Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
coding theory
biblio
On the information leakage of finite block-length wiretap polar codes
Submitted by grigby1 on Fri, 07/01/2022 - 8:30am
Physical layer
wiretap channel
information theory
Equivocation
Information Leakage
Resiliency
polar codes
coding theory
physical layer security
security
Decoding
Complexity theory
Task Analysis
Metrics
estimation
resilience
pubcrawl
biblio
Security and Reliability Performance Analysis for URLLC With Randomly Distributed Eavesdroppers
Submitted by grigby1 on Fri, 07/01/2022 - 8:30am
coding theory
Ultra-reliable and low-latency communications (URLLC)
security-reliability tradeoff
finite-blocklength information theory
channel training
Ultra reliable low latency communication
Resiliency
Propagation losses
stochastic geometry
security
error probability
reliability theory
Performance analysis
wireless networks
Metrics
Conferences
resilience
pubcrawl
biblio
New McEliece Cryptosystem Based on Polar-LDPC Concatenated Codes as a Post-quantum Cryptography
Submitted by grigby1 on Fri, 07/01/2022 - 8:29am
coding theory
Post-quantum resilience
McEliece Cryptosystem
LDPC codes
Asymmetric Encryption
codes
Resiliency
Resists
polar codes
security
parity check codes
Decoding
Metrics
Quantum mechanics
quantum computing
Computers
resilience
pubcrawl
biblio
Doubly-Exponential Identification via Channels: Code Constructions and Bounds
Submitted by grigby1 on Fri, 07/01/2022 - 8:29am
security
pubcrawl
resilience
Correlation
Reed-Solomon codes
Metrics
Decoding
Upper bound
coding theory
optical receivers
Resiliency
biblio
Cloud Property Graph: Connecting Cloud Security Assessments with Static Code Analysis
Submitted by grigby1 on Fri, 07/01/2022 - 8:29am
coding theory
static code analysis
configuration monitoring
code property graph
cloud security assessment
codes
Resiliency
Regulation
target tracking
Cloud Computing
Cloud Security
Ontologies
Metrics
Runtime
privacy
resilience
pubcrawl
security
biblio
Optimal Linear Coding Schemes for the Secure Decentralized Pliable Index Coding Problem
Submitted by grigby1 on Fri, 07/01/2022 - 8:29am
security
pubcrawl
resilience
Conferences
Additives
Indexes
encoding
Metrics
Transmitters
coding theory
linear codes
Resiliency
biblio
Creating a Mathematical Model for Estimating the Impact of Errors in the Process of Reconstruction of Non-Uniform Code Structures on the Quality of Recoverable Video Images
Submitted by grigby1 on Fri, 07/01/2022 - 8:28am
Image coding
video information resource
reconstruction
data transmission channel
coding
Video compression
codes
Resiliency
code construction
coding theory
security
Market research
reliability theory
Reliability
Metrics
Redundancy
encoding
resilience
pubcrawl
biblio
Research on Space-Time Block Code Technology in MIMO System
Submitted by grigby1 on Fri, 07/01/2022 - 8:28am
Bit error rate
Spatial diversity
Space-Time Coding
space-time block code
MIMO technology
Decoding Complexity
block codes
Resiliency
coding theory
security
Telecommunications
Decoding
Complexity theory
Metrics
encoding
resilience
pubcrawl
biblio
Video Coding Method in a Condition of Providing Security and Promptness of Delivery
Submitted by grigby1 on Fri, 07/01/2022 - 8:28am
data handling
quantization
information resources
hiding protection
coding
video coding
Resiliency
PSNR
Availability
coding theory
security
Transform coding
Quantization (signal)
Telecommunications
Reliability
Bandwidth
Metrics
resilience
pubcrawl
biblio
Verification Code Recognition Based on Convolutional Neural Network
Submitted by grigby1 on Tue, 03/08/2022 - 2:32pm
internet-technology
verification code recognition
Resiliency
resilience
pubcrawl
policy-based governance
Neurons
Neural Network Security
network security
Metrics
coding theory
internet
Interference
information management
image recognition
image preprocessing
convolutional neural networks
convolutional neural network
Complexity theory
security
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »