Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Bit error rate
biblio
Orthogonal STBC Set Building and Physical Layer Security Application
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
orthogonal codes
coding theory
Transforms
communication complexity
BER
brute force decoding complexity
communications link
complex orthogonal space-time block code
encodes data symbols
Monte Carlo simulations
transmitting antennas
orthogonal STBC matrix
orthogonal STBC set building
physical layer security application
physical layer security.
PLS
space-time block code
space-time block codes
transformation algorithms
Buildings
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Wireless communication
network security
pubcrawl
Compositionality
Signal processing algorithms
Monte Carlo methods
Decoding
error statistics
information theory
Physical layer
Bit error rate
biblio
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
Submitted by grigby1 on Fri, 12/11/2020 - 2:33pm
neural nets
machine learning
machine learning models
malware
Malware Analysis
malware containment
malware detection
Malware-Detection-Cloud-Computing-Graph-Neural-Networks-Federated-Learning-Multicloud-Natural-Language-Processing
Metrics
learning (artificial intelligence)
privacy
Privacy Requirements
pubcrawl
resilience
Resiliency
Task Analysis
Training
virtual machines
feature representation
Biological system modeling
Bit error rate
Cloud Computing
cloud computing environments
cloud-specific optimization problems
data privacy
deep federated defenses
feature extraction
attentional sequence models
federated learning
graph neural networks
graph theory
Human behavior
hypergraph learning models
inductive graph
invasive software
biblio
Covert Communications-Based Information Reconciliation for Quantum Key Distribution Protocols
Submitted by grigby1 on Thu, 07/16/2020 - 12:19pm
quantum bit-error rate
parity bits
Photonics
polarization entanglement
Protocols
pubcrawl
QBER
QKD
QKD protocol
QKD system
optical transmitters
quantum channel
quantum cryptography
quantum key distribution protocol
resilience
Resiliency
Scalability
secure key rates
unsecure key
covert channels
authenticated public channel
BB84 protocol
Bit error rate
Bragg gratings
channel loss
channel noise
composability
Compositionality
Adaptive optics
covert communication
covert communication channel
covert communications-based information reconciliation
Cryptographic Protocols
detector noise
error statistics
Jamming
noiseless public channel
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
A Novel Physical Layer Security Technique Using Master-Slave Full Duplex Communication
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
omnidirectional antenna
high power signal
Interference
interference masks
Internet-of-Things networks
IoT networks
IoT node
legitimate intended nodes
Master-slave communication
master-slave full duplex communication node
full-duplex manner
omnidirectional antennas
Phase modulation
phase-modulated random key-data generation
physical layer security
physical layer security technique
received signal
receiving antennas
self-interference cancellation
signal transmission
resilience
security
computer network security
computer network reliability
Reliability
Receivers
pubcrawl
composability
Metrics
Resiliency
Internet of Things
BER
Bit error rate
bit-error rate
communication reliability
directional antennas
directive antennas
error statistics
Eve location
full-duplex
biblio
Information Theoretical Secure Key Sharing Protocol for Noiseless Public Constant Parameter Channels without Cryptographic Assumptions
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
matrix algebra
theoretical cryptography
SNR
Signal to noise ratio
Shannon information
Quantization (signal)
pubcrawl
Protocols
protocol restrictions
private key cryptography
privacy amplification procedure
Privacy Amplification
privacy
physical layer security
noiseless public constant parameter channels
artificial noise
key sharing protocol
internet
information theoretical secure key sharing protocol
Eigenvalues and eigenfunctions
eigenvalues
eavesdropper channels
Cryptography
Cryptographic Protocols
cryptographic assumptions
constant parameter noiseless public channel
computer network security
Compositionality
composability
Bit error rate
biblio
Performance Analysis of Channel Coding Techniques for Cooperative Adhoc Network
Submitted by aekwall on Mon, 11/25/2019 - 2:06pm
low-density parity-check coding
wireless networks
turbo coding
Resiliency
Relays
relay networks (telecommunication)
Rayleigh fading channels
Rayleigh channels
quadrature amplitude modulation
pubcrawl
parity check codes
noise power spectral density
network coding
Metrics
Ad hoc networks
error statistics
Decode and Forward
cooperative communication
cooperative ad hoc network
convolutional coding
Conferences
composability
channel coding techniques
channel coding
channel capacity
Bit error rate
AWGN channels
additive white Gaussian noise
biblio
Coding Theorem for Systematic LDGM Codes Under List Decoding
Submitted by aekwall on Mon, 03/18/2019 - 9:49am
ensembles
BIOS Security
systematic low density generator matrix codes
systematic LDGM codes
spatial coupling
Sparse matrices
parity check codes
negligible rate loss
low density generator matrix (LDGM) codes
list decoding
linear codes
iterative decoding
iterative belief propagation decoding algorithm
Generators
frame error rate
error statistics
Scalability
concatenated codes
concatenated code
coding theorem
channel coding
channel capacity
capacity-approaching
capacity-achieving codes
capacity-achieving
Bit error rate
binary-input output symmetric memoryless channels
Decoding
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Dynamic Psychological Game for Adversarial Internet of Battlefield Things Systems
Submitted by grigby1 on Mon, 12/10/2018 - 11:34am
optimal IoBT devices
traditional dynamic Bayesian game
Signal to noise ratio
security
Scalability
Resiliency
resilience
pubcrawl
psychology
psychological sequential equilibrium
psychological network interdiction game
psychological game theory
psychological forward induction-based solution
psychological behavior
performance evaluation
adversarial Internet of Battlefield Things systems
novel game-theoretic framework
military communication
iobt
Internet of Things
Internet of battlefield things
Human Factors
Games
game theory
error statistics
dynamic psychological game
dynamic network interdiction game
desired bit error rate performance
Bit error rate
BER
biblio
FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light Communications
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Retina
invisible data encoding
Metrics
Mobile handsets
mobile phone screens
novel modulation method
optical modulation
optical transmitters
pubcrawl
Receivers
resilience
Resiliency
Image color analysis
Scalability
Steganography
telecommunication security
time 2.0 d
uniform data
unlicensed bandwidth resources
unobtrusive steganography methods
user distraction
visible light communications
visual MIMO
display screencamera communication
BER
Bit error rate
camera based receiver architectures
Cameras
color shift based methods
data encapsulation
data hiding capability
Data Transmission
Demodulation
demodulation mechanisms
Device-to-device communication
Visible Light Communications Security
display transmitters
error correction codes
error statistics
foveation
foveation based data hiding
FoVLC
free-space optical communication
HAN systems
home area networking system
human visual system
« first
‹ previous
1
2
3
4
5
6
next ›
last »