TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
3 | |
3D Accelerometer | |
3D CNN | |
3D Gyroscope Surface | |
5 | |
5G | |
5G New Radio | |
5G UDN | |
5G urban scenario | |
5G-enabled Vehicular Networks | |
6 | |
6P | |
6TiSCH | |
6top | |
A | |
ACK | |
active queue management | |
adaptive sampling | |
Adaptive streaming | |
address clustering | |
Advanced Persistent Threat | |
adversarial learning | |
Adversarial machine learning | |
air-quality | |
Alcohol Use Disorder | |
All Programmable SoC | |
All-weighted | |
ambient sensor | |
ANN | |
anomalous flow | |
Anomaly Detection | |
anonymization | |
Anonymous Authentication | |
anonymous communication | |
anycast | |
Applied Behaviour Analysis | |
Architecture | |
Arduino | |
Artificial Intelligence | |
AS-level Paths | |
ASL | |
atomic | |
attack | |
attack graphs | |
attacks | |
Attributed Networks | |
authentication | |
authorization | |
Autism Spectrum Disorder | |
Autoencoder | |
Autoencoder Network | |
AUTOFIT | |
Automatic detection | |
Automatic Speech Recognition | |
Automotive radar | |
autonomous | |
autonomous management | |
Autonomous Vehicle | |
Availability | |
AVISPA | |
Awareness Index | |
Azure | |
B | |
Battery Management System | |
Beacon | |
Beamforming | |
BGP | |
Big Data | |
Big Sequence Management | |
bike sharing fleet | |
biobank | |
Bitcoin | |
Bitcoin network | |
Bivariate Gaussian distribution | |
Block ciphers | |
block diagonal | |
blockchain | |
blockchain analysis | |
Blood oxygen saturation | |
bloom filter | |
Bluetooth Low Energy | |
Bounding Box Regression | |
bristol stool scale | |
Broadcast/receive | |
bufferbloat | |
burst ratio | |
C | |
C-ITS | |
C-RAN | |
C-RANs | |
cache efficiency | |
Cache flush | |
caching strategy | |
CAD | |
camera | |
Capsule Network | |
Capture Effect | |
Car-sharing | |
CAV | |
ChaCha20 | |
Channel Access | |
Charging efficiency | |
Charging unmanned aerial vehicles | |
classification | |
classification framework | |
Clock drift | |
Clock synchronization | |
Cloud | |
cloud computing | |
cloud database | |
Cloud Security | |
Cloud storage | |
clustering | |
CNN | |
CoAP | |
cognitive radio | |
Collaborative filtering | |
Collaborative Scientific Experiments | |
Collision | |
colocation data center | |
Communication system security | |
community detection | |
Compression | |
Computer | |
Computer Security | |
confidential information detection | |
Conflict | |
Congestion control | |
Connected Autonomous Vehicles | |
Consensus | |
Consistency | |
constrained nodes | |
content delivery network | |
Context-aware | |
Controlled experimentation | |
Controller area network | |
Convolution Neural Network | |
convolutional neural network | |
Convolutional Neural Networks | |
Cooperative Management | |
Coronavirus | |
Cortex-A9 MPCore | |
Cost function modification | |
Cost-Efficiency | |
COVID-19 | |
cross | |
Cross-lingual Classification | |
Cryptography | |
CT | |
Curitiba | |
Cyber Physical Systems | |
Cyber-physical systems | |
D | |
DAO | |
dashboards | |
Data augmentation | |
Data availability | |
Data Center Networks | |
Data Centers resource management | |
Data Centers security | |
Data Collection | |
Data Exfiltration | |
Data Generation | |
Data geolocation | |
data mining | |
Data Security | |
data series | |
Data sharing | |
Data Stream | |
data visualization | |
DBSCAN | |
Decentralization | |
decentralized exchange | |
Decentralized File Storage | |
decentralized governance | |
Decision Making | |
Decision Support System DSS | |
deep learning | |
Deep Learning Algorithms (DL) | |
Deep Neural Network | |
Deep Neural Networks | |
defense | |
Delay Bounds | |
Delay Reduction | |
demand response | |
denoising model | |
DenseNet | |
design | |
devices dysfunction | |
DGA Detection | |
DHT | |
diabetes | |
