• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-Based Architectural Framework for Vertical Federated Learning

    2022-08-08 05:47:34QIANChenZHUWenjing朱雯晶

    QIAN Chen(錢 辰) , ZHU Wenjing(朱雯晶)

    1 School of Computer Science and Technology, Donghua University, Shanghai 201620, China 2 Institute of Scientific and Technical Information of Shanghai, Shanghai Library, Shanghai 200031, China

    Abstract: The introduction of blockchain to federated learning(FL)is a promising solution to enable anonymous clients to collaboratively learn a shared prediction model using local data while avoiding the risk caused by the central server. However, the current researches only apply a shallow convergence between the two technologies. The aroused problems, such as the unsuitable consensus, the lack of incentive mechanism, and the incompetence of handling vertically partitioned data, make the blockchain-based FL exist in name only. This paper puts forward a novel blockchain-based framework for vertical FL with a specified consensus and incentive. Moreover, a real-world example is demonstrated to prove the practicability of our work.

    Key words: vertical federated learning(FL); blockchain; smart contract; incentive mechanism

    Introduction

    With the advancements of machine learning(ML), various intelligent applications have been widely adopted across all areas of industries, especially those demanding knowledge and insights extracted from big data, such as healthcare and financial service[1-2].Undoubtedly, ML brings a new opportunity to traditional industries.As is well known, the quality of ML systems highly depends on the data,i.e., the more informative data we input, the more accurate model the ML system brings up.As a direct consequence, the continuous pursuit of data has inevitably exacerbated the privacy-preserving problem.In order to reduce the risks, two-thirds of countries indicate that they provide data protection by policy or legislation[3].It is a massive blow to ML research and industry despite the good intention.

    A new ML paradigm, namely federated learning(FL), has been regarded as the most promising solution[4].The main idea is to allow multiple clients(e.g., mobile devices)to train a model in a collaborative fashion, whereas the training data are kept decentralized,i.e., deposited in the local databases.FL quickly succeeded in the cross-device development of simple applications, such as keyword spotting and emoji prediction[5-6].However, to release its full potential, we need to upgrade the traditional FL methodologies.

    In this paper, we put forward a novel FL framework with three advantages.First, it allows multiple parties that own different attributes(e.g., features and labels)of the same data entity to jointly train a model.Second, it enhances the security of the data transfers taking place by introducing blockchain technology.Third, it promotes data sharing by an additional incentive mechanism based on an ad-hoc consensus algorithm.

    The remainder of this paper is organized as follows.Section 1 elaborates on the background of our work, including the potential issues of FL and the benefit of using blockchain.Section 2 presents the proposed framework in detail.Section 3 illustrates the experiment and a corresponding evaluation.Conclusions are drawn in section 4.

    1 Reviews

    The training process of traditional FL is orchestrated by a central server, whereas the training data are kept decentralized,i.e., deposited in the local databases.At present, most FL approaches rely on a conventional client-server network, whose architecture and behavior are demonstrated in Fig.1.Hence, FL is ordinarily considered a partial decentralized ML setting,i.e., the data are decentralized while the control is centralized.At present, it has been proved helpful in trivial real-world cases.

    Fig.1 Overview of FL framework

    However, as the research progresses, problems keep surfacing.Firstly, a hub in the network undoubtedly has the possibility to cause a single point of failure[7].Secondly, finding a third party that can be trusted by every single client is merely impossible in practice.Not even mentioning the third party anyway increases the risk of data breach and the complexity of system design[8].Thirdly, and most importantly, it has been proved that a central server may become a bottleneck of computation and communication when the number of clients is sizeable[9].

    To tackle the problems mentioned above, trending researchers investigated how to specify the FL algorithms within a peer-to-peer(P2P)framework, such as SimFL and SecureBoost[10-11].Both can build federated decision trees in a decentralized manner.Although the P2P network is not equivalent to the blockchain, it still shows that fully decentralization is the most promising strategy.

    1.1 Rationale of using blockchain in FL

    Blockchain, as the name implies, is a growing list of blocks linked by a virtual chain, where each block denotes an electronic record, and the chain symbolizes the cryptography methodology[12].The characteristics of blockchain are seemingly advantageous to FL[13]as follows.

    (1)Decentralization.The underlying infrastructure of blockchain systems can allow the transaction to be processed without authentication by a central server.Hence, blockchain is applicable for the P2P-based FL framework.

    (2)Persistency.Before a new block is added to the blockchain, it must be broadcast across the network and validated by other nodes.Thus, using blockchain can improve the robustness of FL, and data falsification can be detected easily.

    (3)Immutability.It is impossible to tamper with the on-chain data since the transactions are deposited in every node of the distributed network.So it certainly can make FL applications more secure.

    (4)Anonymity.The trust mechanism of blockchain allows users to interact with each other via generated addresses without exposing their real identities.Therefore, introducing blockchain in the FL domain fundamentally preserves the privacy of data owners.

    (5)Auditability.Blockchain can be considered a singly linked list, in which every block is marked with a timestamp.As a natural consequence, any transaction can be verified and traced.In other words, we can monitor the transactions after every training epoch in FL.

    The rise of the blockchain technology considerably promotes the development of smart contracts, which is defined as computerized transaction protocol to execute the term of an agreement[14].Ideally, establishing smart contracts in a blockchain environment takes over from third parties that have been essential to establish trust in the past.The ability to automatically interfere with the transaction process in a cost-effective, transparent, and secure fashion[15]is potentially beneficial for FL[16].It can be utilized to restrain the behavior of participants and automate the execution in FL workflows.Therefore, the interference of malicious behavior can be prevented while reducing the cost-efficiency in the training process.

    In addition, the incentive mechanism of blockchain may provide the last piece of the puzzle in FL[17].The conventional FL paradigms do not consider any incentive scheme, which becomes a well-known problem that is urgently needed to be addressed.In other words, the clients who offer more data or better data in FL deserve more rewards than a global model.Otherwise, they will train their own models to take advantage of market competition.Consequently, data silos are further created, which is exactly the opposite of what FL aims to achieve.

    To sum up, the aforementioned benefits of blockchain clearly express why we make a convergence of FL and blockchain technology in this paper.

    1.2 Horizontal FL versus vertical FL

    FL is categorized into two types in terms of the distribution characteristics of the data, namely horizontal FL and vertical FL, respectively[18].We hereby use a real-world example to explain their differences.

    Alzheimer’s disease is a progressive brain disorder that gradually destroys a person’s memory, thinking, and behavior.Normally, it can be diagnosed through the biomarkers(e.g., amyloid beta(ABETA), Tau protein(Tau))or neuropsychological examination(e.g., mini-mental state examination(MMSE), Alzheimer’s Disease Assessment Scale-Cognitive Subscale 13(ADAS-Cog13).The former can only be obtained via medical tests in hospitals, whereas the latter can be sat with apps nowadays.Figure 2(a)shows two hospitals have different patient groups from their respective regions, but they identify similar biomarkers, so the feature spaces are the same.Therefore, a global model can be established by a horizontal FL solution.However, Fig.2(b)illustrates another scenario in which the same patients receive medical data via different resources,i.e., the biomarker results from the hospital and the neuropsychological examination grades from a mobile application.Apparently, the feature spaces are different, but on the basis of both parties, we can get joint training in a vertical FL framework.The comparison in Fig.2 gives rise to a conclusion that horizontal FL should only be used in specific scenarios, in which data may significantly differ in sample space but must have a certain amount of overlap among features.Contrariwise, in vertical FL, the data differ in feature space but must partially overlap on sample ID.

    PTau-hyperphosphorylation of Tau; HV-hippocampal volume; ICV-intracerebral volume; WBV-whole brain volume.

    On one hand, horizontal FL algorithms are primarily implemented on an enormous number of intelligent devices or Internet of Things(IoT)equipment.The whole training process is orchestrated by an authoritative organization, while the clients are usually assumed honest.On the other hand, vertical FL demands fewer clients with homogenous data, while some might lack labels.Apparently, vertical FL has more potential for wider application prospects,e.g., drug discovery and intelligent manufacturing[19-20], despite it being more challenging from a technical point of view.This paper shows how to realize a vertical FL system in the proposed framework.

    2 Proposed Framework

    The problems that occur in current FL scenarios and the solution that may overcome the natural defects of FL are investigated in the previous section.So, a blockchain framework for vertical FL is introduced hereby.

    2.1 Architectural design

    The first step to undertake is to establish the underlying architecture of the proposed framework.As demonstrated in Fig.3, our framework is realized based on a fundamental structure of three layers, which can be described from bottom to top as follows.

    Fig.3 Architecture of proposed framework

    (1)Network layer.This layer embodies a fully decentralized P2P network connected by a number of nodes.To start a learning mission, one of the nodes becomes the task publisher, while the others become clients.It is worth noting that each client plays twofold roles,i.e., the trainer and the miner.The former performs the training with its data locally, whereas the latter is responsible for verifying the newly-issued transactions and further producing new blocks according to the verification results.

    (2)Ledger layer.The middle layer represents a distributed ledger.The data deposited in the ledger are constantly shared and synchronized across clients.Thereby, the events involved in the FL procedure,e.g., publishing a task, broadcasting learning models, and aggregating learning results, can be traced by any participant.

    (3)Service layer.The top layer is constituted by blockchain applications.In our framework, the smart contract and the FL system are deployed here, which can be adopted to invoke the events of FL.

    2.2 Smart contract

    Smart contracts are a significantly crucial piece in our framework.Typically, they are defined, programmed, and deployed on the blockchain by the task publisher while the FL system starts initialization.However, the smart contract has its defects[21].The contracts are coded by humans, so errors are unavoidable.Worse yet, it is impossible to make corrections directly on a contract registered on the blockchain.The only remedy requires creating a new smart contract altogether, which anyway increases the risk of introducing more mistakes into the system.

    To alleviate the problem, our framework uses a visualization modeling language, called BOX-MAN, to design and implement smart contracts in a compositional manner[22].

    The BOX-MAN model defines two types of services: atomic service and composite service, as shown in Fig.4(a).The services are connected by a composition connector, a adaptation connector, and a parallel connector(PAR), as shown in Fig.4(b).An atomic service encapsulates a set of methods in the form of an input-output function with a purpose that different services can access.A composite service consists of sub-services(atomic service or composite service), which are composed of exogenous composition connectors.Such connectors coordinate control flows between sub-services from the outside.Data flows are coordinated by horizontal data routing and vertical data routing.The former links the input and the output of individual services, whereas the latter is regarded as data propagation between the services and their sub-services.

