咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是911-920 订阅
排序:
An Empirical Study of Differentially-Private Analytics for High-Speed Network data  18
An Empirical Study of Differentially-Private Analytics for H...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Niculaescu, Oana-Georgiana Ghinita, Gabriel UMass Boston Boston MA 02125 USA
来源: 评论
Edge computing for user-centric secure search on cloud-based encrypted big data  21
Edge computing for user-centric secure search on cloud-based...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Ahmad, Sahan Zobaed, S.M. Gottumukkala, Raju Salehi, Mohsen Amini School of Computing AND Informatics Louisiana70504 United States Informatics Research Institute University of Louisiana at Lafayette Lafayette Louisiana70504 United States
Cloud service providers offer a low-cost and convenient solution to host unstructured data. However, cloud services act as third-party solutions and do not provide control of the data to users. this has raised securit... 详细信息
来源: 评论
ClustCrypt: privacy-preserving clustering of unstructured big data in the cloud  21
ClustCrypt: Privacy-preserving clustering of unstructured bi...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Zobaed, S.M. Ahmad, Sahan Gottumukkala, Raju Salehi, Mohsen Amini School of Computing and Informatics Informatics Research Institute University of Louisiana at Lafayette Louisiana70504 United States
security and confidentiality of big data stored in the cloud are important concerns for many organizations to adopt cloud services. One common approach to address the concerns is client-side encryption where data is e... 详细信息
来源: 评论
A session-packets-based encrypted traffic classification using capsule neural networks  21
A session-packets-based encrypted traffic classification usi...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Cui, Susu Jiang, Bo Cai, Zhenzhen Lu, Zhigang Liu, Song Liu, Jian Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
With the enhancement of network security awareness and excellent applicability of encryption protocols, identifying encrypted traffic is a critical and fundamental task for many network protection applications. Conven... 详细信息
来源: 评论
Industrial IoT Smartbox for the Shop Floor  5
Industrial IoT Smartbox for the Shop Floor
收藏 引用
5th Experiment at International conference, exp.at 2019
作者: Malhao, Sergio Dionisio, Rogerio Torres, Pedro Instituto Politécnico de Castelo Branco Castelo Branco Portugal
Constant search for efficiency and productivity has led to innovation on the factory shop floor, representing an evolution of the current production systems combined with new technologies of industrial automation and ... 详细信息
来源: 评论
Investigation of Mobile Machine Learning Models to Preserve the Effectiveness of User privacy
Investigation of Mobile Machine Learning Models to Preserve ...
收藏 引用
IEEE conference on Innovative Technologies in Intelligent Systems and Industrial applications (CITISIA)
作者: Danial Motahari Samrah Arif Arash Mohboubi Sabih ur Rehman School of Computing and Mathematics Charles Sturt University Australia
Machine Learning (ML) has become one of the dominant technologies in the research world. It is being applied without exception in every field where automation and future predictions are required such as cyber security... 详细信息
来源: 评论
5th International conference on Cryptology and Information security in Latin America, LATINCRYPT 2017
5th International Conference on Cryptology and Information S...
收藏 引用
5th International conference on Cryptology and Information security in Latin America, LATINCRYPT 2017
the proceedings contain 21 papers. the special focus in this conference is on Cryptology and Information security in Latin America. the topics include: Energy-efficient ARM64 cluster with cryptanalytic applications: 8...
来源: 评论
A real-time identification system for voip traffic in large-scale networks  21
A real-time identification system for voip traffic in large-...
收藏 引用
21st IEEE International conference on High Performance Computing and Communications, 17th IEEE International conference on Smart City and 5th IEEE International conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Wang, Rongkang Zhang, Jianzhong Zhang, Yu Yin, Mingxin Xu, Jingdong Laboratory of Network and Information Security College of Cyber Science Nankai University Tianjin China
Recently, VoIP applications win most of the users' favor with their high service quality and low price. However, owing to the flexible of VoIP services, they will cause incalculable damage if these services are us... 详细信息
来源: 评论
5th International conference on Artificial Intelligence and security, ICAIS 2019
5th International Conference on Artificial Intelligence and ...
收藏 引用
5th International conference on Artificial Intelligence and security, ICAIS 2019
the proceedings contain 229 papers. the special focus in this conference is on Artificial Intelligence and security. the topics include: Multi-function Quantum Cryptography Protocol Based on Bell State;the Attack Case...
来源: 评论
5th International conference on Soft Computing in data Science, SCDS 2019
5th International Conference on Soft Computing in Data Scien...
收藏 引用
5th International conference on Soft Computing in data Science, SCDS 2019
the proceedings contain 30 papers. the special focus in this conference is on International conference on Soft Computing in data Science. the topics include: Predictive Model of Graduate-On-Time Using Machine Learning...
来源: 评论