咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 5 篇 信息与通信工程
    • 3 篇 电气工程
    • 2 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 8 篇 secure data anal...
  • 3 篇 big data
  • 2 篇 homomorphic encr...
  • 2 篇 data security an...
  • 1 篇 deep learning
  • 1 篇 intel sgx
  • 1 篇 programmability
  • 1 篇 threat model
  • 1 篇 data reduction
  • 1 篇 machine learning...
  • 1 篇 sustainable smar...
  • 1 篇 rsa encryption
  • 1 篇 end-to-end contr...
  • 1 篇 group recommende...
  • 1 篇 machine learning
  • 1 篇 security
  • 1 篇 data security &a...
  • 1 篇 blockchain
  • 1 篇 cloud security
  • 1 篇 smart grid

机构

  • 3 篇 nirma univ inst ...
  • 1 篇 waseda univ res ...
  • 1 篇 amrita school of...
  • 1 篇 chongqing techno...
  • 1 篇 chongqing techno...
  • 1 篇 univ texas dalla...
  • 1 篇 king abdulaziz u...
  • 1 篇 asia univ dept c...
  • 1 篇 wuhan univ peopl...
  • 1 篇 thapar inst engn...
  • 1 篇 western norway u...
  • 1 篇 waseda univ glob...
  • 1 篇 city univ hong k...
  • 1 篇 sun yat sen univ...
  • 1 篇 city univ hong k...
  • 1 篇 augusta univ com...
  • 1 篇 ohio state univ ...
  • 1 篇 thapar inst engn...

作者

  • 3 篇 tanwar sudeep
  • 2 篇 kumari aparna
  • 1 篇 kruthika b.
  • 1 篇 zang yichen
  • 1 篇 tyagi sudhanshu
  • 1 篇 shanmukha aditya...
  • 1 篇 kumar neeraj
  • 1 篇 lin zhiqiang
  • 1 篇 wang wei
  • 1 篇 wang qian
  • 1 篇 khan latifur
  • 1 篇 shaon fahad
  • 1 篇 guo zhiwei
  • 1 篇 jia xiaohua
  • 1 篇 rajagopal shinu ...
  • 1 篇 lou shuangsheng
  • 1 篇 kavitha c.r.
  • 1 篇 wang cong
  • 1 篇 gupta rajesh
  • 1 篇 cai chengjun

语言

  • 8 篇 英文
检索条件"主题词=Secure Data Analytics"
8 条 记 录,以下是1-10 订阅
排序:
A secure data analytics scheme for multimedia communication in a decentralized smart grid
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2022年 第24期81卷 34797-34822页
作者: Kumari, Aparna Tanwar, Sudeep Nirma Univ Inst Technol Dept Comp Sci & Engn Ahmadabad Gujarat India
With the exponential increase in energy demands (commercial as well as residential), the traditional grid infrastructure significantly shifted to intelligent ICT-based Smart Grid (SG) infrastructure. In the SG environ... 详细信息
来源: 评论
A Programming API Implementation for secure data analytics Applications with Homomorphic Encryption on GPUs  28
A Programming API Implementation for Secure Data Analytics A...
收藏 引用
28th Annual IEEE International Conference on High Performance Computing, data, and analytics (HiPC)
作者: Lou, Shuangsheng Agrawal, Gagan Ohio State Univ Comp Sci & Engn Columbus OH 43210 USA Augusta Univ Comp & Cyber Sci Augusta GA USA
As sensitive data is frequently stored and processed in environments that are either shared, untrusted or otherwise can be compromised, privacy is frequently a concern. To address this, a method that has been gaining ... 详细信息
来源: 评论
Machine Learning Models for secure data analytics: A taxonomy and threat model
收藏 引用
COMPUTER COMMUNICATIONS 2020年 第0期153卷 406-440页
作者: Gupta, Rajesh Tanwar, Sudeep Tyagi, Sudhanshu Kumar, Neeraj Nirma Univ Inst Technol Dept Comp Sci & Engn Ahmadabad Gujarat India Thapar Inst Engn & Technol Deemed Be Univ Dept Elect & Commun Engn Patiala Punjab India Thapar Inst Engn & Technol Deemed Be Univ Dept Comp Sci Engn Patiala Punjab India Asia Univ Dept Comp Sci & Informat Engn Taichung Taiwan King Abdulaziz Univ Jeddah Saudi Arabia
In recent years, rapid technological advancements in smart devices and their usage in a wide range of applications exponentially increases the data generated from these devices. So, the traditional data analytics tech... 详细信息
来源: 评论
secure data analytics for smart grid systems in a sustainable smart city: Challenges, solutions, and future directions
收藏 引用
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS 2020年 28卷
作者: Kumari, Aparna Tanwar, Sudeep Nirma Univ Inst Technol Dept Comp Sci & Engn Ahmadabad 382481 Gujarat India
A smart city requires an intelligent infrastructure to improve the quality of life with sustainable environment for its citizens. There is an exponential demand for efficient, secure, reliable, and uninterrupted elect... 详细信息
来源: 评论
secure Artificial Intelligence of Things for Implicit Group Recommendations
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2022年 第4期9卷 2698-2707页
作者: Yu, Keping Guo, Zhiwei Shen, Yu Wang, Wei Lin, Jerry Chun-Wei Sato, Takuro Waseda Univ Global Informat & Telecommun Inst Tokyo 1698555 Japan Chongqing Technol & Business Univ Sch Artificial Intelligence Chongqing 400067 Peoples R China Chongqing Technol & Business Univ Natl Res Base Intelligent Mfg Serv Chongqing 400067 Peoples R China Sun Yat Sen Univ Sch Intelligent Syst Engn Shenzhen 518107 Peoples R China Western Norway Univ Appl Sci Dept Comp Sci Elect Engn & Math Sci N-5063 Bergen Norway Waseda Univ Res Inst Sci & Engn Tokyo 1698555 Japan
The emergence of Artificial Intelligence of Things (AIoT) has provided novel insights for many social computing applications, such as group recommender systems. As the distances between people have been greatly shorte... 详细信息
来源: 评论
Homomorphic Encryption for secure data Analysis: A Hybrid Approach using PKCS1_OAEP Padding  2
Homomorphic Encryption for Secure Data Analysis: A Hybrid Ap...
收藏 引用
2nd International Conference on Intelligent data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Shanmukha Aditya, G. Kruthika, B. Rajagopal, Shinu M. Kavitha, C.R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India
In today's data-driven world, striking a balance between data utility and privacy is paramount. Homomorphic encryption, a revolutionary cryptographic technique, facilitates computations on encrypted data without d... 详细信息
来源: 评论
Vizard: A Metadata-hiding data Analytic System with End-to-End Policy Controls  22
Vizard: A Metadata-hiding Data Analytic System with End-to-E...
收藏 引用
28th ACM SIGSAC Conference on Computer and Communications Security (CCS)
作者: Cai, Chengjun Zang, Yichen Wang, Cong Jia, Xiaohua Wang, Qian City Univ Hong Kong Dongguan Res Inst Hong Kong Peoples R China City Univ Hong Kong Hong Kong Peoples R China Wuhan Univ Wuhan Peoples R China
Owner-centric control is a widely adopted method for easing owners' concerns over data abuses and motivating them to share their data out to gain collective knowledge. However, while many control enforcement techn... 详细信息
来源: 评论
SGX-BigMatrix: A Practical Encrypted data Analytic Framework With Trusted Processors  17
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework...
收藏 引用
24th ACM-SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Shaon, Fahad Kantarcioglu, Murat Lin, Zhiqiang Khan, Latifur Univ Texas Dallas Richardson TX 75083 USA
Recently, using secure processors for trusted computing in cloud has attracted a lot of attention. Over the past few years, efficient and secure data analytic tools (e.g., map-reduce framework, machine learning models... 详细信息
来源: 评论