咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是901-910 订阅
排序:
A SaaS-Native Wildcard Searchable Encryption Scheme for Protecting privacy in Cloud Services  5
A SaaS-Native Wildcard Searchable Encryption Scheme for Prot...
收藏 引用
5th IEEE International conference on Big data Intelligence and Computing, dataCom 2019
作者: Chung, Shen-Ming Shieh, Ming-Der Chiueh, Tzi-Cker National Cheng Kung University Depart. of Electrical Engineering Tainan Taiwan Industrial Technology Research Institute Information and Comm. Research Labs Hsinchu Taiwan
As GDPR and similar regulations are taking a more important role in business, cloud services lacking privacy-protection mechanisms could suffer the most. Fortunately, some technical solutions do exist and, among them,... 详细信息
来源: 评论
application of IoT in Smart Grid: Challenges and Solutions  5
Application of IoT in Smart Grid: Challenges and Solutions
收藏 引用
5th Iranian conference on Signal Processing and Intelligent Systems (ICSPIS)
作者: Davoody-Beni, Zahra Sheini-Shahvand, Niloufar Shahinzadeh, Hossein Moazzami, Majid Shaneh, Mahdi Gharehpetian, Gevork B. Islamic Azad Univ Najafabad Branch Dept Elect Engn Najafabad Iran Amirkabir Univ Technol Dept Elect Engn Tehran Polytech Tehran Iran Islamic Azad Univ Smart Microgrid Res Ctr Najafabad Branch Afabad Iran
the prevailing development in energy grids and emersion of new energy players along with the advent of the Internet of things (IoT) lead available energy systems (e.g., smart electricity grid) toward "energy inte... 详细信息
来源: 评论
Secure and balanced scheme for non-local data storage in blockchain network  21
Secure and balanced scheme for non-local data storage in blo...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Liu, Tonglai Wu, Jigang Li, Jiaxing Li, Jingyi School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China Guangxi Key Laboratory of Cryptography and Information Security Guilin541004 China
Blockchain-based decentralized storage is one of the most typical and prevalence application. However, current works are not concerned about the storage imbalance caused by data leakage. this heavily impacts the avail... 详细信息
来源: 评论
data Anonymization for privacy Aware Machine Learning  5th
Data Anonymization for Privacy Aware Machine Learning
收藏 引用
5th International conference on Machine Learning, Optimization, and data Science (LOD)
作者: Jaidan, David Nizar Carrere, Maxime Chemli, Zakaria Poisvert, Remi Innovat L B Scalian France Labege France Ctr Excellence Datascale Scalian France Le Haillan France Innovat L B Scalian France Paris France Innovat L B Scalian France Rennes France
the increase of data leaks, attacks, and other ransom-ware in the last few years have pointed out concerns about data security and privacy. All this has negatively affected the sharing and publication of data. To addr... 详细信息
来源: 评论
Blockchain-Based privacy-Preserving Authentication and Message Dissemination Scheme for VANET  19
Blockchain-Based Privacy-Preserving Authentication and Messa...
收藏 引用
proceedings of the 2019 5th International conference on Systems, Control and Communications
作者: Bachira Guehguih Hongwei Lu School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
the vehicular ad hoc network (VANET) is an intelligent transportation system application that aims to ensure the security of road traffic information over V2V communication and V2I communication. In this paper, we pro... 详细信息
来源: 评论
data-Pattern Driven Cache-Collision Timing Attacks Against AES-GCM  5
Data-Pattern Driven Cache-Collision Timing Attacks Against A...
收藏 引用
5th IEEE International conference on Big data Intelligence and Computing, dataCom 2019
作者: Huang, James Li, Xiaoming University of Delaware Department of Electrical and Computer Engineering NewarkDE19716 United States
data security is an important issue in Big data applications. Even though the same problem has been extensively studied within other contexts, Big data applications present several unique challenges. Among them is act... 详细信息
来源: 评论
BlockChain for IoT security and Management: Current Prospects, Challenges and Future Directions  5
BlockChain for IoT Security and Management: Current Prospect...
收藏 引用
5th International conference on Networking, Systems and security (NSysS)
作者: Roy, Shanto Ashaduzzaman, Md. Hassan, Mehedi Chowdhury, Arnab Rahman Green Univ Bangladesh Dept Comp Sci & Engn Dhaka 1207 Bangladesh
the paper presents an in detailed case study of integrating BlockChain (BC) in IoT ecosystems in order to achieve security and privacy. Since the use in cryptocurrency, BlockChain has gained tremendous attraction due ... 详细信息
来源: 评论
Traffic classification and application identification based on machine learning in large-scale supercomputing center  21
Traffic classification and application identification based ...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Zhao, Shilin Ye, Kejiang Xu, Cheng-Zhong Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Faculty of Science and Technology University of Macau China
Internet traffic classification and application identification associated with network traffic is an essential step for network security and traffic engineering. the traditional port-based, payload-based or statistic-... 详细信息
来源: 评论
5th International conference on Artificial Intelligence and security, ICAIS 2019
5th International Conference on Artificial Intelligence and ...
收藏 引用
5th International conference on Artificial Intelligence and security, ICAIS 2019
the proceedings contain 229 papers. the special focus in this conference is on Artificial Intelligence and security. the topics include: Detection of Microblog Overlapping Community Based on Multidimensional Informati...
来源: 评论
Linear SVM for classifying breast cancer data encrypted using homomorphic cryptosystem  5
Linear SVM for classifying breast cancer data encrypted usin...
收藏 引用
5th International conference on Science and Technology, ICST 2019
作者: Sari, Anny Kartika Widya Prasetya, Faisal Malik Universitas Gadjah Mada Department of Computer Science and Electronics Yogyakarta Indonesia
Support Vector Machine (SVM) is widely used for data classification in many fields, including in biomedical area. While data privacy is a requirement for patients' health records, most existing classification mode... 详细信息
来源: 评论