adversaries

听听怎么读
[ˈædvəsəriz]
是什么意思
  • n.

    对手,敌手( adversary的名词复数 );

  • 双语释义

    n.(名词)
    1. [C]敌手,对手 a person that sb is opposed to and competing with in an argument or a battle; an enemy or opponent

    英英释义

    adversary

    • n.someone who offers opposition

      同义词:antagonistopponentopposerresister

    学习怎么用

    词汇搭配

    用作名词 (n.)
    形容词+~
    • crafty adversary狡猾的对手
    • dangerous adversary危险的对手
    • daunting adversary令人望而生畏的对手
    • fierce adversary凶狠的对手
    • formidable adversary难对付的对手
    • hostile adversary怀有敌意的对手
    • imaginary adversary假想的对手
    • implacable adversary无情的对手
    • political -ries政敌
    • potential adversary潜在的对手
    • principal adversary主要对手
    • stubborn adversary难对付的对手
    • subtle adversary狡猾的对手
    • well matched adversary旗鼓相当的对手
    • wily adversary狡猾的对手
    • worthy adversary劲敌
    ~+名词
    • adversary inspection对方观察
    • adversary system当事人交锋的诉讼制度
    ~+介词
    • -ries in a war战争中的对手
    • adversary of sb某人的对手
    • adversary to sb某人的对手

    词组短语

    adversary system对抗制;抗辩制

    双语例句

    用作名词(n.)
    1. He set at his adversary in strong language.
      他以强硬的语言抨击他的敌手。
    2. You may have a hidden adversary who would love to prove you wrong.
      你可能有一个潜在的敌手,他时刻准备着与你作对。
    3. He was dismayed at the size of his adversary.
      对手的魁伟身材使他丧失了勇气。
    4. They continued to view it as their major adversary.
      他们继续把它看作主要的对手。

    权威例句

    ...Coding in the Presence of Byzantine Adversaries
    Resilient Network Coding in the Presence of Byzantine Adversaries
    Adversaries of Consumption: Consumer Movements, Activism, and Ideology
    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    Soundness of Formal Encryption in the Presence of Active Adversaries.
    Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    Useful Adversaries: Grand Strategy, Domestic Mobilization, and Sino-American Conflict, 1947–1958 by Thomas J. Christensen
    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    Completing the picture: soundness of formal encryption in the presence of active adversaries
    Soundness of Formal Encryption in the Presence of Active Adversaries