Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
modulation
biblio
Improving the Confidentiality of VLC Channels: Physical-Layer Security Approaches
Submitted by aekwall on Tue, 05/18/2021 - 2:15pm
Scalability
encryption
Resiliency
pubcrawl
Wireless communication
Metrics
physical-layer security
confidentiality
OFDM
optical transmitters
visible light communication
modulation
Visible Light Communications Security
biblio
Physical Adversarial Attacks Against Deep Learning Based Channel Decoding Systems
Submitted by aekwall on Mon, 03/15/2021 - 10:57am
Jamming
wireless security
telecommunication security
Resiliency
pubcrawl
private key cryptography
physical white-box
physical adversarial attacks
Perturbation methods
Noise measurement
Neural networks
modulation
Metrics
learning (artificial intelligence)
white box cryptography
huge success
deep learning channel
deep learning
Decoding
conventional jamming attacks
composability
classical decoding schemes
channel decoding systems
channel decoding
channel coding
black-box adversarial attacks
Artificial Neural Networks
adversarial attacks
biblio
On the Distributed Jamming System of Covert Timing Channels in 5G Networks
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
covert channels
modulation method
modulation
jam system
interference algorithm
fifth generation mobile network
diversity reception
diversity networks
distributing jammer
distributed jamming system
co-constructing and sharing
5g network
5G mobile network
radiofrequency interference
Jamming
security
Interference
covert channel
covert timing channel
Transmitters
timing
Compositionality
network security
5G mobile communication
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
Servers
biblio
High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
radio networks
link adaptation
low-density parity-check codes
modulation
modulation and coding schemes
modulation coding
multiple MCS rates
parity check codes
pubcrawl
Information hiding
resilience
Resiliency
Scalability
Throughput
underlying communication system
Wireless communication
wireless LAN
wireless local area network modulation
directional multi-Gigabit (DMG)
adaptive rate wireless communication systems
channel capacity
coding schemes
composability
Compositionality
covert channel performance
covert channel throughput
covert channels
adaptation mechanisms
embedding techniques
error statistics
forward error correction
forward error correction-based information hiding technique
generalized information hiding model
high-throughput covert channels
IEEE 802.11ad WLAN
biblio
Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation
Submitted by aekwall on Mon, 07/13/2020 - 10:18am
System performance
receiver
Resiliency
Scalability
secrecy performance
secrecy rate
secrecy rate analysis
SM based VLC
spatial modulation
spatial modulation scheme
pubcrawl
telecommunication security
Telecommunications
uniform selection
upper bounds
US scheme
visible light communication
visible light communications
Visual Light Communications Security
light emitting diodes
CAS scheme
channel adaptive selection scheme
derived secrecy rate bounds
dimmable average optical intensity constraints
eavesdropper
free-space optical communication
indoor communication
indoor VLC system
information theory
active transmitter
lower bounds
Metrics
modulation
multiple transmitters
optical modulation
optical receivers
optical transmitters
physical layer security
biblio
Adversarial Machine Learning Attack on Modulation Classification
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
modulation
Task Analysis
Support vector machines
Signal to noise ratio
security of data
Scalability
Robustness
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
Modulation classification
Adversarial Machine Learning
ML-based modulation classifiers
ML-based modulation classification methods
ML models
Mathematical model
learning (artificial intelligence)
Human behavior
Deterrence
cognitive self-driving networks
Carlini & Wagner attack
adversarial ML examples
adversarial machine learning attack
biblio
Performance Degradation of SD-FEC Due to XPM Phase Noise in WDM Transmission System with Low-Speed Optical Supervisory Channel
Submitted by grigby1 on Fri, 06/19/2020 - 10:34am
Optical noise
XPM-induced phase noise penalty
WDM transmission system
wavelength-division multiplexing
wavelength division multiplexing
signal bit-pattern dependence
SD-FEC performance
Resiliency
resilience
pubcrawl
phase noise
Phase modulation
phase coding
optical transmitters
optical supervisory channel
bit rate 100 Gbit/s
optical modulation
numerical simulations
numerical analysis
Nonlinear optics
modulation
Metrics
low-speed OSC
low-speed optical supervisory channel
light transmission
forward error correction
Degradation
Cross-phase modulation
composability
biblio
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding
Submitted by grigby1 on Mon, 04/06/2020 - 1:23pm
parity check codes
LLR-based turbo code
log-likelihood ratio
low-density parity check code
Maximum likelihood decoding
Metrics
MIMO communication
modulation
modulation coding
network coding
numerical analysis
numerical evaluation
LLR-based outer channel coding
physical layer security
polar code
polar code concatenation
polar codes
pubcrawl
resilience
Resiliency
SCAD
secure channel coding effect
sequential LLR
composability
5G networks
bit error rate performance
block codes
C-MIMO transmission scheme
channel coding
chaos
chaos multiple-input multiple-output-based polar concatenation code
chaos transmission
chaotic communication
chaotic MIMO block modulation
5 G
concatenated codes
convolutional code
Convolutional codes
cyber physical systems
Decoding
error correction ability
error correction codes
error statistics
iterative decoding
LDPC-concatenated transmission
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
modulation
weak thermal hot spots
Trojan horses
trojan horse detection
Trojan detection
thermal scans
Thermal Mapping
Temperature measurement
stealthy hardware Trojan detection
pubcrawl
Phase measurement
phase information
Phase
amplitude analysis
measurement platform
Lock-in Thermography
invasive software
integrated circuits
infrared thermography
infrared signals
infrared imaging
Heating systems
Hardware
formidable alternative
detection method
« first
‹ previous
1
2
3
4
5
next ›
last »