咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是451-460 订阅
排序:
EPV-PBFT: PBFT Improved Consensus Algorithm for Sensor Networks  5
EPV-PBFT: PBFT Improved Consensus Algorithm for Sensor Netwo...
收藏 引用
5th International conference on Applied Machine Learning, ICAML 2023
作者: Guo, Shangkun Yao, Zhongyuan Zhang, Yong Wang, Chao Guo, Xiaohan Si, Xueming Research Institute of Frontier Information Technology Zhongyuan University of Technology Zhengzhou450007 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450007 China Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou450007 China
the decentralization and non-tampering characteristics of blockchain technology provide new ideas for solving the security and scalability problems in sensor networks. However, there are still some obstacles to the ap... 详细信息
来源: 评论
Proceeding - COMNETSAT 2023: IEEE International conference on Communication, Networks and Satellite
Proceeding - COMNETSAT 2023: IEEE International Conference o...
收藏 引用
12th IEEE International conference on Communication, Networks and Satellite, COMNETSAT 2023
the proceedings contain 107 papers. the topics discussed include: comparison of three border positioning (TBP) and least square estimation (LSE) algorithm towards indoor positioning system (IPS);classification of topi...
来源: 评论
Research and analysis of the security risk management strategy of big data technology in the financial industry  23
Research and analysis of the security risk management strate...
收藏 引用
proceedings of the 2023 5th International conference on Big data Engineering
作者: Wenjun Ji Maanshan Vocational and Technical college China
With the continuous deepening of financial business informationization, the rapid spread of all kinds of financial data, promoting the financial field to enter the era of big data, and the structural transformation an... 详细信息
来源: 评论
Design for security Configuration of Remote Management MultiVLAN Switch Based on VLAN Trunking Protocol  5
Design for Security Configuration of Remote Management Multi...
收藏 引用
5th International conference on Computer Information Science and application Technology, CISAT 2022
作者: Long, Zhi Guangzhou College of Applied Science and Technology Zengcheng District Guangzhou511370 China
As the communication network technology develops, the switch is of special importance in the secure communication configuration. A switch can be connected to the computer directly through the "Console" port ... 详细信息
来源: 评论
Learning to Limit data Collection via Scaling Laws: A Computational Interpretation for the Legal Principle of data Minimization  22
Learning to Limit Data Collection via Scaling Laws: A Comput...
收藏 引用
5th acm conference on Fairness, Accountability, and Transparency, FAccT 2022
作者: Shanmugam, Divya Diaz, Fernando Shabanian, Samira Finck, Michele Biega, Asia Massachusetts Institute of Technology CambridgeMA United States Microsoft Research Montreal Canada University of Tuebigen Germany Max Planck Institute for Security and Privacy Bochum Germany
Modern machine learning systems are increasingly characterized by extensive personal data collection, despite the diminishing returns and increasing societal costs of such practices. Yet, data minimisation is one of t... 详细信息
来源: 评论
data Protection Measures in E-Society: Policy Implications of British data Protection Act to China  2021
Data Protection Measures in E-Society: Policy Implications o...
收藏 引用
5th International conference on E-Society, E-Education and E-Technology, ICSET 2021
作者: Guo, Yuanyuan School of Government Beijing Normal University China
*Big data-related topics are very fashionable in recent years. However, the problems brought by big data are also emerging one after another. For example, the big data society has brought social security, personal pri... 详细信息
来源: 评论
Wireless Sensor Network Using IOT security: Architecture, Challenges and Proposed Model  5
Wireless Sensor Network Using IOT Security: Architecture, Ch...
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: Verma, Abhishek Singh, Akhilesh Chauhan, Anurag Rana, Arun Kumar Galgotias College of Engineering and Technology Dept. of Computer Science and Engineering Greater Noida India
Cloud computing, near-field communication, wireless cellular networks, etc. are only a few of the associated technological advancements that have gained widespread market adoption in relation to the Internet of things... 详细信息
来源: 评论
Role-Based Deception in Enterprise Networks  21
Role-Based Deception in Enterprise Networks
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Anjum, Iffat Zhu, Mu Polinsky, Isaac Enck, William Reiter, Michael K. Singh, Munindar P. North Carolina State Univ Raleigh NC 27695 USA Duke Univ Durham NC USA
Historically, enterprise network reconnaissance is an active process, often involving port scanning. However, as routers and switches become more complex, they also become more susceptible to compromise. From this van... 详细信息
来源: 评论
5th International Symposium on Big data and Applied Statistics, ISBDAS 2022
5th International Symposium on Big Data and Applied Statisti...
收藏 引用
2022 5th International Symposium on Big data and Applied Statistics, ISBDAS 2022
the proceedings contain 37 papers. the topics discussed include: research on graph classification based on improved metric learning;technology strategy for meticulous governance of smart cities: memory bus width aware...
来源: 评论
Machine Unlearning Survey  5
Machine Unlearning Survey
收藏 引用
5th International conference on Mechatronics and Computer Technology Engineering, MCTE 2022
作者: Jiang, Yiwen Liu, Shenglong Zhao, Tao Li, Wei Gao, Xianzhou Big Data Center of State Grid Corporation of China Beijing China Zhejiang Xiyou Information Technology Co. Ltd Nanjing China Global Energy Interconnection Research Institute Co. Ltd Nanjing China
Many online platforms have widely deployed machine learning models as a service. Many of these applications require users to upload their data for model training, but it also induces privacy risks. Once the user wants... 详细信息
来源: 评论