咨询与建议

限定检索结果

文献类型

  • 54 篇 会议

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 49 篇 计算机科学与技术...
    • 24 篇 信息与通信工程
    • 10 篇 软件工程
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 仪器科学与技术
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 11 篇 privacy
  • 5 篇 security
  • 4 篇 internet of thin...
  • 4 篇 blockchain
  • 3 篇 intel sgx
  • 3 篇 iot
  • 3 篇 differential pri...
  • 3 篇 machine learning
  • 2 篇 data confidentia...
  • 2 篇 data privacy
  • 2 篇 user privacy
  • 2 篇 attacks
  • 2 篇 vulnerability
  • 2 篇 trust management
  • 2 篇 federated learni...
  • 1 篇 cloud computing:...
  • 1 篇 cyber attacks
  • 1 篇 ethereum
  • 1 篇 threats
  • 1 篇 smart homes

机构

  • 2 篇 univ coimbra cis...
  • 2 篇 univ neuchatel n...
  • 1 篇 north carolina s...
  • 1 篇 state grid jiang...
  • 1 篇 montclair state ...
  • 1 篇 promotion founda...
  • 1 篇 univ porto cisuc...
  • 1 篇 stevens inst tec...
  • 1 篇 university of ma...
  • 1 篇 colroado sch min...
  • 1 篇 university of te...
  • 1 篇 univ fed campina...
  • 1 篇 inesc tec porto
  • 1 篇 nashua high scho...
  • 1 篇 iit roorkee utta...
  • 1 篇 north carolina s...
  • 1 篇 univ houston hou...
  • 1 篇 nashua high scho...
  • 1 篇 indian inst tech...
  • 1 篇 university of lu...

作者

  • 2 篇 cunha mariana
  • 2 篇 felber pascal
  • 2 篇 vilela joao p.
  • 2 篇 mendes ricardo
  • 2 篇 huang xiuli
  • 2 篇 sural shamik
  • 1 篇 franzen fabian
  • 1 篇 debasish jena
  • 1 篇 le traon yves
  • 1 篇 satvat kiavash
  • 1 篇 wang liming
  • 1 篇 duarte guilherme
  • 1 篇 gupta peeyush
  • 1 篇 huh young
  • 1 篇 brito andrey
  • 1 篇 rani p. jhansi
  • 1 篇 zhang tong
  • 1 篇 murynets ilona
  • 1 篇 tsankov petar
  • 1 篇 kalkan kubra

语言

  • 53 篇 英文
  • 1 篇 德文
检索条件"任意字段=10th ACM Conference on Data and Application Security and Privacy, CODASPY 2020"
54 条 记 录,以下是1-10 订阅
排序:
IoTFuzzSentry: Hunting Bugs In the IoT Wilderness In Operational Phase Using Payload Fuzzing  24
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operati...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Chaudhary, Priyanka Rushikesh Krishna, N. Pranav Maiti, Rajib Ranjan BITS Pilani Hyderabad Campus Secunderabad India
In the operational phase, an IoT device runs a light-weight server that is responsible for responding to the user queries, like accessing video and taking a snap in a IoT camera. the flaws in the implementation of cer... 详细信息
来源: 评论
Privkit: A Toolkit of privacy-Preserving Mechanisms for Heterogeneous data Types  24
Privkit: A Toolkit of Privacy-Preserving Mechanisms for Hete...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Cunha, Mariana Duarte, Guilherme Andrade, Ricardo Mendes, Ricardo Vilela, Joao P. Univ Porto CISUC CRACS INESC TEC Porto Portugal Univ Porto Dept Comp Sci Porto Portugal Univ Coimbra CISUC Coimbra Portugal Univ Coimbra Dept Informat Engn Coimbra Portugal
With the massive data collection from different devices, spanning from mobile devices to all sorts of IoT devices, protecting the privacy of users is a fundamental concern. In order to prevent unwanted disclosures, se... 详细信息
来源: 评论
Towards Accurate and Stronger Local Differential privacy for Federated Learning with Staircase Randomized Response  24
Towards Accurate and Stronger Local Differential Privacy for...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Varun, Matta Feng, Shuya Wang, Han Sural, Shamik Hong, Yuan Indian Inst Technol Kharagpur India Univ Connecticut Storrs CT USA Univ Kansas Lawrence KS USA
Federated Learning (FL), a privacy-preserving training approach, has proven to be effective, yet its vulnerability to attacks that extract information from model weights is widely recognized. To address such privacy c... 详细信息
来源: 评论
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux  23
Infotainment System Matters: Understanding the Impact and Im...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Jeong, Seonghoon Ryu, Minsoo Kang, Hyunjae Kim, Huy Kang Korea Univ Sch Cybersecur Seoul South Korea
An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything communications. An IVI system has control... 详细信息
来源: 评论
Precision Guided Approach to Mitigate data Poisoning Attacks in Federated Learning  24
Precision Guided Approach to Mitigate Data Poisoning Attacks...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Kumar, K. Naveen Mohan, C. Krishna Machiry, Aravind Indian Inst Technol Comp Sci & Engn Hyderabad India Purdue Univ Elect & Comp Engn Wesy Lafayatte IN USA
Federated Learning (FL) is a collaborative learning paradigm enabling participants to collectively train a shared machine learning model while preserving the privacy of their sensitive data. Nevertheless, the inherent... 详细信息
来源: 评论
Velocity-Aware Geo-Indistinguishability  23
Velocity-Aware Geo-Indistinguishability
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Mendes, Ricardo Cunha, Mariana Vilela, Joao P. Univ Coimbra CISUC Coimbra Portugal Univ Coimbra Dept Informat Coimbra Portugal Univ Porto Fac Ciencias CISUC CRACS INESCTEC Rua Campo Alegre S-N P-4169007 Porto Portugal Univ Porto Fac Ciencias Dept Ciencia Comp Rua Campo Alegre S-N P-4169007 Porto Portugal
Location privacy-Preserving Mechanisms (LPPMs) have been proposed to mitigate the risks of privacy disclosure yielded from location sharing. However, due to the nature of this type of data, spatio-temporal correlation... 详细信息
来源: 评论
Tool/dataset Paper: Realistic ABAC data Generation using Conditional Tabular GAN  23
Tool/Dataset Paper: Realistic ABAC Data Generation using Con...
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Rai, Ritwik Sural, Shamik Indian Inst Technol Kharagpur Kharagpur W Bengal India
Attribute-based Access Control (ABAC) is increasingly being used in a wide variety of applications that include cloud services, IoT, smart homes, healthcare and several others. Conducting systematic and reproducible e... 详细信息
来源: 评论
Comparative privacy Analysis of Mobile Browsers  23
Comparative Privacy Analysis of Mobile Browsers
收藏 引用
13th acm conference on data and application security and privacy (codaspy)
作者: Zafar, Ahsan Das, Anupam North Carolina State Univ Raleigh NC 27695 USA
Online trackers are invasive as they track our digital footprints, many of which are sensitive in nature, and when aggregated over time, they can help infer intricate details about our lifestyles and habits. Although ... 详细信息
来源: 评论
security threats from Bitcoin Wallet Smartphone applications: Vulnerabilities, Attacks, and Countermeasures  21
Security Threats from Bitcoin Wallet Smartphone Applications...
收藏 引用
11th acm conference on data and application security and privacy (codaspy)
作者: Hu, Yiwen Wang, Sihan Tu, Guan-Hua Xiao, Li Xie, Tian Lei, Xinyu Li, Chi-Yu Michigan State Univ Dept Comp Sci & Engn E Lansing MI 48824 USA Natl Chiao Tung Univ Dept Comp Sci Hsinchu Taiwan
Nowadays, Bitcoin is the most popular cryptocurrency. With the proliferation of smartphones and the high-speed mobile Internet, more and more users have started accessing their Bitcoin wallets on their smartphones. Us... 详细信息
来源: 评论
Developing A Compelling Vision for Winning the Cybersecurity Arms Race  20
Developing A Compelling Vision for Winning the Cybersecurity...
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Bertino, Elisa Singhal, Anoop Srinivasagopalan, Srivathsan Verma, Rakesh Purdue Univ W Lafayette IN 47907 USA NIST Gaithersburg MD 20899 USA AT&T Cybersecur Austin TX USA Univ Houston Houston TX USA
In cybersecurity there is a continuous arms race between the attackers and the defenders. In this panel, we investigate three key questions regarding this arms race. First question is whether this arms race is winnabl... 详细信息
来源: 评论