咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是131-140 订阅
排序:
Sign Up Wallet: A Blockchain and Machine Learning based Self-Sovereign Identity Model for Enhanced Digital security  5
Sign Up Wallet: A Blockchain and Machine Learning based Self...
收藏 引用
5th International conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Rani, K. Sankar Vishnu Gomathi, S. Vijay, C. Sujith, S.B. Alagu Ramanan, S. M. Kumarasamy College of Engineering Department of Information Technology Tamil Nadu Karur639113 India
Digital identity management faces challenges with centralized and federated systems, risking large-scale data breaches and privacy violations. In response, this article presents the Sign-Up Wallet, a novel approach to... 详细信息
来源: 评论
A Blockchain Editable Scheme with Dynamic Access Control  5
A Blockchain Editable Scheme with Dynamic Access Control
收藏 引用
5th International conference on Computer, Big data and Artificial Intelligence, ICCBD+AI 2024
作者: Zheng, Qiankun Ye, Junyao Lai, Junzuo Jingdezhen Ceramic University Information Engineering College Jingdezhen333403 China Jinan University College of Information Science and Technology Guangzhou510632 China
With the rise of blockchain technology, its inherent characteristics of decentralization, tamper resistance, and persistence have made it a crucial method for the persistence and storage of big data. However, consider... 详细信息
来源: 评论
A privacy-Preserving Smart Contract Vulnerability Detection Framework for Permissioned Blockchain  30
A Privacy-Preserving Smart Contract Vulnerability Detection ...
收藏 引用
30th acm SIGSAC conference on Computer and Communications security (acm CCS)
作者: Tian, Wensheng Zhang, Lei Chen, Shuangxi Wang, Hu Luo, Xiao Nanhu Lab Jiaxing Peoples R China Jiaxing Vocat & Tech Coll Jiaxing Peoples R China Zhejiang Big Data Dev Adm Hangzhou Peoples R China Zhejiang Univ Hangzhou Peoples R China
the two main types of blockchains that are currently widely deployed are public blockchains and permissioned blockchains. the research that has been conducted for blockchain vulnerability detection is mainly oriented ... 详细信息
来源: 评论
Exploring Unlearning Methods to Ensure the privacy, security, and Usability of Recommender Systems  23
Exploring Unlearning Methods to Ensure the Privacy, Security...
收藏 引用
17th acm conference on Recommender Systems (RecSys)
作者: Leysen, Jens Univ Antwerp Antwerp Belgium
Machine learning algorithms have proven highly effective in analyzing large amounts of data and identifying complex patterns and relationships. One application of machine learning that has received significant attenti... 详细信息
来源: 评论
Government and Enterprise data security Sharing Method Based on Differential privacy Protection  5
Government and Enterprise Data Security Sharing Method Based...
收藏 引用
5th International conference on Computer Information Science and Artificial Intelligence, CISAI 2022
作者: Xu, Xiaomin Zhu, Zhenglei Liu, Jiange Liu, Xin Guo, Qingxuan State Grid Huaian Power Support Company Jiangsu Huaian223002 China
the security of government and enterprise data sharing is very important and critical. To increase the number of data sharing, create a more stable transmission and processing environment, and reduce network threats, ... 详细信息
来源: 评论
Network Anomaly Detection Algorithm Based on Fusion of Artificial Fish Swarming and Isolation Forest  5
Network Anomaly Detection Algorithm Based on Fusion of Artif...
收藏 引用
5th International conference on Computer Engineering and application (ICCEA)
作者: Zhang, Chen Shen, Wei Wang, ShengZhao Wu, Yue Hefei Univ Artificial Intelligence & Big Data Acad Hefei Peoples R China Guochuang Software Co Ltd Hefei Peoples R China Hefei Univ Technol Intelligent Interconnected Syst Lab Anhui Prov Hefei Peoples R China
Currently, network security involves all aspects of human life privacy, etc., and anomalous data detection has been an important means of protection against network attacks. Aiming at the problem of unreasonable alloc... 详细信息
来源: 评论
Research on privacy protection scheme based on data fuzzy processing  5
Research on privacy protection scheme based on data fuzzy pr...
收藏 引用
5th International conference on Internet of things, Automation and Artificial Intelligence, IoTAAI 2023
作者: Fu, Yewen Li, Yongzheng Jin, Zhexue Network Information Security Laboratory Yanbian University Engineering College Yanbian Autonomous Prefecture Jilin Province Yanji City China
the continuous development of cloud storage has brought unprecedented convenience to people's lives. However, along with the convenience, it also brings certain security risks. Cloud data can be maliciously used, ... 详细信息
来源: 评论
Blockchain in Cyber security: A Comprehensive Review  5th
Blockchain in Cyber Security: A Comprehensive Review
收藏 引用
5th International conference on data Science, Machine Learning and applications
作者: Prashanth, Mallellu Sai Karnati, Ramesh Velpuru, Muni Sekhar Reddy, H. Venkateshwara Vardhaman Coll Engn Dept Comp Sci & Engn Hyderabad India Vardhaman Coll Engn Dept Informat Technol Hyderabad India
Strong and creative solutions to secure digital systems and data are becoming more and more necessary as cybersecurity threats increase in frequency and sophistication. Recently, a promising method for improving cyber... 详细信息
来源: 评论
Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2  23
Attribute Inference Attacks in Online Multiplayer Video Game...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Tricomi, Pier Paolo Apruzzese, Giovanni Facciolo, Lisa Conti, Mauro Univ Padua Dept Math Padua Italy Univ Liechtenstein Hilti Chair Data & Applicat Secur Vaduz Liechtenstein Delft Univ Technol Fac EEMCS Delft Netherlands
Did you know that over 70 million of DOTA2 players have their in-game data freely accessible? What if such data is used in malicious ways? this paper is the first to investigate such a problem. Motivated by the widesp... 详细信息
来源: 评论
data security and privacy Issues in Cloud Environment  5
Data Security and Privacy Issues in Cloud Environment
收藏 引用
5th International conference on Smart Systems and Inventive Technology, ICSSIT 2023
作者: Pavani, Kilarapu Sree, Jangala Rani Sai Rani, Avuthu Siva Swaroopa Rohini, Kondepati Kumar, T. Pavan Yellamma, Pachipala Koneru Lakshmaiah Education Foundation Computer Science and Engineering Guntur India
Cloud Computing is a computing paradigm where the user store data, access data, and deliver services through the internet, many people are opting for the cloud for storing the data which makes working on things easier... 详细信息
来源: 评论