咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 46 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 37 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 6 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 安全科学与工程
  • 18 篇 理学
    • 17 篇 数学
    • 1 篇 物理学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 军事学

主题

  • 5 篇 privacy
  • 3 篇 iot
  • 3 篇 differential pri...
  • 2 篇 smpc
  • 2 篇 attacks
  • 2 篇 security
  • 1 篇 internet of thin...
  • 1 篇 log obfuscation
  • 1 篇 conditional gan
  • 1 篇 hijacking
  • 1 篇 policy language
  • 1 篇 web tracking
  • 1 篇 access control
  • 1 篇 human behavior
  • 1 篇 homomorphic encr...
  • 1 篇 data privacy
  • 1 篇 mobile devices
  • 1 篇 privacy leakage
  • 1 篇 tags
  • 1 篇 deep learning se...

机构

  • 2 篇 north carolina s...
  • 2 篇 rhein westfal th...
  • 1 篇 florida int univ...
  • 1 篇 penn state univ ...
  • 1 篇 univ tokyo bunky...
  • 1 篇 univ coimbra cis...
  • 1 篇 centre for advan...
  • 1 篇 shenzhen huazhon...
  • 1 篇 hunan automobile...
  • 1 篇 chinese acad sci...
  • 1 篇 inria le chesnay
  • 1 篇 zhejiang key lab...
  • 1 篇 shandong univers...
  • 1 篇 penn state univ ...
  • 1 篇 natl univ singap...
  • 1 篇 ericsson secur r...
  • 1 篇 computer science...
  • 1 篇 nanyang technolo...
  • 1 篇 school of comput...
  • 1 篇 florida polytech...

作者

  • 2 篇 klinger andreas
  • 2 篇 meyer ulrike
  • 2 篇 chen bo
  • 2 篇 liu peng
  • 1 篇 atsley ryan she
  • 1 篇 wu dinghao
  • 1 篇 xia luning
  • 1 篇 gupta maanak
  • 1 篇 li jiahao
  • 1 篇 onen melek
  • 1 篇 he ruhan
  • 1 篇 alcantara nathan...
  • 1 篇 mcdaniel patrick
  • 1 篇 faith ayodele
  • 1 篇 luo xiaonan
  • 1 篇 mannan mohammad
  • 1 篇 saji nobuyuki
  • 1 篇 ghazali kamarul ...
  • 1 篇 shen yanjin
  • 1 篇 carlsson niklas

语言

  • 44 篇 英文
  • 2 篇 其他
检索条件"任意字段=13th ACM Conference on Data and Application Security and Privacy, CODASPY 2023"
46 条 记 录,以下是31-40 订阅
排序:
Architecture of Integrated Resource System Based on dataspace  1
收藏 引用
13th International conference on Computer Engineering and Networks, CENet 2023
作者: Yan, Hui Chen, Bo China Telecom Research Institute Beijing China China University of Political Science and Law Beijing China
At present, there are some urgent problems in the process of data element circulation, which hinder the marketization process of data elements and block the circulation channel of data elements. It includes the diffic... 详细信息
来源: 评论
13th EAI International conference on Digital Forensics and Cyber Crime, ICDF2C 2022
13th EAI International Conference on Digital Forensics and C...
收藏 引用
13th EAI International conference on Digital Forensics and Cyber Crime, ICDF2C 2022
the proceedings contain 28 papers. the special focus in this conference is on Digital Forensics and Cyber Crime. the topics include: Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? –...
来源: 评论
Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning  37
Poisoning with Cerberus: Stealthy and Colluded Backdoor Atta...
收藏 引用
37th AAAI conference on Artificial Intelligence (AAAI) / 35th conference on Innovative applications of Artificial Intelligence / 13th Symposium on Educational Advances in Artificial Intelligence
作者: Lyu, Xiaoting Han, Yufei Wang, Wei Liu, Jingkai Wang, Bin Liu, Jiqiang Zhang, Xiangliang Beijing Jiaotong Univ Beijing Key Lab Secur & Privacy Intelligent Trans Beijing Peoples R China INRIA Le Chesnay France Zhejiang Key Lab Multi Dimens Percept Technol App Beijing Peoples R China Univ Notre Dame Notre Dame IN USA
Are Federated Learning (FL) systems free from backdoor poisoning with the arsenal of various defense strategies deployed? this is an intriguing problem with significant practical implications regarding the utility of ... 详细信息
来源: 评论
Securing RFID-Based Attendance Management Systems: An Implementation of the AES Block Cipher Algorithm
Securing RFID-Based Attendance Management Systems: An Implem...
收藏 引用
IEEE International conference on RFID-Technology and applications (RFID-TA)
作者: Faith Ayodele Harsehaj Singh Eslam G. AbdAllah Information Systems Security and Assurance Management (ISSAM) Concordia University of Edmonton Edmonton Alberta Canada
the main feature of Radio Frequency IDentification (RFID) technology is its ability to locate, track and monitor people or objects. RFID Architecture consists of two significant components: a tag and a reader. RFID is...
来源: 评论
the application of Artificial Intelligence Technology in Personalized Teaching of Vocational Education
The Application of Artificial Intelligence Technology in Per...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Shen Yanjin Liu Qian Zhang Kun Zou Ruirui Science and Technology Department Hunan Automobile Engineering Vocational College Zhuzhou City Hunan Province China
this paper aims to explore the development trends of artificial intelligence (AI) technology in personalized teaching within vocational education. the research findings indicate that AI technology can meet students...
来源: 评论
CREHMA: Cache-aware REST-ful HTTP Message Authentication  20
CREHMA: Cache-aware REST-ful HTTP Message Authentication
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Hoai Viet Nguyen Lo Iacono, Luigi Cologne Univ Appl Sci Cologne Germany
Scalability and security are two important elements of contemporary distributed software systems. the Web vividly shows that while complying with the constraints defined by the architectural style REST, the layered de... 详细信息
来源: 评论
A Hypothesis Testing Approach to Sharing Logs with Confidence  20
A Hypothesis Testing Approach to Sharing Logs with Confidenc...
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Long, Yunhui Xu, Le Gunter, Carl A. Univ Illinois Urbana IL 61801 USA
Logs generated by systems and applications contain a wide variety of heterogeneous information that is important for performance profiling, failure detection, and security analysis. there is a strong need for sharing ... 详细信息
来源: 评论
Explore the Transformation Space for Adversarial Images  20
Explore the Transformation Space for Adversarial Images
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Chen, Jiyu Wang, David Chen, Hao Univ Calif Davis Davis CA 95616 USA Vestavia Hills High Sch Vestavia Hills AL USA
Deep learning models are vulnerable to adversarial examples. Most of current adversarial attacks add pixel-wise perturbations restricted to some L-p -norm, and defense models are evaluated also on adversarial examples... 详细信息
来源: 评论
CURIE: Policy-based Secure data Exchange  19
CURIE: Policy-based Secure Data Exchange
收藏 引用
9th acm conference on data and application security and privacy (codaspy)
作者: Celik, Z. Berkay Acar, Abbas Aksu, Hidayet Atsley, Ryan She McDaniel, Patrick Uluagac, A. Selcuk Penn State Univ Dept CSE SIIS Lab University Pk PA 16802 USA Florida Int Univ Dept ECE CPS Secur Lab Miami FL 33199 USA
data sharing among partners-users, companies, organizations-is crucial for the advancement of collaborative machine learning in many domains such as healthcare, finance, and security. Sharing through secure computatio... 详细信息
来源: 评论
Large Scale PoC Experiment with 57,000 people to Accumulate Patterns for Lifestyle Authentication  19
Large Scale PoC Experiment with 57,000 people to Accumulate ...
收藏 引用
9th acm conference on data and application security and privacy (codaspy)
作者: Kobayashi, Ryosuke Saji, Nobuyuki Shigeta, Nobuo Yamaguchi, Rie Shigetomi Mitsubishi Elect Informat Syst Corp Minato Ku 4-13-23 Shibaura Tokyo 1080023 Japan INFOCORPUS Inc Meguro Ku 3-5-1 Shimomeguro Tokyo 1530064 Japan Univ Tokyo Bunkyo Ku 7-3-1 Hongo Tokyo 1138656 Japan
the spread of ICT has made it possible for people to use various online services via the Internet. User authentication technique is important for using online services in order to confirm that the user is legitimate. ... 详细信息
来源: 评论