期刊文献+
共找到41,848篇文章
< 1 2 250 >
每页显示 20 50 100
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
1
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
2
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 Cloud storage data secrecy data integrity smart contracts CRYPTOGRAPHY
下载PDF
Impact of correlated private signals on continuous-time insider trading
3
作者 ZHOU Yonghui XIAO Kai 《运筹学学报(中英文)》 CSCD 北大核心 2024年第3期97-107,共11页
A model of continuous-time insider trading in which a risk-neutral in-sider possesses two imperfect correlated signals of a risky asset is studied.By conditional expectation theory and filtering theory,we first establ... A model of continuous-time insider trading in which a risk-neutral in-sider possesses two imperfect correlated signals of a risky asset is studied.By conditional expectation theory and filtering theory,we first establish three lemmas:normal corre-lation,equivalent pricing and equivalent profit,which can guarantee to turn our model into a model with insider knowing full information.Then we investigate the impact of the two correlated signals on the market equilibrium consisting of optimal insider trading strategy and semi-strong pricing rule.It shows that in the equilibrium,(1)the market depth is constant over time;(2)if the two noisy signals are not linerly correlated,then all private information of the insider is incorporated into prices in the end while the whole information on the asset value can not incorporated into prices in the end;(3)if the two noisy signals are linear correlated such that the insider can infer the whole information of the asset value,then our model turns into a model with insider knowing full information;(4)if the two noisy signals are the same then the total ex ant profit of the insider is increasing with the noise decreasing,while down to O as the noise going up to infinity;(5)if the two noisy signals are not linear correlated then with one noisy signal fixed,the total ex ante profit of the insider is single-peaked with a unique minimum with respect to the other noisy signal value,and furthermore as the noisy value going to O it gets its maximum,the profit in the case that the real value is observed. 展开更多
关键词 continuous-time insider trading risk neutral private correlated signals linear bayesian equilibrium market depth residual information
下载PDF
Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts
4
作者 Abdulatif Alabdulatif Mada Alharbi +1 位作者 Abir Mchergui Tarek Moulahi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期2005-2021,共17页
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced techno... The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency.Revolutionary advanced technology,such as Intelligent Transportation Systems(ITS),enables improved traffic management,helps eliminate congestion,and supports a safer environment.ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users.However,ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks(VANETs).This is because each vehicle plays the role of a router in this network,which leads to a complex vehicle communication network,causing issues such as repeated link breakages between vehicles resulting from the mobility of the network and rapid topological variation.This may lead to loss or delay in packet transmissions;this weakness can be exploited in routing attacks,such as black-hole and gray-hole attacks,that threaten the availability of ITS services.In this paper,a Blockchain-based smart contracts model is proposed to offer convenient and comprehensive security mechanisms,enhancing the trustworthiness between vehicles.Self-Classification Blockchain-Based Contracts(SCBC)and Voting-Classification Blockchain-Based Contracts(VCBC)are utilised in the proposed protocol.The results show that VCBC succeeds in attaining better results in PDR and TP performance even in the presence of Blackhole and Grayhole attacks. 展开更多
关键词 Blockchain data privacy machine learning routing attacks smart contract VANET
下载PDF
The Impact of Corporate Governance and Fair Value Accounting on Debt Contracts
5
作者 Dan Wu 《Proceedings of Business and Economic Studies》 2024年第4期202-206,共5页
This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting... This paper investigates the theoretical relationship between corporate governance,fair value accounting,and debt contracts.It primarily examines the individual impacts of corporate governance and fair value accounting on debt contracts,while also exploring the influence of corporate governance on fair value accounting.The study emphasizes the importance of considering the interests and legal status of creditors in the context of debt contracts.The findings indicate that strong corporate governance can reduce the likelihood of debt default and that the company’s restructuring costs in the event of a default determine whether improved corporate governance will increase or decrease debt costs.Additionally,the study reveals that the strength of corporate governance affects the value relevance of fair value accounting.However,the impact of fair value accounting on debt contracts is not inherently positive or negative;for instance,companies may use fair value adjustments with manipulative intent to enhance performance.Ultimately,the research highlights that discussions about corporate governance should not prioritize shareholder interests exclusively but also consider the legitimate position of creditors. 展开更多
关键词 Corporate governance Debt contracts Debt default Fair value accounting
下载PDF
OPTIMAL CONTRACTS IN TWO-ECHELON SUPPLY CHAIN UNDER ASYMMETRIC INFORMATION AND NONLINEAR DEMAND
6
作者 庄品 赵林度 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第1期74-80,共7页
The challenge for supply chain management is to create appropriate supply chain contracts so as to optimize the system performance. To examine the role of asymmetric information in a two-echelon supply chain system an... The challenge for supply chain management is to create appropriate supply chain contracts so as to optimize the system performance. To examine the role of asymmetric information in a two-echelon supply chain system and derive supply chain contracts to deal with existing asymmetric information, a two level supply chain model including one Supplier and one retailer under the demand of price elasticity is developed. By using the principalagent principle and the optimal control theory, three types of supply chain contract, i. e. , a wholesale pricing contract, a two-parameter linear and a two-parameter nonlinear contracts are obtained. In these contracts, the Supplier has asymmetric information about the retailer cost structure. Simulation results show that the two-parameter contracts are more effective strategies to achieve supply chain coordination. 展开更多
关键词 supply chains contracts optimal control asymmetric information
下载PDF
The Characteristics of the Prepositions and Prepositional Phrases in Business English Contracts and Translation
7
作者 汪敏飞 练泽权 《海外英语》 2017年第13期148-150,共3页
A majority of contracts will use many prepositions and prepositional phrases to reflect their preciseness which cause the treaty wording complicated and hard to understand. This paper tends to demonstrate the characte... A majority of contracts will use many prepositions and prepositional phrases to reflect their preciseness which cause the treaty wording complicated and hard to understand. This paper tends to demonstrate the characteristics of the prepositions and prepositional phrases used in business English contracts and explore the translation strategies used in translating the features of the prepositions and the prepositional phrases in business English contracts. The findings of this paper can provide a reference for the majority of the trade workers, which can help them accurately and effectively draft or translate a contract and avoid unnecessary disputes. 展开更多
关键词 business English contracts PREPOSITIONS prepositional phrases
下载PDF
Risks and new transformations of PPP contracts 被引量:2
8
作者 Mohamed Chohra 穆诗煜 成虎 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期458-462,共5页
This paper tries to demonstrate that the principle of the risk allocation based on the balance is the most effective way to resolve the risk allocation problems of public-private partnership (PPP) contracts and pres... This paper tries to demonstrate that the principle of the risk allocation based on the balance is the most effective way to resolve the risk allocation problems of public-private partnership (PPP) contracts and presents suggestions how to carry out this principle. For PPP projects, it is necessary to set up a workable and commercially viable risk sharing mechanism to satisfy the different interests and the objectives of both the public sector and the private sector. An effective risk allocation mechanism is not only an important part in preparing project documents, but also an essential part in the success of PPP contracts. Risk allocation can be represented in a risk matrix. The more balanced the risk allocation is, the lower the risk degree of PPP contracts is. Therefore, the most effective risk allocation of PPP contracts is that the public sector and the private sector take part in risk management together in all the stages of the project and allocate the balanced risks. The outcomes of this paper can be used by both the public sector and the private sector to make a good choice of the PPP contract form. 展开更多
关键词 public-private partnership (PPP) contract management risks allocation risk matrix
下载PDF
Supply chain coordination mechanisms under flexible contracts 被引量:7
9
作者 Jianhu Cai Liping Wang Gengui Zhou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期440-448,共9页
In supply chain management,an important research direction is to coordinate the supply chain through introducing flexible contracts.A supply chain contract is flexible if it can satisfy two conditions at the same time... In supply chain management,an important research direction is to coordinate the supply chain through introducing flexible contracts.A supply chain contract is flexible if it can satisfy two conditions at the same time:the supply chain is coordinated,and the total profit of the supply chain can be arbitrarily divided between the supply chain members.This paper puts out two contracts,a flexible return contract and a flexible wholesale price discount contract.In contrast to many of literature,the supply chain contracts with an endogenous wholesale price is specifically considered,and a detailed sensitivity analysis of the contract parameters is given.The paper also discusses the application of the contract in vendor-managed inventory(VMI) mode.The results show that the supply chain's performance is improved after introducing above contracts.All the findings are illustrated by numerical examples. 展开更多
关键词 supply chain flexible contract COORDINATION newsvendor model.
