咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是781-790 订阅
排序:
Custom-made Anonymization by data Analysis Program Provided by Recipient  19
Custom-made Anonymization by Data Analysis Program Provided ...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Maeda, Wakana Yamaoka, Yuji Fujitsu Labs Ltd Kawasaki Kanagawa Japan
Anonymization is a method used in privacy-preserving data publishing. Previous studies show that anonymization based on the request of a data recipient, the priority of attributes, helps to maintain data utility. Howe... 详细信息
来源: 评论
Aviation Scenarios for 5G and Beyond  39
Aviation Scenarios for 5G and Beyond
收藏 引用
39th AIAA/IEEE Digital Avionics Systems conference (DASC)
作者: Matti, Erik Johns, Oliver Khan, Suleman Gurtov, Andrei Josefsson, Billy Linkoping Univ Dept Comp & Informat Sci Linkoping Sweden Luftfartsverket Norrkoping Sweden
Aviation (both manned and unmanned) offers many novel application scenarios for 5th and 6th (XG) generation mobile networks. For drones (Unmanned Aircraft), navigation in challenging environments, such as urban with t... 详细信息
来源: 评论
Preserving privacy of data with Efficient Attribute-based Encryption Schemes  21
Preserving Privacy of Data with Efficient Attribute-based En...
收藏 引用
Adjunct proceedings of the 29th acm conference on User Modeling, Adaptation and Personalization
作者: Nikos Komninos City University of London United Kingdom
Attribute-based encryption (ABE) schemes and their variations are often applied to preserve the privacy of data. In particular, ABE schemes proposals are resilient to multiple attacks, including attacks in interceptio... 详细信息
来源: 评论
PrivStream: Differentially Private Event Detection on data Streams  19
PrivStream: Differentially Private Event Detection on Data S...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Fanaeepour, Maryam Machanavajjhala, Ashwin Duke Univ Dept Comp Sci Durham NC 27706 USA
Event monitoring and detection in real-time systems is crucial. Protecting users' data while reporting an event in almost real-time will increase the level of this challenge. In this work, we adopt the strong noti... 详细信息
来源: 评论
Research and application of Blockchain Technology in Transportation Administrative Law Enforcement  5
Research and Application of Blockchain Technology in Transpo...
收藏 引用
5th IEEE Information Technology and Mechatronics Engineering conference, ITOEC 2020
作者: Wanhua, Luo China Academy of Transportation Sciences Room 810 Office Building 1 No. 10 Hepingli East Street Dongcheng District Beijing China
According to the overall goal of rule the society by law, combined with specific requirements such as the records of the entire process of law enforcement in the three systems, the information such as law enforcement ... 详细信息
来源: 评论
Review of Image encryption techniques using neural network for optical security in the healthcare sector - PNO System  5
Review of Image encryption techniques using neural network f...
收藏 引用
5th IEEE International conference on Innovative Technologies in Intelligent Systems and Industrial applications, CITISIA 2020
作者: Su, Jinfeng Kankani, Anup Zajko, George Elchouemi, Amr Kurniawan, Hendra Study Group Australia Sydney Australia American Public University System United States IIB Darmajaya Lampung Indonesia
Image encryption is used to encrypt patient images that contain diagnostic information about patients in healthcare. the healthcare sector uses electronic media to support the transmission of scanning results, such as... 详细信息
来源: 评论
Unsupervised Pixel-level Crack Detection Based on Generative Adversarial Network  20
Unsupervised Pixel-level Crack Detection Based on Generative...
收藏 引用
5th International conference on Multimedia Systems and Signal Processing, ICMSSP 2020
作者: Duan, Lijuan Geng, Huiling Pang, Junbiao Zeng, Jun Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Automatic crack detection from pavement images is an import research field. Meanwhile, crack detection is a challenge task: (1) manual labels are subjective because of low contrast between crack and the surrounding pa... 详细信息
来源: 评论
Detecting Android Malware Based on Dynamic Feature Sequence and Attention Mechanism
Detecting Android Malware Based on Dynamic Feature Sequence ...
收藏 引用
Cryptography, security and privacy (CSP), IEEE International conference on
作者: Hanlin Long Zhicheng Tian Yang Liu College of Computer Science and Technology Harbin Institute of Technology Shenzhen China Cyberspace Security Research Center Peng Cheng Laboratory
the mechanism of running software on virtual machines partly ensures the security of Android system. However, with all kinds of malicious codes being developed, there has been a huge number of massive security inciden... 详细信息
来源: 评论
proceedings of 2020 7th International conference on Networking, Systems and security, NSysS 2020
Proceedings of 2020 7th International Conference on Networki...
收藏 引用
7th International conference on Networking, Systems and security, NSysS 2020
the proceedings contain 15 papers. the topics discussed include: can COVID-19 change the Big5 personality traits of healthcare workers?;attacks on health workers during COVID-19 pandemic - data exploration and news ar...
来源: 评论
Study of security and privacy issues in internet of things  5
Study of security and privacy issues in internet of things
收藏 引用
5th IEEE International conference on Innovative Technologies in Intelligent Systems and Industrial applications, CITISIA 2020
作者: Khalid, Muhammad Hassam Murtaza, Mohsin Habbal, Mostafa Study Group Australia
With the advancement of technology and the internet, almost every device is connected to internet. Internet of things (IoT) can be explained as an extension of the internet in which smart devices are interconnected wi... 详细信息
来源: 评论