咨询与建议

限定检索结果

文献类型

  • 1,075 篇 会议
  • 8 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 908 篇 工学
    • 862 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 281 篇 信息与通信工程
    • 79 篇 电气工程
    • 55 篇 网络空间安全
    • 47 篇 控制科学与工程
    • 30 篇 安全科学与工程
    • 14 篇 生物工程
    • 13 篇 建筑学
    • 12 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 交通运输工程
    • 9 篇 动力工程及工程热...
    • 8 篇 土木工程
    • 8 篇 生物医学工程(可授...
  • 178 篇 理学
    • 153 篇 数学
    • 17 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 8 篇 系统科学
    • 6 篇 物理学
    • 5 篇 化学
  • 88 篇 管理学
    • 47 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 28 篇 法学
    • 20 篇 社会学
    • 8 篇 法学
  • 14 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 9 篇 公共卫生与预防医...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 119 篇 privacy
  • 81 篇 security
  • 51 篇 data privacy
  • 45 篇 differential pri...
  • 34 篇 machine learning
  • 26 篇 access control
  • 25 篇 sensitive data
  • 23 篇 cryptography
  • 22 篇 internet of thin...
  • 21 篇 blockchain
  • 19 篇 federated learni...
  • 17 篇 deep learning
  • 16 篇 network security
  • 15 篇 authentication
  • 14 篇 mobile security
  • 13 篇 homomorphic encr...
  • 13 篇 cloud computing
  • 12 篇 iot
  • 12 篇 android
  • 11 篇 privacy-preservi...

机构

  • 11 篇 cispa helmholtz ...
  • 11 篇 purdue univ w la...
  • 8 篇 zhejiang univ pe...
  • 8 篇 carnegie mellon ...
  • 7 篇 north carolina s...
  • 6 篇 univ texas dalla...
  • 6 篇 rhein westfal th...
  • 6 篇 imperial coll lo...
  • 5 篇 stevens inst tec...
  • 5 篇 fraunhofer aisec...
  • 5 篇 hong kong univ s...
  • 5 篇 singapore manage...
  • 5 篇 natl univ singap...
  • 5 篇 stanford univ st...
  • 4 篇 georgia inst tec...
  • 4 篇 purdue universit...
  • 4 篇 ecole polytech f...
  • 4 篇 purdue universit...
  • 4 篇 tech univ darmst...
  • 4 篇 univ calif santa...

作者

  • 15 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 8 篇 backes michael
  • 7 篇 conti mauro
  • 7 篇 enck william
  • 6 篇 gupta maanak
  • 6 篇 ren kui
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 zhang yang
  • 6 篇 kantarcioglu mur...
  • 5 篇 wang lingyu
  • 5 篇 yu ting
  • 5 篇 gunter carl a.
  • 5 篇 liu peng
  • 4 篇 machanavajjhala ...
  • 4 篇 lee adam j.
  • 4 篇 sion radu
  • 4 篇 carbunar bogdan
  • 4 篇 wagner david

语言

  • 1,066 篇 英文
  • 21 篇 其他
  • 2 篇 中文
检索条件"任意字段=Proceedings of the first ACM conference on Data and application security and privacy"
1089 条 记 录,以下是1-10 订阅
排序:
CODASPY 2024 - proceedings of the 14th acm conference on data and application security and privacy
CODASPY 2024 - Proceedings of the 14th ACM Conference on Dat...
收藏 引用
14th acm conference on data and application security and privacy, CODASPY 2024
The proceedings contain 43 papers. The topics discussed include: estimating the runtime and global network traffic of SMPC protocols;a unified time series analytics based intrusion detection framework for CAN BUS atta...
来源: 评论
CODASPY 2023 - proceedings of the 13th acm conference on data and application security and privacy
CODASPY 2023 - Proceedings of the 13th ACM Conference on Dat...
收藏 引用
13th acm conference on data and application security and privacy, CODASPY 2023
The proceedings contain 30 papers. The topics discussed include: comparative privacy analysis of mobile browsers;IdDecoder: a face embedding inversion tool and its privacy and security implications on facial recogniti...
来源: 评论
CODASPY 2022 - proceedings of the 12th acm conference on data and application security and privacy
CODASPY 2022 - Proceedings of the 12th ACM Conference on Dat...
收藏 引用
12th acm conference on data and application security and privacy, CODASPY 2022
The proceedings contain 45 papers. The topics discussed include: how (not) to deploy cryptography on the Internet;GINN: fast GPU-TEE based integrity for neural network training;leveraging synthetic data and PU learnin...
来源: 评论
CODASPY 2021 - proceedings of the 11th acm conference on data and application security and privacy
CODASPY 2021 - Proceedings of the 11th ACM Conference on Dat...
收藏 引用
11th acm conference on data and application security and privacy, CODASPY 2021
The proceedings contain 38 papers. The topics discussed include: membership inference attacks and defenses in classification models;using single-step adversarial training to defend iterative adversarial examples;real-...
来源: 评论
CODASPY 2019 - proceedings of the 9th acm conference on data and application security and privacy
CODASPY 2019 - Proceedings of the 9th ACM Conference on Data...
收藏 引用
9th acm conference on data and application security and privacy, CODASPY 2019
The proceedings contain 35 papers. The topics discussed include: understanding the responsiveness of mobile app developers to software library updates;acminer: extraction and analysis of authorization checks in androi...
来源: 评论
SLIM-View: Sampling and Private Publishing of Multidimensional databases  24
SLIM-View: Sampling and Private Publishing of Multidimension...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Laouir, Ala Eddine Imine, Abdessamad Univ Lorraine CNRS Nancy France INRIA Nancy France
Despite the enormous data processing capacity available in big data frameworks, obtaining appropriate and private responses to large-scale queries without revealing sensitive information is still a challenging problem... 详细信息
来源: 评论
Exploiting Update Leakage in Searchable Symmetric Encryption  24
Exploiting Update Leakage in Searchable Symmetric Encryption
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Haltiwanger, Jacob Hoang, Thang Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA
Dynamic Searchable Symmetric Encryption (DSSE) provides efficient techniques for securely searching and updating an encrypted database. However, efficient DSSE schemes leak some sensitive information to the server. Re... 详细信息
来源: 评论
"That's Kind of Sus(picious)": The Comprehensiveness of Mental Health application Users' privacy and security Concerns  24
"That's Kind of Sus(picious)": The Comprehensiveness of Ment...
收藏 引用
acm CHI conference on Human Factors in Computing Sytems (CHI)
作者: Khoo, Yi Xuan Kang, Rachael M. Reynolds, Tera L. Mentis, Helena M. Univ Maryland Baltimore Cty Baltimore MD 21250 USA
With the increasing usage of mental health applications (MHAs), there is growing concern regarding their data privacy practices. Analyzing 437 user reviews from 83 apps, we outline users' predominant privacy and s... 详细信息
来源: 评论
From Theory to Comprehension: A Comparative Study of Differential privacy and κ-Anonymity  24
From Theory to Comprehension: A Comparative Study of Differe...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: von Voigt, Saskia Nunez Mehner, Luise Tschorsch, Florian Tech Univ Berlin Berlin Germany Tech Univ Dresden Dresden Germany
The notion of epsilon-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential pr... 详细信息
来源: 评论
A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft  24
A-COPILOT: Android Covert Operation for Private Information ...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Lim, Joseph Guan Quan Kwok, Zhen Yu Soon, Isaac Yong, Jun Xian Yuhao, Samuel Song Rosley, Siti Halilah Binte Balachandran, Vivek Singapore Inst Technol Singapore Singapore
This paper investigates an underexplored avenue of cybersecurity threats in mobile computing, with a particular focus on the Android platform which, due to its open nature and widespread adoption, is a fertile ground ... 详细信息
来源: 评论