Computer Science
Adversarial Model
11%
Annotation
12%
Artificial Intelligence
20%
Attackers
21%
Authentication
33%
Classification Models
12%
Cloud Computing
16%
Communication Security
12%
Convolutional Neural Network
44%
Cryptographic Key
10%
Data Integrity
10%
Decision-Making
11%
Deep Convolutional Neural Networks
9%
Deep Learning Method
44%
Deep Learning Model
59%
Early Detection
22%
Experimental Result
16%
Extracted Feature
20%
Feature Extraction
40%
Feature Selection
34%
Gated Recurrent Unit
9%
Image Classification
12%
Image Representation
12%
Integrated Circuit
18%
Internet of Medical Things
16%
Internet of Things Device
10%
Internet-Of-Things
100%
Intrusion Detection
12%
Intrusion Detection System
11%
Learning Approach
17%
Learning System
98%
Long Short-Term Memory Network
21%
Machine Learning
99%
Medical Diagnosis
12%
Metaheuristics
9%
Multilayer Perceptron
14%
Multivariate Time Series
11%
Neural Network
33%
Optimization Algorithm
20%
Particle Swarm Optimization
19%
Performance Model
13%
Prediction Accuracy
11%
Recurrent Neural Network
15%
Resource Constraint
11%
Security Vulnerability
26%
Sentiment Analysis
12%
Time Series Data
11%
Training Model
16%
Transmission System
8%
Vision Transformer
16%
Engineering
Artificial Intelligence
6%
Artificial Neural Network
10%
Classification Accuracy
8%
Convolutional Neural Network
12%
Deep Learning Method
49%
Derivative Controller
8%
Early Detection
6%
Energy Market
8%
Exchanger
8%
Experimental Result
8%
Extracted Feature
16%
Feature Extraction
33%
Fluid Flow
5%
Fractional-Order
16%
Hydraulics
8%
Image Classification
12%
Image Processing
8%
Image Representation
12%
Internet-Of-Things
24%
Learning System
14%
Leukocyte
8%
Long Short-Term Memory
8%
Medical Image
8%
Metrics
14%
Nuclear Reactor
8%
Outlet Temperature
5%
Particle Swarm
8%
Particle Swarm Optimization
18%
Performance Measure ψ
6%
Power Grid
8%
Recurrent
5%
Recurrent Neural Network
5%
Selection Method
6%
Term Forecast
8%
Transfer Learning
11%