咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是691-700 订阅
排序:
Context Intelligent Crypto-Switching Algorithm for Document security in Cloud Environment  5
Context Intelligent Crypto-Switching Algorithm for Document ...
收藏 引用
5th International conference on Inventive Computation Technologies (ICICT)
作者: Kamde, Pritesh Carvalho, Ross Jain, Damnik Makwana, Mihir Ambawade, Dayanand Sardar Patel Inst Technol Mumbai Maharashtra India
data privacy and security is a primary concern for any government/non-government organizations. this organizational data primarily exists in the form of textual documents. these documents aids an organization for exec... 详细信息
来源: 评论
A Review: data security in Cloud Computing Using Machine Learning
A Review: Data Security in Cloud Computing Using Machine Lea...
收藏 引用
International conference on Contemporary Computing and Informatics (IC3I)
作者: Pravallika Kandi Sujith Raj Tarapatla Sandeep Kumar Harshitha Kadiyam Dinesh Chowdary Nageswar Rao Moparthi Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India
In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT reso... 详细信息
来源: 评论
Attacking and Protecting Tunneled Traffic of Smart Home Devices  20
Attacking and Protecting Tunneled Traffic of Smart Home Devi...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Alshehri, Ahmed Granley, Jacob Yue, Chuan Colroado Sch Mines Golden CO 80401 USA
the number of smart home IoT (Internet of things) devices has been growing fast in recent years. Along with the great benefits brought by smart home devices, new threats have appeared. One major threat to smart home u... 详细信息
来源: 评论
application of Improved Ant Colony Optimization Algorithm in Urban Ecological Landscape Spatial Layout Optimization Method
Application of Improved Ant Colony Optimization Algorithm in...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Ma, Ruiqi Xi'An FanYi University Shaanxi Xi'an710105 China
Traditional spatial planning methods have many limitations when facing complex urban environments. therefore, this study introduces an urban ecological landscape spatial layout optimization method based on improved AC... 详细信息
来源: 评论
Automatic Pattern Generation Based on Genetic Algorithm and its application in Design Platform
Automatic Pattern Generation Based on Genetic Algorithm and ...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: He, Yue Zhang, Lingxia College of General Education College of Art and Information Engineering Dalian University of Technology Liaoning Dalian116400 China College of Art and Design School of Art and Information Engineering Dalian University of Technology Liaoning Dalian116000 China
In order to solve the problems of limited creativity and low design efficiency in the traditional pattern design process, this paper introduces genetic algorithm for automatic pattern generation. this method continuou... 详细信息
来源: 评论
ChainDB: Ensuring Integrity of Querying Off-Chain data on Blockchain  22
ChainDB: Ensuring Integrity of Querying Off-Chain Data on Bl...
收藏 引用
proceedings of the 2022 5th International conference on Blockchain Technology and applications
作者: Jianbo Gao Jiashuo Zhang Yue Li Jiakun Hao Ke Wang Zhi Guan Zhong Chen School of Computer Science Peking University China National Engineering Research Center for Software Engineering Peking University China
Enterprise blockchain applications have been widely adopted and the data scale on blockchain increases rapidly in recent years. In practical application, participants prefer to store most of the business data in local... 详细信息
来源: 评论
proceedings of the 15th acm Asia conference on Computer and Communications security, ASIA CCS 2020
Proceedings of the 15th ACM Asia Conference on Computer and ...
收藏 引用
15th acm Asia conference on Computer and Communications security, ASIA CCS 2020
the proceedings contain 85 papers. the topics discussed include: proofs or remote execution and mitigation of TOCTOU attacks;global communication guarantees in the presence of adversaries;the Lazarus effect: healing c...
来源: 评论
IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and privacy-preserving Protocols in Contiki-NG  5
IoT-CryptoDiet: Implementing a Lightweight Cryptographic Lib...
收藏 引用
5th International conference on Internet of things, Big data and security (IoTBDS)
作者: Frimpong, Eugene Michalas, Antonis Tampere Univ Tampere Finland
Even though the idea of transforming basic objects to smart objects with the aid sensors is not new, it is only now that we have started seeing the incredible impact of this digital transformation in our societies. th... 详细信息
来源: 评论
Research of Blockchain-Based "Edge-Cloud" Collaborative Model, System Architecture and Overall Layout for Railway application  5th
Research of Blockchain-Based "Edge-Cloud" Collaborative Mode...
收藏 引用
5th International conference on Intelligent, Interactive Systems and applications, IISA 2020
作者: Jianjun, Ma Wanqi, Wang Haiyan, Shen Jiaying, Duan China Academy of Railway Sciences Group Co. Ltd. Beijing China China Academy of Railway Sciences Group Co. Ltd. Institute of Electronic Computing Technology Beijing China
With the advent of an explosive age of the data in perception of everything, interconnection of everything, and intelligence of everything as well as the high requirement for millisecond low latency business, Cloud Co... 详细信息
来源: 评论
application of Intelligent Control Strategy in Asynchronous Motor Speed Regulation System and Research on Energy Efficiency Improvement
Application of Intelligent Control Strategy in Asynchronous ...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Hao, Zhixu Hu, Gaoshan Xi, Chunyan Shenyang Urban Construction University Liaoning Shenyang110167 China
Aiming at the shortcomings of traditional asynchronous motor speed control system in energy saving and control accuracy, this paper introduces intelligent control strategy, which aims to improve the response speed and... 详细信息
来源: 评论