期刊文献+
共找到160篇文章
< 1 2 8 >
每页显示 20 50 100
An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection
1
作者 Younghoon Ban Myeonghyun Kim Haehyun Cho 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3535-3563,共29页
Antivirus vendors and the research community employ Machine Learning(ML)or Deep Learning(DL)-based static analysis techniques for efficient identification of new threats,given the continual emergence of novel malware ... Antivirus vendors and the research community employ Machine Learning(ML)or Deep Learning(DL)-based static analysis techniques for efficient identification of new threats,given the continual emergence of novel malware variants.On the other hand,numerous researchers have reported that Adversarial Examples(AEs),generated by manipulating previously detected malware,can successfully evade ML/DL-based classifiers.Commercial antivirus systems,in particular,have been identified as vulnerable to such AEs.This paper firstly focuses on conducting black-box attacks to circumvent ML/DL-based malware classifiers.Our attack method utilizes seven different perturbations,including Overlay Append,Section Append,and Break Checksum,capitalizing on the ambiguities present in the PE format,as previously employed in evasion attack research.By directly applying the perturbation techniques to PE binaries,our attack method eliminates the need to grapple with the problem-feature space dilemma,a persistent challenge in many evasion attack studies.Being a black-box attack,our method can generate AEs that successfully evade both DL-based and ML-based classifiers.Also,AEs generated by the attack method retain their executability and malicious behavior,eliminating the need for functionality verification.Through thorogh evaluations,we confirmed that the attack method achieves an evasion rate of 65.6%against well-known ML-based malware detectors and can reach a remarkable 99%evasion rate against well-known DL-based malware detectors.Furthermore,our AEs demonstrated the capability to bypass detection by 17%of vendors out of the 64 on VirusTotal(VT).In addition,we propose a defensive approach that utilizes Trend Locality Sensitive Hashing(TLSH)to construct a similarity-based defense model.Through several experiments on the approach,we verified that our defense model can effectively counter AEs generated by the perturbation techniques.In conclusion,our defense model alleviates the limitation of the most promising defense method,adversarial training,which is only effective against the AEs that are included in the training classifiers. 展开更多
关键词 Malware classification machine learning adversarial examples evasion attack CYBERSECURITY
下载PDF
微探仁爱版初中英语教材中“Example”部分的教学策略
2
作者 王秀英 《名师在线(中英文)》 2024年第14期64-66,共3页
仁爱版初中英语教材中的“Example”部分是听说课教学的重要内容之一,也是学生在语言实践中迁移和运用知识的集中体现。如何提高“Example”部分教学内容的指导性、针对性和有效性是一线教师关注的焦点。文章分析了“Example”部分内容... 仁爱版初中英语教材中的“Example”部分是听说课教学的重要内容之一,也是学生在语言实践中迁移和运用知识的集中体现。如何提高“Example”部分教学内容的指导性、针对性和有效性是一线教师关注的焦点。文章分析了“Example”部分内容教学存在的问题,提出以主题意义为导向、深度融合教学与评价、合理分配教学时间和巩固教学成果等教学策略,以期提升“Example”部分的教学成效,逐步培养学生的英语学科核心素养。 展开更多
关键词 初中英语 example”部分 英语学科核心素养
下载PDF
An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments
3
作者 Weizheng Wang Xiangqi Wang +5 位作者 Xianmin Pan Xingxing Gong Jian Liang Pradip Kumar Sharma Osama Alfarraj Wael Said 《Computers, Materials & Continua》 SCIE EI 2023年第9期3859-3876,共18页
Image-denoising techniques are widely used to defend against Adversarial Examples(AEs).However,denoising alone cannot completely eliminate adversarial perturbations.The remaining perturbations tend to amplify as they ... Image-denoising techniques are widely used to defend against Adversarial Examples(AEs).However,denoising alone cannot completely eliminate adversarial perturbations.The remaining perturbations tend to amplify as they propagate through deeper layers of the network,leading to misclassifications.Moreover,image denoising compromises the classification accuracy of original examples.To address these challenges in AE defense through image denoising,this paper proposes a novel AE detection technique.The proposed technique combines multiple traditional image-denoising algorithms and Convolutional Neural Network(CNN)network structures.The used detector model integrates the classification results of different models as the input to the detector and calculates the final output of the detector based on a machine-learning voting algorithm.By analyzing the discrepancy between predictions made by the model on original examples and denoised examples,AEs are detected effectively.This technique reduces computational overhead without modifying the model structure or parameters,effectively avoiding the error amplification caused by denoising.The proposed approach demonstrates excellent detection performance against mainstream AE attacks.Experimental results show outstanding detection performance in well-known AE attacks,including Fast Gradient Sign Method(FGSM),Basic Iteration Method(BIM),DeepFool,and Carlini&Wagner(C&W),achieving a 94%success rate in FGSM detection,while only reducing the accuracy of clean examples by 4%. 展开更多
