• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-Based Architectural Framework for Vertical Federated Learning

    2022-08-08 05:47:34QIANChenZHUWenjing朱雯晶

    QIAN Chen(錢 辰) , ZHU Wenjing(朱雯晶)

    1 School of Computer Science and Technology, Donghua University, Shanghai 201620, China 2 Institute of Scientific and Technical Information of Shanghai, Shanghai Library, Shanghai 200031, China

    Abstract: The introduction of blockchain to federated learning(FL)is a promising solution to enable anonymous clients to collaboratively learn a shared prediction model using local data while avoiding the risk caused by the central server. However, the current researches only apply a shallow convergence between the two technologies. The aroused problems, such as the unsuitable consensus, the lack of incentive mechanism, and the incompetence of handling vertically partitioned data, make the blockchain-based FL exist in name only. This paper puts forward a novel blockchain-based framework for vertical FL with a specified consensus and incentive. Moreover, a real-world example is demonstrated to prove the practicability of our work.

    Key words: vertical federated learning(FL); blockchain; smart contract; incentive mechanism

    Introduction

    With the advancements of machine learning(ML), various intelligent applications have been widely adopted across all areas of industries, especially those demanding knowledge and insights extracted from big data, such as healthcare and financial service[1-2].Undoubtedly, ML brings a new opportunity to traditional industries.As is well known, the quality of ML systems highly depends on the data,i.e., the more informative data we input, the more accurate model the ML system brings up.As a direct consequence, the continuous pursuit of data has inevitably exacerbated the privacy-preserving problem.In order to reduce the risks, two-thirds of countries indicate that they provide data protection by policy or legislation[3].It is a massive blow to ML research and industry despite the good intention.

    A new ML paradigm, namely federated learning(FL), has been regarded as the most promising solution[4].The main idea is to allow multiple clients(e.g., mobile devices)to train a model in a collaborative fashion, whereas the training data are kept decentralized,i.e., deposited in the local databases.FL quickly succeeded in the cross-device development of simple applications, such as keyword spotting and emoji prediction[5-6].However, to release its full potential, we need to upgrade the traditional FL methodologies.

    In this paper, we put forward a novel FL framework with three advantages.First, it allows multiple parties that own different attributes(e.g., features and labels)of the same data entity to jointly train a model.Second, it enhances the security of the data transfers taking place by introducing blockchain technology.Third, it promotes data sharing by an additional incentive mechanism based on an ad-hoc consensus algorithm.

    The remainder of this paper is organized as follows.Section 1 elaborates on the background of our work, including the potential issues of FL and the benefit of using blockchain.Section 2 presents the proposed framework in detail.Section 3 illustrates the experiment and a corresponding evaluation.Conclusions are drawn in section 4.

    1 Reviews

    The training process of traditional FL is orchestrated by a central server, whereas the training data are kept decentralized,i.e., deposited in the local databases.At present, most FL approaches rely on a conventional client-server network, whose architecture and behavior are demonstrated in Fig.1.Hence, FL is ordinarily considered a partial decentralized ML setting,i.e., the data are decentralized while the control is centralized.At present, it has been proved helpful in trivial real-world cases.

    Fig.1 Overview of FL framework

    However, as the research progresses, problems keep surfacing.Firstly, a hub in the network undoubtedly has the possibility to cause a single point of failure[7].Secondly, finding a third party that can be trusted by every single client is merely impossible in practice.Not even mentioning the third party anyway increases the risk of data breach and the complexity of system design[8].Thirdly, and most importantly, it has been proved that a central server may become a bottleneck of computation and communication when the number of clients is sizeable[9].

    To tackle the problems mentioned above, trending researchers investigated how to specify the FL algorithms within a peer-to-peer(P2P)framework, such as SimFL and SecureBoost[10-11].Both can build federated decision trees in a decentralized manner.Although the P2P network is not equivalent to the blockchain, it still shows that fully decentralization is the most promising strategy.

    1.1 Rationale of using blockchain in FL

    Blockchain, as the name implies, is a growing list of blocks linked by a virtual chain, where each block denotes an electronic record, and the chain symbolizes the cryptography methodology[12].The characteristics of blockchain are seemingly advantageous to FL[13]as follows.

    (1)Decentralization.The underlying infrastructure of blockchain systems can allow the transaction to be processed without authentication by a central server.Hence, blockchain is applicable for the P2P-based FL framework.

    (2)Persistency.Before a new block is added to the blockchain, it must be broadcast across the network and validated by other nodes.Thus, using blockchain can improve the robustness of FL, and data falsification can be detected easily.

    (3)Immutability.It is impossible to tamper with the on-chain data since the transactions are deposited in every node of the distributed network.So it certainly can make FL applications more secure.

    (4)Anonymity.The trust mechanism of blockchain allows users to interact with each other via generated addresses without exposing their real identities.Therefore, introducing blockchain in the FL domain fundamentally preserves the privacy of data owners.

    (5)Auditability.Blockchain can be considered a singly linked list, in which every block is marked with a timestamp.As a natural consequence, any transaction can be verified and traced.In other words, we can monitor the transactions after every training epoch in FL.

    The rise of the blockchain technology considerably promotes the development of smart contracts, which is defined as computerized transaction protocol to execute the term of an agreement[14].Ideally, establishing smart contracts in a blockchain environment takes over from third parties that have been essential to establish trust in the past.The ability to automatically interfere with the transaction process in a cost-effective, transparent, and secure fashion[15]is potentially beneficial for FL[16].It can be utilized to restrain the behavior of participants and automate the execution in FL workflows.Therefore, the interference of malicious behavior can be prevented while reducing the cost-efficiency in the training process.

    In addition, the incentive mechanism of blockchain may provide the last piece of the puzzle in FL[17].The conventional FL paradigms do not consider any incentive scheme, which becomes a well-known problem that is urgently needed to be addressed.In other words, the clients who offer more data or better data in FL deserve more rewards than a global model.Otherwise, they will train their own models to take advantage of market competition.Consequently, data silos are further created, which is exactly the opposite of what FL aims to achieve.

    To sum up, the aforementioned benefits of blockchain clearly express why we make a convergence of FL and blockchain technology in this paper.

    1.2 Horizontal FL versus vertical FL

    FL is categorized into two types in terms of the distribution characteristics of the data, namely horizontal FL and vertical FL, respectively[18].We hereby use a real-world example to explain their differences.

    Alzheimer’s disease is a progressive brain disorder that gradually destroys a person’s memory, thinking, and behavior.Normally, it can be diagnosed through the biomarkers(e.g., amyloid beta(ABETA), Tau protein(Tau))or neuropsychological examination(e.g., mini-mental state examination(MMSE), Alzheimer’s Disease Assessment Scale-Cognitive Subscale 13(ADAS-Cog13).The former can only be obtained via medical tests in hospitals, whereas the latter can be sat with apps nowadays.Figure 2(a)shows two hospitals have different patient groups from their respective regions, but they identify similar biomarkers, so the feature spaces are the same.Therefore, a global model can be established by a horizontal FL solution.However, Fig.2(b)illustrates another scenario in which the same patients receive medical data via different resources,i.e., the biomarker results from the hospital and the neuropsychological examination grades from a mobile application.Apparently, the feature spaces are different, but on the basis of both parties, we can get joint training in a vertical FL framework.The comparison in Fig.2 gives rise to a conclusion that horizontal FL should only be used in specific scenarios, in which data may significantly differ in sample space but must have a certain amount of overlap among features.Contrariwise, in vertical FL, the data differ in feature space but must partially overlap on sample ID.

    PTau-hyperphosphorylation of Tau; HV-hippocampal volume; ICV-intracerebral volume; WBV-whole brain volume.

    On one hand, horizontal FL algorithms are primarily implemented on an enormous number of intelligent devices or Internet of Things(IoT)equipment.The whole training process is orchestrated by an authoritative organization, while the clients are usually assumed honest.On the other hand, vertical FL demands fewer clients with homogenous data, while some might lack labels.Apparently, vertical FL has more potential for wider application prospects,e.g., drug discovery and intelligent manufacturing[19-20], despite it being more challenging from a technical point of view.This paper shows how to realize a vertical FL system in the proposed framework.

    2 Proposed Framework

    The problems that occur in current FL scenarios and the solution that may overcome the natural defects of FL are investigated in the previous section.So, a blockchain framework for vertical FL is introduced hereby.

    2.1 Architectural design

    The first step to undertake is to establish the underlying architecture of the proposed framework.As demonstrated in Fig.3, our framework is realized based on a fundamental structure of three layers, which can be described from bottom to top as follows.

    Fig.3 Architecture of proposed framework

    (1)Network layer.This layer embodies a fully decentralized P2P network connected by a number of nodes.To start a learning mission, one of the nodes becomes the task publisher, while the others become clients.It is worth noting that each client plays twofold roles,i.e., the trainer and the miner.The former performs the training with its data locally, whereas the latter is responsible for verifying the newly-issued transactions and further producing new blocks according to the verification results.

    (2)Ledger layer.The middle layer represents a distributed ledger.The data deposited in the ledger are constantly shared and synchronized across clients.Thereby, the events involved in the FL procedure,e.g., publishing a task, broadcasting learning models, and aggregating learning results, can be traced by any participant.

    (3)Service layer.The top layer is constituted by blockchain applications.In our framework, the smart contract and the FL system are deployed here, which can be adopted to invoke the events of FL.

    2.2 Smart contract

    Smart contracts are a significantly crucial piece in our framework.Typically, they are defined, programmed, and deployed on the blockchain by the task publisher while the FL system starts initialization.However, the smart contract has its defects[21].The contracts are coded by humans, so errors are unavoidable.Worse yet, it is impossible to make corrections directly on a contract registered on the blockchain.The only remedy requires creating a new smart contract altogether, which anyway increases the risk of introducing more mistakes into the system.

    To alleviate the problem, our framework uses a visualization modeling language, called BOX-MAN, to design and implement smart contracts in a compositional manner[22].

    The BOX-MAN model defines two types of services: atomic service and composite service, as shown in Fig.4(a).The services are connected by a composition connector, a adaptation connector, and a parallel connector(PAR), as shown in Fig.4(b).An atomic service encapsulates a set of methods in the form of an input-output function with a purpose that different services can access.A composite service consists of sub-services(atomic service or composite service), which are composed of exogenous composition connectors.Such connectors coordinate control flows between sub-services from the outside.Data flows are coordinated by horizontal data routing and vertical data routing.The former links the input and the output of individual services, whereas the latter is regarded as data propagation between the services and their sub-services.

