Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decoding
biblio
An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
irrelevant random blocks
last mile problem
linear codes
linear coding
Metrics
original data blocks
orthogonal vector
policy-based governance
pubcrawl
information theoretical security
Resiliency
Scalability
secure edge
security of data
unreliable edge nodes
user device
Vectors
widespread solution
Decoding
security
actual EC deployments
Cloud Computing
communication overhead
computational complexity
compute-intensive applications
data confidentiality
data matrix
Data Security
coding theory
edge computing
edge devices
efficient edge
efficient secure coded edge computing scheme
high decoding complexities
Human behavior
Human Factors
information theoretic security
biblio
On Application of Natural Language Processing in Machine Translation
Submitted by aekwall on Mon, 05/18/2020 - 10:53am
Mathematical model
statistical corpora
Scalability
Resiliency
pubcrawl
pub
Neural networks
neural nets
neural machine translation
natural language processing
Big Data
machine translation
learning (artificial intelligence)
language translation
Human behavior
History
Google
deep learning
Decoding
biblio
Computer network intrusion detection using sequential LSTM Neural Networks autoencoders
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
Unsupervised Learning
variable length data sequence
sequential LSTM Neural Networks autoencoders
sequential intrusion detection
sequential data
sequential autoencoder
network data sequence
long short term memory neural network
GRU
fixed length data sequence
computer network intrusion detection
computer network data
Bi-LSTM
autoencoders
encoding
LSTM
computer network security
computer networks
Payloads
Intrusion Detection
Training
network intrusion detection
Neural networks
neural nets
Decoding
Metrics
Iterative methods
composability
pubcrawl
Resiliency
feature extraction
biblio
Delay Optimal Coding for Secure Transmission over a Burst Erasure Wiretap Channel
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
Resiliency
Metrics
minimum possible delay
network coding
optimal secure burst erasure
perfect security
pubcrawl
Receivers
resilience
low-delay coding
Secure Messages
secure transmission
security
streaming code
Streaming communication
Systematics
telecommunication security
delay optimal burst erasure correcting
block codes
burst erasure correcting code
burst erasure wiretap channel
code parameters
composability
cyber physical systems
Decoding
delay constraint
channel coding
delay optimal coding
delay optimal streaming codes
delays
diagonal interleaving
DO-SBE block codes
error correction codes
information security
biblio
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
parity check codes
LLR-based turbo code
log-likelihood ratio
low-density parity check code
Maximum likelihood decoding
Metrics
MIMO communication
modulation
modulation coding
network coding
numerical analysis
numerical evaluation
LLR-based outer channel coding
physical layer security
polar code
polar code concatenation
polar codes
pubcrawl
resilience
Resiliency
SCAD
secure channel coding effect
sequential LLR
composability
5G networks
bit error rate performance
block codes
C-MIMO transmission scheme
channel coding
chaos
chaos multiple-input multiple-output-based polar concatenation code
chaos transmission
chaotic communication
chaotic MIMO block modulation
5 G
concatenated codes
convolutional code
Convolutional codes
cyber physical systems
Decoding
error correction ability
error correction codes
error statistics
iterative decoding
LDPC-concatenated transmission
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Enhance Wireless Security System Using Butterfly Network Coding Algorithm
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
IoT system
wireless sensing network
wireless security system
Wi-Fi module
traditional security system
system indicators
Received signal strength indication (RSSI)
received signal strength indication
network transmission
Network node routing
butterfly network coding algorithm
Butterfly network coding (BNC) algorithm
cyber physical systems
telecommunication security
encoding
network coding
Predictive Metrics
security monitoring
wireless LAN
Decoding
RSSI
wireless sensor networks
composability
pubcrawl
Resiliency
Internet of Things (IoT)
biblio
Network Coding for Critical Infrastructure Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
Predictive Metrics
store-and-forward paradigm
programmable networks
programmable data-planes
P4 ecosystem
linear network coding
linear NC functions
intermediate network
Critical Infrastructure Networks
atomic coding primitives
network topology
cyber physical systems
linear codes
network coding
encoding
telecommunication security
Payloads
software defined networking
telecommunication network topology
computer network
computer networks
delays
resilience
Decoding
composability
pubcrawl
Resiliency
critical infrastructures
critical infrastructure
biblio
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
cyber physical systems
zero-error communication
worst-case adversarial setting
wire-tap channel
unbounded computational resources
sum-subspace codes
sum-rank metric
secure multishot network coding
reliable multishot network coding
random codes
network error-correction
multishot network coding
linearized Reed-Solomon codes
linear network code
inject erroneous packets
coding scheme
telecommunication security
linear codes
Reed-Solomon codes
network coding
Knowledge engineering
error correction codes
encoding
Predictive Metrics
telecommunication network topology
computational complexity
network topology
Reliability
Decoding
composability
pubcrawl
Resiliency
biblio
Code-based Pseudorandom Generator for the Post-Quantum Period
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
“Provable”
resilience
security model
Resistance
Random sequences
Periodic Properties
Fischer-Stern Generator
Cryptographically Resistance Pseudorandom Sequences
Code-based Pseudorandom Number Generator
pubcrawl
provable security
Compositionality
Decoding
Metrics
Prototypes
Cryptography
Generators
Resiliency
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »