Computer Science
Blockchain
100%
Internet of Things
65%
Backdoors
50%
Adversarial Example
45%
Experimental Result
42%
Data Recovery
40%
Storage System
40%
Deep Neural Network
40%
Mobile Device
40%
Adversarial Machine Learning
40%
Federated Learning
40%
Execution Environments
40%
role-based access control
40%
group key agreement
40%
Domain Authentication
40%
Unmanned Aerial Vehicle
40%
Attackers
39%
Authentication
33%
Neural Network
31%
Granularity
30%
Image Classification
30%
Data Organization
30%
Resource Allocation
30%
Reinforcement Learning
30%
Power Consumption
28%
Artificial Intelligence
28%
Energy Saving
27%
Data Protection
26%
Entity Authentication
26%
Hard Disk
26%
Input/Output
25%
Access Control Policies
25%
Network Security
25%
Sequential Access
24%
Detection Method
23%
Computing Environment
22%
Access Control
22%
ad-hoc network
21%
Security Analysis
21%
Data Security
21%
Trusted Application
20%
Random Location
20%
Data Sharing
20%
Analytic Hierarchy Process
20%
Time Constraint
20%
Eigenvalue
20%
Data Layout
20%
Deepfakes
20%
Order Structure
20%
Small-World Network
20%
Engineering
Network Model
30%
Hard Disk
26%
Energy Engineering
24%
Experimental Result
23%
Hard Drive
20%
Recovery Technique
20%
Internal Architecture
20%
Learning Systems
20%
Control Model
20%
Accreditation
20%
Image Classification
20%
Optimisation Problem
20%
Flash Memory
20%
Sequential Order
20%
Frequency Word
20%
Deep Learning
20%
Determines
20%
Dynamic Structure
20%
Storage System
20%
Genetic Algorithm
20%
Comparative Analysis
20%
Data Series
20%
Reinforcement Learning
20%
Unmanned Aerial Vehicle
20%
Energy Conservation
16%
Simulation Model
13%
Hybrid Approach
13%
Industrial Machinery
10%
Similarities
10%
Computational Cost
10%
Adaptability
10%
Artificial Neural Network
10%
Recurrent Neural Network
10%
Data Recording
10%
Regressors
10%
Industrial Internet
10%
Spare Component
10%
Machine Learning Algorithm
10%
Model Prediction
10%
Logical Address
10%
Granularity
10%
Machine Learning Method
10%
Single-Target Tracking
10%
Internet of Things
10%
ARM Processors
10%
Machine Code
10%
Electric Power Utilization
8%
Energy Efficiency
8%
Enrollment
6%
Engineering
6%