下载PDF
Modeling China's offshore production sharing contracts using meta analysis 被引量:2
10
作者 Hao Hong Mark J. Kaiser 《Petroleum Science》 SCIE CAS CSCD 2010年第2期283-288,共6页
Production sharing contracts have been used in the development of China’s offshore petroleum resources since 1982, but the mechanism in which the fiscal terms impact project economics is complicated and not well unde... Production sharing contracts have been used in the development of China’s offshore petroleum resources since 1982, but the mechanism in which the fiscal terms impact project economics is complicated and not well understood. The purpose of this paper is to model China’s offshore production sharing contracts using a probabilistic approach. Cash flows and economic indicators are used for a typical offshore oilfield development, and meta-models are constructed to analyze the basic features of the fiscal system. Applications of the models in contract negotiation are discussed. 展开更多
关键词 contract negotiation fiscal models multiple regression production sharing contract SIMULATION
下载PDF
Parallel Control for Continuous-Time Linear Systems:A Case Study 被引量:24
11
作者 Qinglai Wei Hongyang Li Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第4期919-928,共10页
In this paper,a new parallel controller is developed for continuous-time linear systems.The main contribution of the method is to establish a new parallel control law,where both state and control are considered as the... In this paper,a new parallel controller is developed for continuous-time linear systems.The main contribution of the method is to establish a new parallel control law,where both state and control are considered as the input.The structure of the parallel control is provided,and the relationship between the parallel control and traditional feedback controls is presented.Considering the situations that the systems are controllable and incompletely controllable,the properties of the parallel control law are analyzed.The parallel controller design algorithms are given under the conditions that the systems are controllable and incompletely controllable.Finally,numerical simulations are carried out to demonstrate the effectiveness and applicability of the present method.Index Terms-Continuous-time linear systems,digital twin,parallel controller,parallel intelligence,parallel systems. 展开更多
关键词 Index Terms—continuous-time linear systems digital twin parallel controller parallel intelligence parallel systems
下载PDF
Identification of linear continuous-time system using wavelet modulating filters 被引量:4
12
作者 贺尚红 钟掘 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期270-277,共8页
An approach to identification of linear continuous-time system is studied with modulating functions. Based on wavelet analysis theory, the multi-resolution modulating functions are designed, and the corresponding filt... An approach to identification of linear continuous-time system is studied with modulating functions. Based on wavelet analysis theory, the multi-resolution modulating functions are designed, and the corresponding filters have been analyzed. Using linear modulating filters, we can obtain an identification model that is parameterized directly in continuous-time model parameters. By applying the results from discrete-time model identification to the obtained identification model, a continuous-time estimation method is developed. Considering the accuracy of parameter estimates, an instrumental variable (Ⅳ) method is proposed, and the design of modulating integral filter is discussed. The relationship between the accuracy of identification and the parameter of modulating filter is investigated, and some points about designing Gaussian wavelet modulating function are outlined. Finally, a simulation study is also included to verify the theoretical results. 展开更多
关键词 parameter estimation modulation function continuous-time system WAVELET Gaussian function.
