• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    The Detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement

    2024-01-12 03:48:48XuanchenZhouWenzhongYangLiejunWangFuyuanWeiKeZiErBieKeHaiLaTiandYuanyuanLiao
    Computers Materials&Continua 2023年12期

    Xuanchen Zhou ,Wenzhong Yang ,Liejun Wang ,Fuyuan Wei ,KeZiErBieKe HaiLaTi and Yuanyuan Liao

    1College of Software,Xinjiang University,Urumqi,830000,China

    2Key Laboratory of Signal Detection and Processing in Xinjiang Uygur Autonomous Region,Urumqi,830000,China

    3Key Laboratory of Multilingual Information Technology in Xinjiang Uygur Autonomous Region,Urumqi,830000,China

    ABSTRACT With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing schemes.While some researchers have studied intelligent fraud detection,most research has focused on identifying Ponzi contracts,with little attention given to detecting and preventing gambling or phishing contracts.There are three main issues with current research.Firstly,there exists a severe data imbalance between fraudulent and non-fraudulent contracts.Secondly,the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts.Lastly,most prior studies have used contract source code as raw features,but many smart contracts only exist in bytecode.To address these issues,we propose a fraud detection method that utilizes Efficient Channel Attention EfficientNet(ECA-EfficientNet)and data enhancement.Our method begins by converting bytecode into Red Green Blue(RGB)three-channel images and then applying channel exchange data enhancement.We then use the enhanced ECAEfficientNet approach to classify fraudulent smart contract RGB images.Our proposed method achieves high F1-score and Recall on both publicly available Ponzi datasets and self-built multi-classification datasets that include Ponzi,honeypot,gambling,and phishing smart contracts.The results of the experiments demonstrate that our model outperforms current methods and their variants in Ponzi contract detection.Our research addresses a significant problem in smart contract security and offers an effective and efficient solution for detecting fraudulent contracts.

    KEYWORDS Fraud detection;smart contract;ECA-EfficientNet;Ethereum

    1 Introduction

    Since 2008,blockchain technology has been rapidly advancing,and cryptocurrencies such as Bitcoin and ETH have gained popularity in financial markets.Ethereum,as a representative of Blockchain 2.0,is quickly developing into a fully-fledged platform.As a result,developers are deploying feature-rich Smart Contracts(SCs)on Ethereum to meet various transaction needs.

    As the amount of money traded via SCs increases,dishonest entities are intentionally deploying a significant number of fraudulent SCs on Ethereum[1],taking advantage of users’wallet balances.Four types of fraudulent SCs identified as containing fraud are Ponzi SCs,honeypot SCs,phishing SCs,and gambling SCs[2,3].However,few detection methods for multi-classification fraud SCs have been developed,and most research has focused solely on detecting Ponzi SCs and phishing SCs[4].

    The challenges of automatic fraud SCs detection through deep learning usually include:

    1) One of the primary challenges in using deep learning to automatically detect fraud in smart contracts is extracting valid semantic expressions directly from their compiled bytecode.Smart contracts are compiled into bytecode by Ethereum Virtual Machine (EVM) and then deployed to Etherscan.However,only a small percentage of the overall smart contracts on Etherscan can be queried for source code[5].

    2) Another challenge is finding a suitable data balancing method for smart contracts.Due to the nature of smart contracts,there is an inherent extreme data imbalance between fraudulent and normal contracts.To address the current problems of deep learning-based fraud detection in smart contracts,a detection method based on data enhancement and ECA-EfficientNet is proposed in this paper.ECA-EfficientNet is an improved deep neural network for image classification.This method maps the bytecode directly to RGB three-channel images and then enhances the dataset by channel swapping.The improved EfficientNet is then applied to train on the dataset.

    The main contributions of this paper are as follows:

    1) To address the issue of extreme data imbalance in fraud Smart Contract (SC) detection,we propose a new image mapping method that extracts features from the bytecode level.Our method maps bytecodes to three-channel RGB images,and we introduce channel swapping based on these images to oversample the dataset.This approach represents a novel contribution to the field of fraud SC detection.

    2)We upgraded the EfficientNet model to improve classification accuracy.Specifically,we refined the ECA module [6] using Global Weighted Average Pooling (GWAP) and integrated it into the EfficientNet model.The resulting ECA-EfficientNet model achieved a precision of 99.1%and a recall rate of 99.1%on the public Ponzi SC dataset,representing a significant improvement in recognition accuracy.

    3) We integrated the four most common types of fraud SCs (Phishing,Ponzi,Gambling,and Honeypot SCs) into a self-built dataset,which is a novel contribution to the field.We then applied the ECA-EfficientNet model to conduct multi-classification detection on this dataset,achieving an F1-score of 98.2% and a recall of 98.1%.These results demonstrate the ECA-EfficientNet model’s superior robustness and high accuracy.

    The rest of the paper is structured as follows: Section 2 introduces the basics of fraud SCs on Ethereum and related work concerning them;Section 3 elaborates on the dataset collection and cleaning,as well as the network structure of the ECA-EfficientNet;Section 4 presents the preexperimental data,pre-processing,evaluation metric selection,experimental results,and performance comparison with other papers or methods;Section 5 summarizes the entire paper,and more solid implications are drawn and included in the concluding remarks.

    2 Related Work

    2.1 Smart Contracts

    Smart Contracts are computer programs designed to execute contract terms automatically when certain conditions are met,eliminating the need for intermediaries to oversee or enforce the agreement.These contracts are self-executing and are written in scripting languages with Turing completeness,allowing them to perform any computation that can be done by a Turing machine[7–9].

    Ethereum SCs are a type of smart contract that is deployed on Ethereum blockchain platform and executed through Ethereum Virtual Machine(EVM).These contracts can perform various functions beyond basic transactions,such as mortgages,crowdfunding,loans,decentralized applications,and more.

