Computer Science
Advanced Encryption Standard
5%
Anonymization
5%
Authorized User
6%
Ciphertext
24%
Cloud Computing
40%
Cloud Service Provider
6%
Compressed Sensing
5%
Compression Scheme
20%
Compressive Sensing
100%
Computational Complexity
6%
Computing Power
5%
Cryptographic Attack
5%
Data Encryption
11%
Data Privacy
6%
Data Representation
6%
Data Security
5%
Decoding Algorithm
15%
Decryption
5%
Encryption Class
5%
Encryption Scheme
40%
Energy Efficiency
5%
Experimental Result
7%
Face Detection
20%
Grained Access Control
10%
Internet of Things
96%
Internet of Things Device
20%
IoT Application
10%
Linear Independence
6%
linear-feedback shift register
10%
Memory Footprint
5%
Obfuscation
5%
Operating Systems
5%
Perfect Secrecy
25%
Privacy Preservation
10%
Privacy Preserving
60%
Prototype Design
20%
Raspberry Pi
10%
Reconstructed Signal
15%
Security Analysis
25%
Signal Reconstruction
5%
Smart Grid
5%
Smart Meters
5%
Statistical Data
6%
Total Energy Consumption
5%
Video Surveillance
20%
Working Prototype
10%
Keyphrases
Concealment
20%
Design Prototypes
20%
Encryption
6%
Encryption Scheme
20%
Face Detection
6%
Fine-grained Access Control
6%
IoT Applications
6%
IoT System
20%
Joint Compression
20%
Joint Encryption
20%
Live Video Feed
6%
Maximum Energy
8%
Missed Detection
6%
Multi-class
13%
Prototype Analysis
20%
Real-time Face Detection
6%
Real-time IoT
6%
Secure Scheme
12%
Security Analysis
20%
Security Design
20%
Sensing Matrix
8%
Video Content
6%
Engineering
Compressive Sensing
10%
Correction Capability
6%
Correction Code
6%
Energy Engineering
20%
Internet of Things
20%
Joints (Structural Components)
20%
Power Profile
5%
Realization
5%
Reconstructed Signal
9%
Shift Register
7%