    SEQ-sequencer; SEL-selector; LOP-loop; GUD-guard; PAR-parellel connector.

    The composition connector includes a sequencer(SEQ)and a selector(SEL).The former defines sequencing, while the latter defines branching.In contrast, the adaptation connectors do not compose services.Instead, they are applied to individual services with the aim of adapting the received controls.For instance, the guard allows control to reach a service only if the condition is satisfied, and the loop(LOP)repeats control to a component until the condition is no longer fulfilled.Additionally, the parallel connector is defined to handle the parallel invocation of sub-services.As a matter of fact, these connectors altogether can simulate any(nested)statement in computer programming,e.g., if-else statement, while statement, parallel statement, and block statement,etc.

    In order to manage the behavior of the proposed framework, three types of smart contracts have been designed as follows.

    (1)At the very beginning of learning, the task publisher must draw up a contract to clarify the task requirements.For example, the contract should define the data size so that the data owners who do not have enough samples are aware that they are not qualified to join the training.Other important criteria include training accuracy, latency, aggregation rules, reward program and so forth.This smart contract is accessible to all nodes in the blockchain network.

    (2)The first contract is essentially an initiative proposed by the task publisher.On the one hand, whoever is dissatisfied with the contract has the right to refuse the training request.On the other hand, interested participants must reply with their costs and capabilities.Such replies are also recorded using smart contracts and further registered on the blockchain.Meanwhile, every applicant must stake a deposit in the smart contract.For instance, every training node must prepare its data in a repository, whose directory path has to remain unchanged during the entire learning process.The path will be encrypted by the public key of the node and then be recorded in a smart contract, along with the hash of all data inside this directory.Therefore, if a dishonest client modifies its training data in the middle of the FL process, it will easily be spotted and hence lose the deposit.Contrariwise, the deposits will be automatically refunded after the entire learning is accomplished.

    (3)The smart contract is also immensely beneficial in aggregating results after every learning epoch.In section 2.1, we introduce how a central server collects the updates from all training nodes and performs an algorithm to aggregate them.However, the aggregation becomes a lot more complex in vertical FL on a P2P network.The workaround will be presented later, and hereby the smart contract guarantees the results are automatically aggregated without human intervention.Moreover, according to the reward program written in the contract, the miner can earn a bonus every time a new block is added to the blockchain.Finally, the smart contract can be automatically triggered to end the learning process by comparing the actual training accuracy with the expected one.

    2.3 Workflow process

    Based on the static architecture defined in Fig.1, the dynamic behavior of the proposed framework can be defined.Figure 5 shows the overall workflow.We hereby elaborate on the details of the activities in each step.

    2.3.1Step1—InitiatingtheFLsystem

    It is worth noting that this activity is conducted only once at the beginning of the FL process.With the aid of smart contracts, any node in the network is allowed to publish a learning task, which includes selecting the learning algorithm, implementing the initial model, determining the hyperparameters, establishing the reward program, selecting the participants, and so on.Qualified clients will receive the learning settings at last.

    Fig.5 Workflow of proposed framework

    2.3.2Step2—Localtraining

    After all, the gradient will be sent toJ, and accordingly,Jcan achieve the update, too.

    Figure 6 shows an example of the implementation of the training process using linear regression with gradient descent methods.The underlying algorithm adapted from Yangetal.[18]defines a training objective, which is

    (1)

    Fig.6 Training process of vertical FL using linear regression

    (2)

    (3)

    (4)

    It becomes obvious that the encrypted loss can be formulated as

    (5)

    (6)

    (7)

    2.3.3Step3—Uploadingthemodelupdate

    2.3.4Step4—Verificationandaggregation

    2.3.5Step5—Blockgenerationandaddition

    Although every node has its own model, only one can be deposited into the blockchain.In our framework, we use an FL empowered consensus called proof of training quality(PoQ)protocol, which seeks widespread agreement in terms of training quality among clients in the network[24].The consensus process starts with a broadcast of the new models, each of which is encrypted by the miner’s secret key.As a result, for any clientK, all models are collected and stored locally as candidate blocks.In order to conclude the proof of training,Kmust verify all received models by calculating the accuracyVKas

    (8)

    whereMkdenotes the model ofK, andωis considered as a weight parameter that indicates the contribution ofMkto the global model.Naturally,ωcan be determined by the size of training data

    (9)

    whereNkis the size ofK’s training data.Eventually, the node with minimumVKwill be automatically selected as the leader, and hence takes the responsibility for driving the consensus process with all other miners.

    As illustrated in Fig.7, every client creates a transactiont(Mk)that sends its modelMkto the leader, so the leader can accordingly create a global modelMby following the aggregation rule defined in the smart contract.After that, the leader constructs the candidate blocks, which can be described asBk=(Hk,t(Mk),M), whereHkdenotes the block header of a blockBk.The blocks will be further broadcast in the network for approval.For example, each verifying node receivesBiand starts the regular verification,e.g., examining the header format, checking the timestamp, and so on.Then, afterBiis proved to be valid, the node computes the values ofV(Mi)andV(M).If|V(Mi)-V(M)|is within a certain range, the node sends a reply to the leader for approval.IfBiis approved by all nodes, the lead will sign the block and add it to the blockchain.

