Item talk:Q167892: Difference between revisions
From geokb
(Added OpenAlex topic data) |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{ | |||
"OpenAlex": { | |||
cited_by_count: | "cited_by_count": 424478, | ||
created_date: | "created_date": "2024-01-23", | ||
description: This cluster of papers focuses on language-based information flow | "description": "This cluster of papers focuses on language-based information flow security, addressing topics such as enforceable security policies, control-flow integrity, side-channel attacks, dynamic taint analysis, and trusted execution environments. It also explores techniques for memory protection, virtualization, software diversity, and hardware security.", | ||
"display_name": "Language-based Information Flow Security", | |||
"domain": { | |||
"id": "https://openalex.org/domains/3", | |||
"display_name": "Physical Sciences" | |||
display_name: Language-based Information Flow Security | }, | ||
domain: | "field": { | ||
"id": "https://openalex.org/fields/17", | |||
"display_name": "Computer Science" | |||
}, | |||
display_name: | "id": "https://openalex.org/T11424", | ||
id: https://openalex.org/fields/17 | "ids": { | ||
id: https://openalex.org/T11424 | "openalex": "https://openalex.org/T11424", | ||
ids: | "wikipedia": "https://en.wikipedia.org/wiki/Information_flow_security" | ||
openalex: https://openalex.org/T11424 | }, | ||
wikipedia: https://en.wikipedia.org/wiki/Information_flow_security | "keywords": [ | ||
keywords: | "Security Policies", | ||
"Side-Channel Attacks", | |||
"Control-Flow Integrity", | |||
"Memory Protection", | |||
"Virtualization", | |||
"Cache Attacks", | |||
"Dynamic Taint Analysis", | |||
"Trusted Execution Environment", | |||
"Software Diversity", | |||
"Hardware Security" | |||
], | |||
siblings: | "siblings": [ | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12072", | ||
"display_name": "Active Learning in Machine Learning Research" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12761", | ||
"display_name": "Adaptation to Concept Drift in Data Streams" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T10237", | ||
"display_name": "Advanced Cryptographic Schemes and Protocols" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T11307", | ||
"display_name": "Advances in Transfer Learning and Domain Adaptation" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T11689", | ||
"display_name": "Adversarial Robustness in Deep Learning Models" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T11512", | ||
"display_name": "Anomaly Detection in High-Dimensional Data" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12805", | ||
"display_name": "Application of Fuzzy Cognitive Maps in Modeling" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T11975", | ||
"display_name": "Application of Genetic Programming in Machine Learning" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13734", | ||
"display_name": "Artificial Intelligence and Expert Systems" | |||
id: https://openalex.org/ | }, | ||
{ | |||
"id": "https://openalex.org/T13904", | |||
"display_name": "Artificial Intelligence and Technology Innovation" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12260", | ||
"display_name": "Artificial Intelligence in Education and Technology" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12128", | ||
"display_name": "Artificial Intelligence in Service Industry" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T10906", | ||
"display_name": "Artificial Intelligence Planning and Reasoning" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12380", | ||
"display_name": "Authorship Attribution and User Profiling in Text" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12262", | ||
"display_name": "Automated Detection of Hate Speech and Offensive Language" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13083", | ||
"display_name": "Automatic Keyword Extraction from Textual Data" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13629", | ||
"display_name": "Automatic Text Simplification and Readability Assessment" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T10639", | ||
"display_name": "Autonomic Computing and Self-Adaptive Systems" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13623", | ||
"display_name": "Compilation and Analysis of Spoken Language Corpora" | |||
id: https://openalex.org/ | }, | ||
{ | |||
"id": "https://openalex.org/T10951", | |||
"display_name": "Cryptanalysis of Block Ciphers and Hash Functions" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T11130", | ||
"display_name": "Cryptography and Error-Correcting Codes" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13851", | ||
"display_name": "Cyberbiosecurity and Legal Implications of AI Technology" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13898", | ||
"display_name": "Cybernetics and Information Theory" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T10637", | ||
"display_name": "Data Clustering Techniques and Algorithms" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13702", | ||
"display_name": "Deep Learning Applications in Healthcare" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12131", | ||
"display_name": "Deep Learning for Wireless Signal Classification" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T10862", | ||
"display_name": "Deep Learning in Medical Image Analysis" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13559", | ||
