TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| 3 | |
| 3D Accelerometer | |
| 3D CNN | |
| 3D Gyroscope Surface | |
| 5 | |
| 5G | |
| 5G New Radio | |
| 5G UDN | |
| 5G urban scenario | |
| 5G-enabled Vehicular Networks | |
| 6 | |
| 6P | |
| 6TiSCH | |
| 6top | |
| A | |
| ACK | |
| active queue management | |
| adaptive sampling | |
| Adaptive streaming | |
| address clustering | |
| Advanced Persistent Threat | |
| adversarial learning | |
| Adversarial machine learning | |
| air-quality | |
| Alcohol Use Disorder | |
| All Programmable SoC | |
| All-weighted | |
| ambient sensor | |
| ANN | |
| anomalous flow | |
| Anomaly Detection | |
| anonymization | |
| Anonymous Authentication | |
| anonymous communication | |
| anycast | |
| Applied Behaviour Analysis | |
| Architecture | |
| Arduino | |
| Artificial Intelligence | |
| AS-level Paths | |
| ASL | |
| atomic | |
| attack | |
| attack graphs | |
| attacks | |
| Attributed Networks | |
| authentication | |
| authorization | |
| Autism Spectrum Disorder | |
| Autoencoder | |
| Autoencoder Network | |
| AUTOFIT | |
| Automatic detection | |
| Automatic Speech Recognition | |
| Automotive radar | |
| autonomous | |
| autonomous management | |
| Autonomous Vehicle | |
| Availability | |
| AVISPA | |
| Awareness Index | |
| Azure | |
| B | |
| Battery Management System | |
| Beacon | |
| Beamforming | |
| BGP | |
| Big Data | |
| Big Sequence Management | |
| bike sharing fleet | |
| biobank | |
| Bitcoin | |
| Bitcoin network | |
| Bivariate Gaussian distribution | |
| Block ciphers | |
| block diagonal | |
| blockchain | |
| blockchain analysis | |
| Blood oxygen saturation | |
| bloom filter | |
| Bluetooth Low Energy | |
| Bounding Box Regression | |
| bristol stool scale | |
| Broadcast/receive | |
| bufferbloat | |
| burst ratio | |
| C | |
| C-ITS | |
| C-RAN | |
| C-RANs | |
| cache efficiency | |
| Cache flush | |
| caching strategy | |
| CAD | |
| camera | |
| Capsule Network | |
| Capture Effect | |
| Car-sharing | |
| CAV | |
| ChaCha20 | |
| Channel Access | |
| Charging efficiency | |
| Charging unmanned aerial vehicles | |
| classification | |
| classification framework | |
| Clock drift | |
| Clock synchronization | |
| Cloud | |
| cloud computing | |
| cloud database | |
| Cloud Security | |
| Cloud storage | |
| clustering | |
| CNN | |
| CoAP | |
| cognitive radio | |
| Collaborative filtering | |
| Collaborative Scientific Experiments | |
| Collision | |
| colocation data center | |
| Communication system security | |
| community detection | |
| Compression | |
| Computer | |
| Computer Security | |
| confidential information detection | |
| Conflict | |
| Congestion control | |
| Connected Autonomous Vehicles | |
| Consensus | |
| Consistency | |
| constrained nodes | |
| content delivery network | |
| Context-aware | |
| Controlled experimentation | |
| Controller area network | |
| Convolution Neural Network | |
| convolutional neural network | |
| Convolutional Neural Networks | |
| Cooperative Management | |
| Coronavirus | |
| Cortex-A9 MPCore | |
| Cost function modification | |
| Cost-Efficiency | |
| COVID-19 | |
| cross | |
| Cross-lingual Classification | |
| Cryptography | |
| CT | |
| Curitiba | |
| Cyber Physical Systems | |
| Cyber-physical systems | |
| D | |
| DAO | |
| dashboards | |
| Data augmentation | |
| Data availability | |
| Data Center Networks | |
| Data Centers resource management | |
| Data Centers security | |
| Data Collection | |
| Data Exfiltration | |
| Data Generation | |
| Data geolocation | |
| data mining | |
| Data Security | |
| data series | |
| Data sharing | |
| Data Stream | |
| data visualization | |
| DBSCAN | |
| Decentralization | |
| decentralized exchange | |
| Decentralized File Storage | |
| decentralized governance | |
| Decision Making | |
| Decision Support System DSS | |
| deep learning | |
| Deep Learning Algorithms (DL) | |
| Deep Neural Network | |
| Deep Neural Networks | |
| defense | |
| Delay Bounds | |
| Delay Reduction | |
| demand response | |
| denoising model | |
| DenseNet | |
| design | |
| devices dysfunction | |
| DGA Detection | |
| DHT | |
| diabetes | |
| diagnosis | |
| diagnostics | |
| DICOM | |
| Dicoogle | |
| Digital communications | |
| Digital Transformation | |
| Digital Twin | |
| Distance-2 graph coloring | |
| Distributed Ledger Technologies | |
| Distributed systems | |
| distribution fitting | |
| DNN partitioning | |
| DNS | |
| DNS Tunnel | |
| Document Processing | |
| Domain-Embeddings | |
| Doob's maximal inequality | |
| dropping function | |
| Dynamic key dependent cryptographic primitives | |
| Dynamic Networks | |
| dynamic routing | |
| E | |
| e- Health | |
| E-Health | |
| early warning system | |
| ECMP routing | |
| Edge | |
| Edge Computing | |
| Edge-Cloud Computing | |
| Elastic Demand | |
| Elastic Optical Network | |
| Electric Vehicles | |
| Elephant Flow | |
| embedded | |
| Embedded Devices | |
| Embedded systems | |
| Emergency Messages Dissemination | |
| EMG | |
| end-to-end delay bound | |
| Energy Efficiency | |
| Energy Replenishment | |
| energy storage | |
| Ensemble Learning | |
| Epidemic Modelling | |
| erc20 | |
| erc721 | |
| Error rate performance | |
| Ethereum | |
| EV | |
| Explainable Artificial Intelligence | |
| F | |
| failure prediction | |
| failure probability | |
| Fairness | |
| Feature Analysis | |
| Feature selection | |
| feedback | |
| Feedback control | |
| fifth-generation (5G) | |
| File Collections | |
| Fine-Tuning | |
| Firefly algorithm | |
| Flexible architecture | |
| Flexible Ethernet | |
| flow correlation | |
| Flushed-based Spectre Attack | |
| Fog | |
| Fog Computing | |
| Food Processing | |
| forecast | |
| Formal verification | |
| Forward Privacy | |
| framework | |
| G | |
| Game Theory | |
| games | |
| gamification | |
| GAN | |
| GAN Network | |
| gas consumption | |
| Genetic Algorithm | |
| Glaucoma | |
| Gossip | |
| GPU | |
| Grammatical Evolution | |
| Graph Convolutional Network | |
| Graph Neural Networks | |
| grey model | |
| group key management | |
| guaranteed based approach | |
| H | |
| hardware/software co-design | |
| HARQ | |
| health | |
| Health Informatics | |
| health systems | |
| Healthcare | |
| Healthcare 4.0 | |
| Heterogeneous | |
| Heterogeneous Wireless Rechargeable Sensor Networks | |
| heuristic algorithms | |
| Homogeneous | |
| Homomorphic Encryption | |
| Honeypots | |
| HPC | |
| hping3 | |
| HTTP Traffic | |
| human mobility data | |
| Hyper-sensors | |
| Hyperledger Caliper | |
| Hyperledger Fabric | |
| I | |
| ICD-10 Coding | |
| ICN | |
| ICU beds | |
| identity management | |
| IEEE 802.15.4 | |
| IEEE 802.15.4g | |
| IEEE 802.15.6 Security Association | |
| IEEE Std 802.15.4-2015 | |
| IEEE Std 802.15.4-2015 TSCH | |
| IIoT | |
| ILP | |
| Image Processing | |
| imaging | |
| Imbalanced data | |
| Impersonation Attacks | |
| Implicit feedback | |
| IMU | |
| Incentive Caching | |
| incremental deployment | |
| Incremental Training | |
| Indoor navigation | |
| Industrial Control System | |
| Industrial IoT | |
| Industry 4.0 | |
| Inspection | |
| integrity verify | |
| Intelligent transportation system | |
| Internet | |
| Internet of Thing (IoT) | |
| Internet of Things | |
| Internet of Things (IoT) | |
| Internet of Vehicles (IoV) | |
| Internet Routing | |
| interpolation | |
| Intrusion Detection | |
| IoT | |
| IoT Attacks | |
| IoT Data | |
| IoV | |
| IP Mobility Support | |
| IP-Optical networks | |
| IPv6 | |
| ITS | |
| J | |
| Jamming | |
| JavaScript Detection | |
| Joint optimization problem | |
| K | |
| Kernel driver | |
| key protection | |
| Key-value store | |
| keys management | |
| Knowledge-Based Modelling | |
| L | |
| LDPC | |
| Leaky ReLU | |
| Learning pack | |
| ledger | |
| LEO satellite network | |
| Lightweight message authentication algorithm | |
| Linear Programming | |
| LLNs | |
| Load Balancing | |
| Log Analysis | |
| Long short-term memory | |
| LoPy4 | |
| LoRa | |
| LoRaWAN | |
| loss ratio | |
| Louvian algorithm | |
| Low Earth Orbit(LEO) Satellite Network | |
| Low-Power Wireless | |
| low-rank completion | |
| LPWAN | |
| LPWAN Networks | |
| LTE Cat-M1 | |
| M | |
| Machine Learning | |
| Machine Vision | |
| magnetic resonance imaging | |
| Malicious traffic | |
