Computer Science
Access Network
100%
Data Hiding
77%
Dynamic Spectrum Access
68%
User
59%
Attack
49%
Steganalysis
49%
Dynamic Spectrum Access
44%
Channels
39%
Algorithms
37%
Experimental Result
36%
Secondary User
31%
Wireless Networks
31%
Application
29%
Cognitive Radio Networks
29%
Steganography
28%
Cognitive Radio
28%
Quality of Service
27%
Social Network
25%
Encryption
25%
Detection
23%
Data Hiding Scheme
22%
Social Network
21%
Models
20%
spectrum band
19%
Cognitive Radio Network
19%
e-Mail
19%
multiple description coding
19%
Secondary User
18%
Attackers
17%
stego image
16%
Computation Offloading
16%
Wireless Device
16%
Quantization Index
16%
Experimental Result
16%
Denial-of-Service
15%
Encryption Scheme
15%
Mobile Device
15%
Mobile Device
15%
Links
15%
Scheduling
15%
Security Vulnerability
14%
Embedding
14%
Media Access Control
14%
Optimization Problem
14%
Wireless Channel
13%
Nash Equilibrium
13%
Messages
13%
Denial of Service Attack
13%
Communication
13%
spectrum sharing
12%
Engineering
Dynamic Spectrum Access
47%
Joint Source
37%
Primary User
25%
Secondary User
24%
Quality of Service
20%
Joints (Structural Components)
17%
Cognitive Radio Networks
15%
Length Code
14%
Channel Decoder
14%
Maximum a Posteriori
14%
Modulation Index
12%
Quantization Index
12%
Optimisation Problem
10%
Nodes
10%
Posteriori Probability
9%
MPEG
9%
Nash Equilibrium
8%
Transmissions
8%
Channel Error
8%
Interference Temperature
8%
Cognitive Radio
7%
Simulation Result
7%
Nonlinear Optimization
7%
Battery Power
7%
Quantizer
6%
Decoding
6%
Error
6%
Optimization
6%
Model Building
6%
Level Quantizer
6%
Codebook Design
6%
Secondary Spectrum
6%
Multiuser
6%
Rate Control
6%
Channel Estimation
6%
Channel Modeling
6%
Memoryless Source
6%
HetNets
6%
Spectrum Access
5%