Computer Science
Privacy Preserving
100%
Task Offloading
60%
Internet-Of-Things
53%
Cyber Physical Systems
48%
Deep Reinforcement Learning
43%
Neural Network Approach
40%
Federated machine learning
40%
Ergonomics
40%
Blockchain
40%
Explainable Artificial Intelligence
40%
Financial Literacy
40%
Gradient Descent
40%
Software Deployment
40%
Power Distribution
40%
Signature Scheme
40%
Software System
40%
Authentication Mechanism
40%
blind signature scheme
40%
Resource Allocation
40%
Insider Attack
40%
Edge Computing
40%
Open Source
40%
Information Network
40%
Authentication
40%
Function Chain
40%
Android (Operating System)
40%
de-noising
40%
Artificial Intelligence
37%
Digital Signature
30%
Privacy Protection
28%
Best Practice
27%
Energy Efficient
26%
Communication Network
21%
Healthcare Data
20%
Data Management
20%
Trust Management
20%
Vehicular Ad-Hoc Network
20%
Genetic Algorithm
20%
Smart Grid System
20%
Contrastive Learning
20%
Model Complexity
20%
Internet of Medical Things
20%
Contrastive Loss
20%
Diffie-Hellman-Merkle key exchange
20%
Blind Signature
20%
Processing Cost
20%
random oracle model
20%
Generative Artificial Intelligence
20%
Transmission Process
20%
Business Transformation
20%
Engineering
Blockchain
40%
Information Network
40%
Artificial Intelligence
40%
Emergency Services
26%
Service Area
13%
Q-Learning
13%
Reinforcement Learning
13%
Channel Response
10%
Predictive Maintenance
10%
Privacy Protection
10%
Resource Usage
10%
Sensor Data Collection
10%
Systems Stability
10%
Adaptive Beamforming
10%
Fault Tolerance
10%
Smart Healthcare
6%
Feature Extraction
6%
Simplifies
6%
Nonlinearity
6%
Responsiveness
6%
System Safety
6%
Safety Data
6%
Dimensionality
6%
Beamforming
5%
Data Preprocessing
5%
User Experience
5%
Effective Solution
5%
Model Prediction
5%
System Protection
5%
Limitations
5%