Keyphrases
Defect Detection
100%
Defect Detection System
57%
Mobile Cloud Computing
55%
Smartphone
55%
Deep Learning Methods
55%
Mura
41%
Image Inpainting
41%
Self-supervised Learning
41%
Recommendation System
37%
Mura Detection
37%
Systems-based
37%
Computational Efficiency
33%
Privacy Protection
31%
Anomaly Detection System
31%
Communication Environment
27%
User Weight
27%
Privacy-preserving
27%
Available Time
27%
Time-based
27%
User Groups
27%
Group Meetings
27%
Scheduling Services
27%
Homomorphic Encryption Scheme
27%
Mobile Social Apps
27%
Privacy-preserving Techniques
27%
Information Weighting
27%
Scheduling Mechanism
27%
Partially Homomorphic Encryption
27%
Weighted Voting Games
27%
Time Scheduling
27%
Rescue Services
27%
FM Transmitter
27%
Service-oriented Architecture
27%
Communication Services
27%
Emergency Communication
27%
Bandwidth Efficient
27%
Mobile Communication
27%
Mobile Sensing
27%
Information Processing
27%
Course Recommendation System
27%
Sensor-based
27%
Proximity Sensor
27%
Mobile Application
27%
Detection Framework
27%
Signal Processing
27%
Touchless
27%
Printed Circuit Board
27%
Multi-sensor Fusion
27%
Mobile Devices
27%
Computing Trends
27%
Computer Science
Artificial Intelligence
59%
Mobile Cloud Computing
55%
Federated Learning
55%
Image Inpainting
41%
Learning Framework
41%
Self-Supervised Learning
41%
Mobile Device
34%
Feature Extraction
34%
Recommendation Accuracy
30%
Differential Privacy
30%
Deep Learning Method
29%
Information Processing
27%
content-based filtering
27%
Prediction Model
27%
Scheduling Mechanism
27%
Calendar Information
27%
Social Application
27%
Communication Service
27%
Service Architecture
27%
Proximity Sensor
27%
Mobile Application
27%
Smartphone
27%
Temporal Convolutional Network
27%
Human Activity Recognition
27%
Human Interaction
27%
Anomaly-Based Detection
27%
Privacy Preserving
27%
Registration Authority
27%
Certificate Authority
27%
Natural language interfaces
27%
Deep Learning Model
22%
Artificial Intelligence Model
22%
Attackers
22%
Experimental Result
22%
Code Generation
22%
Homomorphic Encryption
20%
Information Leakage
18%
Blockchain
18%
Image Classification
18%
Collecting Data
17%
Privacy Protection
16%
Preprocessing Module
16%
Production Line
15%
Incremental Checkpointing
13%
Stream Processing System
13%
Matrix Factorization
13%
Information Protection
13%
Attack Detector
13%
Collaborative Filtering
13%
Prediction Framework
13%