Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radio transmitters
biblio
A Novel Physical Layer Authentication Method with Convolutional Neural Network
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
MIMO-OFDM system security
Artificial Neural Networks
MIMO communication
spoofing attacks
channel authentication
convolutional-neural-network-based approach
hypothesis test based methods
L1 regularization
MIMO-OFDM
OFDM
mini batch scheme
Multi-user
multiple-input multiple-output system
multiuser authentication system
OFDM modulation
orthogonal frequency division multiplexing
physical layer authentication method
radio transmitters
authentication
Resiliency
pubcrawl
policy-based governance
Wireless communication
CNN
convolutional neural nets
convolutional neural network
convolutional neural networks
telecommunication security
physical layer security
convolution
cyber physical systems
authentication accuracy
multi-access systems
wireless networks
channel state information
CSI
biblio
Multi-beam Physical Security Scheme: Security Assessment and Impact of Array Impairments on Security and Quality of Service
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
radio transmitters
multilevel constellation
multiple-input multiple-output
perfect channel state information
Phase shift keying
power amplification
pubcrawl
quality of service
quasiconstant envelope signals
multibeam physical security scheme
Receivers
security assessment
signal components
Springs
telecommunication security
transmitting antennas
wireless channels
cyber physical systems
antenna arrays
array impairments
array power gain increments
array signal processing
channel level
component signal
Compositionality
CSI
amplification branch
decomposition
envelope variations
fact constrains
high order constellation signals
Metrics
MIMO communication
mMIMO
biblio
Improving Wireless Network Security Based On Radio Fingerprinting
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
security threats
Wireless Network Security
wireless device transmitters
transient signals
radio transmitters
Radio Frequency Fingerprints
radio frequency fingerprint extraction
radio fingerprinting
physical characteristics
fractional fourier transform
Fourier transforms
identity authentication
wireless networks
sensor security
authorisation
Signal to noise ratio
Transient analysis
Metrics
wireless devices
Communication system security
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
feature extraction
security
telecommunication security
biblio
Artificial-Noise-Aided Robust Beamforming for MISOME Wiretap Channels with Security QoS
Submitted by aekwall on Mon, 02/17/2020 - 2:22pm
robust beamforming
formulated design problem
linear matrix inequalities
minimum allowable signal-to-interference
MISOME wiretap channels
multiantenna transmitter
multiple multiantenna eavesdroppers
power saving
radio receivers
RJOBF
estimation errors
robust joint optimal
secret signal
security communication
security QoS
security quality
single-antenna receiver
SINR
transmit power
array signal processing
Resiliency
pubcrawl
composability
Metrics
privacy
quality of service
physical-layer security
antenna arrays
telecommunication security
signal processing security
wireless channels
channel state information
concave programming
radio transmitters
artificial noise
artificial-noise-aided robust beamforming
convex programming
biblio
Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
source information
resilience
Resiliency
secondary cooperative node
secrecy outage probability
security
Security analysis
Signal to noise ratio
SOP
Relays
telecommunication security
tight lower bound expression
transmission secrecy performance
transmit power
untrusted energy-limited secondary cooperative user
untrusted relaying
untrusted secondary user
wireless networks
primary transmission security
Cognitive Radio Security
diversity reception
Maximum ratio combining
maximum ratio combining scheme
MRC scheme
overlay cognitive wireless networks
physical layer security
power system reliability
cognitive radio
primary user information secrecy performance
primary user information security
probability
programmable logic arrays
pubcrawl
radio transmitters
relay links
biblio
Total Error Reduction in Presence of Malicious User in a Cognitive Radio Network
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
PUE attack
unused spectrum
total error reduction
total error probability
telecommunication security
spectrum sensing interval
Signal to noise ratio
sensors
security issues
secondary users
Resiliency
resilience
radio transmitters
radio spectrum management
attacker strength
pubcrawl
probability
primary user spectrum bands
primary user emulation attack
Neyman-Pearson criterion
malicious user
error probability
energy detector
emulation
emulated primary signal
Cognitive Radio Security
Cognitive Radio Network
cognitive radio
biblio
Ultra-Fast Bit-Level Frequency-Hopping Transmitter for Securing Low-Power Wireless Devices
Submitted by grigby1 on Fri, 03/15/2019 - 11:56am
selective jamming
power 10.9 mW
pubcrawl
radio transmitters
resilience
Resiliency
Scalability
secure wireless communications
security
physical-layer security
size 65.0 nm
telecommunication security
time 1.0 mus
Time Frequency Analysis
time-interleaved BAW-based TX
ultra-fast bit-level frequency-hopping scheme
ultra-fast bit-level frequency-hopping transmitter
voltage 1.1 V
frequency 80.0 MHz
Bluetooth
bulk acoustic wave devices
bulk acoustic wave resonators
Bulk-acoustic wave resonators
CMOS integrated circuits
Cryptography
data-driven random dynamic channel selection
frequency 2.4 GHz
BLE transmitters
frequency hop communication
frequency hopping
frequency shift keying
Harmonic analysis
Jamming
low-power wireless devices
Metrics
biblio
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network
Submitted by grigby1 on Fri, 10/26/2018 - 4:53pm
INFECT
wireless openaccess research platform
wireless LAN
Trojan horses
Signal to noise ratio
security
Scalability
Robustness
Resiliency
radio transmitters
radio receivers
radio networks
pubcrawl
802.11a/g transmitter
inconspicuous FEC-based trojan
hardware attack
forward error correction
FEC encoding
Decoding
Contamination
channel noise profiling
channel noise
channel coding
Binary phase shift keying
802.11a/g wireless network
biblio
Privacy Preserving Localization Using a Distributed Particle Filtering Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Protocols
spectrum sensing information
signal detection
sensors
sensing network
semihonest adversary model
Scalability
Resiliency
resilience
radio transmitters
public-key cryptography
public key cryptography
Public key
pubcrawl
Adversary Models
privacy preserving localization
privacy
Particle measurements
particle filtering (numerical methods)
multiple sensing radios
Metrics
Human behavior
distributed particle filtering protocol
cooperative communication
cognitive radios systems
cognitive radio
Atmospheric measurements
biblio
Chaotic secure digital communication scheme using auxiliary systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
inclusion technique
transmitter side
transmitter parameters
telecommunication security
security
secure message transmission scheme
Resiliency
Receivers
receiver side
radio transmitters
radio receivers
pubcrawl
Observers
observer
modified Henon hyperchaotic discrete-time system
Metrics
auxiliary chaotic systems
hyperchaotic discrete primary chaotic systems
encryption function
encryption
encrypted message
dynamical left inversion technique
discrete time systems
digital signal processing
digital communication
Cryptography
composability
chaotic synchronization
chaotic secure digital communication scheme
chaotic cryptography
chaotic communication
Auxiliary transmitters
« first
‹ previous
1
2
3
4
next ›
last »