咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是681-690 订阅
排序:
Renyi Differentially Private ADMM for Non-Smooth Regularized Optimization  20
Renyi Differentially Private ADMM for Non-Smooth Regularized...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Chen, Chen Lee, Jaewoo Univ Georgia Athens GA 30602 USA
In this paper we consider the problem of minimizing composite objective functions consisting of a convex differentiable loss function plus a non-smooth regularization term, such as L-1 norm or nuclear norm, under Reny... 详细信息
来源: 评论
A Framework for data Sharing between Healthcare Providers using Blockchain  5
A Framework for Data Sharing between Healthcare Providers us...
收藏 引用
5th International conference on Internet of things, Big data and security (IoTBDS)
作者: Alzahrani, Ahmed G. Alenezi, Ahmed Atlam, Hany F. Wills, Gary Univ Southampton Elect & Comp Sci Dept Univ Rd Southampton SO17 1BJ Hants England King Abdulaziz Univ Dept Comp Sci Fac Comp & Informat Technol Jeddah 21589 Saudi Arabia Northern Border Univ Comp Sci Dept Fac Comp & Informat Technol Ar Ar Saudi Arabia
the healthcare data are considered as a highly valuable source of information that can improve healthcare systems to be more intelligent and improve the quality of the provided services. However, due to security and p... 详细信息
来源: 评论
A Review on Biometric based Secure data Transmission  5
A Review on Biometric based Secure Data Transmission
收藏 引用
5th International conference on Inventive Computation Technologies (ICICT)
作者: Kumbhare, Mithun G. Padole, Palash S. Shende, Diksha P. Meshram, Sanchana S. Baraskar, Shailesh S. Raut, Swati B. JD Coll Engn & Management Dept Comp Sci & Engn Nagpur Maharashtra India
Cloud technology plays a vital role in the process of business advancement, where it realizes advanced research outcomes in a brief span. However, in case of cloud computing, the data is mostly outsourced. there alway... 详细信息
来源: 评论
Cost Effective IoT-based Remote Healthcare Monitoring System for Developing Countries  5
Cost Effective IoT-based Remote Healthcare Monitoring System...
收藏 引用
5th IEEE International conference on Smart Internet of things, SmartIoT 2021
作者: Yaakob, Naimah Almashor, Mahathir Muhammed Ahmed, Ahmed Fathi Faculty of Electronic Engineering Technology University Malaysia Perlis Arau Perlis Pauh Putra 02600 Malaysia CSIRO Data61 and Cyber Security Cooperative Research Centre Corner Vimiera and Pembroke Roads MarsfieldNSW2122 Australia
there is a critical need for the remote monitoring of patients, especially given the current pandemic situation. this is ever more acute in developing nations, where access to healthcare is reliant on already stretche... 详细信息
来源: 评论
OAuth 2.0-based authentication solution for FPGA-enabled cloud computing  21
OAuth 2.0-based authentication solution for FPGA-enabled clo...
收藏 引用
proceedings of the 14th IEEE/acm International conference on Utility and Cloud Computing Companion
作者: Semih Ince David Espes Guy Gogniat Julien Lallet Renaud Santoro Nokia Bell Labs Univ. Bretagne Occidentale Univ. Bretagne Sud
FPGA-enabled cloud computing is getting more and more common as cloud providers offer hardware accelerated solutions. In this context, clients need confidential remote computing. However Intellectual Properties and da... 详细信息
来源: 评论
GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models  20
GAN-Leaks: A Taxonomy of Membership Inference Attacks agains...
收藏 引用
acm SIGSAC conference on Computer and Communications security (acm CCS)
作者: Chen, Dingfan Yu, Ning Zhang, Yang Fritz, Mario CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany Univ Maryland College Pk MD 20742 USA Max Planck Inst Informat Saarbrucken Germany
Deep learning has achieved overwhelming success, spanning from discriminative models to generative models. In particular, deep generative models have facilitated a new level of performance in a myriad of areas, rangin... 详细信息
来源: 评论
Characterizing Smart Home IoT Traffic in the Wild  5
Characterizing Smart Home IoT Traffic in the Wild
收藏 引用
5th IEEE/acm International conference on Internet-of-things Design and Implementation (acm/IEEE IoTDI)
作者: Mazhar, M. Hammad Shafiq, Zubair Univ Iowa Dept Comp Sci Iowa City IA 52242 USA
As the smart home IoT ecosystem flourishes, it is imperative to gain a better understanding of the unique challenges it poses in terms of management, security, and privacy. Prior studies are limited because they exami... 详细信息
来源: 评论
Attacking and Protecting Tunneled Traffic of Smart Home Devices  20
Attacking and Protecting Tunneled Traffic of Smart Home Devi...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Alshehri, Ahmed Granley, Jacob Yue, Chuan Colroado Sch Mines Golden CO 80401 USA
the number of smart home IoT (Internet of things) devices has been growing fast in recent years. Along with the great benefits brought by smart home devices, new threats have appeared. One major threat to smart home u... 详细信息
来源: 评论
10th EAI International conference on Big data Technologies and applications, BDTA 2020 and 13th EAI International conference on Wireless Internet, WiCON 2020
10th EAI International Conference on Big Data Technologies a...
收藏 引用
10th EAI International conference on Big data Technologies and applications, BDTA 2020 and 13th EAI International conference on Wireless Internet, WiCON 2020
the proceedings contain 14 papers. the special focus in this conference is on Big data Technologies and applications. the topics include: Performance Evaluation of Energy Detection, Matched Filtering and KNN Under Dif...
来源: 评论
Understanding privacy Awareness in Android App Descriptions Using Deep Learning  20
Understanding Privacy Awareness in Android App Descriptions ...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Feichtner, Johannes Gruber, Stefan Graz Univ Technol Graz Austria Secure Informat Technol Ctr Austria A SIT Graz Austria
Permissions are a key factor in Android to protect users' privacy. As it is often not obvious why applications require certain permissions, developer-provided descriptions in Google Play and third-party markets sh... 详细信息
来源: 评论