咨询与建议

限定检索结果

文献类型

  • 558 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 421 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 105 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 115 篇 理学
    • 106 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 60 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 554 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"
559 条 记 录,以下是81-90 订阅
排序:
Prediction of Mobile App privacy Preferences with User Profiles via Federated Learning  22
Prediction of Mobile App Privacy Preferences with User Profi...
收藏 引用
acm conference on data and application security and privacy (CODASPY)
作者: Brandao, Andre Mendes, Ricardo Vilela, Joao P. Univ Porto Fac Sci CRACS INESCTEC CISUC Porto Portugal Univ Porto Fac Sci Dept Comp Sci Porto Portugal Univ Coimbra CISUC Dept Informat Engn Coimbra Portugal
Permission managers in mobile devices allow users to control permissions requests, by granting of denying application's access to data and sensors. However, existing managers are ineffective at both protecting and... 详细信息
来源: 评论
Is there a security Mindset and Can it be Taught?  21
Is there a Security Mindset and Can it be Taught?
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Siraj, Ambareen Sridhar, Nigamanth Hamilton, John A. Drew, Jr. Khan, Latifur Kaza, Siddharth Gupta, Maanak Mittal, Sudip Tennessee Technol Univ Cookeville TN 38505 USA Cleveland State Univ Cleveland OH 44115 USA Mississippi State Univ Mississippi State MS 39762 USA Univ Texas Dallas Richardson TX 75083 USA Towson Univ Towson MD USA Univ North Carolina Wilmington Wilmington NC USA
The field of cybersecurity is becoming very dynamic, and needs continuous evolution. This requires not only the formal and informal education, but a security mindset to be developed for our future workforce. This pane... 详细信息
来源: 评论
privacy-Preserving Maximum Matching on General Graphs and its application to Enable privacy-Preserving Kidney Exchange  22
Privacy-Preserving Maximum Matching on General Graphs and it...
收藏 引用
acm conference on data and application security and privacy (CODASPY)
作者: Breuer, Malte Meyer, Ulrike Wetzel, Susanne Rhein Westfal TH Aachen Aachen Germany Stevens Inst Technol Hoboken NJ 07030 USA
To this day, there are still some countries where the exchange of kidneys between multiple incompatible patient-donor pairs is restricted by law. Typically, legal regulations in this context are put in place to prohib... 详细信息
来源: 评论
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach  24
ERASER: Machine Unlearning in MLaaS via an Inference Serving...
收藏 引用
31st conference on Computer and Communications security
作者: Hu, Yuke Lou, Jian Liu, Jiaqi Ni, Wangze Lin, Feng Qin, Zhan Ren, Kui Zhejiang Univ State Key Lab Blockchain & Data Secur Hangzhou Peoples R China Hong Kong Univ Sci & Technol Hong Kong Peoples R China
Over the past years, Machine Learning-as-a-Service (MLaaS) has received a surging demand for supporting Machine Learning-driven services to offer revolutionized user experience across diverse application areas. MLaaS ... 详细信息
来源: 评论
An Introduction to Federated Computation  22
An Introduction to Federated Computation
收藏 引用
International conference on Management of data (SIGMOD)
作者: Bharadwaj, Akash Cormode, Graham Meta AI Menlo Pk CA 94025 USA
Federated Computation is an emerging area that seeks to provide stronger privacy for user data, by performing large scale, distributed computations where the data remains in the hands of users. Only the necessary summ... 详细信息
来源: 评论
DP-UTIL: Comprehensive Utility Analysis of Differential privacy in Machine Learning  22
DP-UTIL: Comprehensive Utility Analysis of Differential Priv...
收藏 引用
acm conference on data and application security and privacy (CODASPY)
作者: Jarin, Ismat Eshete, Birhanu Univ Michigan Dearborn MI 48128 USA
Differential privacy (DP) has emerged as a rigorous formalism to quantify privacy protection provided by an algorithm that operates on privacy sensitive data. In machine learning (ML), DP has been employed to limit in... 详细信息
来源: 评论
An Investigative Study on the privacy Implications of Mobile E-scooter Rental Apps  22
An Investigative Study on the Privacy Implications of Mobile...
收藏 引用
15th acm conference on security and privacy in Wireless and Mobile Networks (acm WiSec)
作者: Vinayaga-Sureshkanth, Nisha Wijewickrama, Raveen Maiti, Anindya Jadliwala, Murtuza Univ Texas San Antonio San Antonio TX 78249 USA Univ Oklahoma Norman OK 73019 USA
E-scooter rental services have significantly expanded the micromobility paradigm of short-distance urban and suburban transportation since their inception in 2017. Service providers around the world have followed a co... 详细信息
来源: 评论
ProSPEC: Proactive security Policy Enforcement for Containers  22
ProSPEC: Proactive Security Policy Enforcement for Container...
收藏 引用
acm conference on data and application security and privacy (CODASPY)
作者: Kermabon-Bobinnec, Hugo Gholipourchoubeh, Mahmood Bagheri, Sima Majumdar, Suryadipta Jarraya, Yosr Pourzandi, Makan Wang, Lingyu Concordia Univ Montreal PQ Canada Ericsson Secur Res Montreal PQ Canada
By providing lightweight and portable support for cloud native applications, container environments have gained significant momentum lately. A container orchestrator such as Kubernetes can enable the automatic deploym... 详细信息
来源: 评论
Deep Learning for Network Traffic data  22
Deep Learning for Network Traffic Data
收藏 引用
28th acm SIGKDD conference on Knowledge Discovery and data Mining (KKD)
作者: Marwah, Manish Arlitt, Martin Micro Focus Santa Clara CA 95054 USA Micro Focus Calgary AB Canada
Network traffic data is key in addressing several important cyber-security problems, such as intrusion and malware detection, and network management problems, such as application and device identification. However, it... 详细信息
来源: 评论
Multi-Level Node Authorization using Recurrent Neural Networks for Secure Health Monitoring System
Multi-Level Node Authorization using Recurrent Neural Networ...
收藏 引用
2023 International conference on Sustainable Communication Networks and application, ICSCNA 2023
作者: Narayana, V. Lakshman Syamalatha, P. Vatsalya, P. Sricharitha, V. Akhila, V. Vignan's Nirula Institute of Technology and Science for Women Department of Cse Peda Palakaluru Guntur India
Rapid technological progress has allowed for the creation of novel healthcare solutions that aims to improve patient care and monitoring. data security and privacy are given high priority in the proposed system, which... 详细信息
来源: 评论