×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
厦门大学 [252]
山东大学 [153]
北京大学 [69]
清华大学 [59]
武汉大学 [59]
大连理工大学 [57]
更多...
内容类型
期刊论文 [829]
学位论文 [195]
会议论文 [164]
其他 [30]
SCI/SSCI论文 [2]
会议 [1]
更多...
发表日期
2021 [8]
2020 [17]
2019 [61]
2018 [74]
2017 [68]
2016 [111]
更多...
学科主题
Plant Sci... [11]
mathematic... [6]
Computer S... [5]
Physics [3]
Ecology [2]
Engineerin... [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共1221条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Divergence-Driven Consistency Training for Semi-Supervised Facial Age Estimation
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 卷号: 18, 页码: 221-232
作者:
Bao, Zenghao
;
Tan, Zichang
;
Wan, Jun
;
Ma, Xibo
;
Guo, Guodong
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2023/02/22
Facial age estimation
semi-supervised
efficient sample selection
identity consistency
Normalized solutions to p-Laplacian equations with combined nonlinearities
期刊论文
NONLINEARITY, 2022, 卷号: 35, 期号: 11, 页码: 5621-5663
作者:
Zhang, Zexin
;
Zhang, Zhitao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2023/02/07
normalized solutions
p-Laplacian equations
critical point
ground state
Pohozaev identity
Face swapping detection based on identity spatial constraints with weighted frequency division
期刊论文
MULTIMEDIA SYSTEMS, 2022, 页码: 14
作者:
Ai, Zupeng
;
Peng, Chengwei
;
Jiang, Jun
;
Li, Zekun
;
Li, Bing
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/11/14
Face swapping
Face manipulation
Frequency division
Identity constraints
Properties of the least action level, bifurcation phenomena and the existence of normalized solutions for a family of semi-linear elliptic equations without the hypothesis of autonomy
期刊论文
JOURNAL OF DIFFERENTIAL EQUATIONS, 2022, 卷号: 315, 页码: 179-199
作者:
Song, Linjie
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/04/02
Bifurcation
Normalized solutions
Nehari manifold
Pohozaev identity
Gender-specific impact of self-monitoring and social norm information on walking behavior among Chinese college students assessed using WeChat: Longitudinal tracking study
期刊论文
Journal of Medical Internet Research, 2021, 卷号: 23, 期号: 12, 页码: e29167
作者:
Yuepei Xu
;
Ling-Zi Yue
;
Wei Wang
;
Xiao-Ju Wu
;
Zhu-Yuan Liang
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/12/16
self-monitoring
social norm
group identity
mHealth
gender differences
mobile health
Spin nonclassicality via variance
期刊论文
THEORETICAL AND MATHEMATICAL PHYSICS, 2021, 卷号: 208, 期号: 1, 页码: 916-925
作者:
Zhang, Yue
;
Luo, Shunlong
收藏
  |  
浏览/下载:73/0
  |  
提交时间:2021/10/26
spin nonclassicality
spin coherent states
variance
convexity
resolution of identity
THE NUMBER OF POSITIVE SOLUTIONS TO THE BREZIS-NIRENBERG PROBLEM
期刊论文
TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY, 2021, 卷号: 374, 期号: 3, 页码: 1947-1985
作者:
Cao, Daomin
;
Luo, Peng
;
Peng, Shuangjie
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2021/04/26
Critical Sobolev exponent
local Pohozaev identity
existence of solutions
exact number of solutions
Green's function
Benefit distribution of collectively-owned operating construction land entering the market in rural China: A multiple principal-agent theory-based analysis
期刊论文
HABITAT INTERNATIONAL, 2021, 卷号: 109, 页码: 15
作者:
Yan, Lei
;
Hong, Kairong
;
Chen, Kunqiu
;
Li, Hui
;
Liao, Liuwen
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2021/06/10
Land institution reform
Urban-rural transformation development
Rural vitalization
Land-use efficiency
Principal identity of farmers
Multiple principal-agent theory
Modeling the rating of perceived exertion for young and middle-aged people in mainland China
期刊论文
MEDICINA DELLO SPORT, 2021, 卷号: 74
作者:
Zhao, Huanhuan
;
Xu, Yang
;
Wang, Yuan
;
Zhang, Xiaoyu
;
Ma, Zuchang
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2021/05/31
Exercise
Sports
Gender identity
Age factors
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
©版权所有 ©2017 CSpace - Powered by
CSpace