关键词 Deep neural networks adversarial example image denoising adversarial example detection machine learning adversarial attack
下载PDF
A new method of constructing adversarial examplesfor quantum variational circuits
4
作者 颜金歌 闫丽丽 张仕斌 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期268-272,共5页
A quantum variational circuit is a quantum machine learning model similar to a neural network.A crafted adversarial example can lead to incorrect results for the model.Using adversarial examples to train the model wil... A quantum variational circuit is a quantum machine learning model similar to a neural network.A crafted adversarial example can lead to incorrect results for the model.Using adversarial examples to train the model will greatly improve its robustness.The existing method is to use automatic differentials or finite difference to obtain a gradient and use it to construct adversarial examples.This paper proposes an innovative method for constructing adversarial examples of quantum variational circuits.In this method,the gradient can be obtained by measuring the expected value of a quantum bit respectively in a series quantum circuit.This method can be used to construct the adversarial examples for a quantum variational circuit classifier.The implementation results prove the effectiveness of the proposed method.Compared with the existing method,our method requires fewer resources and is more efficient. 展开更多
关键词 quantum variational circuit adversarial examples quantum machine learning quantum circuit
下载PDF
Adversarial Examples Protect Your Privacy on Speech Enhancement System
5
作者 Mingyu Dong Diqun Yan Rangding Wang 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1-12,共12页
Speech is easily leaked imperceptibly.When people use their phones,the personal voice assistant is constantly listening and waiting to be activated.Private content in speech may be maliciously extracted through automa... Speech is easily leaked imperceptibly.When people use their phones,the personal voice assistant is constantly listening and waiting to be activated.Private content in speech may be maliciously extracted through automatic speech recognition(ASR)technology by some applications on phone devices.To guarantee that the recognized speech content is accurate,speech enhancement technology is used to denoise the input speech.Speech enhancement technology has developed rapidly along with deep neural networks(DNNs),but adversarial examples can cause DNNs to fail.Considering that the vulnerability of DNN can be used to protect the privacy in speech.In this work,we propose an adversarial method to degrade speech enhancement systems,which can prevent the malicious extraction of private information in speech.Experimental results show that the generated enhanced adversarial examples can be removed most content of the target speech or replaced with target speech content by speech enhancement.The word error rate(WER)between the enhanced original example and enhanced adversarial example recognition result can reach 89.0%.WER of target attack between enhanced adversarial example and target example is low at 33.75%.The adversarial perturbation in the adversarial example can bring much more change than itself.The rate of difference between two enhanced examples and adversarial perturbation can reach more than 1.4430.Meanwhile,the transferability between different speech enhancement models is also investigated.The low transferability of the method can be used to ensure the content in the adversarial example is not damaged,the useful information can be extracted by the friendly ASR.This work can prevent the malicious extraction of speech. 展开更多
关键词 Adversarial example speech enhancement privacy protection deep neural network
下载PDF
Defending Adversarial Examples by a Clipped Residual U-Net Model
6
作者 Kazim Ali Adnan N.Qureshi +2 位作者 Muhammad Shahid Bhatti Abid Sohail Mohammad Hijji 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2237-2256,共20页
