Computer Science
5G Mobile Communication
13%
Adversarial Machine Learning
21%
Android
16%
Annotation
24%
Anomaly Detection
11%
Artificial Intelligence
20%
Avionics
21%
Blockchain
41%
Case Study
36%
Cloud Computing
33%
Cloud Infrastructure
11%
Computational Complexity
11%
Convolutional Neural Network
68%
Data Center
22%
Data Privacy
14%
Decision-Making
12%
Deep Learning Method
47%
Deep Learning Model
21%
Deep Neural Network
26%
Deep Reinforcement Learning
33%
Domain Adaptation
20%
Dynamic Ensemble Selection
20%
Edge Computing
22%
Energy Consumption
32%
Energy Efficiency
11%
Energy Efficient
16%
Error Correction
12%
Execution Time
11%
Experimental Result
48%
Facial Expression
13%
Feature Extraction
15%
Federated machine learning
57%
Function Chain
20%
Functional Size
13%
Genetic Algorithm
13%
Image Analysis
13%
Image Classification
15%
Image Segmentation
43%
Internet of Things Device
22%
Internet-Of-Things
100%
Interoperability
14%
Intrusion Detection
11%
Intrusion Detection System
14%
Knowledge Distillation
15%
Language Modeling
18%
Learning Approach
34%
Learning System
78%
Long Short-Term Memory Network
30%
Machine Learning
82%
Machine Learning Algorithm
13%
Machine Learning Approach
11%
Machine Learning Model
20%
Machine Learning Technique
17%
Malware
16%
Malware Detection
11%
Medical Imaging
11%
Meta-Learning
13%
Microservice
11%
Mobile Device
16%
Motion Estimation
18%
Multi-Access Edge Computing
18%
Multiobjective
16%
Network Function
36%
Network Function Virtualization
23%
Network Infrastructure
12%
Network Operator
15%
Network Segmentation
14%
Network Service
21%
Network Slicing
13%
Neural Network
19%
Open Source
20%
Particle Swarm Optimization
12%
Performance Model
11%
Privacy Preserving
13%
Quality of Service
29%
Random Decision Forest
11%
Refactoring
38%
Regularization
13%
Reinforcement Learning
32%
Resource Allocation
24%
Resource Utilisation
15%
Service Function
23%
Service-Level Agreement
15%
Size Measurement
12%
Software Development
11%
Software Engineering
29%
Software System
16%
Software-Defined Networking
13%
Support Vector Machine
14%
Task Offloading
17%
Training Data
12%
Transfer Learning
11%
Unmanned Aerial Vehicle
28%
Use Case
15%
videogame
14%
Virtual Machine
11%
Virtual Network
44%
Virtual Reality
14%
Visual Quality
13%
Wireless Network
13%
Keyphrases
5G Networks
10%
Adaptation
15%
Adversarial Attack
13%
Anomaly Detection
11%
Blockchain
22%
Cloud Computing
22%
Cloud Infrastructure
10%
Cluster-based
14%
Convolutional Neural Network
27%
Coronary Artery
14%
Data Privacy
12%
Deep Learning
22%
Deep Learning Methods
25%
Deep Learning Model
17%
Deep Neural Network
21%
Deep Reinforcement Learning (deep RL)
30%
Digital Twin
11%
Domain Adaptation
13%
Domain Shift
11%
Dynamic Ensemble Selection
20%
Dynamic Selection
11%
Edge Computing
18%
Energy Consumption
23%
Energy Efficiency
11%
Energy Efficient
11%
Feature Representation
11%
Federated Learning
50%
Football Players
11%
Functional Size Measurement
10%
Genetic Algorithm
11%
GitHub
10%
Image Segmentation
11%
Intent-based Networking
17%
Internet of Things
48%
Internet of Things Applications
13%
Internet of Things Devices
26%
Internet of Things System
15%
Intrusion Detection System
15%
K-nearest
10%
Knowledge Distillation
12%
Latency
12%
Learning Approaches
12%
Learning-based
23%
Limited Resources
12%
Long Short-term Memory
13%
Loss Function
10%
Machine Learning
39%
Machine Learning Models
20%
Machine Learning Techniques
25%
Magnetic Resonance Imaging
11%
Malware Detection
10%
Medical Image Segmentation
19%
Microservices
10%
Mobile Application
11%
Mobile Devices
14%
Mobile Edge Computing
17%
Modal
12%
Model-based Approach
11%
Motion Estimation
15%
Multi-tenant
11%
Network Function Virtualization
25%
Network Infrastructure
13%
Network Services
14%
Neural Network
12%
Popular
23%
Prediction Accuracy
11%
Privacy-preserving
10%
Publicly Available
11%
Quality of Service
14%
Real-time Ethernet
10%
Refactoring
31%
Reinforcement Learning
21%
Resource Allocation
15%
Resource Management
10%
Resource Utilization
21%
Schizophrenia
16%
Segmentation Network
12%
Segmentation Problem
10%
Selection Strategy
19%
Service Function Chain
21%
Software Engineering
22%
Software System
10%
Software-defined Networking
14%
Source Code
12%
Spectrogram
10%
State-of-the-art Techniques
11%
Systematic Literature Review
12%
Target Domain
13%
Task Offloading
17%
Training Data
17%
Training Model
12%
Transcoding
13%
UAV
24%
Vehicular Ad Hoc Networks
11%
Virtual Machine Placement
11%
Virtual Network Function
22%
Virtual Reality
12%
Virtual Services
10%
Vulnerability
10%
X-ray Angiography
13%