    SEQ-sequencer; SEL-selector; LOP-loop; GUD-guard; PAR-parellel connector.

    The composition connector includes a sequencer(SEQ)and a selector(SEL).The former defines sequencing, while the latter defines branching.In contrast, the adaptation connectors do not compose services.Instead, they are applied to individual services with the aim of adapting the received controls.For instance, the guard allows control to reach a service only if the condition is satisfied, and the loop(LOP)repeats control to a component until the condition is no longer fulfilled.Additionally, the parallel connector is defined to handle the parallel invocation of sub-services.As a matter of fact, these connectors altogether can simulate any(nested)statement in computer programming,e.g., if-else statement, while statement, parallel statement, and block statement,etc.

    In order to manage the behavior of the proposed framework, three types of smart contracts have been designed as follows.

    (1)At the very beginning of learning, the task publisher must draw up a contract to clarify the task requirements.For example, the contract should define the data size so that the data owners who do not have enough samples are aware that they are not qualified to join the training.Other important criteria include training accuracy, latency, aggregation rules, reward program and so forth.This smart contract is accessible to all nodes in the blockchain network.

    (2)The first contract is essentially an initiative proposed by the task publisher.On the one hand, whoever is dissatisfied with the contract has the right to refuse the training request.On the other hand, interested participants must reply with their costs and capabilities.Such replies are also recorded using smart contracts and further registered on the blockchain.Meanwhile, every applicant must stake a deposit in the smart contract.For instance, every training node must prepare its data in a repository, whose directory path has to remain unchanged during the entire learning process.The path will be encrypted by the public key of the node and then be recorded in a smart contract, along with the hash of all data inside this directory.Therefore, if a dishonest client modifies its training data in the middle of the FL process, it will easily be spotted and hence lose the deposit.Contrariwise, the deposits will be automatically refunded after the entire learning is accomplished.

    (3)The smart contract is also immensely beneficial in aggregating results after every learning epoch.In section 2.1, we introduce how a central server collects the updates from all training nodes and performs an algorithm to aggregate them.However, the aggregation becomes a lot more complex in vertical FL on a P2P network.The workaround will be presented later, and hereby the smart contract guarantees the results are automatically aggregated without human intervention.Moreover, according to the reward program written in the contract, the miner can earn a bonus every time a new block is added to the blockchain.Finally, the smart contract can be automatically triggered to end the learning process by comparing the actual training accuracy with the expected one.

    2.3 Workflow process

    Based on the static architecture defined in Fig.1, the dynamic behavior of the proposed framework can be defined.Figure 5 shows the overall workflow.We hereby elaborate on the details of the activities in each step.

    2.3.1Step1—InitiatingtheFLsystem

    It is worth noting that this activity is conducted only once at the beginning of the FL process.With the aid of smart contracts, any node in the network is allowed to publish a learning task, which includes selecting the learning algorithm, implementing the initial model, determining the hyperparameters, establishing the reward program, selecting the participants, and so on.Qualified clients will receive the learning settings at last.

    Fig.5 Workflow of proposed framework

    2.3.2Step2—Localtraining

    After all, the gradient will be sent toJ, and accordingly,Jcan achieve the update, too.

    Figure 6 shows an example of the implementation of the training process using linear regression with gradient descent methods.The underlying algorithm adapted from Yangetal.[18]defines a training objective, which is

    (1)

    Fig.6 Training process of vertical FL using linear regression

    (2)

    (3)

    (4)

    It becomes obvious that the encrypted loss can be formulated as

    (5)

    (6)

    (7)

    2.3.3Step3—Uploadingthemodelupdate

    2.3.4Step4—Verificationandaggregation

    2.3.5Step5—Blockgenerationandaddition

    Although every node has its own model, only one can be deposited into the blockchain.In our framework, we use an FL empowered consensus called proof of training quality(PoQ)protocol, which seeks widespread agreement in terms of training quality among clients in the network[24].The consensus process starts with a broadcast of the new models, each of which is encrypted by the miner’s secret key.As a result, for any clientK, all models are collected and stored locally as candidate blocks.In order to conclude the proof of training,Kmust verify all received models by calculating the accuracyVKas

    (8)

    whereMkdenotes the model ofK, andωis considered as a weight parameter that indicates the contribution ofMkto the global model.Naturally,ωcan be determined by the size of training data

    (9)

    whereNkis the size ofK’s training data.Eventually, the node with minimumVKwill be automatically selected as the leader, and hence takes the responsibility for driving the consensus process with all other miners.

    As illustrated in Fig.7, every client creates a transactiont(Mk)that sends its modelMkto the leader, so the leader can accordingly create a global modelMby following the aggregation rule defined in the smart contract.After that, the leader constructs the candidate blocks, which can be described asBk=(Hk,t(Mk),M), whereHkdenotes the block header of a blockBk.The blocks will be further broadcast in the network for approval.For example, each verifying node receivesBiand starts the regular verification,e.g., examining the header format, checking the timestamp, and so on.Then, afterBiis proved to be valid, the node computes the values ofV(Mi)andV(M).If|V(Mi)-V(M)|is within a certain range, the node sends a reply to the leader for approval.IfBiis approved by all nodes, the lead will sign the block and add it to the blockchain.

