Jemin Lee

Orcid: 0000-0003-0152-7739

According to our database1, Jemin Lee authored at least 173 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Precoding Design for Ensuring Data Freshness in Multi-User MISO Networks.
IEEE Trans. Wirel. Commun., March, 2024

Deep Reinforcement Learning-Based Resource Allocation for RSMA in LEO Satellite-Terrestrial Networks.
IEEE Trans. Commun., March, 2024

Visual Preference Inference: An Image Sequence-Based Preference Reasoning in Tabletop Object Manipulation.
CoRR, 2024

Learning-based sensing and computing decision for data freshness in edge computing-enabled networks.
CoRR, 2024

2023
Joint Service Caching and Computing Resource Allocation for Edge Computing-Enabled Networks.
IEEE Trans. Wirel. Commun., December, 2023

Facing to Latency of Hyperledger Fabric for Blockchain-Enabled IoT: Modeling and Analysis.
IEEE Netw., November, 2023

Semantic-Based Precoding Design for Multi-User MISO Networks.
IEEE Wirel. Commun. Lett., September, 2023

DCSaNet: Dilated Convolution and Self-Attention-Based Neural Network for Channel Estimation in IRS-Aided Multi-User Communication System.
IEEE Wirel. Commun. Lett., July, 2023

Ensuring Data Freshness in Wireless Monitoring Networks: Age-of-Information-Sensitive Coverage and Energy Efficiency Perspectives.
IEEE Internet Things J., July, 2023

Age of Information in Wireless Networks: Spatiotemporal Analysis and Locally Adaptive Power Control.
IEEE Trans. Mob. Comput., June, 2023

Facing to wireless network densification in 6G: Challenges and opportunities.
ICT Express, 2023

Ensuring End-to-End Security with Fine-grained Access Control for Connected and Autonomous Vehicles.
CoRR, 2023

Q-HyViT: Post-Training Quantization for Hybrid Vision Transformer with Bridge Block Reconstruction.
CoRR, 2023

Challenges in Secure Underwater Wireless Sensor Network with Fine-grained Access Control.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Jamming Power Optimization for Data Freshness in Covert Relay Networks.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Age of Information Analysis for Cache-enabled UAV Networks.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Average Age of Information Penalty of Short-Packet Communications with Packet Management.
Proceedings of the IEEE International Conference on Communications, 2023

Joint Sensing and Computation Decision for Age of Information-Sensitive Wireless Networks: A Deep Reinforcement Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2023

DiscoCSINet: Dissymmetric Convolution Neural Network for CSI Feedback in FDD Massive MIMO System.
Proceedings of the IEEE Global Communications Conference, 2023

Age of Information Violation Probability Analysis for Cache-enabled UAV Cellular Networks.
Proceedings of the IEEE Globecom Workshops 2023, 2023

2022
Age of Information Analysis for Finite Blocklength Regime in Downlink Cellular Networks.
IEEE Wirel. Commun. Lett., 2022

Precoding Design for Multi-User MISO Systems With Delay-Constrained and -Tolerant Users.
IEEE Trans. Wirel. Commun., 2022

Energy-Efficient Cooperative Offloading for Edge Computing-Enabled Vehicular Networks.
IEEE Trans. Wirel. Commun., 2022

EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2022

Ensuring Data Freshness for Blockchain-Enabled Monitoring Networks.
IEEE Internet Things J., 2022

Quantune: Post-training quantization of convolutional neural networks using extreme gradient boosting for fast deployment.
Future Gener. Comput. Syst., 2022

Software-Level Memory Regulation to Reduce Execution Time Variation on Multicore Real-Time Systems.
IEEE Access, 2022

Non-Terrestrial Networks for UAVs: Base Station Service Provisioning Schemes With Antenna Tilt.
IEEE Access, 2022

Locally Adaptive Power Control for Optimizing Age of Information in Wireless Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Impact of Base Station Activation in Edge Computing-enabled Networks.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Wireless Blockchains: Trade-offs and Future Challenges.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Ensuring Data Freshness for MU-MISO Networks in Finite Blocklength Regime.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Beamforming Design for Cache-enabled Integrated Access and Backhaul Networks.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Probability-based Data Reception in AoI-sensitive Wireless Networks.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

Timely Update Probability Analysis of Blockchain Ledger in UAV-assisted Data Collection Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Beamforming Allocation and Backhaul Capacity Allocation for Integrated Access and Backhaul Networks.
Proceedings of the IEEE Global Communications Conference, 2022

CPrune: Compiler-Informed Model Pruning for Efficient Target-Aware DNN Execution.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Mobile Edge Computing-Enabled Heterogeneous Networks.
IEEE Trans. Wirel. Commun., 2021

Base Station Coordination Scheme for Multi-Tier Ultra-Dense Networks.
IEEE Trans. Wirel. Commun., 2021

Securing Communications With Friendly Unmanned Aerial Vehicle Jammers.
IEEE Trans. Veh. Technol., 2021

Is Blockchain Suitable for Data Freshness? An Age-of-Information Perspective.
IEEE Netw., 2021

Securing Fresh Data in Wireless Monitoring Networks: Age-of-Information Sensitive Coverage Perspective.
CoRR, 2021

Latency Modeling of Hyperledger Fabric for Blockchain-based IoT (BC-IoT) Networks.
CoRR, 2021

Guest Editorial: Communication Technologies for Robotics and Autonomous Systems.
IEEE Commun. Mag., 2021

Analysis of AoI Violation Probability in Wireless Networks.
Proceedings of the 17th International Symposium on Wireless Communication Systems, 2021

Learning-Based Activation of Energy Harvesting Sensors for Fresh Data Acquisition.
Proceedings of the ICWE 2021 Workshops, 2021

MU-MIMO Precoding Design in the Presence of Delay-Constrained Users.
Proceedings of the ICC 2021, 2021

Age of Information Analysis in Hyperledger Fabric Blockchain-enabled Monitoring Networks.
Proceedings of the ICC 2021, 2021

Base Station Activation in Coordinated Multi-point Joint Transmission-based Ultra Dense Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Precoding Design for Minimizing Age of Information in Downlink MU-MISO Systems.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Edge Computing-Enabled Cell-Free Massive MIMO Systems.
IEEE Trans. Wirel. Commun., 2020

Multi-layer Unmanned Aerial Vehicle Networks: Modeling and Performance Analysis.
IEEE Trans. Wirel. Commun., 2020

PASS: Reducing Redundant Notifications between a Smartphone and a Smartwatch for Energy Saving.
IEEE Trans. Mob. Comput., 2020

ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications.
IEEE Trans. Inf. Forensics Secur., 2020

EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing.
CoRR, 2020

Is Blockchain Suitable for Data Freshness? - Age-of-Information Perspective.
CoRR, 2020

A Novel Coordinated Multi-point Downlink Transmission Scheme for Ultra-dense Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Impact of Finite Blocklength on AoI Violation Probability in UAV Networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Service Caching For Edge Computing-Enabled Heterogeneous Networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Energy-Efficient Computation Task Splitting for Edge Computing-Enabled Vehicular Networks.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Impact of Base Station Antenna Tilt Angle on UAV Communications.
Proceedings of the IEEE Global Communications Conference, 2020

Sensing and Transmission Design for AoI-Sensitive Wireless Sensor Networks.
Proceedings of the IEEE Globecom Workshops, 2020

Service Caching and Computation Resource Allocation for Large-Scale Edge Computing-Enabled Networks.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper.
IEEE Trans. Wirel. Commun., 2019

Impact of an Interfering Node on Unmanned Aerial Vehicle Communications.
IEEE Trans. Veh. Technol., 2019

Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology.
IEEE Trans. Inf. Forensics Secur., 2019

SoK: A Systematic Review of Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions.
IEEE Consumer Electron. Mag., 2019

RF based entropy sources for jamming resilience: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Fire in Your Hands: Understanding Thermal Behavior of Smartphones.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

2018
Secure Communications for the Two-User Broadcast Channel With Random Traffic.
IEEE Trans. Inf. Forensics Secur., 2018

GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks.
IEEE Trans. Inf. Forensics Secur., 2018

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions.
IEEE Trans. Inf. Forensics Secur., 2018

Reconfigurable Security: Edge-Computing-Based Framework for IoT.
IEEE Netw., 2018

Reducing Smartwatch Users' Distraction with Convolutional Neural Network.
Mob. Inf. Syst., 2018

Impact of Elevated Base Stations on the Ultra-Dense Networks.
IEEE Commun. Lett., 2018

ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G.
CoRR, 2018

Self-Controlled Jamming Resilient Design Using Physical Layer Secret Keys.
CoRR, 2018

Physical-Layer Security Against Smart Eavesdroppers: Exploiting Full-Duplex Receivers.
IEEE Access, 2018

On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Successful Edge Computing Probability Analysis in Heterogeneous Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Understanding Customers' Interests in the Wild.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Offloading in Edge Computing-Enabled Cell-Free Massive MIMO Systems.
Proceedings of the IEEE Globecom Workshops, 2018

Performance Analysis for Multi-Layer Unmanned Aerial Vehicle Networks.
Proceedings of the IEEE Globecom Workshops, 2018

Outage Probability of UAV Communications in the Presence of Interference.
Proceedings of the IEEE Global Communications Conference, 2018

CORE: Cooperative Encryption with its Applications to Controllable Security Services.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Gravity Ball: A Virtual Trackball with Ultrasonic Haptic Feedback.
Proceedings of the Haptic Interaction - Perception, Devices and Algorithms, 2018

2017
Exploiting Trust Degree for Multiple-Antenna User Cooperation.
IEEE Trans. Wirel. Commun., 2017

Heterogeneous Cellular Networks With LoS and NLoS Transmissions - The Role of Massive MIMO and Small Cells.
IEEE Trans. Wirel. Commun., 2017

Cooperative Caching and Transmission Design in Cluster-Centric Small Cell Networks.
IEEE Trans. Wirel. Commun., 2017

On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation.
IEEE Trans. Inf. Forensics Secur., 2017

Output-oriented power saving mode for mobile devices.
Future Gener. Comput. Syst., 2017

Secure UAV communication in the presence of active eavesdropper (invited paper).
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Trusted content delivery in large-scale SIC-enabled wireless networks.
Proceedings of the 18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2017

Extending App Pre-Launch Service with Emotion Context: Poster Abstract.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Privacy preservation with channel-based jamming for data aggregation in smart grids.
Proceedings of the IEEE International Conference on Communications, 2017

Comparison of Massive MIMO and Small Cells in HetNet with LoS and NLoS Transmissions.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Secure Transmission in the Presence of Full-Duplex Active Eavesdropper.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Guest Editorial: LTE in Unlicensed Spectrum.
IEEE Wirel. Commun., 2016

Traffic Offloading in Heterogeneous Networks With Energy Harvesting Personal Cells-Network Throughput and Energy Efficiency.
IEEE Trans. Wirel. Commun., 2016

Heterogeneous Cellular Network With Energy Harvesting-Based D2D Communication.
IEEE Trans. Wirel. Commun., 2016

Physical-Layer Secret Key Generation With Colluding Untrusted Relays.
IEEE Trans. Wirel. Commun., 2016

Confidential Cooperative Communication With Trust Degree of Potential Eavesdroppers.
IEEE Trans. Wirel. Commun., 2016

Advanced Security Testbed Framework for Wearable IoT Devices.
ACM Trans. Internet Techn., 2016

Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding.
IEEE Trans. Inf. Forensics Secur., 2016

QDroid: Mobile Application Quality Analyzer for App Market Curators.
Mob. Inf. Syst., 2016

Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things.
IEEE Internet Things J., 2016

Best Antenna Placement for Eavesdroppers: Distributed or Co-Located?
IEEE Commun. Lett., 2016

Transmission Strategy Against Opportunistic Attack for MISO Secure Channels.
IEEE Commun. Lett., 2016

Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation.
CoRR, 2016

On the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation.
CoRR, 2016

Optimal cooperative range of distributed transmitters for communications secrecy.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016

Reducing distraction of smartwatch users with deep learning.
Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, 2016

Stability region of two-user full-duplex broadcast channel with secrecy constraint.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A game theoretic model for enabling honeypots in IoT networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Cluster-centric cache utilization design in cooperative small cell networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Leaking Rate Region to Eavesdroppers and Untrusted Relays.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Jamming-Aided Secure Communication in Massive MIMO Rician Channels.
IEEE Trans. Wirel. Commun., 2015

Hybrid Full-/Half-Duplex System Analysis in Heterogeneous Wireless Networks.
IEEE Trans. Wirel. Commun., 2015

An Efficient Relay Selection Strategy for Random Cognitive Relay Networks.
IEEE Trans. Wirel. Commun., 2015

Trust Degree Based Beamforming for MISO Cooperative Communication System.
IEEE Commun. Lett., 2015

Secure communication for massive MIMO uplink in the presence of co-located and distributed eavesdroppers.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Opportunistic D2D communication in energy harvesting heterogeneous cellular network.
Proceedings of the 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2015

Noah: Keyed Noise Flooding for Wireless Confidentiality.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Energy harvesting personal cells - traffic offloading and network throughput.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Wireless MIMO switching with trusted and untrusted relays: Degrees of freedom perspective.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Secret Group Key Generation in Physical Layer for Mesh Topology.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Trust Degree-Based Cooperative Transmission for Communication Secrecy.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Group anonymous D2D communication with end-to-end security in LTE-A.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Multi-Cell Multi-User Relaying Exploiting Overheard Signals.
IEEE Wirel. Commun. Lett., 2014

Automated power model generation method for smartphones.
IEEE Trans. Consumer Electron., 2014

Special issue on Heterogeneous and small cell networks.
Phys. Commun., 2014

Cognitive network secrecy with interference engineering.
IEEE Netw., 2014

Green device-to-device communication with harvesting energy in cellular networks.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Device-to-Device Communication in Wireless Mobile Social Networks.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Secure communication via jamming in massive MIMO Rician channels.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

Physical-layer secret key generation with untrusted relays.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

Heterogeneous network throughput with hybrid-duplex systems.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Spectrum-Sharing Transmission Capacity with Interference Cancellation.
IEEE Trans. Commun., 2013

Distributed Network Secrecy.
IEEE J. Sel. Areas Commun., 2013

Spectrum-efficient operating policy for energy-harvesting clustered wireless networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Framework for automated power estimation of android applications.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Distributed secrecy in multilevel wireless networks.
Proceedings of IEEE International Conference on Communications, 2013

Interference engineering for heterogeneous wireless networks with secrecy.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Secure node packing of large-scale wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Capacity of Reactive DF Scheme in Cognitive Relay Networks.
IEEE Trans. Wirel. Commun., 2011

Reliability Improvement Using Receive Mode Selection in the Device-to-Device Uplink Period Underlaying Cellular Networks.
IEEE Trans. Wirel. Commun., 2011

Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks.
IEEE Trans. Wirel. Commun., 2011

Outage Probability of Cognitive Relay Networks with Interference Constraints.
IEEE Trans. Wirel. Commun., 2011

Spectrum-Sharing Transmission Capacity.
IEEE Trans. Wirel. Commun., 2011

A ML-Based Detector Considering Transmit Power Allocation for SC-FDMA Systems.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Group-Wise Distributed Space-Time-Frequency Coded OFDM over Asymmetric Frequency-Selective AF Relay Channels.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

The Effect of Interference Cancellation on Spectrum-Sharing Transmission Capacity.
Proceedings of IEEE International Conference on Communications, 2011

Energy-efficient opportunistic spectrum access in cognitive radio networks with energy harvesting.
Proceedings of the CogART 2011, 2011

2010
Capacity enhancement of secondary links through spatial diversity in spectrum sharing.
IEEE Trans. Wirel. Commun., 2010

Capacity of Secondary Users Exploiting Multispectrum and Multiuser Diversity in Spectrum-Sharing Environments.
IEEE Trans. Veh. Technol., 2010

Throughput Analysis and Optimization of Sensing-Based Cognitive Radio Systems With Markovian Traffic.
IEEE Trans. Veh. Technol., 2010

Joint Beamforming and Power Control Algorithm for Cognitive Radio Network with the Multi-Antenna Base Station.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

User group selection scheme for lattice-reduction-aided precoder in MIMO broadcast systems.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

A New Grouping-ML Detector with Low Complexity for SC-FDMA Systems.
Proceedings of IEEE International Conference on Communications, 2010

Achievable Transmission Capacity of Secondary System in Cognitive Radio Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
A new asymptotic analysis of throughput enhancement from selection diversity using a high SNR approach in multiuser systems.
IEEE Trans. Wirel. Commun., 2009

Sensing threshold control for fair coexistence of heterogeneous systems in open spectrum.
IEEE Trans. Wirel. Commun., 2009

Low bias frequency domain SNR estimator using DCT in mobile fading channels.
IEEE Trans. Wirel. Commun., 2009

Sensing Performance of Energy Detector With Correlated Multiple Antennas.
IEEE Signal Process. Lett., 2009

Stochastic Multichannel Sensing for Cognitive Radio Systems: Optimal Channel Selection for Sensing with Interference Constraints.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

2008
QoS-guaranteed transmission mode selection for efficient resource utilization in multi-hop cellular networks.
IEEE Trans. Wirel. Commun., 2008

A New Spectrum Sensing Scheme using Cyclic Prefix for OFDM-Based Cognitive Radio Systems.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

A Power Division Reuse Partitioning Scheme with Half Frequency Reuse Factor for OFDMA Downlink Systems.
Proceedings of IEEE International Conference on Communications, 2008

2007
A Multi-hop User Admission Algorithm for Fixed Relay Stations with Limited Capabilities in OFDMA Cellular Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

QoS-guaranteed Transmission Scheme Selection for OFDMA Multi-hop Cellular Networks.
Proceedings of IEEE International Conference on Communications, 2007

2006
An Improved Location Tracking Algorithm with Velocity Estimation in Cellular Radio Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006


  Loading...