咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是581-590 订阅
排序:
data security and privacy using DNA Cryptography and AES Method in Cloud Computing  5
Data Security and Privacy using DNA Cryptography and AES Met...
收藏 引用
5th International conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC)
作者: Kumar, Anuj GLA Univ Dept Comp Engn & Applicat Mathura India
Cloud computing has changed how humans use their technological expertise. It indicates a transition in the use of computers as utilitarian instruments with radical applications in general. However, as technology advan... 详细信息
来源: 评论
Intelligent Intrusion Detection System Using Deep Learning Models  5
Intelligent Intrusion Detection System Using Deep Learning M...
收藏 引用
5th International conference on Trends in Electronics and Informatics, ICOEI 2021
作者: Varshney, Sumit Shikha Singhi, Shefali Sharma, Bharti Nit Kurukshetra Department of Computer Application HARYANA India
Cyber attacks are a very common issue in the modern world, and since there is a growing array of challenges in accurately detecting intrusion, this results in damage to security services, i.e. confidentiality, integri... 详细信息
来源: 评论
Design and application of an International Trade Flow Prediction System Based on Machine Learning Algorithms
Design and Application of an International Trade Flow Predic...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Yang, Wenwen Jiangxi Vocational College of Foreign Studies Jiangxi Nanchang330096 China
In the field of international trade, the role of accurate prediction of trade flows in formulating strategic plans for enterprises and optimizing policy regulation by the government cannot be ignored. this study desig... 详细信息
来源: 评论
2021 5th International conference on Electrical Engineering and Information and Communication Technology, ICEEICT 2021
2021 5th International Conference on Electrical Engineering ...
收藏 引用
5th International conference on Electrical Engineering and Information and Communication Technology, ICEEICT 2021
the proceedings contain 100 papers. the topics discussed include: a convolutional neural network for end to end structural prediction and lane detection for autonomous vehicle;the role of IoT in digitalizing mining se...
来源: 评论
Exploring Decentralized Identity Verification Systems Using Blockchain Technology: Opportunities and Challenges
Exploring Decentralized Identity Verification Systems Using ...
收藏 引用
Global conference for Advancement in Technology (GCAT)
作者: V. Saravanan Sumalatha A Desidi Narsimha Reddy B. Shamreen Ahamed Udayakumar K Arthi Priyadharshini M Department of Nano Electronics Materials and Sensors Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamilnadu India Department of Computer Science Kristu Jayanti College Autonomous Bengaluru Data Consultant (Data Governance Data Analytics: Enterprise Performance Management AI&ML) Soniks Consulting LLC Texas USA Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Jeppiaar Nagar Chennai Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology India Department of CSE Dhanalakshmi College of Engineering Chennai
the rapid advancement of digital technologies has underscored the critical necessity for robust and reliable identity verification systems in today's interconnected world. Traditional centralized identity manageme... 详细信息
来源: 评论
applications and Prospects of Neural Networks in Fault Detection: A Visualization Analysis Based on CiteSpace
Applications and Prospects of Neural Networks in Fault Detec...
收藏 引用
Pattern Recognition and Machine Learning (PRML), IEEE International conference on
作者: Kechen Wu Xingcheng Lu Yixuan Chen Nanjing University of Finance and Economics Nanjing China
With the rapid development of industrial automation and intelligence, fault detection technology has become key to ensuring system stability and safety. Neural networks, as outstanding data processing and pattern reco... 详细信息
来源: 评论
A Review of Cyber security Challenges and Mitigation Strategies in Industry 4.0 Technologies
A Review of Cyber Security Challenges and Mitigation Strateg...
收藏 引用
Advances in Computing, Communication Control and Networking (ICAC3N), International conference on
作者: Mayank Kumar Himanshu Gupta AIIT Amity University Noida India
the 4th Industrial Revolution, also known as or the Industry 4.0, has been characterized by the emergence of revolutionary technologies like robotics, computer vision, big data the analysis, and the Internet of things... 详细信息
来源: 评论
Generating Synthetic data for Deep Learning using VR Digital Twin  21
Generating Synthetic Data for Deep Learning using VR Digital...
收藏 引用
5th International conference on Cloud and Big data Computing, ICCBDC 2021
作者: Mukhopadhyay, Abhishek Rajshekar Reddy, G.S. Mukherjee, Imon Kumar Gopa, Gokul Pena-Rios, Anasol Biswas, Pradipta Indian Institute of Science India Indian Institute of Information Technology Kalyani India BT India BT United Kingdom
the ongoing Covid-19 pandemic has made it challenging for large scale data collection, in particular for Convolutional Neural Network (CNN)-based computer vision systems. Additionally, there are numerous circumstances... 详细信息
来源: 评论
Research on Large-Scale data Processing and Dynamic Content Optimization Algorithm Based on Reinforcement Learning
Research on Large-Scale Data Processing and Dynamic Content ...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Yang, Dishu Liu, Xingyu Khoury College of Computer Sciences Northeastern University San JoseCA95113 United States Social Science Research Institute Duke University DurhamNC27708 United States
With the advent of the era of big data, Internet services are faced with the challenges of massive data processing and content distribution. Traditional network management methods have gradually exposed their limitati... 详细信息
来源: 评论
Design and application of Pseudo-Random Sequence Base on Logistic Map  5
Design and Application of Pseudo-Random Sequence Base on Log...
收藏 引用
5th International conference on Artificial Intelligence and Advanced Manufacturing, AIAM 2023
作者: Pan, Qiufeng Chen, Xiangkun Luo, Linbin Xu, Wenxia School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
Digital image is an important information carrier. In order to prevent information from being stolen and leading to information leakage, it’s very important to protect the digital image. this paper proposes a pseudo-... 详细信息
来源: 评论