TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
3 | |
3D convolution | |
A | |
AAA | |
abnormal behavior | |
Abstractive summarization | |
Action Recognition | |
address normalization | |
Anomaly Classification | |
Anomaly Detection | |
architectural framework | |
Artificial intelligence | |
assembly line balancing | |
Assume-guarantee verification | |
Attention Mechanism | |
Authentication | |
autoencoder | |
autoencoders | |
Automated Braking | |
automation | |
B | |
Basketball | |
Batch verification | |
bibliographic network | |
Bidirectional Long Short-Term Memory Networks | |
bilingual term | |
bilingual terminology | |
bilingual terminology corpus | |
bilingual terminology dictionary | |
Blockchain | |
browser extension | |
Browser security | |
Business Alliance | |
C | |
C500-CFGVex | |
centroid-based | |
Circadian computing | |
Citizens as Sensors | |
Classification model | |
Clustered Minimum Routing Cost Problem | |
Clustered Tree Problem | |
clustering | |
clustering algorithm | |
CNN | |
Collaborative distribution | |
collaborative filtering | |
community structure detection | |
Complex System | |
Component-based software | |
conditional random field | |
Conditional Random Fields | |
congestion control | |
container transportation | |
Convolutional Neural Network | |
Convolutional Neuronal Network | |
coverage | |
CRF | |
Cross-architecture | |
crowdsourcing | |
crowdsourcing-based architecture | |
Cyber-physical system | |
cybersecurity | |
Cycle-GAN | |
D | |
DApp | |
data streams | |
Data-driven method | |
Decentralization | |
Deep Learning | |
Deep neural networks | |
delay guarantee | |
denoising variational autoencoder | |
Development Tool | |
Diagnostic Assistant System | |
Digital signature | |
Dimension reduction | |
Discreate Wavelet Trans- form (DWT) | |
distance-based | |
Distributed Intelligence System | |
Distributed Training | |
Domain specific languages | |
Domain-specific language | |
drayage operation | |
Driving Automation | |
DTW | |
Dynamic saliency map | |
Dynamic Searchable Symmetric Encryption | |
E | |
e-government | |
EEG | |
elastic optical network | |
Electronic Reward Point | |
EM algorithm | |
Emotional speech | |
Encrypted data | |
Encrypted database verification | |
energy harvesting | |
English-Vietnamese bilingual terminology extraction | |
Ensemble learning | |
entropy-based detection | |
Error analysis | |
Error correction | |
Error detection | |
Estrus Detection | |
Ethereum | |
Event-driven systems | |
Evolutionary Algorithm | |
extracting bilingual terms | |
extractive | |
Extractive Summarization | |
F | |
face recognition | |
face search | |
face verification | |
Feature map | |
federated learning | |
Fine Dust | |
finite-time consensus | |
fixed phrase | |
Formation analysis | |
fuzzy logic | |
fuzzy matching | |
G | |
Gastric Imaging Classification | |
gateway allocation | |
Genetic Algorithm | |
Geometric features of formations | |
GMM Posteriorgram | |
graph partition | |
graph partitioning | |
Graphic User Interface | |
Graphical user interface | |
group recommendation system | |
H | |
H2O Sparkling-Water | |
Hotel review classification | |
Human Perception | |
I | |
Integrated and visual development environments | |
Internet of Things | |
IoT | |
J | |
JADE | |
K | |
k-means | |
Kanban | |
Kinetic model | |
KNN | |
L | |
landmark selection | |
language model | |
large-scale graph | |
latent factor model | |
Legal Text | |
linear iterative scheme | |
Link prediction | |
LSTM | |
M | |
Machine learning | |
Machine Learning-based Defacement Detection | |
Malware detection | |
many-objective optimization | |
Matrix Factorization | |
maximal marginal relevance | |
Mean Opinion Score | |
meta-heuristic | |
Microgrid | |
mininet | |
mixed-integer linear program | |
Mixture distribution | |
Mixture-of-experts-type model | |
model checking | |
Model checking techniques | |
motif discovery | |
multi-document summarization | |
multi-domain network | |
Multi-layer Defacement Detection | |
multi-relation network | |
Multifactorial Evolutionary Algorithm | |
Multimedia Service | |
N | |
named entity recognition | |
Natural Language Understanding | |
network anomaly detection | |
network lifetime | |
neural networks | |
noise | |
NOMA | |
Northbound Interface | |
O | |
Object Detection | |
Object oriented frameworks | |
objective reduction | |
observability index | |
OCR | |
Offshore | |
One-verifier signature | |
online services | |
ONOS | |
opcode sequence | |
OpenvSwitch | |
optical network | |
Optimization | |
outage probability | |
outlier detection | |
Outsourced database | |
Outsourcing | |
P | |
parallel computation | |
Particulate Metter | |
Pass play evaluation | |
Pattern discovery | |
pattern matching | |
Pedestrian Crossings | |
person retrieval | |
Players and ball positions data | |
pointer-generator network | |
position estimation | |
Post-processing | |
power-splitting | |
Predictive maintenance | |
Pregnancy detection | |
preparation | |
public services | |
punctuation prediction | |
Q | |
Quantization Index Module (QIM) | |
Quantum bit-error rate | |
Quantum key distribution | |
query processing | |
R | |
R package | |
Radio-over-fiber | |
RCDMP | |
recommendation system | |
reconfiguration | |
Reference Extraction | |
Remaining useful life | |
Repeated patterns | |
Risk Management | |
RNN | |
routing modulation and spectrum assignment | |
routing protocol | |
RVND | |
S | |
Scene Recognition | |
Scrum | |
Secondary validation | |
Secret-key rate | |
security | |
Self-attention | |
sensor-based | |
sentence compression | |
Sentence Extraction | |
sentence position | |
Sentiment analysis | |
sequence labeling | |
Sequence Recognition | |
sequence-to-sequence attentional model | |
Sequential recommendation | |
Session-based recommendation | |
short utterances | |
simulated annealing | |
Singer Classification | |
Smart contract | |
Smart Grid | |
Social Context Summarization | |
Software and its engineering | |
Software defect prediction | |
Software Defined Networking | |
Software Defined Networking (SDN) | |
Software verfication | |
Software-defined Network | |
Spark | |
Sparse Modelling | |
speaker verification | |
Stacked Denoising Autoencoder | |
Strong designated verifier signature | |
suffix array | |
Sum Rule | |
summarization | |
Support Vector Machine | |
SVD (Sigular Value Decomposition) | |
System modeling languages | |
systems security | |
T | |
Team sports | |
Temporal Interval Query | |
Temporal Segment Networks | |
Text Recognition | |
time series | |
Time Series Data | |
Timed systems | |
topic modeling | |
Trend prediction | |
triplet loss | |
truck routing problem | |
TS | |
U | |
Unconstrained Vietnamese handwriting | |
unsupervised learning | |
User Authentication | |
V | |
Variational Bayesian Inference | |
Vietnamese language | |
Vietnamese sentiment classification | |
Visual Concept Extraction | |
Vocal Extraction | |
Voronoi diagram | |
W | |
Watermarking | |
Wearables | |
Web application security | |
Web attack detection | |
webshell detection | |
Website Defacement Attack | |
Website Defacement Monitoring and Detection | |
website monitoring | |
Wi-Fi | |
wireless sensor network | |
word embedding | |
X | |
Xgboost | |
Y | |
yara rules |