期刊文献+
共找到2,208篇文章
< 1 2 111 >
每页显示 20 50 100
DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks
1
作者 Wenlong Ke Zilong Li +5 位作者 Peiyu Chen Benfeng Chen Jinglin Lv Qiang Wang Ziyi Jia Shigen Shen 《Computers, Materials & Continua》 2025年第8期3305-3319,共15页
Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Define... Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Defined Network(SDN)provides solutions through centralized control and dynamic resource allocation,but the existing scheduling methods based on Deep Reinforcement Learning(DRL)are insufficient in terms of convergence speed and dynamic optimization capability.To solve these problems,this paper proposes DRL-AMIR,which is an efficient flow scheduling method for software defined ZTN.This method constructs a flow scheduling optimization model that comprehensively considers service delay,bandwidth occupation,and path hops.Additionally,it balances the differentiated requirements of delay-critical K-flows,bandwidth-intensive D-flows,and background B-flows through adaptiveweighting.Theproposed framework employs a customized state space comprising node labels,link bandwidth,delaymetrics,and path length.It incorporates an action space derived fromnode weights and a hybrid reward function that integrates both single-step and multi-step excitation mechanisms.Based on these components,a hierarchical architecture is designed,effectively integrating the data plane,control plane,and knowledge plane.In particular,the adaptive expert mechanism is introduced,which triggers the shortest path algorithm in the training process to accelerate convergence,reduce trial and error costs,and maintain stability.Experiments across diverse real-world network topologies demonstrate that DRL-AMIR achieves a 15–20%reduction in K-flow transmission delays,a 10–15%improvement in link bandwidth utilization compared to SPR,QoSR,and DRSIR,and a 30%faster convergence speed via adaptive expert mechanisms. 展开更多
关键词 Zero trust network software-defined networking deep reinforcement learning flow scheduling
在线阅读 下载PDF
Weapon system selection based on trust network and probabilistic hesitant fuzzy entropy
2
作者 JIA Qingyang DOU Yajie +2 位作者 XIANG Nan MA Yufeng YANG Kewei 《Journal of Systems Engineering and Electronics》 CSCD 2024年第6期1469-1481,共13页
In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selec-tion,a multi-attribute decision-making(MADM)method based on probabilistic hesitant fuzzy set(PHFS)is p... In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selec-tion,a multi-attribute decision-making(MADM)method based on probabilistic hesitant fuzzy set(PHFS)is proposed.Firstly,we introduce the concept of probability and fuzzy entropy to mea-sure the ambiguity,hesitation and uncertainty of probabilistic hesitant fuzzy elements(PHFEs).Sequentially,the expert trust network is constructed,and the importance of each expert in the network can be obtained by calculating the cumulative trust value under multiple trust propagation paths,so as to obtain the expert weight vector.Finally,we put forward an MADM method combining the probabilistic hesitant fuzzy entropy and grey rela-tion analysis(GRA)model,and an illustrative case is employed to prove the feasibility and effectiveness of the method when solving the weapon system selection decision-making problem. 展开更多
关键词 weapon system selection multi-attribute decision making(MADM) probabilistic hesitant fuzzy set(PHFS) trust network
在线阅读 下载PDF
Static and Dynamic Structure Characteristics of a Trust Network and Formation of User Trust in an Online Society
3
作者 Ying Li Hongduo Cao Ying Zhang 《Social Networking》 2018年第4期197-219,共23页
This study investigated the characteristics and formation of the online social trust network of Epinions.com, a general consumer review site. An analysis of the static structure of this social trust network revealed a... This study investigated the characteristics and formation of the online social trust network of Epinions.com, a general consumer review site. An analysis of the static structure of this social trust network revealed a high clustering coefficient, short average path length, and power-law degree distribution;it is therefore a small-world and scale-free trust network. The dynamic evolutionary characteristics of the online social network (OSN) were also examined. The results showed that the scale of the network followed a sigmoidal curve;the average degree of the network was nonconstant and changed into a bell-shaped distribution;the density of the network decreased and subsequently stabilized;and user trust diffusion in the network conformed to the Bass model. Finally, the formation of trust within the network was researched at the overall network (macro) and individual user (micro) levels. Compared with their accumulated contribution and reputation, user activeness had a larger effect on trust formation in OSNs, indicating a “diminishing returns” phenomenon. This phenomenon contrasts with the Matthew effect (i.e. , the more reputation a person has, the more likely he or she is to be trusted) in real-world social networks. 展开更多
关键词 trust network STATIC Structure Dynamic Evolution trust FORMATION Diminishing Returns
在线阅读 下载PDF
Consensus model for probabilistic linguistic multi-attribute group decision-making based on incomplete social trust networks
4
作者 Kaiying Kang Jialiang Xie +1 位作者 Xiaohui Liu Jianxiang Qiu 《International Journal of Intelligent Computing and Cybernetics》 2024年第4期844-868,共25页
Purpose-Experts may adjust their assessments through communication and mutual influence,and this dynamic evolution relies on the spread of internal trust relationships.Due to differences in educational backgrounds and... Purpose-Experts may adjust their assessments through communication and mutual influence,and this dynamic evolution relies on the spread of internal trust relationships.Due to differences in educational backgrounds and knowledge experiences,trust relationships among experts are often incomplete.To address such issues and reduce decision biases,this paper proposes a probabilistic linguistic multi-attribute group decision consensus model based on an incomplete social trust network(InSTN).Design/methodology/approach-In this paper,we first define the new trust propagation operators based on the operations of Probability Language Term Set(PLTS)with algebraic t-conorm and t-norm,which are combined with trust aggregation operators to estimate InSTN.The adjustment coefficients are then determined through trust relations to quantify their impact on expert evaluation.Finally,the particle swarm algorithm(PSO)is used to optimize the expert evaluation to meet the consensus threshold.Findings-This study demonstrates the feasibility of the method through the selection of treatment plans for complex cases.The proposed consensus model exhibits greater robustness and effectiveness compared to traditional methods,mainly due to the effective regulation of trust relations in the decision-making process,which reduces decision bias and inconsistencies.Originality/value-This paper introduces a novel probabilistic linguistic multi-attribute swarm decision consensus model based on an InSTN.It proposes a redefined trust propagation and aggregation approach to estimate the InSTN.Moreover,the computational efficiency and decision consensus accuracy of the proposed model are enhanced by using PSO optimization. 展开更多
关键词 Probabilistic linguistic term Incomplete social trust networks Particle swarm optimization algorithms Decision consensus
在线阅读 下载PDF
Building trust networks in the absence of trust relations 被引量:2
5
作者 Xin WANG Ying WANG Jian-hua GUO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第10期1591-1600,共10页
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media platfo... User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media platforms.These issues pose a great challenge for predicting trust relations and further building trust networks. In this study,we investigate whether we can predict trust relations via a sparse learning model, and propose to build a trust network without trust relations using only pervasively available interaction data and homophily effect in an online world. In particular, we analyze the reliability of predicting trust relations by interaction behaviors, and provide a principled way to mathematically incorporate interaction behaviors and homophily effect in a novel framework,b Trust. Results of experiments on real-world datasets from Epinions and Ciao demonstrated the effectiveness of the proposed framework. Further experiments were conducted to understand the importance of interaction behaviors and homophily effect in building trust networks. 展开更多
关键词 trust network Sparse learning Homophily effect Interaction behaviors
原文传递
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
6
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
在线阅读 下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
7
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
在线阅读 下载PDF
Security Model Research Based on Trusted Computing in Ad Hoc Network 被引量:2
8
作者 林筑英 刘晓杰 +2 位作者 卢林 师蕾 谢刚 《China Communications》 SCIE CSCD 2011年第4期1-10,共10页
With the rapid development of wireless networks,the Ad Hoc networks are widely used in many fields,but the current network security solutions for the Ad Hoc network are not competitive enough.So the critical technolog... With the rapid development of wireless networks,the Ad Hoc networks are widely used in many fields,but the current network security solutions for the Ad Hoc network are not competitive enough.So the critical technology of Ad Hoc network applications shall be how to implement the security scheme.Here the discussions are focused on the specific solution against the security threats which the Ad Hoc networks will face,the methodology of a management model which uses trusted computing technology to solve Ad Hoc network security problems,and the analysis and verification for the security of this model. 展开更多
