咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是501-510 订阅
排序:
the Internet of things’ (IOT) Dynamic Evolution
The Internet of Things’ (IOT) Dynamic Evolution
收藏 引用
IEEE International conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON)
作者: Ifeoma B. Asianuba Ugochukwu Nnamdi Electrical and Electronic Engineering University of Port Harcourt Port Harcourt Nigeria Center for Information and Telecommunication Engineering Uniport Port Harcourt Nigeria
the Internet of things (IoT) has revolutionized the way physical devices, appliances, vehicles, and objects interact and exchange data over the Internet. this paper provides a comprehensive overview of IoT, covering i... 详细信息
来源: 评论
27th Nordic conference on Secure IT Systems, NordSec 2022
27th Nordic Conference on Secure IT Systems, NordSec 2022
收藏 引用
27th Nordic conference on Secure IT Systems, NordSec 2022
the proceedings contain 20 papers. the special focus in this conference is on Secure IT Systems. the topics include: GPU-FAN: Leaking Sensitive data from Air-Gapped Machines via Covert Noise from GPU Fa...
来源: 评论
A Review on the Integration of Artificial Intelligence in Healthcare
A Review on the Integration of Artificial Intelligence in He...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 International conference on
作者: Amrita Verma Pargaien Saurabh Pargaien Akbar Nawaz Tushar Kumar Graphic Era Hill University Bhimtal India Graphic Era Hill University Bhimtal Uttarakhand Graphic Era Deemed to be University Dehradun
Artificial Intelligence (AI) is increasingly influential in health care, offering potential enhancements in diagnosis, patient care, and treatment therapies. By utilizing large datasets and sophisticated algorithms, A... 详细信息
来源: 评论
HOPPy: Holistic ontology for privacy-preserving in smart healthcare environment  5
HOPPy: Holistic ontology for privacy-preserving in smart hea...
收藏 引用
5th World conference on Smart Trends in Systems security and Sustainability, WorldS4 2021
作者: El Majdoubi, Driss El Bakkali, Hanan Sadki, Souad Leghmid, Asmae Maqour, Zaina Mohammed v University in Rabat Smart Systems Laboratory-Rabat IT Center
Nowadays, the Internet of things (IoT) have a great impact on improving the quality of patients' lives and offering advanced healthcare services. In this context, Smart Healthcare (S-healthcare) is an important do... 详细信息
来源: 评论
application of GBDT Integrated Algorithm in Financial data security Risk Prediction
Application of GBDT Integrated Algorithm in Financial Data S...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Zeng, Jieqian Hainan Polytechnic Hainan Haikou570216 China
Financial data is usually high-dimensional and contains a large amount of information such as financial indicators, transaction records, and personnel permissions. Traditional machine learning models are susceptible t... 详细信息
来源: 评论
5th International conference on Big data and security, ICBDS 2023
5th International Conference on Big Data and Security, ICBDS...
收藏 引用
5th International conference on Big data and security, ICBDS 2023
the proceedings contain 18 papers. the special focus in this conference is on Big data and security. the topics include: Development of U-net Neural Network for Biomedical Images with Big data;Research on Implementati...
来源: 评论
A Robust medical data sharing application with a collaborative hypothesis and Elastic net regression model  5
A Robust medical data sharing application with a collaborati...
收藏 引用
5th International conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Naidu, J.N.S.S. Janardhana Ganesh, E.N. Reddy, Nagaraj Doddam Sankaran, Mahesh Chennai India
Clinical data and records are the main data to help various customized applications like clinical proof, protection, digital data and criminal personality. Different blockchain and conventional methodology have been c... 详细信息
来源: 评论
SteemOps: Extracting and Analyzing Key Operations in Steemit Blockchain-based Social Media Platform  21
SteemOps: Extracting and Analyzing Key Operations in Steemit...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Li, Chao Palanisamy, Balaji Xu, Runhua Xu, Jinlai Wang, Jingzhe Beijing Jiaotong Univ Beijing Key Lab Secur & Privacy Intelligent Trans Beijing Peoples R China Univ Pittsburgh Sch Comp & Informat Pittsburgh PA USA IBM Almaden Res Ctr San Jose CA USA
Advancements in distributed ledger technologies are driving the rise of blockchain-based social media platforms such as Steemit, where users interact with each other in similar ways as conventional social networks. th... 详细信息
来源: 评论
5th International conference on Big data and security, ICBDS 2023
5th International Conference on Big Data and Security, ICBDS...
收藏 引用
5th International conference on Big data and security, ICBDS 2023
the proceedings contain 18 papers. the special focus in this conference is on Big data and security. the topics include: Development of U-net Neural Network for Biomedical Images with Big data;Research on Implementati...
来源: 评论
Research on Setting of Two Firewall Rules Based on Ubuntu Linux System  5
Research on Setting of Two Firewall Rules Based on Ubuntu Li...
收藏 引用
5th International conference on Computer Network, Electronic and Automation, ICCNEA 2022
作者: Ma, Limei Zhao, Dongmei Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
'security first' is the most concerned issue of Linux administrators. security refers to the integrity of data. the authentication security and integrity of data are higher than the privacy security of data. F... 详细信息
来源: 评论