    To create Ethereum SCs,developers use languages like Solidity,which is specifically designed for creating smart contracts on Ethereum blockchain.Once an Ethereum SC is executed,it is broadcast to the network and validated by network nodes.The validated contract is then added to the blockchain as a block,ensuring the contract’s transparency,tamper-proof nature,and enforceability by anyone on the network.

    Overall,Ethereum SCs empower the development of decentralized applications that can be trusted to execute without intermediaries,improving efficiency,security,and transparency across various industries.

    2.2 Fraud Smart Contract

    Ethereum blockchain ecosystem has been plagued by fraudulent Smart Contracts(SCs).Incomplete statistics show that more than 10% of Initial Coin Offerings (ICOs) issued on Ethereum are subject to various types of fraud,including phishing,Ponzi schemes,honeypot,and gambling contract fraud,among others.According to a report by ChainAnalysis,victims of such scams suffered a loss of$225 million in the first half of 2017[10].

    Financial security has become a key issue in the blockchain ecosystem,and this article focuses on four types of SCs—Ponzi,honeypot,gambling,and phishing—that target users’wallet balances[11–13].

    Ponzi SCs are modeled after traditional Ponzi schemes,where users transfer funds to the contract,and the funds are distributed among a list of users in a pyramid-like structure,with those at the top receiving the most benefits.

    Honeypot SCs are contracts that require a certain balance to be transferred before they can be exploited,leading users to transfer funds to take advantage of the“l(fā)oophole,”and thereby cheating users’wallet balances.Phishing SCs are integrated with phishing behaviors,which are deployed on Ethereum and use SCs to deceive users.With the diverse functions of Ethereum SCs,different variants of traditional phishing websites and phishing emails have emerged,which have been integrated with SCs.

    Gambling SCs are smart contracts that facilitate traditional offline gambling using SCs on Ethereum.These contracts can have a more significant impact than offline gambling,given the distributed technology of the blockchain.

    All types of fraudulent SCs target the virtual currency in users’wallets,and the ability to detect and prevent such scams effectively is critical to the development of Ethereum.Therefore,financial security measures are needed to curb the deployment of fraudulent SCs and protect users’virtual currency.

    2.3 Research on Fraud Smart Contracts

    Researchers have proposed various methods to detect different types of fraud in Smart Contracts(SCs),but each method has its limitations.For example,Wu et al.[2]proposed a network embedding method that effectively detects phishing nodes using Ethernet transaction network data,but it is ineffective in detecting fraudulent SCs with unknown or tentative transactions.Similarly,Yu et al.[4]proposed a Graph Convolutional Network(GCN)method for detecting Ponzi SCs using transaction information,but it performs poorly in detecting unknown contracts.Agarwal et al.[3]developed a set of evaluation metrics to correlate vulnerabilities and suspicious SCs,but the accuracy of their method may be inconsistent when new types of fraudulent SCs emerge.Torres et al.[14]introduced a classification method for honeypot SCs that is accurate but requires manual analysis.Chen et al.[15]proposed a Text Convolutional Neural Network (TextCNN) based method combined with Transformer for detecting Ponzi SCs,but this method may cause partial information loss due to decompiling bytecode into Solidity source code.In addition,Osegi et al.[16]proposed an Artificial Neural Network trained by the Simulated Annealing technique(SA-ANN)and a Hierarchical Temporal Memory based on the Cortical Learning Algorithms(HTM-CLA)have been proposed to detect credit card fraud(CCF).The HTM-CLA was found to outperform the SA-ANN and the Long Short-Term Memory ANN(LSTMANN) by a factor of 2:1.Furthermore,the HTM technique has also been applied to Short-Term Load Forecasting(STLF)and showed promising performance results compared to existing techniques[17].Therefore,each method has its own advantages and disadvantages,and there is still room for improvement in detecting various types of fraudulent SCs.

    Code visualization has been widely used in malware classification tasks,providing an effective end-to-end detection method that can process data samples efficiently and achieve remarkable classification results[18].Nataraj et al.[19]proposed a method to convert binary code into grayscale images using pixel values for malware classification,and this approach has received extensive attention from researchers since then.To address the issue of imbalanced data,Cui et al.[20]converted malicious code into grayscale images and utilized the bat algorithm.They then used a convolutional neural network to automatically extract features from the malware images.To obtain better classification results,Cui et al.[21] further improved their work by using the non-dominated sorting genetic algorithm II.Naeem et al.[22]developed a method to classify malware by converting binary malware files into grayscale images using two patterns,local and global.

    Similarly,there are similar methods in the field of smart contract detection.Lou et al.[23]proposed an improved convolutional neural network as a detection model for Ponzi schemes in smart contracts.The results showed that the improved convolutional neural network can overcome difficulties in training caused by different lengths of smart contracts’bytecodes.Bian et al.[24]proposed an image-based SCs scam detection method using an attention capsule network focused on Ethereum.

    3 Dataset and Model

    3.1 Model Framework

    This paper outlines a general framework for detecting fraud in smart contracts,which comprises four distinct steps,as illustrated in Fig.1.

    Figure 1:Fraud smart contracts detection framework based on ECA-EfficientNet

    1)Initially,we converted the bytecode on Ethereum into color images by assigning grayscale values to each byte in the three RGB channels.We then applied data enhancement to the images by swapping channels to obtain the experimental dataset.

    2)Next,we retrieved the RGB images from pre-processing and used them as original features in ECA-EfficientNet.We automatically extracted features that could represent each image category.

    3) Subsequently,we employed GWAP instead of a fully connected neural network for the final classification.We compared the computation with the labels to optimize the loss function.

    4) Finally,we classified the features using softmax to obtain the final detection results,which included five categories:Ponzi,phishing,gambling,honeypot,and normal smart contracts.Additionally,we performed binary classification of Ponzi and normal smart contracts for Ponzi detection.

