咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是391-400 订阅
排序:
5th International conference on Machine Learning for Networking, MLN 2022
5th International Conference on Machine Learning for Network...
收藏 引用
5th International conference on Machine Learning for Networking, MLN 2022
the proceedings contain 12 papers. the special focus in this conference is on Machine Learning for Networking. the topics include: Phisherman: Phishing Link Scanner;leader-Assisted Client Selection for Federated ...
来源: 评论
SDN Enabled QoE and security Framework for Multimedia applications in 5G Networks
收藏 引用
acm TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND applicationS 2021年 第2期17卷 1–29页
作者: Krishnan, Prabhakar Jain, Kurunandan Jose, Pramod George Achuthan, Krishnashree Buyya, Rajkumar Amrita Vishwa Vidyapeetham Ctr Cyber Secur Syst & Networks Clappana PO Amritapuri 690525 Kerala India Univ Melbourne Sch Comp & Informat Syst Cloud Comp & Distributed Syst Clouds Doug McDonell BldgParkville Campus Melbourne Parkville Vic 3010 Australia
the technologies for real-time multimedia transmission and immersive 3D gaming applications are rapidly emerging, posing challenges in terms of performance, security, authentication, data privacy, and encoding. the co... 详细信息
来源: 评论
WAPI Network for Novel Intelligent Services of Substations in Smart Grid. application Analysis and Overview  5
WAPI Network for Novel Intelligent Services of Substations i...
收藏 引用
5th IEEE International Electrical and Energy conference, CIEEC 2022
作者: Wang, Li Chen, Liming Suo, Siliang Ren, Weizhi Dispatching Center China Southern Power Grid Guangzhou China Electric Power Research Institute China Southern Power Grid Guangzhou China
With the advancement of the construction of smart grids and digital grids, new smart services represented by smart patrols, smart safety monitoring, and mobile office have emerged in substations. these services genera... 详细信息
来源: 评论
PBFT Consensus Mechanism for Human Resource Offboarding Procedures Based on Blockchain Technology  5th
PBFT Consensus Mechanism for Human Resource Offboarding Proc...
收藏 引用
5th International conference on Trends in Computational and Cognitive Engineering, TCCE 2023
作者: Chanda, Priya Singh, Pritpal Chhibber, Priyanka Ghosh, Sukanta Mittal School of Business Lovely Professional University Phagwara India School of Computer Application Lovely Professional University Phagwara India
Blockchain technology has garnered considerable attention for its potential to transform various industries, including the realm of human resources (HR). this article suggests a novel blockchain-based offboarding fram... 详细信息
来源: 评论
Research on the application of Local Differential privacy: A Survey
Research on the Application of Local Differential Privacy: A...
收藏 引用
Big data & Artificial Intelligence & Software Engineering (ICBASE), International conference on
作者: Ying Cao Hua Shen School of Computer Science Hubei University of Technology Wuhan Hubei China
In this age of information explosion, people are fully aware of the great value of data and pay more and more attention to protecting personal privacy. therefore, fully exploring the value of data without revealing us... 详细信息
来源: 评论
Research on Tax data Sharing and privacy Protection Mechanism Based on Blockchain Technology
Research on Tax Data Sharing and Privacy Protection Mechanis...
收藏 引用
Power Electronics, Computer applications (ICPECA), IEEE International conference on
作者: Zhaochen Wang Dalian University of Finance and Economics Dalian China
In the context of digital reform., tax data sharing and privacy protection have gradually become important issues. With the distributed architecture., tamper proof data., and high transparency of blockchain technology... 详细信息
来源: 评论
the Cost of OSCORE and EDHOC for Constrained Devices  21
The Cost of OSCORE and EDHOC for Constrained Devices
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Hristozov, Stefan Huber, Manuel Xu, Lei Fietz, Jaro Liess, Marco Sigl, Georg Fraunhofer AISEC Garching Germany Microsoft Vancouver BC Canada Tech Univ Munich Munich Germany
Many modern IoT applications rely on the Constrained application Protocol (CoAP). Recently, the Internet Engineering Task Force (IETF) proposed two novel protocols for securing it. these are: 1) Object security for Co... 详细信息
来源: 评论
Research on University Sports Information Management System Based on Big data and Cloud Computing  5
Research on University Sports Information Management System ...
收藏 引用
5th International conference on Computers, Information Processing and Advanced Education, CIPAE 2024
作者: Lei, Ming Wang, Yong YiBin Vocational and Technical College Sichuan Yibin China
this paper proposes a sports information management system based on Hadoop platform, which integrates convolutional neural network (CNN) technology to achieve efficient data management and intelligent decision support... 详细信息
来源: 评论
Exploring Human Intention Recognition Based on Human Robot Collaboration Manufacturing toward Safety Production  5
Exploring Human Intention Recognition Based on Human Robot C...
收藏 引用
5th International conference on Artificial Intelligence and Computer Science, AICS 2023
作者: Wang, Bo Xiao, Jinhua School of Transportation and Logistics Engineering Wuhan University of Technology No.1178 Heping Street Wuhan430063 China
With the widespread application of collaborative robots in automated production, it is necessary to improve human safety that has become a noteworthy issue in human-robot collaboration (HRC) manufacturing process. thi... 详细信息
来源: 评论
CODASPY 2017 - proceedings of the 7th acm conference on data and application security and privacy
CODASPY 2017 - Proceedings of the 7th ACM Conference on Data...
收藏 引用
7th acm conference on data and application security and privacy, CODASPY 2017
the proceedings contain 41 papers. the topics discussed include: Ghostbuster: a fine-grained approach for anomaly detection in file system accesses;mining attributed graphs for threat intelligence;statistical security...
来源: 评论