• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Deep Learning with Image Classification Based Secure CPS for Healthcare Sector

    2022-08-24 06:59:14AhmedAlmasoudAbdelzahirAbdelmaboudFaisalAlsubaeiManarAhmedHamzaIshfaqYaseenMohammedAbakerAbdelwahedMotwakelandMohammedRizwanullah
    Computers Materials&Continua 2022年8期

    Ahmed S.Almasoud,Abdelzahir Abdelmaboud,Faisal S.Alsubaei,Manar Ahmed Hamza,Ishfaq Yaseen,Mohammed Abaker,Abdelwahed Motwakel and Mohammed Rizwanullah

    1Department of Information Systems,College of Computer and Information Sciences,Prince Sultan University,Riyadh,12435,Saudi Arabia

    2Department of Information Systems,College of Science and Arts,King Khalid University,Mahayil Asir,62529,Saudi Arabia

    3Department of Cybersecurity,College of Computer Science and Engineering,University of Jeddah,Jeddah,21959,Saudi Arabia

    4Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,AlKharj,16278,Saudi Arabia

    5Department of Computer Science,Community College,King Khalid University,Mahayil Asir,62529,Saudi Arabia

    Abstract: Cyber-Physical System(CPS)involves the combination of physical processes with computation and communication systems.The recent advancements made in cloud computing,Wireless Sensor Network(WSN),healthcare sensors,etc.tend to develop CPS as a proficient model for healthcare applications especially,home patient care.Though several techniques have been proposed earlier related to CPS structures,only a handful of studies has focused on the design of CPS models for health care sector.So,the proposal for a dedicated CPS model for healthcare sector necessitates a significant interest to ensure data privacy.To overcome the challenges,the current research paper designs a Deep Learning-based Intrusion Detection and Image Classification for Secure CPS (DLIDIC-SCPS) model for healthcare sector.The aim of the proposed DLIDIC-SCPS model is to achieve secure image transmission and image classification process for CPS in healthcare sector.Primarily,data acquisition takes place with the help of sensors and detection of intrusions is performed using Fuzzy Deep Neural Network (FDNN) technique.Besides,Multiple Share Creation (MSC) approach is used to create several shares of medical image so as to accomplish security.Also,blockchain is employed as a distributed data storage entity to create a ledger that provides access to the client.For image classification,Inception v3 with Fuzzy Wavelet Neural Network (FWNN) is utilized that diagnose the disease from the applied medical image.Finally,Salp Swarm Algorithm(SSA)is utilized to fine tune the parameters involved in WNN model,thereby boosting its classification performance.A wide range of simulations was carried out to highlight the superiority of the proposed DLIDIC-SCPS technique.The simulation outcomes confirm that DLIDIC-SCPS approach demonstrates promising results in terms of security,privacy,and image classification outcomes over recent state-of-the-art techniques.

    Keywords: Cyber Physical Systems;healthcare;cybersecurity;deep learning;share creation;image classification

    1 Introduction

    Cyber-Physical System (CPS) is a structural framework which encompasses communication technologies and pervasive sensing and offers loads of advantages to both society and the country’s economy.In other terms,it can be defined as an engineered structure in which the physical processes/systems get increased with cyber components like communication networks,computational hardware,etc.[1].These components are closely connected with one another;hence the functionality of individual components is decided based on another component.In recent years,the penetration of CPS has gradually increased in the fields of Industrial Internet of Things(IIoT),energy,health,and transportation.The main focus of this research is the development of a system that is flexible,smart,efficient and possess reliability,stability,security,privacy,and robustness[2].But tremendous growth in adoption of this technology has also exposed this system to have profound and serious risks.When these risks are not managed,it tend to lose the remarkable benefits which it could offer[3].

    At the moment,blockchain healthcare is the most commonly used application to keep healthcare information,secure and safe.Security is a key challenge in the medical sector [4].Between 2009 and 2017,the healthcare records of around 176 million patients got revealed in security breaches.These perpetrators stole health and genomic testing records,banking and credit card data.However,Blockchain technology has the capacity to keep transparent,incorruptible and decentralized logs of information about each patient.This characteristic makes it a technology apt for security application.In addition,blockchain is private as well as transparent that can hide the identity of a person using secure and complex codes and can secure the sensitivity of healthcare information too[5].Since the technology is decentralized in nature,it enables doctors,medical service providers,and patients to share similar data amongst themselves securely and rapidly.The key challenge,when handling such medical data,is to guarantee data security from different sorts of cyberattacks namely,tampering and unauthorized access.

    Blockchain has secured the position of a digital ledger which is configured to record transactions in finance and other sectors,where the preservation of historical records of e-transaction is critical in nature.Blockchain is the main technology behind bitcoin,a kind of cryptocurrency.Bitcoin is invented after the financial crisis of 2009,as an alternative to conventional currency [6].One of the main reasons behind the introduction of this technology is the failure of centralized bank in terms of preserving financial records.Financial institutions,for a known period of time,have distinguished the requirement for a distributed decision-making method.However,such methods were not implemented,until the emergence of crypto-currency fueled by blockchain technology[7].

    1.1 Objectives of the Study

    In this study,the aim of the proposed model is to achieve secure image transmission and image classification for CPS in healthcare sector.

