咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是571-580 订阅
排序:
Status Quo Intelligent Evaluation of the Network security Legal Awareness: Modelling and Simulations  5
Status Quo Intelligent Evaluation of the Network Security Le...
收藏 引用
5th International conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Liu, Dapeng Wang, Jingna Shaanxi Business College Shaanxi Xi'an710119 China
Status quo intelligent evaluation of the network security legal awareness with modeling and simulations is studied in this paper. through the security risk assessment of the network system, various network security is... 详细信息
来源: 评论
application of 3D CAD technology in automotive machinery design
Application of 3D CAD technology in automotive machinery des...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Zhuang, Yanyan Yao, Chunling Shandong Business Institute Yantai264000 China
this study systematically discusses the innovative application of 3D CAD technology in automotive machinery design, and constructs a closed-loop design system from parametric modeling to multi-physics simulation. At t... 详细信息
来源: 评论
Home-School Collaborative Smart System Based on Video Transmission and Information Compression  5
Home-School Collaborative Smart System Based on Video Transm...
收藏 引用
5th International conference on Computing Methodologies and Communication, ICCMC 2021
作者: Yang, Yubei ChongQing University of Education 400067 China
Home-school collaborative smart system based on video transmission and information compression is designed and implemented in this paper. therefore, designing an objective and accurate video quality evaluation method ... 详细信息
来源: 评论
Intelligent Fault Identification System Integrating Artificial Intelligence and Power Big data
Intelligent Fault Identification System Integrating Artifici...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Xiaokaiti, Maihebubai Jia, Junqiang Yang, Lina State Grid Xinjiang Information and Telecommunication Company Xinjiang Urumqi830000 China
this study constructs an intelligent fault identification system based on the fusion of artificial intelligence and power big data to improve the efficiency and accuracy of fault detection. First, various data from th... 详细信息
来源: 评论
Design and application of English Grammar Automatic Correction System Based on Machine Learning
Design and Application of English Grammar Automatic Correcti...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Wei, Hua Jiangxi Vocational College of Foreign Studies Jiangxi Nanchang330099 China
English grammatical errors frequently affect the clarity of information transmission, and an effective automatic error correction system is urgently needed. this paper aims to design an English grammar automatic error... 详细信息
来源: 评论
Block chain Technology Adoption in various Domains and the way of getting Double security  5
Block chain Technology Adoption in various Domains and the w...
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: thomas, Merin Shetty, Sahana Faculty of Engineering and Technology Department of Computer Science and Engineering Karnataka Bangalore India
Blockchain is a technique that allows for the decentralized data storage and coin is a form of trade that operates similarly to fiat money. there in old, government's bankers and the administration acquired posses... 详细信息
来源: 评论
A Distributed Point-to-Point Energy Trading System Based on Blockchain privacy Protection  5
A Distributed Point-to-Point Energy Trading System Based on ...
收藏 引用
5th IEEE International conference on Energy Internet, ICEI 2021
作者: Kuang, Xiaoyun Zhou, Baorong Jiang, Yixin Xie, Pingping Xu, Peiming Zhang, Yunan China Southern Power Grid Electric Power Research Institute Guangdong Provincial Key Laboratory Of Power System Network Security Guangzhou China China Southern Power Grid Electric Power Research Institute Guangzhou China
Centralized traditional electricity trading systems often face many problems such as high maintenance costs, low transaction information transparency, and untimely clearing of funds when faced with massive, high-frequ... 详细信息
来源: 评论
2021 International conference on Information Technology and Intelligent Control, CITIC 2021
2021 International Conference on Information Technology and ...
收藏 引用
2021 International conference on Information Technology and Intelligent Control, CITIC 2021
the proceedings contain 244 papers. the topics discussed include: research on classification and hierarchical management of industrial data based on entropy method-TOPSIS theory;convergence application of handle platf...
来源: 评论
I still See You! Inferring Fitness data from Encrypted Traffic of Wearables  14
I still See You! Inferring Fitness Data from Encrypted Traff...
收藏 引用
14th International Joint conference on Biomedical Engineering Systems and Technologies (BIOSTEC) / 14th Int Conf on Bio-inspired Systems and Signal Processing (BIOSIGNALS) / 14th Int Conf on Biomedical Electronics and Devices (BIODEVICES)
作者: Kazlouski, Andrei Marchioro, thomas Manifavas, Harry Markatos, Evangelos Univ Crete Comp Sci Dept Iraklion Greece Fdn Res & Technol Inst Comp Sci Iraklion Greece
In this paper we describe a cyberattack against 2 well-known wearable devices. the attacker presented in this paper is an "honest but curious" Internet Service Provider (ISP) sitting somewhere in the path be... 详细信息
来源: 评论
Hybrid Cloud Workflow Scheduling Algorithm Based on the Improved Wild Horse Optimization Algorithm
Hybrid Cloud Workflow Scheduling Algorithm Based on the Impr...
收藏 引用
International conference on Computer Engineering and applications (ICCEA)
作者: Xiaobo Chen Lupeng Qiu Tianzhe Li Yingkai Fan Naqin Zhou Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
As a cloud computing model that integrates the advantages of public and private clouds, the hybrid cloud adapts to changing application requirements, allowing users to flexibly lease public cloud resources to expand c... 详细信息
来源: 评论