关键词 Ad Hoc network trusted computing network security
在线阅读 下载PDF
Development of Trusted Network and Challenges It Faces 被引量:3
9
作者 Lin Chuang 1, Wang Yuanzhuo 1, Tian Liqin 1,2 (1. Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China 2. Department of Computer, North China Institute of Science and Technology, Beijing 101601, China) 《ZTE Communications》 2008年第1期13-17,共5页
As the information network plays a more and more important role globally, the traditional network theories and technologies, especially those related to network security, can no longer meet the network development req... As the information network plays a more and more important role globally, the traditional network theories and technologies, especially those related to network security, can no longer meet the network development requirements. Offering the system with secure and trusted services has become a new focus in network research. This paper first discusses the meaning of and aspects involved in the trusted network. According to this paper, the trusted network should be a network where the network’s and users’ behaviors and their results are always predicted and manageable. The trustworthiness of a network mainly involves three aspects: service provider, information transmission and terminal user. This paper also analyzes the trusted network in terms of trusted model for network/user behaviors, architecture of trusted network, service survivability and network manageability, which is designed to give ideas on solving the problems that may be faced in developing the trusted network. 展开更多
关键词 Development of trusted network and Challenges It Faces
在线阅读 下载PDF
Trust Degree of Web Services and Its Evaluation with Neural Network 被引量:2
10
作者 HUANG Baohua HU Heping LU Zhengding YAO Hanbing LI Ruixuan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1302-1305,共4页
The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the... The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the method, applicable neural network structure, neural network construc ting, input standardization, training sample constructing, and the procedure of evaluating trust degree of Web services with trained neural network are described. Experiments show that it is feasible and effective to evaluate trust degree of Web Service with neural network. 展开更多
关键词 Web services trust degree neural network
在线阅读 下载PDF
Trust-Based Context-Aware Mobile Social Network Service Recommendation 被引量:4
11
作者 XU Jun ZHONG Yuansheng +1 位作者 ZHU Wenqiang SUN Feifei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期149-156,共8页
The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M... The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity. 展开更多
关键词 trust CONTEXT-AWARE mobile social network RECOMMENDATION
原文传递
An Extended Hierarchical Trusted Model for Wireless Sensor Networks 被引量:1
12
作者 DU Ruiying XU Mingdi ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1489-1492,共4页
Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading... Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward an extended hierarchical trusted architecture for wireless sensor network, and establishes trusted congregations by three-tier framework. The method combines statistics, economics with encrypt mechanism for developing two trusted models which evaluate cluster head nodes and common sensor nodes respectively. The models form logical trusted-link from command node to common sensor nodes and guarantees the network can run in secure and reliable circumstance. 展开更多
关键词 wireless sensor networks SECURITY trust REPUTATION
在线阅读 下载PDF
Social Networking Approach for Building Trust in E-commerce 被引量:1
13
作者 Mohammad H. Saraee Azar Shahgholian Parisa Mazrooei 《通讯和计算机(中英文版)》 2010年第6期49-53,共5页
关键词 社会网络 电子商务 信任度 网络方法 网上交易 业务功能 交易方式 集群化
在线阅读 下载PDF
METrust: A Mutual Evaluation-based Trust Model for P2P Networks 被引量:3
14
作者 Chun-Ling Cheng Xiao-Long Xu Bing-Zhen Gao 《International Journal of Automation and computing》 EI 2012年第1期63-71,共9页
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo... It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors. 展开更多
关键词 Peer-to-peer (P2P) network REPUTATION trust model mutual evaluation similarity risk
在线阅读 下载PDF
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model 被引量:5
15
作者 FU Cai HONG Fan LI Rui-xian HONG Liang CHEN Jing 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期188-192,共5页
In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public k... In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better. 展开更多
关键词 Ad Hoc networks self-organize bidirectional trust public key management.