    1.2 Contributions of the Study

    The current study designs a Deep Learning-based Intrusion Detection and Image Classification for Secure CPS(DLIDIC-SCPS)model to be applied in healthcare sector.Primarily,data acquisition takes place using sensors and the detection of intrusions is performed usig Fuzzy Deep Neural Network(FDNN)model.Besides,Multiple Share Creation(MSC)approach is used to create multiple shares of medical image to accomplish security.Also,blockchain is employed as a distributed data storage to create a ledger that provides access to the client.For image classification,Inception v3 with Fuzzy Wavelet Neural Network (FWNN) is utilized for disease diagnosis from the applied medical image.Finally,Salp Swarm Algorithm(SSA)is applied to fine tune the parameters involved in WNN model,thereby improving its classification performance.A wide range of simulations was carried out to highlight the superiority of the proposed DLIDIC-SCPS model.

    1.3 Organization of the Study

    Rest of the study is arranged as follows.Section 2 briefs the recently-developed models related to the study domain.Section 3 introduces the proposed model and Section 4 validates the performance of the proposed model.Lastly,Section 5 draws the conclusion.

    2 Related Works

    Shu et al.[8]described a 2-phase architecture in which the healthcare records are shared on-blockchain and stored off-blockchain.Additionally,a multi-trapdoor hash function was also presented in this study.The objective is to realize the validation of medical apps,medical staff,and medical equipment,to guarantee the integrity of healthcare information,and to assist in sharing healthcare data and secured storage.The presented system is computationally effective,since it does not utilize exponential operations and bi-linear maps.Verma et al.[9]proposed a novel Internet of Things (IoT)-Fog-Cloud enabled CPS model for diagnoses and classification of Ulcerative Colitis using Na?ve Bayes (NB) and Deep Neural Network (DNN) classifiers correspondingly.Lastly,the compiled healthcare data was analyzed and the results of all the users were stored on cloud.

    The aim of the study conducted by Hussain et al.[10]is to measure the possibilities of a cyberphysical cardiac monitoring scheme so as to categorize stroke patients from healthy adults with altered cardiac activity.Xu et al.[11]introduced a certificateless signature system based on N-th degree Truncated polynomial Ring Units(NTRU)lattice.The latter is constructed based on the complexity of small integer solutions in NTRU lattice and is recognized as quantum attack resilience.Performance evaluation and security analyses of the model demonstrate that the presented method considerably decreased the computation cost and communication.

    Ali et al.[12]proposed a method in which the researchers used criticality analysis,failure modes,and effects,i.e.,a prominent hazard analyses method to have a better understanding about failure and risk avoidance.In this method,the authors transformed Criticality Analysis model,Failure Modes and Effects into Unified Modeling Language(UML)class diagram.Later,a knowledge base was created on the basis of derived UML class diagram.Patan et al.[13]designed a holistic DNN-driven IoT smart medical system named Grey Filter Bayesian Convolution Neural Network(GFB-CNN)based on real-time analysis.In this work,the authors proposed a holistic Artificial Intelligence(AI)-driven IoT eHealth framework based on GFB-CNN while the essential quality of services(QoS)parameters such as overhead and time got decreased by a high rate of accuracy.

    3 The Proposed Model

    In this study,a novel DLIDIC-SCPS technique is derived for intrusion detection and image management in blockchain-enabled CPS healthcare sector.The proposed model encompasses different processes such as data acquisition,FDNN-based intrusion detection,MSC-based share creation,data transmission,Inception-based feature extraction,FWNN-based classification,and SSA-based parameter tuning.These processes are discussed clearly in the following sections.

    3.1 FDNN-Based Intrusion Detection

    Initially,the healthcare data collected from different sources is fed as input into FDNN model to detect the existence of intrusions.FDNN method is applied for concurrent extraction of neural and fuzzy depiction data.The knowledge,acquired from these two factors,is then incorporated in fusion layer so as to attain the last depiction and classify the data.Fuzzy-based representation reduces uncertainty whereas neural representation discards the noise that may be present in the input data.FDNN method utilizes two efficient depictions to create a fused representation for end classification.This method includeslas a layer number,a(il)specifies the input ofithnode ando(il)is a similar result.Simultaneously,the distinct portions included in FDNN are given herewith.Fig.1 illustrates the architecture of FDNN method[14].

    Figure 1:Structure of FDNN

    Fusion concept depends on the principle of multi-modal learning [15]that imposes feature extraction from a separate view which is not sufficient for capturing complex framework of higher content data.It generates a set of features from numerous views and synthesizes it to a higherlevel depiction for the implementation of classification.In FDNN,both neural and fuzzy parts are employed to seek an efficient depiction by reducing noises and uncertainties of input data.Additionally,fuzzy and neural learning parts are organized in neural network.Hence,it is instinctive to develop the feature fusion phase.Now,the widely-employed multi-model Neural Network(NN)is applied in the integration of fuzzy and neural depictions with densely-connected fusion layers.

    where the outputs from deeper depiction term(od)and fuzzy logic(FL)depiction term(of)undergo fusion with wdand wfweights.

    3.2 Process Involved in MSC Technique

    At this stage,the medical images are fed into MSC approach to create many shares.When intrusion is resolved from the captured information,secure image broadcast method is initiated for cloud servers.Primarily,MSC technique is implemented for the creation of four shares of all individual images attained under physical device.The projected MSC technique broadcasts the image to cloud servers from secured and secret techniques.The image is sent as a share while every share is combined with reconstruction of a novel input image.MSC technique generates the share in pixel value.It removes the pixel value in image and is employed in the creation of several shares.At last,the shares are separated as blocks and the blocks are securely transferred based on blockchain approach.The procedures followed in MSC technique are discussed herewith.The actual pixel value of input image is resolved as follows.

    wherepixelimplies the whole values of Rm,Gm,and Bm.

