咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1-10 订阅
排序:
CODASPY 2015 - proceedings of the 5th acm conference on data and application security and privacy
CODASPY 2015 - Proceedings of the 5th ACM Conference on Data...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
the proceedings contain 40 papers. the topics discussed include: DBMask: fine-grained access control on encrypted relational databases;differentially-private mining of moderately-frequent high-confidence association r...
来源: 评论
CODASPY 2024 - proceedings of the 14th acm conference on data and application security and privacy
CODASPY 2024 - Proceedings of the 14th ACM Conference on Dat...
收藏 引用
14th acm conference on data and application security and privacy, CODASPY 2024
the proceedings contain 43 papers. the topics discussed include: estimating the runtime and global network traffic of SMPC protocols;a unified time series analytics based intrusion detection framework for CAN BUS atta...
来源: 评论
CODASPY 2023 - proceedings of the 13th acm conference on data and application security and privacy
CODASPY 2023 - Proceedings of the 13th ACM Conference on Dat...
收藏 引用
13th acm conference on data and application security and privacy, CODASPY 2023
the proceedings contain 30 papers. the topics discussed include: comparative privacy analysis of mobile browsers;IdDecoder: a face embedding inversion tool and its privacy and security implications on facial recogniti...
来源: 评论
CODASPY 2022 - proceedings of the 12th acm conference on data and application security and privacy
CODASPY 2022 - Proceedings of the 12th ACM Conference on Dat...
收藏 引用
12th acm conference on data and application security and privacy, CODASPY 2022
the proceedings contain 45 papers. the topics discussed include: how (not) to deploy cryptography on the Internet;GINN: fast GPU-TEE based integrity for neural network training;leveraging synthetic data and PU learnin...
来源: 评论
CODASPY 2021 - proceedings of the 11th acm conference on data and application security and privacy
CODASPY 2021 - Proceedings of the 11th ACM Conference on Dat...
收藏 引用
11th acm conference on data and application security and privacy, CODASPY 2021
the proceedings contain 38 papers. the topics discussed include: membership inference attacks and defenses in classification models;using single-step adversarial training to defend iterative adversarial examples;real-...
来源: 评论
CODASPY 2019 - proceedings of the 9th acm conference on data and application security and privacy
CODASPY 2019 - Proceedings of the 9th ACM Conference on Data...
收藏 引用
9th acm conference on data and application security and privacy, CODASPY 2019
the proceedings contain 35 papers. the topics discussed include: understanding the responsiveness of mobile app developers to software library updates;acminer: extraction and analysis of authorization checks in androi...
来源: 评论
SLIM-View: Sampling and Private Publishing of Multidimensional databases  24
SLIM-View: Sampling and Private Publishing of Multidimension...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Laouir, Ala Eddine Imine, Abdessamad Univ Lorraine CNRS Nancy France INRIA Nancy France
Despite the enormous data processing capacity available in big data frameworks, obtaining appropriate and private responses to large-scale queries without revealing sensitive information is still a challenging problem... 详细信息
来源: 评论
Laboratory Management and Computer Network security Maintenance Strategies in the Era of Artificial Intelligence  24
Laboratory Management and Computer Network Security Maintena...
收藏 引用
5th International conference on Computer Science and Management Technology, ICCSMT 2024
作者: Lai, Zhenhuan Wu, Qixing School of Mechanics and Construction Engineering Jinan University Guangdong Guangzhou China
In the era of artificial intelligence, the integration of AI technology into network security has transformed how threats are detected and *** paper explores the application of AI in maintaining network security, with... 详细信息
来源: 评论
From theory to Comprehension: A Comparative Study of Differential privacy and κ-Anonymity  24
From Theory to Comprehension: A Comparative Study of Differe...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: von Voigt, Saskia Nunez Mehner, Luise Tschorsch, Florian Tech Univ Berlin Berlin Germany Tech Univ Dresden Dresden Germany
the notion of epsilon-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential pr... 详细信息
来源: 评论
A-COPILOT: Android Covert Operation for Private Information Lifting and OTP theft  24
A-COPILOT: Android Covert Operation for Private Information ...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Lim, Joseph Guan Quan Kwok, Zhen Yu Soon, Isaac Yong, Jun Xian Yuhao, Samuel Song Rosley, Siti Halilah Binte Balachandran, Vivek Singapore Inst Technol Singapore Singapore
this paper investigates an underexplored avenue of cybersecurity threats in mobile computing, with a particular focus on the Android platform which, due to its open nature and widespread adoption, is a fertile ground ... 详细信息
来源: 评论