TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| 3 | |
| 3D reconstruction | |
| A | |
| Abnormal Behavior | |
| Abstract syntax tree | |
| Abstractive summarization | |
| Access control | |
| Acoustic ranging | |
| active motion | |
| Adaptive | |
| Adaptive control | |
| Adaptive factor | |
| Adversarial example | |
| Aerial Computing | |
| AI | |
| ALGORITHMS | |
| Align instruction | |
| Amnesia | |
| Android malware detection | |
| Application data unit | |
| Application layer feature engineering | |
| Applied Cryptography | |
| approximation algorithm | |
| ARM Cortex-M3 | |
| Atrous convolution, | |
| attack path discovery | |
| Attention mechanism | |
| Auction | |
| Authentication session key negotiation | |
| AutoML | |
| Autonomous vehicle | |
| B | |
| background adaptive | |
| backscatter communication | |
| Backward induction | |
| Bandwidth Allocation | |
| bandwidth limitation | |
| Battery-free | |
| beacon | |
| Beamforming | |
| Belief propagation | |
| Bi-graph | |
| Bi-LSTM | |
| Bidirectional self-attention mechanism | |
| Binary Diffing | |
| Bit vector | |
| Blockchain | |
| Bloom Filter | |
| Body sensor network Sensor fusion | |
| BPNN | |
| Broadcast | |
| Bundle Recommendation | |
| C | |
| CA-free | |
| Cache nodes | |
| Certificateless | |
| Channel Attention | |
| Channel State Information | |
| Chinese commercial cryptography | |
| Chinese news headlines | |
| Cloud | |
| Cluster analysis | |
| Cluster-head Election Indicator | |
| Clustering | |
| Clustering Routing Protocol | |
| CNN | |
| coal mine rescue | |
| Code clone detection | |
| Code-shifted differential chaos shift keying (CS-DCSK) | |
| collaborative beamforming | |
| collaborative computing | |
| Collaborative computing offloading | |
| Collaborative filtering | |
| Communication Efficiency | |
| Communication-Efficient | |
| Competition | |
| Computation Offloading | |
| computer vision | |
| Consensus algorithm | |
| Consensus mechanism | |
| Consortium blockchain | |
| Constant ciphertext length | |
| Contact-free material recognition | |
| Content adaptive recurrent unit | |
| Content caching | |
| Continuous wavelet transform | |
| Contrastive Learning | |
| convolutional neural network | |
| Convolutions | |
| CP-HPA | |
| Cramer-Rao lower bound | |
| Cross-Domain sentiment classification | |
| Cross-layer | |
| Crowd Sensing | |
| Crowdsensing systems | |
| Cubature Kalman filter | |
| Cyber-physical systems | |
| D | |
| Dangerous Driving Behavior Detection | |
| Data analysis | |
| Data authentication | |
| Data Cleaning | |
| data collection | |
| Data Extension | |
| Data loss minimization | |
| Data poisoning | |
| Data sharing | |
| data synthesis and release | |
| Dataset | |
| DDoS | |
| Deep Convolutional Neural Network | |
| Deep learning | |
| Deep reinforcement learning | |
| Defense resource allocation | |
| Delay Detection Interval | |
| Departure time prediction | |
| Deployment | |
| Depth Estimation | |
| Differential privacy | |
| Digital Signature | |
| direct position determination | |
| Direct trust | |
| Disparity Warping | |
| Disprover | |
| distress gesture recognition | |
| Distributed incentive mechanism | |
| distributed simulation | |
| Domain Adaptation | |
| Driver distraction recognition | |
| Dropout | |
| Dual discriminator | |
| Dynamic analysis | |
| Dynamic Grouping | |
| Dynamic service placement | |
| E | |
| E-voting | |
| Edge caching | |
| Edge collaborative | |
| Edge computing | |
| Edge Intelligence | |
| Edge Server | |
| Edge server deployment | |
| Edge service | |
| Edge-assistant vehicular network (EAVN) | |
| Edge-cloud collaboration | |
| electric taxi | |
| Elliptic curve code | |
| Encrypted traffic classification | |
