咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是101-110 订阅
排序:
Research on Psychological Screening and Early Warning for Smart Campus based on privacy Protection  24
Research on Psychological Screening and Early Warning for Sm...
收藏 引用
5th International conference on Computer Information and Big data applications, CIBDA 2024
作者: Yu, Haiyan Zhang, Qiping Anhui Vocational and Technical College Hefei230001 China Hefei University of Technology Hefei230051 China
there are some problems of traditional campus psychological assessment such as difficult identification of backstage managers, easy leakage of psychological appointment consultation information, and untimely warning t... 详细信息
来源: 评论
Secure EEG: Secure Seizure Prediction using Encryption and Machine Learning  5
Secure EEG: Secure Seizure Prediction using Encryption and M...
收藏 引用
5th International conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Blessy Sumam, G.G. Gayathri, S. Gopika, S. Er&dci Institute of Technology Cdac Cyber Forensics and Information Security Thiruvananthapuram India Cdac Thiruvananthapuram India Kristu Jayanti College Department of Computer Science Bengaluru India
this research work introduces a pioneering methodology for predicting seizures by leveraging Electroencephalography (EEG) data in individuals diagnosed with epilepsy. the proposed system combines machine learning algo... 详细信息
来源: 评论
Comparative privacy Analysis of Mobile Browsers  23
Comparative Privacy Analysis of Mobile Browsers
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Zafar, Ahsan Das, Anupam North Carolina State Univ Raleigh NC 27695 USA
Online trackers are invasive as they track our digital footprints, many of which are sensitive in nature, and when aggregated over time, they can help infer intricate details about our lifestyles and habits. Although ... 详细信息
来源: 评论
Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's privacy Label Ecosystem  23
Poster: Longitudinal Measurement of the Adoption Dynamics in...
收藏 引用
30th acm SIGSAC conference on Computer and Communications security (acm CCS)
作者: Balash, David G. Ali, Mir Masood Kodwani, Monica Wu, Xiaoyuan Kanich, Chris Aviv, Adam J. Univ Richmond Richmond VA 23173 USA Univ Illinois Chicago IL 60680 USA George Washington Univ Washington DC 20052 USA Carnegie Mellon Univ Pittsburgh PA 15213 USA
this work reports on a large scale, longitudinal analysis of the adoption dynamics of privacy labels in the iOS App Store, measuring this first-of-its kind ecosystem as it reaches maturity over two and a half years af... 详细信息
来源: 评论
Tool/dataset Paper: Realistic ABAC data Generation using Conditional Tabular GAN  23
Tool/Dataset Paper: Realistic ABAC Data Generation using Con...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Rai, Ritwik Sural, Shamik Indian Inst Technol Kharagpur Kharagpur W Bengal India
Attribute-based Access Control (ABAC) is increasingly being used in a wide variety of applications that include cloud services, IoT, smart homes, healthcare and several others. Conducting systematic and reproducible e... 详细信息
来源: 评论
Guarding Identities on the Blockchain: A privacy-Centric Approach Leveraging ZK-SNARK and Shamir Secret Sharing  5th
Guarding Identities on the Blockchain: A Privacy-Centric App...
收藏 引用
5th International conference on data Science, Machine Learning and applications
作者: Kommu, Siddartha Sudam, Rachana Rao, L. Sridhara Neeli, Shrenika JB Inst Engn & Technol Dept Informat Technol Hyderabad India
data protection assumes a pivotal role in the era of the Internet, given that numerous applications enable users to communicate and access online services. Anonymous identity verification system(AIV) is a system desig... 详细信息
来源: 评论
A Lightweight security Technique for Processing Large data Over a Distributed Cloud Environment  5
A Lightweight Security Technique for Processing Large Data O...
收藏 引用
5th International conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Saxena, Vivek Bhattacharjee, Shiladitya Saxena, Deepika Poornima Institute of Engineering and Technology Jaipur India School of Computer Science UPES Dehradun India Poornima University Jaipur India
It is never easy to guarantee data security when processing on a distributed cloud platform. data integrity and privacy are the two most crucial issues in any cloud-based data processing system. Various errors and sec... 详细信息
来源: 评论
application of Homomorphic Encryption for Encrypting and Decrypting Patient data in thailand's Healthcare System  5
Application of Homomorphic Encryption for Encrypting and Dec...
收藏 引用
5th Research, Invention, and Innovation Congress: Innovative Electricals and Electronics, RI2C 2024
作者: Lohlah, Yadzaree Boonyopakorn, Pongsarun King Mongkut's University of Technology North Bangkok Department of Digital Network and Information Security Management Bangkok Thailand
Homomorphic Encryption (HE) is an advanced cryptographic technique in computer science that enables the processing of encrypted data without the need for decryption. It is a significant component of privacy-Enhancing ... 详细信息
来源: 评论
privacy computing technology in the context of energy Internet  5
Privacy computing technology in the context of energy Intern...
收藏 引用
5th International conference on Communications, Information System and Computer Engineering, CISCE 2023
作者: Gong, Yue Chen, Cuiyun Liu, Zhiyu The First Research Institute of the Ministry of Public Security of P.R.C Beijing China
the power system and other energy systems are constantly cross-integrated, and a new development direction of multi-subject collaboration is gradually formed. Starting from the typical mode of energy Internet collabor... 详细信息
来源: 评论
Customizable Component-Based application Assembly with Storage Algorithm  5
Customizable Component-Based Application Assembly with Stora...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Suganya, A. Nagarasu, P. Siva, S. Vignesh, M. Karpagam college of Engineering Tamil Nadu Coimbatore India
AegisLibre is a novel decentralized storage algorithm designed to prioritize high security and efficiency for sensitive data like personal information, text, photos, and other private content. Drawing inspiration from... 详细信息
来源: 评论