    3.2 Data Collection and Processing

    To begin with,we started by collecting 50 SCs tagged with Ponzi schemes on Etherscan.Further research led us to discover 200 additional Ponzi contract addresses,which were found in the literature[15].Subsequently,we manually reviewed and cleaned one invalid contract,resulting in the discovery of 249 more Ponzi contract addresses.

    Next,we identified SCs labeled as gambling and phishing hacks on Etherscan.However,due to the presence of duplicate and incorrect contracts,we had to manually verify and remove invalid data.Eventually,we obtained the addresses of 133 phishing contracts and 37 gambling contracts.

    We also collected the addresses of 285 honeypot contracts through manual analysis by the authors mentioned in the literature[22].Finally,we gathered the addresses of 3500 normal contracts from the public dataset.Using Python,we were able to crawl the bytecode of the corresponding addresses from Etherscan based on the collected smart contract addresses.

    Due to the rarity of fraudulent smart contracts compared to the total number of smart contracts,there is a serious data imbalance problem in the dataset.To alleviate this issue,this study proposes a method of exchanging image channels to increase the number of images and thus augment the amount of fraudulent smart contract data.To convert the bytecode into images,two steps were necessary,as illustrated in Fig.2.

    Figure 2:Channel exchange process for RGB images

    Firstly,the bytecode was transformed into RGB images by mapping each byte to a corresponding RGB value in three dimensions.Any missing parts were filled with zeroes.Secondly,after obtaining the RGB images,we sequentially swapped the R,G,and B channels of the image to create a new three-channel image.

    Channel swapping does not alter the essential features of the image,and the same features as the original image can be extracted in the convolution layer.However,the fully connected layer will show different characteristics from the original image.As demonstrated in Fig.3,the essential features of the image remain unchanged after channel swapping for the Lenna picture.

    Figure 3:The effect of the Lenna after exchanging channels

    The images were saved after swapping channels,and then sorted into categories based on their labels.The resulting dataset for the smart contract is illustrated in Fig.4.

    3.3 ECA-EfficientNet

    In this paper,we propose a new network structure called ECA-EfficientNet,which combines the strengths of EfficientNetB0 and EfficientNetV2-s.The main framework of the network is based on EfficientNetB0 with three modifications,as shown in Fig.5.

    Firstly,we used Fused-MBConv from EfficientNetV2 instead of MBConv in the shallow network,which increased the training speed of the network.We also reduced the number of convolutional layers to further speed up training.

    Secondly,we used the GWAP method in the ECA module to replace the original Global Average Pooling (GAP) and replaced the SE (Squeeze-and-Excitation) module in the MBConv and Fused-MBConv with an advanced ECA module,which avoids dimensionality reduction on channel attention.

    Figure 4:Fraudulent smart contract datasets as a percentage

    Figure 5:ECA-EfficientNet for identifying fraud smart contracts

    Thirdly,we used GWAP instead of a fully connected layer for classification and applied it to each channel feature as GAP.This helped improve the generalization of the model by scaling down to a single value and adding learnable weights to it.

    Overall,ECA-EfficientNet is a highly efficient network structure that can achieve better performance than previous models with similar computational costs.

    3.3.1 Stem&Swish

    As the first part of EfficientNet,the Stem is used for initial feature extraction.Swish is then used for normalization after each convolution,and the Swish[25]activation function is employed to accelerate convergence and prevent gradient disappearance or explosion.Please check for any further grammatical errors and polish the language as necessary.

    In this paper,the hyperparameterβ=1 is set to make Swish exhibit ReLU-like properties,as in EfficientNet.Additionally,the language could be further polished depending on the context and intended audience.

    3.3.2 MBConv&Fused-MBConv

    MBConv is the InvertedResidualBlock used in MobileNetV3 [26],which employs Swish as the activation function.Fused-MBConv,proposed by EfficientNetV2,is used to enhance computing efficiency in the shallow networks.Compared to EfficientNet[27],the structure of EfficientNetV2 can better utilize mobile and server-side accelerators.Additionally,it replaces the 3×3 deep convolution and 1 × 1 convolution in MBConv with conventional 3 × 3 convolutions,which fundamentally improves computation speed,as illustrated in Fig.6.

    Figure 6:Structure of MBConv and Fused-MBConv

    3.3.3 ECA

    In this paper,we used the ECA module to replace the SE module[28]in the original network in an attempt to determine the importance of each channel.

    The SE module is compressed and downscaled first,and then upscaled,which will result in the loss of the channel importance.By contrast,the ECA module [6] used a local cross-channel interaction strategy without downscaling and is implemented using a one-dimensional convolution with k convolution kernels.We also introduce GWAP to replace the original GAP in the ECA module.The structure of the ECA module in this paper is shown in Fig.7.

    Figure 7:Structure of the ECA after improvement using GWAP

    Thekvalue hereby represents the adaptive selection of kernel_size,which is calculated as follows:

    The original paper applied the simplest linear functionφ(k)=γ?k-b,combined with the channel dimensionC(the number of filters),and set the parameters of the linear function tor=2,b=1.Given the channel dimensionC,the kernel size k can be calculated by function(3).|x|oddhereby represents the selection of the nearest odd number.By mappingψ,the high-dimensional channels have longer interaction distances,while the low-dimensional channels have shorter interaction distances by nonlinear mapping.

    3.3.4 GWAP

    Instead of using GAP [29] to receive input,the network output employs GWAP.GWAP compresses the features in each channel into a single value,and the weight layer adaptively attaches weights to the features in each layer,as shown in Fig.8.

    Figure 8:Structure of the GAP and GWAP

    In this paper,we propose an adaptive weight layer that is employed to obtain optimal weights through neural network training.GWAP is highly adaptable to EfficientNet,which can effectively improve the model’s generalization.Softmax is then used to perform classification.

