Computer Science
Adversarial Model
10%
Annotation
12%
Artificial Intelligence
20%
Attackers
21%
Authentication
32%
Classification Models
12%
Cloud Computing
16%
Communication Security
12%
Convolutional Neural Network
43%
Cryptographic Key
10%
Data Integrity
10%
Decision-Making
11%
Deep Convolutional Neural Networks
9%
Deep Learning Method
45%
Deep Learning Model
59%
Early Detection
22%
Experimental Result
16%
Extracted Feature
20%
Feature Extraction
42%
Feature Selection
35%
Gated Recurrent Unit
8%
Image Classification
16%
Image Representation
12%
Integrated Circuit
18%
Internet of Medical Things
16%
Internet of Things Device
10%
Internet-Of-Things
98%
Intrusion Detection
12%
Intrusion Detection System
10%
Learning Approach
17%
Learning System
98%
Long Short-Term Memory Network
20%
Machine Learning
100%
Medical Diagnosis
12%
Metaheuristics
11%
Multilayer Perceptron
13%
Multivariate Time Series
10%
Neural Network
32%
Optimization Algorithm
20%
Particle Swarm Optimization
19%
Performance Model
13%
Prediction Accuracy
11%
Recurrent Neural Network
15%
Resource Constraint
10%
Security Vulnerability
25%
Sentiment Analysis
12%
Time Series Data
10%
Training Model
16%
Transmission System
8%
Vision Transformer
20%
Engineering
Artificial Intelligence
6%
Artificial Neural Network
10%
Classification Accuracy
8%
Convolutional Neural Network
12%
Deep Learning Method
50%
Derivative Controller
8%
Early Detection
6%
Energy Market
8%
Exchanger
8%
Experimental Result
8%
Extracted Feature
16%
Feature Extraction
34%
Fluid Flow
5%
Fractional-Order
16%
Hydraulics
8%
Image Classification
16%
Image Processing
8%
Image Representation
12%
Internet-Of-Things
24%
Learning System
14%
Leukocyte
8%
Long Short-Term Memory
8%
Medical Image
12%
Metrics
13%
Nuclear Reactor
8%
Outlet Temperature
5%
Particle Swarm
8%
Particle Swarm Optimization
18%
Performance Measure ψ
6%
Power Grid
8%
Recurrent
5%
Recurrent Neural Network
5%
Selection Method
6%
Term Forecast
8%
Transfer Learning
10%