Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
indoor radio
biblio
MuTrack: Multiparameter Based Indoor Passive Tracking System Using Commodity WiFi
Submitted by grigby1 on Tue, 02/16/2021 - 12:26pm
parameter estimation
DFLT system
home security
Hungarian Kalman filter
indoor environment
indoor passive tracking system
low-resolution parameter estimates
multi-dimensional parameters
multidimensional parameters estimator
multiparameter based indoor passive tracking system
MuTrack
device-free localization-tracking
path components
path parameters
Radar tracking
random phase errors
receiving antennas
reference antenna
reliability index
signal sanitization
weak target echoes
WiFi signal
wireless LAN
pubcrawl
Human behavior
resilience
Resiliency
Indexes
target tracking
Reliability
Compositionality
tracking
Wireless fidelity
privacy
indoor radio
Kalman filters
Data Sanitization
elderly care
WiFi
background clutter signals
Clutter
commodity WiFi devices
conjugate operation
contactless awareness applications
biblio
Ultra-wideband Fingerprinting Positioning Based on Convolutional Neural Network
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
precise positioning
Wireless fidelity
underwater acoustic communication
ultra-wideband fingerprinting positioning method
ultra-wideband
Ultra wideband technology
ultra wideband communication
Training
telecommunication computing
Support vector machines
satellite signals
Robustness
Resiliency
resilience
pubcrawl
Acoustic Fingerprints
precise position
indoor radio
indoor positioning system
Human behavior
GPS
Global Positioning System
fingerprinting positioning
Fingerprint recognition
fingerprint positioning methods
convolutional neural networks
convolutional neural network
convolutional neural nets
composability
biblio
Indoor Silent Object Localization using Ambient Acoustic Noise Fingerprinting
Submitted by grigby1 on Wed, 01/20/2021 - 3:07pm
localization
subtraction method
stationary sound sources
Silent object
signal denoising
Resiliency
resilience
pubcrawl
object position
noise signal
noise absorption characteristic
Noise
microphones
acoustic
lateral localization
indoor silent object localization
indoor radio
Indoor
Human behavior
Fingerprinting
composability
ambient acoustic noise fingerprinting
Acoustic signal processing
acoustic noise
Acoustic Fingerprints
biblio
Differential Privacy-Based Indoor Localization Privacy Protection in Edge Computing
Submitted by aekwall on Mon, 09/21/2020 - 2:49pm
pubcrawl
indoor localization service
indoor radio
learning (artificial intelligence)
lightweight differential privacy-preserving mechanism
localization model
massive sensing data
original localization technology
privacy
privacy preserving
indoor localization
Resiliency
Scalability
serious privacy leakage
smart devices
Training
Wi-Fi-based indoor localization
wireless LAN
ε-differential privacy theory
differential privacy guarantee
trust
Cloud Computing
computer network security
Computing Theory and Privacy
Control Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
differential privacy
Computing Theory
differential privacy-based indoor localization privacy protection
distributed processing
edge computing
edge computing environment
Edge computing.
