Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decoding
biblio
Visual Authentication Scheme Based on Reversible Degradation and QR Code
Submitted by grigby1 on Tue, 08/31/2021 - 11:57am
2D Barcode
authentication
Cryptography
Decoding
Degradation
image authentication
Meaningless Reversible Degradation
pubcrawl
QR codes
Redundancy
Reed-Solomon codes
resilience
Resiliency
Visual Authentication
visualization
biblio
Deepcode: Feedback Codes via Deep Learning
Submitted by grigby1 on Tue, 07/27/2021 - 11:13am
AWGN channels
channel coding
composability
Computing Theory
Decoding
deep learning
feedback communication
machine learning
Neural networks
Noise measurement
pubcrawl
Recurrent neural networks
reliability theory
Schalkwijk–Kailath scheme
biblio
False Data Injection Attack Detection Before Decoding in DF Cooperative Relay Network
Submitted by grigby1 on Wed, 06/30/2021 - 2:19pm
outage probability
unified error sufficient statistic
Signal to noise ratio
Resiliency
resilience
relay networks (telecommunication)
pubcrawl
probability
power system reliability
Physical layer
composability
Human Factors
Human behavior
FDI attack detection
False Data Detection
DF cooperative relay network
Detectors
Decoding
cyber physical systems
biblio
Multi-Model Resilient Observer under False Data Injection Attacks
Submitted by aekwall on Tue, 05/25/2021 - 2:23pm
CPS modeling
simulation
composability
CPS Modeling and Simulation
cyber-physical systems
Decoding
false data injection attacks
Monitoring
observer
Observers
optimization
Predictive Metrics
pubcrawl
resilience
Resiliency
sensors
biblio
An Improved BICM-ID Receiver for the Time-Varying Underwater Acoustic Communications with DDPSK Modulation
Submitted by grigby1 on Fri, 04/09/2021 - 10:34am
improved bit-interleaved
acoustic communications
BICM-ID algorithm
DDPSK demodulator
DDPSK modulation
differential phase shift keying
Doppler shift
Doppler shifts
double differential phase shift
improved BICM-ID receiver
7.4 dB gain
interleaved codes
noise figure 10.2 dB
noise figure 7.4 dB
novel receiver architecture
phase noise
signal-to-noise ratio loss
SNR loss
underwater acoustic DSSS communications
modulation coding
Resiliency
Signal to noise ratio
composability
Receivers
Decoding
resilience
IDS
multipath channels
error statistics
pubcrawl
Phase shift keying
iterative decoding
underwater acoustic communication
Underwater acoustics
Demodulation
radio receivers
spread spectrum communication
10.2 dB gain
biblio
RNN-VED for Reducing False Positive Alerts in Host-based Anomaly Detection Systems
Submitted by aekwall on Thu, 04/08/2021 - 3:35pm
natural language processing
variational encoder-decoder architecture
sequence to sequence
RNN-VED
normal behavior learning
model input-data representation
host-based anomaly detection systems
false positive alerts
ADFALD.
ADFA-LD dataset
Information Reuse and Security
system-call traces
HIDS
anomaly prediction
one-class classification
security of data
host-based intrusion detection systems
Hidden Markov models
Compositionality
Semantics
Recurrent neural networks
recurrent neural nets
Anomaly Detection
data structures
Decoding
pubcrawl
Resiliency
learning (artificial intelligence)
Classification algorithms
biblio
Assessment of the Applicability of Autoencoders in the Problem of Detecting Anomalies in the Work of Industrial Control Systems.
Submitted by grigby1 on Tue, 03/30/2021 - 10:53am
industrial facilities
Task Analysis
Scalability
Resiliency
resilience
pubcrawl
process control systems
process control
Neurons
machine learning
learning (artificial intelligence)
integrated circuits
information security
Industries
anomalies detection
industrial control systems (ICS)
industrial control system
industrial control
ICS Anomaly Detection
deep learning
Decoding
convolutional neural networks
convolutional neural nets
control engineering computing
complex problems
classification problems
autoencoders
auto-encoders
biblio
Physical Adversarial Attacks Against Deep Learning Based Channel Decoding Systems
Submitted by aekwall on Mon, 03/15/2021 - 10:57am
Jamming
wireless security
telecommunication security
Resiliency
pubcrawl
private key cryptography
physical white-box
physical adversarial attacks
Perturbation methods
Noise measurement
Neural networks
modulation
Metrics
learning (artificial intelligence)
white box cryptography
huge success
deep learning channel
deep learning
Decoding
conventional jamming attacks
composability
classical decoding schemes
channel decoding systems
channel decoding
channel coding
black-box adversarial attacks
Artificial Neural Networks
adversarial attacks
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 10:56am
legitimate receiver
Wireless communication
wireless channels
transmitter transmission efficiency
transmission efficiency
telecommunication security
simulation
security
secure transmission scheme
safe transmission
Resiliency
Receivers
pubcrawl
Metrics
Safe Coding
intercept probability
high efficiency fountain code
Fountain codes
encoding
efficient transmission fountain code
efficient coding scheme
eavesdropping
Decoding
Data Transmission
data security transmission scheme
composability
Communication system security
channel coding
biblio
Secure Communication Based on Reliability-Based Hybrid ARQ and LDPC Codes
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
physical-layer security
additive white gaussian noise channel
additive white Gaussian noise wire-tap channel
Automatic repeat request
bit-error rate
Gaussian approximation
hybrid ARQ
irregular LDPC codes
low-density parity-check codes.
secure communication
posteriori probability log-likelihood ratios
RB-HARQ protocol
re-transmission strategy
re-transmissions
reliability-based hybrid ARQ
reliability-based hybrid automatic repeat-request
unreliable bits
variable nodes
Decoding
Metrics
resilience
Resiliency
telecommunication security
composability
probability
security performance
communication system
pubcrawl
telecommunication network reliability
channel coding
error statistics
network coding
low-density parity-check codes
AWGN channels
parity check codes
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »