Computer Science
Authentication System
100%
Authentication
98%
Neural Network
81%
User Authentication
47%
Synthetic Image
40%
Energy Function
40%
k-means Clustering
40%
Network Authentication
40%
Equal Error Rate
37%
Biometrics
35%
Rejection Method
33%
Learning Process
30%
Edge Preservation
30%
Web Server
30%
Multi Agent Systems
30%
Random Decision Forest
27%
System Security
27%
False Reject Rate
25%
Experimental Result
23%
Verification System
22%
Recognition Network
20%
Authenticate User
20%
System Intrusion
20%
Straightforward Approach
20%
Update Mechanism
20%
Parallel Operation
20%
Total Execution Time
20%
Nonblocking
20%
Recommendation Trust
20%
Interpretability
20%
Emerging Threat
20%
Machine Learning Algorithm
20%
Biometric System
20%
Knowledge-Sharing
20%
Scheduling Scheme
20%
Estimation Error
20%
Message Authentication
20%
Computational Element
20%
Cyber Physical Systems
20%
Formal Language
20%
Recognizer
20%
Background Process
20%
Blockchain
20%
prefetching
20%
Mean Clustering Algorithm
20%
Performance Improvement
20%
Anomaly Detection
20%
Link Aggregation
20%
Modeling and Simulation
20%
Quantitative Approach
20%
Keyphrases
Network Authentication
40%
Chipless
40%
Sensor Tag
40%
False Acceptance Rate
35%
Network Identification
30%
Identification Code
27%
Ethylene Gas
27%
Recognition Network
20%
Parallel Decision Tree
20%
People-centric Sensing
20%
Tree-based Methods
20%
Attacks on Humans
20%
Computational Cluster
20%
Biometric Menagerie
20%
Behavioral Biometrics
20%
Template Update
20%
Worker Node
20%
Update Mechanism
20%
Feature Selection Methods
20%
Computationally Attractive
20%
Joint Probability Distribution
20%
Gait Authentication
20%
Trust Model
20%
Robbery
20%
Recommendation Trust
20%
Adaptive Recommendation
20%
Cyber
20%
Dynamic Microgrids
20%
Emerging Threats
20%
Assisted Gait
20%
Product Distribution
20%
Feature Subset Selection
20%
Feature Vector
20%
Multivariate mutual Information
20%
IP Traceback
20%
Marking Schemes
20%
Elephant
20%
Adaptive Neural Network
20%
Network Motifs
20%
Network Programming
20%
Multi-hop Scheduling
20%
Power-aware
20%
Link Aggregation
20%
Scheduling Information
20%
Dependant
20%
Local Data
20%
Smartphone Screen
20%
Mytilus Galloprovincialis
20%
Machine Learning Approach
20%
Adversary
20%