TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
3 | |
3D reconstruction | |
A | |
Abnormal Behavior | |
Abstract syntax tree | |
Abstractive summarization | |
Access control | |
Acoustic ranging | |
active motion | |
Adaptive | |
Adaptive control | |
Adaptive factor | |
Adversarial example | |
Aerial Computing | |
AI | |
ALGORITHMS | |
Align instruction | |
Amnesia | |
Android malware detection | |
Application data unit | |
Application layer feature engineering | |
Applied Cryptography | |
approximation algorithm | |
ARM Cortex-M3 | |
Atrous convolution, | |
attack path discovery | |
Attention mechanism | |
Auction | |
Authentication session key negotiation | |
AutoML | |
Autonomous vehicle | |
B | |
background adaptive | |
backscatter communication | |
Backward induction | |
Bandwidth Allocation | |
bandwidth limitation | |
Battery-free | |
beacon | |
Beamforming | |
Belief propagation | |
Bi-graph | |
Bi-LSTM | |
Bidirectional self-attention mechanism | |
Binary Diffing | |
Bit vector | |
Blockchain | |
Bloom Filter | |
Body sensor network Sensor fusion | |
BPNN | |
Broadcast | |
Bundle Recommendation | |
C | |
CA-free | |
Cache nodes | |
Certificateless | |
Channel Attention | |
Channel State Information | |
Chinese commercial cryptography | |
Chinese news headlines | |
Cloud | |
Cluster analysis | |
Cluster-head Election Indicator | |
Clustering | |
Clustering Routing Protocol | |
CNN | |
coal mine rescue | |
Code clone detection | |
Code-shifted differential chaos shift keying (CS-DCSK) | |
collaborative beamforming | |
collaborative computing | |
Collaborative computing offloading | |
Collaborative filtering | |
Communication Efficiency | |
Communication-Efficient | |
Competition | |
Computation Offloading | |
computer vision | |
Consensus algorithm | |
Consensus mechanism | |
Consortium blockchain | |
Constant ciphertext length | |
Contact-free material recognition | |
Content adaptive recurrent unit | |
Content caching | |
Continuous wavelet transform | |
Contrastive Learning | |
convolutional neural network | |
Convolutions | |
CP-HPA | |
Cramer-Rao lower bound | |
Cross-Domain sentiment classification | |
Cross-layer | |
Crowd Sensing | |
Crowdsensing systems | |
Cubature Kalman filter | |
Cyber-physical systems | |
D | |
Dangerous Driving Behavior Detection | |
Data analysis | |
Data authentication | |
Data Cleaning | |
data collection | |
Data Extension | |
Data loss minimization | |
Data poisoning | |
Data sharing | |
data synthesis and release | |
Dataset | |
DDoS | |
Deep Convolutional Neural Network | |
Deep learning | |
Deep reinforcement learning | |
Defense resource allocation | |
Delay Detection Interval | |
Departure time prediction | |
Deployment | |
Depth Estimation | |
Differential privacy | |
Digital Signature | |
direct position determination | |
Direct trust | |
Disparity Warping | |
Disprover | |
distress gesture recognition | |
Distributed incentive mechanism | |
distributed simulation | |
Domain Adaptation | |
Driver distraction recognition | |
Dropout | |
Dual discriminator | |
Dynamic analysis | |
Dynamic Grouping | |
Dynamic service placement | |
E | |
E-voting | |
Edge caching | |
Edge collaborative | |
Edge computing | |
Edge Intelligence | |
Edge Server | |
Edge server deployment | |
Edge service | |
Edge-assistant vehicular network (EAVN) | |
Edge-cloud collaboration | |
electric taxi | |
Elliptic curve code | |
Encrypted traffic classification | |
Energy efficiency | |
Energy optimization | |
Entity relationships prediction | |
Ethereum | |
Evolutionary algorithm | |
Evolutionary Game | |
evolving mobility model | |
Extreme Learning Machine | |
F | |
Fall detection | |
False data injection attacks | |
Feature engineering | |
Feature extraction | |
Feature fusion | |
Feature representation | |
Federated Edge Learning | |
Federated Learning | |
Federated reinforcement learning | |
ferry node | |
Few-shot Learning | |
Filting | |
Fine-grained Access Control | |
Firmware vulnerability | |
Floor plan construction | |
flying tour scheduling | |
format-checkable | |
Forward Security | |
FPGA | |
FPGA-based pipeline | |
FPN | |
Freshness | |
FTM | |
Fuzzy Extractors | |
Fuzzy theory | |
G | |
Game theory | |
Gathering Areas | |
Generalizability | |
Generating Labels | |
Genetic algorithm | |
Gesture Recognition | |
Global Integration Network | |
Gradient attack | |
Gradient Coding | |
Gradient Quantization | |
Graph attention network | |
Graph classification | |
Graph Convolution | |
Graph Convolution Network | |
Graph Convolutional Network | |
Graph Convolutional Neural Networks | |
