Computer Science
Radio Frequency Identification
100%
Blockchain
80%
Experimental Result
71%
Wireless Sensor Network
65%
Time Efficiency
56%
Execution Time
33%
Bloom Filter
31%
Sensor Networks
28%
Energy Efficiency
27%
Energy Efficient
26%
Attackers
26%
Detection Method
25%
Sybil Attack
24%
Unicast
22%
Internet-Of-Things
22%
Software-Defined Networking
21%
Adversarial Machine Learning
21%
Shortest Path Tree
21%
Distributed Denial of Service Attack
21%
Switching Activity
21%
Route Planning
21%
vehicular ad-hoc network
21%
Mobile Cloud Computing
21%
Resource Allocation
20%
Sensor Node
20%
Computer Hardware
19%
Privacy Preserving
18%
Cardinality
18%
Multicasting
18%
Loop Scheduling
18%
Denial-of-Service
18%
Energy Consumption
18%
radio frequency identification technology
18%
Singletons
17%
Buffer Overflow
17%
Physical Layer
17%
Points of Interest
17%
Black-Box Attack
17%
Supply Chain
16%
Embedded System
16%
Smart Contract
15%
Mobile Device
14%
Adversarial Example
14%
Evaluation Result
14%
Simulation Experiment
13%
Information Storage
13%
Key Generation
13%
Approximation Algorithms
13%
Smart City
13%
Multiple Functional Unit
13%
Keyphrases
Radio Frequency Identification System
74%
RFID System
72%
Blockchain
51%
Wireless Sensor Networks
45%
Time Efficiency
36%
Smartphone
31%
Bloom Filter
30%
Information Collection
28%
Blockchain System
28%
Energy Efficient
28%
Radio Frequency Identification
26%
Vehicular Ad Hoc Networks
24%
Energy Efficiency
24%
Distributed Denial of Service (DDoS)
23%
Missing Tag Identification
22%
Software-defined Networking
21%
Tag Identification Protocol
21%
Shortest-path Tree
21%
Switching Activity
21%
Mobile Cloud Computing
21%
Execution Time
20%
Adversarial Attack
20%
BitTorrent
19%
Attacker
19%
Sensor Networks
19%
Schedule Length
19%
Sensor Node
19%
Blockchain-based
18%
Loop Scheduling
18%
Resource Allocation
18%
Unknown Tags
18%
Unicast
17%
Multicast
17%
Buffer Overflow Attack
17%
Tag Identification
16%
Worm
16%
Mobile Devices
15%
Black Hole Attack
14%
Internet of Things
14%
Energy Saving
14%
Adversarial Examples
14%
Data Storage
14%
Smart City
14%
Smart Contract
13%
DSP Applications
13%
Hardware Complexity
13%
Sybil Attack
13%
Query Services
13%
Route Planning
13%
Internet of Healthcare Things (IoHT)
13%