Keyphrases
Sensor Networks
96%
Adversarial Examples
65%
Differential Privacy
64%
Differentially Private
62%
Synthetic Data
54%
Wireless Sensor Networks
54%
Cloud Storage
44%
Data Deduplication
42%
Privacy Concerns
40%
Sensor Node
38%
Data Privacy
36%
Internet of Things
33%
Privacy-preserving
32%
Node Replication Attack
31%
Resilient
31%
Deduplication
30%
Deep Neural Network
29%
Local Differential Privacy
27%
Client-side
26%
Compressed Sensing
26%
Neural Network
25%
Key Establishment Scheme
24%
Data Utility
23%
Query Result
23%
Mobile Sensor Networks
23%
Posters
23%
Pair-wise Key Establishment
23%
Crowdsourced Data
23%
Cross-user
23%
Autonomous Vehicles
23%
Side Channel
23%
Storage Node
21%
Clone Detection
21%
Generative Adversarial Networks
21%
Attacker
20%
Communication Cost
20%
En-route Filtering
19%
Private Data
19%
Adversary
19%
Adversarial Subspace
18%
Privacy Budget
18%
Resilience
18%
Top-k Query
18%
Sensor Readings
18%
Mutual Information
18%
Adversarial Perturbation
17%
Non-interactive
17%
Randomized Response
17%
Private Data Release
16%
Detection Method
16%
Computer Science
Differential Privacy
100%
Sensor Networks
97%
Adversarial Example
71%
Wireless Sensor Network
61%
Privacy Preserving
58%
Internet-Of-Things
51%
Sensor Node
45%
Synthetic Data
45%
Cloud Storage
43%
Data Deduplication
39%
deduplication
39%
Data Privacy
38%
Deep Neural Network
33%
Synthetic Datasets
31%
Sensitive Informations
30%
Key Establishment
28%
Neural Network
25%
Learning System
25%
Generative Adversarial Networks
24%
Experimental Result
23%
mobile sensor network
23%
Data Distribution
23%
Autonomous Vehicles
23%
Side Channel
23%
Machine Learning
23%
Adversarial Machine Learning
22%
Deep Learning Method
21%
Clone Detection
21%
Privacy Concern
21%
Privacy Leakage
20%
Data Sharing
19%
Attackers
18%
Sensor Reading
18%
Communication Cost
18%
Mutual Information
18%
Detection Method
17%
Collected Data
15%
Message Authentication
15%
Data Streaming
15%
Data Synthesis
15%
Attack Probability
15%
Anonymization
15%
Compressed Sensing
15%
Blockchain
15%
Flooding Attack
15%
Benchmarking
15%
Data Augmentation
15%
Privacy Protection
15%
Computational Simulation
15%
Optimization Problem
14%