| malicious traffic detection | |
| Malicious URL | |
| Malware | |
| Malware Detection | |
| Management and Orchestration | |
| Markov | |
| Markov decision processes | |
| massive MIMO | |
| mechanism design | |
| Medical Emergency Vehicles | |
| Medical Imaging | |
| mega constellation | |
| Metric learning | |
| microwave thermal therapy | |
| MILP | |
| MIMO | |
| miner | |
| Missing values Imputation | |
| Mobile Agent | |
| Mobile Crowdsensing | |
| Mobile Edge | |
| Mobile Edge Computing | |
| Mobile Health | |
| mobile security | |
| Mobile sensor perception | |
| mobility | |
| Mobility Management | |
| model-based workload generation | |
| Modern Internet Service Providers | |
| Modulation Diversity | |
| Moment Generating Function | |
| Monitoring | |
| mood | |
| morphological analysis | |
| motion reduction | |
| motivation | |
| Moving Target Defense | |
| MPI | |
| MRI thermometry | |
| MSF | |
| MTD | |
| Multi-Agent System | |
| multi-attention | |
| Multi-Client | |
| Multi-path Routing | |
| multi-tenant | |
| Multifunction vehicle bus | |
| Multihomed Vehicular Networks | |
| Multihoming | |
| Multilabel Text Classification | |
| Multilingual Neural Language Model | |
| Multipath load-balancing | |
| Multipath routing | |
| multiprocessor scheduling | |
| Multivariate time series | |
| N | |
| name resolution architecture | |
| NB-IoT | |
| NetFlow | |
| Network Calculus | |
| network dynamics | |
| Network Function Virtualization | |
| Network Management | |
| Network measurement | |
| Network Neutrality | |
| Network Performance | |
| Network security | |
| network sharing | |
| Network slicing | |
| network traffic | |
| network traffic prediction | |
| Network Utilities | |
| Neural Networks | |
| non-interactive chaotic zero-knowledge (NCZIP) | |
| nonlinear autoregressive exogenous (NARX) | |
| NoSQL Graph Database | |
| NS3 | |
| O | |
| Object Detection | |
| Oil/Gas | |
| onboarding | |
| One Class Classification | |
| Online Charging Scheme | |
| online traffic clustering | |
| openflow | |
| opportunistic networking | |
| Optimization | |
| Ordinary Differential Equations | |
| Osmotic Computing | |
| Outlier Detection | |
| P | |
| P2P energy trading | |
| packet loss | |
| Packet Loss Rate | |
| PACS | |
| Page Object Detection | |
| parallel partitioning approach | |
| PAREO | |
| Parkinson’s Disease | |
| passive Wi-Fi tracking | |
| Path Computation Element | |
| path inflation | |
| Pedestrian Detection | |
| Peer-sampling | |
| performance | |
| performance analysis | |
| performance benchmarking | |
| performance evaluation | |
| persistent element | |
| Personal Information Management Systems | |
| Photopletismography | |
| Physiological Data analysis | |
| Pipelines | |
| point cloud | |
| policy hill-climbing | |
| pollution | |
| popularity | |
| popularity prediction | |
| port-hopping | |
| power prediction | |
| Precedence constraints | |
| prediction | |
| Prediction Model | |
| Predictive Model | |
| Predictive Modelling | |
| privacy | |
| privacy and security | |
| Privacy-preserving Computation | |
| proactive | |
| Proactive caching | |
| probabilistic algorithm | |
| probabilistic model | |
| Program Profiling | |
| programmable switch | |
| propagation delay | |
| prosumer | |
| Protocols | |
| Provenance | |
| Provenance data | |
| Proximity-based positioning | |
| PSK | |
| psychometric analysis | |
| Public healthcare | |
| Public Transportation | |
| Pulmonary nodules | |
| Q | |
| Quality of Service | |
| queue size | |
| R | |
| radio access networks | |
| RAN architecture | |
| Range Queries | |
| RAW | |
| RC4 | |
| real-time | |
| Real-world study | |
| Recommendation Systems | |
| Recommender system | |
| reconnaissance | |
| recovery | |
| recurrent attention | |
| reinforcement learning (RL) | |
| Reliability | |
| Reluplex Algorithm | |
| Remote Patient Monitoring | |
| remote sound monitoring | |
| remote speech extraction | |
| renewable energy | |
| Resilient Architecture | |
| resource allocation | |
| resource discovery | |
| resource management | |
| restoration | |
| Retinal Images | |
| retrieving | |
| ride sharing | |
| robot | |
| Robotic Rehabilitation | |
