IEEE ISCC 2020: IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS 2020
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

3
3D Accelerometer
3D CNN
3D Gyroscope Surface
5
5G
5G New Radio
5G UDN
5G urban scenario
5G-enabled Vehicular Networks
6
6P
6TiSCH
6top
A
ACK
active queue management
adaptive sampling
Adaptive streaming
address clustering
Advanced Persistent Threat
adversarial learning
Adversarial machine learning
air-quality
Alcohol Use Disorder
All Programmable SoC
All-weighted
ambient sensor
ANN
anomalous flow
Anomaly Detection
anonymization
Anonymous Authentication
anonymous communication
anycast
Applied Behaviour Analysis
Architecture
Arduino
Artificial Intelligence
AS-level Paths
ASL
atomic
attack
attack graphs
attacks
Attributed Networks
authentication
authorization
Autism Spectrum Disorder
Autoencoder
Autoencoder Network
AUTOFIT
Automatic detection
Automatic Speech Recognition
Automotive radar
autonomous
autonomous management
Autonomous Vehicle
Availability
AVISPA
Awareness Index
Azure
B
Battery Management System
Beacon
Beamforming
BGP
Big Data
Big Sequence Management
bike sharing fleet
biobank
Bitcoin
Bitcoin network
Bivariate Gaussian distribution
Block ciphers
block diagonal
blockchain
blockchain analysis
Blood oxygen saturation
bloom filter
Bluetooth Low Energy
Bounding Box Regression
bristol stool scale
Broadcast/receive
bufferbloat
burst ratio
C
C-ITS
C-RAN
C-RANs
cache efficiency
Cache flush
caching strategy
CAD
camera
Capsule Network
Capture Effect
Car-sharing
CAV
ChaCha20
Channel Access
Charging efficiency
Charging unmanned aerial vehicles
classification
classification framework
Clock drift
Clock synchronization
Cloud
cloud computing
cloud database
Cloud Security
Cloud storage
clustering
CNN
CoAP
cognitive radio
Collaborative filtering
Collaborative Scientific Experiments
Collision
colocation data center
Communication system security
community detection
Compression
Computer
Computer Security
confidential information detection
Conflict
Congestion control
Connected Autonomous Vehicles
Consensus
Consistency
constrained nodes
content delivery network
Context-aware
Controlled experimentation
Controller area network
Convolution Neural Network
convolutional neural network
Convolutional Neural Networks
Cooperative Management
Coronavirus
Cortex-A9 MPCore
Cost function modification
Cost-Efficiency
COVID-19
cross
Cross-lingual Classification
Cryptography
CT
Curitiba
Cyber Physical Systems
Cyber-physical systems
D
DAO
dashboards
Data augmentation
Data availability
Data Center Networks
Data Centers resource management
Data Centers security
Data Collection
Data Exfiltration
Data Generation
Data geolocation
data mining
Data Security
data series
Data sharing
Data Stream
data visualization
DBSCAN
Decentralization
decentralized exchange
Decentralized File Storage
decentralized governance
Decision Making
Decision Support System DSS
deep learning
Deep Learning Algorithms (DL)
Deep Neural Network
Deep Neural Networks
defense
Delay Bounds
Delay Reduction
demand response
denoising model
DenseNet
design
devices dysfunction
DGA Detection
DHT
diabetes
diagnosis
diagnostics
DICOM
Dicoogle
Digital communications
Digital Transformation
Digital Twin
Distance-2 graph coloring
Distributed Ledger Technologies
Distributed systems
distribution fitting
DNN partitioning
DNS
DNS Tunnel
Document Processing
Domain-Embeddings
Doob's maximal inequality
dropping function
Dynamic key dependent cryptographic primitives
Dynamic Networks
dynamic routing
E
e- Health
E-Health
early warning system
ECMP routing
Edge
Edge Computing
Edge-Cloud Computing
Elastic Demand
Elastic Optical Network
Electric Vehicles
Elephant Flow
embedded
Embedded Devices
Embedded systems
Emergency Messages Dissemination
EMG
end-to-end delay bound
Energy Efficiency
Energy Replenishment
energy storage
Ensemble Learning
Epidemic Modelling
erc20
erc721
Error rate performance
Ethereum
EV
Explainable Artificial Intelligence
F
failure prediction
failure probability
Fairness
Feature Analysis
Feature selection
feedback
Feedback control
fifth-generation (5G)
File Collections
Fine-Tuning
