Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaos
biblio
Chaos-based Information Rotated Polar Coding Scheme for Visible Light Wiretap Channel
Submitted by aekwall on Mon, 07/13/2020 - 11:17am
polar codes
Visual Light Communications Security
visible light wiretap channel
visible light communication systems
telecommunication security
telecommunication network reliability
security
secure polar coding scheme
Scalability
rotation principle
rotated information
Resiliency
Reliability
pubcrawl
channel coding
Metrics
light polarisation
free-space optical communication
chaotic sequences
chaotic communication
chaos-based information rotated polar coding scheme
chaos
channel polarization
channel conditions
bit-channels
bit-channel identification
composability
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
An Efficient Image Encryption Using Chaos Theory
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Image coding
turmoil hypothesis
section astute rearranging
Resiliency
resilience
push savvy rearranging
pubcrawl
pixel substitution
pixel shuffling
pixel replacement
pixel rearranging
Indexes
image encryption
bit-XOR activity
Entropy
encryption
efficient encryption
disorder hypothesis
decryption
cyber-physical systems
Cryptography
control systems
Conferences
composability
chaos theory
chaos
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
DNA and Chaos Based Confusion-Diffusion for Color Image Security
Submitted by aekwall on Mon, 06/22/2020 - 11:28am
image encryption
multimedia files
image pixels
DNA XOR rules
DNA decoding
DNA coding
Diffusion
deoxyribo nucleic acid coding
confusion-diffusion process
Confusion
confused image
column shuffling
colour image encryption
color image security
chaos aided inter-planar row
DNA cryptography
Cryptography
Histograms
chaos
image colour analysis
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
Design of a Chaotic Oscillator based Model Building Attack Resistant Arbiter PUF
Submitted by grigby1 on Fri, 04/24/2020 - 12:02pm
PUF
Monte Carlo analysis
Monte Carlo methods
oscillating behaviors
oscillating systems
Oscillators
physical unclonable functions
privacy
pubcrawl
Modeling Attacks
PUF architecture
resilience
Resiliency
Resistance
security
security of data
Unclonability
arbiter PUF
Metrics
Measurement
Mathematical model
learning (artificial intelligence)
Integrated circuit modeling
FPGA
field programmable gate arrays
Cryptography
conventional machine learning
composability
Chua's oscillator circuit
Chua's Oscillator
chaotic oscillator
chaotic behaviour
chaos
biblio
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
parity check codes
LLR-based turbo code
log-likelihood ratio
low-density parity check code
Maximum likelihood decoding
Metrics
MIMO communication
modulation
modulation coding
network coding
numerical analysis
numerical evaluation
LLR-based outer channel coding
physical layer security
polar code
polar code concatenation
polar codes
pubcrawl
resilience
Resiliency
SCAD
secure channel coding effect
sequential LLR
composability
5G networks
bit error rate performance
block codes
C-MIMO transmission scheme
channel coding
chaos
chaos multiple-input multiple-output-based polar concatenation code
chaos transmission
chaotic communication
chaotic MIMO block modulation
5 G
concatenated codes
convolutional code
Convolutional codes
cyber physical systems
Decoding
error correction ability
error correction codes
error statistics
iterative decoding
LDPC-concatenated transmission
biblio
Compressive Sensing and Hyper-Chaos Based Image Compression-Encryption
Submitted by grigby1 on Tue, 12/10/2019 - 11:21am
Hyper-chaos
Two dimensional displays
Sparse matrices
sparse coefficients
security
Resiliency
resilience
pubcrawl
privacy
matrix algebra
Logistics
linear measurements
Image reconstruction
Image coding
hyper-chaos based image compression-encryption algorithm
hyper-chaos based diffusion
2D-Compressive Sensing
encryption
data compression
cyber physical systems
Cyber Physical System
Cryptography
compressive sensing
compressive sampling
compression-encryption algorithm
Compression
compressed sensing
composability
cipher image
chaotic communication
chaos based measurement matrix construction
chaos
biblio
Tools for Investigating the Phishing Attacks Dynamics
Submitted by grigby1 on Tue, 11/26/2019 - 3:48pm
phishing attacks detection
wavelet transforms
wavelet coherence.
wavelet coherence
wavelet analysis
tools
the chaos theory
Stability analysis
pubcrawl
phishing attacks occurrence
phishing attacks dynamics
a phase portrait
Phishing
human factor
Human behavior
estimation
computer network security
Computer crime
Coherence
chaos theory
chaos
biblio
A Delayed Feedback Chaotic Encryption Algorithm Based on Polar Codes
Submitted by aekwall on Mon, 11/25/2019 - 2:10pm
channel coding
polar codes
physical layer security
encoding information protection
delayed feedback chaotic encryption algorithm
delayed feedback
data transmission security
chaotic sequences
binary keys extraction
chaotic cryptography
cryptanalysis
chaotic system
wireless channels
security of data
chaotic communication
chaos
Predictive Metrics
Reliability
feedback
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
encryption
Cryptography
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »