咨询与建议

限定检索结果

文献类型

  • 165 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 104 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 22 篇 电气工程
    • 21 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 8 篇 安全科学与工程
    • 8 篇 网络空间安全
    • 7 篇 交通运输工程
    • 5 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 电子科学与技术(可...
    • 1 篇 光学工程
  • 19 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 16 篇 理学
    • 11 篇 数学
    • 6 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 4 篇 化学
    • 2 篇 系统科学
    • 1 篇 生物学
  • 5 篇 法学
    • 4 篇 法学
    • 1 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 35 篇 big data
  • 27 篇 security
  • 20 篇 cloud computing
  • 14 篇 privacy
  • 13 篇 cloud security
  • 11 篇 machine learning
  • 9 篇 encryption
  • 8 篇 network security
  • 7 篇 data privacy
  • 6 篇 cloud
  • 6 篇 training
  • 5 篇 deep learning
  • 5 篇 anomaly detectio...
  • 5 篇 predictive model...
  • 5 篇 costs
  • 5 篇 edge computing
  • 5 篇 data models
  • 4 篇 data security
  • 4 篇 resource managem...
  • 4 篇 data analytics

机构

  • 5 篇 peking universit...
  • 4 篇 state grid wenzh...
  • 4 篇 hangzhou sinuoka...
  • 3 篇 nanjing universi...
  • 3 篇 big data center ...
  • 3 篇 state grid zhous...
  • 3 篇 state grid jiang...
  • 3 篇 purdue univ dept...
  • 2 篇 univ maryland ba...
  • 2 篇 state grid shang...
  • 2 篇 ibm watson hlth ...
  • 2 篇 national enginee...
  • 2 篇 adhiparasakthi e...
  • 2 篇 texas tech univ ...
  • 2 篇 data information...
  • 2 篇 air force res la...
  • 2 篇 china south-to-n...
  • 2 篇 huaneng zhalaite...
  • 2 篇 texas tech univ ...
  • 2 篇 huaneng renewabl...

作者

  • 5 篇 wenhui hu
  • 5 篇 shuyi li
  • 4 篇 xueyang liu
  • 4 篇 hu wenhui
  • 4 篇 bhargava bharat
  • 4 篇 chen yang
  • 3 篇 xu xiaolong
  • 3 篇 coffman joel
  • 3 篇 liu xueyang
  • 3 篇 he jinling
  • 3 篇 li shuyi
  • 2 篇 xu ranyue
  • 2 篇 jun xu
  • 2 篇 zhao jinbo
  • 2 篇 azarmi mehdi
  • 2 篇 wei yu
  • 2 篇 beihu wu
  • 2 篇 tangyan
  • 2 篇 singhal mukesh
  • 2 篇 yang yang

语言

  • 160 篇 英文
  • 6 篇 其他
检索条件"任意字段=10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024"
166 条 记 录,以下是1-10 订阅
排序:
Proceedings - 2024 ieee 10th conference on big data security on cloud, bigdatasecurity 2024
Proceedings - 2024 IEEE 10th Conference on Big Data Security...
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
the proceedings contain 30 papers. the topics discussed include: a low-cost positioning beacon in rail transit system;user dual intents graph modeling for information diffusion prediction;precision assistance for resi...
来源: 评论
Proceedings - 15th ieee International conference on Trust, security and Privacy in Computing and Communications, 10th ieee International conference on big data Science and Engineering and 14th ieee International Symposium on Parallel and Distributed Processing with Applications, ieee TrustCom/bigdataSE/ISPA 2016
Proceedings - 15th IEEE International Conference on Trust, S...
收藏 引用
Joint 15th ieee International conference on Trust, security and Privacy in Computing and Communications, 10th ieee International conference on big data Science and Engineering and 14th ieee International Symposium on Parallel and Distributed Processing with Applications, ieee TrustCom/bigdataSE/ISPA 2016
the proceedings contain 311 papers. the topics discussed include: a robust image hashing with enhanced randomness by using random walk on zigzag blocking;securing fast learning! ridge regression over encrypted big dat...
来源: 评论
An Education Program for big data security and Privacy  10
An Education Program for Big Data Security and Privacy
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
作者: thuraisingham, Bhavani Nimon, Kim Khan, Latifur The University of Texas Dallas United States The University of Texas Tyler United States
this paper describes the course that we developed at the University of Texas at Dallas on big data security and Privacy with funding from the National Science Foundation. the project started in 2017 and was completed ... 详细信息
来源: 评论
A Distributed Attribute-Based Proxy Re-Encryption Scheme for data Sharing in IoT  10
A Distributed Attribute-Based Proxy Re-Encryption Scheme for...
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
作者: Li, Shizhong Zhang, Wei Chen, Ruonan Li, Dawei Beihang University School of Cyber Science and Technology Beijing China Ministry of Industry and Information Technology of the People's Republic of China Industry Development and Promotion Center China
Attribute-based encryption (ABE) offers finegrained access control in the Internet of things but also imposes significant performance overhead on devices. Attribute-based proxy re-encryption (AB-PRE) serves as an eleg... 详细信息
来源: 评论
A Method for Anomaly Detection in Power Time Series data within Energy big data Based on Generative Adversarial Networks  10
A Method for Anomaly Detection in Power Time Series Data wit...
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
作者: Jiang, Chen Chen, Mengxian Xie, Huasen Wang, Hua Xu, Jun State Grid Wenzhou Electric Power Supply Company of Zhejiang Power Corporation Wenzhou China Hangzhou Sinuokai Technology Co. Ltd. Hangzhou China
Anomaly detection in power time series data plays a crucial role in ensuring the stability and security of energy systems. In this study, a novel approach based on Generative Adversarial Networks (GANs) is proposed to... 详细信息
来源: 评论
Research on Production Capacity Utilization Index Based on Electricity big data  10
Research on Production Capacity Utilization Index Based on E...
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
作者: Zhang, Mengyuan Zhao, Yingying Tian, Yingjie State Grid Shanghai Electric Power Research Institute Shanghai200437 China State Grid Shanghai Electric Power Research Institute Another Department Shanghai200437 China
this study investigates the capacity utilization index in Shandong Province's industrial sector by leveraging multisource electricity data and external data to align with national socioeconomic priorities and the ... 详细信息
来源: 评论
OT24:Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutation  10
OT24:Optical color image encryption based on Two-dimensional...
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
作者: Cui, Guohao Wang, Hao Hao, Wentao Zhou, Xiaoyi Hainan University School of Cyberspace Security Haikou China
the Double Random Phase Encoding(DRPE) image encryption scheme has received a lot of attention when processing color images because it can encrypt R, G, and B components in parallel, in the era of big data. However, t... 详细信息
来源: 评论
A Dance Emotion Recognition Method Based on Movement Analysis and Federated Learning in Edge-cloud Hybrid Environments  10
A Dance Emotion Recognition Method Based on Movement Analysi...
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
作者: Yang, Xinyi Li, Kaipei Tian, Jie Jishou University School of Music and Dance Jishou China Jishou University School of Computer Science and Engineering Jishou China
With the development of dance diversity, substantial volumes of big data associated with dance movements have been produced, predominantly in the form of videos and images. Dance uses movements to convey emotions, whi... 详细信息
来源: 评论
Test Case Recommendation for Blockchain Systems Based on Graph Convolutional Networks  10
Test Case Recommendation for Blockchain Systems Based on Gra...
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
作者: Li, Shuyi Zhang, Pengyu Liu, Xueyang Hu, Wenhui Peking University School of Software & Microelectronics Beijing China Big data center State Grid Corporation of China Beijing China Peking University National Engineering Research Center for Software Engineering Beijing China
In the development and operation of blockchain systems, the evaluation of these systems typically necessitates the formulation and execution of test cases. Current testing practices for blockchain systems often involv... 详细信息
来源: 评论
Precision Assistance for Residents with Subsistence Allowance: Cluster Analysis of Mixed-Type data Based on K-Prototypes  10
Precision Assistance for Residents with Subsistence Allowanc...
收藏 引用
10th ieee conference on big data security on cloud, bigdatasecurity 2024
作者: Jing, Fangming Yang, Chen Li, Shuyi Liu, Xueyang Hu, Wenhui Information Center The Ministry of Civil Affairs of the People's Republic of China Beijing China Peking University Beijing China
this paper presents an empirical investigation into the refinement of precision assistance methodologies designed to benefit individuals receiving subsistence allowances. the central objective is to leverage advanced ... 详细信息
来源: 评论