Firefly algorithm
Flexible architecture
Flexible Ethernet
flow correlation
Flushed-based Spectre Attack
Fog
Fog Computing
Food Processing
forecast
Formal verification
Forward Privacy
framework
G
Game Theory
games
gamification
GAN
GAN Network
gas consumption
Genetic Algorithm
Glaucoma
Gossip
GPU
Grammatical Evolution
Graph Convolutional Network
Graph Neural Networks
grey model
group key management
guaranteed based approach
H
hardware/software co-design
HARQ
health
Health Informatics
health systems
Healthcare
Healthcare 4.0
Heterogeneous
Heterogeneous Wireless Rechargeable Sensor Networks
heuristic algorithms
Homogeneous
Homomorphic Encryption
Honeypots
HPC
hping3
HTTP Traffic
human mobility data
Hyper-sensors
Hyperledger Caliper
Hyperledger Fabric
I
ICD-10 Coding
ICN
ICU beds
identity management
IEEE 802.15.4
IEEE 802.15.4g
IEEE 802.15.6 Security Association
IEEE Std 802.15.4-2015
IEEE Std 802.15.4-2015 TSCH
IIoT
ILP
Image Processing
imaging
Imbalanced data
Impersonation Attacks
Implicit feedback
IMU
Incentive Caching
incremental deployment
Incremental Training
Indoor navigation
Industrial Control System
Industrial IoT
Industry 4.0
Inspection
integrity verify
Intelligent transportation system
Internet
Internet of Thing (IoT)
Internet of Things
Internet of Things (IoT)
Internet of Vehicles (IoV)
Internet Routing
interpolation
Intrusion Detection
IoT
IoT Attacks
IoT Data
IoV
IP Mobility Support
IP-Optical networks
IPv6
ITS
J
Jamming
JavaScript Detection
Joint optimization problem
K
Kernel driver
key protection
Key-value store
keys management
Knowledge-Based Modelling
L
LDPC
Leaky ReLU
Learning pack
ledger
LEO satellite network
Lightweight message authentication algorithm
Linear Programming
LLNs
Load Balancing
Log Analysis
Long short-term memory
LoPy4
LoRa
LoRaWAN
loss ratio
Louvian algorithm
Low Earth Orbit(LEO) Satellite Network
Low-Power Wireless
low-rank completion
LPWAN
LPWAN Networks
LTE Cat-M1
M
Machine Learning
Machine Vision
magnetic resonance imaging
Malicious traffic
malicious traffic detection
Malicious URL
Malware
Malware Detection
Management and Orchestration
Markov
Markov decision processes
massive MIMO
mechanism design
Medical Emergency Vehicles
Medical Imaging
mega constellation
Metric learning
microwave thermal therapy
MILP
MIMO
miner
Missing values Imputation
Mobile Agent
Mobile Crowdsensing
Mobile Edge
Mobile Edge Computing
Mobile Health
mobile security
Mobile sensor perception
mobility
Mobility Management
model-based workload generation
Modern Internet Service Providers
Modulation Diversity
Moment Generating Function
Monitoring
mood
morphological analysis
motion reduction
motivation
Moving Target Defense
MPI
MRI thermometry
MSF
MTD
Multi-Agent System
multi-attention
Multi-Client
Multi-path Routing
multi-tenant
Multifunction vehicle bus
Multihomed Vehicular Networks
Multihoming
Multilabel Text Classification
Multilingual Neural Language Model
Multipath load-balancing
Multipath routing
multiprocessor scheduling
Multivariate time series
N
name resolution architecture
NB-IoT
NetFlow
Network Calculus
network dynamics
Network Function Virtualization
Network Management
Network measurement
Network Neutrality
Network Performance
Network security
network sharing
Network slicing
network traffic
network traffic prediction
Network Utilities
Neural Networks
non-interactive chaotic zero-knowledge (NCZIP)
nonlinear autoregressive exogenous (NARX)
NoSQL Graph Database
NS3
O
Object Detection
Oil/Gas
onboarding
One Class Classification
Online Charging Scheme
online traffic clustering
openflow
opportunistic networking
Optimization
Ordinary Differential Equations
Osmotic Computing
Outlier Detection
P
P2P energy trading
packet loss
Packet Loss Rate
PACS
Page Object Detection
parallel partitioning approach
PAREO
Parkinson’s Disease
passive Wi-Fi tracking
Path Computation Element
path inflation
Pedestrian Detection
Peer-sampling
performance
performance analysis
performance benchmarking
performance evaluation
persistent element
Personal Information Management Systems
Photopletismography
Physiological Data analysis
Pipelines
point cloud
