咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是591-600 订阅
排序:
A Multi-Model Framework for Synthesizing High-Fidelity Network Intrusion data Using Generative AI  5
A Multi-Model Framework for Synthesizing High-Fidelity Netwo...
收藏 引用
5th International conference on Advanced Research in Computing, ICARC 2025
作者: Rathakrishnan, Mathushaharan Gayan, Samiru Edirisinghe, Sampath Inaltekin, Hazer University of Moratuwa Dept. of Electronic and Telecommunication Engineering Moratuwa Sri Lanka University of Sri Jayewardenepura Dept. of Computer Engineering Nugegoda Sri Lanka Macquarie University School of Engineering North RydeNSW2109 Australia
the rapid evolution of network technologies and frequent network intrusions have amplified the demand for intrusion detection systems (IDSs) powered by artificial intelligence (AI). However, the performance of IDSs is... 详细信息
来源: 评论
IoT-based Heart Health Monitoring System
IoT-based Heart Health Monitoring System
收藏 引用
Communication, Computing and Industry 4.0 (C2I4), International conference on
作者: Insha Mustafa Ritarani Sahu Suchismita Chinara Computer Science & Engineering NIT Rourkela Rourkela India
the number of cases of cardiovascular illness has been on the rise for a long time. the proposed solution aims to address this issue using a system equipped with the Internet of things (IoT) to monitor the user’s hea... 详细信息
来源: 评论
5th International conference on Applied Informatics, ICAI 2022
5th International Conference on Applied Informatics, ICAI 20...
收藏 引用
5th International conference on Applied Informatics, ICAI 2022
the proceedings contain 32 papers. the special focus in this conference is on Applied Informatics. the topics include: Statistical Characterization of Image Intensities in Regions Inside Arteries to Fac...
来源: 评论
application of Computer Image Recognition Algorithm in Agricultural Product Quality Inspection
Application of Computer Image Recognition Algorithm in Agric...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Lu, Xiangyu Bureau of Agriculture and Rural Affairs of Ningyang County Shandong Taian China
In agricultural product quality inspection, subtle defects of agricultural products are easily disturbed by complex background and lighting changes, making them difficult to identify. To solve this problem, this paper... 详细信息
来源: 评论
A Review on application of Deep Learning in Natural Language Processing  5
A Review on Application of Deep Learning in Natural Language...
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kshirsagar, Pravin Ramdas Reddy, Dhoma Harshavardhan Dhingra, Mallika Dhabliya, Dharmesh Gupta, Ankur G H Raisoni College of Engineering Department of Artificial Intelligence Maharashtra Nagpur India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Maharashtra Mumbai India Manipal University Jaipur Department of Mathematics and Statistics Rajasthan Jaipur India Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Vaish College of Engineering Department of Computer Science and Engineering Haryana Rohtak India
Natural Language Processing (NLP) is a developing method utilized in building different sorts of Artificial Intelligence (AI) that is available in today's time. More intellectual applications will tend to be a pri... 详细信息
来源: 评论
Research on the application and Sustainable Development of Digital Twin Technology Based on Big data Technology and Deep Learning in the Green Transformation of Manufacturing Industry
Research on the Application and Sustainable Development of D...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Li, Bin Columbia Climate School Columbia University New YorkNY10027 United States
With the increasing global attention to sustainable development, traditional manufacturing is accelerating its transformation towards green, intelligent, and service-oriented directions. To address various challenges ... 详细信息
来源: 评论
security Analysis of SplitFed Learning  22
Security Analysis of SplitFed Learning
收藏 引用
proceedings of the 20th acm conference on Embedded Networked Sensor Systems
作者: Momin Ahmad Khan Virat Shejwalkar Amir Houmansadr Fatima M. Anwar University of Massachusetts
Split Learning (SL) and Federated Learning (FL) are two prominent distributed collaborative learning techniques that maintain data privacy by allowing clients to never share their private data with other clients and s...
来源: 评论
Personal health records: Blockchain-based identity management and data ownership  5
Personal health records: Blockchain-based identity managemen...
收藏 引用
5th International conference on Future Networks and Distributed Systems: the Premier conference on Smart Next Generation Networking Technologies, ICFNDS 2021
作者: Aldamaeen, Ohud Rashideh, Waleed Alalawi, Sameer Obidallah, Waeal Imam Mohammad Ibn Saud Islamic University Saudi Arabia Technical and Vocational Training Corporation Saudi Arabia
data privacy and security preservation are essential issues in the public sector and, particularly, in the health and medical sectors. Patients often lose their data and medical history if they must move between hospi... 详细信息
来源: 评论
Network Anomaly Detection Algorithm Based on Fusion of Artificial Fish Swarming and Isolation Forest
Network Anomaly Detection Algorithm Based on Fusion of Artif...
收藏 引用
International conference on Computer Engineering and applications (ICCEA)
作者: Chen Zhang Wei Shen ShengZhao Wang Yue Wu Artificial Intelligence and Big Data Academy Hefei University Hefei China Guochuang Software Co. Ltd. Intelligent Interconnected Systems Laboratory of Anhui Province Hefei University of Technology Hefei China
Currently, network security involves all aspects of human life privacy, etc., and anomalous data detection has been an important means of protection against network attacks. Aiming at the problem of unreasonable alloc... 详细信息
来源: 评论
Research on Feature and Architecture Design of AI Firewall  5
Research on Feature and Architecture Design of AI Firewall
收藏 引用
5th Annual International conference on data Science and Business Analytics, ICDSBA 2021
作者: Wang, Zhijia The Third Research Institute of Ministry of Public Security Shanghai China
this paper analyzes the current network security environment and the shortcomings of firewall products in the current network environment, and expounds the benefits that can be brought by the application of AI technol... 详细信息
来源: 评论