| Energy efficiency | |
| Energy optimization | |
| Entity relationships prediction | |
| Ethereum | |
| Evolutionary algorithm | |
| Evolutionary Game | |
| evolving mobility model | |
| Extreme Learning Machine | |
| F | |
| Fall detection | |
| False data injection attacks | |
| Feature engineering | |
| Feature extraction | |
| Feature fusion | |
| Feature representation | |
| Federated Edge Learning | |
| Federated Learning | |
| Federated reinforcement learning | |
| ferry node | |
| Few-shot Learning | |
| Filting | |
| Fine-grained Access Control | |
| Firmware vulnerability | |
| Floor plan construction | |
| flying tour scheduling | |
| format-checkable | |
| Forward Security | |
| FPGA | |
| FPGA-based pipeline | |
| FPN | |
| Freshness | |
| FTM | |
| Fuzzy Extractors | |
| Fuzzy theory | |
| G | |
| Game theory | |
| Gathering Areas | |
| Generalizability | |
| Generating Labels | |
| Genetic algorithm | |
| Gesture Recognition | |
| Global Integration Network | |
| Gradient attack | |
| Gradient Coding | |
| Gradient Quantization | |
| Graph attention network | |
| Graph classification | |
| Graph Convolution | |
| Graph Convolution Network | |
| Graph Convolutional Network | |
| Graph Convolutional Neural Networks | |
| Graph enhancement | |
| Graph neural network | |
| Graph Neural Networks | |
| greatest common divisor | |
| GSO system | |
| H | |
| Handwriting recognition | |
| Hashing | |
| Head orientation | |
| Heterogeneous Edge Networks | |
| Heterogeneous graph neural network | |
| Heterogeneous information fusion | |
| Heterogeneous information network | |
| Heterogeneous Network | |
| Heterogeneous neural network | |
| Hierarchical Encryption | |
| Hierarchical server | |
| High Altitude Unmanned Aerial Vehicles | |
| high efficient interference calculation | |
| High-definition map | |
| high-dimensional data | |
| Homomorphic encryption | |
| HTTPS | |
| human mobility | |
| Human-Centered | |
| Human-centered Computing | |
| Hybrid beamforming | |
| Hyperledger Fabric | |
| I | |
| IB-PRE | |
| ICS devices | |
| Identity Linking Attack | |
| IIoT | |
| Image caption generation | |
| image processing | |
| Imperfect channel state information | |
| Important neuron | |
| Incentive Mechanism | |
| Indirect trust | |
| Industrial Internet of Things | |
| Industrial wireless sensor network | |
| Inertial sensing | |
| Information-centric satellite networks | |
| Insider Threat Detection | |
| Instant Delivery | |
| Intelligent Transportation Systems | |
| Intelligent wireless sensing | |
| Interference Analysis | |
| interference mitigation | |
| Internet of electric vehicles (IoEVs) | |
| Internet of Things | |
| Internet of vehicle | |
| Internet of vehicles | |
| Intrusion detection | |
| Invisible backdoor attack | |
| IoT | |
| IoT devices | |
| IP geolocation | |
| iterative decoding | |
| K | |
| Kalman Filter | |
| Key | |
| Keynote | |
| Keynote1 | |
| Keynote2 | |
| Keynote3 | |
| Knowledge graph embedding | |
| KSP | |
| L | |
| Label consistent | |
| Landmark mining | |
| Lane detection | |
| large scale NGSO system | |
| Large-scale database | |
| Lattice | |
| Layer-based | |
| LDPC code | |
| Light Field | |
| Light Gradient Boosting Machine | |
| Lightweight cryptography | |
| Line Crossing Detection | |
| Lite computation | |
| LLN | |
| local differential privacy | |
| local region | |
| local rotation transformation | |
| Location Privacy | |
| Log Anomaly Detection | |
| Long-range dependency | |
| Long-term utility | |
| LoRa | |
| Loss assessment | |
| low communication costs | |
| low power consumption | |
| Low-poisoning rate | |
| Lower bounds | |
| LSTM | |
| LTN | |
| LWE | |
| LWE problem | |
| M | |
| Machine learning | |