    3.2.1 Share Creation

    Each pixel,present in the input image,is regarded as the framework ofntransformed techniques and is named as share.Each share includes a fixed number of sub-pixels as Red-Green-Blue (RGB)images[16].The share towards RGB is separately denoted as Rsh,Gsh,and Bshand are determined as follows.

    whereaandbrefers to the place of matrix,Rsh,GshandBshimply the shares of RGB,Rab,Gab,andBabsignify the elements of an image pixel.Prior to the creation of shares,fundamental matrices are required that produce results,based on the number of shares created.In addition,an arbitrary key is provided with respect to block size of input images.Usually,block size is introduced as either 4×4 or 8×8.The share count is determined to be 2sh,when theS≥2.The fundamental matrix is attained,when the RGB value from pixels is divided by S.

    3.2.2 Share Reconstruction

    After the creation and broadcasting of the shares to cloud servers,share reconstruction occurs in which every share is combined to retrieve the actual image.Image reconstruction is performed as follows.

    After the shares are reconstructed,the input image is recovered effectively.At that time,the attained image endures classification procedure for identifying as well as classifying the presence of diseases.

    3.3 Blockchain-Enabled Secure Transmission

    MSC-based share generation procedure creates several shares for all the images.Afterwards,the shares are divided as blocks while these blocks are securely transferred to cloud servers by following blockchain approach.Therefore,an intruder record could not change as all the blocks are collected with cryptographic value of recent blocks.In blockchain method,all the transactions are cryptographically employed with hash values and are validated by miners.It has repeating measures of entire ledger and blocks of all transactions.Fig.2 illustrates the architecture of blockchain [17].Blockchain has the ability to distribute the ledger of data from decentralization,shared,safe,and trusted approaches.

    Figure 2:Structure of Blockchain

    Decentralization storing is a kind of blockchain.It is executed to store the maximum data linked to existing and preceding blocks with the help of smart contract codes.SiacoinDB,BigchainDB,Swarm,MoneroDB,InterPlanetary File System(IPFS),LitecoinDB,and so on,are executed as decentralized databases in recent times.IPFS is determined as a Point to Point,decentralized and shared database that is well connected as well as has forward standard files.IPFS is an important storage which is employed by blockchain technique in IoT function to acquire the maximum throughput.

    3.4 Design of Image Classification Process

    In this final stage,the classification of medical images takes place through three sub-processes namely,Inception-based feature extraction,FWNN-based classification,and SSA-based parameter tuning.

    3.4.1 Inception Based Feature Extraction

    GoogLeNet technique is termed as Inception network since its main goal is to have the development of an inception network framework [18].It comprises of maximal GoogLeNet versions i.e.,categorized under distinct forms of Inception v1,v2,v3,v4,and Inception-ResNet.Therefore,inception commonly consists of three distinct sizes of convolutional and maximal pooling layers.The results from the previous layer in the network are determined as the channel is gathered after finishing the convolutional operation.In the meantime,a non-linear fusion is performed.Likewise,the expression function of this network and the feasibility for different scales get improved while the overfitting problems are removed.Inception v3 represents a network architecture placed by Keras i.e.,pretrained in Image Net.The input size of the central images is 299 * 299 using three channels.In contrast to Inception v1,v2 and v3 network architecture,convolutional kernel splitting methodology is applied to divide a huge amount of integrals to minimal convolution.E.g.,a 3*3 convolutional layer is separated into 1*3 and 3*1 convolution.With this splitting technique,the amount of attributes can be restricted;therefore,network training speed can be triggered during spatial feature extraction in this efficient method.Instantaneously,Inception v3 enhances the Inception network architecture through three distinct-sized grids such as 8*8,35*35,and 17*17.

    3.4.2 FWNN Based Classification

    The derived features are then passed onto FWNN model to allot proper class labels.FWNN method is made up of seven layers as discussed below.

    Layer 1:There is no processing in this layer.In that way,each node straightforwardly sends the input value to next layer.

    Layer 2:The measure of input variable is fuzzified and each node represents a single fuzzy set.Therefore,the resultant two layers illustrate the membership values of input variable to respective fuzzy set based on the determined Membership Function(MF).

    Layer 3:It accepts the MF of input,derived from present layer,to design the antecedent part of each fuzzy rule,where each node defines a single fuzzy rule.The experimental result can be calculated using Eq.(7):

    In whichΠrepresents a product task andAijis processed as an MF and is employed in the calculation of membership degree of input variable.Now,a Gaussian MF is employed as follows.

    where,cij&σjisignify center and width of an MF respectively.

    Layer 4:The nodes present in four layers are called as‘conseque nt nodes’since it corresponds to the last part of fuzzy rule.Each node consists of wavelet function(Ψij).The wavelet function is determined as a waveform with minimal time interval while the mean value is zero [19].Furthermore,it has two variables such as translation parameter and dilation parameter.In FWNN,fuzzy rule is expressed as follows.

    WhereasRirepresent theiτhrule.

    In whichwirepresents the weight coefficient andΨijdenotes a set of wavelet functions and are called as wavelet family as given herewith.

    Letaij&bijrepresent the dilation and translation parameters of wavelet function respectively.

    Layer 5:It is an integration of 3rdand 4thlayers.The resultant values are calculated by maximizing the experimental result of 3rdlayer with the outcomes of 4thlayer as given herewith.

    When 1 ≤i≤candcrepresent the amount of fuzzy rules and wavelet function.

