algorithms |
13 |
animals |
8 |
genome |
8 |
humans |
8 |
privacy |
8 |
sequence analysis, dna |
8 |
sequence analysis, protein - methods |
8 |
bloom filter |
7 |
distributed denial-of-service (ddos) |
7 |
homomorphic encryption |
7 |
intrusion detection |
7 |
routers |
7 |
sequence analysis, dna - methods |
7 |
testbed |
7 |
artificial intelligence |
6 |
authentication |
6 |
base sequence |
6 |
blind signature |
6 |
computational biology - methods |
6 |
models, chemical |
6 |
molecular sequence data |
6 |
security |
6 |
sequence alignment |
6 |
software |
6 |
tracking |
6 |
alternative splicing |
5 |
anonymous credential |
5 |
bilinear pairings |
5 |
binding energy |
5 |
binning |
5 |
cluster analysis |
5 |
combinatorial group testing |
5 |
commutative encryption |
5 |
computer simulation |
5 |
conserved sequence - genetics |
5 |
cryptography |
5 |
dna microarray |
5 |
evolution, molecular |
5 |
hard disk integrity |
5 |
mice |
5 |
motif finding |
5 |
phylogeny |
5 |
privacy preserving |
5 |
privacy-preserving |
5 |
protein interaction mapping - methods |
5 |
proteins - chemistry - metabolism |
5 |
proxy re-encryption |
5 |
secure vehicular sensor network |
5 |
smart grid network |
5 |
transcription factor |
5 |
vehicular ad hoc network |
5 |
3-dimension hashing |
4 |
access policies |
4 |
amino acid motifs |
4 |
anonymous routing |
4 |
assembly |
4 |
authenticatiion |
4 |
batch verification |
4 |
batch vertification |
4 |
binding site |
4 |
binding sites |
4 |
china |
4 |
chromosome mapping - methods |
4 |
commitment |
4 |
complex structure |
4 |
computational tools |
4 |
computer forensics |
4 |
computer networks |
4 |
contig |
4 |
contig mapping |
4 |
data mining |
4 |
data-base servers |
4 |
database |
4 |
database operation |
4 |
database records |
4 |
databases, genetic |
4 |
decision tree |
4 |
diet - veterinary |
4 |
digital arithmetic |
4 |
digital forensic engineering |
4 |
dna - chemistry |
4 |
dogs |
4 |
dynamic programming |
4 |
electric vehicle |
4 |
electronic crime countermeasures |
4 |
error correction |
4 |
event data recorder |
4 |
fake route |
4 |
female |
4 |
fertility - genetics - physiology |
4 |
forward security |
4 |
gap-filling |
4 |
genetic disease |
4 |
genome - genetics |
4 |
genome, human |
4 |
genomics |
4 |
group communication |
4 |
group communications |
4 |
heterozygote |
4 |
hidden markov model |
4 |
hmac |
4 |
human chromosomes |
4 |
human genomes |
4 |
latent sector errors (lses) |
4 |
legal professional privilege (lpp) |
4 |
low coverage |
4 |
manets |
4 |
message classification |
4 |
metrics |
4 |
models, statistical |
4 |
motif finding(discovering) |
4 |
multigene family - genetics |
4 |
multiparty matching |
4 |
multipath |
4 |
multiple sequence alignment |
4 |
navigation |
4 |
oblivious transfer |
4 |
oblivious transfer (ot) |
4 |
online catalog |
4 |
phylogenetic analysis |
4 |
polymorphism, single nucleotide - genetics |
4 |
power selling |
4 |
privacy preservation |
4 |
privacy-preservation |
4 |
progressive alignment |
4 |
protein binding |
4 |
proteins - chemistry |
4 |
pseudo identity |
4 |
pseudoidentity |
4 |
public-key infrastructure |
4 |
querying service |
4 |
reads alignments |
4 |
receptors, g-protein-coupled - genetics |
4 |
scaffold |
4 |
secondary structure prediction |
4 |
segmental duplications |
4 |
sensor networks |
4 |
signature verification |
4 |