"display_name": "Development and Application of Expert Systems" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12031", | ||
"display_name": "Dialogue Act Modeling for Spoken Language Systems" | |||
id: https://openalex.org/ | }, | ||
{ | |||
"id": "https://openalex.org/T13674", | |||
"display_name": "Digital Image Processing and Artificial Neural Networks" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T11902", | ||
"display_name": "Effectiveness of Intelligent Tutoring Systems" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T14175", | ||
"display_name": "Enhancing E-Learning with Intelligent Agents and Analytics" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13514", | ||
"display_name": "Experience-Based Knowledge Representation and Management" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12026", | ||
"display_name": "Explainable Artificial Intelligence" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T13935", | ||
"display_name": "Fuzzy Computing and Intelligent Systems" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T11574", | ||
"display_name": "Game Artificial Intelligence Research" | |||
id: https://openalex.org/ | }, | ||
{ | |||
id: https://openalex.org/ | "id": "https://openalex.org/T12814", | ||
"display_name": "Gaussian Processes in Machine Learning" | |||
}, | |||
id: https://openalex.org/ | { | ||
"id": "https://openalex.org/T11273", | |||
id: https://openalex.org/ | "display_name": "Graph Neural Network Models and Applications" | ||
}, | |||
{ | |||
subfield: | "id": "https://openalex.org/T11652", | ||
"display_name": "Handling Imbalanced Data in Classification Problems" | |||
}, | |||
updated_date: | { | ||
works_count: | "id": "https://openalex.org/T14351", | ||
"display_name": "Inductive Modeling in Scientific Research" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T14413", | |||
"display_name": "Knowledge Base Graph Embedding for Visual Question Answering" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T11303", | |||
"display_name": "Learning and Inference in Bayesian Networks" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T12535", | |||
"display_name": "Learning with Noisy Labels in Machine Learning" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T11010", | |||
"display_name": "Logic Programming and Knowledge Representation" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T13018", | |||
"display_name": "Machine Learning for Earthquake Early Warning Systems" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T11598", | |||
"display_name": "Machine Learning for Internet Traffic Classification" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T12157", | |||
"display_name": "Machine Learning for Mineral Prospectivity Mapping" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T14064", | |||
"display_name": "Machine Learning in Smart Healthcare" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T11276", | |||
"display_name": "Machine Learning Methods for Solar Radiation Forecasting" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10456", | |||
"display_name": "Methods and Techniques for Agent-Based Modeling" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T11901", | |||
"display_name": "Model-Based Clustering with Mixture Models" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T11550", | |||
"display_name": "Multi-label Text Classification in Machine Learning" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10028", | |||
"display_name": "Natural Language Processing" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10320", | |||
"display_name": "Neural Network Fundamentals and Applications" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T14381", | |||
"display_name": "Neuro-Symbolic Networks in Automation and Robotics" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T11612", | |||
"display_name": "Optimization Methods in Machine Learning" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T13567", | |||
"display_name": "Optimization of Big Data Processing and Analysis" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10711", | |||
"display_name": "Particle Filtering and Nonlinear Estimation Methods" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T12611", | |||
"display_name": "Photonic Reservoir Computing for Neural Computation" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10764", | |||
"display_name": "Privacy-Preserving Techniques for Data Analysis and Machine Learning" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10126", | |||
"display_name": "Program Analysis and Verification Techniques" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10682", | |||
"display_name": "Quantum Computing and Simulation" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10020", | |||
"display_name": "Quantum Information and Computation" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10462", | |||
"display_name": "Reinforcement Learning Algorithms" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T14335", | |||
"display_name": "Robotics Programming Education for Students" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T13650", | |||
"display_name": "Scientific Computing and Data Analysis with Python" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10215", | |||
"display_name": "Semantic Web and Ontology Development" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10664", | |||
