|
algorithms |
14 |
|
artificial intelligence |
13 |
|
animals |
9 |
|
humans |
9 |
|
machine learning |
9 |
|
sequence analysis, dna |
9 |
|
genome |
8 |
|
privacy |
8 |
|
sequence analysis, protein - methods |
8 |
|
aspergillus |
7 |
|
automation |
7 |
|
bloom filter |
7 |
|
distributed denial-of-service (ddos) |
7 |
|
homomorphic encryption |
7 |
|
identification |
7 |
|
image recognition |
7 |
|
intrusion detection |
7 |
|
routers |
7 |
|
sequence alignment |
7 |
|
sequence analysis, dna - methods |
7 |
|
testbed |
7 |
|
authentication |
6 |
|
base sequence |
6 |
|
blind signature |
6 |
|
computational biology - methods |
6 |
|
conserved sequence - genetics |
6 |
|
evolution, molecular |
6 |
|
models, chemical |
6 |
|
molecular sequence data |
6 |
|
security |
6 |
|
software |
6 |
|
tracking |
6 |
|
alternative splicing |
5 |
|
anonymous credential |
5 |
|
bilinear pairings |
5 |
|
binding energy |
5 |
|
binning |
5 |
|
china |
5 |
|
cluster analysis |
5 |
|
combinatorial group testing |
5 |
|
commutative encryption |
5 |
|
computer simulation |
5 |
|
contig mapping |
5 |
|
cryptography |
5 |
|
diet - veterinary |
5 |
|
dna microarray |
5 |
|
dogs |
5 |
|
female |
5 |
|
fertility - genetics - physiology |
5 |
|
genome - genetics |
5 |
|
genomics |
5 |
|
hard disk integrity |
5 |
|
heterozygote |
5 |
|
mice |
5 |
|
motif finding |
5 |
|
multigene family - genetics |
5 |
|
phylogeny |
5 |
|
polymorphism, single nucleotide - genetics |
5 |
|
privacy preserving |
5 |
|
privacy-preserving |
5 |
|
protein interaction mapping - methods |
5 |
|
proteins - chemistry - metabolism |
5 |
|
proxy re-encryption |
5 |
|
receptors, g-protein-coupled - genetics |
5 |
|
secure vehicular sensor network |
5 |
|
smart grid network |
5 |
|
synteny - genetics |
5 |
|
transcription factor |
5 |
|
ursidae - classification - genetics - physiology |
5 |
|
vehicular ad hoc network |
5 |
|
3-dimension hashing |
4 |
|
access policies |
4 |
|
amino acid motifs |
4 |
|
anonymous routing |
4 |
|
assembly |
4 |
|
authenticatiion |
4 |
|
batch verification |
4 |
|
batch vertification |
4 |
|
binding site |
4 |
|
binding sites |
4 |
|
chromosome mapping - methods |
4 |
|
commitment |
4 |
|
complex structure |
4 |
|
computational tools |
4 |
|
computer forensics |
4 |
|
computer networks |
4 |
|
contig |
4 |
|
data mining |
4 |
|
data-base servers |
4 |
|
database |
4 |
|
database operation |
4 |
|
database records |
4 |
|
databases, genetic |
4 |
|
decision tree |
4 |
|
digital arithmetic |
4 |
|
digital forensic engineering |
4 |
|
dna - chemistry |
4 |
|
dynamic programming |
4 |
|
electric vehicle |
4 |
|
electronic crime countermeasures |
4 |
|
error correction |
4 |
|
event data recorder |
4 |
|
fake route |
4 |
|
forward security |
4 |
|
gap-filling |
4 |
|
genetic disease |
4 |
|
genome, human |
4 |
|
group communication |
4 |
|
group communications |
4 |
|
hidden markov model |
4 |
|
hmac |
4 |
|
human chromosomes |
4 |
|
human genomes |
4 |
|
latent sector errors (lses) |
4 |
|
legal professional privilege (lpp) |
4 |
|
low coverage |
4 |
|
manets |
4 |
|
message classification |
4 |
|
metrics |
4 |
|
models, statistical |
4 |
|
motif finding(discovering) |
4 |
|
multiparty matching |
4 |
|
multipath |
4 |
|
multiple sequence alignment |
4 |
|
navigation |
4 |
|
oblivious transfer |
4 |
|
oblivious transfer (ot) |
4 |
|
online catalog |
4 |
|
phylogenetic analysis |
4 |
|
power selling |
4 |
|
privacy preservation |
4 |
|
privacy-preservation |
4 |
|
progressive alignment |
4 |
|
protein binding |
4 |
|
proteins - chemistry |
4 |
|
pseudo identity |
4 |
|
pseudoidentity |
4 |
|
public-key infrastructure |
4 |
|
querying service |
4 |
|
reads alignments |
4 |
|
scaffold |
4 |
|
secondary structure prediction |
4 |
|
segmental duplications |
4 |
|
sensor networks |
4 |
|
signature verification |
4 |
|
smart grid |
4 |
|
snp calling |
4 |
|
structural variations |
4 |
|
symmetric cryptography |
4 |
|
systematic approaches |
4 |
|
tamper-resistant device |
4 |
|
taxi booking |
4 |
|
technical speaking |
4 |
|
the standard model |
4 |
|
transcription factors - chemistry |
4 |
|
tree optimization |
4 |
|
vehicular sensor network |
4 |
|
verification |
4 |
|
5' untranslated regions - genetics |
3 |
|
accurate |
3 |
|
actuation |
3 |
|
adaptive phentype testing |
3 |
|
alarm systems |
3 |
|
algorithm |
3 |
|
alignment |
3 |
|
alternative splicing - genetics |
3 |
|
alternative splicing pattern |
3 |
|
amino acid sequence |
3 |
|
anonymous authentication |
3 |
|
anonymous fuzzy ibe |
3 |
|
applied cryptography |
3 |
|
arduino |
3 |
|
article |
3 |
|
assembling |
3 |
|
attractive solutions |
3 |
|
attributes |
3 |
|
auxiliary inputs |
3 |
|
biological evolution |
3 |
|
bitcoin simulation model |
3 |
|
bittorrent model |
3 |
|
building block |
3 |
|
bwt |
3 |
|
carrier proteins - genetics |
3 |
|
certificate revocation |
3 |
|
chinese information processing |
3 |
|
chinese shanzhai phones |
3 |
|
chinese word extraction |
3 |
|
cloud forensics |
3 |
|
cloudfront |
3 |
|
cluster-based architecture |
3 |
|
clustering |
3 |
|
code theft detection |
3 |
|
combinatorial group testing (cgt) |
3 |
|
comparative genomics |
3 |
|
computation efficiency |
3 |
|
computational molecular biology |
3 |
|
computational predction |
3 |
|
computer program |
3 |
|
computer-aided design |
3 |
|
computing technology |
3 |
|
confidential forensic investigation |
3 |
|
conserved gene pairs |
3 |
|
conserved genes |
3 |
|
conserved sequence |
3 |
|
conseved metabolic pathways |
3 |
|
context-aware |
3 |
|
contrastive learning |
3 |
|
core protein |
3 |
|
cryptographic primitives |
3 |
|
cryptographic techniques |
3 |
|
cyber-physical system |
3 |
|
data mining - methods |
3 |
|
data privacy |
3 |
|
datamining |
3 |
|
de bruijn graph |
3 |
|
de novo assembly |
3 |
|
de novo transcriptome assembly |
3 |
|
delegation |
3 |
|
deleted data |
3 |
|
digital crimes |
3 |
|
digital evidence |
3 |
|
digital forensics |
3 |
|
distance-based reconstruction |
3 |
|
distributed ca services |
3 |
|
dna composition features |
3 |
|
dna mutational analysis - methods |
3 |
|
dna sequence |
3 |
|
dna, complementary - genetics |
3 |
|
document indexing |
3 |
|
dual cube |
3 |
|
e-lottery |
3 |
|
efficiency improvement |
3 |
|
efficient protocols |
3 |
|
elliptic curve cryptosystems |
3 |
|
environmental genomics |
3 |
|
environmental microbiology |