diagnosis | |
diagnostics | |
DICOM | |
Dicoogle | |
Digital communications | |
Digital Transformation | |
Digital Twin | |
Distance-2 graph coloring | |
Distributed Ledger Technologies | |
Distributed systems | |
distribution fitting | |
DNN partitioning | |
DNS | |
DNS Tunnel | |
Document Processing | |
Domain-Embeddings | |
Doob's maximal inequality | |
dropping function | |
Dynamic key dependent cryptographic primitives | |
Dynamic Networks | |
dynamic routing | |
E | |
e- Health | |
E-Health | |
early warning system | |
ECMP routing | |
Edge | |
Edge Computing | |
Edge-Cloud Computing | |
Elastic Demand | |
Elastic Optical Network | |
Electric Vehicles | |
Elephant Flow | |
embedded | |
Embedded Devices | |
Embedded systems | |
Emergency Messages Dissemination | |
EMG | |
end-to-end delay bound | |
Energy Efficiency | |
Energy Replenishment | |
energy storage | |
Ensemble Learning | |
Epidemic Modelling | |
erc20 | |
erc721 | |
Error rate performance | |
Ethereum | |
EV | |
Explainable Artificial Intelligence | |
F | |
failure prediction | |
failure probability | |
Fairness | |
Feature Analysis | |
Feature selection | |
feedback | |
Feedback control | |
fifth-generation (5G) | |
File Collections | |
Fine-Tuning | |
Firefly algorithm | |
Flexible architecture | |
Flexible Ethernet | |
flow correlation | |
Flushed-based Spectre Attack | |
Fog | |
Fog Computing | |
Food Processing | |
forecast | |
Formal verification | |
Forward Privacy | |
framework | |
G | |
Game Theory | |
games | |
gamification | |
GAN | |
GAN Network | |
gas consumption | |
Genetic Algorithm | |
Glaucoma | |
Gossip | |
GPU | |
Grammatical Evolution | |
Graph Convolutional Network | |
Graph Neural Networks | |
grey model | |
group key management | |
guaranteed based approach | |
H | |
hardware/software co-design | |
HARQ | |
health | |
Health Informatics | |
health systems | |
Healthcare | |
Healthcare 4.0 | |
Heterogeneous | |
Heterogeneous Wireless Rechargeable Sensor Networks | |
heuristic algorithms | |
Homogeneous | |
Homomorphic Encryption | |
Honeypots | |
HPC | |
hping3 | |
HTTP Traffic | |
human mobility data | |
Hyper-sensors | |
Hyperledger Caliper | |
Hyperledger Fabric | |
I | |
ICD-10 Coding | |
ICN | |
ICU beds | |
identity management | |
IEEE 802.15.4 | |
IEEE 802.15.4g | |
IEEE 802.15.6 Security Association | |
IEEE Std 802.15.4-2015 | |
IEEE Std 802.15.4-2015 TSCH | |
IIoT | |
ILP | |
Image Processing | |
imaging | |
Imbalanced data | |
Impersonation Attacks | |
Implicit feedback | |
IMU | |
Incentive Caching | |
incremental deployment | |
Incremental Training | |
Indoor navigation | |
Industrial Control System | |
Industrial IoT | |
Industry 4.0 | |
Inspection | |
integrity verify | |
Intelligent transportation system | |
Internet | |
Internet of Thing (IoT) | |
Internet of Things | |
Internet of Things (IoT) | |
Internet of Vehicles (IoV) | |
Internet Routing | |
interpolation | |
Intrusion Detection | |
IoT | |
IoT Attacks | |
IoT Data | |
IoV | |
IP Mobility Support | |
IP-Optical networks | |
IPv6 | |
ITS | |
J | |
Jamming | |
JavaScript Detection | |
Joint optimization problem | |
K | |
Kernel driver | |
key protection | |
Key-value store | |
keys management | |
Knowledge-Based Modelling | |
L | |
LDPC | |
Leaky ReLU | |
Learning pack | |
ledger | |
LEO satellite network | |
Lightweight message authentication algorithm | |
Linear Programming | |
LLNs | |
Load Balancing | |
Log Analysis | |
Long short-term memory | |
LoPy4 | |
LoRa | |
LoRaWAN | |
loss ratio | |
Louvian algorithm | |
Low Earth Orbit(LEO) Satellite Network | |
Low-Power Wireless | |
low-rank completion | |
LPWAN | |
LPWAN Networks | |
LTE Cat-M1 | |
M | |
Machine Learning | |
Machine Vision | |
magnetic resonance imaging | |
Malicious traffic | |
malicious traffic detection | |
