咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是111-120 订阅
排序:
Federated Learning Approaches for Decentralized data Processing in Edge Computing  5
Federated Learning Approaches for Decentralized Data Process...
收藏 引用
5th International conference on Smart Electronics and Communication, ICOSEC 2024
作者: Janaki, G. Umanandhini, D. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Chennai India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Computer Science & Engineering Chennai India
Federated Learning (FL) has evolved into a decentralized Machine Learning (ML) paradigm with a high potential for enabling model training across various Edge Devices (ED) to conserve data privacy. this survey explores... 详细信息
来源: 评论
An Investigation into Misuse of Java security APIs by Large Language Models  19
An Investigation into Misuse of Java Security APIs by Large ...
收藏 引用
19th acm Asia conference on Computer and Communications security (acm AsiaCCS)
作者: Mousavi, Zahra Islam, Chadni Moore, Kristen Abuadbba, Alsharif Babar, Muhammad Ali Univ Adelaide CREST Adelaide SA Australia CSIRO Data61 Cybersecur CRC Canberra ACT Australia Queensland Univ Technol Brisbane Qld Australia CSIRO Data61 Canberra ACT Australia
the increasing trend of using Large Language Models (LLMs) for code generation raises the question of their capability to generate trustworthy code. While many researchers are exploring the utility of code generation ... 详细信息
来源: 评论
A Survey on the application of Blockchain Technology for Cyber-Physical Systems  5
A Survey on the Application of Blockchain Technology for Cyb...
收藏 引用
5th International conference on data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Nelufule, Norman Senamela, Pertunia Shadung, Daniel Singano, Tanita Masemola, Kelebogile Mangole, Tshegofatso Pretoria South Africa
this paper presents a systematic review of the literature on the application of blockchain technology to improve the security of cyber-physical systems. the objective of the article was to identify current challenges,... 详细信息
来源: 评论
Anonymization of Sensitive data in the Diabetes Prediction using Private Bayesian Networks  5
Anonymization of Sensitive Data in the Diabetes Prediction u...
收藏 引用
5th International conference on Image Processing and Capsule Networks, ICIPCN 2024
作者: Sethukarasi, T. therasa, P.R. thilagavathy, A. Ajay Kumar, T.M. Dinesh, P.N. Devi Prasad, S.M. R.M.K. Engineering College Department of Computer Science and Engineering Tamil Nadu Thiruvallur India
In the modern era of automated learning and computational intelligence, early disease detection is critical for assisting practitioners in disease diagnosis and decision-making. Traditional methods, including Support ... 详细信息
来源: 评论
A Comprehensive Analysis on Blockchain Based Healthcare data security  5
A Comprehensive Analysis on Blockchain Based Healthcare Data...
收藏 引用
5th International conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Selvanayagi, A. Ramya, K. Shivani, S. Suwathika, K. M.Kumarasamy College of Engineering Computer Science and Engineering Karur639113 India
Blockchain generation has the capability to revolutionize the management and sharing of Electronic Medical Records (EMRs). By using a distributed ledger, blockchain can set up a steady document of transactions, making... 详细信息
来源: 评论
Evolution of Big data Adoption in Industries Using TOPSIS Method  5
Evolution of Big Data Adoption in Industries Using TOPSIS Me...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Sharma, Himanshu Singh, Juginder Pal Gore, Santosh Sathawane, Neerajkumar Golhar, Roshni S. Swami, Vishwajeet Madhav GLA University Department of Computer Engineering & Applications Mathura India Sai Info Solution Maharashtra Nashik India Rajarshi Shahu College of Engineering MH Pune India Suman Ramesh Tulsiani Technical Campus Kamshet Pune India Dr. D. Y. Patil Institute of Pharmaceutical Sciences & Research Pimpri Pune411018 India
Big data Adoption represents an essential method for corporations aiming to enhance productivity and manage patron demands extra effectively. Despite its developing significance, there remains a lack of comprehensive ... 详细信息
来源: 评论
Verifiable Results privacy Protection Federal Learning Model Based on the Blockchain  24
Verifiable Results Privacy Protection Federal Learning Model...
收藏 引用
5th International conference on Computer Information and Big data applications, CIBDA 2024
作者: Qian, Yuhua Hu, Tan Han, Nian School of Chongqing University of Technology ChongQing China
Federated learning is a decentralized learning method used to train machine learning algorithms. In FL, the global model iteratively collects the parameters of local models without directly accessing the local data of... 详细信息
来源: 评论
k-Anonymity in Federated Heterogenous Graphs and k-Core Anonymization  5
k-Anonymity in Federated Heterogenous Graphs and k-Core Anon...
收藏 引用
5th IEEE International conference on Trust, privacy and security in Intelligent Systems and applications (TPS-ISA)
作者: Dockendorf, Mark Dantu, Ram Univ North Texas Dept Comp Sci & Engn 1155 Union Cir Denton TX 76203 USA
k-Anonymity is widely used to preserve privacy of individuals by ensuring at least k data points are indistinguishable from one-another. In this paper, we apply k-anonymity to our federated heterogeneous graph storage... 详细信息
来源: 评论
LLMEdge: A Novel Framework for Localized LLM Inferencing at Resource Constrained Edge  5
LLMEdge: A Novel Framework for Localized LLM Inferencing at ...
收藏 引用
5th International conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Ray, Partha Pratim Pradhan, Mohan Pratap Sikkim University Department of Computer Applications Gangtok737102 India
Large Language Models (LLMs) have revolutionized natural language processing, providing robust capabilities for understanding and generating human readable text. However, deploying these models in resource-constrained... 详细信息
来源: 评论
data security and privacy Protection of Technology Achievement Transformation Platform in Vocational Colleges Based on Blockchain  5
Data Security and Privacy Protection of Technology Achieveme...
收藏 引用
5th International conference on Industrial IoT, Big data and Supply Chain, IIoTBDSC 2024
作者: Song, Yang Jilin Communications Polytechnic Changchun Jilin130012 China
In recent years, the role of the transformation of scientific and technological achievements in vocational colleges in promoting regional innovation and economic development has become increasingly significant. Howeve... 详细信息
来源: 评论