咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是61-70 订阅
排序:
Demo : data Minimization and Informed Consent in Administrative Forms  23
Demo : Data Minimization and Informed Consent in Administrat...
收藏 引用
30th acm SIGSAC conference on Computer and Communications security (acm CCS)
作者: Anciaux, Nicolas Frittella, Sabine Joffroy, Baptiste Nguyen, Benjamin INRIA Saclay France Univ Paris Saclay Versailles Saclay France INSA Ctr Val Loire LIFO Bourges France Univ Orleans Orleans France
this article proposes a demonstration implementing the data minimization privacy principle, focusing on reducing data collected by government administrations through forms. data minimization is defined in many privacy... 详细信息
来源: 评论
Research on the application of Blockchain Consensus Mechanisms in Federated Learning for privacy Protection  5
Research on the Application of Blockchain Consensus Mechanis...
收藏 引用
5th International conference on Industrial IoT, Big data and Supply Chain, IIoTBDSC 2024
作者: Hu, Xuehui Chu, Xuesen Hong, Huajun Guo, Wei Wu, Tianqi Li, Jinku Shanghai Tongtai Information Technology Co. Ltd. Shanghai200235 China China Ship Scientific Research Center Wuxi214082 China School of Cyber Engineering Xidian University Xi'an710071 China
Federated learning, as a distributed machine learning method is facing significant challenges in data privacy protection at present. this study aims to enhance the privacy protection capability of federated learning b... 详细信息
来源: 评论
privacy-Preserving Fully Online Matching with Deadlines  23
Privacy-Preserving Fully Online Matching with Deadlines
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Klinger, Andreas Meyer, Ulrike Rhein Westfal TH Aachen Aachen Germany
In classical secure multi-party computation (SMPC) it is assumed that a fixed and a priori known set of parties wants to securely evaluate a function of their private inputs. this assumption implies that online proble... 详细信息
来源: 评论
Blockchain transaction data privacy protection scheme  5
Blockchain transaction data privacy protection scheme
收藏 引用
5th International conference on Computer Communication and Network security, CCNS 2024
作者: Li, Yifeng Beijing University of Technology Beijing China
Blockchain is a shared digital ledger that, once transactions are recorded and verified, cannot be altered. Since most blockchain nodes maintain a copy of the ledger, blockchain brings the benefit of decentralization ... 详细信息
来源: 评论
IdDecoder: A Face Embedding Inversion Tool and its privacy and security Implications on Facial Recognition Systems  23
IdDecoder: A Face Embedding Inversion Tool and its Privacy a...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Minh-Ha Le Carlsson, Niklas Linkoping Univ Linkoping Sweden
Most state-of-the-art facial recognition systems (FRS:s) use face embeddings. In this paper, we present the IdDecoder framework, capable of effectively synthesizing realistic-neutralized face images from face embeddin... 详细信息
来源: 评论
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing  24
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing
收藏 引用
17th acm conference on security and privacy in Wireless and Mobile Networks (WiSec)
作者: He, Yaqi Zeng, Kai Jiao, Long Mark, Brian L. Khasawneh, Khaled N. George Mason Univ Wireless Cyber Ctr Fairfax VA 22030 USA Univ Massachusetts Dartmouth Dept Comp Informat Sci Dartmouth NS Canada
Wireless device pairing is a critical security mechanism to bootstrap the secure communication between two devices without a pre-shared secret. It has been widely used in many Internet of things (IoT) applications, su... 详细信息
来源: 评论
Federated Learning for privacy Preserving Intelligent Healthcare application to Breast Cancer Detection  25
Federated Learning for Privacy Preserving Intelligent Health...
收藏 引用
26th International conference on Distributed Computing and Networking, ICDCN 2025
作者: Amritanjali Gupta, Ragav Birla Institute of Technology Mesra Ranchi Ranchi India Sri Mata Vaishno Devi University Jammu Katra India
Health data used in building intelligent medical care systems contain sensitive personal information of the patients. Distributed storage, processing and sharing of data poses threats to the data privacy and security.... 详细信息
来源: 评论
application Status, Problems and Future Prospects of Generative AI in Education  5
Application Status, Problems and Future Prospects of Generat...
收藏 引用
5th International conference on Computer Science and Technologies in Education, CSTE 2023
作者: Yu, Hao Liu, Zhaoyang Guo, Yunyun Shaanxi Normal University Department of Education Xi'an China School of Foreign Languages Northwest University Xi'an China
the emergence of Chat GPT signifies another revolutionary wave of information technology brought about by generative AI. this article introduces the development and technical support of generative AI, revealing that t... 详细信息
来源: 评论
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation  23
Anonymous System for Fully Distributed and Robust Secure Mul...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Klinger, Andreas Battermann, Felix Meyer, Ulrike Rhein Westfal TH Aachen Aachen Germany
In secure multi-party computation (SMPC), it is considered that multiple parties that are known to each other evaluate a function over their private inputs in a secure fashion. the participating parties do not learn a... 详细信息
来源: 评论
Improved Layered Architecture: Integration of IoT with Blockchain for Increased security and Scalability  5
Improved Layered Architecture: Integration of IoT with Block...
收藏 引用
5th International conference on Artificial Intelligence and data Sciences, AiDAS 2024
作者: Jahangir, Muhammad Lee, Ming Jie Kwan, Ban-Hoe Kamal, Tariq Chai, Tong-Yuen Loh, Wing Son Lee Kong Chian Faculty of Engineering and Science Universiti Tunku Abdul Rahman Kajang Malaysia Dhanani School of Science & Engineering Electrical and Computer Engineering Karachi Pakistan
Most of the existing Internet of things (IoT) applications are built upon the conventional three-layered architecture that possesses several issues in terms of security, privacy and scalability. In this paper, we prop... 详细信息
来源: 评论