咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是21-30 订阅
排序:
IoTFuzzSentry: Hunting Bugs In the IoT Wilderness In Operational Phase Using Payload Fuzzing  24
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operati...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Chaudhary, Priyanka Rushikesh Krishna, N. Pranav Maiti, Rajib Ranjan BITS Pilani Hyderabad Campus Secunderabad India
In the operational phase, an IoT device runs a light-weight server that is responsible for responding to the user queries, like accessing video and taking a snap in a IoT camera. the flaws in the implementation of cer... 详细信息
来源: 评论
CODASPY 2018 - proceedings of the 8th acm conference on data and application security and privacy
CODASPY 2018 - Proceedings of the 8th ACM Conference on Data...
收藏 引用
8th acm conference on data and application security and privacy, CODASPY 2018
the proceedings contain 45 papers. the topics discussed include: minimizing privilege assignment errors in cloud services;secure storage with replication and transparent deduplication;server-based manipulation attacks...
来源: 评论
Coherent Multi-Table data Synthesis for Tabular and Time-Series data with GANs  24
Coherent Multi-Table Data Synthesis for Tabular and Time-Ser...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Elliker, Clement Tonnelier, Emeric Shabou, Aymen Grp Credit Agricole DataLab Grp Paris France
As the usage of user-private-data is increasingly monitored by regulatory institutions for security purposes, its transfer becomes more constrained. Synthetic data has recently emerged as a viable alternative to preve... 详细信息
来源: 评论
CoCoT: Collaborative Contact Tracing  24
CoCoT: Collaborative Contact Tracing
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Kann, Trevor Bauer, Lujo Cunningham, Robert K. Carnegie Mellon Univ Pittsburgh PA 15213 USA Univ Pittsburgh Pittsburgh PA USA
Contact tracing can limit the spread of infectious diseases by notifying people of potential exposure to disease. Manual contact tracing is resource-intensive, but much of it can be automated using mobile phones, whic... 详细信息
来源: 评论
ASTRA-5G: Automated Over-the-Air security Testing and Research Architecture for 5G SA Devices  24
ASTRA-5G: Automated Over-the-Air Security Testing and Resear...
收藏 引用
17th acm conference on security and privacy in Wireless and Mobile Networks (WiSec)
作者: Khandker, Syed Guerra, Michele Bitsikas, Evangelos Jover, Roger Piqueras Ranganathan, Aanjhan Popper, Christina New York Univ Abu Dhabi Abu Dhabi U Arab Emirates Univ Molise Pesche Italy Northeastern Univ Boston MA USA Google New York NY USA
Despite the widespread deployment of 5G technologies, there exists a critical gap in security testing for 5G Standalone (SA) devices. Existing methods, largely manual and labor-intensive, are ill-equipped to fully unc... 详细信息
来源: 评论
An Overview of threats Exploring the Confusion Between Top-Level Domains and File Type Extensions  24
An Overview of Threats Exploring the Confusion Between Top-L...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Sales, Anderson Torres, Nuno Pinto, Pedro Inst Politecn Viana do Castelo Viana Do Castelo Portugal INESC TEC Porto Portugal
Cyberattacks exploit deceptions involving the Domain Name Service (DNS) to direct users to fake websites, such as typosquatting attacks, which exploit natural typographical errors, and homograph attacks, where differe... 详细信息
来源: 评论
Towards Accurate and Stronger Local Differential privacy for Federated Learning with Staircase Randomized Response  24
Towards Accurate and Stronger Local Differential Privacy for...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Varun, Matta Feng, Shuya Wang, Han Sural, Shamik Hong, Yuan Indian Inst Technol Kharagpur India Univ Connecticut Storrs CT USA Univ Kansas Lawrence KS USA
Federated Learning (FL), a privacy-preserving training approach, has proven to be effective, yet its vulnerability to attacks that extract information from model weights is widely recognized. To address such privacy c... 详细信息
来源: 评论
Crypto'Graph: Leveraging privacy-Preserving Distributed Link Prediction for Robust Graph Learning  24
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Azogagh, Sofiane Birba, Zelma Aubin Gambs, Sebastien Killijian, Marc-Olivier Univ Quebec Montreal Montreal PQ Canada
Graphs are a widely used data structure for collecting and analyzing relational data. However, when the graph structure is distributed across several parties, its analysis is challenging. In particular, due to the sen... 详细信息
来源: 评论
security Policy Generation and Verification through Large Language Models: A proposal  24
Security Policy Generation and Verification through Large La...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Martinelli, Fabio Mercaldo, Francesco Petrillo, Luca Santone, Antonella CNR IIT Pisa Italy Univ Molise Campobasso Italy CNR IIT Campobasso Italy IMT Sch Adv Studies Lucca Lucca Italy CNR IIT Lucca Italy
the ability to manage and enforce security policies in a rapidly changing digital environment is vital. When enforcing and verifying policies on complex systems, it can be challenging for them to be understood by huma... 详细信息
来源: 评论
Image data confirmation method based on security watermarking and blockchain  24
Image data confirmation method based on security watermarkin...
收藏 引用
5th International conference on Computing, Networks and Internet of things (CNIOT)
作者: Zhang, Liu Du, Xue-Hui Liu, Ao-Di Informat Engn Univ He Nan Prov Key Lab Informat Secur Zhengzhou Peoples R China
Aiming at the problem of unclear resource ownership and difficult definition of image data security sharing technology, combined with blind watermarking technology, this paper proposes a method of image data rights co... 详细信息
来源: 评论