    Layer 6:The result includes two major parts.At first,(La6)is computed by including the result of 5thlayer

    Next,(Lb6)is defined by including the outcomes from 3rdlayer as follows

    Layer 7:It refers to defuzzifier where the whole outcomes of FWNN are estimated through

    3.4.3 SSA Based Parameter Tuning

    For optimal fine tuning of the parameters in FWNN model,SSA is applied.In order to boost the forecasting efficiency of FWNN approach,SSA is utilized for optimum modification of parameters present in FWNN technique.SSA is a bio-inspired optimization approach which is stimulated based on navigation and foraging efficiency of salp chain and is generally initiated from Deep Ocean.In mathematical procedure,salp population is separated into two groups such as leaders and followers.The better salps (optimal solution) are considered for finding the food source while the salp chains follow it.After each iteration,the leader salp alters its location in regard to feed sources.The leader explores and exploits the search space for optimal solutions while the follower salps transfer step-bystep to neighboring leaders.This technique is used by salp in converging to global optimal quickly,but it avoids getting trapped in local optimal.

    Salp places are defined fromndimensional search space:Wherenrefers to the count of decision variables in this problem[20].Let us assume that food source FSunder search space as swarm targets.According to the position of food source,the leader upgrades its location as in Eq.(11):

    A fine balance between exploration as well as exploitation phases from optimization is continued by coefficientC1which is calculated as follows

    At present,iter_cindicates the existing iteration number anditer_maxstands for maximum number of iterations acceptable,C2andC3are the uniformly-distributed arbitrary numbers under the intervals,zero and one.In SSA,the followers upgrade their locations based on Newton’s law of motion:

    where;

    and

    Considering,w0=0 as a difference between two consecutive time steps as one,therefore,

    Parameter optimization issues found in FWNN are resolved with the help of SSA and the forecasting results showed improvement.

    4 Performance Validation

    The proposed model was validated for its performance using three datasets namely,International Skin Imaging Collaboration(ISIC)skin lesion dataset[21],NSL-KDD2015,and CIDDS-001 dataset.The details of the dataset are given in Tab.1 and sample skin lesion images are shown in Fig.3.

    Table 1:Dataset description

    Figure 3:Sample images

    The results from overall ID analysis accomplished by the presented FDNN model on the applied two datasets are given in Tab.2 and Fig.4.On the applied NSL-KDD 2015 dataset,the FDNN model obtained 99.08%,98.90%,99.19%,and 98.43% respectively for the parameters,pren,recal,accy,and Fscore.Besides,on the test NSL-KDD 2015 dataset,the results infer that FDNN approach attainedpren,recal,accy,and Fscorevalues such as 99.04%,99.32%,98.98%,and 98.87%respectively.

    Table 2:ID dataset analysis results for the proposed FDNN Method

    Anaccuyanalysis of the FDNN model against recent techniques was conducted for intrusion detection and the results are shown in Tab.3 and Fig.5.The results show that Cuckoo Search with Particle Swarm Optimization (CS-PSO) algorithm produced the leastaccuyof 0.7551.At the same time,Gaussian Process,DNN with support vector machine(DNN+SVM),Cuckoo Optim.Alg.and Behavior-based Intrusion Detection System(IDS)techniques achieved moderateaccuyvalues such as 0.9106,0.9203,0.9688,and 0.9889 respectively.In line with these,deep Belief Network (BN) model gained near optimalaccuyof 0.9895,whereas the proposed FDNN model showcased an effective intrusion detection outcome with the highestaccuyof 0.9919.

    Figure 4:Results of the analysis of FDNN technique under distinct measures

    Table 3: Accuy analysis results of FDNN approach

    Tab.4 visualizes share creation results achieved by the presented MSE scheme.The table depicts that the input test image was split into four individual shares and the reconstruction of shares resulted in effective input image with no distortion.

    In order to validate the enhanced performance of Inceptionv3+OWNN technique,a series of comparative analyses was conducted and the results are shown in Tab.5.Fig.6 shows thesensyanalysis results achieved by Inceptionv3+OWNN technique against recent methods.The results depict that Yuan et al.,Li et al.,and AI-Magni et al.models obtained lowersensyvalues such as 0.82500,0.8200,and 0.85400 respectively.At the same time,ResNet-50 and Halil et al.methods attained moderatesensyvalues namely,0.90000 and 0.90820 respectively.Moreover,Convolutional Neural Network(CNN)-ResNet101 and Visual Geometry Group (VGG-19) models reached reasonablesensyvalues such as 0.96120 and 0.95000 respectively.However,Inceptionv3+OWNN technique produced the maximumsensyi.e.,0.98340.

    Figure 5:Accuracy analysis results of FDNN technique against existing approaches

    Table 4:Visualization of MSC model

    Table 5:Comparative study results of Inceptionv3+OWNN against State-of-the-Art Methods

    Figure 6:Sensitivity analysis results of inceptionv3+OWNN technique against existing approaches

    Fig.7 shows thespecyanalysis results of Inceptionv3+OWNN technique against existing methods.The results portray that VGG-19 and ResNet-50 models obtained the least outcomes in terms ofspecybeing 0.68000 and 0.61000 respectively.In line with these,Yuan et al.,Li et al.,and AIMagni et al.models obtained the lowerspecyvalues such as 0.97500,0.97800,and 0.93200 respectively.Followed by,Halil et al.and CNN-ResNet101 models resulted in considerablespecyvalues namely,0.92680 and 0.98020 respectively.But Inceptionv3+OWNN technique outperformed other methods with the highestspecyof 0.98970.

    Finally,Fig.8 shows theaccuyanalysis results achieved by Inceptionv3+OWNN technique against existing techniques.The results report that both VGG-19 and ResNet-50 models resulted in worse outcomes with itsaccuyvalues being 0.81200 and 0.7500 respectively.In line with these,Yuan et al.,Li et al.,AI-Magni et al.,and Halil et al.methods accomplished moderateaccuyvalues namely,0.93400,0.93200,0.94030,and 0.93390 respectively.Followed by,CNN-ResNet101 model gained a near optimalaccuyof 0.94850.However,Inceptionv3+OWNN technique showcased an improved outcome with a superioraccuyof 0.98650.From the above results and discussion,it is clear that the proposed model has the ability to achieve security and perform effectively in classification.

    Figure 7:Specificity analysis results of inceptionv3+OWNN technique against existing approaches

    Figure 8:Accuracy analysis results of inceptionv3+OWNN technique against existing approaches

    5 Conclusion

    In this study,a novel DLIDIC-SCPS technique is derived for intrusion detection and image management in blockchain-enabled CPS for healthcare sector.The proposed model encompasses different processes such as data acquisition,FDNN-based ID,MSC-based share creation,data transmission,and classification.In final stage,the classification of medical images takes place using three sub-processes namely,Inception-based feature extraction,FWNN-based classification,and SSA-based parameter tuning.A comprehensive experimental analysis was conducted to showcase the improved outcomes of DLIDIC-SCPS model.The simulation results established that the proposed DLIDIC-SCPS technique is a promising candidate for intrusion detection and image management in terms of security,privacy,and image classification outcomes over recent state-of-the-art techniques.In future,DLIDIC-SCPS technique can be applied in real-time hospital environment.

