咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是731-740 订阅
排序:
4th International conference on Advanced Informatics for Computing Research, ICAICR 2020
4th International Conference on Advanced Informatics for Com...
收藏 引用
4th International conference on Advanced Informatics for Computing Research, ICAICR 2020
the proceedings contain 23 papers. the special focus in this conference is on Advanced Informatics for Computing Research. the topics include: Internet of things in Healthcare: A Review;inter-Vehicular Communication f...
来源: 评论
4th International conference on Advanced Informatics for Computing Research, ICAICR 2020
4th International Conference on Advanced Informatics for Com...
收藏 引用
4th International conference on Advanced Informatics for Computing Research, ICAICR 2020
the proceedings contain 23 papers. the special focus in this conference is on Advanced Informatics for Computing Research. the topics include: Internet of things in Healthcare: A Review;inter-Vehicular Communication f...
来源: 评论
application Lifecycle Management for Industrial IoT Devices in Smart Grid Use Cases  5
Application Lifecycle Management for Industrial IoT Devices ...
收藏 引用
5th International conference on Internet of things, Big data and security (IoTBDS)
作者: Cejka, Stephan Kintzler, Florian Muellner, Lisa Knorr, Felix Mittelsdorf, Marco Schumann, Joern Siemens AG Osterreich Vienna Austria Fraunhofer Inst Solar Energy Syst ISE Freiburg Germany
Complex cyber-physical systems like the Smart Grid, in which Industrial Internet of things (IIoT) technology is used, require advanced software maintenance mechanisms to remain dependable and secure. In this paper, re... 详细信息
来源: 评论
5th International conference on Information Systems security and privacy, ICISSP 2019
5th International Conference on Information Systems Security...
收藏 引用
5th International conference on Information Systems security and privacy, ICISSP 2019
the proceedings contain 19 papers. the special focus in this conference is on Information Systems security and privacy. the topics include: Protection of User-Defined Sensitive Attributes on Online Social Networks Aga...
来源: 评论
Acoustic Localization System based on Smartphone without Time Synchronization  5
Acoustic Localization System based on Smartphone without Tim...
收藏 引用
5th International conference on Information Science, Computer Technology and Transportation (ISCTT)
作者: Zhang, Peng Wang, Mei Qiu, Hongbing Kan, Ruixiang Guilin Univ Elect Technol Sch Informat & Commun Guilin Peoples R China Guilin Univ Technol Sch Informat Sci & Engn Guilin Peoples R China
Aiming at the problems of traditional indoor localization system, such as special user equipment, strict clock synchronization and long localization period, we propose a smartphone indoor acoustic localization system ... 详细信息
来源: 评论
Discussion on Heterogeneous Converged IoT Networking Scheme of CBN in Hotel Field  5
Discussion on Heterogeneous Converged IoT Networking Scheme ...
收藏 引用
5th International conference on Internet of things, Big data and security (IoTBDS)
作者: Bai, Jiujun Tong, Yuqing Chen, Xuebo Univ Sci & Technol Liaoning Sch Elect & Informat Engn Qianshan Rd Anshan Liaoning Peoples R China
the Internet of things (IoT) is a business area that the four major domestic operators must compete in the 5G era. How to build a hotel IoT solution based on China Broadcast Network (CBN) without affecting the transmi... 详细信息
来源: 评论
Optimization of Information security Sharing Mechanism of Online Education Platform based on Block Chain Technology  21
Optimization of Information Security Sharing Mechanism of On...
收藏 引用
proceedings of the 5th International conference on Digital Technology in Education
作者: Guoping Chen Guosen Miao Yingchun Xue Center of Service Science and Engineering Wuhan University of Science and Technology China
Under the ravages of the COVID-19, online education platform business has achieved rapid development, and excessive platform integration and the spread of paid knowledge have also spawned security problems of data sha... 详细信息
来源: 评论
POSTER: Attacks to Federated Learning: Responsive Web User Interface to Recover Training data from User Gradients  20
POSTER: Attacks to Federated Learning: Responsive Web User I...
收藏 引用
15th acm Asia conference on Computer and Communications security, ASIA CCS 2020
作者: Lianto, Hans Albert Zhao, Yang Zhao, Jun Nanyang Technological University Singapore Singapore
Local differential privacy (LDP) is an emerging privacy standard to protect individual user data. One scenario where LDP can be applied is federated learning, where each user sends in his/her user gradients to an aggr... 详细信息
来源: 评论
Machine Learning Approaches for Diabetes Classification: Perspectives to Artificial Intelligence Methods Updating  5
Machine Learning Approaches for Diabetes Classification: Per...
收藏 引用
5th International conference on Internet of things, Big data and security (IoTBDS)
作者: Mainenti, Giuseppe Campanile, Lelio Marulli, Fiammetta Ricciardi, Carlo Valente, Antonio S. Univ Salerno DIEM Salerno Italy Univ Campania L Vanvitelli Dept Matemat & Fis Caserta Italy Univ Naples Federico II Dept Adv Biomed Sci Naples Italy Publ Funding Accountable Caserta Italy
In recent years the application of Machine Learning (ML) and Artificial Intelligence (AI) techniques in healthcare helped clinicians to improve the management of chronic patients. Diabetes is among the most common chr... 详细信息
来源: 评论
Explore the Transformation Space for Adversarial Images  20
Explore the Transformation Space for Adversarial Images
收藏 引用
10th acm conference on data and application security and privacy (CODASPY)
作者: Chen, Jiyu Wang, David Chen, Hao Univ Calif Davis Davis CA 95616 USA Vestavia Hills High Sch Vestavia Hills AL USA
Deep learning models are vulnerable to adversarial examples. Most of current adversarial attacks add pixel-wise perturbations restricted to some L-p -norm, and defense models are evaluated also on adversarial examples... 详细信息
来源: 评论