Graph enhancement | |
Graph neural network | |
Graph Neural Networks | |
greatest common divisor | |
GSO system | |
H | |
Handwriting recognition | |
Hashing | |
Head orientation | |
Heterogeneous Edge Networks | |
Heterogeneous graph neural network | |
Heterogeneous information fusion | |
Heterogeneous information network | |
Heterogeneous Network | |
Heterogeneous neural network | |
Hierarchical Encryption | |
Hierarchical server | |
High Altitude Unmanned Aerial Vehicles | |
high efficient interference calculation | |
High-definition map | |
high-dimensional data | |
Homomorphic encryption | |
HTTPS | |
human mobility | |
Human-Centered | |
Human-centered Computing | |
Hybrid beamforming | |
Hyperledger Fabric | |
I | |
IB-PRE | |
ICS devices | |
Identity Linking Attack | |
IIoT | |
Image caption generation | |
image processing | |
Imperfect channel state information | |
Important neuron | |
Incentive Mechanism | |
Indirect trust | |
Industrial Internet of Things | |
Industrial wireless sensor network | |
Inertial sensing | |
Information-centric satellite networks | |
Insider Threat Detection | |
Instant Delivery | |
Intelligent Transportation Systems | |
Intelligent wireless sensing | |
Interference Analysis | |
interference mitigation | |
Internet of electric vehicles (IoEVs) | |
Internet of Things | |
Internet of vehicle | |
Internet of vehicles | |
Intrusion detection | |
Invisible backdoor attack | |
IoT | |
IoT devices | |
IP geolocation | |
iterative decoding | |
K | |
Kalman Filter | |
Key | |
Keynote | |
Keynote1 | |
Keynote2 | |
Keynote3 | |
Knowledge graph embedding | |
KSP | |
L | |
Label consistent | |
Landmark mining | |
Lane detection | |
large scale NGSO system | |
Large-scale database | |
Lattice | |
Layer-based | |
LDPC code | |
Light Field | |
Light Gradient Boosting Machine | |
Lightweight cryptography | |
Line Crossing Detection | |
Lite computation | |
LLN | |
local differential privacy | |
local region | |
local rotation transformation | |
Location Privacy | |
Log Anomaly Detection | |
Long-range dependency | |
Long-term utility | |
LoRa | |
Loss assessment | |
low communication costs | |
low power consumption | |
Low-poisoning rate | |
Lower bounds | |
LSTM | |
LTN | |
LWE | |
LWE problem | |
M | |
Machine learning | |
Malconv | |
Malicious domain detection | |
Malware detection | |
Mapping encoding | |
Maritime Ad Hoc network | |
Maritime environment monitoring | |
Maritime Internet of Things | |
Massive multiple-input multiple-output (MIMO) | |
Massive Satellite Constellations | |
maximum likelihood estimation | |
Memory compression | |
Message Confidentiality | |
Meta Learning | |
Millimeter wave radar | |
millimeter-wave | |
Misbehavior detection | |
Mixed-criticality traffic scheduling | |
Mobile | |
Mobile charging | |
Mobile charging vehicles (MCVs) | |
Mobile cloud gaming | |
Mobile clouds retrieval | |
Mobile Computing | |
Mobile Crowd Sensing | |
Mobile crowdsensing | |
Mobile edge computing | |
mobile edge computing (MEC) | |
Mobile Localization | |
Mobile-Edge Computing | |
Mode Switching | |
Model Partition | |
Model quality | |
Model Splitting | |
Monte Carlo | |
Motion behavior decision | |
Motion Recognition | |
Multi-agent | |
Multi-agent Deep Deterministic Policy Gradient | |
Multi-agent deep Q-learning network | |
Multi-agent multi-armed bandit | |
Multi-armed bandit | |
Multi-armed bandits | |
Multi-channel | |
multi-dimensional query | |
Multi-head attention | |
Multi-label | |
multi-objective optimization | |
Multi-publisher/Multi-worker | |
Multi-resource allocation | |
Multi-scale fusion, | |
Multi-sided Fairness | |
Multi-stage dependencies | |
Multi-task Learning | |
Multimodal learning | |
Multimodal Sensing | |
multipath | |
Multiple Access Control Protocol | |
Mutual information maximization | |
N | |
NAS | |
NER | |
Network | |
Network cheat | |
Network clustering | |
Network Intrusion Detection | |
Network measurement | |
Network telemetry | |
Neural Network Compression | |
NLOS | |
Node localization | |
Non-IID | |
NSGA-II algorithm | |
O | |
Oblivious transfer | |
Ocean current direction | |
Offloading | |
Online auction strategy | |
Online task selection | |
Operator Batching | |
Optical Tag | |
Optimization | |
Optimization Modulo Theories | |
Order Dispatch | |
orthogonal frequency division multiplexing (OFDM) | |
P | |
Packet Caching | |
Packet classification | |
Paillier encryption | |
Paillier homomorphic encryption | |
parameter generator network | |
Parked vehicular network | |
Passive Sensing | |
path planning | |
