Keyphrases
Accelerated Systems
12%
Adversarial Attack
12%
Adversarial Input
25%
Application Layer
12%
Automated Testing
12%
Behavioral Inference
25%
Bit Energy
25%
Bit Quantization
25%
Collaborative Research
50%
Computer Privacy
25%
Computer Security
12%
Critical Security
12%
Cutting-edge Technology
12%
Cyber-physical Systems
12%
Data Analysis Tasks
12%
Data Leakage
25%
Data Privacy
12%
Defense Mechanisms
12%
Differential Privacy
12%
Digital Environment
12%
Digital Mapping
50%
Digital Reality
12%
Digital Representation
12%
Digital Space
50%
Digital Synchronization
25%
Digital Twin Network
25%
Digital-physical
25%
Disciplinary Knowledge
12%
Distributed Training
12%
Distributed Virtual Environment
12%
Embedded Sensors
25%
Energy Consumption
12%
Federated Learning
12%
Human Mobility Prediction
25%
Immersive
12%
Impact Review
12%
Increased Productivity
12%
Information Leakage
25%
Information Risk
25%
Integrated Fusion
25%
Learning Accuracy
12%
Learning Methods
12%
Machine Data
12%
Machine Learning
25%
Machine Learning Models
12%
Manufacturing Test
25%
Medical Data Processing
25%
Metaverse
100%
Minorities in STEM
12%
Mixed Environment
25%
Mixed Reality
12%
Network Automation
12%
Network Layer
12%
Network Testing
12%
Networked Manufacturing
25%
Obfuscation Techniques
12%
Outreach Activities
12%
Overall Design
12%
Physical Reality
12%
Plethora
12%
Prevention Methods
12%
Privacy Concerns
25%
Privacy Control
25%
Privacy-enhanced
50%
Privacy-preserving
12%
Real-time Interaction
12%
Resilient
50%
Review Criteria
12%
Road Traffic Prediction
25%
Security Concerns
12%
Security Issues
25%
Security Privacy
50%
STEM Education
12%
STEM Fields
12%
Synchronization Algorithm
12%
System Development
12%
Through Traffic
25%
Traffic Analysis
25%
Training Methods
12%
Training Model
12%
Trajectory Prediction
25%
Trim Strategy
25%
Usable Privacy
25%
User Privacy
12%
User Trajectory
25%
Virtual Reality
37%
Virtual Reality Devices
12%
World Experience
100%
Computer Science
Adversarial Machine Learning
12%
Application Layer
12%
Application Level
12%
Computer Security and Privacy
25%
Cyber Physical Systems
12%
Data Privacy
12%
Data Processing
12%
Differential Privacy
12%
Digital Environment
25%
Digital Representation
12%
Digital Twin
12%
Energy Consumption
12%
Federated Learning
12%
Information Leakage
25%
Machine Learning
37%
Mixed Reality
12%
Network Layer
12%
Obfuscation Technique
12%
Outreach Activity
12%
Privacy Challenge
25%
Privacy Control
25%
Privacy Preserving
12%
Quantization (Signal Processing)
25%
Research Effort
12%
Security and Privacy
37%
Security Challenge
12%
Security Concern
12%
Synchronization Process
25%
System Development
12%
Traffic Analysis
12%
Traffic Prediction
12%
Training Model
12%
Underrepresented Minority
12%
User Privacy
12%
Virtual Reality
50%