咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是91-100 订阅
排序:
Research on Medical Image data Sharing Traceability System Based on Blockchain  5
Research on Medical Image Data Sharing Traceability System B...
收藏 引用
5th International conference on Decision Science and Management, ICDSM 2023
作者: Gao, Yulian Lu, Gehao Wang, Zhiyuan Gao, Mingan Yunnan University School of Information Science and Engineering Kunming China
Because medical image data involves patient privacy, the sharing of medical image data must protect patient privacy and ensure that the data is accurate and not tampered with, and it is a challenge to achieve medical ... 详细信息
来源: 评论
Decentralized application using Blockchain  5
Decentralized Application using Blockchain
收藏 引用
5th International conference on Image Processing and Capsule Networks, ICIPCN 2024
作者: Kayade, Parth Pardeshi, Aniket Patil, Suyog Raut, Prashant Shetkar, Pranav Barhate, Madhuri Vishwakarma Institute of Technology Department of Artificial Intelligence and Data Science Pune India
this research work introduces a novel social media platform built on blockchain technology, aiming to address contemporary challenges in privacy, security, and content integrity. Leveraging decentralized ledger techno... 详细信息
来源: 评论
Re-pseudonymization Strategies for Smart Meter data Are Not Robust to Deep Learning Profiling Attacks  24
Re-pseudonymization Strategies for Smart Meter Data Are Not ...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Cretu, Ana-Maria Rusu, Miruna de Montjoye, Yves-Alexandre Ecole Polytech Fed Lausanne Lausanne Switzerland Imperial Coll London London England
Smart meters, devices measuring the electricity and gas consumption of a household, are currently being deployed at a fast rate throughout the world. the data they collect are extremely useful, including in the fight ... 详细信息
来源: 评论
Elliptic Curve Cryptography: Protecting Healthcare data in the Digital Age  5
Elliptic Curve Cryptography: Protecting Healthcare Data in t...
收藏 引用
5th International conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: thenmozhi, M. Sakthimohan, M. Elizabeth Rani, G. Janani, S. Karthigadevi, K. Sanjeevi Kumar, V. Sri Eshwar College of Engineering Department of Aids Tamilnadu Coimbatore India KalaignarKarunanidhi Institute of Technology Department of Ece Tamilnadu Coimbatore India Tamilnadu Coimbatore India KGiSL Institute of Technology Department of Cse Tamilnadu Coimbatore India Kalasalingam Academy of Research and Education Department of Computer Applications Tamilnadu Krishnankoil India KGiSL Institute of Technology Department of Csbs Tamilnadu Coimbatore India
this work focuses on increasing the security of user data in hospital management systems through encryption. the primary goal is to protect patient information and staff records by implementing advanced encryption and... 详细信息
来源: 评论
European 5G security in the Wild: Reality versus Expectations  23
European 5G Security in the Wild: Reality versus Expectation...
收藏 引用
16th acm conference on security and privacy in Wireless and Mobile Networks (acm WiSec)
作者: Lasierra, Oscar Garcia-Aviles, Gines Municio, Esteban Skarmeta, Antonio Costa-Perez, Xavier i2CAT Fdn Barcelona Spain Univ Murcia Murcia Spain ICREA NEC Labs Europe Barcelona Spain
5G cellular systems are slowly being deployed worldwide delivering the promised unprecedented levels of throughput and latency to hundreds of millions of users. At such scale security is crucial, and consequently, the... 详细信息
来源: 评论
Research on Cloud security Access Control Protocol for Power Marketing Services  5
Research on Cloud Security Access Control Protocol for Power...
收藏 引用
5th International conference on Machine Learning and Computer application, ICMLCA 2024
作者: Wang, Yimin Wang, Jianghui Yang, Ziyue Xu, Menghan Zhu, Meng Zhao, Lei Ma, Yulong Lv, Congdong Jiangsu Electric Power co. LTD State Grid Corporation of China Nanjing China Jiangsu Fangtian Electric Power Technology Co. Ltd Nanjing China Nanjing Audit University Nanjing China
With the acceleration of digital transformation in the power industry, power marketing information systems are increasingly relying on cloud computing platforms for data processing and service delivery. However, this ... 详细信息
来源: 评论
proceedings - 2023 5th IEEE International conference on Trust, privacy and security in Intelligent Systems and applications, TPS-ISA 2023
Proceedings - 2023 5th IEEE International Conference on Trus...
收藏 引用
5th IEEE International conference on Trust, privacy and security in Intelligent Systems and applications, TPS-ISA 2023
the proceedings contain 46 papers. the topics discussed include: mitigating targeted universal adversarial attacks on time series power quality disturbances models;beyond basic trust: envisioning the future of NextGen...
来源: 评论
A Novel Intelligent AI with Automated Defense Attack data privacy System Design  5
A Novel Intelligent AI with Automated Defense Attack Data Pr...
收藏 引用
5th IEEE International conference on Recent Trends in Computer Science and Technology, ICRTCST 2024
作者: Boggavarapu, Saikrishna Navale, Geeta S. Manikandan, G. Senthamilarasi, N. Lakshminarayana, Kodavali Goyal, Himanshu Rai University of Cumberlands Prospect HeightsIL United States Sinhgad Institute of Technology and Science Department of Computer Engineering Pune41 India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Electronics and Communication Engineering Thandalam India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai119 India Koneru Lakshmaiah Education Foundation Department of CSE Andhrapradesh Vaddeswaram India Graphic Era Deemed to be University Department of Computer Science & Engineering Uttarakhand Dehradun248002 India
In this study, we introduce a unique Intelligent AI system built specifically for protecting online privacy and sensitive information. To improve online safety, the system employs cutting-edge AI models, automatic def... 详细信息
来源: 评论
security Techniques in Unmanned Air Traffic Management System  5
Security Techniques in Unmanned Air Traffic Management Syste...
收藏 引用
5th International conference on Smart Systems and Inventive Technology, ICSSIT 2023
作者: Agarwal, Piyush Sharma, Sachin Matta, Priya Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India
the advancement of aviation technologies in recent years, results in the enhancement of the popularity of Unmanned Air Vehicles (UAV) based applications. UAV systems use the wireless communication medium to communicat... 详细信息
来源: 评论
Cloud Cryptography in IT Infrastructure: A Comprehensive Review and Future Directions  5
Cloud Cryptography in IT Infrastructure: A Comprehensive Rev...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Bhute, Pranjal Gahane, Shailesh Kapse, Arya Mohadure, Shraddha Raut, Ekta Khode, Payal Datta Meghe Institute of Higher Education and Research Faculty of Science and Technology Wardha India
Cloud computing has transformed the IT infrastructure by offering scalable, cost-effective, and on-demand services but brings with it enormous security challenges, mainly in safeguarding sensitive information. Cloud c... 详细信息
来源: 评论