咨询与建议

限定检索结果

文献类型

  • 555 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 556 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 430 篇 工学
    • 418 篇 计算机科学与技术...
    • 139 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 13 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 552 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"
556 条 记 录,以下是1-10 订阅
排序:
CODASPY 2024 - proceedings of the 14th acm conference on data and application security and privacy
CODASPY 2024 - Proceedings of the 14th ACM Conference on Dat...
收藏 引用
14th acm conference on data and application security and privacy, CODASPY 2024
The proceedings contain 43 papers. The topics discussed include: estimating the runtime and global network traffic of SMPC protocols;a unified time series analytics based intrusion detection framework for CAN BUS atta...
来源: 评论
CODASPY 2023 - proceedings of the 13th acm conference on data and application security and privacy
CODASPY 2023 - Proceedings of the 13th ACM Conference on Dat...
收藏 引用
13th acm conference on data and application security and privacy, CODASPY 2023
The proceedings contain 30 papers. The topics discussed include: comparative privacy analysis of mobile browsers;IdDecoder: a face embedding inversion tool and its privacy and security implications on facial recogniti...
来源: 评论
CODASPY 2022 - proceedings of the 12th acm conference on data and application security and privacy
CODASPY 2022 - Proceedings of the 12th ACM Conference on Dat...
收藏 引用
12th acm conference on data and application security and privacy, CODASPY 2022
The proceedings contain 45 papers. The topics discussed include: how (not) to deploy cryptography on the Internet;GINN: fast GPU-TEE based integrity for neural network training;leveraging synthetic data and PU learnin...
来源: 评论
CODASPY 2021 - proceedings of the 11th acm conference on data and application security and privacy
CODASPY 2021 - Proceedings of the 11th ACM Conference on Dat...
收藏 引用
11th acm conference on data and application security and privacy, CODASPY 2021
The proceedings contain 38 papers. The topics discussed include: membership inference attacks and defenses in classification models;using single-step adversarial training to defend iterative adversarial examples;real-...
来源: 评论
CODASPY 2019 - proceedings of the 9th acm conference on data and application security and privacy
CODASPY 2019 - Proceedings of the 9th ACM Conference on Data...
收藏 引用
9th acm conference on data and application security and privacy, CODASPY 2019
The proceedings contain 35 papers. The topics discussed include: understanding the responsiveness of mobile app developers to software library updates;acminer: extraction and analysis of authorization checks in androi...
来源: 评论
SLIM-View: Sampling and Private Publishing of Multidimensional databases  24
SLIM-View: Sampling and Private Publishing of Multidimension...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Laouir, Ala Eddine Imine, Abdessamad Univ Lorraine CNRS Nancy France INRIA Nancy France
Despite the enormous data processing capacity available in big data frameworks, obtaining appropriate and private responses to large-scale queries without revealing sensitive information is still a challenging problem... 详细信息
来源: 评论
"That's Kind of Sus(picious)": The Comprehensiveness of Mental Health application Users' privacy and security Concerns  24
"That's Kind of Sus(picious)": The Comprehensiveness of Ment...
收藏 引用
acm CHI conference on Human Factors in Computing Sytems (CHI)
作者: Khoo, Yi Xuan Kang, Rachael M. Reynolds, Tera L. Mentis, Helena M. Univ Maryland Baltimore Cty Baltimore MD 21250 USA
With the increasing usage of mental health applications (MHAs), there is growing concern regarding their data privacy practices. Analyzing 437 user reviews from 83 apps, we outline users' predominant privacy and s... 详细信息
来源: 评论
From Theory to Comprehension: A Comparative Study of Differential privacy and κ-Anonymity  24
From Theory to Comprehension: A Comparative Study of Differe...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: von Voigt, Saskia Nunez Mehner, Luise Tschorsch, Florian Tech Univ Berlin Berlin Germany Tech Univ Dresden Dresden Germany
The notion of epsilon-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential pr... 详细信息
来源: 评论
A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft  24
A-COPILOT: Android Covert Operation for Private Information ...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Lim, Joseph Guan Quan Kwok, Zhen Yu Soon, Isaac Yong, Jun Xian Yuhao, Samuel Song Rosley, Siti Halilah Binte Balachandran, Vivek Singapore Inst Technol Singapore Singapore
This paper investigates an underexplored avenue of cybersecurity threats in mobile computing, with a particular focus on the Android platform which, due to its open nature and widespread adoption, is a fertile ground ... 详细信息
来源: 评论
privacy Preserving Biometric Authentication for Fingerprints and Beyond  24
Privacy Preserving Biometric Authentication for Fingerprints...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Blanton, Marina Murphy, Dennis Univ Buffalo Buffalo NY 14260 USA
Biometric authentication eliminates the need for users to remember secrets and serves as a convenient mechanism for user authentication. Traditional implementations of biometric-based authentication store sensitive us... 详细信息
来源: 评论