下载PDF
Continuous-time chaotic systems: Arbitrary full-state hybrid projective synchronization via a scalar signal 被引量:2
13
作者 Giuseppe Grassi 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第8期333-338,共6页
Relerrlng to contlnuous-Ume claaotlc systems, tills paper presents a new projective syncnromzatlon scheme, wnlcn enables each drive system state to be synchronized with a linear combination of response system states f... Relerrlng to contlnuous-Ume claaotlc systems, tills paper presents a new projective syncnromzatlon scheme, wnlcn enables each drive system state to be synchronized with a linear combination of response system states for any arbitrary scaling matrix. The proposed method, based on a structural condition related to the uncontrollable eigenvalues of the error system, can be applied to a wide class of continuous-time chaotic (hyperchaotic) systems and represents a general framework that includes any type of synchronization defined to date. An example involving a hyperchaotic oscillator is reported, with the aim of showing how a response system attractor is arbitrarily shaped using a scalar synchronizing signal only. Finally, it is shown that the recently introduced dislocated synchronization can be readily achieved using the conceived scheme. 展开更多
关键词 continuous-time chaotic systems chaos synchronization observer-based synchronization scalarsynchronizing signal
下载PDF
RUIN PROBABILITY IN THE CONTINUOUS-TIME COMPOUND BINOMIAL MODEL WITH INVESTMENT 被引量:3
14
作者 张帅琪 刘国欣 孙梅慈 《Acta Mathematica Scientia》 SCIE CSCD 2015年第2期313-325,共13页
This article deals with the problem of minimizing ruin probability under optimal control for the continuous-time compound binomial model with investment. The jump mechanism in our article is different from that of Liu... This article deals with the problem of minimizing ruin probability under optimal control for the continuous-time compound binomial model with investment. The jump mechanism in our article is different from that of Liu et al [4]. Comparing with [4], the introduction of the investment, and hence, the additional Brownian motion term, makes the problem technically challenging. To overcome this technical difficulty, the theory of change of measure is used and an exponential martingale is obtained by virtue of the extended generator. The ruin probability is minimized through maximizing adjustment coefficient in the sense of Lundberg bounds. At the same time, the optimal investment strategy is obtained. 展开更多
关键词 The continuous-time compound binomial model INVESTMENT ruin probability Lundberg bounds
下载PDF
Modeling optimal oil production paths under risk service contracts 被引量:1
15
作者 Luo Dongkun Zhao Xu 《Petroleum Science》 SCIE CAS CSCD 2013年第4期596-602,共7页
Due to the rigorous fiscal terms and huge potential risk of risk service contracts,optimizing oil production paths is one of the main challenges in designing oilfield development plans.In this paper,an oil production ... Due to the rigorous fiscal terms and huge potential risk of risk service contracts,optimizing oil production paths is one of the main challenges in designing oilfield development plans.In this paper,an oil production path optimization model is developed to maximize economic benefits within constraints of technology factors and oil contracts.This analysis describes the effects of risk service contract terms on parameters of inputs and outputs and quantifies the relationships between production and production time,revenues,investment and costs.An oil service development and production project is illustrated in which the optimal production path under its own geological conditions and contract terms is calculated.The influences of oil price,service fees per barrel and operating costs on the optimal production have been examined by sensitivity analysis.The results show that the oil price has the largest impact on the optimal production,which is negatively related to oil price and positively related to service fees per barrel and operating costs. 展开更多
关键词 Risk service contract optimal production path nonlinear programming service fees per barrel sensitivity analysis
下载PDF
Elastic Smart Contracts in Blockchains 被引量:4
16
作者 Schahram Dustdar Pablo Fernández +1 位作者 JoséMaría García Antonio Ruiz-Cortés 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1901-1912,共12页
In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as w... In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution. 展开更多
关键词 Blockchain ELASTICITY Internet of Things(IoT) smart cities smart contracts virtual chains
下载PDF
Mining Bytecode Features of Smart Contracts to Detect PonziScheme on Blockchain 被引量:2
17
作者 Xiajiong Shen Shuaimin Jiang Lei Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第6期1069-1085,共17页