smart grid |
4 |
snp calling |
4 |
structural variations |
4 |
symmetric cryptography |
4 |
synteny - genetics |
4 |
systematic approaches |
4 |
tamper-resistant device |
4 |
taxi booking |
4 |
technical speaking |
4 |
the standard model |
4 |
transcription factors - chemistry |
4 |
tree optimization |
4 |
ursidae - classification - genetics - physiology |
4 |
vehicular sensor network |
4 |
verification |
4 |
5' untranslated regions - genetics |
3 |
accurate |
3 |
actuation |
3 |
adaptive phentype testing |
3 |
alarm systems |
3 |
algorithm |
3 |
alignment |
3 |
alternative splicing - genetics |
3 |
alternative splicing pattern |
3 |
amino acid sequence |
3 |
anonymous authentication |
3 |
anonymous fuzzy ibe |
3 |
applied cryptography |
3 |
arduino |
3 |
article |
3 |
assembling |
3 |
attractive solutions |
3 |
attributes |
3 |
auxiliary inputs |
3 |
biological evolution |
3 |
bitcoin simulation model |
3 |
bittorrent model |
3 |
building block |
3 |
bwt |
3 |
carrier proteins - genetics |
3 |
certificate revocation |
3 |
chinese information processing |
3 |
chinese shanzhai phones |
3 |
chinese word extraction |
3 |
cloud forensics |
3 |
cloudfront |
3 |
cluster-based architecture |
3 |
clustering |
3 |
code theft detection |
3 |
combinatorial group testing (cgt) |
3 |
comparative genomics |
3 |
computation efficiency |
3 |
computational molecular biology |
3 |
computational predction |
3 |
computer program |
3 |
computer-aided design |
3 |
computing technology |
3 |
confidential forensic investigation |
3 |
conserved gene pairs |
3 |
conserved genes |
3 |
conserved sequence |
3 |
conseved metabolic pathways |
3 |
context-aware |
3 |
core protein |
3 |
cryptographic primitives |
3 |
cryptographic techniques |
3 |
cyber-physical system |
3 |
data mining - methods |
3 |
data privacy |
3 |
datamining |
3 |
de bruijn graph |
3 |
de novo assembly |
3 |
de novo transcriptome assembly |
3 |
delegation |
3 |
deleted data |
3 |
digital crimes |
3 |
digital evidence |
3 |
digital forensics |
3 |
distance-based reconstruction |
3 |
distributed ca services |
3 |
dna composition features |
3 |
dna mutational analysis - methods |
3 |
dna sequence |
3 |
dna, complementary - genetics |
3 |
document indexing |
3 |
dual cube |
3 |
e-lottery |
3 |
efficiency improvement |
3 |
efficient protocols |
3 |
elliptic curve cryptosystems |
3 |
environmental genomics |
3 |
environmental microbiology |
3 |
error rates |
3 |
escherichia coli - classification - genetics - isolation and purification |
3 |
escherichia coli - genetics |
3 |
ests |
3 |
exons |
3 |
exons - genetics |
3 |
experimental studies |
3 |
experimentation |
3 |
expressed sequence tags |
3 |
expressed sequences |
3 |
false positive reactions |
3 |
fast annotation |
3 |
file carving |
3 |
file sharing |
3 |
firewalls |
3 |
flooding |
3 |
forensic analysis |
3 |
forensic investigation |
3 |
forensics technology |
3 |
forward-secure signature |
3 |
gene expression - genetics |
3 |
gene expression regulation |
3 |
generic construction |
3 |
genome assembly |
3 |
genome, bacterial |
3 |
genome, bacterial - genetics |
3 |
genomic rearrangements |
3 |
goodness measure |
3 |
greedy-like prediction |
3 |
guide trees |
3 |
hard disk sector allocation |
3 |
heterogeneous information |
3 |
heuristic-based address clustering |
3 |
hierarchical identity-based cryptosystem |
3 |
