitive predators and thereforeentail costs for its bearer is less well documented. Two size-matched three-spined sticklebacks Gasterosteus aculeatus, one enclosed in a UV-transmitting (UV+) and another in a UV-blocking (UV-) chamber, were simultaneously presented to individual brown trout Salmo trutta. "yearlings". Brown trout of this age are sensitive to the UV part of the electromagnetic spectnun and are natural predators of three-spined sticklebacks. The stickleback that was attacked first as well as the subsequent number of attacks was recorded. Sticklebacks enclosed in the UV-transmitting chamber were attacked first significantly more often compared to stickle- backs enclosed in the UV-blocking chamber. Control experiments using neutral density filters revealed that this was more likely due to LrV having an influence on hue perception rather than brighmess discrimination. The difference in attack probability cor- responded to the difference in chromatic contrasts between sticklebacks and the experimental background calculated for both the UV+ and UV- conditions in a physiological model of trout colour vision. UV reflections seem to be costly by enhancing the risk of predation due to an increased conspicuousness of prey. This is the first study in a vertebrate, to our knowledge, demonstrating direct predation risk due to UV wavelengths [Current Zoology 59 (2): 151-159, 2013]. 展开更多
关键词 UV vision Brown trout Salmo trutta Ultraviolet reflection Three-spined stickleback Gasterosteus aculeatus Pre-dation risk
原文传递
Relative reactivities of halogen-substituted substrates (R-Br,R-C1) toward the halophilic attack by a carbanion
18
作者 傅伟敏 张晓军 蒋锡夔 《Science China Chemistry》 SCIE EI CAS 2001年第4期337-343,共7页
Relative reactivities of bromine-substituted substrates (R-Br) or chlorine-substituted substrates (R-CI) toward bromophilic or chlorophilic attack by a carbanion have been evaluated by the intermolecular competition k... Relative reactivities of bromine-substituted substrates (R-Br) or chlorine-substituted substrates (R-CI) toward bromophilic or chlorophilic attack by a carbanion have been evaluated by the intermolecular competition kinetics. Relative reactivity orders are CF3CFBr2 >CF3CBr3≥CBr4 > CHBr3 > CF3CFBrCF2Br > CF2Br2 > BrCF2CF2Br > BrCH2CO2Et≥ BrCF2CFHBr > CH2Br2 > BrCH2CH2Br, and CI3CNO2 > CI3CCN > CI3CCOPh > cyclo-C5CI6> CI3CCOCI > CCI3CF2CI > CCI3CF3 ≥ CCI4 > CCI3CCI3 ≥ CCI3(CF2)2CI > CI3CCOCCI3 > CCI3(CF2)6CI > CI3CCO2Et > CI3CF > CI3CPh>CI3CCH2O2CCH3. 展开更多
关键词 relative reactivities halogen-substituted substrates relative rates of halophilic attacks intermolecular competition kinetics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部