咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是141-150 订阅
排序:
DIPA: An Image dataset with Cross-cultural privacy Concern Annotations  28
DIPA: An Image Dataset with Cross-cultural Privacy Concern A...
收藏 引用
28th Annual conference on Intelligent User Interfaces (IUI)
作者: Xu, Anran Zhou, Zhongyi Miyazaki, Kakeru Yoshikawa, Ryo Hosio, Simo Yatani, Koji Univ Tokyo Interact Intelligent Syst Lab Tokyo Japan Univ Oulu Ctr Ubiquitous Comp Oulu Finland
Image privacy protection is an important topic in Human-Computer Interaction and usable security. Researchers have examined different aspects of image privacy by collecting samples by themselves. However, there does n... 详细信息
来源: 评论
Integrating Artificial Open Generative Artificial Intelligence into Software Supply Chain security  5
Integrating Artificial Open Generative Artificial Intelligen...
收藏 引用
5th International conference on data Analytics for Business and Industry, ICDABI 2024
作者: Alevizos, Vasileios Papakostas, George A. Simasiku, Akebu Malliarou, Dimitra Messinis, Antonis Edralin, Sabrina Xu, Clark Yue, Zongliang Karolinska Institutet Solna Sweden Democritus University of Thrace MLV Research Group Department of Informatics Kavala Greece Zambia University Ndola Zambia IntelliSolutions Athens Greece HEDNO SA Athens Greece University of Illinois Urbana-Champaign IL United States Mayo Clinic Artificial Intelligence and Discovery MN United States Auburn University Harrison College of Pharmacy AL United States
While new technologies emerge, human errors always looming. Software supply chain is increasingly complex and intertwined, the security of a service has become paramount to ensuring the integrity of products, safeguar... 详细信息
来源: 评论
Malware Detection Using Machine Learning Algorithms in Android  5th
Malware Detection Using Machine Learning Algorithms in Andro...
收藏 引用
5th International conference on data Science, Machine Learning and applications
作者: Sri, Kovvuri Ramya G Narayanamma Inst Technol & Sci Hyderabad 500104 India
Malware remains a critical challenge within the domain of working frameworks and program, with Android frameworks being no special case. In spite of past endeavors utilizing Signature-based methods for malware detecti... 详细信息
来源: 评论
Secured data data Movement Movement using using data data Ring Ring Fencing Fencing  5
Secured Data Data Movement Movement using using Data Data Ri...
收藏 引用
5th IEEE International conference on Trust, privacy and security in Intelligent Systems and applications, TPS-ISA 2023
作者: Nangia, Aditya Bhupal, Saksham Mohania, Mukesh Kundu, Chinmay Iiit Delhi India Kiit University Bhubaneswar India
the exponential increase in data volume, the growing pervasiveness of digital technologies, and frequent data breaches have given rise to a broad range of privacy concerns. these concerns stem from the fact that data ... 详细信息
来源: 评论
A Framework for Securing Electronic Payments via the Dual Channel security Protocol  5
A Framework for Securing Electronic Payments via the Dual Ch...
收藏 引用
5th IEEE Middle East and North Africa COMMunications conference, MENACOMM 2025
作者: Barada, Maria Mshellem, Afnan Shaker, May Mershad, Khaleel Cheikhrouhou, Omar Department of Computer Science and Mathematics Beirut Lebanon Higher Institute of Computer Science of Mahdia University of Monastir Mahdia Tunisia
A major concern in e-payment systems is the privacy of user data. Recently, marketplaces have been utilizing point-of-sale terminals that use short-range communication for contactless payments. Such services primarily... 详细信息
来源: 评论
Hybrid Cloud Workflow Scheduling Algorithm Based on the Improved Wild Horse Optimization Algorithm  5
Hybrid Cloud Workflow Scheduling Algorithm Based on the Impr...
收藏 引用
5th International conference on Computer Engineering and application (ICCEA)
作者: Chen, Xiaobo Qiu, Lupeng Li, Tianzhe Fan, Yingkai Zhou, Naqin Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou Peoples R China
As a cloud computing model that integrates the advantages of public and private clouds, the hybrid cloud adapts to changing application requirements, allowing users to flexibly lease public cloud resources to expand c... 详细信息
来源: 评论
privacy-Preserving Swarm Learning Based on Lightweight Homomorphic Encryption and Blockchain Technology  5
Privacy-Preserving Swarm Learning Based on Lightweight Homom...
收藏 引用
5th IEEE Eurasia conference on IOT, Communication and Engineering, ECICE 2023
作者: Li, Yong Ling, Haichao Ren, Xianglin Yu, Chun Liu, Tongtong Changchun University of Technology School of Computer Science Changchun China Non-commissioned Officer School of Army Academy of Armored Forces Changchun China
A decentralized solution called swarm learning integrates blockchain into machine learning with distributed data sources and computing power. the security of blockchain is inherited and the security and privacy of dat... 详细信息
来源: 评论
Aquaculture IoT security Landscape: A Comprehensive Analysis of threats and Mitigation Strategies  5
Aquaculture IoT Security Landscape: A Comprehensive Analysis...
收藏 引用
5th International conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Bhushan, Adithi Aimen Fathima, S. Shanthala, P.T. Pes University Computer Science Engineering India
the use of Internet of things (IoT) technologies in aquaculture has transformed the management of aquatic resources by providing formerly unknown opportunities for automation, data collection, and decision-making. How... 详细信息
来源: 评论
Federated Learning for Secure and privacy-Preserving Medical Image Analysis in Decentralized Healthcare Systems  5
Federated Learning for Secure and Privacy-Preserving Medical...
收藏 引用
5th International conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Muthalakshmi, M. Jeyapal, Karthik Vinoth, M. Dinesh, P.S. Murugan, N. Senthil Sheela, K.Santha Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology India Wipro India Ifet College of Engineering Autonomous Department of Chemistry Villupuram India Bannari Amman Institute of Technology Computer Science and Engineering Alathukombai Sathyamangalam India J.P.College of Engineering Department of Information Technology Tenkasi India Velammal College of Engineering and Technology Department of Cse Madurai India
the need for safe and effective ways to manage private patient information has grown in tandem with deep learning algorithms in medical image analysis. Preserving patient privacy while utilizing collective intelligenc... 详细信息
来源: 评论
Experimental Evaluation of a Secured privacy Preservation Scheme using IP Traceback Logic in Wireless Sensor Networks  5
Experimental Evaluation of a Secured Privacy Preservation Sc...
收藏 引用
5th International conference on Smart Electronics and Communication, ICOSEC 2024
作者: Shifani, S. Agnes Metilda, M.I. Mary Rajkumar, G. Vinoth Muppudathi Sutha, S. Maheshwari, S. Mary, A. Antony Saveetha University Saveetha School of Engineering Department of Ece Chennai India Sathyabama Institute of Science and Technology Department of Mathematics Chennai India J P College of Engineering Department of Ece Tenkasi India Sardar Raja College of Engineering Department of Ece Alangulam India Srm Institute of Science and Technology Division of Mathematics School of Sciences Trichy India
this research work proposes a secured privacy preservation scheme for wireless sensor networks (WSNs) that integrates multiple advanced techniques to ensure robust data confidentiality, integrity, and traceability. th... 详细信息
来源: 评论