"display_name": "Sentiment Analysis and Opinion Mining" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10201", | |||
"display_name": "Speech Recognition Technology" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T13398", | |||
"display_name": "Statistical Computing and Data Analysis in R" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10181", | |||
"display_name": "Statistical Machine Translation and Natural Language Processing" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10100", | |||
"display_name": "Swarm Intelligence Optimization Algorithms" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T11269", | |||
"display_name": "Text Compression and Indexing Algorithms" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T13062", | |||
"display_name": "Theoretical Framework of Cognitive Informatics and Computational Intelligence" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T12676", | |||
"display_name": "Theory and Applications of Extreme Learning Machines" | |||
}, | |||
{ | |||
"id": "https://openalex.org/T10820", | |||
"display_name": "Type-2 Fuzzy Logic Systems and Applications" | |||
} | |||
], | |||
"subfield": { | |||
"id": "https://openalex.org/subfields/1702", | |||
"display_name": "Artificial Intelligence" | |||
}, | |||
"updated_date": "2024-08-19T05:46:19.701782", | |||
"works_count": 24527, | |||
"oa_id": "T11424" | |||
} | |||
} |
Latest revision as of 21:07, 12 September 2024
{
"OpenAlex": { "cited_by_count": 424478, "created_date": "2024-01-23", "description": "This cluster of papers focuses on language-based information flow security, addressing topics such as enforceable security policies, control-flow integrity, side-channel attacks, dynamic taint analysis, and trusted execution environments. It also explores techniques for memory protection, virtualization, software diversity, and hardware security.", "display_name": "Language-based Information Flow Security", "domain": { "id": "https://openalex.org/domains/3", "display_name": "Physical Sciences" }, "field": { "id": "https://openalex.org/fields/17", "display_name": "Computer Science" }, "id": "https://openalex.org/T11424", "ids": { "openalex": "https://openalex.org/T11424", "wikipedia": "https://en.wikipedia.org/wiki/Information_flow_security" }, "keywords": [ "Security Policies", "Side-Channel Attacks", "Control-Flow Integrity", "Memory Protection", "Virtualization", "Cache Attacks", "Dynamic Taint Analysis", "Trusted Execution Environment", "Software Diversity", "Hardware Security" ], "siblings": [ { "id": "https://openalex.org/T12072", "display_name": "Active Learning in Machine Learning Research" }, { "id": "https://openalex.org/T12761", "display_name": "Adaptation to Concept Drift in Data Streams" }, { "id": "https://openalex.org/T10237", "display_name": "Advanced Cryptographic Schemes and Protocols" }, { "id": "https://openalex.org/T11307", "display_name": "Advances in Transfer Learning and Domain Adaptation" }, { "id": "https://openalex.org/T11689", "display_name": "Adversarial Robustness in Deep Learning Models" }, { "id": "https://openalex.org/T11512", "display_name": "Anomaly Detection in High-Dimensional Data" }, { "id": "https://openalex.org/T12805", "display_name": "Application of Fuzzy Cognitive Maps in Modeling" }, { "id": "https://openalex.org/T11975", "display_name": "Application of Genetic Programming in Machine Learning" }, { "id": "https://openalex.org/T13734", "display_name": "Artificial Intelligence and Expert Systems" }, { "id": "https://openalex.org/T13904", "display_name": "Artificial Intelligence and Technology Innovation" }, { "id": "https://openalex.org/T12260", "display_name": "Artificial Intelligence in Education and Technology" }, { "id": "https://openalex.org/T12128", "display_name": "Artificial Intelligence in Service Industry" }, { "id": "https://openalex.org/T10906", "display_name": "Artificial Intelligence Planning and Reasoning" }, { "id": "https://openalex.org/T12380", "display_name": "Authorship Attribution and User Profiling in Text" }, { "id": "https://openalex.org/T12262", "display_name": "Automated Detection of Hate Speech and Offensive Language" }, { "id": "https://openalex.org/T13083", "display_name": "Automatic Keyword Extraction from Textual Data" }, { "id": "https://openalex.org/T13629", "display_name": "Automatic Text Simplification and Readability Assessment" }, { "id": "https://openalex.org/T10639", "display_name": "Autonomic Computing and Self-Adaptive Systems" }, { "id": "https://openalex.org/T13623", "display_name": "Compilation and Analysis of Spoken Language Corpora" }, { "id": "https://openalex.org/T10951", "display_name": "Cryptanalysis of Block Ciphers and Hash Functions" }, { "id": "https://openalex.org/T11130", "display_name": "Cryptography and Error-Correcting Codes" }, { "id": "https://openalex.org/T13851", "display_name": "Cyberbiosecurity and Legal Implications of AI Technology" }, { "id": "https://openalex.org/T13898", "display_name": "Cybernetics and Information Theory" }, { "id": "https://openalex.org/T10637", "display_name": "Data Clustering Techniques and Algorithms" }, { "id": "https://openalex.org/T13702", "display_name": "Deep Learning Applications in Healthcare" }, { "id": "https://openalex.org/T12131", "display_name": "Deep Learning for Wireless Signal Classification" }, { "id": "https://openalex.org/T10862", "display_name": "Deep Learning in Medical Image