    Fig.7 Consensus process

    2.3.6Step6—Blockbroadcast

    After a new block is added to the blockchain, it will be broadcast to every node in the network.However, in order to prevent blockchain forks, each node must send a confirmation signal to the leader if no fork is spotted.If the leader receives the signals from all nodes, the consensus process continues.Otherwise, the process starts over from step 2.

    2.3.7Step7—Updatingthelocalmodel

    Now clients can update their local models.Notably, the training can terminate here, and step 8 will be arrived next, depending on whether the end condition defined in the smart contract is triggered or not.Otherwise, the training process repeats from step 2.

    2.3.8Step8—Offeringtherewards

    The smart contract automatically rewards the trainers and miners according to their contributions to the FL process.

    3 Experiments

    FL is regarded as one of the most promising techniques to be associated with medical imaging[25].In this section, to verify the effectiveness of our framework, we conduct an experiment on real-world datasets.

    3.1 Introduction of dataset

    The data used in this paper are extracted from the Alzheimer’s Disease Neuroimaging Initiative(ADNI)dataset, in particular selected from structural magnetic resonance imaging(sMRI)data, which acquired using T1-weighted in-phase fast gradient-echo imaging at 1.5 T.These labeled 3D structural images can show the cross-sectional, coronal, and sagittal planes of the subject’s brain.We manually segment the images of the hippocampus in a total of 130 sets.

    3.2 Data pre-processing

    The pre-processing of the sMRI data before the experiment consists of four steps:(I)removal of the skull,(II)correction of the bias field,(III)data enhancement, and(IV)cropping to a uniform size.

    Firstly, the skull is relatively distant from the hippocampus.Thus, it contains irrelevant voxel information that needs to be removed.Secondly, some unpredictable factors(e.g., position)may affect the image brightness during the scan operation.This is also known as a bias field.It can result in an inhomogeneous distribution of the magnetic field of the MRI machine, and therefore must be corrected.Thirdly, because the size of annotated data is small, we have to enhance the data by flipping and rotating the images in order to overcome the overfitting problem and improve the performance of the model.Finally, the sMRI images are cropped uniformly into 128×128×128 pixels to fit the model input requirements.Figure 8 shows the result of data pre-processing.

    Fig.8 Comparison of sMRI data and pre-processed data

    Eventually, the pre-processed images are split into left and right halves, providing a dataset of each half to different data owners.In each half, the pre-processed data were divided into two parts: the training set and the test set.The former contains 80% of the data, while the latter includes the rest 20%.

    3.3 Experimental setup

    The underlying model in our experiment is called the 3DUnet-CBAM based hippocampal segmentation model, which is the former research of ours[26].As the name implies, this model uses a 3DUnet convolutional network to avoid information loss between two-dimensional slices while incorporating the CBAM attention mechanism in the last layer of downsampling.The model successfully captures and combines the deep and superficial features of the hippocampus using monolithic ML.We hereby regard it as the initial model in our FL experiment.The total number of iterations of the model is 10, the batch training size is set to 1, and the initial learning rate is 0.000 1.

    3.4 Experimental results

    In order to quantitatively evaluate the effectiveness of the proposed framework with the 3DUnet-CBAM model, we adopt three evaluation metrics: Dice similarity coefficient, precision rate, and recall rate.

    The Dice similarity coefficient is a measure of ensemble similarity, which is usually used to calculate the similarity of two samples.The value range is 0 to 1.The formula is

    (10)

    whereurepresents the hippocampus image after model segmentation,vrepresents the hippocampus manually labeled,|u∩v|is the intersection betweenuandv.|u|and|v|represent the number of voxels inuandv, respectively.

    The segmentation of the hippocampus in effect is a binary classification task, because the segmentation result of the hippocampus is binarized,i.e., the gray area with a value of 0 is considered as the background, while the one with a value of 255 is the segmented hippocampus extracted from 3D sMRI image.The precision rate indicates how many of the samples that are predicted to be positive are truly positive samples, whereas the recall rate indicates how many of the positive examples in the sample are predicted correctly.They can be calculated byTP/(TP+FP)andTP/(TP+FN), whereTPandFPdenote the numbers of true-positive and false-positive samples, respectively;FNdenotes the number of a false-negative result.

    The decision threshold set in this paper is 0.5.Table 1 shows the Dice similarity coefficient, precision rate, and recall rate of hippocampus segmentation using different ML paradigms.It becomes obvious that the proposed framework can perform an FL task and outcome a high-quality model, just like traditional ML can do.

    Table 1 Comparison of evaluation results using different training methods

    4 Conclusions

    In this paper, a novel framework that enables FL systems to be executed based on a blockchain network is presented.Based on the framework, a vertical FL approach to train a global model with heterogeneous data based on our framework is introduced.The data security in the FL process by providing a security mechanism of blockchain is also enhanced.Moreover, an incentive mechanism based on the consensus algorithm for our framework is successfully designed, which has the potential to promote data sharing between unknown clients.

    However, there are many remaining challenges.Some of them have originated from FL itself, while the rest is brought by blockchain.The former includes non-identically independently distributed(non-IID)data, threat models, poisoning attacks, and some algorithmic challenges.The latter contains scalability, inefficiency, and sometimes excessive transparency in the context of FL.Addressing the aforementioned issues is our future work.Although it is a long-term task, the ultimate goal of our research is to create a universal blockchain-based framework that is powerful and secure enough to execute any kind of FL training.

