Computer Science
Fully Homomorphic Encryption
100%
Backdoors
88%
Homomorphic Encryption
49%
Industrial Control System
47%
Experimental Result
46%
Deep Neural Network
42%
Privacy Preserving
38%
Neural Network
35%
Application Specific Integrated Circuit
33%
Machine Learning
33%
Performance Counter
33%
Hardware Performance
33%
Ciphertext
30%
Autonomous Vehicles
29%
Control Flow
25%
Deep Learning
25%
Encrypted Data
25%
Attackers
25%
Deep Reinforcement Learning
24%
Superscalar
22%
Security and Privacy
22%
Concurrent Error Detection
22%
Impact Level
22%
Floating-Point Unit
22%
Embedded Systems
22%
Additive Manufacturing
22%
Register-Transfer Level
22%
Programmable Logic Controller
21%
Encryption Scheme
18%
Coprocessor
17%
Dynamically Scheduled
16%
Supply Chain
16%
Microprocessor Chips
16%
Sensitive Informations
14%
Open Source
13%
Intel Xeon Phi
13%
Embedded Processor
12%
Fault Injection
12%
Privacy Preserving Machine Learning
12%
Performance Improvement
12%
Detection Method
12%
Cyberattack
12%
Transform Algorithm
11%
Computer Aided Design
11%
Design-Space Exploration
11%
Network Security
11%
Functional Verification
11%
Security Assessment
11%
Structural Integrity
11%
Open Source Intelligence
11%
Keyphrases
Conversational Artificial Intelligence
33%
University Courses
33%
Additive Manufacturing
22%
Floating Point Unit
22%
Cybersecurity
22%
Abu Dhabi
22%
Deep Neural Network
22%
Hardware Performance Counters
22%
Architectural Vulnerability Factor
17%
Polynomial Operation
16%
Modern Microprocessor
13%
ASIC Design
13%
Machine Learning Based
11%
Tool Path
11%
Property Verification
11%
Secure Aggregation
11%
Arab Region
11%
Additive Manufactured Parts
11%
Performance Faults
11%
Automated Reverse Engineering
11%
Electronic Voting
11%
Fault Level
11%
Private Membership Test
11%
Portable Executable
11%
SGX Technology
11%
Intel SGX
11%
Impact Analysis
11%
Pruning
11%
Test Instructions
11%
Vulnerability Localization
11%
Data Dependence Graph
11%
Grid Infrastructure
11%
Field Communication
11%
Vulnerability Study
11%
Testbed Framework
11%
Security Scenario
11%
Raspberry
11%
Smart Grid Testbed
11%
Grid Security
11%
Open-Source Intelligence (OSINT)
11%
Efficient Parallelisation
11%
Factor Analysis
11%
Modbus
11%
Fuzzing
11%
Remote Fields
11%
Device Fingerprinting
11%
Modbus Protocol
11%
Modular multiplier
11%
Binary Analysis Tool
11%
Cancer Type Prediction
11%