    Acknowledgement:The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges(APC)of this publication.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/127/42).www.kku.edu.sa.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    少妇人妻精品综合一区二区| 搡女人真爽免费视频火全软件| 人人妻人人澡人人爽人人夜夜| 亚洲少妇的诱惑av| 国产成人aa在线观看| 亚洲综合精品二区| 丝袜美足系列| 日韩大片免费观看网站| 国产极品天堂在线| 国产有黄有色有爽视频| 欧美日韩综合久久久久久| 在线观看免费视频网站a站| 亚洲三级黄色毛片| 一级爰片在线观看| 亚洲美女搞黄在线观看| 妹子高潮喷水视频| 97精品久久久久久久久久精品| 亚洲欧美清纯卡通| 人人澡人人妻人| 午夜激情久久久久久久| 两性夫妻黄色片 | 国产日韩欧美视频二区| 18禁在线无遮挡免费观看视频| 亚洲国产最新在线播放| 日韩免费高清中文字幕av| 国产精品一区www在线观看| 秋霞在线观看毛片| 欧美亚洲日本最大视频资源| 欧美日韩亚洲高清精品| 午夜91福利影院| 观看美女的网站| 男人操女人黄网站| 人成视频在线观看免费观看| 中国美白少妇内射xxxbb| 成年动漫av网址| 日本91视频免费播放| 国产无遮挡羞羞视频在线观看| 日日爽夜夜爽网站| 国产乱人偷精品视频| 乱人伦中国视频| 亚洲第一av免费看| 看非洲黑人一级黄片| 国产精品成人在线| 丝袜人妻中文字幕| av免费在线看不卡| 91精品国产国语对白视频| av女优亚洲男人天堂| av女优亚洲男人天堂| av天堂久久9| 欧美国产精品va在线观看不卡| 国产精品国产三级国产专区5o| 成年av动漫网址| 午夜免费男女啪啪视频观看| 国产免费现黄频在线看| 高清黄色对白视频在线免费看| 欧美日韩视频精品一区| 日韩中字成人| 久久久久久伊人网av| 捣出白浆h1v1| 亚洲欧洲精品一区二区精品久久久 | 最后的刺客免费高清国语| 中文字幕av电影在线播放| 国产免费一区二区三区四区乱码| 卡戴珊不雅视频在线播放| 精品国产国语对白av| 人妻人人澡人人爽人人| 99九九在线精品视频| 高清欧美精品videossex| 亚洲欧美一区二区三区国产| 国产黄色视频一区二区在线观看| 侵犯人妻中文字幕一二三四区| 欧美3d第一页| av线在线观看网站| 男女午夜视频在线观看 | 一区在线观看完整版| 成人毛片a级毛片在线播放| 日韩av不卡免费在线播放| 成人毛片60女人毛片免费| 免费观看在线日韩| 国产免费福利视频在线观看| 国产成人精品久久久久久| 国产精品无大码| √禁漫天堂资源中文www| 大片电影免费在线观看免费| 大片电影免费在线观看免费| 一级a做视频免费观看| 久久ye,这里只有精品| 久久久久久久精品精品| 亚洲色图综合在线观看| 久久97久久精品| 久久 成人 亚洲| 午夜老司机福利剧场| 国产精品久久久久久av不卡| 美国免费a级毛片| 在线 av 中文字幕| 97人妻天天添夜夜摸| 美女视频免费永久观看网站| 久久精品国产a三级三级三级| 精品一区二区三卡| 久久狼人影院| 热99久久久久精品小说推荐| 99国产精品免费福利视频| 国产在线视频一区二区| 欧美+日韩+精品| 精品人妻偷拍中文字幕| 久久久亚洲精品成人影院| 亚洲精品乱码久久久久久按摩| 亚洲av国产av综合av卡| 亚洲一码二码三码区别大吗| 亚洲av欧美aⅴ国产| 亚洲精品,欧美精品| 欧美bdsm另类| 少妇被粗大猛烈的视频| 成人国产av品久久久| 欧美日本中文国产一区发布| 成人亚洲精品一区在线观看| 永久免费av网站大全| 亚洲精品日韩在线中文字幕| 午夜av观看不卡| 两性夫妻黄色片 | 欧美日韩视频高清一区二区三区二| 啦啦啦视频在线资源免费观看| 99热全是精品| 人妻系列 视频| av免费在线看不卡| 天堂8中文在线网| 97精品久久久久久久久久精品| 久热这里只有精品99| 亚洲欧美精品自产自拍| 国产精品人妻久久久影院| 国产精品久久久久成人av| 老女人水多毛片| 插逼视频在线观看| 国产色婷婷99| 老司机影院成人| 午夜激情av网站| 亚洲国产成人一精品久久久| 少妇精品久久久久久久| 国产一区有黄有色的免费视频| 热99久久久久精品小说推荐| 欧美日韩一区二区视频在线观看视频在线| 婷婷色麻豆天堂久久| 日日撸夜夜添| 99久久综合免费| 中文字幕制服av| 亚洲性久久影院| 人成视频在线观看免费观看| 欧美另类一区| 国产极品粉嫩免费观看在线| 亚洲欧美成人综合另类久久久| xxx大片免费视频| 天美传媒精品一区二区| 午夜91福利影院| 日韩一区二区三区影片| 黑人巨大精品欧美一区二区蜜桃 | 久久久久久久久久久免费av| 欧美精品人与动牲交sv欧美| 美女主播在线视频| 中文精品一卡2卡3卡4更新| 成人漫画全彩无遮挡| 午夜91福利影院| 麻豆精品久久久久久蜜桃| 丝袜喷水一区| 午夜福利视频在线观看免费| 日韩欧美一区视频在线观看| 欧美人与善性xxx| 插逼视频在线观看| 日本av免费视频播放| 亚洲内射少妇av| 亚洲精品久久午夜乱码| 老司机影院成人| 高清在线视频一区二区三区| 男女无遮挡免费网站观看| 性高湖久久久久久久久免费观看| 午夜福利网站1000一区二区三区| 亚洲国产精品专区欧美| 久久久精品94久久精品| 亚洲婷婷狠狠爱综合网| 激情视频va一区二区三区| 久久久a久久爽久久v久久| 捣出白浆h1v1| 精品福利永久在线观看| 久久久久久伊人网av| 天美传媒精品一区二区| 欧美日韩av久久| 亚洲国产精品国产精品| 亚洲,欧美精品.