咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是441-450 订阅
排序:
Balancing Innovation and privacy: data security Strategies in Natural Language Processing applications
Balancing Innovation and Privacy: Data Security Strategies i...
收藏 引用
Machine Learning and Computer application (ICMLCA), International conference on
作者: Shaobo Liu Guiran Liu Binrong Zhu Yuanshuai Luo Linxiao Wu Rui Wang University of Southern California Los Angeles USA San Francisco State University San Francisco USA Southwest Jiaotong University Chengdu China Columbia University New York USA Carnegie Mellon University Pittsburgh USA
this research addresses privacy protection in Natural Language Processing (NLP) by introducing a novel algorithm based on differential privacy, aimed at safeguarding user data in common applications such as chatbots, ... 详细信息
来源: 评论
Based on Inner Product Function Encryption Secure Cross-Modal Retrieval
Based on Inner Product Function Encryption Secure Cross-Moda...
收藏 引用
Machine Learning and Computer application (ICMLCA), International conference on
作者: Jiaoling Chen Wanxi Yan Wenyu Qin Zishun Ni School of Mathematics and Statistics Fuzhou University Fuzhou Fujian Province China
As big data rapidly advances, the importance of cross-modal retrieval systems that protect user privacy becomes increasingly significant. Current common secure cross-modal retrieval methods primarily achieve privacy p... 详细信息
来源: 评论
Research on Information security Architecture under the New Generation Marketing System  5
Research on Information Security Architecture under the New ...
收藏 引用
5th International conference on Computer Information Science and Artificial Intelligence, CISAI 2022
作者: Yang, Shuang Wang, Haomiao Wang, Tianbo Wang, Zhibin Kang, Naidi State Grid Liaoning Electric Power Co. LTD Liaoning Shenyang110006 China State Grid Liaoning Electric Power Co. LTD. Marketing Service Center. Liaoning Shenyang110168 China
Under the background of today's era, the development of power grid intelligence is an inevitable trend in the development of power companies. In this process, what the power industry needs to do is to do a good jo... 详细信息
来源: 评论
A Lightweight security Technique for Processing Large data Over a Distributed Cloud Environment  23
A Lightweight Security Technique for Processing Large Data O...
收藏 引用
proceedings of the 5th International conference on Information Management & Machine Intelligence
作者: Vivek Saxena Shiladitya Bhattacharjee Deepika Saxena computer science engineering PIET Jaipur India School of Computer Science UPES Dehradun India Poornima University Jaipur India
It is never easy to guarantee data security when processing on a distributed cloud platform. data integrity and privacy are the two most crucial issues in any cloud-based data processing system. Various errors and sec... 详细信息
来源: 评论
Secure Android Location Tracking application with privacy Enhanced Technique  5
Secure Android Location Tracking Application with Privacy En...
收藏 引用
5th International conference on Computational Intelligence and Communication Technologies, CCICT 2022
作者: Dhinakaran, D. Rajesh Khanna, M. Panimalar, S.P. Anish, P. Pradeep Kumar, S. Sudharson, K. Velammal Institute of Technology Department of Information Technology Chennai India Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College Department of Information Technology Chennai India Saveetha Engineering College Department of Information Technology Chennai India R.M.K College of Engineering and Technology Department of Cse Chennai India Saveetha School of Engineering Simats Department of Computer Science and Engineering Chennai India
In today's world, tracking the position of an Android device has become a must. there have been a slew of effective retrieval strategies, such as Google's Find My Device, but they fall short in some situations... 详细信息
来源: 评论
Research of Identity privacy-preserving Scheme Based on CP-ABE  21
Research of Identity Privacy-preserving Scheme Based on CP-A...
收藏 引用
5th International conference on Electronic Information Technology and Computer Engineering, EITCE 2021
作者: Yu, Yang Department of Information Engineering Engineering University of PAP Xi'an Shaanxi China
data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. According to cloud computing privacy prot... 详细信息
来源: 评论
Linking Biometric Voice Identity with Self-monitoring Health data as a Temporal-spatial Event Stored in a Mobile Device  7th
Linking Biometric Voice Identity with Self-monitoring Health...
收藏 引用
7th International conference on Information Systems security and privacy (ICISSP)
作者: Sy, Bon City U NY Grad Ctr 365 5th Ave New York NY 11361 USA City U NY Queens Coll 65-30 Kissena Blvd Queens NY 11367 USA SIPPA Solut 42-06A Bell Blvd Queens NY 11361 USA
the goal of this research is to investigate a biometric solution that links biometric personal identity to selfmonitoring data, with time and location information, as a temporal-spatial event in a personal health reco... 详细信息
来源: 评论
CCIOT 2022 - 2022 7th International conference on Cloud Computing and Internet of things
CCIOT 2022 - 2022 7th International Conference on Cloud Comp...
收藏 引用
7th International conference on Cloud Computing and Internet of things, CCIOT 2022
the proceedings contain 11 papers. the topics discussed include: fast multi-label tumor classification based on homomorphic encryption;SecMesh: an efficient information security method for stream processing in edge-fo...
来源: 评论
A software-defined security middle platform architecture  22
A software-defined security middle platform architecture
收藏 引用
5th International conference on Computer Science and Software Engineering, CSSE 2022
作者: Qiu, Rixuan Qin, Yongtai Li, Yuancheng Zhou, Xin Fu, Junfeng Li, Wei Yan, Juan Shi, Jie State Grid Jiangxi Information & Telecommunication Company China School of Control and Computer Engineering North China Electric Power University China State Grid Jiangxi Electric Power Company Yingtan Power Supply Branch China Co. Ltd. China
In recent years, with the increase in the variety of communication devices, as well as the rapid development of the Internet of things, edge computing, and machine learning, the existing security solutions can neither... 详细信息
来源: 评论
EPV-PBFT: PBFT Improved Consensus Algorithm for Sensor Networks  5
EPV-PBFT: PBFT Improved Consensus Algorithm for Sensor Netwo...
收藏 引用
5th International conference on Applied Machine Learning, ICAML 2023
作者: Guo, Shangkun Yao, Zhongyuan Zhang, Yong Wang, Chao Guo, Xiaohan Si, Xueming Research Institute of Frontier Information Technology Zhongyuan University of Technology Zhengzhou450007 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450007 China Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou450007 China
the decentralization and non-tampering characteristics of blockchain technology provide new ideas for solving the security and scalability problems in sensor networks. However, there are still some obstacles to the ap... 详细信息
来源: 评论