hierarchical identity-based signature |
3 |
high throughput sequencing |
3 |
high throughput short reads |
3 |
human genome |
3 |
hybrid security model |
3 |
identity-based encryption |
3 |
identity-based partially blind signature |
3 |
identity-based signcryption |
3 |
image processing |
3 |
indexing data structure |
3 |
information security |
3 |
initial seeders |
3 |
inner-product encryption |
3 |
integrity verification |
3 |
internet censorship |
3 |
internet forum |
3 |
internet piracy |
3 |
internet surveillance |
3 |
introns - genetics |
3 |
isoforms |
3 |
java card |
3 |
k-dimensional hashing |
3 |
k-mean clustering |
3 |
key integrity |
3 |
keyword clustering |
3 |
knock-out study |
3 |
knockout study |
3 |
l-mer |
3 |
lactobacillus - genetics |
3 |
lightweight protocols |
3 |
live forensics |
3 |
look ahead technology |
3 |
machine learning |
3 |
machine-learning |
3 |
markov chains |
3 |
mate-pair |
3 |
mathematics |
3 |
measurement |
3 |
mediatek |
3 |
memory analysis |
3 |
metabolic network |
3 |
metagenomic data analysis |
3 |
metagenomics |
3 |
metagenomics - methods |
3 |
metatranscriptomic reads |
3 |
mice, inbred c57bl |
3 |
microcontroller |
3 |
micrornas |
3 |
micrornas - chemistry - genetics |
3 |
mining methods and algorithms |
3 |
mobile ad hoc network |
3 |
mobile ad hoc network (manet) |
3 |
models, biological |
3 |
models, genetic |
3 |
models, molecular |
3 |
models, theoretical |
3 |
modified chebychev distance |
3 |
motif pair |
3 |
multiple alignment |
3 |
multiprotein complexes - chemistry - metabolism |
3 |
multisignature |
3 |
mutation |
3 |
mutations |
3 |
named data networking |
3 |
network security |
3 |
next generation sequencing |
3 |
next-generation sequencing |
3 |
non-adaptive complex group testing |
3 |
non-transferable property |
3 |
np-complete |
3 |
pattern recognition, automated - methods |
3 |
peer data management systems |
3 |
peer to peer |
3 |
performance |
3 |
performance evaluation |
3 |
phonebook |
3 |
photo forensics |
3 |
phylogenetic conservation |
3 |
phylogenetic network |
3 |
phylogenetic tree reconstruction |
3 |
phylogenetic trees |
3 |
pkg despotism |
3 |
pki |
3 |
pooling design |
3 |
ppi network |
3 |
predicate encryption |
3 |
predictive value of tests |
3 |
privacy preserving forensics |
3 |
privacy-preserving multiple keyword search |
3 |
proactive update |
3 |
promoter regions, genetic |
3 |
protein complexes |
3 |
protein domain |
3 |
protein interaction mapping |
3 |
protein linkage |
3 |
protein sequence alignment |
3 |
protein structure, tertiary |
3 |
protein-protein interaction network |
3 |
proteins |
3 |
provable security |
3 |
public ciphertext authenticity |
3 |
public key cryptosystems |
3 |
public verifiability |
3 |
quantitative trait loci - genetics |
3 |
query processing |
3 |
rats |
3 |
reliability |
3 |
remote forensics |
3 |
reputation systems |
3 |
ring signature |
3 |
rna - genetics |
3 |
rna splice sites - genetics |
3 |
rna-binding proteins - genetics |
3 |
roads |
3 |
rsa |
3 |
search on encrypted data |
3 |
secure multi-party computation |
3 |
security management |
3 |
security of data |
3 |
self-defense |
3 |
semantical security |
3 |
semistructured data |
3 |
sensitivity analysis |
3 |
sequence alignment - methods |
3 |
sequence analysis, rna |
3 |
service provider |
3 |
shanzhai mobile phone |
3 |
shifted transversal design |