| 欧美日韩综合久久久久久| 制服诱惑二区| 亚洲av福利一区| 久久精品久久精品一区二区三区| 中文乱码字字幕精品一区二区三区| 久久99热6这里只有精品| 国产成人欧美| 亚洲国产欧美日韩在线播放| 国产精品一国产av| 少妇的逼好多水| 中文字幕最新亚洲高清| 99久久精品国产国产毛片| 亚洲精品日本国产第一区| 女的被弄到高潮叫床怎么办| 国产日韩欧美在线精品| 国产成人一区二区在线| 亚洲人成77777在线视频| 久久久久久久久久久久大奶| av又黄又爽大尺度在线免费看| 9191精品国产免费久久| 国产在线一区二区三区精| 国产av精品麻豆| 国产麻豆69| 性色avwww在线观看| 欧美xxxx性猛交bbbb| 香蕉精品网在线| 少妇的逼水好多| 看十八女毛片水多多多| 少妇的丰满在线观看| 另类亚洲欧美激情| 熟女人妻精品中文字幕| 亚洲av国产av综合av卡| 2022亚洲国产成人精品| 国产国语露脸激情在线看| 丰满迷人的少妇在线观看| 亚洲国产色片| 老女人水多毛片| 老司机影院毛片| 99香蕉大伊视频| 亚洲情色 制服丝袜| 老司机亚洲免费影院| 亚洲伊人色综图| 免费看光身美女| 91午夜精品亚洲一区二区三区| 日韩中文字幕视频在线看片| 亚洲高清免费不卡视频| 丝袜在线中文字幕| 18禁国产床啪视频网站| 制服丝袜香蕉在线| 国产一区二区在线观看av| 看免费av毛片| 最近的中文字幕免费完整| 午夜影院在线不卡| 欧美日韩综合久久久久久| 草草在线视频免费看| 国精品久久久久久国模美| 青春草国产在线视频| 国产av一区二区精品久久| 在线天堂最新版资源| 国产一区二区三区av在线| 国产精品人妻久久久影院| 99九九在线精品视频| 自线自在国产av| 久久久久国产网址| 国产 一区精品| 一级a做视频免费观看| av女优亚洲男人天堂| 巨乳人妻的诱惑在线观看| 日本免费在线观看一区| 精品国产一区二区久久| 久久国产亚洲av麻豆专区| 国产成人欧美| 深夜精品福利| 欧美亚洲 丝袜 人妻 在线| 国国产精品蜜臀av免费| www日本在线高清视频| 午夜影院在线不卡| 九九在线视频观看精品| 欧美精品一区二区免费开放| 国产高清国产精品国产三级| 一二三四在线观看免费中文在 | 国产午夜精品一二区理论片| 在线看a的网站| 午夜激情久久久久久久| 亚洲四区av| 国产色婷婷99| 国产福利在线免费观看视频| 国产亚洲欧美精品永久| 国产精品久久久久成人av| 中文字幕制服av| 久久久久久久久久久免费av| 国产一区二区在线观看日韩| 人人澡人人妻人| 欧美日韩av久久| 国产xxxxx性猛交| 狠狠婷婷综合久久久久久88av| 日本wwww免费看| 欧美日韩视频高清一区二区三区二| 在线免费观看不下载黄p国产| 热99久久久久精品小说推荐| 波多野结衣一区麻豆| 亚洲欧洲日产国产| 国产福利在线免费观看视频| 在线观看免费日韩欧美大片| 欧美国产精品一级二级三级| 久久精品夜色国产| 另类亚洲欧美激情| 中文字幕人妻丝袜制服| 男女下面插进去视频免费观看 | 亚洲经典国产精华液单| 欧美人与性动交α欧美精品济南到 | 三级国产精品片| 两个人免费观看高清视频| 成人毛片60女人毛片免费| 亚洲综合色网址| 亚洲精品国产av成人精品| 涩涩av久久男人的天堂| 九九在线视频观看精品| 一级毛片 在线播放| 亚洲欧美清纯卡通| 亚洲激情五月婷婷啪啪| 亚洲欧美成人综合另类久久久| 久久久久视频综合| 美女内射精品一级片tv| 人妻少妇偷人精品九色| 国产精品麻豆人妻色哟哟久久| 色网站视频免费| 草草在线视频免费看| 在线观看免费高清a一片| av黄色大香蕉| 国产精品久久久久久久电影| 美女国产视频在线观看| 精品国产国语对白av| 国产精品蜜桃在线观看| 免费大片黄手机在线观看| 久久精品国产自在天天线| 亚洲,一卡二卡三卡| 亚洲美女搞黄在线观看| 色94色欧美一区二区| 免费播放大片免费观看视频在线观看| 亚洲精品av麻豆狂野| 久久久久久久大尺度免费视频| 欧美+日韩+精品| 欧美bdsm另类| av在线播放精品| 精品99又大又爽又粗少妇毛片| 91精品三级在线观看| 国产精品无大码| 伦理电影免费视频| 激情视频va一区二区三区| 另类亚洲欧美激情| 男的添女的下面高潮视频| 久久久久人妻精品一区果冻| 热re99久久精品国产66热6| 熟女av电影| 超色免费av| 美女xxoo啪啪120秒动态图| 美女视频免费永久观看网站| 性高湖久久久久久久久免费观看| av免费在线看不卡| a级毛片黄视频| 国产又色又爽无遮挡免| 日韩中字成人| 欧美日韩国产mv在线观看视频| 日韩视频在线欧美| 日产精品乱码卡一卡2卡三| 人人澡人人妻人| 久热久热在线精品观看| 免费在线观看完整版高清| 日韩中字成人| 午夜福利影视在线免费观看| 精品一区二区三卡| 视频在线观看一区二区三区| 久久热在线av| 国产日韩欧美视频二区| 一区二区日韩欧美中文字幕 | 哪个播放器可以免费观看大片| 黑人猛操日本美女一级片| 久久久精品区二区三区| 久久亚洲国产成人精品v| 日韩伦理黄色片| 久久精品久久精品一区二区三区| av黄色大香蕉| 成人毛片a级毛片在线播放| 久久久久人妻精品一区果冻| 女人被躁到高潮嗷嗷叫费观| 黑丝袜美女国产一区| 国产成人精品婷婷| a级毛色黄片| 国产在线视频一区二区| 观看av在线不卡| 王馨瑶露胸无遮挡在线观看| 丝瓜视频免费看黄片| 全区人妻精品视频| 97在线视频观看| 久久久久久人人人人人| 久久女婷五月综合色啪小说| 精品一区二区免费观看| 一二三四中文在线观看免费高清| 国产av一区二区精品久久| 桃花免费在线播放| 在线免费观看不下载黄p国产| 亚洲国产精品999| 观看av在线不卡| av卡一久久| 少妇被粗大的猛进出69影院 | 亚洲国产av影院在线观看| 又黄又粗又硬又大视频| 久久亚洲国产成人精品v| 精品国产一区二区久久| 欧美日韩av久久| 看免费成人av毛片| 看非洲黑人一级黄片| 久久人人爽人人爽人人片va| 成人手机av| 亚洲四区av| xxxhd国产人妻xxx| 精品久久久久久电影网| 男女边摸边吃奶| 久久精品久久久久久噜噜老黄| 免费观看性生交大片5| 日韩制服丝袜自拍偷拍| 久久久久久久久久久久大奶| 大片电影免费在线观看免费| 99热这里只有是精品在线观看| 女性生殖器流出的白浆| www.