咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是881-890 订阅
排序:
A recent survey on challenges in security and privacy in internet of things  19
A recent survey on challenges in security and privacy in int...
收藏 引用
5th International conference on Engineering and MIS, ICEMIS 2019
作者: Aljawarneh, Shadi Radhakrishna, Vangipuram Kumar, Gunupudi Rajesh Department of Software Engineering Jordan University of Science and Technology Irbid22110 Jordan Department of Information Technology VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad India
Computing environment in IoT (Internet of things) is surrounded with huge amounts of heterogeneous data fulfilling many services in everyone's daily life. Since, communication process in IoT takes place using diff... 详细信息
来源: 评论
dataBlinder: A distributed data protection middleware supporting search and computation on encrypted data  19
DataBlinder: A distributed data protection middleware suppor...
收藏 引用
20th International Middleware conference Industrial Track (Middleware Industry)
作者: Heydari, Emad Lagaisse, Bert Joosen, Wouter Aly, Abdelrahaman Brackx, Michael Katholieke Univ Leuven Imec DistriNet Leuven Belgium Katholieke Univ Leuven Imec COSIC Leuven Belgium UnifiedPost La Hulpe Belgium
Business application owners want to outsource data storage, including sensitive data, to the public cloud for economical reasons. this is often challenging since these businesses are and remain responsible for regulat... 详细信息
来源: 评论
Machine learning based cloudbot detection using multi-layer traffic statistics  21
Machine learning based cloudbot detection using multi-layer ...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Guo, Yu Shi, Junzheng Cao, Zigang Kang, Cuicui Xiong, Gang Li, Zhen Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences Beijing China
With the rapid development of e-commerce services and online transactions, an increasing number of advanced web robots are utilized by speculators and hackers in underground economy to perform click fraud, register fa... 详细信息
来源: 评论
Secure Fine-Grained data Access Control Over Multiple Cloud Server Based Healthcare applications  5
Secure Fine-Grained Data Access Control Over Multiple Cloud ...
收藏 引用
5th International conference on Computing, Communication Control and Automation (ICCUBEA)
作者: Deshmukh, Nilam Manikrao Kumar, Santosh Shirsath, Rakesh Sandip Inst Technol & Res Ctr SPPU Dept Comp Engn Nasik India
With the flourishing build out of the cloud computing, privacy and security worries of outsourcing data have been increasing to a great extent. Mobile cloud model aids for analyzing the information related with patien... 详细信息
来源: 评论
Ramparts: A Programmer-Friendly System for Building Homomorphic Encryption applications  7
Ramparts: A Programmer-Friendly System for Building Homomorp...
收藏 引用
7th acm Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC)
作者: Archer, David W. Trilla, Jose Manuel Calderon Dagit, Jason Malozemoff, Alex J. Polyakov, Yuriy Rohloff, Kurt Ryan, Gerard Galois Inc Portland OR 97204 USA New Jersey Inst Technol Newark NJ 07102 USA
Homomorphic Encryption (HE) is an emerging technology that enables computing on data while the data is encrypted. A major challenge with homomorphic encryption is that it takes extensive expert knowledge to design mea... 详细信息
来源: 评论
IoT Healthcare: Benefits, Issues and Challenges  19
IoT Healthcare: Benefits, Issues and Challenges
收藏 引用
5th EAI International conference on Smart Objects and Technologies for Social Good (GOODTECHS)
作者: De Michele, Roberta Furini, Marco Univ Bologna Dept Ind Engn Bologna Italy Univ Modena & Reggio Emilia Dip Comunicaz Econ Reggio Emilia Italy
A sportsman's watch no longer marks the time, but it also provides information on the geographical location, on the number of steps, on the heart rate, on the blood oxygenation, on the blood pressure, etc. the bra... 详细信息
来源: 评论
HP-SDDAN: High-performance software-defined data access network  21
HP-SDDAN: High-performance software-defined data access netw...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: You, Ruibang Yuan, Zimu Tu, Bibo Cheng, Jie Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China
Recently, data protection has become increasingly important in cloud environments. the cloud platform has global user information, rich storage resource allocation information, and a fuller understanding of data attri... 详细信息
来源: 评论
Recurrent neural network based password generation for group attribute context-ware applications  21
Recurrent neural network based password generation for group...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Luo, Jun Deng, Jin Lu, Chu Liu, Hong Third Research Institute Ministry of Public Security China Beijing Traffic Management Bureau Beijing Public Security Bureau China East China Normal University China
Password generation becomes an emerging issue to improve the efficiency of authentication in social engineering and plays an important role in checking the security vulnerability since the weak password may lead to po... 详细信息
来源: 评论
nGraph-HE2: A High-throughput Framework for Neural Network Inference on Encrypted data  7
nGraph-HE2: A High-Throughput Framework for Neural Network I...
收藏 引用
7th acm Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC)
作者: Boemer, Fabian Costache, Anamaria Cammarota, Rosario Wierzynski, Casimir Intel AI Res San Diego CA 92129 USA
In previous work, Boemer et al. introduced nGraph-HE, an extension to the Intel nGraph deep learning (DL) compiler, that enables data scientists to deploy models with popular frameworks such as TensorFlow and PyTorch ... 详细信息
来源: 评论
5th International conference on Dependability in Sensor, Cloud, and Big data Systems and applications, DependSys 2019
5th International Conference on Dependability in Sensor, Clo...
收藏 引用
5th International conference on Dependability in Sensor, Cloud, and Big data Systems and applications, DependSys 2019
the proceedings contain 39 papers. the special focus in this conference is on Dependability in Sensor, Cloud, and Big data Systems and applications. the topics include: Assessing the Dependability of Apache Spark Syst...
来源: 评论