| Malconv | |
| Malicious domain detection | |
| Malware detection | |
| Mapping encoding | |
| Maritime Ad Hoc network | |
| Maritime environment monitoring | |
| Maritime Internet of Things | |
| Massive multiple-input multiple-output (MIMO) | |
| Massive Satellite Constellations | |
| maximum likelihood estimation | |
| Memory compression | |
| Message Confidentiality | |
| Meta Learning | |
| Millimeter wave radar | |
| millimeter-wave | |
| Misbehavior detection | |
| Mixed-criticality traffic scheduling | |
| Mobile | |
| Mobile charging | |
| Mobile charging vehicles (MCVs) | |
| Mobile cloud gaming | |
| Mobile clouds retrieval | |
| Mobile Computing | |
| Mobile Crowd Sensing | |
| Mobile crowdsensing | |
| Mobile edge computing | |
| mobile edge computing (MEC) | |
| Mobile Localization | |
| Mobile-Edge Computing | |
| Mode Switching | |
| Model Partition | |
| Model quality | |
| Model Splitting | |
| Monte Carlo | |
| Motion behavior decision | |
| Motion Recognition | |
| Multi-agent | |
| Multi-agent Deep Deterministic Policy Gradient | |
| Multi-agent deep Q-learning network | |
| Multi-agent multi-armed bandit | |
| Multi-armed bandit | |
| Multi-armed bandits | |
| Multi-channel | |
| multi-dimensional query | |
| Multi-head attention | |
| Multi-label | |
| multi-objective optimization | |
| Multi-publisher/Multi-worker | |
| Multi-resource allocation | |
| Multi-scale fusion, | |
| Multi-sided Fairness | |
| Multi-stage dependencies | |
| Multi-task Learning | |
| Multimodal learning | |
| Multimodal Sensing | |
| multipath | |
| Multiple Access Control Protocol | |
| Mutual information maximization | |
| N | |
| NAS | |
| NER | |
| Network | |
| Network cheat | |
| Network clustering | |
| Network Intrusion Detection | |
| Network measurement | |
| Network telemetry | |
| Neural Network Compression | |
| NLOS | |
| Node localization | |
| Non-IID | |
| NSGA-II algorithm | |
| O | |
| Oblivious transfer | |
| Ocean current direction | |
| Offloading | |
| Online auction strategy | |
| Online task selection | |
| Operator Batching | |
| Optical Tag | |
| Optimization | |
| Optimization Modulo Theories | |
| Order Dispatch | |
| orthogonal frequency division multiplexing (OFDM) | |
| P | |
| Packet Caching | |
| Packet classification | |
| Paillier encryption | |
| Paillier homomorphic encryption | |
| parameter generator network | |
| Parked vehicular network | |
| Passive Sensing | |
| path planning | |
| Pearson Correlation | |
| Percolation Idea | |
| Performance evaluation | |
| Personalized Federated Learning | |
| Phishing detection | |
| PHY | |
| physical interaction control | |
| Physical layer security | |
| Physically Unclonable Functions | |
| Pick-up point recommendation | |
| PIFuHD | |
| Polar code | |
| Popularity | |
| Position Prediction | |
| Power-aware | |
| Pre-trained language model | |
| Pre-trained model | |
| Prediction | |
| Privacy | |
| Privacy Preserving | |
| Privacy protection | |
| Privacy-preserving | |
| private set intersection | |
| Proof-of-WeightedPlanned-Behavior | |
| Prototype System | |
| Proximal policy optimization | |
| PSO | |
| Q | |
| QoE | |
| QoE impairment | |
| QoS | |
| Quantitative Analysis | |
| quantum computation | |
| Quantum Cryptography | |
| Quantum Secret Sharing | |
| R | |
| Radio Frequency Identification | |
| Rate splitting multiple access | |
| rateless code | |
| Real Deployment Test | |
| Real-time Semantic Segmentation | |
| Real-time Signature | |
| Recommendation System | |
| Reconfigurable intelligent surface | |
| Redundant filtering | |
| Reinforcement Learning | |
| Reliability | |
| Reliability-Aware | |
| Reliable routing | |
| Replicator Dynamics | |
| Request dispatch | |
