Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless channels
biblio
Wireless Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 3:40pm
message protection
fading channels
information-theoretic security
information theoretic security
average secure communication
channel state information
Fading
imperfect channel state information
Information analysis
low-density parity-check (LDPC) codes
secure communication protocol
multilevel coding
optimized low-density parity-check codes
outage probability
Privacy Amplification
quasi static fading channel
secrecy capacity
secret key agreement
Wireless application protocol
Wireless Information-Theoretic Security
Metrics
data privacy
private key cryptography
telecommunication security
Resiliency
Human behavior
pubcrawl
policy-based governance
privacy
Communication system security
Scalability
probability
channel coding
parity check codes
Data Security
information security
wireless channels
protection
wireless channel
secret key generation
biblio
Ultimate Secrecy in Cooperative and Multi-hop Wireless Communications
Submitted by aekwall on Thu, 04/08/2021 - 3:33pm
attenuation
ultimate secrecy ranges
short-range wireless communication systems
point-to-point channel
multihop channel measurements
indoor communication systems
in-device communication systems
frequency 550.0 GHz to 565.0 GHz
cooperative wireless communications
chip-to-chip communications
millimetre wave communication
Information Reuse and Security
frequency reuse
communication secrecy
Receivers
communication channel
radio transmitters
communication security
wireless channels
Compositionality
cooperative communication
Relays
Bandwidth
channel capacity
pubcrawl
Resiliency
security
telecommunication security
biblio
Cognitive Radio Networks: Recent Advances in Spectrum Sensing Techniques and Security
Submitted by aekwall on Mon, 03/15/2021 - 11:04am
wireless nodes
Cognitive Radio Security
wireless spectrum
spectrum sensing techniques
spectrum resources
spectrum access
Dynamic Spectrum Allocation
Channel allocation
spectrum sensing
cognitive radio networks
cognitive radio
wireless network
Reinforcement learning
radio spectrum management
telecommunication security
Energy Efficiency
wireless networks
wireless channels
signal detection
sensors
radio networks
wireless devices
Communication system security
resource management
wireless sensor networks
pubcrawl
Resiliency
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 10:56am
legitimate receiver
Wireless communication
wireless channels
transmitter transmission efficiency
transmission efficiency
telecommunication security
simulation
security
secure transmission scheme
safe transmission
Resiliency
Receivers
pubcrawl
Metrics
Safe Coding
intercept probability
high efficiency fountain code
Fountain codes
encoding
efficient transmission fountain code
efficient coding scheme
eavesdropping
Decoding
Data Transmission
data security transmission scheme
composability
Communication system security
channel coding
biblio
The Impact of CFO on OFDM based Physical-layer Network Coding with QPSK Modulation
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
PNC
Channel estimation
ICI
intercarrier interference
low bit error rate
medium CFO levels
network-coded information
physical-layer network coding
pilot insertion
CFO compensation
point-to-point transmissions
QPSK modulation
quadrature phase shift keying
RA codes
repeat-accumulate codes
subsequent channel decoding
TWRC
network coding
Metrics
resilience
Resiliency
composability
wireless channels
Decoding
channel coding
error statistics
pubcrawl
modulation coding
signal detection
relay networks (telecommunication)
OFDM
OFDM modulation
BER
carrier frequency offset
biblio
Fast Cross Layer Authentication Scheme for Dynamic Wireless Network
Submitted by grigby1 on Tue, 02/16/2021 - 11:47am
dynamic wireless communication
dynamic networks
upper layer authentication
upper layer assisted method
static communications
spoofing detection
PLA models
physical layer authentication mechanisms
physical layer authentication
performance stability
network environments
lightweight cross-layer authentication scheme
hypothesis test models
fast cross layer authentication scheme
dynamic wireless network
pubcrawl
dynamic communication scenarios
cross layer authentication
authentication delay
mobile radio
wireless channels
computational complexity
radio networks
composability
Cryptographic Protocols
telecommunication security
message authentication
Resiliency
resilience
Metrics
biblio
Keyless Covert Communication in the Presence of Channel State Information
Submitted by grigby1 on Wed, 02/10/2021 - 11:52am
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Compositionality
wireless channels
transmitter
channel capacity
channel coding
covert channels
covert capacity
channel output
channel state information
innocent channel-input symbol
keyless covert communication
biblio
Covert Communication by Exploiting Node Multiplicity and Channel Variations
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
error statistics
wireless broadcast networks
superposition coding
Propagation losses
private message
pre-shared secret
noncovert users
noncovert message
node multiplicity
low probability of detection (LPD)
detection probability
detection error probability
channel variation
covert channels
Information hiding
covert communication
pubcrawl
error probability
covert message
broadcast channels
Transmitters
uncertainty
wireless channels
Compositionality
Receivers
radio networks
Wireless communication
Scalability
telecommunication security
Throughput
Resiliency
resilience
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
lora
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
Chirp
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
Cryptography
Cascading style sheets
Frequency modulation
data encapsulation
covert channels
wireless channels
Compositionality
Receivers
Buildings
Payloads
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
security
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
telecommunication computing
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
markov chain
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
gradient methods
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
Acoustic Fingerprints
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
1
2
3
4
5
6
7
8
next ›
last »