咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是471-480 订阅
排序:
Research on privacy protection scheme based on data fuzzy processing  23
Research on privacy protection scheme based on data fuzzy pr...
收藏 引用
proceedings of the 2023 5th International conference on Internet of things, Automation and Artificial Intelligence
作者: Yewen Fu Yongzheng Li Zhexue Jin Network information Security Laboratory Yanbian University Engineering College China
the continuous development of cloud storage has brought unprecedented convenience to people's lives. However, along with the convenience, it also brings certain security risks. Cloud data can be maliciously used, ...
来源: 评论
A Review of data-Driven Approaches with Emphasis on Machine Learning Base Intrusion Detection Algorithms  5
A Review of Data-Driven Approaches with Emphasis on Machine ...
收藏 引用
5th International conference on Information Technology for Education and Development, ITED 2022
作者: Musa, Maryam Abdullahi Gital, Abdulsalam Ya'U Ibrahim, Kabiru Musa Chiroma, Haruna Abdulrahman, Mustapha Lawal Umar, Ibrahim Muhammad Abubakar Tafawa Balewa University Department of Mathematical Science Bauchi Nigeria Abubakar Tafawa Balewa University Department of Management Information Technology Bauchi Nigeria Department University of Hafr Al Batin Saudi Arabia
the importance of the internet across the globe cannot be over-emphasized as such network security is essential to curb future attack occurrences. Cyber-attacks like DDoS and Ransomware yielded a lot of damage to conn... 详细信息
来源: 评论
Research on data Protection of Electric Power Marketing Based on Differential privacy
Research on Data Protection of Electric Power Marketing Base...
收藏 引用
Machine Learning and Computer application (ICMLCA), International conference on
作者: Yimin Wang Lei Zhao Ziyue Yang Yulong Ma Haoyou Han Lingxuan Tian Congdong Lv Jiangsu Electric Power co. LTD State Grid Corporation of China Nanjing China Nanjing Yishu Information Technology co. LTD Nanjing China Nanjing Audit University Nanjing China
In this paper, we proposed an improved electricity marketing data protection algorithm based on differential privacy, aiming to address several challenges faced by traditional differential privacy mechanisms in practi... 详细信息
来源: 评论
application of Edge Computing in Investigation and Interrogation  21
Application of Edge Computing in Investigation and Interroga...
收藏 引用
5th International conference on Electronic Information Technology and Computer Engineering, EITCE 2021
作者: Gong, Siyuan Chen, Xiang People's Public Security University of China Beijing China
Under the background of the trial-centered litigation system reform, the investigation and interrogation work, as the basic link before trial in criminal proceedings, has required higher standards of evidence collecti... 详细信息
来源: 评论
Ensuring security of encrypted information by hybrid AES and RSA algorithm with third-party confirmation  5
Ensuring security of encrypted information by hybrid AES and...
收藏 引用
5th International conference on Intelligent Computing and Control Systems, ICICCS 2021
作者: Al Mamun, S. Mahmood, Md. Ashiq Amin, Md Ashiqul Institute of Information and Communication Technology Khulna University of Engineering Technology Khulna Bangladesh School of Informatics Computing and Cyber System Northern Arizona University AZ United States
Information transmission security and wellbeing is an intriguing issue right now. secure information transmission alludes to the exchange of information, for example, private or exclusive data over a safe channel. Man... 详细信息
来源: 评论
LEChain:Linear Credit Evaluation System Based on Hyperledger Fabric Blockchain  22
LEChain:Linear Credit Evaluation System Based on Hyperledger...
收藏 引用
proceedings of the 2022 5th International conference on Blockchain Technology and applications
作者: Yuncheng Qiao Linhai Cheng Qiujun Lan Yiran Wang Business School Hunan University China
data sharing among different institutions can enhance the integrity of information to evaluate the credit level of financing enterprises more accurately, but it also faces the problems of privacy leakage and data frau... 详细信息
来源: 评论
Fingerprint Presentation Attack Detection Algorithm  5
Fingerprint Presentation Attack Detection Algorithm
收藏 引用
5th National conference of Saudi Computers Colleges, NCCC 2022
作者: Alsubhi, Alaa Alsufyani, Nawal Cyber Security Computers and Information Technology Taif University Taif Saudi Arabia
Given the growing interest in security systems, researchers and developers are continually devising new methods of using biometrics, in particular fingerprints. However, hackers have discovered a flaw in the fingerpri... 详细信息
来源: 评论
Formal Analysis of ReBAC Policy Mining Feasibility  21
Formal Analysis of ReBAC Policy Mining Feasibility
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Chakraborty, Shuvra Sandhu, Ravi Univ Texas San Antonio Inst Cyber Secur ICS San Antonio TX 78249 USA Univ Texas San Antonio NSF Ctr Secur & Privacy Enhanced Cloud Comp C SPE Dept Comp Sci San Antonio TX 78249 USA
Relationship-Based Access Control (ReBAC) expresses authorization in terms of various direct and indirect relationships amongst entities, most commonly between users. the need for ReBAC policy mining arises when an ex... 详细信息
来源: 评论
Anomaly Detection in IoT Networks: Leveraging Federated Learning for Real-Time threat Response
Anomaly Detection in IoT Networks: Leveraging Federated Lear...
收藏 引用
Global conference for Advancement in Technology (GCAT)
作者: Shiva Mehta Sunila Choudhary Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Rajpura Punjab India Chitkara Centre for Research and Development Chitkara University Himachal Pradesh
the impressive growth of the Internet of things has produced considerable security challenges because of the heterogeneity of different devices and data volumes. this research article introduces an elaborate Internet ... 详细信息
来源: 评论
An Intelligent Doorbell Design Using Federated Deep Learning  21
An Intelligent Doorbell Design Using Federated Deep Learning
收藏 引用
3rd acm India Joint International conference on data Science and Management of data (CODS-COMAD)
作者: Patel, Vatsal Kanani, Sarth Pathak, Tapan Patel, Pankesh Ali, Muhammad Intizar Breslin, John Pandit Deendayal Petr Univ Gandhinagar Gujarat India NUI Galway Data Sci Inst Confirm SFI Res Ctr Smart Mfg Galway Ireland
Smart doorbells have been playing an important role in protecting our modern homes. Existing approaches of sending video streams to a centralized server (or Cloud) for video analytics have been facing many challenges ... 详细信息
来源: 评论