Keyphrases
Data Security in Cloud
83%
Number of pixels Change Rate
83%
Security in Cloud Computing
83%
Differential Correlation
83%
SPARX
83%
Ground Sensors
83%
Message Verification
83%
Clinical Sepsis
83%
Client Selection
83%
Meaningful Shadows
83%
Shadow Image
83%
Keccak
83%
Invariant Subspace Attack
83%
Dynamic Authentication
83%
Intelligent Sensors
83%
Pediatric Logistic Organ Dysfunction
83%
PRINTcipher
83%
Sensor-cloud
83%
Meningococcal Sepsis
83%
Lightweight Algorithm
83%
Zero-correlation Linear Cryptanalysis
83%
Sepsis Prediction
83%
Impossible Differential
83%
Aviation Security
83%
Integral Distinguisher
83%
SIMON
83%
Intrusion Datasets
83%
Aegean
83%
Home Security
83%
Intelligent Home
83%
Profiling Attacks
83%
Hamming Weight Leakage
83%
Data Consolidation
66%
Dual Structure
62%
Meaningful Shadow Images
55%
Unified Average Changing Intensity
55%
Fuzzy Commitment Scheme
55%
WEKA Tool
55%
KDD99
55%
Cloud Data Security
41%
Acute Sepsis
41%
Pediatric Critical Care Units
41%
Cellular Recovery
41%
Sepsis Survival
41%
Sepsis Prognosis
41%
Impossible Differential Cryptanalysis
41%
Zero-correlation Linear Hull
41%
Feistel Structure
41%
Integral Cryptanalysis
41%
Embedded Board
41%
Computer Science
Internet of Things
100%
Broadcast Message
83%
Healthcare Ecosystem
83%
Federated Learning
83%
Channel Analysis
83%
Intrusion Detection System
83%
Wi-Fi
83%
Machine Learning Technique
83%
Deep Learning Method
83%
Automation System
83%
Personal Computer
83%
Home Automation
83%
Learning System
83%
Memristor
83%
Home Environment
83%
Internet-Of-Things
83%
Time Monitoring
83%
Machine Learning
83%
Embedded System
83%
side-channel
83%
Data Consolidation
66%
Number of Pixel Change Rate and Unified Average Changing Intensity
55%
Embedding Capacity
55%
Intrusion Detection
47%
Machine Learning
40%
Smart City
33%
Multiparty Authentication
33%
Data Augmentation
33%
Hamming Weight
33%
Class Imbalance
33%
Attack Analysis
33%
Learning Framework
28%
Cloud Data Security
27%
Biometric Template Protection
27%
Modulo Addition
27%
Data Complexity
27%
Process Variation
27%
Time Complexity
27%
Logistic Regression
25%
Feature Selection
23%
Broadcast Receiver
20%
Multilateration
20%
Hill-Climbing Method
20%
Training Model
16%
Distributed Learning
16%
Architecture Function
16%
Smart Device
16%
Malicious Client
16%
Multiple Client
16%
Random Selection
16%