The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in unt... The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in untrustworthy environments.However,these features of this technology are also easily exploited by unscrupulous individuals,a typical example of which is the Ponzi scheme in Ethereum.The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant.To solve this problem,we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode.In this model,our innovation is shown in two aspects:We first propose to use two bytes as one characteristic,which can quickly transform the bytecode into a high-dimensional matrix,and this matrix contains all the implied characteristics in the bytecode.Then,We innovatively transformed the Ponzi schemes detection into an anomaly detection problem.Finally,an anomaly detection algorithm is used to identify Ponzi schemes in smart contracts.Experimental results show that the proposed detection model can greatly improve the accuracy of the detection of the Ponzi scheme contracts.Moreover,the F1-score of this model can reach 0.88,which is far better than those of other traditional detection models. 展开更多
关键词 Ponzi scheme blockchain security smart contracts anomaly detection
下载PDF
Enhanced LMI Representations for H2 Performance of Polytopic Uncertain Systems: Continuous-time Case 被引量:1
18
作者 Ai-Guo Wu Guang-Ren Duan 《International Journal of Automation and computing》 EI 2006年第3期304-308,共5页
Based on two recent results, several new criteria of H2 performance for continuous-time linear systems are established by introducing two slack matrices. When used in robust analysis of systems with polytopic uncertai... Based on two recent results, several new criteria of H2 performance for continuous-time linear systems are established by introducing two slack matrices. When used in robust analysis of systems with polytopic uncertainties, they can reduce conservatism inherent in the earlier quadratic method and the established parameter-dependent Lyapunov function approach. Two numerical examples are included to illustrate the feasibility and advantage of the proposed representations. 展开更多
关键词 LMI representations H2 performance polytopic uncertainty continuous-time systems
下载PDF
Variance minimization for continuous-time Markov decision processes: two approaches 被引量:1
19
作者 ZHU Quan-xin 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2010年第4期400-410,共11页
This paper studies the limit average variance criterion for continuous-time Markov decision processes in Polish spaces. Based on two approaches, this paper proves not only the existence of solutions to the variance mi... This paper studies the limit average variance criterion for continuous-time Markov decision processes in Polish spaces. Based on two approaches, this paper proves not only the existence of solutions to the variance minimization optimality equation and the existence of a variance minimal policy that is canonical, but also the existence of solutions to the two variance minimization optimality inequalities and the existence of a variance minimal policy which may not be canonical. An example is given to illustrate all of our conditions. 展开更多
关键词 continuous-time Markov decision process Polish space variance minimization optimality equation optimality inequality.
下载PDF
Development of Optimal Maintenance Policies for Offshore Wind Turbine Gearboxes Based on the Non-homogeneous Continuous-Time Markov Process 被引量:1
20
作者 Mingxin Li Jichuan Kang +1 位作者 Liping Sun Mian Wang 《Journal of Marine Science and Application》 CSCD 2019年第1期93-98,共6页
Gearbox in offshore wind turbines is a component with the highest failure rates during operation. Analysis of gearbox repair policy that includes economic considerations is important for the effective operation of off... Gearbox in offshore wind turbines is a component with the highest failure rates during operation. Analysis of gearbox repair policy that includes economic considerations is important for the effective operation of offshore wind farms. From their initial perfect working states, gearboxes degrade with time, which leads to decreased working efficiency. Thus, offshore wind turbine gearboxes can be considered to be multi-state systems with the various levels of productivity for different working states. To efficiently compute the time-dependent distribution of this multi-state system and analyze its reliability, application of the nonhomogeneous continuous-time Markov process(NHCTMP) is appropriate for this type of object. To determine the relationship between operation time and maintenance cost, many factors must be taken into account, including maintenance processes and vessel requirements. Finally, an optimal repair policy can be formulated based on this relationship. 展开更多
关键词 Maintenance policy NON-HOMOGENEOUS continuous-time MARKOV process OFFSHORE wind TURBINE gearboxes Reliability analysis Failure rates System engineering
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部