Computer Science
Internet-Of-Things
100%
Experimental Result
91%
authentication scheme
79%
Blockchain
77%
Authentication Protocol
54%
Authentication
51%
Random Access Memory
50%
Nonvolatile
48%
Filesystems
42%
Magnetic Recording
37%
Neural Network
37%
Speech Recognition
36%
Security Analysis
26%
Robust Speech Recognition
25%
Storage System
24%
Main Memory
24%
Password
24%
Deep Learning Method
24%
Wireless Sensor Network
23%
Mobile Device
23%
Speaker Recognition
23%
Convolutional Neural Network
21%
Error Detection
21%
Bidirectional Encoder Representations From Transformers
21%
Mutual Authentication
21%
Bidirectional Long Short-Term Memory Network
20%
Evaluation Result
20%
Sensor Networks
20%
Energy Consumption
20%
Information Retrieval
19%
Flash Memory
19%
Non-Volatile Memory
19%
Named Entity Recognition
19%
Performance Evaluation
19%
Key Exchange Protocol
19%
Systems Performance
18%
False Positive Rate
18%
System Security
18%
Cloud Computing
17%
Authenticated Key Exchange
17%
Smart Card
17%
Large Language Model
17%
Garbage Collection
16%
Language Modeling
16%
Annotation
16%
Priori Knowledge
16%
Language Learner
16%
Cryptanalysis
15%
Learning System
15%
Smart Contract
15%
Signature Scheme
14%
Attribute-Based Encryption
14%
Artificial Intelligence
14%
Speaker Identification
14%
Web Page
14%
Secure Deletion
14%
Data Preparation
13%
Task Description
13%
Android
13%
Security and Privacy
13%
remote user authentication
13%
Communication Overhead
13%
Desynchronization Attack
13%
Classification Error
13%
Computation Cost
13%
Classification Performance
13%
Radio Frequency Identification
12%
Authentication System
12%
Evaluation Metric
12%
Attackers
12%
Computer Hardware
12%
fault-tolerance
12%
Data Sharing
11%
anticollision
11%
Collective Intelligence
11%
Secure Communication
11%
Access Control
11%
Deep Neural Network
11%
System Efficiency
11%
Android Application
11%
User Experience
11%
Sensor Node
11%
Web Surfing
11%
Biometrics
10%
Confidence Measure
10%
Scientific Writing
10%
Sentiment Analysis
10%
Minimum Classification
10%
Energy Efficient
10%
Industrial Internet of Things
10%
Bluetooth Low Energy
10%
Speaker Verification
10%
Social Network
10%
Solid State Drive
10%
Encryption Scheme
10%
Machine Learning
10%
maximum-likelihood
10%
Performance Metric
10%
Content Analysis
10%
Interoperability
10%
Keyphrases
Internet of Things
71%
Authentication Scheme
71%
Nonvolatile RAM (NVRAM)
42%
Shared Task
38%
Taiwan
37%
Shingled Magnetic Recording
35%
NLP.
32%
RFID System
31%
Authentication Protocol
30%
RFID Authentication
29%
RFID Tags
28%
Handset
26%
F1 Score
26%
Blockchain
25%
End-to-end Speech Recognition
25%
Mandarin
25%
Main Memory
24%
Speech Recognition
24%
Taiwanese
23%
File System
22%
Storage Devices
22%
Transformer
22%
Learner Corpus
21%
Three-party
21%
NAND Flash
20%
Security Analysis
20%
Non-volatile Memory
20%
Wireless Sensor Networks
19%
Evaluation Results
19%
System Security
19%
Storage System
18%
Blockchain-based
18%
Wireless Charging Vehicle
18%
Robust Speaker Recognition
17%
Eigen
17%
Grammatical Error Detection
17%
Journaling File System
17%
Named Entity Recognition
17%
Smart Card
17%
Valence-arousal
17%
SemEval
17%
Access Performance
17%
Prosody Analysis
17%
Memory-based
16%
Deep Learning
16%
Authenticated Key Exchange Protocol
16%
Write Amplification
15%
Mobile Devices
15%
Blacklist
15%
Classification Performance
15%
Multilevel Cell
15%
Taiwan Mandarin
15%
Cryptanalysis
15%
Sequential Write
15%
Radio
15%
Formosa
14%
Performance Evaluation
14%
Neural Network
14%
Language Model
14%
Mismatch Compensation
14%
Skyrmion Memory
14%
Secure Deletion
14%
Mandarin Speech Recognition
14%
Tag Identification Protocol
14%
Sensor Networks
14%
Brain Waves
14%
Chinese as a Foreign Language
14%
Internet of Things Devices
13%
Error Rate
13%
Flash Memory Devices
13%
Remote User Authentication
13%
Conditional Random Fields
13%
Defect Classification
13%
Model Design
13%
Garbage Collection
13%
Desynchronization Attack
13%
Energy Consumption
13%
Smart Objects
13%
Cloud Computing
12%
Certificateless Signature Scheme
12%
Speech Corpus
12%
Security Threats
12%
Automatic Speech Recognition
12%
Computational Efficiency
12%
E-health System
12%
Security Privacy
12%
Deep Neural Network
12%
RoBERTa
12%
System Performance
12%
Grammatical Errors
11%
Grammatical Error Diagnosis
11%
Chinese Healthcare
11%
System Efficiency
11%
Wafer
11%
Health Systems
11%
Ultra-lightweight
11%
Slovak
11%
Mutual Authentication Scheme
11%
Android Application
11%
Sensor Node
11%