| ResNet | |
| Resource allocation | |
| Resource management | |
| resource optimization | |
| RFID | |
| RFID Security | |
| Ride-hailing system | |
| Ring signcryption | |
| Robust | |
| Robust filter | |
| Rounding technique | |
| Route Convergence | |
| Routing | |
| Routing planning | |
| Routing protocol | |
| Runtime-reconfigurability | |
| S | |
| Sample Balanced | |
| satellite position probability | |
| SCA | |
| Scenario marking | |
| Scheduling | |
| SCL algorithm | |
| Secret Sharing | |
| Secure Aggregation | |
| Security | |
| Security and Privacy | |
| Self-attention | |
| Self-recommendation | |
| Self-supervised Learning | |
| Sentence-Bert | |
| Seq2Seq | |
| Service customized networks | |
| Service deployment | |
| Service placement | |
| Shamir threshold scheme | |
| Side-channel attacks | |
| Simulation Test | |
| Skeletal Features | |
| Smart contract | |
| Smart grid | |
| Smart grids | |
| Smart Healthcare Systems | |
| smart home | |
| Smartphone | |
| Social Interactions | |
| Social Network | |
| Software security entity | |
| Sources Identification | |
| Spatial Attention | |
| Spatial crowdsourcing | |
| Spatio-temporal features | |
| spectral clustering | |
| Spectral efficiency | |
| Spreading influence | |
| SRv6 | |
| Stackelberg game | |
| Static analysis | |
| Stochastic geometry | |
| subcarrier index modulation (SIM) | |
| Superframe structure | |
| SYSTEMS | |
| T | |
| Target Detection | |
| target selection | |
| Task allocation | |
| Task assignment | |
| task dependency | |
| Task matching | |
| Task offloading | |
| Task scheduling | |
| Taxi Order Cancellation | |
| tba | |
| tba1 | |
| tba2 | |
| tba3 | |
| TCP-BBR | |
| Temporal Convolution | |
| Temporal Log Vectors | |
| Thompson sampling | |
| Thyroid Ultrasound Images | |
| TI-LFA | |
| Time sensitive network | |
| Time Slot | |
| Time utility function | |
| Time-Sensitive Networking | |
| Topology reconstruction | |
| Traceable ring signature | |
| Track Fusion | |
| traffic analysis | |
| Traffic classification | |
| Traffic incident duration | |
| Traffic Monitoring Services | |
| Traffic Prediction | |
| Training efficiency | |
| Trajectory Heat map | |
| Trajectory optimization | |
| Trajectory prediction | |
| Trajectory-based | |
| Transaction latency | |
| Transfer Learning | |
| Transformer | |
| Transformer, | |
| Travel pattern mining | |
| Trust evaluation system | |
| Trust management | |
| Trust metrics | |
| Truth discovery | |
| Type identification | |
| U | |
| UAV | |
| UAV Ad Hoc Networks | |
| UAV communications | |
| UAV networks | |
| UC-security | |
| Ultrasonic Sensing | |
| Ultrasonic signal | |
| Unattended Wireless Sensor Networks | |
| Underground self-positioning | |
| Underwater acoustic (UWA) communication | |
| Underwater Acoustic Sensor Networks | |
| Underwater sensor networks | |
| Unitary Operation | |
| Unmanned aerial vehicle | |
| Unmanned Aerial Vehicles | |
| unsupervised learning | |
| Urban Travel | |
| User mobility | |
| USV | |
| V | |
| VAE | |
| VANET | |
| VANETs | |
| Vehicle clustering | |
| Vehicle edge computing | |
| vehicle re-identification | |
| Vehicular edge computing | |
| Vehicular networks | |
| Vertical federated learning | |
| Vision Transformer | |
| Vulnerability analysis | |
| Vulnerability detection | |
| Vulnerability Identification | |
| W | |
| Weak Label Estimation | |
| Wearable devices | |
| WiFi backscatter | |
| WiFi Fingerprint-based Localization | |
| WIRELESS | |
| wireless localization | |
| wireless mobile ad hoc network | |
| Wireless sensing | |
| Wireless sensor network | |
| Wireless Sensor Networks | |
| Worker Selection | |
| WSNs | |
| Y | |
| Yao's garbled circuits | |
| Z | |
| Zero-loss | |