咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是631-640 订阅
排序:
Artificial Intelligence in Smart Mobile Communication Systems: A Review
Artificial Intelligence in Smart Mobile Communication System...
收藏 引用
IEEE International conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON)
作者: Adebajo-Akinpelu Victor O Moses Oluwafemi Onibonoje Ayodeji Olalekan Salau Department of Electrical/Electronics and Computer Engineering Afe Babalola Univerisity Ado-Ekiti Ado-Ekiti Nigeria Dept of Electrical/Electronics & Computer Engineering Afe Babalola University Ado Ekiti Nigeria
Communication and information service systems are undergoing rapid advancements driven by the evolution of telecommunications and computer technology. the convergence of these fields has led to significant growth in d... 详细信息
来源: 评论
application of Information Technology in Civil Aviation Safety Management System under the Background of Internet  5
Application of Information Technology in Civil Aviation Safe...
收藏 引用
5th International conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC)
作者: Hu, Lushi Guangzhou Civil Aviat Coll Coll Airport Management Guangzhou 510403 Guangdong Peoples R China
With the continuous development and progress of advanced technology in the current society, the maturity of information technology has made it widely used in many industries and fields, and gradually plays an importan... 详细信息
来源: 评论
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps  22
Right to Know, Right to Refuse: Towards UI Perception-Based ...
收藏 引用
proceedings of the 37th IEEE/acm International conference on Automated Software Engineering
作者: Vikas Kumar Malviya Chee Wei Leow Ashok Kasthuri Yan Naing Tun Lwin Khin Shar Lingxiao Jiang School of Computing and Information Systems Singapore Management University Singapore
It is the basic right of a user to know how the permissions are used within the Android app’s scope and to refuse the app if granted permissions are used for the activities other than specified use which can amount t... 详细信息
来源: 评论
Computer Algorithm Optimization of BIM and Reinforcement Learning in Complex Building Structure Construction Process Optimization under Big data Environment
Computer Algorithm Optimization of BIM and Reinforcement Lea...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Li, Yuan Zhang, Yifei China Nuclear Power Engineering Co. Ltd. Beijing100840 China China Nuclear Power Engineering Co. Ltd. HeBei Branch Hebei Shijiazhuang050000 China
In the big data environment, the combination of Building Information Modeling (BIM) and reinforcement learning provides new ideas for optimizing the construction process of complex building structures. the current con... 详细信息
来源: 评论
Analysis on NSAWReminder Based on Big data Technology  3
Analysis on NSAWReminder Based on Big Data Technology
收藏 引用
3rd International conference on Artificial Intelligence and Advanced Manufacture, AIAM 2021
作者: Jin, Ziheng 5th Business Division Nanjing Research Institute of Electronic Engineering Jiangsu Nanjing China
NSAWS is an intelligent and real-time large database management system. By analyzing the user identity data and access rights contained in the collected information, the NSAWS finds out the potential risks and issues ... 详细信息
来源: 评论
Blockchain for Storing Shadow data of IoT Devices  22
Blockchain for Storing Shadow Data of IoT Devices
收藏 引用
proceedings of the 2022 5th International conference on Blockchain Technology and applications
作者: Luwei Bao Gehao Lu School of Information Science and Engineering Yunnan University China
the demand for secure storage of shadow service data of Internet of things devices makes the traditional centralized platform storage method unable to ensure the security and credibility of key data. this paper analyz... 详细信息
来源: 评论
Demo Abstract: Distributed, Scalable, and Transparent data Management Framework for Energy Market: A Blockchain Approach  5
Demo Abstract: Distributed, Scalable, and Transparent Data M...
收藏 引用
5th IEEE/acm International conference on Internet-of-things Design and Implementation (acm/IEEE IoTDI)
作者: Suankaewmanee, Kongrath Sin, Ng Pei Niyato, Dusit Nanyang Technol Univ Energy Res Inst NTU Singapore Singapore
Increasing a participation of distributed energy resources exposes the market to possible double counting of generated renewable electricity. It could also slow down financial settlement between multiple parties with ... 详细信息
来源: 评论
Hiding data by Combining AES Cryptography with Coverless Image Steganography Using DCGAN: A Review  5
Hiding Data by Combining AES Cryptography with Coverless Ima...
收藏 引用
5th International conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Sowjanya Cherukupalli, N.L. Katneni, Vedavathi GITAM Institute of Science Department of Computer Science A.P Visakhapatnam India
the image processing application is very powerful in current technology to provide robust security. In traditional image steganography, the message is embedded in an image with a modification called a cover image. the... 详细信息
来源: 评论
application of Personnel Safety Management System in Network security Guarantee  22
Application of Personnel Safety Management System in Network...
收藏 引用
proceedings of the 5th International conference on Information Technologies and Electrical Engineering
作者: Guofang Wu Guoliang Dong Shuquan Xu Research Institute of Highway Ministry of Transport China
the rapid development of cloud protection technology provides high-quality security protection barriers for the security of websites deployed on the Internet from a technical level. After the website administrators pa... 详细信息
来源: 评论
A Literature Review of data-Driven Multimodal Learning Analytics in Education Based on Citespace  22
A Literature Review of Data-Driven Multimodal Learning Analy...
收藏 引用
proceedings of the 2022 5th International conference on Education Technology Management
作者: Jia Hong Deng Yiming Zhao Yunnan Normal University China
Multimodal learning analysis offers the possibility to comprehensively study students' learning processes, promote effective learning and explain teaching patterns in complex environments. In this paper, Citespace... 详细信息
来源: 评论