Computer Science
Attackers
5%
Attention (Machine Learning)
23%
Average Execution Time
7%
Classification Accuracy
5%
classification approach
5%
Clustering Method
17%
Comparison Study
23%
Convolution Layer
7%
Convolutional Neural Network
34%
Data Augmentation
7%
Decision Tree Classifier
5%
Decision-Making
28%
Deep Learning Method
100%
Deep Neural Network
19%
Denial-of-Service Attack
15%
DenseNet
26%
Diagnostic System
7%
Digital Evidence
5%
Digital Forensics
11%
Digital Investigation
5%
Early Detection
7%
Effective Approach
23%
Energy Efficient
23%
Evaluation Metric
7%
Experimental Result
13%
Feature Extraction
23%
Feature Selection
11%
Fold Cross Validation
5%
Fuzzy Set
23%
Human Activity Recognition
46%
Image Analysis
5%
Intrusion Detection
23%
Leaning Parameter
15%
Learning Approach
63%
Learning System
16%
Learning Technique
5%
Machine Learning
16%
Neural Network
21%
Parameter Value
5%
Real-Time Application
5%
Recognition Accuracy
8%
Recognition System
10%
Research Direction
5%
Searching Algorithm
5%
Transfer Learning
11%
Engineering
Applicability
11%
Computervision
5%
Convolutional Neural Network
11%
Core Switch
9%
Deep Learning Method
46%
Detection Performance
11%
Early Detection
11%
Experimental Result
7%
Image Analysis
5%
Learning Approach
57%
Learning System
25%
Machine Learning Method
11%
Magnification Factor
11%
Medical Image
23%
Mobile Phone
11%
Network Model
11%
Optical Burst Switching
23%
Phase Classification
9%
Root Mean Square Error
7%
Switching Network
23%
Test Image
11%