Keyphrases
Service Provider
100%
As-a-service
84%
Outsourced Database
72%
Outsourced Data
51%
Record Matching
43%
Frequent Pattern Mining
43%
Edge Cloud
43%
System Deployment
43%
Encryption
43%
Crowdsourcing
40%
Result Integrity Verification
40%
Query Evaluation
40%
Third-party Providers
39%
Data Management
37%
Functional Dependency
36%
Data Dependency
36%
Efficient Authentication
33%
Integrity Verification
33%
Base Station
32%
Correctness Verification
31%
Security Issues
30%
Flat Systems
28%
Edge Computing
28%
Tweets
28%
Event Sequences
28%
Dependency Constraints
28%
Computational Assessment
28%
MapReduce
28%
Hierarchical Systems
28%
Collaborative Filtering
28%
Filtering Framework
28%
Deep Neural Network
28%
Data Owner
28%
Untrusted
26%
Result Integrity
26%
Deep Learning
26%
Cloud Computing
25%
Common Knowledge
25%
Query Result
24%
Frequency Analysis Attacks
24%
Mapper
24%
Edge Computing System
24%
Reducer
24%
Generative Adversarial Networks
24%
Authenticated Data Structures
24%
Efficient Verification
24%
Security Concerns
23%
Expert Evaluation
21%
Local Law
21%
Intrusion Detection
21%
Computer Science
Authentication
91%
Integrity Verification
69%
Outsourced Data
62%
Data Mining
53%
Data Structure
48%
Party Service Provider
48%
Experimental Result
47%
Privacy Preserving
46%
Frequent Itemsets
43%
Edge Computing
43%
Record Matching
43%
Structured Query Language
43%
Common Sense Knowledge
43%
Functional Dependency
38%
Sensitive Informations
38%
Data Dependency
36%
Security Concern
33%
System Response Time
28%
Frequency Analysis
28%
Intrusion Detection
28%
Map-Reduce
28%
Deep Learning Method
28%
Deep Neural Network
28%
Internet-Of-Things
28%
Generative Adversarial Networks
28%
Collaborative Filtering
28%
Computational Resource
26%
Cloud Computing
26%
Data Management
24%
Computational Approach
21%
Synthetic Datasets
21%
Service Model
21%
Generative Model
21%
Big Data Analytics
20%
Discriminator
19%
Steganography
19%
Allocation Problem
19%
Data Streaming
19%
Probabilistic Approach
19%
Heuristic Algorithm
17%
Computational Power
16%
Anomaly Detection
14%
Computational Method
14%
Location-Based Service
14%
Normal Behavior
14%
Security Application
14%
Entity Certificate
14%
Fraud Detection
14%
Collaborative Classification
14%
Communication Cost
14%