咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是431-440 订阅
排序:
Clustering of Network Traffic: A Comparative Study  5
Clustering of Network Traffic: A Comparative Study
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: Sharma, Khushboo Kumar, Arvind Vivekananda Global University Department of Electrical Engineering Jaipur India Chandigarh Engineering College Department of Mechanical Engineering Jhanjeri India
For network security applications, accurate network traffic categorization is essential. Due to the prevalence of programmes that use energetic ports and encryption to evade detection, there are certain drawbacks to e... 详细信息
来源: 评论
A dynamic cache placement policy for NDN based on programmable data plane  5
A dynamic cache placement policy for NDN based on programmab...
收藏 引用
5th International conference on Computer Information Science and application Technology, CISAT 2022
作者: Zha, Yuli Cui, Pengshuai Hu, Yuxiang Lan, Julong Information Engineering University No.62 Science Avenue Zhongyuan District Henan Zhengzhou450000 China
To address the problems of low cache hit ratio and high routing hops to obtain content in Named data Networking (NDN), this paper proposes a Cache placement Policy based on Dynamic Popularity (DPCP). When the requeste... 详细信息
来源: 评论
Research on Business Consistency Verification Techniques for Energy Big data privacy Protection
Research on Business Consistency Verification Techniques for...
收藏 引用
International conference on Computer Engineering and applications (ICCEA)
作者: Xiuli Huang Pengfei Yu Yujia Zhai State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co. LTD Nanjing China
In this paper, we study the consistency verification technology for multi-party collaborative privacy-preserving operations of energy big data, and propose a consistency assessment algorithm based on minimum hash sign... 详细信息
来源: 评论
privacy-Preserving Oriented Design for Multi-Modality Models using FL
Privacy-Preserving Oriented Design for Multi-Modality Models...
收藏 引用
IEEE International conference on Trust, privacy and security in Intelligent Systems and applications (TPS-ISA)
作者: Mohammed Alduniawi Kemal Akkaya Ruimin Sun Knight Foundation School of Computing and Information Sciences Florida International University Miami United States
Mobile apps increasingly use federated learning for the convenience of training, user privacy preservation, and ease to regulation compliance. Recent models consider multi- modality, including text, image, and audio, ...
来源: 评论
Ring Learning with Error-Based Encryption Scheme for the privacy of Electronic Health Records Management  5
Ring Learning with Error-Based Encryption Scheme for the Pri...
收藏 引用
5th International conference on Information Technology for Education and Development, ITED 2022
作者: Abdulkadir, Umar Waziri, Victor Onomza Alhassan, John Kolo Ismaila, Idris Federal University of Technology Minna Nigeria
the electronic health (e-health) systems support a range of electronic devices, wireless links, transmission and storage of data. E-health systems allows communication through a gateway (or central point) in the cloud... 详细信息
来源: 评论
privacy computing technology in the context of energy Internet
Privacy computing technology in the context of energy Intern...
收藏 引用
International conference on Communications, Information System and Computer Engineering (CISCE)
作者: Yue Gong Cuiyun Chen Zhiyu Liu The First Research Institute of the Ministry of Public Security of P.R.C Beijing China
the power system and other energy systems are constantly cross-integrated, and a new development direction of multi-subject collaboration is gradually formed. Starting from the typical mode of energy Internet collabor...
来源: 评论
proceedings - 2022 5th International conference on Computational Intelligence and Communication Technologies, CCICT 2022
Proceedings - 2022 5th International Conference on Computati...
收藏 引用
5th International conference on Computational Intelligence and Communication Technologies, CCICT 2022
the proceedings contain 95 papers. the topics discussed include: identification of diseases in cassava leaves using convolutional neural network;nutrition monitoring and health awareness system based on crowd sourced ...
来源: 评论
privacy-Preserving Swarm Learning Based on Lightweight Homomorphic Encryption and Blockchain Technology
Privacy-Preserving Swarm Learning Based on Lightweight Homom...
收藏 引用
IEEE Eurasia conference on IOT, Communication and Engineering (ECICE)
作者: Yong Li Haichao Ling Xianglin Ren Chun Yu Tongtong Liu School of Computer Science Changchun University of Technology Changchun China Non-commissioned Officer School of Army Academy of Armored Forces Changchun China
A decentralized solution called swarm learning integrates blockchain into machine learning with distributed data sources and computing power. the security of blockchain is inherited and the security and privacy of dat...
来源: 评论
An Analysis of Different Cryptocraphy Techniques and the Role of Coding and Information theories in Overcoming security threats  5
An Analysis of Different Cryptocraphy Techniques and the Rol...
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: Shakeel, Mohammed Sirisha, A. Joshi, Ankita Ushasree, R. Vaishnavi, M. Verma, Devvret Invertis University Faculty of Computer Applications Rajau Paraspur Uttar Pradesh Bareilly India Department of Information Technology Andra Pradesh Visakhapatnam India Uttaranchal University Uttarakhand Dehradun India Dayananda Sagar Academy of Technology & Management VTU Department of MCA India CSE Bannari Amman Institute of Technology Tamil Nadu Erode India Graphic Era Deemed to Be University Department of Biotechnology Uttarakhand Dehradun India
In order to maintain the privacy and secrecy of information, security is essential. there are numerous encryption techniques available to safeguard data while it is being transmitted or stored. Communication security ... 详细信息
来源: 评论
Enabling data Interoperability for Decentralized, Smart, and Connected Health applications  23
Enabling Data Interoperability for Decentralized, Smart, and...
收藏 引用
proceedings of the 8th acm/IEEE International conference on Connected Health: applications, Systems and Engineering Technologies
作者: Oshani Seneviratne Rensselaer Polytechnic Institute Troy NY USA
the digitization of healthcare is increasing, providing a wealth of data that can improve patient care and outcomes. However, different systems and formats often silo this data, presenting a significant challenge to a... 详细信息
来源: 评论