Skip to main navigation
Skip to search
Skip to main content
Sort by
Computer Science
Large Language Model
100%
Learning System
83%
Machine Learning
83%
Access Pattern
72%
Cryptography
66%
Experimental Result
61%
Security and Privacy
55%
Attack Surface
44%
Data Management
40%
Secret Sharing
33%
Store Operation
33%
Information Storage
33%
Cloud Computing
33%
Patient Information
33%
Security Hardware
33%
Symmetric Encryption
33%
Federated machine learning
33%
Anonymity
33%
Mobile Device
33%
Prompt Tuning
33%
Messaging Service
33%
Dedicated Hardware
33%
Differential Privacy
33%
Privacy Threat
27%
Audio Transmission
22%
Voice Assistant
22%
Control Flow
22%
Execution Service
22%
Execution Environments
22%
Evaluation Result
19%
Data Analytics
17%
Auxiliary Information
16%
Speed-up
16%
Encrypted Data
16%
Learning Algorithm
16%
Data Privacy
16%
Training Dataset
16%
Privacy Protection
16%
Performance Model
16%
Preprocessing Technique
16%
Trusted Computing Base
16%
Vertebral Column
16%
Communication Cost
15%
Online Communication
15%
Privacy Preserving
12%
Learning Framework
11%
Systems Performance
11%
Connected Device
11%
Multiple Victim
11%
Alphabetic Character
11%
Mobile App
11%
Close Proximity
11%
User Interface
11%
Blockchain
11%
Execution Trace
11%
side-channel
11%
Service Provider
11%
Proof
11%
prefetching
11%
Smart Contract
11%
Software Service
11%
Ethereum
11%
Side Channel
11%
Field Programmable Gate Arrays
11%
System-on-Chip
11%
Service Detection
11%
Privacy Violation
11%
Open Source
9%
Communication Overhead
8%
Vertical Scaling
8%
Horizontal Scaling
8%
Computational Efficiency
8%
Bulletin Board
8%
Persistence
8%
Interactivity
8%
Security Analysis
6%
Detection Mechanism
6%
User Privacy
6%
Individual Privacy
6%
User Data
6%
Intrinsic Property
6%
Knowledge Transfer
5%
Feature Space
5%
Computing Platform
5%
Feature Information
5%
Internet-Of-Things
5%
Ubiquitous Computing
5%
Input/Output
5%
Multi-Source
5%
Interpolation
5%