3 |
short read alignment |
3 |
side channel attack |
3 |
signcryption |
3 |
signing key |
3 |
similarity measure |
3 |
software birthmark |
3 |
software protection |
3 |
string graph |
3 |
structural comparisons |
3 |
synteny |
3 |
tamper proofing |
3 |
third parties |
3 |
threshold cryptography |
3 |
threshold partially blind signature |
3 |
threshold secret sharing |
3 |
ultrametric galled network |
3 |
user profiling |
3 |
variable overlap sizes |
3 |
vehicles |
3 |
vehicular ad hoc networks |
3 |
verifiable random function |
3 |
virus detection |
3 |
volatile data |
3 |
web crawler |
3 |
web organization |
3 |
weighted average problem |
3 |
whole genome alignment |
3 |
xml |
3 |
xml/xsl/rdf |
3 |
zebrafish - genetics |
3 |
access control |
2 |
access right delegation |
2 |
access rights |
2 |
accountability |
2 |
ad-hoc and sensor networks |
2 |
ad-hoc network |
2 |
adaptive random testing |
2 |
affine gap |
2 |
android |
2 |
android security |
2 |
anonymity |
2 |
anti-censorship |
2 |
anticensorship |
2 |
application platforms |
2 |
applications software |
2 |
approximation algorithms |
2 |
audio |
2 |
base pairing |
2 |
basic operation |
2 |
bioinformatics |
2 |
biometrics |
2 |
birthmark |
2 |
bitcoin |
2 |
blockchain |
2 |
brassicaceae |
2 |
camelina sativa |
2 |
capability leaks |
2 |
cell cycle pathway construction |
2 |
center of gravity constraint |
2 |
certificateless public key encryption |
2 |
chained threshold proxy signature with supervision |
2 |
chloroplasts |
2 |
cloud computing |
2 |
collision detection |
2 |
color similarity |
2 |
compression |
2 |
computational complexity |
2 |
computational geometry |
2 |
computer graphics |
2 |
computer science |
2 |
computer security |
2 |
construcion |
2 |
content providers |
2 |
content sharing |
2 |
control flow |
2 |
control flow checking |
2 |
copyright |
2 |
cp-abe |
2 |
data compression - methods |
2 |
data flow checking |
2 |
data leakage |
2 |
data protection |
2 |
databases, protein |
2 |
de novo |
2 |
decryption outsourcing |
2 |
delegation certificate |
2 |
delegation network |
2 |
dense regions |
2 |
density measure |
2 |
digital contents |
2 |
digital credential |
2 |
digital identity management |
2 |
digital investigation |
2 |
digital rights management technology |
2 |
directed diffusion |
2 |
disordered proteins |
2 |
distance learning |
2 |
distributed management |
2 |
distributed platforms |
2 |
dna - genetics |
2 |
document management systems |
2 |
drug-drug interaction |
2 |
dual encryption system |
2 |
dual system encryption |
2 |
duplication detection |
2 |
dynamic separation of duty |
2 |
dynamic threshold public key encryption |
2 |
e-learning |
2 |
ecdsa |
2 |
efficiency |
2 |
elements |
2 |
elliptic curve |
2 |
encrypted documents |
2 |
event-oriented |
2 |
evidence integrity |
2 |
evolutionary rate |
2 |
execution time |
2 |
face anti-spoofing |
2 |
file system |
2 |
forensics |
2 |
forward secrecy |
2 |
forward secure threshold signature |
2 |
fragmentation point |
2 |
fragmented jpeg file |
2 |
gene regulation |
2 |
general access structure |
2 |
genetic variation |
2 |
genome annotation |
2 |
genome, human - genetics |
2 |
genomic sequence |
2 |
glycine max |
2 |
glycine soja |
2 |
group signature |
2 |
hard disks |
2 |
hash value |
2 |
hash values |
2 |
heap graph |
2 |
high-speed quantum key distribution |
2 |
