Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mutual information
biblio
Channel Coding Theorems in Non-stochastic Information Theory
Submitted by aekwall on Fri, 07/01/2022 - 8:49am
Channel estimation
zero-error capacity
Shannon capacity
Mutual information
Kolmogorov capacity
coding theorem
\textbackslashtextbackslashdelta\$)-capacity
(\$\textbackslashtextbackslashepsilon
channel coding
security
sufficient conditions
composability
Resiliency
Metrics
pubcrawl
Learning systems
estimation
computer science
biblio
Detection of Malicious SCADA Communications via Multi-Subspace Feature Selection
Submitted by grigby1 on Wed, 05/05/2021 - 11:31am
Redundancy
SCADA Systems Security
Feature Selection
SCADA System Security
Mutual information
Ensemble Learning
cyberphysical systems
Pipelines
SCADA
Compositionality
feature extraction
SCADA systems
supervised learning
Data models
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Intrusion Detection
biblio
Information-spectrum methods for information-theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
information-theoretic security
wiretap channels
telecommunication security
secure rates
secrecy capacity
Scalability
Resiliency
Random variables
pubcrawl
policy-based governance
Mutual information
Metrics
Jamming
Interference
channel state information
information-spectrum methods
information theory
information theoretic security
information security
Information analysis
Human behavior
feedback
fading channels
Fading
ergodic fading channels
Cryptography
complex communication scenarios
biblio
Load Forecasting of Privacy-Aware Consumers
Submitted by grigby1 on Fri, 11/20/2020 - 1:03pm
Resiliency
polling frequency constraints
power engineering computing
predictive control
Predictive models
privacy
privacy protection schemes
privacy-aware consumers
pubcrawl
regression analysis
report consumption data
resilience
policy-based governance
Scalability
short-term load forecasts
SM data
smaller consumer aggregations
smart grid consumer privacy
smart meter
smart meters
STLF accuracy
Support vector machines
support vector regression
temporal resolutions
high spatial resolutions
composability
consumer aggregation levels
consumer privacy
consumer privacy risks
data privacy
data-driven grid management
Electric Grid
energy consumption
forecast accuracy
forecasting
grid visible consumer load profile
collaboration
higher aggregation levels
Human behavior
load forecasting
Load modeling
load profiles
load-forecasting
load-levelling scheme
Metrics
model-distribution predictive control
Mutual information
planning techniques
biblio
Universal Privacy Guarantees for Smart Meters
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
customer privacy
Silicon
battery management systems
Stochastic processes
power distribution
cyber physical systems
maximal information leakage
stochastic models
battery charging policy
adaptive codes
electricity distribution system efficiency
home batteries
nonprobabilistic permuting channels
random processes
universal privacy guarantees
user energy consumption
Control Theory and Privacy
Scalability
utility provider
energy cost
smart meters
energy consumption
energy management systems
power engineering computing
cyber-physical systems
Measurement
Mutual information
privacy
batteries
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Bidirectional Information Flow and the Roles of Privacy Masks in Cloud-Based Control
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
Gaussian noise
Control Theory and Privacy
uplink privacy masks
privacy loss
noise levels
linear plant
Gaussian process noise
downlink privacy masks
cloud-based control architecture
cloud-based control
bidirectional information flow
Cloud Computing
privacy-utility trade-off
cyber physical systems
cyber-physical systems
Mutual information
privacy
pubcrawl
Human behavior
Resiliency
data privacy
Scalability
biblio
Extrinsic Information Transfer (EXIT) Analysis for Short Polar Codes
Submitted by aekwall on Tue, 09/08/2020 - 9:05am
iterative decoding
wireless channels
short polar codes
Resiliency
Receivers
pubcrawl
polarized channels
polar codes
parity check codes
Noise measurement
noieseless channels
Mutual information
Metrics
low density parity check codes
coding theory
information theory
information bit
frozen bit
extrinsic information transfer analysis
EXIT chart
error correction codes
Decoding
composability
completely noisy channels
channel coding
channel capacity
5G mobile communication
security
biblio
Privacy Against Brute-Force Inference Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:37pm
concave programming
brute force attacks
utility measure
privacy-preserving data release
privacy-leakage budget
piecewise linear techniques
piece-wise linear function
Mutual information
Linear programming
linear program
guessing leakage
f-information
data privacy
concave function
brute-force inference attacks
Markov processes
probability
policy-based governance
Entropy
Human Factors
sensitive data
optimization
pubcrawl
privacy
biblio
Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
confidential label
privacy models and measurement
Sibson mutual information
privacy-utility trade-off
privacy preserving data disclosure mechanisms
privacy metric
output data vector
MNIST dataset
maximal information leakage
Information Theoretic Privacy
information theoretic measures
FERG dataset
data vectors
data driven setting
data privacy
Bernoulli-Gaussian model
auto-encoders
privacy preservation
distortion
generative adversarial networks
gaussian distribution
Measurement
Mutual information
optimization
Metrics
privacy
pubcrawl
Data models
biblio
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete
Submitted by grigby1 on Tue, 01/28/2020 - 1:36pm
telecommunication traffic
packet inter-arrival times
Presses
pubcrawl
search engine
search engines
search predictions
Servers
Side Channel
network traffic
timing
Traffic analysis
transport protocols
user query input field
Vulnerability
website
Web sites
keyboard input events
browser
Browsers
computer network security
HTTP requests
Human behavior
Human Factors
hypermedia
information leakage measurement
autocomplete
Keyboards
keylogging
keylogging side channel attack
keystroke analysis
keystroke timing attack
Metrics
Mutual information
1
2
3
next ›
last »