Computer Science
3D Object Detection
25%
Access Control
25%
Access Control Policy
12%
Access Control System
50%
Attack Technique
12%
Attribute-Based Access Control
50%
Attribute-Based Encryption
12%
Authentication
12%
Automation System
12%
chaotic map
12%
Ciphertext
12%
Clustering Scheme
37%
Communication Architecture
12%
Communication Protocol
12%
Computational Complexity
16%
Data Sharing
50%
Decryption
12%
Distance Vector
50%
Emergency Situation
25%
Encrypted Data
25%
Energy Consumption
75%
Estimation Method
12%
Fundamental Service
16%
Inconsistent Problem
16%
Industrial Control System
50%
Latency Operation
12%
localization algorithm
100%
maximum-likelihood
25%
Multidimensional Scaling
50%
Multilateration
50%
Multimedia Data
50%
Multimedia Information System
12%
Multimodality
25%
Network Environment
12%
Network Resource
25%
Network Topology
16%
Networking System
50%
Original Distance
16%
Privacy Preserving
12%
proxy re encryption
12%
Residual Energy
37%
Secure Communication
25%
Segmentation Method
25%
Source Localization
25%
System Scenario
12%
Transmission Parameter
12%
Unauthorized Access
12%
Updating Policy
12%
Wireless Network
75%
Wireless Sensor Network
16%
Engineering
3D Object Detection
12%
Alternative Procedure
25%
Localization Performance
25%
Localization Phase
25%
Logistics System
25%
Maximum Likelihood
25%
Network Resource
25%
Segmentation Method
25%