Keyphrases
Stance Detection
100%
Data Dynamics
75%
Network Traffic Classification
62%
Graph Learning
50%
Stance Analysis
50%
Asynchronous Federated Learning
50%
Online Linear Optimization
50%
Interaction Graph
50%
COVID-19 Vaccine Uptake
50%
Byzantine Empire
50%
Two-time-scale Approach
50%
Dynamic Feedback
50%
Compromised Accounts
50%
Interdisciplinary Networks
50%
Message Injection
50%
Twitter Dataset
50%
Multi-source
50%
Malicious Data
50%
Data Generator
50%
Decentralized Online Learning
50%
E-commerce Platform
50%
Social Media Platforms
50%
Two-time Scale
50%
Phone number
50%
Network Analysis
50%
Machine Learning Based
50%
Conversation Threads
50%
Feedback Delay
50%
Statistical Features
50%
Rumor Detection
50%
Meituan
50%
Continual Learning
50%
Fake News Detection
50%
Black Box
50%
Traffic Classification
50%
Benchmark Dataset
50%
Temporal Patterns
50%
Injection Attacks
50%
Resilient
50%
Online Management
50%
Edge-cloud Collaborative
50%
Large Language Models
50%
Ride-hailing
50%
F1 Score
44%
Detection Method
42%
Detection Dataset
40%
Local Model
37%
Classification Model
37%
Mobile Operators
33%
Regret Bounds
30%
Social Media
25%
Long-term Costs
25%
Evaluation Results
25%
Model Aggregation
25%
Large-scale Networks
25%
Deep Learning Training
25%
Online Optimization
25%
Lyapunov Optimization
25%
Model Dynamics
25%
Model Convergence
25%
Training Model
25%
Fake News
25%
Communication Cost
25%
Time Application
25%
Low Computation
25%
Network Change
25%
Data Heterogeneity
25%
Geographical Location
25%
Optimization Framework
25%
Coupling Effect
25%
Generated Data
25%
Error Bound
25%
Global Constraints
25%
Deep Learning
25%
Distributed Deep Learning
25%
Compromise Model
25%
Dynamic Offloading
25%
Computational Node
25%
Uncertain Future
25%
Computation Capability
25%
Continuous Training
25%
Fine Time-scales
25%
Model Synchronization
25%
Synchronization Frequency
25%
Data Offloading
25%
Online Offloading
25%
Contextual Information
21%
Real-world Application
20%
Multiple Agents
20%
Network Edge
20%
Planning Task
20%
White-box
20%
Attack Strategy
20%
Network Applications
20%
Ride-hailing Services
20%
Regret
20%
Detection Model
18%
Online Social Platforms
16%
Byzantine Attacks
16%
Feature Encoder
16%
Evolutionary Interactions
16%
Twitter
16%
Operation Feature
16%
Popular
16%
Encoder
16%
Weibo
16%
Feature Pattern
16%
Pattern Features
16%
Feature Fusion Model
16%
Central Server
16%
State-of-the-art Techniques
15%
Individual Regret
12%
Offline Classification
12%
Theoretical Performance Analysis
12%
Analysis Efficiency
12%
C++ Implementation
12%
Network Analysis Tools
12%
Multiprocessing
12%
Large-scale Network Analysis
12%
Source Network
12%
Open-source Tools
12%
Local Data
12%
Data Traces
12%
Python
12%
Operational Efficiency
12%
Decentralized Network
12%
Clairvoyance
12%
On the Fly
12%
Online Learning Algorithm
12%
Network Mining
12%
Network Data
12%
Data Mining Techniques
12%
Performance Evaluation
12%
Physics Chemistry
12%
Steady State
12%
Online Decision
12%
Mobile Phone Application
10%
Distributed Matching
10%
Joint Matching
10%
Planning Solutions
10%
Black-box Adversarial Attack
10%
Surrogate-based
10%
Data Box
10%
Late Development
10%
Tight Lower Bound
10%
Prediction Quality
10%
Planning Strategy
10%
Neural Network Model
10%
User Data
10%
Graph Neural Network
10%
Black Hole Attack
10%
Solution Scheme
10%
Machine Learning Techniques
10%
Vanilla
10%
Surrogate Model
10%
Unrealistic Assumptions
10%
Propagation Tree
10%
Message Propagation
10%
Take-the-first
10%
Door-to-door
10%
Misinformation
10%
Near-optimal
10%
Malicious Message
10%
Cost Function
10%
Sustainable Transportation
10%
Politicians
8%
Distinctive Capabilities
8%
Sub-linear Regret
8%
Optimal Classification Model
8%
Vaccination
8%
Application Identification
8%
Distributed Streaming
8%
Political Issues
8%
News Data
8%
Cross-source
8%
New Dataset
8%
Social Issues
8%
Human Behavior
8%
Online Sources
8%
News Sources
8%
Unseen
8%
Network Anomaly Detection
8%
Social Platform
8%
Distributed Machine Learning
8%
Polynomial Complexity
8%
News Outlets
8%
Adversarial Agents
8%
Machine Learning Paradigms
8%
Fact-checking
8%
Diverse Sources
8%
Messaging Apps
8%
Online Learning
8%
Social Context
8%
Online News
8%
Vulnerability
8%
Rapid Growth
8%
Learning Algorithm
8%
Streaming Data
8%
Learning Process
8%
SemEval
7%
Computer Science
Social Platform
100%
Traffic Classification
100%
Detection Method
75%
Network Traffic
62%
Electronic Learning
58%
Evaluation Result
58%
Deep Learning Method
50%
Data Instance
50%
Federated Learning
50%
Linear Optimization
50%
Data Stream
50%
Large Language Model
50%
Social Context
50%
Multiprocessing
50%
Open Source Tool
50%
Statistical Feature
50%
Contextual Information
50%
Data Type
50%
Social Medium Platform
50%
Open Source
50%
Machine Learning
50%
Learning System
50%
Classification Models
45%
Mobile Operator
33%
Optimization Framework
25%
Real-Time Application
25%
Communication Cost
25%
Lyapunov Optimization
25%
Computation Node
25%
Data Heterogeneity
25%
Political Issue
25%
Global Constraint
25%
Optimization Technique
25%
Computation Capability
25%
Training Model
25%
Large Data Set
25%
World Application
20%
Mild Condition
20%
Multiple Agents
20%
Learning Algorithm
20%
Network Application
20%
Misinformation
16%
Adversarial Machine Learning
16%
User Data
16%
Black-Box Attack
16%
Graph Neural Network
16%
Mobile Phone Application
16%
Sustainable Transportation
16%
Application Account
16%
Malicious Message
16%
Bidirectional Encoder Representations From Transformers
16%
Sentiment Analysis
16%
Feature Fusion
16%
Benchmarking
16%
Authentication
16%
Baseline Model
16%
Machine Learning Technique
16%
Research Direction
16%
Annotation
16%
Performance Evaluation
12%
Performance Analysis
12%
Learning Process
8%
Time Complexity
8%
Data Streaming
8%
Distributed Machine Learning
8%
Polynomial Time
8%
Anomaly Detection
8%