edge networks
Fingerprint recognition
Human behavior
biblio
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting
Submitted by aekwall on Mon, 08/10/2020 - 9:33am
malicious individuals
localization
indoor radio
Android app
Buildings
Columbia University dormitory
Fingerprinting
GPS signals
homo-morphic cryptographic schemes
Indoor environments
Metrics
server computation capabilities
server-side fingerprint-based indoor localization
socialist millionaire problem
unique encrypted sorting capability
Wi-Fi
Wi-Fi access points
wireless signals
android encryption
pubcrawl
Servers
Cryptography
encryption
data privacy
telecommunication security
Protocols
mobile computing
Resiliency
Human behavior
Scalability
privacy
Databases
smart phones
wireless LAN
Wireless fidelity
Homomorphic encryption
efficiency
fingerprint identification
biblio
CEPHEID: the infrastructure-less indoor localization using lighting fixtures' acoustic frequency fingerprints
Submitted by aekwall on Mon, 08/03/2020 - 9:16am
CEPHEID scheme
Acoustic Fingerprints
self localization
MLP
infrastructure-less indoor localization
indoor positioning experiments
Indoor Positioning
indoor localization scheme
environmental fingerprint
DNN classifier
discrete electronic components
Computer peripherals
CHEPEID
characteristic flickering pattern
Resiliency
ceiling lighting fixtures
indoor radio
lighting
Discrete Fourier transforms
light emitting diodes
DNN
estimation
Cameras
Mathematical model
wireless sensor networks
composability
pubcrawl
Human behavior
biblio
Framework for Handover process using Visible Light Communications in 5G
Submitted by aekwall on Mon, 07/13/2020 - 10:16am
Scalability
mobility and handover
mobility management (mobile radio)
multi-access systems
multiuser access
Optical Wireless Communication
pubcrawl
Radio Frequency spectrum resources
Resiliency
RF spectrum resources
Metrics
smart devices
steerable access point
visible light communication (VLC)
visible light communications
Visual Light Communications Security
Wireless communication
wireless communication technologies
Wireless fidelity
Industrial IoT
bidirectional transmission
digital machines
free-space optical communication
Handover
handover process
iiot
indoor environment
indoor radio
Industrial Internet of Things
5G mobile communication
Internet of Everything
Internet of Things
IoE
Li-Fi concept
light fidelity
light-fidelity
Light-Fidelity (Li-Fi)
mechanical machines
biblio
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels
Submitted by grigby1 on Wed, 03/04/2020 - 3:15pm
telecommunication security
physical layer security
private key cryptography
pubcrawl
secret key generation studies
security
software radio
TDD
TDD mode
Pearson correlation coefficient
theoretical analysis
theoretical cryptography
time division duplexing
time division multiplexing
USRP
wireless channel reciprocity
wireless channels
X310 universal software radio peripheral
FDD
channel state information
composability
Compositionality
correlation methods
CSI correlation coefficient
eavesdropping attack
eavesdropping distance
eavesdropping wiretap channel model
channel reciprocity
FDD channel reciprocity
FDD wiretap channels
frequency division duplexing
frequency division multiplexing
indoor radio
indoor wireless CSI measurement system
legitimate channel
N210
biblio
Location Determination by Processing Signal Strength of Wi-Fi Routers in the Indoor Environment with Linear Discriminant Classifier
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
Metrics
wireless LAN
Wireless fidelity
Wi-Fi signal values
Wi-Fi signal strength
Wi-Fi routers
Topology
statistical analysis
signal classification
Router Systems Security
Resiliency
resilience
pubcrawl
classification
Mathematical model
machine learning algorithms
location determination
linear discriminant analysis classification
Linear discriminant analysis
indoor radio
indoor location determination
Global Positioning System signals
Global Positioning System
Fingerprint recognition
Classification algorithms
biblio
Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals
Submitted by grigby1 on Wed, 05/01/2019 - 10:33am
security
Q-learning based detection scheme
received ambient signal properties
Received signal strength indicator
reinforcement learning technique
resilience
Resiliency
roadside units
rogue edge attacks
rogue edge node
RSSI
RSUs
Scalability
pubcrawl
serving edge
shared ambient radio
signal detection
source media access control address
spoofing detection
telecommunication computing
telecommunication security
test threshold
VANET model
vehicular ad hoc networks
wireless networks
learning (artificial intelligence)
ambient radio signals
authentication
composability
detection error rate reduction
detection scheme
dynamic VANET
edge computing
edge detection
Image edge detection
indoor radio
indoor wireless networks
large-scale network infrastructure
access protocols
learning-based rogue edge detection
MAC address
man-in-the-middle attacks
Metrics
mobile device
Mobile handsets
OBUs
onboard units
optimal detection policy
PHY-layer rogue edge detection scheme
physical-layer rogue edge detection
1
2
next ›
last »