    精品一区二区三区视频在线| 中文乱码字字幕精品一区二区三区| 精品久久久精品久久久| 中文字幕精品免费在线观看视频 | 国产精品熟女久久久久浪| 久久久国产欧美日韩av| 国产成人aa在线观看| 在线 av 中文字幕| 欧美精品亚洲一区二区| 热re99久久精品国产66热6| 欧美 日韩 精品 国产| 乱人伦中国视频| 国产一区有黄有色的免费视频| 男人添女人高潮全过程视频| 80岁老熟妇乱子伦牲交| 欧美激情 高清一区二区三区| www.av在线官网国产| 国产av码专区亚洲av| 午夜福利网站1000一区二区三区| 美女福利国产在线| 看免费av毛片| 亚洲成人手机| 在线 av 中文字幕| 亚洲人与动物交配视频| 青春草国产在线视频| 久久人人97超碰香蕉20202| 亚洲精品一区蜜桃| 日韩一区二区视频免费看| 亚洲在久久综合| 99视频精品全部免费 在线| 成人毛片a级毛片在线播放| 亚洲精品乱码久久久久久按摩| av免费观看日本| 我的女老师完整版在线观看| 日本猛色少妇xxxxx猛交久久| 日本爱情动作片www.在线观看| 性色avwww在线观看| 侵犯人妻中文字幕一二三四区| 欧美3d第一页| 国产亚洲av片在线观看秒播厂| 热99久久久久精品小说推荐| 欧美xxⅹ黑人| 久久这里只有精品19| 国产精品人妻久久久影院| 久久午夜综合久久蜜桃| 久久午夜福利片| 国产成人aa在线观看| 男人舔女人的私密视频| 成年动漫av网址| 看免费成人av毛片| 国产精品 国内视频| 国产精品 国内视频| 欧美bdsm另类| 成人国产av品久久久| 人妻 亚洲 视频| 欧美精品高潮呻吟av久久| 久久久国产欧美日韩av| 午夜福利乱码中文字幕| 黑人巨大精品欧美一区二区蜜桃 | 久久午夜福利片| 2022亚洲国产成人精品| 午夜av观看不卡| 制服诱惑二区| 亚洲欧洲国产日韩| 日本猛色少妇xxxxx猛交久久| 国精品久久久久久国模美| 国产精品熟女久久久久浪| 婷婷成人精品国产| 国产一区有黄有色的免费视频| 免费看光身美女| 国产成人精品无人区| 亚洲色图 男人天堂 中文字幕 | 国语对白做爰xxxⅹ性视频网站| 国产成人aa在线观看| 黑人巨大精品欧美一区二区蜜桃 | 九色成人免费人妻av| 美女大奶头黄色视频| 青春草视频在线免费观看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 黑人欧美特级aaaaaa片| av电影中文网址| 欧美日韩亚洲高清精品| 久久婷婷青草| 国产熟女欧美一区二区| 一本色道久久久久久精品综合| 我要看黄色一级片免费的| 久久精品国产a三级三级三级| 国产精品不卡视频一区二区| 春色校园在线视频观看| 青青草视频在线视频观看| 久久青草综合色| 久久精品国产综合久久久 | 一个人免费看片子| 亚洲情色 制服丝袜| 天美传媒精品一区二区| 中文字幕精品免费在线观看视频 | 蜜桃在线观看..| 人体艺术视频欧美日本| 最新的欧美精品一区二区| 久久久久视频综合| 午夜免费鲁丝| 久久人人爽人人片av| 免费少妇av软件| 日韩精品免费视频一区二区三区 | 18在线观看网站| 日韩中字成人| 欧美少妇被猛烈插入视频| 久久午夜福利片| 久久精品久久久久久久性| 青春草视频在线免费观看| 全区人妻精品视频| 2018国产大陆天天弄谢| 欧美日韩亚洲高清精品| 九九在线视频观看精品| 久久久国产一区二区| 欧美xxxx性猛交bbbb| 国产成人午夜福利电影在线观看| 最新中文字幕久久久久| 亚洲国产色片| 国产精品人妻久久久久久| 国产精品国产三级专区第一集| 观看美女的网站| 国产爽快片一区二区三区| 国产av码专区亚洲av| 国产国拍精品亚洲av在线观看| 狂野欧美激情性bbbbbb| 岛国毛片在线播放| www.色视频.com| a级毛片黄视频| 久久久欧美国产精品| 国产 一区精品| 观看美女的网站| 老司机影院成人| 国产1区2区3区精品| 成人黄色视频免费在线看| 街头女战士在线观看网站| av免费在线看不卡| 啦啦啦中文免费视频观看日本| 国产成人aa在线观看| 一个人免费看片子| 国产成人精品在线电影| 极品人妻少妇av视频| 国产精品嫩草影院av在线观看| 久热这里只有精品99| 成人手机av| 久久韩国三级中文字幕| 午夜福利乱码中文字幕| 草草在线视频免费看| 久久国内精品自在自线图片| 一区二区日韩欧美中文字幕 | 9色porny在线观看| 亚洲少妇的诱惑av| 国产精品偷伦视频观看了| 精品少妇内射三级| 久久久欧美国产精品| 精品国产乱码久久久久久小说| 一区二区三区乱码不卡18| 久久这里有精品视频免费| 两性夫妻黄色片 | 亚洲精品美女久久久久99蜜臀 | 精品一品国产午夜福利视频| 一区二区三区精品91| 国产精品久久久久久av不卡| 欧美变态另类bdsm刘玥| 国产成人91sexporn| 国产 精品1| 国产一区二区三区综合在线观看 | 国产又色又爽无遮挡免| 最新中文字幕久久久久| 秋霞在线观看毛片| 国产成人精品在线电影| 国产精品女同一区二区软件| 午夜影院在线不卡| 日本与韩国留学比较| 久久 成人 亚洲| 日韩一本色道免费dvd| 欧美少妇被猛烈插入视频| 婷婷成人精品国产| 男女免费视频国产| 嫩草影院入口| 伦精品一区二区三区| 色婷婷av一区二区三区视频| 亚洲综合精品二区| 91精品三级在线观看| 女人精品久久久久毛片| 秋霞在线观看毛片| 亚洲欧美一区二区三区黑人 | 侵犯人妻中文字幕一二三四区| 黄色配什么色好看| 激情五月婷婷亚洲| 黑人巨大精品欧美一区二区蜜桃 | 欧美 日韩 精品 国产| 精品熟女少妇av免费看| 国产日韩一区二区三区精品不卡| 少妇精品久久久久久久| 日韩中字成人| 少妇人妻精品综合一区二区| 色网站视频免费| 18禁裸乳无遮挡动漫免费视频| 啦啦啦视频在线资源免费观看| 在线观看人妻少妇| 色网站视频免费| 国产成人免费观看mmmm| 妹子高潮喷水视频| 天天操日日干夜夜撸| 久久99热这里只频精品6学生| 久久久久久久亚洲中文字幕| 少妇被粗大猛烈的视频| 欧美xxxx性猛交bbbb| 久久精品人人爽人人爽视色| 又粗又硬又长又爽又黄的视频| 大香蕉97超碰在线| 中国国产av一级| 啦啦啦在线观看免费高清www| 丝袜美足系列| 国产精品久久久久久精品古装| 欧美变态另类bdsm刘玥| 欧美精品一区二区大全| 色吧在线观看| 最近手机中文字幕大全| 免费黄频网站在线观看国产| www.av在线官网国产| 大片电影免费在线观看免费| 亚洲少妇的诱惑av| 国产一区二区在线观看日韩| 秋霞在线观看毛片| 天天操日日干夜夜撸| 少妇猛男粗大的猛烈进出视频| 一区二区日韩欧美中文字幕 | 夜夜骑夜夜射夜夜干| 高清视频免费观看一区二区| 各种免费的搞黄视频| 欧美亚洲日本最大视频资源| 一级,二级,三级黄色视频| 大片免费播放器 马上看| 国产不卡av网站在线观看| 菩萨蛮人人尽说江南好唐韦庄| 一级黄片播放器| 国产熟女欧美一区二区| 亚洲 欧美一区二区三区| 午夜福利乱码中文字幕| 亚洲成国产人片在线观看| 婷婷色av中文字幕| 一级,二级,三级黄色视频| 午夜老司机福利剧场| 欧美老熟妇乱子伦牲交| 亚洲内射少妇av| 亚洲图色成人| av福利片在线| 免费看av在线观看网站| 婷婷色麻豆天堂久久| 午夜福利影视在线免费观看| 人人妻人人澡人人爽人人夜夜| 国产高清国产精品国产三级| 日韩精品免费视频一区二区三区 | 黄色 视频免费看| 亚洲精品aⅴ在线观看| 大片免费播放器 马上看| 欧美激情 高清一区二区三区| 国产欧美另类精品又又久久亚洲欧美| 老熟女久久久| 久久久久精品久久久久真实原创| 欧美丝袜亚洲另类| 这个男人来自地球电影免费观看 | 国产免费视频播放在线视频| 80岁老熟妇乱子伦牲交| 91aial.com中文字幕在线观看| 丰满少妇做爰视频| 久久精品aⅴ一区二区三区四区 | 久久免费观看电影| 久久久久国产精品人妻一区二区| 黄色配什么色好看| 最黄视频免费看| xxxhd国产人妻xxx| 丝瓜视频免费看黄片| 在线天堂最新版资源| 又粗又硬又长又爽又黄的视频| 亚洲人与动物交配视频| 国产毛片在线视频| 亚洲美女视频黄频| 9热在线视频观看99| 亚洲国产日韩一区二区| 国产精品一国产av| 亚洲婷婷狠狠爱综合网| 久久国产精品男人的天堂亚洲 | 国产高清国产精品国产三级| 秋霞在线观看毛片| 91精品三级在线观看| 一区二区三区精品91| 美女内射精品一级片tv| 亚洲国产毛片av蜜桃av| 久久久久久久久久久久大奶| 在线观看国产h片| 欧美成人精品欧美一级黄| 国产免费现黄频在线看| 中文欧美无线码| 日韩av在线免费看完整版不卡| 在线观看三级黄色| av卡一久久| 久久青草综合色| 亚洲国产成人一精品久久久| 大陆偷拍与自拍| 女人精品久久久久毛片| 美女国产高潮福利片在线看| 国产午夜精品一二区理论片| 亚洲熟女精品中文字幕| 