Deep learning-based systems have succeeded in many computer vision tasks.However,it is found that the latest study indicates that these systems are in danger in the presence of adversarial attacks.These attacks can qu... Deep learning-based systems have succeeded in many computer vision tasks.However,it is found that the latest study indicates that these systems are in danger in the presence of adversarial attacks.These attacks can quickly spoil deep learning models,e.g.,different convolutional neural networks(CNNs),used in various computer vision tasks from image classification to object detection.The adversarial examples are carefully designed by injecting a slight perturbation into the clean images.The proposed CRU-Net defense model is inspired by state-of-the-art defense mechanisms such as MagNet defense,Generative Adversarial Net-work Defense,Deep Regret Analytic Generative Adversarial Networks Defense,Deep Denoising Sparse Autoencoder Defense,and Condtional Generattive Adversarial Network Defense.We have experimentally proved that our approach is better than previous defensive techniques.Our proposed CRU-Net model maps the adversarial image examples into clean images by eliminating the adversarial perturbation.The proposed defensive approach is based on residual and U-Net learning.Many experiments are done on the datasets MNIST and CIFAR10 to prove that our proposed CRU-Net defense model prevents adversarial example attacks in WhiteBox and BlackBox settings and improves the robustness of the deep learning algorithms especially in the computer visionfield.We have also reported similarity(SSIM and PSNR)between the original and restored clean image examples by the proposed CRU-Net defense model. 展开更多
关键词 Adversarial examples adversarial attacks defense method residual learning u-net cgan cru-et model
下载PDF
Eye Movement Modeling Examples as a Teaching Tool for Epidural Block
7
作者 Emanuele Capogna Marco Scorzoni +5 位作者 Gian Luigi Gonnella Matteo Velardo Pier Paolo Giurì Mariano Ciancia Gaetano Draisci Giorgio Capogna 《Open Journal of Anesthesiology》 2023年第4期75-84,共10页
Introduction: Video examples with task demonstrations by experts, with the expert’s eye movements superimposed on the task, are known as “eye movement modeling examples” (EMME). We performed this study to evaluate ... Introduction: Video examples with task demonstrations by experts, with the expert’s eye movements superimposed on the task, are known as “eye movement modeling examples” (EMME). We performed this study to evaluate if there were improvements in the performance of anesthesia novice trainees when executing the epidural technique after an EMME of epidural block procedure. Methods: We developed an eye movement modeling example (EMME) from eye tracking recordings made by experienced anesthesiologists with more than 20 years of experience. Forty-two PGY3 anesthesia trainees who had never previously performed an epidural block were randomized to receive (study group) or not receive (control group) the EMME video before their institutional training. All the trainees were evaluated every 10 epidural blocks until the end of the rotation period, by an independent, blinded observer using the Global Rating Scale for Epidural Anesthesia (GRS). Results: Trainees who received the EMME training exhibited more respect for the patient’s tissues (P Discussion: This is the first study that has used the EMME for a practical, clinical teaching purpose on real patients and that has used it as an aid in teaching epidural anesthesia. We demonstrated that inexperienced trainees who received the EMME training improved their proficiency at epidural blocks as compared to those who had no EMME training beforehand. Given this result, we welcome further studies to investigate the impact and the role of EMME on clinical teaching in the field of anesthesia. 展开更多
关键词 Eye Tracking Eye Movement Modeling example Epidural Anesthesia
下载PDF
英文论文中“suchas,forexample,e.g.,i.e.,etc.,et al.”的用法分析 被引量:3
8
作者 黄龙旺 龚汉忠 《编辑学报》 CSSCI 北大核心 2008年第2期124-124,共1页
关键词 SUCH as for example e.g. i.e. etc. ET a1. 用法分析
下载PDF
Selection of Example Varieties Used in the DUS Test Guideline of Tagetes L. 被引量:1
9
作者 刘艳芳 张建华 +6 位作者 王烨 陈海荣 徐云 杨晓洪 张惠 管俊娇 王江民 《Agricultural Science & Technology》 CAS 2012年第10期2110-2111,2116,共3页
[Objective] Taking the characteristic of flower diameter of Tagetes L.as an example,this study aimed to select example varieties used in the DUS Test Guideline of Tagetes L.[Method] Two continuous years of measurement... [Objective] Taking the characteristic of flower diameter of Tagetes L.as an example,this study aimed to select example varieties used in the DUS Test Guideline of Tagetes L.[Method] Two continuous years of measurements of flower diameter of 25 varieties were collected and then analyzed by using the box plot to illustrate the uniformity and stability of flower diameter of each variety.[Result] According to the information of variability,distribution symmetry of measurements and outliers of flower diameter of varieties provided by box plots,variety 16,2 and 4 were selected as the example varieties for the three expression states with respective flower diameter of 3.0-4.4,6.0-7.4 and 9.0-10.4 cm.[Conclusion] The box plot is an efficient method for the general analysis of varieties,which provides information covering the actual and possible expression range,median and outliers of measurements of flower diameter of each variety.It also provides references for selecting example varieties for other quantitative characteristics and evaluating the quality of varieties. 展开更多
关键词 DUS Test Guideline of Tagetes L. Quantitative characteristic example variety The box plot
下载PDF
基于语料库的学习者例证词“for example”对比研究 被引量:1
10
作者 郭书彩 李娜 徐瑞华 《河北大学学报(哲学社会科学版)》 CSSCI 北大核心 2015年第1期103-108,160,共6页
基于英美大学生作文语料库(LOCNESS)和中国英语学习者语料库(CLEC)调查中国英语学习者在写作中使用例证词"for example"的特点,研究发现,中国英语学习者无论在使用频数还是在用法上都具有明显区别于本族语者的特征。
关键词 语料库 例证词 for example LOCNESS CLEC
下载PDF
Auto-expanded multi query examples technology in content-based image retrieval 被引量:1
11
作者 王小玲 谢康林 《Journal of Southeast University(English Edition)》 EI CAS 2005年第3期287-292,共6页
In order to narrow the semantic gap existing in content-based image retrieval (CBIR),a novel retrieval technology called auto-extended multi query examples (AMQE) is proposed.It expands the single one query image ... In order to narrow the semantic gap existing in content-based image retrieval (CBIR),a novel retrieval technology called auto-extended multi query examples (AMQE) is proposed.It expands the single one query image used in traditional image retrieval into multi query examples so as to include more image features related with semantics.Retrieving images for each of the multi query examples and integrating the retrieval results,more relevant images can be obtained.The property of the recall-precision curve of a general retrieval algorithm and the K-means clustering method are used to realize the expansion according to the distance of image features of the initially retrieved images.The experimental results demonstrate that the AMQE technology can greatly improve the recall and precision of the original algorithms. 展开更多
关键词 content-based image retrieval SEMANTIC multi query examples K-means clustering
下载PDF
Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection
12
作者 Chengsheng Yuan Baojie Cui +2 位作者 Zhili Zhou Xinting Li Qingming Jonathan Wu 《Computers, Materials & Continua》 SCIE EI 2024年第1期899-914,共16页
In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable performance.However,recent studies have shown that these deep fake fingerprint de... In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable performance.However,recent studies have shown that these deep fake fingerprint detection(DFFD)models are not resistant to attacks by adversarial examples,which are generated by the introduction of subtle perturbations in the fingerprint image,allowing the model to make fake judgments.Most of the existing adversarial example generation methods are based on gradient optimization,which is easy to fall into local optimal,resulting in poor transferability of adversarial attacks.In addition,the perturbation added to the blank area of the fingerprint image is easily perceived by the human eye,leading to poor visual quality.In response to the above challenges,this paper proposes a novel adversarial attack method based on local adaptive gradient variance for DFFD.The ridge texture area within the fingerprint image has been identified and designated as the region for perturbation generation.Subsequently,the images are fed into the targeted white-box model,and the gradient direction is optimized to compute gradient variance.Additionally,an adaptive parameter search method is proposed using stochastic gradient ascent to explore the parameter values during adversarial example generation,aiming to maximize adversarial attack performance.Experimental results on two publicly available fingerprint datasets show that ourmethod achieves higher attack transferability and robustness than existing methods,and the perturbation is harder to perceive. 展开更多
关键词 FLD adversarial attacks adversarial examples gradient optimization transferability
下载PDF
A Novel Optimization Scheme for Named Entity Recognition with Pre-trained Language Models
13
作者 Shuanglong Li Xulong Zhang Jianzong Wang 《Journal of Electronic Research and Application》 2024年第5期125-133,共9页
Named Entity Recognition(NER)is crucial for extracting structured information from text.While traditional methods rely on rules,Conditional Random Fields(CRFs),or deep learning,the advent of large-scale Pre-trained La... Named Entity Recognition(NER)is crucial for extracting structured information from text.While traditional methods rely on rules,Conditional Random Fields(CRFs),or deep learning,the advent of large-scale Pre-trained Language Models(PLMs)offers new possibilities.PLMs excel at contextual learning,potentially simplifying many natural language processing tasks.However,their application to NER remains underexplored.This paper investigates leveraging the GPT-3 PLM for NER without fine-tuning.We propose a novel scheme that utilizes carefully crafted templates and context examples selected based on semantic similarity.Our experimental results demonstrate the feasibility of this approach,suggesting a promising direction for harnessing PLMs in NER. 展开更多