    4 Experiments

    In this chapter,we first elaborate on the processing of the dataset used in the experiment.Next,we introduce the experimental parameters and the evaluation metrics selected.Finally,we compare the results of the model training with those of other models and papers.

    4.1 Dataset

    After collating the data processed in the previous experiments,the resulting datasets consisted of 1494 samples of Ponzi SCs,1698 samples of Honeypot SCs,222 samples of Gambling SCs,and 798 samples of Phishing SCs,as well as 1499 samples of Normal SCs after undersampling.The dataset after splitting is presented in Table 1,which illustrates the usage of two datasets in the experiment.The Fruad_dataset is a self-built multi-classification dataset,with a training-to-testing ratio of 3:1,as specified in the Table 1.The Ponzi_dataset is a publicly available Ponzi dataset,and to ensure the reliability of the model results on real data,the testing set in this dataset consists of 100 unprocessed Ponzi SCs and 100 unprocessed Normal SCs,as indicated in the Table 1.

    Table 1:Ponzi_dataset and Fraud_dataset

    After enhancing the data,there still exists an imbalance between positive and negative samples.In dichotomous classification experiments,Normal SCs can be undersampled to match the number of fraud samples,so that the trained model does not overly focus on any one class.However,when performing multiple classifications on the Fraud_dataset dataset,it is inevitable that the amount of data will vary across samples.After expanding the dataset with channel swapping,it is necessary to balance the weights across classes during training.Directly using undersampling to reduce all samples to Gambling SCs with the minimum number of samples would render some data unusable and weaken the effectiveness of the model.Therefore,we added the Class_weight function during training to weight the calculation by comparing the number of fraud contracts in each category.

    4.2 Evaluation

    To facilitate comparison with experiments in other papers,this paper’s experimental evaluation metrics also utilize commonly used classification model metrics such as Accuracy,Precision,Recall,and F1-score.The specific formulas for these metrics are as follows:

    TP(True Positive)indicates the number of positive cases predicted correctly.TN(True Negative)shows the number of negative cases predicted correctly.FP (False Positive) reflects the number of positive cases predicted incorrectly.FN (False Negative) presents the number of positive cases predicted incorrectly.

    4.3 Experimental Results

    Initially,the ECA-EfficientNet network was trained and evaluated on the self-built Fraud dataset using the ECA-EfficientNet network.This experiment was a multi-classification task.Parameters such as dropout were set according to the original EfficientNet parameters,while other parameters such as batch size were determined using a greedy algorithm,selecting a variable while keeping other variables fixed.To balance the classes before training,the “class_weight”function provided by the Keras framework was used to perform weighting calculations based on the dataset labels for the multiclassification problem.

    We implemented each baseline model of EfficientNet based on the parameter settings in papers[25]and trained them on the Ponzi dataset and Fraud dataset.We found from the Ponzi dataset that EfficientNetV2-s has the highest precision and F1-score,but its Recall is lower than EfficientNetB0.Recall is significant for detecting fraud in SCs because it indicates the number of detected fraudulent SCs.Therefore,we decided to improve upon EfficientNetB0 and use EfficientNetV2 as a reference to modify the network structure.As shown in Table 2.

    Table 2:Comparison of the performance of each EfficientNet baseline model on the Fraud_dataset and Ponzi_datase datasets

    We have primarily modified the original EfficientNetB0 network.Firstly,we have employed Multilayer Perceptron(MLP),Spatial Pyramid Pooling(SPP)+MLP,GAP,and GWAP as classifiers.From the Table 3 above,it is evident that GWAP is the most effective classifier for this dataset.The Accuracy,Recall,and F1-score of GWAP on the same EfficientNetB0+ECA model are 0.973,0.971,and 0.975,respectively,which are 0.4%,1.1%,and 0.7%higher than the other classifiers.The use of ECA with the same GAP as the classifier has improved the Precision and F1-score by 2.3%in EfficientNetB0.The final improved ECA-EfficientNet model has achieved the highest Accuracy,Recall,and F1-score in the experiment.As shown in Table 3.

    Table 3:Performance of different improved models in Fraud-dataset

    Based on the experimental results,we speculate that the adaptive parameters of the weight layer in GWAP’s improvement of the ECA module considerably enhanced the accuracy of model learning.To prove the advantages of the improved ECA-EfficientNet for fraud smart contract classification,we trained VGG16,ResNet50,and InceptionV3 on the self-built Fraud dataset and obtained the comparison results as shown in Table 4.

    Table 4:Comparison of ECA-EfficientNet and various classical classification models in Fraud_dataset performance

    In Table 4,we can see that the ECA-EfficientNet boasts the highest accuracy and recall in comparison to the Fraud dataset.The experiments show that the simplified EfficientNet network not only improves its speed,but also the accuracy is raised from 0.945 to 0.982.Besides,our recall is also increased by 1.2%compared with the largest EfficientNetV2-l.The model can evidently reduce the miss detection rate in the detection of fraud class contracts.Recurrent Neural Network(RNN),Long Short-Term Memory (LSTM),and Hierarchical Temporal Memory (HTM) are temporalbased network models built with frameworks such as Keras and htm.core.RNN employ a doublestacked architecture,while LSTM use single-layer structure.For the HTM model,images arrays were converted to Sparse Distributed Representation(SDR)data before training.

    In Ponzi dataset,the ECA-EfficientNet network is used in the Ponzi SCs dataset after data enhancement as the training set,and the test set remains fixed.Since Ponzi dataset is taken from publicly available datasets,we compared the specific results of F1-score,Recall,etc.,with the experimental results in other papers as shown in Table 5 below.

