咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是161-170 订阅
排序:
Decentralized Parallel Blockchain Agricultural Product Traceability System security Analysis  5
Decentralized Parallel Blockchain Agricultural Product Trace...
收藏 引用
5th International conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Fenglin, Sun Guangxi Normal University Qixing District Guangxi Guilin City541000 China
this research work presents a decentralized parallel blockchain-based agricultural product traceability system, which aims to enhance information security and data model efficiency, and achieve real-time tracking of a... 详细信息
来源: 评论
proceedings - 2024 5th International conference on Computer, Big data and Artificial Intelligence, ICCBD+AI 2024
Proceedings - 2024 5th International Conference on Computer,...
收藏 引用
5th International conference on Computer, Big data and Artificial Intelligence, ICCBD+AI 2024
the proceedings contain 109 papers. the topics discussed include: optimization and application of high-performance algorithm under data governance framework;constructing fine-tuning datasets for bid-generation-model u...
来源: 评论
the application of Edge Computing in the Operation Control of Integrated Energy Systems  5
The Application of Edge Computing in the Operation Control o...
收藏 引用
5th International conference on Clean Energy and Electric Power Engineering, ICCEPE 2024
作者: Yang, Yuqiang Li, Lei Zhao, Qiming Lu, Pengfei State Grid Zhejiang Electric Power Company LTD. Marketing Department Hangzhou China
With the development of new technologies such as big data, cloud computing, Internet of things, mobile Internet, and artificial intelligence, the connotation of integrated energy services continues to expand. Integrat... 详细信息
来源: 评论
A Meticulous Range of Forensics Tech Advancement in the field of IoT, IIoT and MIoT  5
A Meticulous Range of Forensics Tech Advancement in the fiel...
收藏 引用
5th IEEE International conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Matta, Priya Kamalraj, R. Saxena, Kumud Tula's Institute Department of Computer Science and Engineering Dehradun India Department of Computer Science and Information Technology Bangalore India Noida Institute of Engineering and Technology Department of Computer Science Engineering Uttar Pradesh Greater Noida India
Wide application of millions of connected, intelligent, and flexible gadgets in critical infrastructures like medical facilities, public transit, sustainability, and home automation has been driven by latest expansion... 详细信息
来源: 评论
GPU-based Private Information Retrieval for On-Device Machine Learning Inference  24
GPU-based Private Information Retrieval for On-Device Machin...
收藏 引用
29th acm International conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
作者: Lam, Maximilian Johnson, Jeff Xiong, Wenjie Maeng, Kiwan Gupta, Udit Li, Yang Lai, Liangzhen Leontiadis, Ilias Rhu, Minsoo Lee, Hsien-Hsin S. Reddi, Vijay Janapa Wei, Gu-Yeon Brooks, David Suh, G. Edward Meta AI Menlo Pk CA 94025 USA Harvard Univ Cambridge MA 02138 USA Virginia Tech Blacksburg VA USA Penn State University Pk PA USA Intel Santa Clara CA USA Cornell Univ Ithaca NY USA
On-device machine learning (ML) inference can enable the use of private user data on user devices without revealing them to remote servers. However, a pure on-device solution to private ML inference is impractical for... 详细信息
来源: 评论
the Future of privacy: A Review on AI's Role in Shaping data security  5
The Future of Privacy: A Review on AI's Role in Shaping Data...
收藏 引用
5th International conference in Electronic Engineering, Information Technology and Education, EEITE 2024
作者: Vardalachakis, Marios Tampouratzis, Manolis Papadakis, Nikos Vasilakis, Manos GR Heraklion71004 Greece FORTH Nikolaou Plastira 100 Vouton Heraklion GR Vassilika70013 Greece
the rapid adoption of Artificial Intelligence (AI) technological advances marked an era of exceptional growth, significantly converting how we interact with the world of technology. But this adoption has arrived at an... 详细信息
来源: 评论
Let's Hide from LLMs: An Adaptive Contextual privacy Preservation Method for Time Series data  6
Let's Hide from LLMs: An Adaptive Contextual Privacy Preserv...
收藏 引用
6th Artificial Intelligence and Cloud Computing conference (AICCC) / 5th Asia Digital Image Processing conference
作者: Rehman, Ubaid Ur Hussain, Musarrat Nguyen, Tri D. T. Lee, Sungyoung Kyung Hee Univ Global Campus Yongin South Korea
the emergence of the Internet of things (IoT) has evolved various application areas, such as healthcare, smart energy management, and autonomous vehicles. these devices continuously transmit time-series data that can ... 详细信息
来源: 评论
Personal Document security Tool for Cloud application  5
Personal Document Security Tool for Cloud Application
收藏 引用
5th International conference on Neural Networks and Neurotechnologies, NeuroNT 2024
作者: Mahmood, Bdoor Alaa College of Computer Science and Information Technology University of Kerbala Karbala56001 Iraq
the recent advancement in cloud storage has spurred the creation of more methods in developing the personal data security features in both applications and personal document storage. Personal document storage can be d... 详细信息
来源: 评论
Enhancing the Scalability of Knowledge Discovery Services for Massive data Mining on Clouds  5
Enhancing the Scalability of Knowledge Discovery Services fo...
收藏 引用
5th International conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Sajjan, Vijayakumar Kumar, Jayam Pradeep Kalvala, Vikram Domala, Narsaiah Kumar, B. Kiran Pavan Kumar Hota, C.P. Malla Reddy University Department of CSE Hyderabad India Chaitanya Deemed to Be University Department of ECE Hyderabad India MLR Institute of Technology Department of ECE Hyderabad India Shri Vishnu Engineering College for Women Department of Artificial Intelligence Bhimavaram India
the traditional data mining techniques do not work well when it comes to the big data and the tremendous growth rate of the digital data also becomes a major challenge to the discovery of knowledge. Cloud computing of... 详细信息
来源: 评论
Detecting data Manipulation in Electric Vehicle Charging Stations Using Machine Learning Algorithm  5
Detecting Data Manipulation in Electric Vehicle Charging Sta...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Akhila, Jannavarapu Vani Bhargavi, Maridu Manikanta, Mondem Lakshmi, Srigakolapu Sai Mithra, Nagulapati Phanindra Raja Vignan's Foundation for Science Technology and Research Department of Computer Science And Engineering Vadlamudi AP Guntur India
A vehicle that functions purely on electricity, as opposed to normal gasoline or diesel automobiles, is known as an electric vehicle (EV). Electric vehicles are becoming extremely popular. EVs come equipped with a bui... 详细信息
来源: 评论