咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 计算机科学与技术...
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 信息与通信工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 4 篇 data provenance
  • 1 篇 what-if analysis
  • 1 篇 data citation
  • 1 篇 digital watermar...
  • 1 篇 asymmetric finge...
  • 1 篇 cyber threat det...
  • 1 篇 research objects
  • 1 篇 multimedia outso...
  • 1 篇 data mining
  • 1 篇 fair data
  • 1 篇 causality depend...
  • 1 篇 provenance(prov)

机构

  • 1 篇 institute of inf...
  • 1 篇 international sc...
  • 1 篇 datacite welfeng...
  • 1 篇 information netw...
  • 1 篇 tsinghua nationa...
  • 1 篇 department of el...
  • 1 篇 school of cyber ...
  • 1 篇 computer school ...
  • 1 篇 national compute...
  • 1 篇 data science ins...
  • 1 篇 informatics inst...
  • 1 篇 department of co...

作者

  • 1 篇 wenyu wang
  • 1 篇 hanbing yan
  • 1 篇 rui mei
  • 1 篇 qinqin wang
  • 1 篇 xing li
  • 1 篇 liang yiwen
  • 1 篇 tim clark
  • 1 篇 paul groth
  • 1 篇 carole goble
  • 1 篇 zhihui han
  • 1 篇 tan chengyu
  • 1 篇 yongfeng huang
  • 1 篇 ke jie
  • 1 篇 dong hongbin
  • 1 篇 helena cousijn
  • 1 篇 zhen yang
  • 1 篇 zhuohang lyu

语言

  • 4 篇 英文
检索条件"主题词=Data provenance"
4 条 记 录,以下是1-10 订阅
排序:
Efficient Secure Data provenance Scheme in Multimedia Outsourcing and Sharing
收藏 引用
Computers, Materials & Continua 2018年 第7期56卷 1-17页
作者: Zhen Yang Yongfeng Huang Xing Li Wenyu Wang Department of Electronic Engineering Tsinghua UniversityBeijing100084China Tsinghua National Laboratory for Information Science and Technology Beijing100084China Information Networking Institute Carnegie Mellon UniversityPittsburghPA15213USA
To cope with privacy leakage caused by multimedia outsourcing and sharing,Data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
PBWA:A provenance-Based What-If Analysis Approach for data Mining Processes
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 986-992页
作者: KE Jie DONG Hongbin TAN Chengyu LIANG Yiwen Computer School Wuhan University International School of Software Wuhan University
This paper presents a provenance-based what-if analysis approach(PBWA) for data mining processes,so decision makers can examine the latest mining result under hypothetical business contexts.It fills the gap that data ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
TDLens:Toward an Empirical Evaluation of provenance Graph-Based Approach to Cyber Threat Detection
收藏 引用
China Communications 2022年 第10期19卷 102-115页
作者: Rui Mei Hanbing Yan Qinqin Wang Zhihui Han Zhuohang Lyu Institute of Information Engineering Chinese Academy of SciencesBeijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC) Beijing 100029China
To combat increasingly sophisticated cyber attacks,the security community has proposed and deployed a large body of threat detection approaches to discover malicious behaviors on host systems and attack payloads in ne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
FAIR data Reuse-the Path through data Citation
收藏 引用
data Intelligence 2020年 第1期2卷 78-86,305页
作者: Paul Groth Helena Cousijn Tim Clark Carole Goble Informatics Institute University of AmsterdamAmsterdam 1090 GHThe Netherlands dataCite Welfengarten 1BHannover 30167Germany data Science Institute University of VirginiaCharlottesvilleVA 22903-1738USA Department of Computer Science The University of ManchesterOxford RoadManchester M139PLUK
One of the key goals of the FAIR guiding principles is defined by its final principle-to optimize data sets for reuse by both humans and machines.To do so,data providers need to implement and support consistent machin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论