3 |
|
error rates |
3 |
|
escherichia coli - classification - genetics - isolation and purification |
3 |
|
escherichia coli - genetics |
3 |
|
ests |
3 |
|
exons |
3 |
|
exons - genetics |
3 |
|
experimental studies |
3 |
|
experimentation |
3 |
|
expressed sequence tags |
3 |
|
expressed sequences |
3 |
|
false positive reactions |
3 |
|
fast annotation |
3 |
|
file carving |
3 |
|
file sharing |
3 |
|
firewalls |
3 |
|
flooding |
3 |
|
forensic analysis |
3 |
|
forensic investigation |
3 |
|
forensics technology |
3 |
|
forward-secure signature |
3 |
|
gene expression - genetics |
3 |
|
gene expression regulation |
3 |
|
generic construction |
3 |
|
genome annotation |
3 |
|
genome assembly |
3 |
|
genome, bacterial |
3 |
|
genome, bacterial - genetics |
3 |
|
genomic rearrangements |
3 |
|
goodness measure |
3 |
|
graph neural networks |
3 |
|
greedy-like prediction |
3 |
|
guide trees |
3 |
|
hard disk sector allocation |
3 |
|
heterogeneous information |
3 |
|
heuristic-based address clustering |
3 |
|
hierarchical identity-based cryptosystem |
3 |
|
hierarchical identity-based signature |
3 |
|
high throughput sequencing |
3 |
|
high throughput short reads |
3 |
|
human genome |
3 |
|
hybrid security model |
3 |
|
identity-based encryption |
3 |
|
identity-based partially blind signature |
3 |
|
identity-based signcryption |
3 |
|
image processing |
3 |
|
indexing data structure |
3 |
|
information security |
3 |
|
initial seeders |
3 |
|
inner-product encryption |
3 |
|
integrity verification |
3 |
|
internet censorship |
3 |
|
internet forum |
3 |
|
internet piracy |
3 |
|
internet surveillance |
3 |
|
introns - genetics |
3 |
|
isoforms |
3 |
|
java card |
3 |
|
k-dimensional hashing |
3 |
|
k-mean clustering |
3 |
|
key integrity |
3 |
|
keyword clustering |
3 |
|
knock-out study |
3 |
|
knockout study |
3 |
|
l-mer |
3 |
|
lactobacillus - genetics |
3 |
|
lightweight protocols |
3 |
|
live forensics |
3 |
|
look ahead technology |
3 |
|
machine-learning |
3 |
|
markov chains |
3 |
|
mate-pair |
3 |
|
mathematics |
3 |
|
measurement |
3 |
|
mediatek |
3 |
|
memory analysis |
3 |
|
metabolic network |
3 |
|
metagenomic data analysis |
3 |
|
metagenomics |
3 |
|
metagenomics - methods |
3 |
|
metatranscriptomic reads |
3 |
|
mice, inbred c57bl |
3 |
|
microcontroller |
3 |
|
micrornas |
3 |
|
micrornas - chemistry - genetics |
3 |
|
mining methods and algorithms |
3 |
|
mobile ad hoc network |
3 |
|
mobile ad hoc network (manet) |
3 |
|
models, biological |
3 |
|
models, genetic |
3 |
|
models, molecular |
3 |
|
models, theoretical |
3 |
|
modified chebychev distance |
3 |
|
motif pair |
3 |
|
multiple alignment |
3 |
|
multiprotein complexes - chemistry - metabolism |
3 |
|
multisignature |
3 |
|
mutation |
3 |
|
mutations |
3 |
|
named data networking |
3 |
|
network security |
3 |
|
next generation sequencing |
3 |
|
next-generation sequencing |
3 |
|
non-adaptive complex group testing |
3 |
|
non-transferable property |
3 |
|
np-complete |
3 |
|
pattern recognition, automated - methods |
3 |
|
peer data management systems |
3 |
|
peer to peer |
3 |
|
pentatricopeptide repeat motifs |
3 |
|
pentatricopeptide repeat proteins |