policy hill-climbing
pollution
popularity
popularity prediction
port-hopping
power prediction
Precedence constraints
prediction
Prediction Model
Predictive Model
Predictive Modelling
privacy
privacy and security
Privacy-preserving Computation
proactive
Proactive caching
probabilistic algorithm
probabilistic model
Program Profiling
programmable switch
propagation delay
prosumer
Protocols
Provenance
Provenance data
Proximity-based positioning
PSK
psychometric analysis
Public healthcare
Public Transportation
Pulmonary nodules
Q
Quality of Service
queue size
R
radio access networks
RAN architecture
Range Queries
RAW
RC4
real-time
Real-world study
Recommendation Systems
Recommender system
reconnaissance
recovery
recurrent attention
reinforcement learning (RL)
Reliability
Reluplex Algorithm
Remote Patient Monitoring
remote sound monitoring
remote speech extraction
renewable energy
Resilient Architecture
resource allocation
resource discovery
resource management
restoration
Retinal Images
retrieving
ride sharing
robot
Robotic Rehabilitation
Robustness
rotational spectroscopy
routing
RPL
RRNS
S
safety
SCADA
Schocastic Models
SDDC
SDN
SDN orchestration
SDR
Secret Share
Secret Shuffling
Secure Multi-party Computation
security
security advisory
security automation
security network functions
Self-monitoring
self-similarity
Self-Sovereign Identity
Semantic-based Content Naming
Semantic-based Content Retrieval
Semi-supervised Learning
sensing
Sensing as a Service
sensing energy
Sensor
Sentiment Analysis
sequences
service availability
Service Computing
Service Migration
service platform
siamese network
side channel attacks
Sigfox
Signal processing
Signal-to-Noise Ratio
simulation
Simulation Framework
sketch
SLA
Sleeping Cell Detection
SM4 implementation
Smart buildings
Smart Cities
smart city
smart contract
smart contracts
smart home
Smart Traffic
Smart Utility Networks
SNMP
social content-centric networking
Social Dilemma
Social Isolation
Social media
social media sensing
Social Network Analysis
social networks
Software Defined Networking
Software-Defined Networking
Space Division Multiplexing
spatial image correlation
Spatial Modulation
spatio-temporal data
speckles pattern
spectrum sensing
SRv6
Stackelberg Game
Stackelberg games
stereoscopic
Stochastic network calculus
storage
Storage security
stream-cipher
Stress Detection
Sub-GHz
subtree-splitting strategy
SUMO
Supervised Learning
Supervised Learning by Classification
Supervised Machine Learning
Supply Chain Optimization
support vector machines
Surveillance
survivability
SVM
Sybil attack
Symmetric Encryption
Symmetric Searchable Encryption
Synchronous system
T
Task Allocation
task location
Task Offloading
taxonomy
Teaching
Tele-healthcare
telegram scheduling
temporal convolutional networks
Three-factor authentication
time series
Time series classification
Time slot assignment
time window
time-series
Time-Series Analysis
token
token taxonomy
tokenomics
tokens
Tor website fingerprinting
TRaaS
traffic classification
Traffic Differentiation
traffic measurement
traffic modeling
transaction
Transformers
trusted execution environment
Trusted Path
TSCH
U
UAV
unknown traffic
Unmanned Aerial Vehicle
unmanned systems
unseen threat discovery
Unsupervised Learning
untrusted gateway node
Urban Mobility
URLLC
V
V2N communications
V2V
V2X
Valley-free Paths
VANET
VANETs
vehicle make and model recognition
Vehicle Rerouting
Vehicular communications
Vehicular fading channels
vehicular networks
Verifiable Credentials
Verification
verification table
Video processing
video streaming
Virtual cells
visual attention
VNF orchestration
VPN
vulnerability
vulnerability type
W
walking analysis
wall-follower
wallets
WBANs
Web browsing
web-based information system
website fingerprinting
website fingerprinting attack
weighted sum-rate maximization
WireGuard
Wireless Cognitive Radio
Wireless network
Wireless Power Transfer
Wireless Rechargeable Sensor Networks
Wireless Sensor Networks
Wireless Sensor Networks (WSNs)
word embedding
Word Embeddings
Word2vec
Workflow
WSN
X
XGBoost
XLM
Z
Zero Knowledge Proofs
zero-forcing