精品国产国语对白av| 日本欧美视频一区| 只有这里有精品99| 国产成人a∨麻豆精品| 欧美精品高潮呻吟av久久| 精品国产一区二区久久| 香蕉精品网在线| 免费高清在线观看视频在线观看| 韩国av在线不卡| 久久久久久久久久久久大奶| 午夜激情av网站| 日本-黄色视频高清免费观看| 国产精品久久久久久av不卡| 国产探花极品一区二区| 欧美日韩视频高清一区二区三区二| 久久这里有精品视频免费| 精品午夜福利在线看| 精品人妻一区二区三区麻豆| av福利片在线| 久久久久久人妻| 国产熟女午夜一区二区三区| 亚洲精品456在线播放app| 免费人妻精品一区二区三区视频| 麻豆精品久久久久久蜜桃| 国产精品 国内视频| 2021少妇久久久久久久久久久| 欧美日韩综合久久久久久| 国产精品久久久久久av不卡| 亚洲人成77777在线视频| 亚洲色图综合在线观看| 伦理电影大哥的女人| 亚洲精品久久午夜乱码| 日本黄色日本黄色录像| 亚洲,一卡二卡三卡| 欧美激情国产日韩精品一区| 日本爱情动作片www.在线观看| 久久av网站| 成人18禁高潮啪啪吃奶动态图| 赤兔流量卡办理| 观看av在线不卡| 妹子高潮喷水视频| 一区在线观看完整版| 黄网站色视频无遮挡免费观看| a级毛片在线看网站| 亚洲欧美中文字幕日韩二区| 寂寞人妻少妇视频99o| 一本大道久久a久久精品| 国产av精品麻豆| 午夜91福利影院| 欧美最新免费一区二区三区| 成人无遮挡网站| 欧美最新免费一区二区三区| 午夜福利影视在线免费观看| 日本-黄色视频高清免费观看| 婷婷色综合www| 全区人妻精品视频| 老司机影院成人| 久久99一区二区三区| 2021少妇久久久久久久久久久| 肉色欧美久久久久久久蜜桃| 99久国产av精品国产电影| 精品熟女少妇av免费看| 大香蕉97超碰在线| 欧美精品人与动牲交sv欧美| 久久久久国产精品人妻一区二区| 超色免费av| 久久久精品区二区三区| 一区在线观看完整版| 久热久热在线精品观看| 日本午夜av视频| 亚洲精品456在线播放app| 免费观看a级毛片全部| 成人二区视频| 日本av免费视频播放| 婷婷色av中文字幕| av福利片在线| 高清在线视频一区二区三区| 一本—道久久a久久精品蜜桃钙片| 涩涩av久久男人的天堂| 国产成人精品婷婷| 少妇被粗大的猛进出69影院 | 黄网站色视频无遮挡免费观看| 亚洲精品,欧美精品| 亚洲成人一二三区av| 波多野结衣一区麻豆| 欧美 日韩 精品 国产| 欧美bdsm另类| 男女午夜视频在线观看 | 80岁老熟妇乱子伦牲交| 美女xxoo啪啪120秒动态图| 国产伦理片在线播放av一区| 91在线精品国自产拍蜜月| 九草在线视频观看| 成人无遮挡网站| 狠狠婷婷综合久久久久久88av| 久久国产亚洲av麻豆专区| 波野结衣二区三区在线| 最近手机中文字幕大全| 中文天堂在线官网| 国产亚洲一区二区精品| 国产极品粉嫩免费观看在线| 国产亚洲精品第一综合不卡 | 久久av网站| 精品少妇久久久久久888优播| www.av在线官网国产| 亚洲婷婷狠狠爱综合网| 日本黄大片高清| 熟女人妻精品中文字幕| 日本与韩国留学比较| 亚洲国产欧美日韩在线播放| 国产一区二区在线观看av| 午夜福利视频在线观看免费| 九色成人免费人妻av| 久热这里只有精品99| 制服人妻中文乱码| 日韩,欧美,国产一区二区三区| 午夜福利视频精品| 精品熟女少妇av免费看| 97精品久久久久久久久久精品| 欧美亚洲 丝袜 人妻 在线| 亚洲精品中文字幕在线视频| 极品人妻少妇av视频| 久久久久久久亚洲中文字幕| av一本久久久久| 深夜精品福利| 丝袜美足系列| 亚洲一码二码三码区别大吗| 亚洲精品第二区| 香蕉国产在线看| 久久人人97超碰香蕉20202| 一级毛片 在线播放| 久久国产精品男人的天堂亚洲 | 欧美人与性动交α欧美软件 | 如何舔出高潮| 我的女老师完整版在线观看| h视频一区二区三区| 国产高清国产精品国产三级| 大香蕉久久网| 我要看黄色一级片免费的| 肉色欧美久久久久久久蜜桃| 最近的中文字幕免费完整| 久久99蜜桃精品久久| 久久久久久久大尺度免费视频| 色婷婷av一区二区三区视频| h视频一区二区三区| 美女xxoo啪啪120秒动态图| 大香蕉久久网| 免费日韩欧美在线观看| freevideosex欧美| 自线自在国产av| 久久这里只有精品19| 久久久久久久国产电影| 婷婷色麻豆天堂久久| 国产免费一区二区三区四区乱码| av.