咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是891-900 订阅
排序:
5th International Symposium on security and privacy in Social Networks and Big data, SocialSec 2019
5th International Symposium on Security and Privacy in Socia...
收藏 引用
5th International Symposium on security and privacy in Social Networks and Big data, SocialSec 2019
the proceedings contain 20 papers. the special focus in this conference is on security and privacy in Social Networks and Big data. the topics include: Predicting users’ emotional intelligence with social networking ...
来源: 评论
Multi Low-resolution Infrared Sensor Setup for privacy-preserving Unobtrusive Indoor Localization  5
Multi Low-resolution Infrared Sensor Setup for Privacy-prese...
收藏 引用
5th International conference on Information and Communication Technologies for Ageing Well and e-Health (ICT4AWE)
作者: Kowalski, Christian Blohm, Kolja Weiss, Sebastian Pfingsthorn, Max Gliesche, Pascal Hein, Andreas Inst Informat Technol OFFIS Oldenburg Germany Carl von Ossietzky Univ Oldenburg Oldenburg Germany
the number of home intensive care patients is increasing while the number of nursing staff is decreasing at the same time. To counteract this problem, it is necessary to take a closer look at safety-critical scenarios... 详细信息
来源: 评论
CFADefense: A security solution to detect and mitigate crossfire attacks in software-defined iot-edge infrastructure  21
CFADefense: A security solution to detect and mitigate cross...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Rafique, Wajid He, Xin Liu, Zifan Sun, Yuhu Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Managing the Internet of things (IoT) infrastructure has become a critical challenge due to an enormous increase in the connected devices and the lack of available security solutions. Software-Defined Networking (SDN)... 详细信息
来源: 评论
PRIME-Q: privacy Aware End-to-End QoS Framework in Multi-Domain SDN  5
PRIME-Q: Privacy Aware End-to-End QoS Framework in Multi-Dom...
收藏 引用
5th IEEE conference on Network Softwarization (IEEE NetSoft) / 2nd International Workshop on Advances in Slicing for Softwarized Infrastructures (S4SI)
作者: Joshi, Kalpana D. Kataoka, Kotaro Indian Inst Technol Hyderabad Hyderabad India
this paper presents the privacy preserving End-to-End (E2E) Quality of Service (QoS) mechanism in multi-domain Software Defined Network (SDN). Guaranteed E2E QoS needs complete information about the network. But, in m... 详细信息
来源: 评论
Inferring behaviors via encrypted video surveillance traffic by machine learning  21
Inferring behaviors via encrypted video surveillance traffic...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Liu, Xiaolong Wang, Jibao Yang, Ying Cao, Zigang Xiong, Gang Xia, Wei Institute of Information Engineering University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
In order to protect the safety of people, smart cameras are widely used in many places of life: homes, offices, subways and many other ways. However, those smart cameras could lead to personal information leakage. Con... 详细信息
来源: 评论
Dynamic data access control for multi-authority cloud storage  21
Dynamic data access control for multi-authority cloud storag...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Wang, Jian Ye, Chunxiao Ou, Yangfei Colleage of Computer Science Chongqing University Chongqing China
Cloud computing have brought a lot of advantages, such as reducing the hardware cost and providing a convenient cloud storage service. More and more people choose to put their private data in the cloud. However, due t... 详细信息
来源: 评论
A Survey of privacy Leakage and security Vulnerabilities in the Internet of things
A Survey of Privacy Leakage and Security Vulnerabilities in ...
收藏 引用
International conference on Communication and Electronics Systems (ICCES)
作者: Amit Kumar Tyagi Deepti Goyal School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Chennai Tamilnadu India Lingaya's Vidyapeeth Faridabad Haryana India
In this world, where everything around use is linked with technology, be it smart homes, smart cities, smart cars, etc. Internet of things (IoT) or Internet Connected things (ICT) are connected todays everywhere, with...
来源: 评论
there Are 10 Types of Vectors (and Polynomials) Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero  18
There Are 10 Types of Vectors (and Polynomials) Efficient Ze...
收藏 引用
2019 Workshop on privacy in the Electronic Society
作者: Black, William Henry, Ryan Univ Calgary Calgary AB Canada
We present a new 4-move special honest-verifier zero-knowledge proof of knowledge system for proving that a vector of Pedersen commitments opens to a so-called "one-hot" vector (i.e., to a vector from the st... 详细信息
来源: 评论
Proposing Automatic dataset Generation System to Support Android Sensitive data Leakage Detection Systems  19
Proposing Automatic Dataset Generation System to Support And...
收藏 引用
5th International conference on Computing and Artificial Intelligence (ICCAI)
作者: Nguyen Tan Cam Nghi Hoang Khoa Le Duc thinh Van-Hau Pham Tuan Nguyen Hoa Sen Univ Ho Chi Minh City Vietnam Vietnam Natl Univ Univ Informat Technol Ho Chi Minh City Vietnam
Android sensitive information leakage datasets studies are still limited. Specifically, DroidBench dataset contains 120 case studies of which only 3 case studies are used for analyzing inter-application data flow. the... 详细信息
来源: 评论
2019 5th IEEE International WIE conference on Electrical and Computer Engineering, WIECON-ECE 2019 - proceedings
2019 5th IEEE International WIE Conference on Electrical and...
收藏 引用
5th IEEE International WIE conference on Electrical and Computer Engineering, WIECON-ECE 2019
the proceedings contain 76 papers. the topics discussed include: improved fractional order relay for unstable and higher order stable processes;bestow: a location-based mobile application for religious donors in conte...
来源: 评论