关键词 GPT-3 Named Entity Recognition Sentence-BERT model In-context example
下载PDF
Comparative Studies between Picard’s and Taylor’s Methods of Numerical Solutions of First Ordinary Order Differential Equations Arising from Real-Life Problems
14
作者 Khalid Abd Elrazig Awad Alla Elnour 《Journal of Applied Mathematics and Physics》 2024年第3期877-896,共20页
To solve the first-order differential equation derived from the problem of a free-falling object and the problem arising from Newton’s law of cooling, the study compares the numerical solutions obtained from Picard’... To solve the first-order differential equation derived from the problem of a free-falling object and the problem arising from Newton’s law of cooling, the study compares the numerical solutions obtained from Picard’s and Taylor’s series methods. We have carried out a descriptive analysis using the MATLAB software. Picard’s and Taylor’s techniques for deriving numerical solutions are both strong mathematical instruments that behave similarly. All first-order differential equations in standard form that have a constant function on the right-hand side share this similarity. As a result, we can conclude that Taylor’s approach is simpler to use, more effective, and more accurate. We will contrast Rung Kutta and Taylor’s methods in more detail in the following section. 展开更多
关键词 First-Order Differential Equations Picard Method Taylor Series Method Numerical Solutions Numerical examples MATLAB Software
下载PDF
Exploration and Research on the Category Management for the Chain Retail Enterprises: Taking Jiajiayue as Example
15
作者 Shan Zhao 《International Journal of Technology Management》 2016年第2期45-47,共3页
In this paper, we conduct research on the category management for chain retail enterprises while taking Jiajiayue as the example. Category management theory research has more than ten years history, its core has been ... In this paper, we conduct research on the category management for chain retail enterprises while taking Jiajiayue as the example. Category management theory research has more than ten years history, its core has been basically mature theory. The future study of category management focuses more on how to make the category management theory and be combined closely with the enterprise actual and pays more attention to the effect of the implementation and effect. Implementing category management investment return period is how to curve and how to evaluate the effect of the category management. The supermarket of the category management innovation is a huge project without a reasonable and predictable return that will be conducive to category management decision-making is unfavorable to the supermarket profits change after the implementation of category management right evaluation. Under this background, we propose our novel perspective on the corresponding issues to form the better theoretical analysis on the issues that is meaningful. 展开更多
关键词 EXPLORATION Category Management Chain Retail Enterprises Jiajiayue example.
下载PDF
气象观测场在汽车试验场中的应用研究
16
作者 陈海建 《时代汽车》 2024年第14期172-174,178,共4页
汽车试验场作为汽车开展道路测试的重要场所,用于验证汽车产品的品质以及可靠性。除了场地道路外,气象条件作为汽车道路测试的重要一环,在《GB/T12534-1990汽车道路试验方法通则》中也有明确要求,如:试验时应是无雨无雾天气,相对湿度小... 汽车试验场作为汽车开展道路测试的重要场所,用于验证汽车产品的品质以及可靠性。除了场地道路外,气象条件作为汽车道路测试的重要一环,在《GB/T12534-1990汽车道路试验方法通则》中也有明确要求,如:试验时应是无雨无雾天气,相对湿度小于95%,气温0-40℃,风速不大于3m/s。同时气象条件也作为试验场道路管控的重要依据,实时风速、雨量、能见度等信息为场地管理者发布限速、限行、封场等通知提供必要参考依据,直接影响道路测试安全管控的及时性。因此,文章从气象观测场的建设、气象服务、异常天气道路管控等方面开展气象观测场在汽车试验场中的应用研究。 展开更多
关键词 汽车试验场 气象服务 道路管控 products. In addition to the SITE roads METEOROLOGICAL conditions are an important part of AUTOMOTIVE ROAD testing and there are also clear requirements in the GB/T12534-1990 General Rules for AUTOMOTIVE ROAD Test Methods. For example the test should be conducted in rain and fog free weather with a relative humidity of less than 95% a temperature of 0-40 and a wind SPEED of no more than 3m/s. At the same time METEOROLOGICAL conditions also serve as an important basis for ROAD control in the test site. Real time information such as wind SPEED rainfall and visibility provides necessary reference for SITE managers to issue notices on SPEED limits SITE closures and traffic restrictions directly affecting the timeliness of ROAD testing safety control. Therefore this article conducts research on the application of METEOROLOGICAL observation SITES in AUTOMOTIVE testing SITES from the construction of METEOROLOGICAL observation SITES METEOROLOGICAL services and abnormal weather ROAD control.
下载PDF
A New Example of Retrograde Solubility Model for Carbonate Rocks 被引量:2
17
作者 LIU Lihong WANG Chunlian +1 位作者 WANG Daming WANG Haida 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2017年第3期1145-1146,共2页
Objective The dissolution and precipitation of carbonate during burial diagenetic process controls the reservoir property in deep buried strata. The geological process related with it has become a research focus durin... Objective The dissolution and precipitation of carbonate during burial diagenetic process controls the reservoir property in deep buried strata. The geological process related with it has become a research focus during recent years. The most important dissolution fluids to carbonates are probably H2S and CO2 as byproducts of sulfate reduction in deep-buried setting with sulfate minerals, but carbonates are more soluble in relatively low temperature, which is the so-called retrograde solubility. Several geological processes can result in the decrease of temperature, including the upward migration of thermal fluids and tectonic uplift. 展开更多
关键词 of on with WELL A New example of Retrograde Solubility Model for Carbonate Rocks for
下载PDF
Digital image inpainting by example-based image synthesis method 被引量:1
18
作者 聂栋栋 Ma Lizhuang Xiao Shuangjiu 《High Technology Letters》 EI CAS 2006年第3期276-282,共7页
A simple and effective image inpainting method is proposed in this paper, which is proved to be suitable for different kinds of target regions with shapes from little scraps to large unseemly objects in a wide range o... A simple and effective image inpainting method is proposed in this paper, which is proved to be suitable for different kinds of target regions with shapes from little scraps to large unseemly objects in a wide range of images. It is an important improvement upon the traditional image inpainting techniques. By introducing a new bijeetive-mapping term into the matching cost function, the artificial repetition problem in the final inpainting image is practically solved. In addition, by adopting an inpainting error map, not only the target pixels are refined gradually during the inpainting process but also the overlapped target patches are combined more seamlessly than previous method. Finally, the inpainting time is dramatically decreased by using a new acceleration method in the matching process. 展开更多
关键词 INPAINTING image synthesis texture synthesis prority matching cost function example patch isophote DIFFUSION
下载PDF
Characteristics of Authigenic Pyrite and its Sulfur Isotopes Influenced by Methane Seep--Taking the Core A at Site 79 of the Middle Okinawa Trough as an Example 被引量:1
19
作者 WANG Meng LI Qing +7 位作者 CAI Feng LIANG Jie YAN Guijing DONG Gang WANG Feng SHAO Hebin LUO Di CAO Yimin 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2017年第1期365-366,共2页
Objective Authigenic pyrite often develops extensively in marine sediments,which is an important product of sulfate reduction in an anoxic environment.It has a specific appearance and complicated sulfur isotopic prope... Objective Authigenic pyrite often develops extensively in marine sediments,which is an important product of sulfate reduction in an anoxic environment.It has a specific appearance and complicated sulfur isotopic properties,and acts as important evidence of methane seep in marine sediments.Strong AOM(anaerobic oxidation of methane)activity has developed in the Okinawa Trough. 展开更多
关键词 AOM Characteristics of Authigenic Pyrite and its Sulfur Isotopes Influenced by Methane Seep Taking the Core A at Site 79 of the Middle Okinawa Trough as an example
下载PDF
Patterns of Clay Minerals Transformation in Clay Gouge, with Examples from Revers Fault Rocks in Devonina Niqiuhe Formation in The Dayangshu Basin 被引量:2
20
作者 MENG Jie LI Benxian +1 位作者 ZHANG Juncheng LIU Xiaoyang 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2017年第S1期59-60,共2页
The role of authigenic clay growth in clay gouge is increasingly recognized as a key to understanding the mechanics of berittle faulting and fault zone processes,including creep and seismogenesis,and providing new ins... The role of authigenic clay growth in clay gouge is increasingly recognized as a key to understanding the mechanics of berittle faulting and fault zone processes,including creep and seismogenesis,and providing new insights into the ongoing debate about the frictional strength of brittle fault(Haines and van der Pluijm,2012).However,neither the conditions nor the processes which 展开更多
关键词 with examples from Revers Fault Rocks in Devonina Niqiuhe Formation in The Dayangshu Basin Patterns of Clay Minerals Transformation in Clay Gouge
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部