SOICT 2019: THE 10TH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

3
3D convolution
A
AAA
abnormal behavior
Abstractive summarization
Action Recognition
address normalization
Anomaly Classification
Anomaly Detection
architectural framework
Artificial intelligence
assembly line balancing
Assume-guarantee verification
Attention Mechanism
Authentication
autoencoder
autoencoders
Automated Braking
automation
B
Basketball
Batch verification
bibliographic network
Bidirectional Long Short-Term Memory Networks
bilingual term
bilingual terminology
bilingual terminology corpus
bilingual terminology dictionary
Blockchain
browser extension
Browser security
Business Alliance
C
C500-CFGVex
centroid-based
Circadian computing
Citizens as Sensors
Classification model
Clustered Minimum Routing Cost Problem
Clustered Tree Problem
clustering
clustering algorithm
CNN
Collaborative distribution
collaborative filtering
community structure detection
Complex System
Component-based software
conditional random field
Conditional Random Fields
congestion control
container transportation
Convolutional Neural Network
Convolutional Neuronal Network
coverage
CRF
Cross-architecture
crowdsourcing
crowdsourcing-based architecture
Cyber-physical system
cybersecurity
Cycle-GAN
D
DApp
data streams
Data-driven method
Decentralization
Deep Learning
Deep neural networks
delay guarantee
denoising variational autoencoder
Development Tool
Diagnostic Assistant System
Digital signature
Dimension reduction
Discreate Wavelet Trans- form (DWT)
distance-based
Distributed Intelligence System
Distributed Training
Domain specific languages
Domain-specific language
drayage operation
Driving Automation
DTW
Dynamic saliency map
Dynamic Searchable Symmetric Encryption
E
e-government
EEG
elastic optical network
Electronic Reward Point
EM algorithm
Emotional speech
Encrypted data
Encrypted database verification
energy harvesting
English-Vietnamese bilingual terminology extraction
Ensemble learning
entropy-based detection
Error analysis
Error correction
Error detection
Estrus Detection
Ethereum
Event-driven systems
Evolutionary Algorithm
extracting bilingual terms
extractive
Extractive Summarization
F
face recognition
face search
face verification
Feature map
federated learning
Fine Dust
finite-time consensus
fixed phrase
Formation analysis
fuzzy logic
fuzzy matching
G
Gastric Imaging Classification
gateway allocation
Genetic Algorithm
Geometric features of formations
GMM Posteriorgram
graph partition
graph partitioning
Graphic User Interface
Graphical user interface
group recommendation system
H
H2O Sparkling-Water
Hotel review classification
Human Perception
I
Integrated and visual development environments
Internet of Things
IoT
J
JADE
K
k-means
Kanban
Kinetic model
KNN
L
landmark selection
language model
large-scale graph
latent factor model
Legal Text
linear iterative scheme
Link prediction
LSTM
M
Machine learning
Machine Learning-based Defacement Detection
Malware detection
many-objective optimization
Matrix Factorization
maximal marginal relevance
Mean Opinion Score
meta-heuristic
Microgrid
mininet
mixed-integer linear program
Mixture distribution
Mixture-of-experts-type model
model checking
Model checking techniques
motif discovery
multi-document summarization
multi-domain network
Multi-layer Defacement Detection
multi-relation network
Multifactorial Evolutionary Algorithm
Multimedia Service
N
named entity recognition
Natural Language Understanding
network anomaly detection
network lifetime
neural networks
noise
NOMA
Northbound Interface
O
Object Detection
Object oriented frameworks
objective reduction
observability index
OCR
Offshore
One-verifier signature
online services
ONOS
opcode sequence
OpenvSwitch
optical network
Optimization
outage probability
outlier detection
Outsourced database
Outsourcing
P
parallel computation
Particulate Metter
Pass play evaluation
Pattern discovery
pattern matching
Pedestrian Crossings
person retrieval
Players and ball positions data
pointer-generator network
position estimation
Post-processing
power-splitting
Predictive maintenance
Pregnancy detection
preparation
public services
punctuation prediction
Q
Quantization Index Module (QIM)
Quantum bit-error rate
Quantum key distribution
query processing
R
R package
Radio-over-fiber
RCDMP
recommendation system
reconfiguration
Reference Extraction
Remaining useful life
Repeated patterns
Risk Management
RNN
routing modulation and spectrum assignment
routing protocol
RVND
S
Scene Recognition
Scrum
Secondary validation
Secret-key rate
security
Self-attention
sensor-based
sentence compression
Sentence Extraction
sentence position
Sentiment analysis
sequence labeling
Sequence Recognition
sequence-to-sequence attentional model
Sequential recommendation
Session-based recommendation
short utterances
simulated annealing
Singer Classification
Smart contract
Smart Grid
Social Context Summarization
Software and its engineering
Software defect prediction
Software Defined Networking
Software Defined Networking (SDN)
Software verfication
Software-defined Network
Spark
Sparse Modelling
speaker verification
Stacked Denoising Autoencoder
Strong designated verifier signature
suffix array
Sum Rule
summarization
Support Vector Machine
SVD (Sigular Value Decomposition)
System modeling languages
systems security
T
Team sports
Temporal Interval Query
Temporal Segment Networks
Text Recognition
time series
Time Series Data
Timed systems
topic modeling
Trend prediction
triplet loss
truck routing problem
TS
U
Unconstrained Vietnamese handwriting
unsupervised learning
User Authentication
V
Variational Bayesian Inference
Vietnamese language
Vietnamese sentiment classification
Visual Concept Extraction
Vocal Extraction
Voronoi diagram
W
Watermarking
Wearables
Web application security
Web attack detection
webshell detection
Website Defacement Attack
Website Defacement Monitoring and Detection
website monitoring
Wi-Fi
wireless sensor network
word embedding
X
Xgboost
Y
yara rules