Keyphrases
Adversarial Attack
28%
Adversarial Detection
28%
Adversarial Network
28%
Application Programming Interface Calls
28%
Artificial Bee Colony Algorithm
23%
Average Localization Error
28%
Call Sequences
28%
Convolutional Neural Network
28%
Cyber-attacks
19%
Deep Neural Network
28%
Global Positioning System
28%
Indicator Value
28%
Indoor Environment
28%
Indoor Localization
28%
Interference Measurement
28%
Internet of Things Devices
28%
Intrusion Detection
33%
Intrusion Detection System
90%
IoT Devices
38%
IoT Security
28%
Line-of-sight
28%
Localization System
47%
Localization Technique
19%
Location-aware
19%
Long Range Wide Area Network (LoRaWAN)
85%
LoRa Network
28%
Machine Learning-based Detection
33%
Malware Detection
28%
Mean Opinion Score
19%
Mean Squared Error
28%
Multi-gateway
28%
Network Applications
28%
Network Measurement
28%
Network Model
28%
Neural Network
33%
Node Localization
28%
Non-line-of-sight (NLoS)
24%
NSL-KDD
23%
Quality Assessment
28%
Random Neural Network
100%
Received Signal Strength Indicator
28%
Sequence Analysis
28%
Smart Home
33%
Smart Thermostat
39%
Swarm Intelligence
28%
Swarm Optimization
28%
Tiny Machine Learning
28%
Tree-based
28%
Urban Internet of Things
28%
VoLTE
28%
Computer Science
Adversarial Machine Learning
28%
Application Programming Interface
28%
Artificial Bee Colony
9%
Artificial Bee Colony Algorithm
16%
Artificial Neural Network
9%
Attackers
10%
Based Malware Detection
28%
Convolutional Neural Network
28%
Cyber Attack
19%
Deep Learning Method
16%
Deep Neural Network
14%
Denial-of-Service
9%
Denial-of-Service Attack
16%
Evaluation Models
9%
Experimental Result
9%
Frequency Signal
9%
Gated Recurrent Unit
14%
Generative Adversarial Networks
14%
Global Positioning System
28%
Hardware Cost
9%
Indicator Value
28%
Information Technology
9%
Internet of Things Device
28%
Internet-Of-Things
77%
Intrusion Detection
38%
Intrusion Detection System
73%
IoT Security
28%
Learning Approach
9%
Learning System
47%
localization algorithm
9%
Machine Learning
47%
Malware
21%
Man-in-the-Middle Attack
9%
Multilayer Perceptron
9%
Neural Network
83%
Packet-Switched Network
9%
Potential Solution
9%
Power Consumption
9%
Public Switched Telephone Network
9%
Quality Evaluation
28%
Received Signal Strength
28%
Satellite Signal
9%
Sensitive Informations
9%
Solid Material
9%
Structured Query Language
9%
Swarm Intelligence
28%
Voice Quality
28%
Wide Area Network
85%
Wireless Sensor
9%
Wireless Technologies
9%