咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是181-190 订阅
排序:
SELMAnalyzer: An APP privacy Leakage Analysis Method Based on Program Execution Logic  5
SELMAnalyzer: An APP Privacy Leakage Analysis Method Based o...
收藏 引用
5th International conference on Advances in Electrical Engineering and Computer applications, AEECA 2024
作者: Li, Jingwei Liu, Tao Zhang, Ruoding Zhang, Yan Song, Xiaoyi Shang, Chong University of Chinese Academy of Sciences Institute of Information Engineering Chinese Academy of Sciences School of Cyberspace Security Beijing China MIIT China Academy of Information and Communications Technology Key Laboratory of Mobile Application Innovation and Governance Technology Beijing China University of Chinese Academy of Sciences China Telecom Co. Ltd. School of Cyberspace Security Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China
Mobile phones have become an indispensable part of people's daily lives, but many mobile applications continue to obtain and use people's private data through malicious behaviors hidden behind normal functions... 详细信息
来源: 评论
Enhancing Cyber-Physical Systems security: A Review of Deep Learning and Blockchain Integration  5
Enhancing Cyber-Physical Systems Security: A Review of Deep ...
收藏 引用
5th International conference on Image Processing and Capsule Networks, ICIPCN 2024
作者: Selvi, K. Dilip, Golda SRM Institute of Science and Technology Faculty of Engineering and Technology Department of Computer Science and Engineering Vadapalani Campus Chennai India
Cyber-Physical Systems (CPS) combine physical and computational elements to produce intelligent systems communicating with their surroundings. By integrating digital and physical processes, CPS provides increased func... 详细信息
来源: 评论
Research and analysis of the security risk management strategy of big data technology in the financial industry  5
Research and analysis of the security risk management strate...
收藏 引用
5th International conference on Big data Engineering, BDE 2023
作者: Ji, Wenjun Maanshan Vocational and Technical College Anhui province Maanshan243031 China
With the continuous deepening of financial business informationization, the rapid spread of all kinds of financial data, promoting the financial field to enter the era of big data, and the structural transformation an... 详细信息
来源: 评论
privacy-Preserving Human Activity Recognition in Smart Homes using Deep Learning and Edge Computing for Real-Time Processing  5
Privacy-Preserving Human Activity Recognition in Smart Homes...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Mariappan, K. Gopal, Baskar Parthasarathy, J. Sreekanth, G.R. Nanmaran, R. Jegajothi, B. SRM Institute of Science and Technology Department of Computer Science and Applications Chennai India College of Engineering University of Technology & Applied Science Nizwa Oman Computer Science & Engineering Jayalakshmi Institute Of Technology Dharmapuri India Information Technology Nandha Engineering College Erode52 India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India SRS Tech Solutions Chennai India
the rapid advancement of smart home technologies necessitates efficient human activity recognition (HAR) systems while ensuring user privacy. this research presents a novel architecture that integrates deep learning a... 详细信息
来源: 评论
Blockchain Enabled SDN Framework for security Management in 5G applications  23
Blockchain Enabled SDN Framework for Security Management in ...
收藏 引用
24th International conference on Distributed Computing and Networking (ICDCN)
作者: Das, Debashis Banerjee, Sourav Dasgupta, Kousik Chatterjee, Pushpita Ghosh, Uttam Biswas, Utpal Univ Kalyani Comp Sci & Engn Kalyani W Bengal India Kalyani Govt Engn Coll Comp Sci & Engn Kalyani W Bengal India Howard Univ Elect Engn & Comp Sci Washington DC 20059 USA Meharry Med Coll Dept CS & DS Nashville TN 37208 USA
Fifth-generation (5G) wireless networks are now operational to deploy all over the world. the technology of 5G's objective is to link heterogeneous machines and devices with significant improvements high quality o... 详细信息
来源: 评论
Achieving efficient and secure keyword attribute community search on cloud servers  5
Achieving efficient and secure keyword attribute community s...
收藏 引用
5th International conference on Computer Communication and Network security, CCNS 2024
作者: Zhong, Ziyang Chang, Pan Cai, Min Software Engineering Institute East China Normal University Shanghai200062 China Shanghai New York University Working Group East China Normal University Shanghai200062 China
Community search is a technique used to identify and retrieve groups of nodes with specific attributes or associations by analyzing the connections between nodes in a network or graph structure. Existing researches ma... 详细信息
来源: 评论
A Review of Cyber security Challenges and Mitigation Strategies in Industry 4.0 Technologies  5
A Review of Cyber Security Challenges and Mitigation Strateg...
收藏 引用
5th IEEE International conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Kumar, Mayank Gupta, Himanshu Aiit Amity University Noida India
the 4th Industrial Revolution, also known as or the Industry 4.0, has been characterized by the emergence of revolutionary technologies like robotics, computer vision, big data the analysis, and the Internet of things... 详细信息
来源: 评论
privacy Protection Scheme for Epidemiological Investigation Based on Blockchain Technology  23
Privacy Protection Scheme for Epidemiological Investigation ...
收藏 引用
5th Blockchain and Internet of things conference (BIOTC)
作者: Han, Ya Gao, Jianbo Guan, Zhi Chen, Zhong Ren, Lifeng Peking Univ Sch Comp Sci Beijing Peoples R China Peking Univ Chongqing Res Inst Big Data Chongqing Peoples R China Peking Univ Natl Engn Res Ctr Software Engn Beijing Peoples R China
Since Bitcoin was invented in 2008, the blockchain technology has been growing rapidly. A blockchain is a growing public ledger called blocks which are interconnected with a chain by utilizing cryptography. Utilizing ... 详细信息
来源: 评论
Proposition Development Study- Intervention of AI in the Education Sector of UAE  5
Proposition Development Study- Intervention of AI in the Edu...
收藏 引用
5th International conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Ramakrishnan, Swamynathan Bishnoi, Malini Mittal Harish, V. Jijitha, S. Amity Business School Amity University Dubai United Arab Emirates PSGIM PSG College of Technology TN Coimbatore India Department of Computer Applications Bharathiar University Coimbatore India
Artificial intelligence (AI) has been revolutionizing various fields, including education sector, therefore it is essential to learn about the potentials and challenges of the AI impact on learning and education proce... 详细信息
来源: 评论
Blockchain Technology in HR: Enhancing Transparency and security in Employee data Management  5
Blockchain Technology in HR: Enhancing Transparency and Secu...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Paranthaman, Prabakaran Kumaran, V. Senthil Vijayalakshmi, V. Rimo, Shibe St. Joseph's Institute of Technology Department of Management Studies Tamil Nadu Chennai India Saveetha College of Liberal Arts and Sciences Saveetha Institute of Technical and Medical Sciences Department of Business Administration Tamil Nadu Chennai India
Traditional Human Resources (HR) systems, which are dependent on centralized databases, have problems with data manipulation, illegal access, and inefficiencies resulting from numerous middlemen and manual processes. ... 详细信息
来源: 评论