Malicious URL | |
Malware | |
Malware Detection | |
Management and Orchestration | |
Markov | |
Markov decision processes | |
massive MIMO | |
mechanism design | |
Medical Emergency Vehicles | |
Medical Imaging | |
mega constellation | |
Metric learning | |
microwave thermal therapy | |
MILP | |
MIMO | |
miner | |
Missing values Imputation | |
Mobile Agent | |
Mobile Crowdsensing | |
Mobile Edge | |
Mobile Edge Computing | |
Mobile Health | |
mobile security | |
Mobile sensor perception | |
mobility | |
Mobility Management | |
model-based workload generation | |
Modern Internet Service Providers | |
Modulation Diversity | |
Moment Generating Function | |
Monitoring | |
mood | |
morphological analysis | |
motion reduction | |
motivation | |
Moving Target Defense | |
MPI | |
MRI thermometry | |
MSF | |
MTD | |
Multi-Agent System | |
multi-attention | |
Multi-Client | |
Multi-path Routing | |
multi-tenant | |
Multifunction vehicle bus | |
Multihomed Vehicular Networks | |
Multihoming | |
Multilabel Text Classification | |
Multilingual Neural Language Model | |
Multipath load-balancing | |
Multipath routing | |
multiprocessor scheduling | |
Multivariate time series | |
N | |
name resolution architecture | |
NB-IoT | |
NetFlow | |
Network Calculus | |
network dynamics | |
Network Function Virtualization | |
Network Management | |
Network measurement | |
Network Neutrality | |
Network Performance | |
Network security | |
network sharing | |
Network slicing | |
network traffic | |
network traffic prediction | |
Network Utilities | |
Neural Networks | |
non-interactive chaotic zero-knowledge (NCZIP) | |
nonlinear autoregressive exogenous (NARX) | |
NoSQL Graph Database | |
NS3 | |
O | |
Object Detection | |
Oil/Gas | |
onboarding | |
One Class Classification | |
Online Charging Scheme | |
online traffic clustering | |
openflow | |
opportunistic networking | |
Optimization | |
Ordinary Differential Equations | |
Osmotic Computing | |
Outlier Detection | |
P | |
P2P energy trading | |
packet loss | |
Packet Loss Rate | |
PACS | |
Page Object Detection | |
parallel partitioning approach | |
PAREO | |
Parkinson’s Disease | |
passive Wi-Fi tracking | |
Path Computation Element | |
path inflation | |
Pedestrian Detection | |
Peer-sampling | |
performance | |
performance analysis | |
performance benchmarking | |
performance evaluation | |
persistent element | |
Personal Information Management Systems | |
Photopletismography | |
Physiological Data analysis | |
Pipelines | |
point cloud | |
policy hill-climbing | |
pollution | |
popularity | |
popularity prediction | |
port-hopping | |
power prediction | |
Precedence constraints | |
prediction | |
Prediction Model | |
Predictive Model | |
Predictive Modelling | |
privacy | |
privacy and security | |
Privacy-preserving Computation | |
proactive | |
Proactive caching | |
probabilistic algorithm | |
probabilistic model | |
Program Profiling | |
programmable switch | |
propagation delay | |
prosumer | |
Protocols | |
Provenance | |
Provenance data | |
Proximity-based positioning | |
PSK | |
psychometric analysis | |
Public healthcare | |
Public Transportation | |
Pulmonary nodules | |
Q | |
Quality of Service | |
queue size | |
R | |
radio access networks | |
RAN architecture | |
Range Queries | |
RAW | |
RC4 | |
real-time | |
Real-world study | |
Recommendation Systems | |
Recommender system | |
reconnaissance | |
recovery | |
recurrent attention | |
reinforcement learning (RL) | |
Reliability | |
Reluplex Algorithm | |
Remote Patient Monitoring | |
remote sound monitoring | |
remote speech extraction | |
renewable energy | |
Resilient Architecture | |
resource allocation | |
resource discovery | |
resource management | |
restoration | |
Retinal Images | |
retrieving | |
ride sharing | |
robot | |
Robotic Rehabilitation | |
Robustness | |
rotational spectroscopy | |
routing | |
RPL | |
RRNS | |
S | |
safety | |
SCADA | |
Schocastic Models | |
SDDC | |
SDN | |
SDN orchestration | |
SDR | |
Secret Share | |
Secret Shuffling | |
Secure Multi-party Computation | |
security | |
security advisory | |
security automation | |
security network functions | |
Self-monitoring | |
self-similarity | |
Self-Sovereign Identity | |
Semantic-based Content Naming | |
Semantic-based Content Retrieval | |
Semi-supervised Learning | |
sensing | |
Sensing as a Service | |
sensing energy | |
Sensor | |
Sentiment Analysis | |
sequences | |
service availability | |
Service Computing | |
Service Migration | |
service platform | |
siamese network | |
side channel attacks | |
Sigfox | |
Signal processing | |
Signal-to-Noise Ratio | |
simulation | |
Simulation Framework | |
sketch | |
SLA | |
Sleeping Cell Detection | |
SM4 implementation | |
Smart buildings | |
Smart Cities | |
smart city | |
smart contract | |
smart contracts | |
smart home | |
Smart Traffic | |
Smart Utility Networks | |
SNMP | |
social content-centric networking | |
Social Dilemma | |
Social Isolation | |
Social media | |
social media sensing | |
Social Network Analysis | |
social networks | |
Software Defined Networking | |
Software-Defined Networking | |
Space Division Multiplexing | |
spatial image correlation | |
Spatial Modulation | |
spatio-temporal data | |
speckles pattern | |
spectrum sensing | |
SRv6 | |
Stackelberg Game | |
Stackelberg games | |
stereoscopic | |
Stochastic network calculus | |
storage | |
Storage security | |
stream-cipher | |
Stress Detection | |
Sub-GHz | |
subtree-splitting strategy | |
SUMO | |
Supervised Learning | |
Supervised Learning by Classification | |
Supervised Machine Learning | |
Supply Chain Optimization | |
support vector machines | |
Surveillance | |
survivability | |
SVM | |
Sybil attack | |
Symmetric Encryption | |
Symmetric Searchable Encryption | |
Synchronous system | |
T | |
Task Allocation | |
task location | |
Task Offloading | |
taxonomy | |
Teaching | |
Tele-healthcare | |
telegram scheduling | |
temporal convolutional networks | |
Three-factor authentication | |
time series | |
Time series classification | |
Time slot assignment | |
time window | |
time-series | |
Time-Series Analysis | |
token | |
token taxonomy | |
tokenomics | |
tokens | |
Tor website fingerprinting | |
TRaaS | |
traffic classification | |
Traffic Differentiation | |
traffic measurement | |
traffic modeling | |
transaction | |
Transformers | |
trusted execution environment | |
Trusted Path | |
TSCH | |
U | |
UAV | |
unknown traffic | |
Unmanned Aerial Vehicle | |
unmanned systems | |
unseen threat discovery | |
Unsupervised Learning | |
untrusted gateway node | |
Urban Mobility | |
URLLC | |
V | |
V2N communications | |
V2V | |
V2X | |
Valley-free Paths | |
VANET | |
VANETs | |
vehicle make and model recognition | |
Vehicle Rerouting | |
Vehicular communications | |
Vehicular fading channels | |
vehicular networks | |
Verifiable Credentials | |
Verification | |
verification table | |
Video processing | |
video streaming | |
Virtual cells | |
visual attention | |
VNF orchestration | |
VPN | |
vulnerability | |
vulnerability type | |
W | |
walking analysis | |
wall-follower | |
wallets | |
WBANs | |
Web browsing | |
web-based information system | |
website fingerprinting | |
website fingerprinting attack | |
weighted sum-rate maximization | |
WireGuard | |
Wireless Cognitive Radio | |
Wireless network | |
Wireless Power Transfer | |
Wireless Rechargeable Sensor Networks | |
Wireless Sensor Networks | |
Wireless Sensor Networks (WSNs) | |
word embedding | |
Word Embeddings | |
Word2vec | |
Workflow | |
WSN | |
X | |
XGBoost | |
XLM | |
Z | |
Zero Knowledge Proofs | |
zero-forcing |