咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是301-310 订阅
排序:
5th International conference on Computing and Network Communications, CoCoNet 2023
5th International Conference on Computing and Network Commun...
收藏 引用
5th International conference on Computing and Network Communications, CoCoNet 2023
the proceedings contain 44 papers. the special focus in this conference is on Computing and Network Communications. the topics include: Maximizing Efficiency: Unveiling the Potential of Kubernetes Metrics;re...
来源: 评论
9th International Skin Imaging Collaboration Workshop, ISIC 2024, 7th International Workshop on Interpretability of Machine Intelligence in Medical Image Computing, iMIMIC 2024, Embodied AI and Robotics for Healthcare Workshop, EARth 2024 and 5th MICCAI Workshop on Distributed, Collaborative and Federated Learning, DeCaF 2024 held at 27th International conference on Medical Image Computing and Computer Assisted Intervention, MICCAI 2024
9th International Skin Imaging Collaboration Workshop, ISIC ...
收藏 引用
9th International Skin Imaging Collaboration Workshop, ISIC 2024, 7th International Workshop on Interpretability of Machine Intelligence in Medical Image Computing, iMIMIC 2024, Embodied AI and Robotics for Healthcare Workshop, EARth 2024 and 5th MICCAI Workshop on Distributed, Collaborative and Federated Learning, DeCaF 2024 held at 27th International conference on Medical Image Computing and Computer Assisted Intervention, MICCAI 2024
the proceedings contain 23 papers. the special focus in this conference is on Skin Imaging Collaboration, Interpretability of Machine Intelligence in Medical Image Computing, Embodied AI and Robotics for Healthcare Wo...
来源: 评论
Distributed data storage auditing scheme in fog computing environment  5
Distributed data storage auditing scheme in fog computing en...
收藏 引用
5th International conference on Computer Communication and Network security, CCNS 2024
作者: Wang, Yi Yang, Lihao Liu, Wang Chen, Dongdong Gu, Ke School of Computer & Communication Engineering Changsha University of Science & Technology Hunan Changsha China Xiangtan Chengfa Technology Group Co. Ltd. Hunan Xiangtan China
With the continuous innovation of wireless communication technology, fog computing-based distributed storage serves as a useful complement to centralized cloud computing and is trending towards large-scale deployment ... 详细信息
来源: 评论
A Computer Network Training data Center Resource Monitoring Platform  5
A Computer Network Training Data Center Resource Monitoring ...
收藏 引用
5th International conference on Computers, Information Processing and Advanced Education, CIPAE 2024
作者: Ning, An Chengdu Polytechnic Chengdu China
this article presents the development of a visual monitoring platform for educational resources, encompassing both hardware components and software applications, specifically designed for the training setting of compu... 详细信息
来源: 评论
Impact of Cloud Computing in Digital Healthcare  5
Impact of Cloud Computing in Digital Healthcare
收藏 引用
5th IEEE International conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: thakur, Shreya Sharma, Simran Sharma, Arvind K. Kaur, Rajinder Anju Shoolini University Yogananda School of AI Computers and Data Science Himachal Pradesh Solan India Trinity College Department of Computer Sciences Punjab Jalandhar India
the continuous and sustainable development in healthcare is taking place from decades and with prompt technological advancement in engineering nowadays the healthcare can't be imagined without the advent tools lik... 详细信息
来源: 评论
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced security, and Quantum-resistant Instantiation  22
Public-key Authenticated Encryption with Keyword Search: Cry...
收藏 引用
17th acm ASIA conference on Computer and Communications security 2022 (acm ASIACCS)
作者: Liu, Zi-Yuan Tseng, Yi-Fan Tso, Raylin Mambo, Masahiro Chen, Yu-Chi Natl Chengchi Univ Dept Comp Sci Taipei 11605 Taiwan Kanazawa Univ Inst Sci & Engn Kanazawa Ishikawa 9201192 Japan Yuan Ze Univ Dept Comp Sci & Engn Taoyuan 32003 Taiwan Kanazawa Univ Grad Sch Nat Sci & Technol Kanazawa Ishikawa 9201192 Japan Natl Chengchi Univ Artificial Intelligence & Learning Ctr Taipei 11605 Taiwan
With the rapid development of cloud computing, an increasing number of companies are adopting cloud storage technology to reduce overhead. However, to ensure the privacy of sensitive data, the uploaded data need to be... 详细信息
来源: 评论
Attack and Defense Methods for Graph Vertical Federation Learning  22
Attack and Defense Methods for Graph Vertical Federation Lea...
收藏 引用
5th International conference on Computer Science and Software Engineering, CSSE 2022
作者: Xie, Xinyi Zheng, Haibin Li, Hu Pang, Ling Chen, Jinyin College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Institute of Cyberspace Security and College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Information System Security Technology Beijing100101 China
To further protect citizens' privacy and national data security, graph federation learning has been widely used and rapidly developed. However, with the deployment and landing of graph federation learning tasks, t... 详细信息
来源: 评论
Service Quality Analysis of Telkomsel Case Study Based on Online Customer Reviews in Google Play Store  5
Service Quality Analysis of Telkomsel Case Study Based on On...
收藏 引用
5th IEEE International conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Ariyanti, Maya Widiyanesti, Sri Aprillia, Wahyuning Hanifah Telkom University School of Economics and Business Bandung Indonesia
A corporation that offers internet services is known as an Internet Service Provider (ISP). Regional-scale networks and worldwide networks are offered at ISPs, allowing consumers to effortlessly connect with the outsi... 详细信息
来源: 评论
Private data Preprocessing for privacy-preserving Federated Learning  5
Private Data Preprocessing for Privacy-preserving Federated ...
收藏 引用
5th IEEE International conference on Knowledge Innovation and Invention, ICKII 2022
作者: Hsu, Ruei-Hau Huang, Ting-Yun National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung Taiwan
privacy-preserving federated learning can accomplish model aggregation without leaking to a local model and avoid the problem of sensitive data exposure caused by model leakage. Even though it protects privacy in the ... 详细信息
来源: 评论
Design thinking Approach for Dimensionality Reduction using Ensemble Gradient Boosting Algorithm  5
Design Thinking Approach for Dimensionality Reduction using ...
收藏 引用
5th International conference on Inventive Research in Computing applications, ICIRCA 2023
作者: Selva Kumar, N. Kalaivani, D. Dr.SNS Rajalakshmi College of Arts and Science Department of Computer Science Coimbatore India Dr.SNS Rajalakshmi College of Arts and Science Department of Computer Technology Coimbatore India
Human activity recognition (HAR) has developed an essential application in the Internet of things (IoT) domain, providing a foundation for many healthcare, fitness, and security applications. However, IoT sensors'... 详细信息
来源: 评论