Computer Science
Attack
100%
Differential Privacy
93%
Utilities
39%
Frequency Estimation
37%
Algorithms
34%
Robust Optimization
30%
Integer-Linear Programming
27%
Optimization Problem
25%
Security Properties
25%
Side Channel Attack
25%
Privacy Leakage
16%
Sensitive Informations
14%
Communication Bandwidth
12%
Privacy Preservation
12%
Average Consensus
12%
Communication
12%
Privacy Preserving
12%
Fisher Information
12%
Generic Algorithm
12%
Neural Network
12%
Federated Learning
12%
Distributed Optimization
12%
Decentralized Federated Learning
12%
Cyber Physical Systems
12%
Numerical Domain
8%
Accuracy
8%
Data Aggregator
8%
User Privacy
8%
closed-form expression
8%
Convex Optimization
8%
Attackers
7%
Computation
6%
Basic Building Block
6%
Postprocessing Step
6%
Data Collector
6%
Superior Performance
6%
Adversary Model
6%
Communication Cost
6%
Computational Complexity
6%
Consensus Algorithm
6%
Communication Overhead
6%
Numerical Simulation
6%
Links
6%
Encryption Method
6%
Distributed Computing
6%
Shutdown System
6%
Data Aggregation
6%
Individual User
6%
Time Complexity
6%
Intelligence Data
6%
Arts and Humanities
agentive
12%
Indo-European Languages
12%
Ergative
12%
Neuter
12%
Albanians
12%
Proto-Indo-European
6%
Anatolian languages
6%
case endings
6%
Nouns
6%
Impossible
6%
ergative case
6%
Appearings
6%
Reanalysis
6%
Gender
6%
Old Hittite
6%
Neutral
6%
neuter gender
6%
nominative
6%