Computer Science
ad-hoc network
26%
Anonymity
8%
Attribute-Based Encryption
23%
Authentication
13%
bilinear map
13%
Blockchain
9%
Cloud Computing
8%
Clustering Scheme
8%
Cognitive Radio Network
17%
Communication Network
8%
Communication Overhead
10%
Data Center
8%
Double Auction
8%
Energy Efficiency
10%
Energy Saving
8%
Fading Channel
8%
High Throughput
9%
Influencing Factor
8%
Information Technology
8%
IT Infrastructure
8%
Multi-Access Edge Computing
8%
Network Routing
12%
Noma
30%
Password
8%
Performance Analysis
8%
Performance Evaluation
8%
Performance Gain
8%
Physical Layer Security
52%
Privacy Preserving
10%
Radio Frequency Signal
22%
Radiology Information System
13%
Reflecting Surface
8%
Routing Protocol
23%
routing scheme
8%
Searchable Encryption Scheme
8%
Secrecy Capacity
28%
Secrecy Outage Probability
26%
Secret Sharing
8%
Security Analysis
9%
Security Concern
8%
Service Model
8%
Signal-to-Noise plus Interference Ratio
9%
Transportation Network
8%
Turnover Intention
8%
Unmanned Aerial Vehicle
21%
Whale Optimization Algorithm
8%
Wireless Communication
61%
wireless communication system
22%
Wireless Network
16%
Wormhole Attack
8%
Engineering
Antenna
17%
Cluster Head
6%
Cognitive Radio Network
20%
Communication System
12%
Data Rate
7%
Energy Efficiency
5%
Energy Harvesting
100%
Ergodic Capacity
8%
Frequency Signal
5%
Gaussians
10%
Levenberg-Marquardt Algorithm
8%
Multipath
8%
Multiple-Input Multiple-Output
6%
Nodes
27%
Noma
21%
Non-Linear Dynamics
8%
Orthogonal Frequency Division Multiplexing
5%
Outage Probability
17%
Physical Layer Security
17%
Primary User
10%
Probability of Detection
6%
Radio Frequency
12%
Rayleigh Channel
13%
Signal-to-Interference-Plus-Noise Ratio
6%
Solar Energy
10%
Unmanned Aerial Vehicle
12%
Wireless Communication
30%