咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是711-720 订阅
排序:
Graph Representation Learning: Foundations, Methods, applications and Systems  21
Graph Representation Learning: Foundations, Methods, Applica...
收藏 引用
27th acm SIGKDD International conference on Knowledge Discovery and data Mining (KDD)
作者: Jin, Wei Ma, Yao Wang, Yiqi Liu, Xiaorui Tang, Jiliang Cen, Yukuo Qiu, Jiezhong Tang, Jie Shi, Chuan Ye, Yanfang Zhang, Jiawei Yu, Philip S. Michigan State Univ Comp Sci & Engn E Lansing MI 48824 USA Michigan State Univ Comp Sci & Engn Dept E Lansing MI 48824 USA Tsinghua Univ Dept Comp Sci & Technol Beijing Peoples R China Beijing Univ Posts & Telecommun Beijing Peoples R China Case Western Reserve Univ Cleveland OH 44106 USA Case Western Reserve Univ Dept Comp & Data Sci Cleveland OH 44106 USA Florida State Univ Tallahassee FL 32306 USA Florida State Univ Comp Sci Tallahassee FL 32306 USA Univ Illinois Chicago IL USA Univ Illinois Comp Sci Chicago IL USA
Graphs such as social networks and molecular graphs are ubiquitous data structures in the real world. Due to their prevalence, it is of great research importance to extract meaningful patterns from graph structured da... 详细信息
来源: 评论
Design and application of English Oral Online Dialogue System Based on Reinforcement Learning Algorithm
Design and Application of English Oral Online Dialogue Syste...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Chen, Ting Jiangxi Vocational College of Foreign Studies Jiangxi Nanchang330099 China
In view of the lack of personalization and interactivity in current oral English learning, a dialogue system based on reinforcement learning is introduced, aiming to improve users' oral expression ability by dynam... 详细信息
来源: 评论
Survey on measures of image similarity applied in image inpainting base on deep learning  22
Survey on measures of image similarity applied in image inpa...
收藏 引用
proceedings of the 2022 5th International conference on Algorithms, Computing and Artificial Intelligence
作者: Libo He Zhenping Qiang Yunyun Wu Meijiao Wang Information Security College Yunnan Police College China College of Big Data and Intelligent Engineering Southwest Forestry University China
the research of image similarity measures is an important content of the computer image processing. It have been widely studied and applied in image inpainting, image super resolution, image matching and other applica... 详细信息
来源: 评论
Blockchain-Based Crowdfunding application  5
Blockchain-Based Crowdfunding Application
收藏 引用
5th International conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC)
作者: Patil, Viren Gupta, Vasvi Sarode, Rohini Coll Engn Comp Engn Pune Maharashtra India Coll Engn Comp Dept Pune Maharashtra India
People's data is valuable and sensitive, and blockchain can significantly change how it is seen. All transactions are time- and date-stamped and are logged irreversibly. Smart contracts can even automate transacti... 详细信息
来源: 评论
TrustAV: Practical and privacy-Preserving Malware Analysis in the Cloud  20
TrustAV: Practical and Privacy-Preserving Malware Analysis i...
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Deyannis, Dimitris Papadogiannaki, Eva Kalivianakis, Giorgos Vasiliadis, Giorgos Ioannidis, Sotiris FORTH ICS Iraklion Greece Univ Crete Dept Comp Sci Rethimnon Crete Greece
While the number of connected devices is constantly growing, we observe an increased incident rate of cyber attacks that target user data. Typically, personal devices contain the most sensitive information regarding t... 详细信息
来源: 评论
A Comparative Study of Access Control Models for Ubiquitous Computing Systems  23
A Comparative Study of Access Control Models for Ubiquitous ...
收藏 引用
proceedings of the 5th International conference on Information Management & Machine Intelligence
作者: Sayali Renuse Parikshit N. Mahalle Gitanjali Rahul Shinde Nilesh P. Sable Department of Computer Engineering Vishwakarma Institute of Information Technology India Department of Artificial intelligence and Data science Vishwakarma Institute Of Information Technology India Computer Science Engineering Vishwakarma Institute of Information Technology India Information Technology Vishwakarma Institute of Information Technology India
the Internet of things (IoT) and Machine-to-Machine (M2M) communication have connected devices, enabling major advances in various fields. the priority now is secure and efficient management of these interconnected sy... 详细信息
来源: 评论
POSTER: Blockchain-Based Differential privacy Cost Management System  20
POSTER: Blockchain-Based Differential Privacy Cost Managemen...
收藏 引用
15th acm Asia conference on Computer and Communications security, ASIA CCS 2020
作者: Han, Leong Mei Zhao, Yang Zhao, Jun Nanyang Technological University Singapore Singapore
privacy preservation is a big concern for various sectors. To protect individual user data, one emerging technology is differential privacy. However, it still has limitations for datasets with frequent queries, such a... 详细信息
来源: 评论
A PUF-based Mutual Authentication Protocol for Internet of things
A PUF-based Mutual Authentication Protocol for Internet of T...
收藏 引用
5th International conference on Computing, Communication and security (ICCCS)
作者: Satamraju, Krishna Prasad Malarkodi, B. Natl Inst Technol Dept ECE Tiruchirappalli Tamil Nadu India
Internet of things (IoT) has revolutionized the world with its innovative and precise solutions catering a broad spectrum of applications. Smart cities, smart financial services, smart logistics, smart agriculture sys... 详细信息
来源: 评论
data security of SaaS Platform based on Blockchain and Decentralized Technology  5
Data Security of SaaS Platform based on Blockchain and Decen...
收藏 引用
5th International conference on Inventive Computation Technologies (ICICT)
作者: Wang, Weiwei Harbin Finance Univ Harbin 150030 Heilongjiang Peoples R China
data security in the SaaS platform based on the Blockchain and decentralized technology is well analyzed in this paper. the unified SaaS service platform based on cloud computing needs to realize functions of applicat... 详细信息
来源: 评论
Overview of Enterprise IoT security System based on Edge Computing  5
Overview of Enterprise IoT Security System based on Edge Com...
收藏 引用
5th International conference on Internet of things, Big data and security (IoTBDS)
作者: Lan, Liyun Bai, Jiujun Chen, Xuebo Univ Sci & Technol Liaoning Sch Elect & Informat Engn Qianshan Rd Anshan 114051 Liaoning Peoples R China
the topic of security runs through the development of human society, and it exists in all aspects of our lives and work. In order to better ensure the safety of the employees in enterprises, the enterprise IoT securit... 详细信息
来源: 评论