Pearson Correlation | |
Percolation Idea | |
Performance evaluation | |
Personalized Federated Learning | |
Phishing detection | |
PHY | |
physical interaction control | |
Physical layer security | |
Physically Unclonable Functions | |
Pick-up point recommendation | |
PIFuHD | |
Polar code | |
Popularity | |
Position Prediction | |
Power-aware | |
Pre-trained language model | |
Pre-trained model | |
Prediction | |
Privacy | |
Privacy Preserving | |
Privacy protection | |
Privacy-preserving | |
private set intersection | |
Proof-of-WeightedPlanned-Behavior | |
Prototype System | |
Proximal policy optimization | |
PSO | |
Q | |
QoE | |
QoE impairment | |
QoS | |
Quantitative Analysis | |
quantum computation | |
Quantum Cryptography | |
Quantum Secret Sharing | |
R | |
Radio Frequency Identification | |
Rate splitting multiple access | |
rateless code | |
Real Deployment Test | |
Real-time Semantic Segmentation | |
Real-time Signature | |
Recommendation System | |
Reconfigurable intelligent surface | |
Redundant filtering | |
Reinforcement Learning | |
Reliability | |
Reliability-Aware | |
Reliable routing | |
Replicator Dynamics | |
Request dispatch | |
ResNet | |
Resource allocation | |
Resource management | |
resource optimization | |
RFID | |
RFID Security | |
Ride-hailing system | |
Ring signcryption | |
Robust | |
Robust filter | |
Rounding technique | |
Route Convergence | |
Routing | |
Routing planning | |
Routing protocol | |
Runtime-reconfigurability | |
S | |
Sample Balanced | |
satellite position probability | |
SCA | |
Scenario marking | |
Scheduling | |
SCL algorithm | |
Secret Sharing | |
Secure Aggregation | |
Security | |
Security and Privacy | |
Self-attention | |
Self-recommendation | |
Self-supervised Learning | |
Sentence-Bert | |
Seq2Seq | |
Service customized networks | |
Service deployment | |
Service placement | |
Shamir threshold scheme | |
Side-channel attacks | |
Simulation Test | |
Skeletal Features | |
Smart contract | |
Smart grid | |
Smart grids | |
Smart Healthcare Systems | |
smart home | |
Smartphone | |
Social Interactions | |
Social Network | |
Software security entity | |
Sources Identification | |
Spatial Attention | |
Spatial crowdsourcing | |
Spatio-temporal features | |
spectral clustering | |
Spectral efficiency | |
Spreading influence | |
SRv6 | |
Stackelberg game | |
Static analysis | |
Stochastic geometry | |
subcarrier index modulation (SIM) | |
Superframe structure | |
SYSTEMS | |
T | |
Target Detection | |
target selection | |
Task allocation | |
Task assignment | |
task dependency | |
Task matching | |
Task offloading | |
Task scheduling | |
Taxi Order Cancellation | |
tba | |
tba1 | |
tba2 | |
tba3 | |
TCP-BBR | |
Temporal Convolution | |
Temporal Log Vectors | |
Thompson sampling | |
Thyroid Ultrasound Images | |
TI-LFA | |
Time sensitive network | |
Time Slot | |
Time utility function | |
Time-Sensitive Networking | |
Topology reconstruction | |
Traceable ring signature | |
Track Fusion | |
traffic analysis | |
Traffic classification | |
Traffic incident duration | |
Traffic Monitoring Services | |
Traffic Prediction | |
Training efficiency | |
Trajectory Heat map | |
Trajectory optimization | |
Trajectory prediction | |
Trajectory-based | |
Transaction latency | |
Transfer Learning | |
Transformer | |
Transformer, | |
Travel pattern mining | |
Trust evaluation system | |
Trust management | |
Trust metrics | |
Truth discovery | |
Type identification | |
U | |
UAV | |
UAV Ad Hoc Networks | |
UAV communications | |
UAV networks | |
UC-security | |
Ultrasonic Sensing | |
Ultrasonic signal | |
Unattended Wireless Sensor Networks | |
Underground self-positioning | |
Underwater acoustic (UWA) communication | |
Underwater Acoustic Sensor Networks | |
Underwater sensor networks | |
Unitary Operation | |
Unmanned aerial vehicle | |
Unmanned Aerial Vehicles | |
unsupervised learning | |
Urban Travel | |
User mobility | |
USV | |
V | |
VAE | |
VANET | |
VANETs | |
Vehicle clustering | |
Vehicle edge computing | |
vehicle re-identification | |
Vehicular edge computing | |
Vehicular networks | |
Vertical federated learning | |
Vision Transformer | |
Vulnerability analysis | |
Vulnerability detection | |
Vulnerability Identification | |
W | |
Weak Label Estimation | |
Wearable devices | |
WiFi backscatter | |
WiFi Fingerprint-based Localization | |
WIRELESS | |
wireless localization | |
wireless mobile ad hoc network | |
Wireless sensing | |
Wireless sensor network | |
Wireless Sensor Networks | |
Worker Selection | |
WSNs | |
Y | |
Yao's garbled circuits | |
Z | |
Zero-loss |