    Fig.7 Consensus process

    2.3.6Step6—Blockbroadcast

    After a new block is added to the blockchain, it will be broadcast to every node in the network.However, in order to prevent blockchain forks, each node must send a confirmation signal to the leader if no fork is spotted.If the leader receives the signals from all nodes, the consensus process continues.Otherwise, the process starts over from step 2.

    2.3.7Step7—Updatingthelocalmodel

    Now clients can update their local models.Notably, the training can terminate here, and step 8 will be arrived next, depending on whether the end condition defined in the smart contract is triggered or not.Otherwise, the training process repeats from step 2.

    2.3.8Step8—Offeringtherewards

    The smart contract automatically rewards the trainers and miners according to their contributions to the FL process.

    3 Experiments

    FL is regarded as one of the most promising techniques to be associated with medical imaging[25].In this section, to verify the effectiveness of our framework, we conduct an experiment on real-world datasets.

    3.1 Introduction of dataset

    The data used in this paper are extracted from the Alzheimer’s Disease Neuroimaging Initiative(ADNI)dataset, in particular selected from structural magnetic resonance imaging(sMRI)data, which acquired using T1-weighted in-phase fast gradient-echo imaging at 1.5 T.These labeled 3D structural images can show the cross-sectional, coronal, and sagittal planes of the subject’s brain.We manually segment the images of the hippocampus in a total of 130 sets.

    3.2 Data pre-processing

    The pre-processing of the sMRI data before the experiment consists of four steps:(I)removal of the skull,(II)correction of the bias field,(III)data enhancement, and(IV)cropping to a uniform size.

    Firstly, the skull is relatively distant from the hippocampus.Thus, it contains irrelevant voxel information that needs to be removed.Secondly, some unpredictable factors(e.g., position)may affect the image brightness during the scan operation.This is also known as a bias field.It can result in an inhomogeneous distribution of the magnetic field of the MRI machine, and therefore must be corrected.Thirdly, because the size of annotated data is small, we have to enhance the data by flipping and rotating the images in order to overcome the overfitting problem and improve the performance of the model.Finally, the sMRI images are cropped uniformly into 128×128×128 pixels to fit the model input requirements.Figure 8 shows the result of data pre-processing.

    Fig.8 Comparison of sMRI data and pre-processed data

    Eventually, the pre-processed images are split into left and right halves, providing a dataset of each half to different data owners.In each half, the pre-processed data were divided into two parts: the training set and the test set.The former contains 80% of the data, while the latter includes the rest 20%.

    3.3 Experimental setup

    The underlying model in our experiment is called the 3DUnet-CBAM based hippocampal segmentation model, which is the former research of ours[26].As the name implies, this model uses a 3DUnet convolutional network to avoid information loss between two-dimensional slices while incorporating the CBAM attention mechanism in the last layer of downsampling.The model successfully captures and combines the deep and superficial features of the hippocampus using monolithic ML.We hereby regard it as the initial model in our FL experiment.The total number of iterations of the model is 10, the batch training size is set to 1, and the initial learning rate is 0.000 1.

    3.4 Experimental results

    In order to quantitatively evaluate the effectiveness of the proposed framework with the 3DUnet-CBAM model, we adopt three evaluation metrics: Dice similarity coefficient, precision rate, and recall rate.

    The Dice similarity coefficient is a measure of ensemble similarity, which is usually used to calculate the similarity of two samples.The value range is 0 to 1.The formula is

    (10)

    whereurepresents the hippocampus image after model segmentation,vrepresents the hippocampus manually labeled,|u∩v|is the intersection betweenuandv.|u|and|v|represent the number of voxels inuandv, respectively.

    The segmentation of the hippocampus in effect is a binary classification task, because the segmentation result of the hippocampus is binarized,i.e., the gray area with a value of 0 is considered as the background, while the one with a value of 255 is the segmented hippocampus extracted from 3D sMRI image.The precision rate indicates how many of the samples that are predicted to be positive are truly positive samples, whereas the recall rate indicates how many of the positive examples in the sample are predicted correctly.They can be calculated byTP/(TP+FP)andTP/(TP+FN), whereTPandFPdenote the numbers of true-positive and false-positive samples, respectively;FNdenotes the number of a false-negative result.

    The decision threshold set in this paper is 0.5.Table 1 shows the Dice similarity coefficient, precision rate, and recall rate of hippocampus segmentation using different ML paradigms.It becomes obvious that the proposed framework can perform an FL task and outcome a high-quality model, just like traditional ML can do.

    Table 1 Comparison of evaluation results using different training methods

    4 Conclusions

    In this paper, a novel framework that enables FL systems to be executed based on a blockchain network is presented.Based on the framework, a vertical FL approach to train a global model with heterogeneous data based on our framework is introduced.The data security in the FL process by providing a security mechanism of blockchain is also enhanced.Moreover, an incentive mechanism based on the consensus algorithm for our framework is successfully designed, which has the potential to promote data sharing between unknown clients.

    However, there are many remaining challenges.Some of them have originated from FL itself, while the rest is brought by blockchain.The former includes non-identically independently distributed(non-IID)data, threat models, poisoning attacks, and some algorithmic challenges.The latter contains scalability, inefficiency, and sometimes excessive transparency in the context of FL.Addressing the aforementioned issues is our future work.Although it is a long-term task, the ultimate goal of our research is to create a universal blockchain-based framework that is powerful and secure enough to execute any kind of FL training.

    亚洲一码二码三码区别大吗| 美女午夜性视频免费| 亚洲av中文字字幕乱码综合 | 中文字幕最新亚洲高清| 最近在线观看免费完整版| 久久久水蜜桃国产精品网| 亚洲国产高清在线一区二区三 | 精品国产亚洲在线| 久久热在线av| 亚洲人成伊人成综合网2020| 99久久无色码亚洲精品果冻| 亚洲久久久国产精品| 听说在线观看完整版免费高清| av在线天堂中文字幕| 久久久久久大精品| 视频区欧美日本亚洲| 黄频高清免费视频| 久久精品成人免费网站| 亚洲人成电影免费在线| 久久久久久久精品吃奶| 成年人黄色毛片网站| 久9热在线精品视频| 1024手机看黄色片| 亚洲五月婷婷丁香| 国产精品美女特级片免费视频播放器 | 99热只有精品国产| 美女高潮喷水抽搐中文字幕| 亚洲av电影在线进入| 欧美成人性av电影在线观看| 中亚洲国语对白在线视频| 性色av乱码一区二区三区2| 少妇裸体淫交视频免费看高清 | 999精品在线视频| 国产精品国产高清国产av| 精品久久久久久久久久免费视频| 亚洲天堂国产精品一区在线| 国产激情久久老熟女| 欧美色欧美亚洲另类二区| 很黄的视频免费| 久久九九热精品免费| 日本 欧美在线| 亚洲一码二码三码区别大吗| 亚洲精品国产精品久久久不卡| АⅤ资源中文在线天堂| 亚洲欧美一区二区三区黑人| 国产极品粉嫩免费观看在线| 亚洲成国产人片在线观看| 色av中文字幕| 精品欧美一区二区三区在线| 老司机午夜十八禁免费视频| 18禁裸乳无遮挡免费网站照片 | 免费看十八禁软件| 中文字幕人妻丝袜一区二区| 无遮挡黄片免费观看| 欧美一区二区精品小视频在线| 一区二区三区激情视频| 亚洲一区中文字幕在线| 真人做人爱边吃奶动态| 国产av一区在线观看免费| 一进一出抽搐动态| 麻豆国产av国片精品| 一本久久中文字幕| 国产亚洲精品久久久久5区| 亚洲国产欧洲综合997久久, | 免费看日本二区| 欧美成人免费av一区二区三区| 18禁黄网站禁片午夜丰满| 久9热在线精品视频| 嫁个100分男人电影在线观看| 一个人观看的视频www高清免费观看 | 色在线成人网| 欧美日本亚洲视频在线播放| 国产一区在线观看成人免费| 十八禁网站免费在线| 久久中文字幕人妻熟女| 国产精品久久久久久人妻精品电影| 欧美zozozo另类| 99精品欧美一区二区三区四区| 国产激情久久老熟女| 桃红色精品国产亚洲av| 欧美激情高清一区二区三区| 少妇裸体淫交视频免费看高清 | 日本黄色视频三级网站网址| 欧美激情久久久久久爽电影| 国产在线观看jvid| 国产成人欧美| 精品不卡国产一区二区三区| 亚洲av中文字字幕乱码综合 | 精品久久久久久,| www.自偷自拍.com| 亚洲国产高清在线一区二区三 | 欧美日本亚洲视频在线播放| 婷婷精品国产亚洲av| 无限看片的www在线观看| 亚洲午夜理论影院| 一级毛片精品| 精品第一国产精品| 欧美久久黑人一区二区| 正在播放国产对白刺激| 99热这里只有精品一区 | 可以在线观看毛片的网站| 日本在线视频免费播放| 特大巨黑吊av在线直播 | 国产爱豆传媒在线观看 | 亚洲 欧美 日韩 在线 免费| 日韩精品青青久久久久久| 日本 av在线| 亚洲美女黄片视频| 午夜福利18| 久久人人精品亚洲av| 日本免费一区二区三区高清不卡| 一级a爱视频在线免费观看| 欧美激情久久久久久爽电影| 欧美绝顶高潮抽搐喷水| 一级毛片高清免费大全| 99精品在免费线老司机午夜| 国产精品一区二区免费欧美| 午夜成年电影在线免费观看| 国产片内射在线| 丰满人妻熟妇乱又伦精品不卡| 成人亚洲精品av一区二区| 女人被狂操c到高潮| 老司机午夜十八禁免费视频| 99久久国产精品久久久| av福利片在线| 麻豆成人午夜福利视频| 最近在线观看免费完整版| 制服诱惑二区| 一本久久中文字幕| 嫁个100分男人电影在线观看| 色精品久久人妻99蜜桃| 亚洲国产欧美一区二区综合| 亚洲av第一区精品v没综合| 免费高清在线观看日韩| 亚洲精品国产精品久久久不卡| 久久久水蜜桃国产精品网| 国产一卡二卡三卡精品| 国产蜜桃级精品一区二区三区| 男女做爰动态图高潮gif福利片| 国产精品香港三级国产av潘金莲| 亚洲成人精品中文字幕电影| 亚洲第一av免费看| 国产三级在线视频| 婷婷精品国产亚洲av在线| 亚洲精品在线观看二区| 欧美+亚洲+日韩+国产| 天天躁夜夜躁狠狠躁躁| 欧美+亚洲+日韩+国产| 男人舔奶头视频| 韩国精品一区二区三区| 97碰自拍视频| 成人国产一区最新在线观看| 伊人久久大香线蕉亚洲五| 97碰自拍视频| 97碰自拍视频| 国产野战对白在线观看| 99国产极品粉嫩在线观看| 男人舔奶头视频| 国产男靠女视频免费网站| www.