ایمیل : برای مشاهده ایمیل لطفا وارد حساب کاربری خود شوید
تعداد ارجاع : 26266
i10-index : 215
h-index : 66
وب سایت دانشگاه : https://www.eurecom.fr
Communications
signal processing
information theory
machine learning
Unmanned Aerial Vehicles
Performance Analysis
Wireless Networks
Social Networks
Optimization
Machine Learning
Wireless Communications & Networking - Communication Theory - Deep Learning
Electrical Engineering
computer science
computer security
communications
networking
cryptography
statistical signal processing
wireless communications
audio
Biometrics
Video Surveillance
Image Forensics
Pattern Recognition
3D Image Processing
Computer Security
Réseaux Mobiles
IoT
wireless networks
Network protocols/architecture
performance evaluation
Scalable Algorithms
Probabilistic Machine Learning
Stochastic Optimization
dependability
intrusion detection
Vehicular communication and networks
High precision positioning
Traffic modeling
ITS
speaker recognition
anti-spoofing
presentation attack detection
privacy preservation
pseudonymisation
Artificial Intelligence
Semantic Web
Natural Language Processing
Knowledge Graph
RecSys
agile and flexible wireless networking and computing systems
embedded systems
telephony fraud
Data Management
Information Quality
WoT
MEC
Cybersecurity
Bayesian Inference
Computational Statistics
Multimedia Understanding
Multimodal Fusion
Socially-Aware Multimedia
Deep Learning
Video Hyperlinking
Caching
Wireless Communications
Information Theory
biometrics
Signal Processing
Mobile Communications
Channel Modeling
Algorithms
Distributed Systems
computer and web security
Speaker Diarization
systems
distributed systems
embedded
Embedded Systems Security
Named Entities Recognition
AI/ML
5G
management and orchestration
M2M/IoT
NFV/SDN/C-RAN
Propagation
Channel modeling
Audio Security and Privacy
Speaker Recognition
Network Protocols
Video summarization
Multimedia retrieval
Multimedia processing
Image processing
Computer vision
Physical Layer Security
Coded Caching
stochastic modelling
Cryptography
Spoof Speech Detection
Spech Processing
Speaker Recognition.
Web Semantic
Multimedia
Linked Data
Cloud Computing
IaaS
numerical analysis
statistics
applied mathematics
probabilistic numerics
Computer security
Spam
Cyber crime
Networking
mammography
deep learning
Wireless Communication
Mobile Communication
Millimeter Wave Communication
Terahertz Communication
Internet of Things
Computer Vision
Privacy
Distributed Machine Learning
Wireless Network
Distributed Computing
Natural Language
Software Defined Network
Signal processing
Wireless communication
WLAN
Femto caching
speaker diarization
Knowledge Graphs
Recommender Systems
Autonomous Systems
Multimedia Hyperlinking
Socially-aware Multimedia
Multimedia Retrieval
Performance
Modeling
Networks
Network Coding
Stochastic Geometry
Statistical Signal Processing
artificial intelligence
brain-computer interfaces.
Wireless Networking
software security
Communication Security
System security
web security
Information theory
Wireless communications
Network Security
Applied Cryptography
Computer Networks
Privacy Enhancing Technologies
Audio Signal
Acoustics
Acoustic Scene Recognition
Face recognition
Security
Secure Programming
Program Verification
Program Dependence Graph
Feedback to developers
Scheduling
Traffic Simulation
Cyber insurance
risk prediction
Virtual Reality
Streaming 360
Intelligent transportation system
traffic modeling and simulation
traffic control
Software Security
Fuzzing
Data Science
Fact Checking
Bayesian Statistics
System Security
Mobile Security
Data Intensive Scalable Computing
Parallel Algorithm Design
Deep Modeling
Work Sharing
Full-Duplex
Privacy-preserving Machine Learning Techniques
Virtualization
Big Data Processing Frameworks
Data Analysis
Smart Objects
Autonomous Driving
Recommender System
NLP
homomorphic encryption
secure multiparty computation
biometric identification
secure machine learning
network security
Data Mining
Spectral analysis
Graph Signal Processing
5g
Network slicing
NFV
SDN
Cyber Security
Blockchain
Education
Distributed System
Coding Theory
Bayesian deep learning
sensor fusion
computer vision
bayesian inference
Machine learning
Deep learning
Stochastics
Network Science
Cell-Free Massive MIMO
Digital security
Model monitorin
stochastic gradient optimization
Media Forensics
Camera Identification
Forgery Detection
Telecommunications
Digital Transformation
Physical layer techniques
تهرانخیابان شهید بهشتی، نرسیده به میدان تختی، خیابان کاووسی فر، کوچه نکیسا، پلاک ۳، طبقه سوم
۰۲۱۸۸۷۵۱۷۸۴
info@ostad-yab.com
Email Finder Chrome Extension