3 |
|
performance |
3 |
|
performance evaluation |
3 |
|
phonebook |
3 |
|
photo forensics |
3 |
|
phylogenetic conservation |
3 |
|
phylogenetic network |
3 |
|
phylogenetic tree reconstruction |
3 |
|
phylogenetic trees |
3 |
|
pkg despotism |
3 |
|
pki |
3 |
|
pooling design |
3 |
|
ppi network |
3 |
|
predicate encryption |
3 |
|
predictive value of tests |
3 |
|
privacy preserving forensics |
3 |
|
privacy-preserving multiple keyword search |
3 |
|
proactive update |
3 |
|
promoter regions, genetic |
3 |
|
protein complexes |
3 |
|
protein domain |
3 |
|
protein interaction mapping |
3 |
|
protein linkage |
3 |
|
protein sequence alignment |
3 |
|
protein structure, tertiary |
3 |
|
protein-protein interaction network |
3 |
|
proteins |
3 |
|
provable security |
3 |
|
public ciphertext authenticity |
3 |
|
public key cryptosystems |
3 |
|
public verifiability |
3 |
|
quantitative trait loci - genetics |
3 |
|
query processing |
3 |
|
rats |
3 |
|
reliability |
3 |
|
remote forensics |
3 |
|
reputation systems |
3 |
|
ring signature |
3 |
|
rna - genetics |
3 |
|
rna binding |
3 |
|
rna editing |
3 |
|
rna splice sites - genetics |
3 |
|
rna-binding proteins - genetics |
3 |
|
roads |
3 |
|
rsa |
3 |
|
schnorr signature |
3 |
|
search on encrypted data |
3 |
|
secure multi-party computation |
3 |
|
security management |
3 |
|
security of data |
3 |
|
self-defense |
3 |
|
self-supervised learning |
3 |
|
semantical security |
3 |
|
semistructured data |
3 |
|
sensitivity analysis |
3 |
|
sequence alignment - methods |
3 |
|
sequence analysis, rna |
3 |
|
service provider |
3 |
|
shanzhai mobile phone |
3 |
|
shifted transversal design |
3 |
|
short read alignment |
3 |
|
side channel attack |
3 |
|
signcryption |
3 |
|
signing key |
3 |
|
similarity measure |
3 |
|
software birthmark |
3 |
|
software protection |
3 |
|
spatio-temporal data mining |
3 |
|
string graph |
3 |
|
structural comparisons |
3 |
|
structural modelling |
3 |
|
synteny |
3 |
|
tamper proofing |
3 |
|
third parties |
3 |
|
threshold cryptography |
3 |
|
threshold partially blind signature |
3 |
|
threshold secret sharing |
3 |
|
ultrametric galled network |
3 |
|
urban computing |
3 |
|
user profiling |
3 |
|
variable overlap sizes |
3 |
|
vehicles |
3 |
|
vehicular ad hoc networks |
3 |
|
verifiable random function |
3 |
|
virus detection |
3 |
|
volatile data |
3 |
|
web crawler |
3 |
|
web organization |
3 |
|
weighted average problem |
3 |
|
whole genome alignment |
3 |
|
xml |
3 |
|
xml/xsl/rdf |
3 |
|
zebrafish - genetics |
3 |
|
access control |
2 |
|
access right delegation |
2 |
|
access rights |
2 |
|
accountability |
2 |
|
ad-hoc and sensor networks |
2 |
|
ad-hoc network |
2 |
|
adaptive random testing |
2 |
|
affine gap |
2 |
|
android |
2 |
|
android security |
2 |
|
anonymity |
2 |
|
anti-censorship |
2 |
|
anticensorship |
2 |
|
application platforms |
2 |
|
applications software |
2 |
|
approximation algorithms |
2 |
|
audio |
2 |
|
base pairing |
2 |
|
basic operation |
2 |
|
bioinformatics |
2 |
|
biometrics |
2 |
|
birthmark |
2 |
|
bitcoin |
2 |
|
blockchain |
2 |
|
brassicaceae |
2 |
|
camelina sativa |
2 |
|
capability leaks |
2 |
|