在线阅读 下载PDF
Research on the Trusted Energy-Saving Transmission of Data Center Network
16
作者 Yubo Wang Bei Gong Mowei Gong 《China Communications》 SCIE CSCD 2016年第12期139-149,共11页
According to the high operating costs and a large number of energy waste in the current data center network architectures, we propose a kind of trusted flow preemption scheduling combining the energy-saving routing me... According to the high operating costs and a large number of energy waste in the current data center network architectures, we propose a kind of trusted flow preemption scheduling combining the energy-saving routing mechanism based on typical data center network architecture. The mechanism can make the network flow in its exclusive network link bandwidth and transmission path, which can improve the link utilization and the use of the network energy efficiency. Meanwhile, we apply trusted computing to guarantee the high security, high performance and high fault-tolerant routing forwarding service, which helps improving the average completion time of network flow. 展开更多
关键词 data center network architecture energy-saving routing mechanism trusted computing network energy consumption flow average completion time
在线阅读 下载PDF
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
17
作者 Danwei Chen Xizhou Yu Xianghui Dong 《Wireless Sensor Network》 2010年第5期373-380,共8页
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inte... This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption. 展开更多
关键词 WIRELESS Sensor networks BETA trust Model trust ROUTING PROTOCOL network Security trust Evaluation
在线阅读 下载PDF
Antecedents of Social Network Trust in SNS Usage: The Moderating Role of Offline Familiarity
18
作者 Yu Wang 《Social Networking》 2017年第2期107-134,共28页
With the rapid development of social networks, there is a focus on marketing strategies and business models that are based on social media. In the academic world, scholars believe that online trust is a key factor con... With the rapid development of social networks, there is a focus on marketing strategies and business models that are based on social media. In the academic world, scholars believe that online trust is a key factor contributing to online purchasing behavior. This article explored several factors in social media trust and verified the moderating role of offline familiarity by using relevant research on online trust in conjunction with a structure equation model. The results show that independent variables such as reputation, SNS interaction, information quality, reciprocity, satisfaction and shared values have a positive influence on trust, whereas perceived similarity does not, and information quality is the most important factor. In addition, offline familiarity significantly moderates the relations between information quality, reciprocity, reputation, shared values and social media trust. This information is important to assist companies in developing an effective social network marketing strategy. 展开更多
关键词 OFFLINE FAMILIARITY SOCIAL network trust MODERATE Structure Equation Modeling
暂未订购
A TRUST MECHANISM-BASED CHANNEL ASSIGNMENT AND ROUTING SCHEME IN COGNITIVE WIRELESS MESH NETWORKS WITH INTRUSION DETECTION 被引量:1
19
作者 Wu Guofeng Zhang Jing He Zhaopan 《Journal of Electronics(China)》 2010年第5期728-734,共7页
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ... Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively. 展开更多
关键词 Cognitive Wireless Mesh networks (CWMN) Intrusion detection trust mechanism Channel assignment ROUTING
在线阅读 下载PDF
A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
20
作者 YU Genjian ZHENG Baoyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1789-1792,共4页
Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the m... Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly. 展开更多
关键词 MANET(mobile ad hoe networks) MULTILEVEL trust algorithm
在线阅读 下载PDF
上一页 1 2 111 下一页 到第
使用帮助 返回顶部