自偷自拍.com| 亚洲av成人不卡在线观看播放网| 国产精品影院久久| 村上凉子中文字幕在线| 久久国产精品男人的天堂亚洲| 亚洲第一av免费看| avwww免费| 久久精品成人免费网站| 亚洲精华国产精华精| 男人的好看免费观看在线视频 | 国产三级黄色录像| 国产精品,欧美在线| avwww免费| 草草在线视频免费看| www日本黄色视频网| 久久精品aⅴ一区二区三区四区| 日本 av在线| 日韩欧美一区二区三区在线观看| 中文字幕人成人乱码亚洲影| 天天躁狠狠躁夜夜躁狠狠躁| 精品久久久久久,| 美女大奶头视频| 亚洲国产看品久久| 国产又色又爽无遮挡免费看| avwww免费| 久热这里只有精品99| 婷婷六月久久综合丁香| 国产不卡一卡二| 久久久国产欧美日韩av| av中文乱码字幕在线| av欧美777| 一a级毛片在线观看| 在线永久观看黄色视频| 免费电影在线观看免费观看| 日韩欧美三级三区| 女生性感内裤真人,穿戴方法视频| 国产av不卡久久| 少妇被粗大的猛进出69影院| 88av欧美| 欧美性猛交黑人性爽| 一级片免费观看大全| 国产视频内射| 一本大道久久a久久精品| 嫩草影视91久久| 亚洲成人国产一区在线观看| 1024视频免费在线观看| 日本在线视频免费播放| 亚洲最大成人中文| 两个人免费观看高清视频| 国产成人精品无人区| 亚洲avbb在线观看| 精品卡一卡二卡四卡免费| 国产午夜福利久久久久久| 久久国产乱子伦精品免费另类| 国产精品二区激情视频| 亚洲七黄色美女视频| 久久香蕉激情| 最新美女视频免费是黄的| 99国产精品一区二区三区| 亚洲欧美精品综合一区二区三区| 日本黄色视频三级网站网址| 无遮挡黄片免费观看| 一进一出好大好爽视频| 天堂动漫精品| 国产精品自产拍在线观看55亚洲| 欧美黑人巨大hd| 成人手机av| 97超级碰碰碰精品色视频在线观看| 欧美一级毛片孕妇| 成人18禁在线播放| 91大片在线观看| 一区二区三区国产精品乱码| 欧美 亚洲 国产 日韩一| 熟女电影av网| 日韩欧美一区二区三区在线观看| 久久中文字幕人妻熟女| 久9热在线精品视频| 久久国产精品人妻蜜桃| 国产精品亚洲美女久久久| 久久婷婷成人综合色麻豆| 欧美午夜高清在线| 99在线人妻在线中文字幕| 黄频高清免费视频| 国产精品美女特级片免费视频播放器 | 国产精品美女特级片免费视频播放器 | 脱女人内裤的视频| 99国产精品99久久久久| 熟妇人妻久久中文字幕3abv| 国产精品一区二区精品视频观看| 精品国产亚洲在线| 欧美午夜高清在线| 成人手机av| 亚洲国产中文字幕在线视频| 国产伦在线观看视频一区| 丝袜在线中文字幕| 在线免费观看的www视频| 免费女性裸体啪啪无遮挡网站| 亚洲人成电影免费在线| 九色国产91popny在线| 日韩精品中文字幕看吧| 精品国产国语对白av| 精品福利观看| 一区二区三区高清视频在线| 悠悠久久av| 不卡一级毛片| 亚洲成人久久性| 国产99白浆流出| 国产精品影院久久| 午夜a级毛片| 免费高清视频大片| 性色av乱码一区二区三区2| av视频在线观看入口| 久9热在线精品视频| 国产亚洲欧美精品永久| 91老司机精品| 亚洲av片天天在线观看| 女同久久另类99精品国产91| 男女午夜视频在线观看| 亚洲久久久国产精品| 最近最新中文字幕大全免费视频| 在线观看日韩欧美| 伦理电影免费视频| 亚洲av中文字字幕乱码综合 | 嫩草影院精品99| 久久天躁狠狠躁夜夜2o2o| 国产日本99.免费观看| 亚洲在线自拍视频| 欧美绝顶高潮抽搐喷水| 国产99白浆流出| 精品国产美女av久久久久小说| 亚洲人成77777在线视频| 亚洲五月婷婷丁香| svipshipincom国产片| 91九色精品人成在线观看| 亚洲精品在线美女| av欧美777| 亚洲七黄色美女视频| 亚洲人成伊人成综合网2020| 国产又黄又爽又无遮挡在线| 在线十欧美十亚洲十日本专区| 国产三级在线视频| 久久香蕉国产精品| 久久性视频一级片| 成熟少妇高潮喷水视频| 熟妇人妻久久中文字幕3abv| 久久欧美精品欧美久久欧美| av有码第一页| 丝袜人妻中文字幕| 老司机福利观看| 国产亚洲精品综合一区在线观看 | 国产精品乱码一区二三区的特点| 