cell cycle pathway construction |
2 |
|
center of gravity constraint |
2 |
|
certificateless public key encryption |
2 |
|
chained threshold proxy signature with supervision |
2 |
|
chloroplasts |
2 |
|
cloud computing |
2 |
|
collision detection |
2 |
|
color similarity |
2 |
|
compression |
2 |
|
computational complexity |
2 |
|
computational geometry |
2 |
|
computer graphics |
2 |
|
computer science |
2 |
|
computer security |
2 |
|
construcion |
2 |
|
content providers |
2 |
|
content sharing |
2 |
|
control flow |
2 |
|
control flow checking |
2 |
|
copyright |
2 |
|
cp-abe |
2 |
|
data compression - methods |
2 |
|
data flow checking |
2 |
|
data leakage |
2 |
|
data protection |
2 |
|
databases, protein |
2 |
|
de novo |
2 |
|
decryption outsourcing |
2 |
|
delegation certificate |
2 |
|
delegation network |
2 |
|
dense regions |
2 |
|
density measure |
2 |
|
digital contents |
2 |
|
digital credential |
2 |
|
digital identity management |
2 |
|
digital investigation |
2 |
|
digital rights management technology |
2 |
|
directed diffusion |
2 |
|
disordered proteins |
2 |
|
distance learning |
2 |
|
distributed management |
2 |
|
distributed platforms |
2 |
|
dna - genetics |
2 |
|
document management systems |
2 |
|
drug-drug interaction |
2 |
|
dual encryption system |
2 |
|
dual system encryption |
2 |
|
duplication detection |
2 |
|
dynamic separation of duty |
2 |
|
dynamic threshold public key encryption |
2 |
|
e-learning |
2 |
|
ecdsa |
2 |
|
efficiency |
2 |
|
elements |
2 |
|
elliptic curve |
2 |
|
encrypted documents |
2 |
|
event-oriented |
2 |
|
evidence integrity |
2 |
|
evolutionary rate |
2 |
|
execution time |
2 |
|
face anti-spoofing |
2 |
|
file system |
2 |
|
forensics |
2 |
|
forward secrecy |
2 |
|
forward secure threshold signature |
2 |
|
fragmentation point |
2 |
|
fragmented jpeg file |
2 |
|
gene regulation |
2 |
|
general access structure |
2 |
|
genetic variation |
2 |
|
genome, human - genetics |
2 |
|
genomic sequence |
2 |
|
glycine max |
2 |
|
glycine soja |
2 |
|
group signature |
2 |
|
hard disks |
2 |
|
hash value |
2 |
|
hash values |
2 |
|
heap graph |
2 |
|
high-speed quantum key distribution |
2 |
|
ibe |
2 |
|
identity based cryptography |
2 |
|
identity-based cryptography |
2 |
|
identity-based signature |
2 |
|
image adjustment |
2 |
|
incentive mechanism |
2 |
|
incident response |
2 |
|
industrial control systems |
2 |
|
information systems security |
2 |
|
instant message |
2 |
|
integrity check |
2 |
|
internet |
2 |
|
internet of things |
2 |
|
interoperability |
2 |
|
intracellular signaling peptides and proteins - chemistry - genetics - metabolism |
2 |
|
java |
2 |
|
java applet |
2 |
|
javascript |
2 |
|
jpeg file carving |
2 |
|
k-dimension hashing |
2 |
|
k-taa |
2 |
|
key agreement |
2 |
|
key escrow |
2 |
|
key integrity checking |
2 |
|
key-exposure |
2 |
|
leakage-resilience |
2 |
|
leakage-resilient |
2 |
|
learning organizations |
2 |
|
level-2 neighbours |
2 |
|
lineage specificity |
2 |
|
linux kernel |
2 |
|
local structural alignment |
2 |
|
location free |
2 |
|
location privacy-preserving |
2 |
|
logging system |
2 |
|
mapk pathway |
2 |
|
mapk pathway construction |
2 |
