Computer Science
Access Control
37%
Access Control System
50%
Adaptive Learning Rate
50%
Answer Extraction
50%
Approximation (Algorithm)
50%
Attribute-Based Encryption
64%
Autoencoder
33%
Bayesian Classifier
50%
Binary Entropy
50%
Classification Task
55%
Classification Technique
50%
Cloud Storage
50%
Data Generation
50%
Data Loading
50%
Detection Method
58%
Dimensional Feature
50%
Enhanced Security
50%
Execution Path
50%
Experimental Result
58%
Feature Fusion
50%
Fuzz Testing
100%
Fuzzing
62%
Gaussian Mixture Model
50%
Generative Adversarial Networks
50%
Genetic Algorithm
50%
Hybrid Cloud
50%
Image Classification
50%
Insider Threat
50%
Keyword Search
50%
Malicious Code
57%
Malicious Domain
50%
Malware
50%
Microblogs
50%
moving object detection
50%
Network Security
64%
Permission Role
33%
Privacy Preserving
75%
Random Walk
50%
Reconfigurable System
50%
Regularization
50%
Residual Neural Network
50%
role-based access control model
50%
Threat Detection
50%
Time Variation
50%
Topic Modeling
50%
Traditional Background
50%
Traffic Analysis
50%
User Data
37%
Utility Software
50%
Wireshark
50%
Engineering
Adaptive Beamforming
100%
Adaptive Processing
12%
Analysis Theory
50%
Applicability
16%
Archimedes
50%
Attribute-Based Encryption
50%
Basestation
50%
Blood Glucose
50%
Classification Task
16%
Computational Complexity
12%
Constraint Condition
12%
Data Memory
50%
Data Packet
33%
Data User
50%
Deep Learning Method
33%
Experimental Platform
6%
Experimental Result
56%
False Alarm Rate
6%
Feedback Information
10%
Gaussian Mixture Model
50%
Generated Image
50%
Good Result
6%
Image Classification
50%
Image Synthesis
50%
Image Visualization
16%
Input Image
16%
Limitations
16%
Local Region
16%
Measured Data
25%
Microphone Array
50%
Monitoring System
6%
Moving Object
50%
Multistage
50%
Network Analyzer
16%
Parameter Estimation
25%
Performance Deterioration
12%
Performance Loss
12%
Predicted Result
50%
Prediction Technology
50%
Protocol Analysis
16%
Radar Systems
6%
Radio Frequency
6%
Risk Level
50%
Risk Model
50%
Scene Change
6%
Send Data
16%
Steering Vector
37%
Target Tracking
50%