Keyphrases
Service Provider
99%
As-a-service
83%
Outsourced Database
71%
Outsourced Data
51%
Record Matching
42%
Frequent Pattern Mining
42%
Edge Cloud
42%
System Deployment
42%
Encryption
42%
Deep Neural Network
42%
Crowdsourcing
40%
Result Integrity Verification
40%
Query Evaluation
40%
Third-party Providers
39%
Data Management
37%
Functional Dependency
35%
Data Dependency
35%
Intrusion Detection
35%
Efficient Authentication
33%
Integrity Verification
33%
Deep Learning
33%
Base Station
31%
Correctness Verification
30%
Security Issues
29%
Flat Systems
28%
Edge Computing
28%
Tweets
28%
Event Sequences
28%
Dependency Constraints
28%
Computational Assessment
28%
MapReduce
28%
Hierarchical Systems
28%
Collaborative Filtering
28%
Filtering Framework
28%
Data Owner
28%
Untrusted
26%
Result Integrity
26%
Cloud Computing
25%
Common Knowledge
25%
Query Result
23%
Frequency Analysis Attacks
23%
Mapper
23%
Edge Computing System
23%
Reducer
23%
Generative Adversarial Networks
23%
Authenticated Data Structures
23%
Efficient Verification
23%
Security Concerns
23%
Expert Evaluation
21%
Local Law
21%
Computer Science
Service Provider
100%
Authentication
83%
Experimental Result
55%
Integrity Verification
54%
Outsourced Data
47%
Privacy Preserving
46%
Frequent Itemsets
42%
Edge Computing
42%
Record Matching
42%
Structured Query Language
42%
Common Sense Knowledge
42%
Intrusion Detection
42%
Deep Neural Network
42%
Data Structure
40%
Party Service Provider
40%
Functional Dependency
38%
Sensitive Informations
38%
Data Dependency
35%
Security Concern
33%
Deep Learning Method
33%
Data Mining
31%
System Response Time
28%
Frequency Analysis
28%
Map-Reduce
28%
Internet-Of-Things
28%
Character Recognition
28%
Cloud Computing
26%
Data Management
23%
Computational Approach
21%
Synthetic Datasets
21%
Service Model
21%
Distance Metric
21%
Big Data Analytics
20%
Discriminator
19%
Computational Resource
19%
Steganography
19%
Allocation Problem
19%
Data Streaming
19%
Probabilistic Approach
19%
Cybersecurity
19%
Natural Language Processing
19%
Computational Power
16%
Generative Adversarial Networks
14%
Collaborative Filtering
14%
Generative Model
14%
Anomaly Detection
14%
Computational Method
14%
Location-Based Service
14%
Normal Behavior
14%
Security Application
14%