咨询与建议

限定检索结果

文献类型

  • 555 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 556 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 430 篇 工学
    • 418 篇 计算机科学与技术...
    • 139 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 13 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 552 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"
556 条 记 录,以下是11-20 订阅
排序:
Exploiting Update Leakage in Searchable Symmetric Encryption  24
Exploiting Update Leakage in Searchable Symmetric Encryption
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Haltiwanger, Jacob Hoang, Thang Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA
Dynamic Searchable Symmetric Encryption (DSSE) provides efficient techniques for securely searching and updating an encrypted database. However, efficient DSSE schemes leak some sensitive information to the server. Re... 详细信息
来源: 评论
Communicate Less, Learn More: A Locally Differential Private Approach for Counting Triangles with Better Accuracy  24
Communicate Less, Learn More: A Locally Differential Private...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Saladi, Sasi Bhushan V. Sristy, Nagesh Bhattu Natl Inst Technol Comp Sci & Engn Tadepalligudem Andhra Pradesh India
Local differential privacy (LDP) offers strong privacy guarantees, but with reduced accuracy due to noise addition. More often than not, the accuracy of the statistical computations is improved at the cost of high com... 详细信息
来源: 评论
WikiPhish: A Diverse Wikipedia-Based dataset for Phishing Website Detection  24
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing We...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Loiseau, Gabriel Lefils, Valentin Meyer, Maxime Riquet, Damien Hornet Secur Hem France
Phishing remains a pervasive security threat, necessitating effective and universally comparable detection systems. The use of supervised machine learning models for phishing detection has been generalized in the lite... 详细信息
来源: 评论
Stop Stealing My data: Sanitizing Stego Channels in 3D Printing Design Files  24
Stop Stealing My Data: Sanitizing Stego Channels in 3D Print...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Dolgavin, Aleksandr Yampolskiy, Mark Yung, Moti Auburn Univ Auburn AL 36849 USA Google LLC Mountain View CA USA Columbia Univ New York NY USA
The increased adoption of additive manufacturing (AM) and the acceptance of AM outsourcing created an ecosystem in which the sending and receiving of digital designs by different actors became normal. It has recently ... 详细信息
来源: 评论
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing  24
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operati...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Chaudhary, Priyanka Rushikesh Krishna, N. Pranav Maiti, Rajib Ranjan BITS Pilani Hyderabad Campus Secunderabad India
In the operational phase, an IoT device runs a light-weight server that is responsible for responding to the user queries, like accessing video and taking a snap in a IoT camera. The flaws in the implementation of cer... 详细信息
来源: 评论
Coherent Multi-Table data Synthesis for Tabular and Time-Series data with GANs  24
Coherent Multi-Table Data Synthesis for Tabular and Time-Ser...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Elliker, Clement Tonnelier, Emeric Shabou, Aymen Grp Credit Agricole DataLab Grp Paris France
As the usage of user-private-data is increasingly monitored by regulatory institutions for security purposes, its transfer becomes more constrained. Synthetic data has recently emerged as a viable alternative to preve... 详细信息
来源: 评论
Efficient privacy-Preserving Approximation of the Kidney Exchange Problem  19
Efficient Privacy-Preserving Approximation of the Kidney Exc...
收藏 引用
19th acm Asia conference on Computer and Communications security (acm AsiaCCS)
作者: Breuer, Malte Meyer, Ulrike Wetzel, Susanne Rhein Westfal TH Aachen Aachen Germany Stevens Inst Technol Hoboken NJ 07030 USA
The kidney exchange problem (KEP) seeks to find possible exchanges among pairs of patients and their incompatible kidney donors while meeting specific optimization criteria such as maximizing the overall number of pos... 详细信息
来源: 评论
A Preliminary Study on the privacy Concerns of Using IP Addresses in Log data  32
A Preliminary Study on the Privacy Concerns of Using IP Addr...
收藏 引用
32nd acm International conference on the Foundations of Software Engineering (FSE)
作者: Sedki, Issam Concordia Univ Montreal PQ Canada
Log data, crucial for system monitoring and debugging, inherently contains information that may conflict with privacy safeguards. This study addresses the delicate interplay between log utility and the protection of s... 详细信息
来源: 评论
CoCoT: Collaborative Contact Tracing  24
CoCoT: Collaborative Contact Tracing
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Kann, Trevor Bauer, Lujo Cunningham, Robert K. Carnegie Mellon Univ Pittsburgh PA 15213 USA Univ Pittsburgh Pittsburgh PA USA
Contact tracing can limit the spread of infectious diseases by notifying people of potential exposure to disease. Manual contact tracing is resource-intensive, but much of it can be automated using mobile phones, whic... 详细信息
来源: 评论
Crypto'Graph: Leveraging privacy-Preserving Distributed Link Prediction for Robust Graph Learning  24
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Azogagh, Sofiane Birba, Zelma Aubin Gambs, Sebastien Killijian, Marc-Olivier Univ Quebec Montreal Montreal PQ Canada
Graphs are a widely used data structure for collecting and analyzing relational data. However, when the graph structure is distributed across several parties, its analysis is challenging. In particular, due to the sen... 详细信息
来源: 评论