    Table 5:Comparison of ECA-EfficientNet performance in Ponzi_dataset with other papers

    In this publicly available Ponzi dataset,ECA-EfficientNet performs the best in terms of all evaluation metrics compared to other papers that conducted experiments on the same dataset.Specifically,it has a precision of 0.982,a recall of 0.982,and an F1 value of 0.982.Compared to the latest paper from MTCformer performs 2.1%,16.1%,and 10.2%better in terms of precision,recall,and F1 value,respectively.The experimental results show that ECA-EfficientNet has a powerful ability to automatically learn structural and semantic features from smart contract code.As shown in Table 5.

    5 Conclusion

    In this paper,we utilize only smart contract bytecode to detect known mainstream fraud smart contract types.ECA-EfficientNet achieves the best results on multi-classification and binary classification before the deadline.The bytecode information required by the method is available on the public platform Etherscan,making it more applicable than other methods.Additionally,the channel exchange approach partially solves the problem of extreme data imbalance.However,this method has two drawbacks.Firstly,it is only suitable for Ethereum,and its detection effectiveness for multiplatform is unknown.Secondly,in terms of treating data imbalance,the normal smart contract after downsampling cannot represent the characteristics of all normal SCs.There are two main research directions for the future.One is to detect multi-platform fraud contracts,and the other is to attempt to solve the extreme data imbalance.

    Acknowledgement:None.

    Funding Statement:This research work is supported by the National Natural Science Foundation of China,Grant Number: U1603115,Science and Technology Project of Autonomous Region,Grant Number:2020A02001-1,and Research on Short-Term and Impending Precipitation Prediction Model and Accuracy Evaluation in Northern Xinjiang Based on Deep Learning,Grant Number:2021D01C080.

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:X.Zhou,W.Yang;data collection:W.Yang;analysis and interpretation of results:X.Zhou,W.Yang,L.Wang;draft manuscript preparation:W.Yang,L.Wang.All authors reviewed the results and approved the final version of the manuscript.F.Wei,K.HaiLaTi,and Y.Liao provided valuable input during the preparation of the manuscript and contributed to the interpretation of the results.

    Availability of Data and Materials:The data used in this study are available upon reasonable request from the corresponding author,W.Yang.Some data that are proprietary or confidential may be restricted due to legal or ethical reasons.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    av有码第一页| 日日摸夜夜添夜夜添av毛片| 在线观看免费视频网站a站| av在线老鸭窝| 女的被弄到高潮叫床怎么办| 精品99又大又爽又粗少妇毛片| 18禁动态无遮挡网站| 97在线人人人人妻| 久久国产精品男人的天堂亚洲 | 高清欧美精品videossex| 激情五月婷婷亚洲| 97在线视频观看| 一边亲一边摸免费视频| 亚洲国产av新网站| 女人精品久久久久毛片| 赤兔流量卡办理| tube8黄色片| 精品国产国语对白av| 日韩亚洲欧美综合| 男人爽女人下面视频在线观看| 曰老女人黄片| 女的被弄到高潮叫床怎么办| 成人美女网站在线观看视频| 人人妻人人爽人人添夜夜欢视频 | 亚洲国产av新网站| 我要看黄色一级片免费的| 亚洲精品乱码久久久v下载方式| 高清视频免费观看一区二区| 亚洲精品日韩av片在线观看| 一区二区三区四区激情视频| av线在线观看网站| 日本免费在线观看一区| 九色成人免费人妻av| 成年人午夜在线观看视频| 欧美精品高潮呻吟av久久| 欧美区成人在线视频| 日本wwww免费看| 中文字幕av电影在线播放| 另类精品久久| 九草在线视频观看| 精品久久久久久久久亚洲| 日韩成人av中文字幕在线观看| 国产日韩欧美视频二区| 99国产精品免费福利视频| 久久99精品国语久久久| 青青草视频在线视频观看| 国产精品一二三区在线看| 在线播放无遮挡| 男人舔奶头视频| 黑人猛操日本美女一级片| 简卡轻食公司| 久久av网站| 国产精品成人在线| 久久国产亚洲av麻豆专区| 欧美成人精品欧美一级黄| 欧美日本中文国产一区发布| 草草在线视频免费看| 少妇猛男粗大的猛烈进出视频| 中文字幕制服av| 亚洲欧美日韩东京热| 日本色播在线视频| 91久久精品国产一区二区成人| 成年av动漫网址| 国产黄片美女视频| 国产亚洲91精品色在线| 99热6这里只有精品| a级一级毛片免费在线观看| a级毛片在线看网站| 精品久久久久久久久av| 国产精品国产三级国产专区5o| 亚洲精华国产精华液的使用体验| 哪个播放器可以免费观看大片| 欧美日韩视频高清一区二区三区二| 免费看av在线观看网站| 国产黄片美女视频| 国产男人的电影天堂91| 亚洲精品成人av观看孕妇| 秋霞伦理黄片| 亚洲精品日韩在线中文字幕| 啦啦啦视频在线资源免费观看| 亚洲av不卡在线观看| 国产成人freesex在线| 亚洲熟女精品中文字幕| 亚洲综合精品二区| 久久精品国产鲁丝片午夜精品| 精品久久久噜噜| 欧美日韩一区二区视频在线观看视频在线| 有码 亚洲区| 国产老妇伦熟女老妇高清| 丝瓜视频免费看黄片| 五月开心婷婷网| 婷婷色麻豆天堂久久| 久久久久人妻精品一区果冻| 18禁动态无遮挡网站| 久久久欧美国产精品| 亚洲av国产av综合av卡| 天堂8中文在线网| 热re99久久精品国产66热6| 亚洲无线观看免费| 少妇被粗大猛烈的视频| videossex国产| 涩涩av久久男人的天堂| 国产女主播在线喷水免费视频网站| 97在线视频观看| 久久精品国产亚洲网站| 国产成人freesex在线| 国产熟女午夜一区二区三区 | 嘟嘟电影网在线观看| 欧美人与善性xxx| 2022亚洲国产成人精品| 人人妻人人添人人爽欧美一区卜| 中文字幕亚洲精品专区| av福利片在线观看| 免费久久久久久久精品成人欧美视频 | 国产深夜福利视频在线观看| av天堂中文字幕网| 啦啦啦在线观看免费高清www| 亚洲欧美日韩卡通动漫| 国产日韩欧美亚洲二区| 久久久久久久久久久久大奶| 久久久久久久精品精品| 欧美精品高潮呻吟av久久| 亚洲中文av在线| 亚洲av中文av极速乱| 亚洲美女黄色视频免费看| 午夜福利影视在线免费观看| 18禁动态无遮挡网站| 人妻一区二区av| 国产黄色免费在线视频| 日韩三级伦理在线观看| 久久午夜福利片| 国产精品伦人一区二区| 久久久欧美国产精品| 亚洲第一区二区三区不卡| 日产精品乱码卡一卡2卡三| 又大又黄又爽视频免费| 亚洲国产欧美在线一区| 青青草视频在线视频观看| 国产亚洲精品久久久com| 少妇人妻精品综合一区二区| 中文字幕人妻熟人妻熟丝袜美| 免费人成在线观看视频色| 国产高清不卡午夜福利| 国产精品国产三级专区第一集| 国产熟女午夜一区二区三区 | av免费在线看不卡| 久久99热这里只频精品6学生| 中文乱码字字幕精品一区二区三区| 麻豆乱淫一区二区| 中文资源天堂在线| 精品一区二区免费观看| 免费在线观看成人毛片| 国产男女超爽视频在线观看| 国产亚洲午夜精品一区二区久久| 在线观看www视频免费| av有码第一页| √禁漫天堂资源中文www| 日韩一区二区三区影片| 九草在线视频观看| 日韩av免费高清视频| 午夜激情福利司机影院| 不卡视频在线观看欧美| 日韩大片免费观看网站| 国产亚洲一区二区精品| 看免费成人av毛片| 国产亚洲91精品色在线| 欧美日韩亚洲高清精品| 大话2 男鬼变身卡| 亚洲色图综合在线观看| 新久久久久国产一级毛片| 寂寞人妻少妇视频99o| 成人影院久久| 97在线人人人人妻| 蜜臀久久99精品久久宅男| 久久97久久精品| 中文字幕人妻熟人妻熟丝袜美| 国产女主播在线喷水免费视频网站| 久久午夜综合久久蜜桃| av在线app专区| 寂寞人妻少妇视频99o| 成人影院久久| 国产亚洲av片在线观看秒播厂| 亚洲欧美成人精品一区二区| 国产欧美日韩综合在线一区二区 | 九草在线视频观看| 一级a做视频免费观看| 韩国高清视频一区二区三区| 女人久久www免费人成看片| av又黄又爽大尺度在线免费看| 国产淫片久久久久久久久| 97超碰精品成人国产| 久久久久精品久久久久真实原创| 少妇人妻精品综合一区二区| 国产熟女欧美一区二区| 免费观看无遮挡的男女| 观看免费一级毛片| 亚洲真实伦在线观看| 毛片一级片免费看久久久久| av视频免费观看在线观看| 日本色播在线视频| 丝袜脚勾引网站| 欧美激情国产日韩精品一区| xxx大片免费视频| 国产中年淑女户外野战色| 久久久精品免费免费高清| 日本午夜av视频| 99九九在线精品视频 | 一区二区三区四区激情视频| 一级毛片aaaaaa免费看小| 91aial.com中文字幕在线观看| 99久久综合免费| 男人添女人高潮全过程视频| 免费观看a级毛片全部| 亚洲精品视频女| 亚洲av福利一区| 少妇 在线观看| 成年女人在线观看亚洲视频| 观看av在线不卡| 午夜福利影视在线免费观看| 精品人妻熟女毛片av久久网站| 色婷婷av一区二区三区视频| 欧美3d第一页| 久久久久久久久久久久大奶| 久久6这里有精品| 大又大粗又爽又黄少妇毛片口| 黄片无遮挡物在线观看| 99久国产av精品国产电影| 人人妻人人看人人澡| 国内揄拍国产精品人妻在线| 一本一本综合久久| 国产欧美亚洲国产| 噜噜噜噜噜久久久久久91| 亚洲国产精品国产精品| 亚洲精品乱码久久久久久按摩| 精品少妇久久久久久888优播| 丝瓜视频免费看黄片| 波野结衣二区三区在线| 国产国拍精品亚洲av在线观看| 妹子高潮喷水视频| 性高湖久久久久久久久免费观看| 亚洲内射少妇av| 秋霞在线观看毛片| 亚洲中文av在线| 国产男女内射视频| 色视频www国产| 欧美日韩综合久久久久久| 五月玫瑰六月丁香| 国产精品国产三级国产专区5o| 夫妻性生交免费视频一级片| 国产亚洲最大av| 亚洲国产精品国产精品| 亚洲精品日韩在线中文字幕| 女性被躁到高潮视频| 欧美日本中文国产一区发布| 亚洲内射少妇av| 内地一区二区视频在线| 亚洲美女黄色视频免费看| 大片免费播放器 马上看| 51国产日韩欧美| 青春草国产在线视频| www.av在线官网国产| 高清午夜精品一区二区三区| 久久久久精品久久久久真实原创| 午夜免费鲁丝| 晚上一个人看的免费电影| 久久av网站| 欧美bdsm另类| 精品卡一卡二卡四卡免费| 国产色爽女视频免费观看| 午夜精品国产一区二区电影| 免费看光身美女| 插逼视频在线观看| 久久久久精品久久久久真实原创| 亚洲国产色片| 亚洲av二区三区四区| 国产伦精品一区二区三区视频9| 久久ye,这里只有精品| 午夜91福利影院| 亚洲国产精品成人久久小说| 国产精品久久久久久精品古装| 乱人伦中国视频| 国产成人freesex在线| 全区人妻精品视频| 在线观看三级黄色| 下体分泌物呈黄色| 成年女人在线观看亚洲视频| 日韩人妻高清精品专区| 久久99蜜桃精品久久| 蜜臀久久99精品久久宅男| 大片免费播放器 马上看| 国产精品久久久久成人av| av在线老鸭窝| 交换朋友夫妻互换小说| 天美传媒精品一区二区| 国产爽快片一区二区三区| 精品人妻偷拍中文字幕| 黄色毛片三级朝国网站 | 亚洲真实伦在线观看| 大片免费播放器 马上看| 久久久国产欧美日韩av| 制服丝袜香蕉在线| 国产精品欧美亚洲77777| 简卡轻食公司| tube8黄色片| 边亲边吃奶的免费视频| av在线播放精品| 国产高清三级在线| 精品人妻偷拍中文字幕| 校园人妻丝袜中文字幕| av女优亚洲男人天堂| 久久国产精品大桥未久av | 在线观看人妻少妇| 国产成人精品无人区| 亚洲精品国产色婷婷电影| 熟女人妻精品中文字幕| 午夜免费男女啪啪视频观看| av播播在线观看一区| 人人妻人人添人人爽欧美一区卜| 老女人水多毛片| 亚洲一区二区三区欧美精品| 亚洲精品久久午夜乱码| 中文在线观看免费www的网站| freevideosex欧美| 久久综合国产亚洲精品| 亚洲精品一区蜜桃| 亚洲欧美一区二区三区黑人 | 99九九在线精品视频 | 日韩成人av中文字幕在线观看| 亚洲第一av免费看| 少妇丰满av| 午夜激情福利司机影院| 九草在线视频观看| 中国三级夫妇交换| 嘟嘟电影网在线观看| 亚洲欧美日韩东京热| 中国三级夫妇交换| 丝袜脚勾引网站| 夫妻性生交免费视频一级片| 一级毛片 在线播放| 国产精品一区www在线观看| 国产成人精品福利久久| 少妇的逼好多水| 熟妇人妻不卡中文字幕| 国产黄色免费在线视频| 国产老妇伦熟女老妇高清| 亚洲成色77777| 亚洲av电影在线观看一区二区三区| 欧美精品高潮呻吟av久久| 精品久久久久久久久亚洲| 最近的中文字幕免费完整| 国产男女超爽视频在线观看| 国产精品熟女久久久久浪| 久久精品国产亚洲av涩爱| 大码成人一级视频| 如何舔出高潮| 亚洲欧美精品自产自拍| 久久青草综合色| 成人午夜精彩视频在线观看| 国产伦精品一区二区三区视频9| 免费在线观看成人毛片| 色网站视频免费| 久久综合国产亚洲精品| 青春草视频在线免费观看| av免费观看日本| 高清欧美精品videossex| 99国产精品免费福利视频| 狂野欧美激情性xxxx在线观看| 国产亚洲av片在线观看秒播厂| 久久国产乱子免费精品| 久久国产亚洲av麻豆专区| 青春草视频在线免费观看| 免费观看a级毛片全部| 中文乱码字字幕精品一区二区三区| 中国美白少妇内射xxxbb| 免费播放大片免费观看视频在线观看| 日本欧美国产在线视频| 久久av网站| 97超视频在线观看视频| 国产精品国产三级国产专区5o| 黄色日韩在线| 搡老乐熟女国产| 99久久人妻综合| 亚洲av国产av综合av卡| 亚洲国产最新在线播放| 日日摸夜夜添夜夜添av毛片| 色吧在线观看| 建设人人有责人人尽责人人享有的| 久久国产精品大桥未久av | 精品一品国产午夜福利视频| 日本午夜av视频| 国产片特级美女逼逼视频| 国产精品99久久久久久久久| 国产精品人妻久久久影院| 国产 精品1| 欧美区成人在线视频| 好男人视频免费观看在线| av福利片在线观看| 亚洲综合精品二区| 午夜福利网站1000一区二区三区| a 毛片基地| 一级毛片黄色毛片免费观看视频| 国产亚洲精品久久久com| 