|
matrix factorization |
2 |
|
memory efficient algorithm |
2 |
|
memory requirements |
2 |
|
mirna |
2 |
|
mirnas |
2 |
|
mitochondria |
2 |
|
mobile phone |
2 |
|
mobile platform |
2 |
|
mobile social networks |
2 |
|
morf |
2 |
|
multiplicative sharing |
2 |
|
nbs-lrr |
2 |
|
nni distance |
2 |
|
non-coding rna |
2 |
|
non-repudiation |
2 |
|
non-shared edge distance |
2 |
|
noncoding rnas |
2 |
|
nonlinear state estimation |
2 |
|
novel tandem duplication detection |
2 |
|
nucleic acid conformation |
2 |
|
nucleotides - chemistry - genetics |
2 |
|
one-class svm |
2 |
|
online computing |
2 |
|
open sources |
2 |
|
outsourced computation |
2 |
|
paired-end sequencing |
2 |
|
pairing |
2 |
|
pathway construction |
2 |
|
pattern mathching |
2 |
|
phas loci |
2 |
|
phas-phasirna pathway |
2 |
|
phasirna |
2 |
|
phylogenetic tree |
2 |
|
points of interests |
2 |
|
ppr |
2 |
|
prediction |
2 |
|
privilege escalation attack |
2 |
|
programmable logic controllers |
2 |
|
programming logic controller |
2 |
|
protein pathway |
2 |
|
protein pathway construction |
2 |
|
proxy server |
2 |
|
proxy signature |
2 |
|
pseudoknot |
2 |
|
pseudoknots |
2 |
|
public key encryption |
2 |
|
public key infrastructure (pki) |
2 |
|
quantitative association rules |
2 |
|
quantum cryptography |
2 |
|
quantum key distribution |
2 |
|
r-sequences |
2 |
|
random testing |
2 |
|
randomised algorithm |
2 |
|
randomness |
2 |
|
real data sets |
2 |
|
real spontaneity |
2 |
|
regression |
2 |
|
related-key attack |
2 |
|
related-randomness attack |
2 |
|
revocable anonymity |
2 |
|
rna - chemistry - genetics |
2 |
|
rna secondary structures |
2 |
|
rna, untranslated - chemistry - classification |
2 |
|
rna, untranslated - chemistry - genetics |
2 |
|
rna, untranslated - genetics |
2 |
|
rna-seq |
2 |
|
role activation |
2 |
|
role based access control |
2 |
|
runtimes |
2 |
|
secondary structure |
2 |
|
secure browsing |
2 |
|
security mediator |
2 |
|
selective dissemination of information |
2 |
|
self-management and autonomic networks |
2 |
|
sequence analysis, rna - methods |
2 |
|
sequence assembly |
2 |
|
sequences |
2 |
|
shared documents |
2 |
|
short reads |
2 |
|
side effects |
2 |
|
signal transduction |
2 |
|
signal transduction pathway |
2 |
|
signatures |
2 |
|
sliding window analysis |
2 |
|
smart grids |
2 |
|
smart router |
2 |
|
smartcard |
2 |
|
smartphone |
2 |
|
splice junction |
2 |
|
spliced alignment |
2 |
|
spontaneity |
2 |
|
spontaneous anonymous group signature |
2 |
|
stacking pairs |
2 |
|
static taint analysis |
2 |
|
strong selective family |
2 |
|
structural alignment |
2 |
|
system biology |
2 |
|
systems assurance |
2 |
|
taint analysis |
2 |
|
taint checking |
2 |
|
tasirnas and natsirnas |
2 |
|
task-based learning |
2 |
|
text indexing |
2 |
|
threshold proxy signature |
2 |
|
threshold ring signature |
2 |
|
threshold ring signatures |
2 |
|
tissue specificity |
2 |
|
total quality management |
2 |
|
transaction patterns |
2 |
|
transcriptome |
2 |
|
unlinkability |
2 |
|
user revocation |
2 |
|
virtual reality |
2 |
|
visualization |
2 |
|
voice chat |
2 |
|
water treatment system |
2 |
|
wireless sensor networks |
2 |
|