在线天堂| 欧美精品亚洲一区二区| 日本午夜av视频| 午夜精品国产一区二区电影| 亚洲第一区二区三区不卡| 日本欧美国产在线视频| 纵有疾风起免费观看全集完整版| 天堂俺去俺来也www色官网| av福利片在线| 亚洲第一av免费看| 成人影院久久| 久久精品aⅴ一区二区三区四区 | 亚洲国产精品一区二区三区在线| 免费大片黄手机在线观看| 18禁国产床啪视频网站| 亚洲av中文av极速乱| 一级a做视频免费观看| 欧美精品亚洲一区二区| 日韩成人伦理影院| 欧美日韩视频精品一区| 在线观看三级黄色| 久久久久网色| 午夜视频国产福利| 亚洲精品自拍成人| 欧美性感艳星| 国产爽快片一区二区三区| 岛国毛片在线播放| 国产男女内射视频| 久久99热6这里只有精品| 国产成人一区二区在线| 国产国语露脸激情在线看| 最后的刺客免费高清国语| av在线app专区| 精品久久久久久电影网| 国产日韩欧美亚洲二区| 国产精品三级大全| 少妇的逼水好多| 观看美女的网站| 人妻一区二区av| 嫩草影院入口| 国产成人精品在线电影| 久久久久网色| 制服丝袜香蕉在线| 国产成人aa在线观看| av在线观看视频网站免费| 建设人人有责人人尽责人人享有的| 欧美人与性动交α欧美精品济南到 | 少妇精品久久久久久久| 七月丁香在线播放| 又黄又爽又刺激的免费视频.| 九色成人免费人妻av| 久久这里有精品视频免费| xxxhd国产人妻xxx| 亚洲国产日韩一区二区| 久久国内精品自在自线图片| 99国产精品免费福利视频| 久久精品久久精品一区二区三区| 香蕉丝袜av| 午夜福利影视在线免费观看| 国产黄色免费在线视频| 国产无遮挡羞羞视频在线观看| 少妇人妻久久综合中文| 97精品久久久久久久久久精品| 国产一区二区在线观看日韩| 丝袜在线中文字幕| 亚洲国产av新网站| h视频一区二区三区| 精品一区在线观看国产| 久久精品人人爽人人爽视色| 国语对白做爰xxxⅹ性视频网站| 男女边摸边吃奶| 9热在线视频观看99| 亚洲天堂av无毛| 老女人水多毛片| 啦啦啦在线观看免费高清www| 色5月婷婷丁香| 久久精品久久精品一区二区三区| 国产不卡av网站在线观看| 免费在线观看黄色视频的| 最近手机中文字幕大全| kizo精华| 日韩大片免费观看网站| 久久精品国产a三级三级三级| 中文字幕另类日韩欧美亚洲嫩草| 女人精品久久久久毛片| 欧美激情 高清一区二区三区| www.色视频.com| 亚洲精品国产av蜜桃| 母亲3免费完整高清在线观看 | 国产精品久久久久久久电影| 国产一区二区三区av在线| 校园人妻丝袜中文字幕| 啦啦啦啦在线视频资源| 国产av码专区亚洲av| 制服人妻中文乱码| 新久久久久国产一级毛片| 亚洲av欧美aⅴ国产| 国产av国产精品国产| 精品亚洲乱码少妇综合久久| 91午夜精品亚洲一区二区三区| 国产成人免费无遮挡视频| 国产精品国产av在线观看| 国产国拍精品亚洲av在线观看| 久久久久久人人人人人| 午夜福利网站1000一区二区三区| 人妻人人澡人人爽人人| 亚洲久久久国产精品| 免费观看无遮挡的男女| 一级毛片黄色毛片免费观看视频| 激情视频va一区二区三区| 免费人妻精品一区二区三区视频| 午夜精品国产一区二区电影| 97在线视频观看| 欧美+日韩+精品| 国内精品宾馆在线| 国产精品一国产av| 黑人巨大精品欧美一区二区蜜桃 | 嫩草影院入口| av.在线天堂| 欧美成人精品欧美一级黄| 亚洲国产欧美在线一区| 亚洲欧美成人精品一区二区| 一本大道久久a久久精品| 你懂的网址亚洲精品在线观看| 在线观看www视频免费| 日韩中文字幕视频在线看片| kizo精华| 国内精品宾馆在线| 只有这里有精品99| 免费日韩欧美在线观看| 久久久久久久久久久免费av| 亚洲欧洲日产国产| 99久久人妻综合| 国产 一区精品| 51国产日韩欧美| 中文天堂在线官网| 亚洲精品456在线播放app| 亚洲国产精品专区欧美| 中国美白少妇内射xxxbb| 91精品国产国语对白视频| 久久久亚洲精品成人影院| 亚洲少妇的诱惑av| 国国产精品蜜臀av免费| 大陆偷拍与自拍| 在线 av 中文字幕| 少妇人妻 视频| 中国美白少妇内射xxxbb| 美女内射精品一级片tv| 亚洲国产精品一区二区三区在线| 免费看av在线观看网站| 久久久国产一区二区| 国产毛片在线视频| 成年人午夜在线观看视频| 免费播放大片免费观看视频在线观看| 精品视频人人做人人爽|