Computer Science
Anomaly Detection
20%
Authenticate User
20%
Authentication
98%
Authentication System
100%
Background Process
20%
Biometric System
20%
Biometrics
35%
Blockchain
20%
Computational Element
20%
Cyber Physical Systems
20%
Edge Preservation
30%
Emerging Threat
20%
Energy Function
40%
Equal Error Rate
37%
Estimation Error
20%
Experimental Result
23%
False Reject Rate
25%
Formal Language
20%
Interpretability
20%
k-means Clustering
40%
Knowledge-Sharing
20%
Learning Process
30%
Link Aggregation
20%
Machine Learning Algorithm
20%
Mean Clustering Algorithm
20%
Message Authentication
20%
Modeling and Simulation
20%
Multi Agent Systems
30%
Network Authentication
40%
Neural Network
81%
Nonblocking
20%
Parallel Operation
20%
Performance Improvement
20%
prefetching
20%
Quantitative Approach
20%
Random Decision Forest
27%
Recognition Network
20%
Recognizer
20%
Recommendation Trust
20%
Rejection Method
33%
Scheduling Scheme
20%
Straightforward Approach
20%
Synthetic Image
40%
System Intrusion
20%
System Security
27%
Total Execution Time
20%
Update Mechanism
20%
User Authentication
47%
Verification System
22%
Web Server
30%
Keyphrases
Adaptive Neural Network
20%
Adaptive Recommendation
20%
Adversary
20%
Assisted Gait
20%
Attacks on Humans
20%
Behavioral Biometrics
20%
Biometric Menagerie
20%
Chipless
40%
Computational Cluster
20%
Computationally Attractive
20%
Cyber
20%
Dependant
20%
Dynamic Microgrids
20%
Elephant
20%
Emerging Threats
20%
Ethylene Gas
27%
False Acceptance Rate
35%
Feature Selection Methods
20%
Feature Subset Selection
20%
Feature Vector
20%
Gait Authentication
20%
Identification Code
27%
IP Traceback
20%
Joint Probability Distribution
20%
Link Aggregation
20%
Local Data
20%
Machine Learning Approach
20%
Marking Schemes
20%
Multi-hop Scheduling
20%
Multivariate mutual Information
20%
Mytilus Galloprovincialis
20%
Network Authentication
40%
Network Identification
30%
Network Motifs
20%
Network Programming
20%
Parallel Decision Tree
20%
People-centric Sensing
20%
Power-aware
20%
Product Distribution
20%
Recognition Network
20%
Recommendation Trust
20%
Robbery
20%
Scheduling Information
20%
Sensor Tag
40%
Smartphone Screen
20%
Template Update
20%
Tree-based Methods
20%
Trust Model
20%
Update Mechanism
20%
Worker Node
20%