ibe |
2 |
identity based cryptography |
2 |
identity-based cryptography |
2 |
identity-based signature |
2 |
image adjustment |
2 |
incident response |
2 |
industrial control systems |
2 |
information systems security |
2 |
instant message |
2 |
integrity check |
2 |
internet |
2 |
internet of things |
2 |
interoperability |
2 |
intracellular signaling peptides and proteins - chemistry - genetics - metabolism |
2 |
java |
2 |
java applet |
2 |
javascript |
2 |
jpeg file carving |
2 |
k-dimension hashing |
2 |
k-taa |
2 |
key agreement |
2 |
key escrow |
2 |
key integrity checking |
2 |
key-exposure |
2 |
leakage-resilience |
2 |
leakage-resilient |
2 |
learning organizations |
2 |
level-2 neighbours |
2 |
lineage specificity |
2 |
linux kernel |
2 |
local structural alignment |
2 |
location free |
2 |
location privacy-preserving |
2 |
logging system |
2 |
mapk pathway |
2 |
mapk pathway construction |
2 |
matrix factorization |
2 |
memory efficient algorithm |
2 |
memory requirements |
2 |
mirna |
2 |
mirnas |
2 |
mitochondria |
2 |
mobile phone |
2 |
mobile platform |
2 |
mobile social networks |
2 |
morf |
2 |
multiplicative sharing |
2 |
nbs-lrr |
2 |
nni distance |
2 |
non-coding rna |
2 |
non-repudiation |
2 |
non-shared edge distance |
2 |
noncoding rnas |
2 |
nonlinear state estimation |
2 |
novel tandem duplication detection |
2 |
nucleic acid conformation |
2 |
nucleotides - chemistry - genetics |
2 |
one-class svm |
2 |
online computing |
2 |
open sources |
2 |
outsourced computation |
2 |
paired-end sequencing |
2 |
pairing |
2 |
pathway construction |
2 |
pattern mathching |
2 |
pentatricopeptide repeat motifs |
2 |
pentatricopeptide repeat proteins |
2 |
phas loci |
2 |
phas-phasirna pathway |
2 |
phasirna |
2 |
phylogenetic tree |
2 |
points of interests |
2 |
ppr |
2 |
prediction |
2 |
privilege escalation attack |
2 |
programmable logic controllers |
2 |
programming logic controller |
2 |
protein pathway |
2 |
protein pathway construction |
2 |
proxy server |
2 |
proxy signature |
2 |
pseudoknot |
2 |
pseudoknots |
2 |
public key encryption |
2 |
public key infrastructure (pki) |
2 |
quantitative association rules |
2 |
quantum cryptography |
2 |
quantum key distribution |
2 |
r-sequences |
2 |
random testing |
2 |
randomised algorithm |
2 |
randomness |
2 |
real data sets |
2 |
real spontaneity |
2 |
regression |
2 |
related-key attack |
2 |
related-randomness attack |
2 |
revocable anonymity |
2 |
rna - chemistry - genetics |
2 |
rna binding |
2 |
rna editing |
2 |
rna secondary structures |
2 |
rna, untranslated - chemistry - classification |
2 |
rna, untranslated - chemistry - genetics |
2 |
rna, untranslated - genetics |
2 |
rna-seq |
2 |
role activation |
2 |
role based access control |
2 |
runtimes |
2 |
schnorr signature |
2 |
secondary structure |
2 |
secure browsing |
2 |
security mediator |
2 |
selective dissemination of information |
2 |
self-management and autonomic networks |
2 |
sequence analysis, rna - methods |
2 |
sequence assembly |
2 |
sequences |
2 |
shared documents |
2 |
short reads |
2 |
side effects |
2 |
signal transduction |
2 |
signal transduction pathway |
2 |
signatures |
2 |
sliding window analysis |
2 |
smart grids |
2 |
smart router |
2 |
smartcard |
2 |
smartphone |
2 |
splice junction |
2 |
spliced alignment |
2 |
spontaneity |
2 |
spontaneous anonymous group signature |
