Computer Science
Attackers
100%
Adversarial Example
46%
Deepfakes
33%
Anomaly Detection
30%
Data Stream
30%
Botnets
25%
Autoencoder
24%
Internet of Things
23%
Artificial Intelligence
21%
Deep Learning Model
20%
Machine Learning
19%
Deep Learning
17%
Unauthorized User
17%
Cellular Network
17%
Malware
17%
Blockchain
15%
Semantic Image
15%
Illegitimate User
15%
radial base
15%
Autonomous Vehicles
15%
Image Segmentation
15%
Personal Data
15%
Physical Layer
15%
Distributed Denial of Service Attack
15%
Mobile Device
15%
Equal Error Rate
15%
Extreme Gradient Boosting
15%
Verification Process
15%
Collected Data
15%
Object Recognition
15%
Target Location
15%
Legitimate User
15%
Artificial Intelligence
15%
Neural Network
14%
Information Network
13%
Signal Bandwidth
11%
Secure Communication
11%
Routing Information
11%
Data Type
11%
Communication Protocol
11%
Wireless Channel
11%
covert channel
11%
Protocol Stack
11%
Multipath
11%
Analog Waveform
11%
Signal Frequency
11%
Artificial Neural Network
10%
Emerging Threat
10%
Clustering Algorithm
9%
Malicious Behavior
9%
Keyphrases
Attacker
79%
Deepfake
34%
Smartphone
26%
Adversarial Examples
25%
Anomaly Detection
23%
Phantom
23%
Botnet
19%
Air Gap
17%
Deep Learning
17%
Vulnerability
16%
Touch Gestures
15%
Fake Calls
15%
CAPTCHA
15%
Coverage Map
15%
Anomaly Detection Model
15%
User Verification
15%
Distributed Denial of Service (DDoS)
15%
Mobile Devices
15%
Adversarial Patch
15%
Advanced Driver Assistance Systems
15%
Air-gapped Computers
15%
Cipher
15%
Blockchain
15%
Transferability
15%
Offensive AI
15%
Transmitter
14%
Cellular Networks
14%
Autoencoder
14%
Cyber-attacks
14%
Covert
14%
Physical Signals
13%
Wireless Coverage
12%
Radial Basis Network
12%
Air-gapped Network
12%
Emergency Service
11%
Vernam
11%
Covert Channel
11%
Internet of Things Devices
11%
Daily Life
10%
Internet of Things
10%
Collaborative Anomaly Detection
10%
Malware
10%
Data Stream Clustering
10%
Clustering Algorithm
10%
Unauthorized User
10%
Radiologists
10%
Healthcare
10%
Adversary
10%
World Wide Web
9%
Vernam Cipher
9%