Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Upper bound
biblio
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds
Submitted by grigby1 on Fri, 09/01/2023 - 1:23pm
Compositionality
Success Rate
side-channel analysis
Monte-Carlo simulation
Masking Scheme
Information-Theoretic Metric
Human Factors
maximum likelihood estimation
information theoretic security
Upper bound
Monte Carlo methods
Numerical models
collaboration
Measurement
side-channel attacks
composability
Scalability
Analytical models
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
On the Security Properties of Combinatorial All-or-nothing Transforms
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
Entropy
weak security
conditional entropy
combinatorial all-or-nothing transform
Human Factors
Transforms
perfect security
Probability distribution
information theoretic security
Upper bound
Compositionality
composability
collaboration
Cryptography
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
information security
biblio
Local Constraint-Based Ordered Statistics Decoding for Short Block Codes
Submitted by grigby1 on Fri, 04/28/2023 - 10:52am
Compositionality
short block codes
ordered statistics decoding
List Viterbi decoding
block codes
URLLC
coding theory
Viterbi algorithm
Upper bound
simulation
Cryptography
Decoding
Complexity theory
composability
Conferences
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Physical-Layer Security in Underlay Cognitive Radio System with Full-Duplex Secondary User over Nakagami-m Fading Channel
Submitted by aekwall on Fri, 04/28/2023 - 8:41am
pubcrawl
receiving antennas
Interference
transmitting antennas
Upper bound
Resiliency
Numerical models
fading channels
energy harvesting
Cognitive Radio (CR)
Full-Duplex (FD) mode
Full-duplex system
Strictly Positive Secrecy Capacity (SPSC)
Cognitive Radio Security
biblio
Mixed Differential Privacy in Computer Vision
Submitted by grigby1 on Fri, 01/06/2023 - 3:10pm
transparency
retrieval
Recognition: Detection
Privacy and federated learning
privacy and ethics in vision
fairness
categorization
Human Factors
computer vision
AI
differential privacy
Training
Upper bound
visualization
accountability
Computational modeling
privacy
Scalability
Resiliency
resilience
pubcrawl
biblio
Side-Channel Analysis-Based Model Extraction on Intelligent CPS: An Information Theory Perspective
Submitted by grigby1 on Fri, 09/30/2022 - 9:30am
side-channel attacks
side-channel analysis-based model extraction
intelligent CPS
Systems operation
social computing
Resiliency
information theory
information theoretic security
Systematics
Upper bound
Compositionality
machine learning
composability
Computational modeling
Scalability
Analytical models
resilience
collaboration
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
Doubly-Exponential Identification via Channels: Code Constructions and Bounds
Submitted by grigby1 on Fri, 07/01/2022 - 7:29am
security
pubcrawl
resilience
Correlation
Reed-Solomon codes
Metrics
Decoding
Upper bound
coding theory
optical receivers
Resiliency
biblio
On Secrecy Sum-Rate of Artificial-Noise-Aided Multi-user Visible Light Communication Systems
Submitted by aekwall on Tue, 05/10/2022 - 12:44pm
simulation
Conferences
pubcrawl
Scalability
Metrics
Resiliency
Receivers
physical layer security
light emitting diodes
artificial noise
secrecy rate
Transmitters
Upper bound
visible light communication
Visible Light Communications Security
biblio
Covert Communication over Asynchronous Channels with Timing Advantage
Submitted by grigby1 on Tue, 04/19/2022 - 2:14pm
asynchronous communication
channel capacity
composability
Compositionality
Conferences
covert channels
Monte Carlo methods
pubcrawl
resilience
Resiliency
Scalability
timing
uncertainty
Upper bound
biblio
Set Reconciliation for Blockchains with Slepian-Wolf Coding: Deletion Polar Codes
Submitted by aekwall on Wed, 04/13/2022 - 9:20am
Signal processing algorithms
Wireless communication
pubcrawl
Scalability
privacy
encoding
Complexity theory
signal processing
blockchains
Upper bound
data deletion
1
2
3
4
next ›
last »