| Robustness | |
| rotational spectroscopy | |
| routing | |
| RPL | |
| RRNS | |
| S | |
| safety | |
| SCADA | |
| Schocastic Models | |
| SDDC | |
| SDN | |
| SDN orchestration | |
| SDR | |
| Secret Share | |
| Secret Shuffling | |
| Secure Multi-party Computation | |
| security | |
| security advisory | |
| security automation | |
| security network functions | |
| Self-monitoring | |
| self-similarity | |
| Self-Sovereign Identity | |
| Semantic-based Content Naming | |
| Semantic-based Content Retrieval | |
| Semi-supervised Learning | |
| sensing | |
| Sensing as a Service | |
| sensing energy | |
| Sensor | |
| Sentiment Analysis | |
| sequences | |
| service availability | |
| Service Computing | |
| Service Migration | |
| service platform | |
| siamese network | |
| side channel attacks | |
| Sigfox | |
| Signal processing | |
| Signal-to-Noise Ratio | |
| simulation | |
| Simulation Framework | |
| sketch | |
| SLA | |
| Sleeping Cell Detection | |
| SM4 implementation | |
| Smart buildings | |
| Smart Cities | |
| smart city | |
| smart contract | |
| smart contracts | |
| smart home | |
| Smart Traffic | |
| Smart Utility Networks | |
| SNMP | |
| social content-centric networking | |
| Social Dilemma | |
| Social Isolation | |
| Social media | |
| social media sensing | |
| Social Network Analysis | |
| social networks | |
| Software Defined Networking | |
| Software-Defined Networking | |
| Space Division Multiplexing | |
| spatial image correlation | |
| Spatial Modulation | |
| spatio-temporal data | |
| speckles pattern | |
| spectrum sensing | |
| SRv6 | |
| Stackelberg Game | |
| Stackelberg games | |
| stereoscopic | |
| Stochastic network calculus | |
| storage | |
| Storage security | |
| stream-cipher | |
| Stress Detection | |
| Sub-GHz | |
| subtree-splitting strategy | |
| SUMO | |
| Supervised Learning | |
| Supervised Learning by Classification | |
| Supervised Machine Learning | |
| Supply Chain Optimization | |
| support vector machines | |
| Surveillance | |
| survivability | |
| SVM | |
| Sybil attack | |
| Symmetric Encryption | |
| Symmetric Searchable Encryption | |
| Synchronous system | |
| T | |
| Task Allocation | |
| task location | |
| Task Offloading | |
| taxonomy | |
| Teaching | |
| Tele-healthcare | |
| telegram scheduling | |
| temporal convolutional networks | |
| Three-factor authentication | |
| time series | |
| Time series classification | |
| Time slot assignment | |
| time window | |
| time-series | |
| Time-Series Analysis | |
| token | |
| token taxonomy | |
| tokenomics | |
| tokens | |
| Tor website fingerprinting | |
| TRaaS | |
| traffic classification | |
| Traffic Differentiation | |
| traffic measurement | |
| traffic modeling | |
| transaction | |
| Transformers | |
| trusted execution environment | |
| Trusted Path | |
| TSCH | |
| U | |
| UAV | |
| unknown traffic | |
| Unmanned Aerial Vehicle | |
| unmanned systems | |
| unseen threat discovery | |
| Unsupervised Learning | |
| untrusted gateway node | |
| Urban Mobility | |
| URLLC | |
| V | |
| V2N communications | |
| V2V | |
| V2X | |
| Valley-free Paths | |
| VANET | |
| VANETs | |
| vehicle make and model recognition | |
| Vehicle Rerouting | |
| Vehicular communications | |
| Vehicular fading channels | |
| vehicular networks | |
| Verifiable Credentials | |
| Verification | |
| verification table | |
| Video processing | |
| video streaming | |
| Virtual cells | |
| visual attention | |
| VNF orchestration | |
| VPN | |
| vulnerability | |
| vulnerability type | |
| W | |
| walking analysis | |
| wall-follower | |
| wallets | |
| WBANs | |
| Web browsing | |
| web-based information system | |
| website fingerprinting | |
| website fingerprinting attack | |
| weighted sum-rate maximization | |
| WireGuard | |
| Wireless Cognitive Radio | |
| Wireless network | |
| Wireless Power Transfer | |
| Wireless Rechargeable Sensor Networks | |
| Wireless Sensor Networks | |
| Wireless Sensor Networks (WSNs) | |
| word embedding | |
| Word Embeddings | |
| Word2vec | |
| Workflow | |
| WSN | |
| X | |
| XGBoost | |
| XLM | |
| Z | |
| Zero Knowledge Proofs | |
| zero-forcing | |