xpath |
2 |
|
acoustic features |
1 |
|
antibiotic resistance gene |
1 |
|
attribute revocation |
1 |
|
attribute-based encryption |
1 |
|
authenticity and integrity |
1 |
|
automatic anomalous sound detection (asd) |
1 |
|
balance theory |
1 |
|
billiards layout generation |
1 |
|
billiards layout prediction |
1 |
|
billiards layout retrieval |
1 |
|
billiards sports analytics |
1 |
|
biomarker discovery |
1 |
|
c4.5 decision tree |
1 |
|
card database |
1 |
|
charm |
1 |
|
chinese character embedding |
1 |
|
chinese new word detection |
1 |
|
chinese word boundary detection |
1 |
|
community |
1 |
|
compact private key |
1 |
|
complex pseudoknot |
1 |
|
consecutive vertex guard |
1 |
|
contact tracing |
1 |
|
cryptographic primitive |
1 |
|
data confidentiality |
1 |
|
dbscan |
1 |
|
decentralization oracle |
1 |
|
discrete cosine transforms |
1 |
|
distributed machine learning |
1 |
|
drug combination |
1 |
|
drug–drug interaction |
1 |
|
edge guard |
1 |
|
encrypted gene expression profiles |
1 |
|
enhanced incremental pca |
1 |
|
exclusion-intersection encryption |
1 |
|
federated learning |
1 |
|
fog computing |
1 |
|
fortress problem |
1 |
|
fully homomorphic encryption |
1 |
|
gall |
1 |
|
genomic structural variation |
1 |
|
heterogeneous features |
1 |
|
image coding |
1 |
|
image forensics |
1 |
|
integer vector encryption |
1 |
|
large language models |
1 |
|
large universe |
1 |
|
matrix completion |
1 |
|
microbe-disease association |
1 |
|
multi-key decryption |
1 |
|
multi-key fully homomorphic encryption |
1 |
|
multiple authorities |
1 |
|
multiple classifier system |
1 |
|
multiple encryption keys |
1 |
|
network community |
1 |
|
non-monopoly |
1 |
|
nonnegative matrix factorization |
1 |
|
oblivious data access |
1 |
|
oblivious ram |
1 |
|
offline/online abe |
1 |
|
one-class classification |
1 |
|
online/offline encryption |
1 |
|
outsourced decryption |
1 |
|
outsourced partitioned data |
1 |
|
outsourcing decryption |
1 |
|
pairings |
1 |
|
partition oram |
1 |
|
pattern recognition, automated |
1 |
|
point-of-interest recommendation |
1 |
|
ppwap |
1 |
|
privacy preserving data mining |
1 |
|
privacy protection |
1 |
|
privacy-preserving elastic net |
1 |
|
privacy-preserving machine learning |
1 |
|
private information retrieval |
1 |
|
private set intersection cardinality |
1 |
|
quantisation (signal) |
1 |
|
recommender systems |
1 |
|
region duplication |
1 |
|
regularization |
1 |
|
regulatory elements, transcriptional |
1 |
|
release-time confidentiality |
1 |
|
repeated dynamic game |
1 |
|
rna |
1 |
|
rna -- structure. |
1 |
|
rna, untranslated - chemistry |
1 |
|
rna. |
1 |
|
rnd efflux pumps |
1 |
|
secure dot product |
1 |
|
secure multiparty computation |
1 |
|
semi-nonnegative matrix factorization |
1 |
|
simple non-standard pseudoknot |
1 |
|
skl |
1 |
|
spectrum-temporal factors analysis |
1 |
|
spin image |
1 |
|
subgroup multisignature |
1 |
|
svd |
1 |
|
svm |
1 |
|
timed-release encryption |
1 |
|
transcription factors - chemistry - metabolism |
1 |
|
transcription factors/genetics |
1 |
|
triple helix |
1 |
|
unsupervised algorithm |
1 |
|
verifiable computation |
1 |
|
weak balance theory |
1 |