熟女人妻精品国产 | 一区在线观看完整版| 2021少妇久久久久久久久久久| 两个人免费观看高清视频| 一区二区av电影网| 九色亚洲精品在线播放| 女人久久www免费人成看片| 亚洲内射少妇av| 久久精品国产a三级三级三级| 日产精品乱码卡一卡2卡三| 国精品久久久久久国模美| 久久精品熟女亚洲av麻豆精品| 如日韩欧美国产精品一区二区三区| 欧美日韩国产mv在线观看视频| 人人妻人人爽人人添夜夜欢视频| 美女国产视频在线观看| a级毛色黄片| 国产成人精品久久久久久| 91在线精品国自产拍蜜月| 欧美变态另类bdsm刘玥| 久久久久精品久久久久真实原创| 亚洲欧美中文字幕日韩二区| 人人妻人人澡人人爽人人夜夜| 精品一区在线观看国产| 伊人久久国产一区二区| 日产精品乱码卡一卡2卡三| 一级毛片我不卡| 亚洲人成网站在线观看播放| 久久久久久伊人网av| 日韩一区二区三区影片| 久久久久久久久久久免费av| 97在线视频观看| 亚洲精品第二区| 久久久久国产网址| 精品久久国产蜜桃| 老熟女久久久| 中文天堂在线官网| 精品卡一卡二卡四卡免费| 热99久久久久精品小说推荐| 亚洲国产精品专区欧美| 中文字幕免费在线视频6| 最新的欧美精品一区二区| 久久久亚洲精品成人影院| 中文字幕最新亚洲高清| 一个人免费看片子| 日本色播在线视频| av不卡在线播放| 国产在线视频一区二区| av一本久久久久| 午夜精品国产一区二区电影| 日本黄大片高清| 七月丁香在线播放| 久久久久精品久久久久真实原创| 国产在视频线精品| 午夜激情av网站| 夫妻性生交免费视频一级片| 久久综合国产亚洲精品| 国产又爽黄色视频| 日韩制服骚丝袜av| 国产成人欧美| 亚洲激情五月婷婷啪啪| 高清欧美精品videossex| 在线精品无人区一区二区三| 免费久久久久久久精品成人欧美视频 | 丰满迷人的少妇在线观看| 精品视频人人做人人爽| 精品一区二区三区四区五区乱码 | 成年人午夜在线观看视频| 久久久国产精品麻豆| 两个人看的免费小视频| 青春草视频在线免费观看| 少妇人妻久久综合中文| 欧美丝袜亚洲另类| av网站免费在线观看视频| 亚洲综合精品二区| 欧美日本中文国产一区发布| 一级毛片电影观看| 一级爰片在线观看| 亚洲国产av新网站| 飞空精品影院首页| 最新的欧美精品一区二区| 国产老妇伦熟女老妇高清| videosex国产| 黄色怎么调成土黄色| av视频免费观看在线观看| 777米奇影视久久| 精品人妻一区二区三区麻豆| 成人国产麻豆网| 超碰97精品在线观看| 高清黄色对白视频在线免费看| 亚洲国产最新在线播放| 成年人免费黄色播放视频| 夫妻午夜视频| 男女无遮挡免费网站观看| 国产精品国产三级国产av玫瑰| 高清毛片免费看| 男人操女人黄网站| 三级国产精品片| 亚洲精品视频女| 九色亚洲精品在线播放| 人成视频在线观看免费观看| 一本大道久久a久久精品| 久久久国产精品麻豆| 日本爱情动作片www.在线观看| 国产伦理片在线播放av一区| 国产国拍精品亚洲av在线观看| 免费黄频网站在线观看国产| 国产一区二区在线观看日韩| 亚洲av综合色区一区| 国产精品偷伦视频观看了| 欧美xxxx性猛交bbbb| 中文天堂在线官网| 婷婷色综合www| 亚洲经典国产精华液单| 亚洲欧美日韩卡通动漫| 99re6热这里在线精品视频| 美女xxoo啪啪120秒动态图| 亚洲精品一二三| 美女xxoo啪啪120秒动态图| 亚洲丝袜综合中文字幕| 久久久久视频综合| 亚洲美女搞黄在线观看| 欧美日韩成人在线一区二区| 侵犯人妻中文字幕一二三四区| 高清黄色对白视频在线免费看| 夜夜骑夜夜射夜夜干| 免费高清在线观看日韩| 久久精品久久精品一区二区三区| 日韩在线高清观看一区二区三区| 国产男女内射视频| 免费少妇av软件| 成人国产av品久久久| 多毛熟女@视频| 免费黄频网站在线观看国产| 极品人妻少妇av视频| 精品亚洲乱码少妇综合久久| 日韩不卡一区二区三区视频在线| 午夜精品国产一区二区电影| 99热国产这里只有精品6| 欧美 日韩 精品 国产| 国产精品无大码| 欧美3d第一页| av在线观看视频网站免费| 国产日韩欧美视频二区| 亚洲精品乱码久久久久久按摩| 水蜜桃什么品种好| 亚洲av欧美aⅴ国产| a 毛片基地| 91午夜精品亚洲一区二区三区| 久久久久精品性色| 纵有疾风起免费观看全集完整版| 人妻人人澡人人爽人人| 成人亚洲欧美一区二区av| 欧美日韩国产mv在线观看视频| 国产av精品麻豆| 日本欧美国产在线视频| 国产福利在线免费观看视频| 国产精品久久久久久精品电影小说| 亚洲av欧美aⅴ国产| av女优亚洲男人天堂| 美女大奶头黄色视频| a级毛片黄视频| 久久99一区二区三区| 9热在线视频观看99| 最近最新中文字幕大全免费视频 | 美国免费a级毛片| videosex国产| av电影中文网址| 精品国产露脸久久av麻豆| 午夜91福利影院| 少妇人妻久久综合中文| 韩国精品一区二区三区 | 午夜激情av网站| 丝袜人妻中文字幕| 啦啦啦啦在线视频资源| 午夜av观看不卡| 亚洲精品456在线播放app| freevideosex欧美| 日韩一区二区三区影片| 国产精品偷伦视频观看了| 超碰97精品在线观看| av免费观看日本| 中文字幕制服av| 亚洲欧洲国产日韩| 亚洲少妇的诱惑av| 午夜激情久久久久久久| 一区二区日韩欧美中文字幕 | 在线 av 中文字幕| 久久免费观看电影| 99热这里只有是精品在线观看| 国产黄频视频在线观看| 亚洲精品国产av蜜桃| 亚洲av成人精品一二三区| 中文字幕亚洲精品专区| 极品人妻少妇av视频| 男人添女人高潮全过程视频| 免费久久久久久久精品成人欧美视频 | 午夜精品国产一区二区电影| 亚洲国产av新网站| 午夜影院在线不卡| 精品久久国产蜜桃| 人人妻人人爽人人添夜夜欢视频|