你懂的网址亚洲精品在线观看| 最后的刺客免费高清国语| 老司机影院毛片| 中文字幕av电影在线播放| 国产精品一区二区三区四区免费观看| 大片免费播放器 马上看| 国产精品一区二区在线观看99| 日日摸夜夜添夜夜爱| 看免费成人av毛片| 美女内射精品一级片tv| 精品国产露脸久久av麻豆| 一级毛片我不卡| 国产高清不卡午夜福利| 免费观看的影片在线观看| 国产精品久久久久久久电影| 五月天丁香电影| 亚洲欧美精品自产自拍| 亚洲国产精品成人久久小说| 亚洲精品乱码久久久久久按摩| 免费在线观看成人毛片| 国产一区二区在线观看日韩| 久久精品国产鲁丝片午夜精品| 日日撸夜夜添| 日韩视频在线欧美| 欧美国产精品一级二级三级 | 久久6这里有精品| 女性生殖器流出的白浆| 亚洲国产最新在线播放| 人妻夜夜爽99麻豆av| 少妇 在线观看| 只有这里有精品99| 如何舔出高潮| 美女国产视频在线观看| 国产成人精品一,二区| 2018国产大陆天天弄谢| 欧美变态另类bdsm刘玥| 久久影院123| 亚洲,欧美,日韩| 黄色怎么调成土黄色| 中国美白少妇内射xxxbb| 天美传媒精品一区二区| 女性生殖器流出的白浆| 我要看黄色一级片免费的| 两个人的视频大全免费| 日韩一区二区三区影片| 视频区图区小说| 国产69精品久久久久777片| 亚洲美女搞黄在线观看| 亚洲av日韩在线播放| 国产成人aa在线观看| 亚洲一区二区三区欧美精品| 国产中年淑女户外野战色| 国产黄频视频在线观看| 蜜桃久久精品国产亚洲av| 国产成人91sexporn| 又黄又爽又刺激的免费视频.| 精品午夜福利在线看| 亚洲丝袜综合中文字幕| 久久午夜综合久久蜜桃| 免费大片黄手机在线观看| 六月丁香七月| 亚洲国产精品一区二区三区在线| 国产黄色视频一区二区在线观看| 日本与韩国留学比较| 99热这里只有精品一区| 亚洲av.av天堂| 久久狼人影院| 亚洲国产精品一区三区| 国产成人freesex在线| 王馨瑶露胸无遮挡在线观看| 亚洲av日韩在线播放| 国产精品一二三区在线看| av福利片在线| 夜夜爽夜夜爽视频| 国产高清国产精品国产三级| 久久鲁丝午夜福利片| 久久99热这里只频精品6学生| 国产黄片美女视频| 老司机影院成人| 日产精品乱码卡一卡2卡三| 晚上一个人看的免费电影| 国产成人91sexporn| 亚洲三级黄色毛片| 国产精品免费大片| 欧美激情国产日韩精品一区| 精品国产国语对白av| 亚洲国产精品一区二区三区在线| 日韩一区二区三区影片| 最新中文字幕久久久久| 成人美女网站在线观看视频| 青春草亚洲视频在线观看| 黄色日韩在线| 曰老女人黄片| 哪个播放器可以免费观看大片| 国产乱人偷精品视频| 啦啦啦在线观看免费高清www| 亚洲欧美成人精品一区二区| 热re99久久国产66热| 欧美日韩一区二区视频在线观看视频在线| 亚洲人与动物交配视频| 婷婷色综合大香蕉| 国产一区有黄有色的免费视频| 欧美少妇被猛烈插入视频| 不卡视频在线观看欧美| 亚洲精品国产av成人精品| 精品人妻偷拍中文字幕| 中文字幕亚洲精品专区| 国精品久久久久久国模美| 亚洲av二区三区四区| 最近中文字幕高清免费大全6| 国产高清不卡午夜福利| 熟女人妻精品中文字幕| 五月伊人婷婷丁香| 国产色爽女视频免费观看| 久久久精品94久久精品| 久久鲁丝午夜福利片| 最后的刺客免费高清国语| 美女大奶头黄色视频| 91精品国产九色| 色吧在线观看| 18+在线观看网站| 最近中文字幕高清免费大全6| 国产精品久久久久久久电影| 99热6这里只有精品| 国产欧美日韩综合在线一区二区 | 亚洲精品视频女| 三上悠亚av全集在线观看 | 人妻一区二区av| 精品国产国语对白av| 精品人妻偷拍中文字幕| 三上悠亚av全集在线观看 | 欧美人与善性xxx| 丰满少妇做爰视频| 国产黄色免费在线视频| 亚洲不卡免费看| 爱豆传媒免费全集在线观看| 日日摸夜夜添夜夜添av毛片| 国模一区二区三区四区视频| 久久久午夜欧美精品| 亚洲精品一区蜜桃| 亚洲欧洲精品一区二区精品久久久 | 丝袜喷水一区| 国产精品三级大全| 人妻制服诱惑在线中文字幕| 热99国产精品久久久久久7| 2022亚洲国产成人精品| 高清在线视频一区二区三区| a级毛片免费高清观看在线播放| 成年人免费黄色播放视频 | 亚洲av二区三区四区| 熟女人妻精品中文字幕| 亚洲美女视频黄频| 97超碰精品成人国产| 精品卡一卡二卡四卡免费| 久久久亚洲精品成人影院| 18禁动态无遮挡网站| 2018国产大陆天天弄谢| 精品酒店卫生间| 丝袜脚勾引网站| 美女主播在线视频| 青春草视频在线免费观看| 久久青草综合色| 寂寞人妻少妇视频99o| 国产精品久久久久久精品古装| 97超视频在线观看视频| 麻豆成人av视频| 狂野欧美激情性xxxx在线观看| 国产一区二区三区综合在线观看 | 毛片一级片免费看久久久久| 中文字幕人妻丝袜制服| 韩国高清视频一区二区三区| 桃花免费在线播放| 国产成人午夜福利电影在线观看| 国产av国产精品国产| 国产免费一级a男人的天堂| 欧美成人精品欧美一级黄| 一级片'在线观看视频| 十八禁网站网址无遮挡 | 国产黄频视频在线观看| 免费黄频网站在线观看国产| 国产综合精华液| 精品熟女少妇av免费看| 亚洲av综合色区一区| 爱豆传媒免费全集在线观看| 欧美+日韩+精品| 男人和女人高潮做爰伦理| av免费观看日本| 久久精品熟女亚洲av麻豆精品| 啦啦啦视频在线资源免费观看| 国内少妇人妻偷人精品xxx网站| 蜜桃久久精品国产亚洲av| 欧美少妇被猛烈插入视频| 成人亚洲欧美一区二区av| 久久精品久久久久久久性| 中文精品一卡2卡3卡4更新| 亚洲经典国产精华液单| 国产日韩欧美视频二区| av又黄又爽大尺度在线免费看| 黄色配什么色好看| 久久久久国产精品人妻一区二区| 草草在线视频免费看| 尾随美女入室| 日本欧美国产在线视频| av福利片在线| 国产在线男女| 99久久综合免费| 免费高清在线观看视频在线观看| 久久久a久久爽久久v久久| 久久99热这里只频精品6学生| 男的添女的下面高潮视频| 高清在线视频一区二区三区| 国产综合精华液| 久久免费观看电影|