Analysis" }, { "id": "https://openalex.org/T13559", "display_name": "Development and Application of Expert Systems" }, { "id": "https://openalex.org/T12031", "display_name": "Dialogue Act Modeling for Spoken Language Systems" }, { "id": "https://openalex.org/T13674", "display_name": "Digital Image Processing and Artificial Neural Networks" }, { "id": "https://openalex.org/T11902", "display_name": "Effectiveness of Intelligent Tutoring Systems" }, { "id": "https://openalex.org/T14175", "display_name": "Enhancing E-Learning with Intelligent Agents and Analytics" }, { "id": "https://openalex.org/T13514", "display_name": "Experience-Based Knowledge Representation and Management" }, { "id": "https://openalex.org/T12026", "display_name": "Explainable Artificial Intelligence" }, { "id": "https://openalex.org/T13935", "display_name": "Fuzzy Computing and Intelligent Systems" }, { "id": "https://openalex.org/T11574", "display_name": "Game Artificial Intelligence Research" }, { "id": "https://openalex.org/T12814", "display_name": "Gaussian Processes in Machine Learning" }, { "id": "https://openalex.org/T11273", "display_name": "Graph Neural Network Models and Applications" }, { "id": "https://openalex.org/T11652", "display_name": "Handling Imbalanced Data in Classification Problems" }, { "id": "https://openalex.org/T14351", "display_name": "Inductive Modeling in Scientific Research" }, { "id": "https://openalex.org/T14413", "display_name": "Knowledge Base Graph Embedding for Visual Question Answering" }, { "id": "https://openalex.org/T11303", "display_name": "Learning and Inference in Bayesian Networks" }, { "id": "https://openalex.org/T12535", "display_name": "Learning with Noisy Labels in Machine Learning" }, { "id": "https://openalex.org/T11010", "display_name": "Logic Programming and Knowledge Representation" }, { "id": "https://openalex.org/T13018", "display_name": "Machine Learning for Earthquake Early Warning Systems" }, { "id": "https://openalex.org/T11598", "display_name": "Machine Learning for Internet Traffic Classification" }, { "id": "https://openalex.org/T12157", "display_name": "Machine Learning for Mineral Prospectivity Mapping" }, { "id": "https://openalex.org/T14064", "display_name": "Machine Learning in Smart Healthcare" }, { "id": "https://openalex.org/T11276", "display_name": "Machine Learning Methods for Solar Radiation Forecasting" }, { "id": "https://openalex.org/T10456", "display_name": "Methods and Techniques for Agent-Based Modeling" }, { "id": "https://openalex.org/T11901", "display_name": "Model-Based Clustering with Mixture Models" }, { "id": "https://openalex.org/T11550", "display_name": "Multi-label Text Classification in Machine Learning" }, { "id": "https://openalex.org/T10028", "display_name": "Natural Language Processing" }, { "id": "https://openalex.org/T10320", "display_name": "Neural Network Fundamentals and Applications" }, { "id": "https://openalex.org/T14381", "display_name": "Neuro-Symbolic Networks in Automation and Robotics" }, { "id": "https://openalex.org/T11612", "display_name": "Optimization Methods in Machine Learning" }, { "id": "https://openalex.org/T13567", "display_name": "Optimization of Big Data Processing and Analysis" }, { "id": "https://openalex.org/T10711", "display_name": "Particle Filtering and Nonlinear Estimation Methods" }, { "id": "https://openalex.org/T12611", "display_name": "Photonic Reservoir Computing for Neural Computation" }, { "id": "https://openalex.org/T10764", "display_name": "Privacy-Preserving Techniques for Data Analysis and Machine Learning" }, { "id": "https://openalex.org/T10126", "display_name": "Program Analysis and Verification Techniques" }, { "id": "https://openalex.org/T10682", "display_name": "Quantum Computing and Simulation" }, { "id": "https://openalex.org/T10020", "display_name": "Quantum Information and Computation" }, { "id": "https://openalex.org/T10462", "display_name": "Reinforcement Learning Algorithms" }, { "id": "https://openalex.org/T14335", "display_name": "Robotics Programming Education for Students" }, { "id": "https://openalex.org/T13650", "display_name": "Scientific Computing and Data Analysis with Python" }, { "id": "https://openalex.org/T10215", "display_name": "Semantic Web and Ontology Development" }, { "id": "https://openalex.org/T10664", "display_name": "Sentiment Analysis and Opinion Mining" }, { "id": "https://openalex.org/T10201", "display_name": "Speech Recognition Technology" }, { "id": "https://openalex.org/T13398", "display_name": "Statistical Computing and Data Analysis in R" }, { "id": "https://openalex.org/T10181", "display_name": "Statistical Machine Translation and Natural Language Processing" }, { "id": "https://openalex.org/T10100", "display_name": "Swarm Intelligence Optimization Algorithms" }, { "id": "https://openalex.org/T11269", "display_name": "Text Compression and Indexing Algorithms" }, { "id": "https://openalex.org/T13062", "display_name": "Theoretical Framework of Cognitive Informatics and Computational Intelligence" }, { "id": "https://openalex.org/T12676", "display_name": "Theory and Applications of Extreme Learning Machines" }, { "id": "https://openalex.org/T10820", "display_name": "Type-2 Fuzzy Logic Systems and Applications" } ], "subfield": { "id": "https://openalex.org/subfields/1702", "display_name": "Artificial Intelligence" }, "updated_date": "2024-08-19T05:46:19.701782", "works_count": 24527, "oa_id": "T11424" }
}