咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是671-680 订阅
排序:
Optimized clustering with data privacy for wireless sensor network data transmission  5
Optimized clustering with data privacy for wireless sensor n...
收藏 引用
5th International conference on Intelligent Computing and Control Systems, ICICCS 2021
作者: Mohanty, Sipra Sahoo, Bhaswati School of Computer Engineering KIIT Deemed to Be University Bhubaneshwar Odisha India
the technological advancement in all fields like communication, medicine, industry, etc. demands high data transmission. data transmission is carried via different wireless sensor networks (WSN). Wireless sensor netwo... 详细信息
来源: 评论
Academic Student Progression Predictive Analysis application in Secondary Education Institution  2021
Academic Student Progression Predictive Analysis Application...
收藏 引用
5th International conference on E-Society, E-Education and E-Technology, ICSET 2021
作者: Abisado, Mideth Vargas, Peejay De Los Trinos, Ma.Ian College of Computing and Information Technologies National University Manila Philippines
the study developed an Academic Student Progression Predictive Analysis application for Dr. Josefa Jara Martinez High School (DJJMHS) to provide an intranet platform for the centralized collection of data records and ... 详细信息
来源: 评论
Detect Darknet URL Based on Artificial Neural Network  21
Detect Darknet URL Based on Artificial Neural Network
收藏 引用
5th International conference on Computer Science and application Engineering, CSAE 2021
作者: Xu, Jie Ju, Ao Jiangsu Police Institute Jiangsu Nanjing China
Darknet is a network that transmits data on the Internet through anonymous network technology and protects the relationship between the two sides of communication from being leaked. Because the IP addresses of both si... 详细信息
来源: 评论
IoT Expunge: Implementing Verifiable Retention of IoT data  20
IoT Expunge: Implementing Verifiable Retention of IoT Data
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Panwar, Nisha Sharma, Shantanu Gupta, Peeyush Ghosh, Dhrubajyoti Mehrotra, Sharad Venkatasubramanian, Nalini Augusta Univ Augusta GA 30912 USA Univ Calif Irvine Irvine CA 92717 USA
the growing deployment of Internet of things (IoT) systems aims to ease the daily life of end-users by providing several value-added services. However, IoT systems may capture and store sensitive, personal data about ... 详细信息
来源: 评论
CREPE: A privacy-Enhanced Crash Reporting System  20
CREPE: A Privacy-Enhanced Crash Reporting System
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Satvat, Kiavash Shirvanian, Maliheh Hosseini, Mahshid Saxena, Nitesh Univ Illinois Chicago IL 60680 USA Visa Res Foster City CA USA Univ Alabama Birmingham Birmingham AL USA
Software crashes are nearly impossible to avoid. the reported crashes often contain useful information assisting developers in finding the root cause of the crash. However, crash reports may carry sensitive and privat... 详细信息
来源: 评论
Design of Korean Text Resource Information Mining and Management Platform  5
Design of Korean Text Resource Information Mining and Manage...
收藏 引用
5th International conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Wang, Chunying College of Humanities and Foreign Languages Zhejiang Shuren University Zhejiang Hangzhou310015 China
this paper applies data mining technology to search for Korean/Korean web pages. After a brief introduction to data mining and information management technology, it mainly studies Korean word segmentation technology, ... 详细信息
来源: 评论
A Baseline for Attribute Disclosure Risk in Synthetic data  20
A Baseline for Attribute Disclosure Risk in Synthetic Data
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Hittmeir, Markus Mayer, Rudolf Ekelhart, Andreas SBA Res Vienna Austria
the generation of synthetic data is widely considered as viable method for alleviating privacy concerns and for reducing identification and attribute disclosure risk in micro-data. the records in a synthetic dataset a... 详细信息
来源: 评论
Design and application of PLC control system based on neural network
Design and application of PLC control system based on neural...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Zhang, Xiaoxia College of Electrical Engineering Gansu Institute of Mechanical & Electrical Engineering Tianshui741001 China
In order to better break through the performance bottleneck of traditional PLC in nonlinear temperature control system, this study proposes an incremental PID control algorithm based on BP neural network optimization.... 详细信息
来源: 评论
5th International Symposium on Cyber security Cryptography and Machine Learning, CSCML 2021
5th International Symposium on Cyber Security Cryptography a...
收藏 引用
5th International Symposium on Cyber security Cryptography and Machine Learning, CSCML 2021
the proceedings contain 36 papers. the special focus in this conference is on Cyber security Cryptography and Machine Learning. the topics include: Implementing GDPR in Social Networks Using Trust and Context;Principa...
来源: 评论
privacyFL: A Simulator for privacy-Preserving and Secure Federated Learning  20
PrivacyFL: A Simulator for Privacy-Preserving and Secure Fed...
收藏 引用
29th acm International conference on Information and Knowledge Management (CIKM)
作者: Mugunthan, Vaikkunth Peraire-Bueno, Anton Kagal, Lalana MIT5 77 Massachusetts Ave Cambridge MA 02139 USA
Federated learning is a technique that enables distributed clients to collaboratively learn a shared machine learning model without sharing their training data. this reduces data privacy risks, however, privacy concer... 详细信息
来源: 评论