咨询与建议

限定检索结果

文献类型

  • 54 篇 会议

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46 篇 工学
    • 45 篇 计算机科学与技术...
    • 9 篇 信息与通信工程
    • 6 篇 软件工程
    • 2 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 31 篇 理学
    • 30 篇 数学
    • 1 篇 科学技术史(分学科...
    • 1 篇 统计学(可授理学、...
  • 3 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 8 篇 privacy
  • 6 篇 security
  • 4 篇 differential pri...
  • 4 篇 machine learning
  • 3 篇 data privacy
  • 3 篇 federated learni...
  • 2 篇 deep learning
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 cloud
  • 2 篇 urban sensing
  • 2 篇 web security
  • 2 篇 local differenti...
  • 2 篇 blockchain
  • 2 篇 data monitoring ...
  • 2 篇 testing
  • 2 篇 oauth
  • 2 篇 fpga
  • 1 篇 bug localization
  • 1 篇 distributed opti...

机构

  • 2 篇 cnr iit lucca
  • 2 篇 north carolina s...
  • 2 篇 univ molise camp...
  • 2 篇 imt sch adv stud...
  • 2 篇 cnr iit campobas...
  • 2 篇 cnr iit pisa
  • 2 篇 virginia tech de...
  • 1 篇 department of co...
  • 1 篇 univ porto cisuc...
  • 1 篇 univ bretagne su...
  • 1 篇 univ coimbra cis...
  • 1 篇 colroado sch min...
  • 1 篇 singapore inst t...
  • 1 篇 univ n carolina ...
  • 1 篇 georgia inst tec...
  • 1 篇 inesc tec porto
  • 1 篇 ericsson secur r...
  • 1 篇 ecole polytech f...
  • 1 篇 univ bretagne oc...
  • 1 篇 acm ny usa

作者

  • 2 篇 enck william
  • 2 篇 santone antonell...
  • 2 篇 mercaldo frances...
  • 2 篇 martinelli fabio
  • 1 篇 kalantari faezeh
  • 1 篇 hsiao shou-ching
  • 1 篇 sun zhibo
  • 1 篇 duarte guilherme
  • 1 篇 wang ruoyu
  • 1 篇 james kedrian
  • 1 篇 dolgavin aleksan...
  • 1 篇 gu xiaohui
  • 1 篇 faye sébastien
  • 1 篇 patel yogi
  • 1 篇 yang hao
  • 1 篇 sudeep tanwar
  • 1 篇 kumar vijay
  • 1 篇 shao xiaofen
  • 1 篇 zaeifi mehrnoosh
  • 1 篇 sachi chaudhary

语言

  • 49 篇 英文
  • 5 篇 其他
检索条件"任意字段=14th ACM Conference on Data and Application Security and Privacy, CODASPY 2024"
54 条 记 录,以下是1-10 订阅
排序:
codaspy 2024 - Proceedings of the 14th acm conference on data and application security and privacy
CODASPY 2024 - Proceedings of the 14th ACM Conference on Dat...
收藏 引用
14th acm conference on data and application security and privacy, codaspy 2024
the proceedings contain 43 papers. the topics discussed include: estimating the runtime and global network traffic of SMPC protocols;a unified time series analytics based intrusion detection framework for CAN BUS atta...
来源: 评论
SLIM-View: Sampling and Private Publishing of Multidimensional databases  24
SLIM-View: Sampling and Private Publishing of Multidimension...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Laouir, Ala Eddine Imine, Abdessamad Univ Lorraine CNRS Nancy France INRIA Nancy France
Despite the enormous data processing capacity available in big data frameworks, obtaining appropriate and private responses to large-scale queries without revealing sensitive information is still a challenging problem... 详细信息
来源: 评论
A-COPILOT: Android Covert Operation for Private Information Lifting and OTP theft  24
A-COPILOT: Android Covert Operation for Private Information ...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Lim, Joseph Guan Quan Kwok, Zhen Yu Soon, Isaac Yong, Jun Xian Yuhao, Samuel Song Rosley, Siti Halilah Binte Balachandran, Vivek Singapore Inst Technol Singapore Singapore
this paper investigates an underexplored avenue of cybersecurity threats in mobile computing, with a particular focus on the Android platform which, due to its open nature and widespread adoption, is a fertile ground ... 详细信息
来源: 评论
From theory to Comprehension: A Comparative Study of Differential privacy and κ-Anonymity  24
From Theory to Comprehension: A Comparative Study of Differe...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: von Voigt, Saskia Nunez Mehner, Luise Tschorsch, Florian Tech Univ Berlin Berlin Germany Tech Univ Dresden Dresden Germany
the notion of epsilon-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential pr... 详细信息
来源: 评论
WikiPhish: A Diverse Wikipedia-Based dataset for Phishing Website Detection  24
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing We...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Loiseau, Gabriel Lefils, Valentin Meyer, Maxime Riquet, Damien Hornet Secur Hem France
Phishing remains a pervasive security threat, necessitating effective and universally comparable detection systems. the use of supervised machine learning models for phishing detection has been generalized in the lite... 详细信息
来源: 评论
Communicate Less, Learn More: A Locally Differential Private Approach for Counting Triangles with Better Accuracy  24
Communicate Less, Learn More: A Locally Differential Private...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Saladi, Sasi Bhushan V. Sristy, Nagesh Bhattu Natl Inst Technol Comp Sci & Engn Tadepalligudem Andhra Pradesh India
Local differential privacy (LDP) offers strong privacy guarantees, but with reduced accuracy due to noise addition. More often than not, the accuracy of the statistical computations is improved at the cost of high com... 详细信息
来源: 评论
Exploiting Update Leakage in Searchable Symmetric Encryption  24
Exploiting Update Leakage in Searchable Symmetric Encryption
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Haltiwanger, Jacob Hoang, thang Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA
Dynamic Searchable Symmetric Encryption (DSSE) provides efficient techniques for securely searching and updating an encrypted database. However, efficient DSSE schemes leak some sensitive information to the server. Re... 详细信息
来源: 评论
Stop Stealing My data: Sanitizing Stego Channels in 3D Printing Design Files  24
Stop Stealing My Data: Sanitizing Stego Channels in 3D Print...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Dolgavin, Aleksandr Yampolskiy, Mark Yung, Moti Auburn Univ Auburn AL 36849 USA Google LLC Mountain View CA USA Columbia Univ New York NY USA
the increased adoption of additive manufacturing (AM) and the acceptance of AM outsourcing created an ecosystem in which the sending and receiving of digital designs by different actors became normal. It has recently ... 详细信息
来源: 评论
privacy Preserving Biometric Authentication for Fingerprints and Beyond  24
Privacy Preserving Biometric Authentication for Fingerprints...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Blanton, Marina Murphy, Dennis Univ Buffalo Buffalo NY 14260 USA
Biometric authentication eliminates the need for users to remember secrets and serves as a convenient mechanism for user authentication. Traditional implementations of biometric-based authentication store sensitive us... 详细信息
来源: 评论
IoTFuzzSentry: Hunting Bugs In the IoT Wilderness In Operational Phase Using Payload Fuzzing  24
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operati...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Chaudhary, Priyanka Rushikesh Krishna, N. Pranav Maiti, Rajib Ranjan BITS Pilani Hyderabad Campus Secunderabad India
In the operational phase, an IoT device runs a light-weight server that is responsible for responding to the user queries, like accessing video and taking a snap in a IoT camera. the flaws in the implementation of cer... 详细信息
来源: 评论