2 |
stacking pairs |
2 |
static taint analysis |
2 |
strong selective family |
2 |
structural alignment |
2 |
structural modelling |
2 |
system biology |
2 |
systems assurance |
2 |
taint analysis |
2 |
taint checking |
2 |
tasirnas and natsirnas |
2 |
task-based learning |
2 |
text indexing |
2 |
threshold proxy signature |
2 |
threshold ring signature |
2 |
threshold ring signatures |
2 |
tissue specificity |
2 |
total quality management |
2 |
transaction patterns |
2 |
transcriptome |
2 |
unlinkability |
2 |
user revocation |
2 |
virtual reality |
2 |
visualization |
2 |
voice chat |
2 |
water treatment system |
2 |
wireless sensor networks |
2 |
xpath |
2 |
acoustic features |
1 |
antibiotic resistance gene |
1 |
attribute revocation |
1 |
attribute-based encryption |
1 |
authenticity and integrity |
1 |
automatic anomalous sound detection (asd) |
1 |
balance theory |
1 |
biomarker discovery |
1 |
c4.5 decision tree |
1 |
card database |
1 |
charm |
1 |
chinese character embedding |
1 |
chinese new word detection |
1 |
chinese word boundary detection |
1 |
community |
1 |
compact private key |
1 |
complex pseudoknot |
1 |
consecutive vertex guard |
1 |
contact tracing |
1 |
cryptographic primitive |
1 |
data confidentiality |
1 |
dbscan |
1 |
discrete cosine transforms |
1 |
distributed machine learning |
1 |
drug combination |
1 |
drug–drug interaction |
1 |
edge guard |
1 |
encrypted gene expression profiles |
1 |
enhanced incremental pca |
1 |
exclusion-intersection encryption |
1 |
federated learning |
1 |
fog computing |
1 |
fortress problem |
1 |
fully homomorphic encryption |
1 |
gall |
1 |
genomic structural variation |
1 |
heterogeneous features |
1 |
image coding |
1 |
image forensics |
1 |
incentive mechanism |
1 |
integer vector encryption |
1 |
large universe |
1 |
matrix completion |
1 |
microbe-disease association |
1 |
multi-key decryption |
1 |
multi-key fully homomorphic encryption |
1 |
multiple authorities |
1 |
multiple classifier system |
1 |
multiple encryption keys |
1 |
network community |
1 |
non-monopoly |
1 |
nonnegative matrix factorization |
1 |
oblivious data access |
1 |
oblivious ram |
1 |
offline/online abe |
1 |
one-class classification |
1 |
online/offline encryption |
1 |
outsourced decryption |
1 |
outsourced partitioned data |
1 |
outsourcing decryption |
1 |
pairings |
1 |
partition oram |
1 |
pattern recognition, automated |
1 |
ppwap |
1 |
privacy preserving data mining |
1 |
privacy protection |
1 |
privacy-preserving elastic net |
1 |
privacy-preserving machine learning |
1 |
private information retrieval |
1 |
private set intersection cardinality |
1 |
quantisation (signal) |
1 |
region duplication |
1 |
regularization |
1 |
regulatory elements, transcriptional |
1 |
release-time confidentiality |
1 |
rna |
1 |
rna -- structure. |
1 |
rna, untranslated - chemistry |
1 |
rna. |
1 |
rnd efflux pumps |
1 |
secure dot product |
1 |
secure multiparty computation |
1 |
semi-nonnegative matrix factorization |
1 |
simple non-standard pseudoknot |
1 |
skl |
1 |
spectrum-temporal factors analysis |
1 |
spin image |
1 |
svd |
1 |
svm |
1 |
timed-release encryption |
1 |
transcription factors - chemistry - metabolism |
1 |
transcription factors/genetics |
1 |
triple helix |
1 |
unsupervised algorithm |
1 |
verifiable computation |
1 |
weak balance theory |
1 |