Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Channel estimation
biblio
Secure Channel Selection Using Multi-Armed Bandit Algorithm in Cognitive Radio Network
Submitted by K_Hooper on Wed, 12/20/2017 - 11:28am
Channel estimation
cognitive radio
Cognitive Radio Security
Indexes
network security
pubcrawl
Resiliency
sensors
biblio
"On the Target Detection in OFDM Passive Radar Using MUSIC and Compressive Sensing"
Submitted by grigby1 on Tue, 02/21/2017 - 1:06pm
OFDM
two dimensional delay-Doppler detection problem
transmitted signals
target tracking
target detection
sparse signals
single time sample compressive sensing
radar detection
pubcrawl170104
passive radar
orthogonal frequency division multiplexing
OFDM waveforms
OFDM passive radar
OFDM modulation
2D MUSIC algorithm
object detection
Multiple signal classification
matched filter concept
green radar
Doppler effect
direct signal leakage
direct signal component
detection capability
delays
compressed sensing
communication signals
Channel estimation
channel estimates
biblio
"Interference-floor shaping for liquid coverage zones in coordinated 5G networks"
Submitted by grigby1 on Tue, 02/21/2017 - 12:16pm
destructive superposition
Time-frequency Analysis
pubcrawl170103
Multiplexing
liquid coverage zones
joint transmission coordinated multipoint
interference-floor shaping
Interference
Geometry
5G mobile communication
coordinated 5G networks
CoMP
channel prediction
Channel estimation
channel components
antennas
adjacent channel interference
biblio
"Application specific processor design for DCT based applications"
Submitted by grigby1 on Tue, 02/14/2017 - 1:10pm
FPGA
Watermarking
Transform coding
pubcrawl170102
parallel architectures
parallel architecture
one dimensional DCT
MicroBlaze softcore processer
JPEG compression
image watermarking
image encryption
IDCT hardware
Hardware
Application Specific Processor
field programmable gate arrays
field programmable gate array
Europe
discrete cosine transforms
discrete cosine transform
DCT based image watermarking
DCT based applications
Channel estimation
ASP
Application specific processors
application specific processor design
biblio
Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
polynomial-time computable function
wireless security
wireless devices
Wireless communication
wireless channels
wireless channel characteristics
transport protocols
security
Protocols
Probes
private communications
privacy preserving password verification
1-out-of-2 oblivious transfer protocol
physical channel characteristics
Oblivious transfer
data privacy
Cryptography
cryptographic tools
Cryptographic Protocols
cryptographic protocol
computational complexity
computational assumptions
Communication system security
Channel estimation
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Mon, 05/04/2015 - 12:04pm
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Fri, 05/01/2015 - 8:39am
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning
« first
‹ previous
1
2
3