欧美又色又爽又黄视频| 国产精品一区二区三区四区久久 | av片东京热男人的天堂| 一区二区三区国产精品乱码| 亚洲精品在线美女| 亚洲成av片中文字幕在线观看| 欧美成狂野欧美在线观看| 亚洲欧洲精品一区二区精品久久久| 欧美乱色亚洲激情| 欧美+亚洲+日韩+国产| 国产精品,欧美在线| 男人的好看免费观看在线视频 | 在线观看午夜福利视频| 热99re8久久精品国产| 中文字幕高清在线视频| 久久久久亚洲av毛片大全| 免费观看人在逋| www国产在线视频色| 亚洲自偷自拍图片 自拍| 在线视频色国产色| 日韩视频一区二区在线观看| av片东京热男人的天堂| 精品久久久久久久人妻蜜臀av| 久久久久久九九精品二区国产 | 啦啦啦 在线观看视频| 桃红色精品国产亚洲av| 久久久久精品国产欧美久久久| 午夜激情av网站| 在线观看一区二区三区| 久久久久久久精品吃奶| 亚洲avbb在线观看| 白带黄色成豆腐渣| 午夜a级毛片| www.www免费av| √禁漫天堂资源中文www| 国产精品98久久久久久宅男小说| 少妇被粗大的猛进出69影院| 麻豆国产av国片精品| 中文资源天堂在线| 精品国产美女av久久久久小说| 国产麻豆成人av免费视频| 日本熟妇午夜| 久久久久久大精品| 国产又黄又爽又无遮挡在线| 欧美av亚洲av综合av国产av| 最近最新免费中文字幕在线| 真人做人爱边吃奶动态| 国产又爽黄色视频| 精品久久久久久久末码| 级片在线观看| 大型黄色视频在线免费观看| 日韩视频一区二区在线观看| 91麻豆av在线| 一本大道久久a久久精品| 波多野结衣高清无吗| 俄罗斯特黄特色一大片| 久久久国产成人精品二区| 久久久久国产精品人妻aⅴ院| 亚洲成人国产一区在线观看| 男人的好看免费观看在线视频 | 黄色丝袜av网址大全| 亚洲国产欧美日韩在线播放| 最近最新中文字幕大全免费视频| 亚洲欧美日韩高清在线视频| 每晚都被弄得嗷嗷叫到高潮| 亚洲精品久久成人aⅴ小说| www.www免费av| 免费观看精品视频网站| 精品电影一区二区在线| 淫秽高清视频在线观看| 女人被狂操c到高潮| 欧美精品啪啪一区二区三区| 欧美黑人精品巨大| 亚洲成av人片免费观看| 色综合婷婷激情| 亚洲国产精品sss在线观看| 黄频高清免费视频| 精品日产1卡2卡| 成年版毛片免费区| 午夜a级毛片| 国产精品久久视频播放| av欧美777| 日本免费a在线| 欧美丝袜亚洲另类 | 色综合欧美亚洲国产小说| 国产亚洲精品一区二区www| 免费看a级黄色片| 中文字幕另类日韩欧美亚洲嫩草| 精品久久蜜臀av无| 老熟妇乱子伦视频在线观看| 午夜a级毛片| 亚洲精品久久国产高清桃花| 欧美一级a爱片免费观看看 | 亚洲精品一卡2卡三卡4卡5卡| 一进一出好大好爽视频| 一区二区三区精品91| 成人一区二区视频在线观看| 国产精品久久久久久亚洲av鲁大| 午夜福利免费观看在线| e午夜精品久久久久久久| 日韩国内少妇激情av| 男女做爰动态图高潮gif福利片| 久久久久国内视频| 淫妇啪啪啪对白视频| 午夜视频精品福利| a级毛片a级免费在线| 最新在线观看一区二区三区| www日本在线高清视频| 在线观看一区二区三区| 麻豆av在线久日| 高潮久久久久久久久久久不卡| 亚洲成人久久性| 亚洲狠狠婷婷综合久久图片| 精品午夜福利视频在线观看一区| 老熟妇乱子伦视频在线观看| 欧美激情 高清一区二区三区| 很黄的视频免费| 久久久久国产精品人妻aⅴ院| 日本精品一区二区三区蜜桃| 久久久精品国产亚洲av高清涩受| 一本综合久久免费| 亚洲精品色激情综合| 一卡2卡三卡四卡精品乱码亚洲| 亚洲人成网站在线播放欧美日韩| 亚洲av日韩精品久久久久久密| 91麻豆av在线| 亚洲熟女毛片儿| 黑丝袜美女国产一区| 91大片在线观看| 久久国产乱子伦精品免费另类| a级毛片在线看网站| 人人妻人人看人人澡| 亚洲自拍偷在线| 最近最新免费中文字幕在线| 人妻丰满熟妇av一区二区三区| 无遮挡黄片免费观看| 亚洲黑人精品在线| 91在线观看av| 亚洲精品美女久久av网站| 亚洲第一欧美日韩一区二区三区| 久热爱精品视频在线9| 天堂√8在线中文| 两人在一起打扑克的视频| 亚洲色图 男人天堂 中文字幕| 久久天躁狠狠躁夜夜2o2o| 91大片在线观看| 男女下面进入的视频免费午夜 | 两个人看的免费小视频| 国产主播在线观看一区二区| 国产成人欧美在线观看| 一边摸一边做爽爽视频免费| 免费高清在线观看日韩| 国产成人av激情在线播放| 日本 av在线| 国内精品久久久久久久电影| 一级黄色大片毛片| 丝袜美腿诱惑在线| 久久午夜综合久久蜜桃| 国产高清激情床上av| 亚洲人成伊人成综合网2020| 成人特级黄色片久久久久久久| 亚洲熟妇熟女久久| 97超级碰碰碰精品色视频在线观看| 精品少妇一区二区三区视频日本电影| 嫩草影院精品99| 国产片内射在线| 久久久国产欧美日韩av| 欧美成狂野欧美在线观看| www日本在线高清视频| 亚洲av日韩精品久久久久久密| 99热这里只有精品一区 | 国产野战对白在线观看| 午夜免费激情av| 色婷婷久久久亚洲欧美| 亚洲精品粉嫩美女一区| 法律面前人人平等表现在哪些方面| 久久久久久人人人人人| 麻豆av在线久日| 亚洲午夜理论影院| 国产成年人精品一区二区| 成人亚洲精品av一区二区| 亚洲精品在线观看二区| 给我免费播放毛片高清在线观看| 国产精品乱码一区二三区的特点| 国产黄a三级三级三级人| 午夜久久久久精精品| 久久久国产欧美日韩av| 国产欧美日韩一区二区精品| 麻豆成人av在线观看| 夜夜爽天天搞| 色老头精品视频在线观看| 国产精品av久久久久免费| 怎么达到女性高潮| 欧美激情 高清一区二区三区| 午夜久久久在线观看| 巨乳人妻的诱惑在线观看| 女警被强在线播放| 亚洲全国av大片| 欧美日韩福利视频一区二区| 在线观看免费视频日本深夜| www.www免费av| 亚洲 欧美 日韩 在线 免费| 一本久久中文字幕| 久久久久久免费高清国产稀缺| 一夜夜www| 91大片在线观看| av欧美777| 亚洲人成伊人成综合网2020| 不卡一级毛片| 这个男人来自地球电影免费观看| 欧美国产精品va在线观看不卡| 国产精品爽爽va在线观看网站 | 久久久久久久久中文| 亚洲av美国av| 熟女少妇亚洲综合色aaa.| 久久欧美精品欧美久久欧美| 1024手机看黄色片| 一级黄色大片毛片| 免费人成视频x8x8入口观看| 两性午夜刺激爽爽歪歪视频在线观看 | 国产伦一二天堂av在线观看| 久久久久久久久久黄片| 99热这里只有精品一区 | 成人亚洲精品一区在线观看| 久久久久久久久免费视频了| 一区二区日韩欧美中文字幕| 狂野欧美激情性xxxx| 好男人电影高清在线观看| 欧美乱妇无乱码| 国产精品1区2区在线观看.| 午夜亚洲福利在线播放| 国产亚洲精品综合一区在线观看 | 欧美黑人精品巨大| 91麻豆av在线| 国产野战对白在线观看| 亚洲成人久久爱视频| 亚洲中文字幕一区二区三区有码在线看 | www.熟女人妻精品国产| 国产真人三级小视频在线观看| 日本撒尿小便嘘嘘汇集6| 亚洲精品在线观看二区| 国产精品久久视频播放| 757午夜福利合集在线观看| 亚洲黑人精品在线| 国产黄片美女视频| 一级片免费观看大全| 老熟妇乱子伦视频在线观看| 亚洲一码二码三码区别大吗| 老熟妇乱子伦视频在线观看| 亚洲国产精品成人综合色| 欧美激情久久久久久爽电影| 两个人视频免费观看高清| 欧美国产精品va在线观看不卡| 欧美性猛交黑人性爽| 久久青草综合色| 国产免费av片在线观看野外av| 国产亚洲欧美精品永久| 亚洲片人在线观看| 色综合欧美亚洲国产小说| 啦啦啦免费观看视频1| 国内久久婷婷六月综合欲色啪| 亚洲精品美女久久久久99蜜臀| 午夜日韩欧美国产| 国内毛片毛片毛片毛片毛片| 香蕉久久夜色| 国产精品av久久久久免费| 少妇熟女aⅴ在线视频| 色播亚洲综合网| 国产精品乱码一区二三区的特点| 一夜夜www| 日本熟妇午夜| av视频在线观看入口| 女性被躁到高潮视频| 99久久无色码亚洲精品果冻| 在线观看66精品国产| 久久天躁狠狠躁夜夜2o2o| 亚洲三区欧美一区| 免费看十八禁软件| 亚洲三区欧美一区| 别揉我奶头~嗯~啊~动态视频| 老熟妇仑乱视频hdxx| 国产国语露脸激情在线看| 日本五十路高清| www国产在线视频色| 日韩欧美一区视频在线观看| aaaaa片日本免费| 国产真人三级小视频在线观看| 成人18禁在线播放| 久久久久久久久久黄片| 国内精品久久久久精免费| 黄色视频不卡| 亚洲国产欧美网| 99国产综合亚洲精品| 国产成+人综合+亚洲专区| 中文字幕另类日韩欧美亚洲嫩草| 国产成+人综合+亚洲专区| 亚洲欧美一区二区三区黑人| 亚洲一区中文字幕在线| 夜夜爽天天搞| 欧美成人午夜精品| www.www免费av| 身体一侧抽搐| 欧美色欧美亚洲另类二区| 啦啦啦免费观看视频1| www.熟女人妻精品国产|