咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是561-570 订阅
排序:
application of Unsupervised Learning Algorithms in Environmental Factor Correlation Analysis and Model Construction
Application of Unsupervised Learning Algorithms in Environme...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Zhao, Yu Zhang, Ting Xinjiang Shengyuan Xianghe Environmental Protection Engineering Co. Ltd. Xinjiang Urumqi China
As environmental protection issues become more serious, scientists and policy makers are in urgent need of efficient tools to analyze and manage environmental data. this study explores the application of unsupervised ... 详细信息
来源: 评论
Secure Remote Monitoring and Cipher data Sharing for IoT Healthcare System with privacy Preservation  21
Secure Remote Monitoring and Cipher Data Sharing for IoT Hea...
收藏 引用
5th International conference on Cloud and Big data Computing, ICCBDC 2021
作者: Jin, Yong Tomoishi, Masahiko Yamai, Nariyoshi Tokyo Institute of Technology Japan Tokyo University of Agriculture and Technology Japan
With the increase of Internet connected IoT devices, remote monitoring and data sharing have become a new trend of IoT healthcare systems. the top three concerns in an IoT system are scalability, secure communication ... 详细信息
来源: 评论
Efficient data Sharing using Multi-authority Attribute Based Encryption in Blockchain  5
Efficient Data Sharing using Multi-authority Attribute Based...
收藏 引用
5th International conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Kirupanithi, D.Nancy Antonidoss, A. Hindustan Institute of Technology and Science Department of Computer Science and Engineering India
the process of data exchange relies heavily on attribute-based encryption. the secret key can be shared with other users for transactions and it does not contain any user-related data. the attribute authority creates ... 详细信息
来源: 评论
Survey on Radio Frequency Identification security and Attacks  5
Survey on Radio Frequency Identification Security and Attack...
收藏 引用
5th International conference on Future Networks and Distributed Systems: the Premier conference on Smart Next Generation Networking Technologies, ICFNDS 2021
作者: Alshammri, Turki Albakheet, Mohammed Kateeb, Ibraheem Qassim University Computer Engineering Saudi Arabia
RFID technology offers tracking capabilities in locating people, items, animals in real-time, and provides accurate and efficient access to reliable medical data/ patient's details to nurses/doctors. Healthcare or... 详细信息
来源: 评论
Research on Cross-site Scripting Vulnerability of XSS Based on International Student Website  5
Research on Cross-site Scripting Vulnerability of XSS Based ...
收藏 引用
5th International conference on Computer Network, Electronic and Automation, ICCNEA 2022
作者: Wang, Tianma Zhao, Dongmei Qi, Jianjun International Education Institute North China Electric Power University Beijing China Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
the international student website is the window of the school's external publicity. through the website, international students can understand the school in a wider range and in all aspects. the website is often a... 详细信息
来源: 评论
SafeHome: Automation and security System Using Internet of things with Mobile application  5
SafeHome: Automation and Security System Using Internet of T...
收藏 引用
5th International conference on Advanced Research in Computing, ICARC 2025
作者: Abas, Patricia A. Reyes, Bryll Christopher O. Serquina, Jazzy Niega, Juliet O. Medina, Oliver A. National University - Philippines Department of Computer Engineering Calamba City Philippines
the rapid advancements in Internet of things (IoT) technology have transformed home automation and security, addressing the demand for convenience, comfort, and energy efficiency. Despite global market growth, barrier... 详细信息
来源: 评论
Design and application of English Grammar Automatic Correction System Based on Machine Learning
Design and Application of English Grammar Automatic Correcti...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Wei, Hua Jiangxi Vocational College of Foreign Studies Jiangxi Nanchang330099 China
English grammatical errors frequently affect the clarity of information transmission, and an effective automatic error correction system is urgently needed. this paper aims to design an English grammar automatic error... 详细信息
来源: 评论
Status Quo Intelligent Evaluation of the Network security Legal Awareness: Modelling and Simulations  5
Status Quo Intelligent Evaluation of the Network Security Le...
收藏 引用
5th International conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Liu, Dapeng Wang, Jingna Shaanxi Business College Shaanxi Xi'an710119 China
Status quo intelligent evaluation of the network security legal awareness with modeling and simulations is studied in this paper. through the security risk assessment of the network system, various network security is... 详细信息
来源: 评论
Intelligent Fault Identification System Integrating Artificial Intelligence and Power Big data
Intelligent Fault Identification System Integrating Artifici...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Xiaokaiti, Maihebubai Jia, Junqiang Yang, Lina State Grid Xinjiang Information and Telecommunication Company Xinjiang Urumqi830000 China
this study constructs an intelligent fault identification system based on the fusion of artificial intelligence and power big data to improve the efficiency and accuracy of fault detection. First, various data from th... 详细信息
来源: 评论
application of 3D CAD technology in automotive machinery design
Application of 3D CAD technology in automotive machinery des...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Zhuang, Yanyan Yao, Chunling Shandong Business Institute Yantai264000 China
this study systematically discusses the innovative application of 3D CAD technology in automotive machinery design, and constructs a closed-loop design system from parametric modeling to multi-physics simulation. At t... 详细信息
来源: 评论