Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decoding
biblio
Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels
Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
correlation-preserving coding scheme
two-way lossy transmission
two-way channels
source-channel system
rate-one separate source-channel coding
Propagation losses
Network information theory
lossy transmission
joint source-channel coding scheme
joint source-channel coding
hybrid digital-analog coding
hybrid coding
genie-aided argument
DM-TWC
discrete-memoryless two-way channels
Resiliency
channel noise
adaptive coding
adaptive codes
combined source-channel coding
channel coding
distortion
Indexes
channel capacity
Correlation
Decoding
Metrics
composability
pubcrawl
biblio
SIMULATION OF QUANTUM ENCODER DECODER WITH FLIP BIT ERROR CORRECTION USING REVERSIBLE QUANTUM GATES
Submitted by grigby1 on Tue, 10/08/2019 - 4:42pm
QEC
security
Scalability
reversible quantum gates
Resiliency
resilience
Quantum technology
quantum noise
quantum information
quantum gates
Quantum error correction
quantum encoder & decoder
quantum cryptography
quantum computing security
quantum computing
Quantum circuit
composability
QCAD
pubcrawl
Metrics
Logic gates
logic circuits
Integrated circuit modeling
flip bit error correction
faulty quantum gates
fault-tolerant quantum computation
error correction codes
error correction
Decoding
Computational modeling
computation process
biblio
Visual Secret Sharing Scheme for Color QR Code
Submitted by aekwall on Mon, 09/23/2019 - 10:47am
Image reconstruction
VSS scheme
visual secret sharing scheme
visual secret sharing
visual effects
Stacking
secret image splitting
secret image reconstruction
secret image encoding
secret image bits
Resiliency
QR codes
pubcrawl
novel visual secret sharing scheme
color QR code
image colour analysis
Image color analysis
Image coding
human visual system
Fuses
error correction codes
error correction ability
error correction
encoding
Decoding
cyber physical systems
Cryptography
color QR code share
biblio
Increase Capacity of QR Code Using Compression Technique
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
error correction codes
storage management
smart cities
RGB color technique
Resiliency
QR–Code
QR codes
QR code decoder application
pubcrawl
Multi color QR code
Memory
Libraries
Image color analysis
bank data processing
encoding
e-wallet companies
demonetization step
Decoding
data storage capacity
data compression
cyber physical systems
Cryptography
compression technique
cashless society
barcode
Bar codes
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
Coding Theorem for Systematic LDGM Codes Under List Decoding
Submitted by aekwall on Mon, 03/18/2019 - 9:49am
ensembles
BIOS Security
systematic low density generator matrix codes
systematic LDGM codes
spatial coupling
Sparse matrices
parity check codes
negligible rate loss
low density generator matrix (LDGM) codes
list decoding
linear codes
iterative decoding
iterative belief propagation decoding algorithm
Generators
frame error rate
error statistics
Scalability
concatenated codes
concatenated code
coding theorem
channel coding
channel capacity
capacity-approaching
capacity-achieving codes
capacity-achieving
Bit error rate
binary-input output symmetric memoryless channels
Decoding
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Autoencoder Classification Algorithm Based on Swam Intelligence Optimization
Submitted by aekwall on Thu, 02/21/2019 - 1:02pm
Neural networks
Swarm Intelligence
Swam Intelligence Optimization
softmax
Quantum Particle Swarm Optimization(QPSO)
Quantum Particle Swarm Optimization
QPSO
pubcrawl
pattern classification
particle swarm optimization
particle swarm optimisation
Neurons
autoencoder classification algorithm
neural nets
Iris
Glass
Decoding
composability
Classification algorithms
classification
BP algorithm
Backpropagation
Autoencoder Neural Network
biblio
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
exponential strong converse theorem
theoretical cryptography
Zinc
source coding
signal estimation
side channel-attacks
Shannon cipher system
secrecy bounds
Random variables
one helper source coding problem
information theory
information theoretical analysis
privacy
distributed sensors
Communication channels
bounded storage eavesdropper
Ciphers
side-channel attacks
Decoding
Compositionality
Cryptography
telecommunication security
composability
pubcrawl
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
linear codes
theoretical cryptography
structural attacks
strong mathematical background
side-channel attacks
public-key cryptosystem
public-key cryptography
post-quantum standardization
Post-quantum cryptography
polynomials
polynomial time
oldest quantum-resistant proposition
number theory problems
number theory
NIST's announcement
McEliece scheme
pubcrawl
elliptic curve
discrete logarithm
coding theory
code-based cryptography
adequate post-quantum cryptographic schemes
quantum cryptography
side-channel analysis
public key cryptography
quantum computer
Decoding
Computers
Compositionality
physical attacks
encryption
composability
biblio
Adversarial Examples for Generative Models
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
learning (artificial intelligence)
variational techniques
VAE-GAN architecture attacks
vae gan
vae
Training
target generative network
target generative model
Scalability
Resiliency
Receivers
pubcrawl
neural net architectures
neural net architecture
Metrics
machine learning
adversarial example
input data distribution model
image representation
Image reconstruction
Image coding
image classification
Human behavior
Generative Models
deep learning architectures
deep generative models
Decoding
Data models
classifier
classification-based adversaries
Adversary Models
adversarial examples
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »