Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
error correction codes
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
Design and Implementation of Secure and Encoded Data Transmission Using Turbo Codes
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
Maximum log-map algorithm
Viterbi algorithm
Turbo Encoder
Turbo Decoder
turbo codes
text encoding
text decoding
telecommunication security
Shannonlimit
secure data transmission
Resiliency
Recursive systematic convolutional encoder
pubcrawl
parity check codes
noisy data
Metrics
channel capacity
Maximum likelihood decoding
iterative decoding
Interleaver
image encoding
image decoding
Image coding
forward error correction method
forward error correction
error detection
error correction codes
encoded data transmission
deinterleaver
Decoding
Convolutional codes
composability
biblio
Composable, Unconditionally Secure Message Authentication without any Secret Key
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
message authentication
secure message authentication
Scalability
Resiliency
resilience
pubcrawl
Protocols
probability
policy-based governance
Noise measurement
Metrics
authentication
information theoretic security
Human Factors
Human behavior
error correction codes
error correction
encoding
Decoding
Cryptography
Cryptographic Protocols
channel coding
biblio
Securing a Wireless Network-on-Chip Against Jamming Based Denial-of-Service Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:09am
persistent jamming attack
internal hardware Trojans
jamming attack
low-power transceivers
ML classifiers
network-on-chip communications
NoC switches
nonscalable multihop data transmission paths
On chip interconnect
On chip security
on-chip data transfer
on-chip wireless medium
denial-of-service attacks
radio transceivers
radiofrequency interconnections
random burst error correction code
Switches
switching networks
WiNoC security
wired NoC architectures
wireless interconnection
Wireless NoC
wireless NoC architectures
network on chip security
system-on-chip
telecommunication security
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Wireless communication
Metrics
machine learning
telecommunication network routing
telecommunication computing
radio networks
Scalability
DoS
Hardware Security
error correction codes
radiofrequency interference
DoS attack
Jamming
denial-of-service attack
machine learning classifier
HT
network-on-chip
data transfer security threats
biblio
Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
partially synchronized neural networks
telecommunication security
Synchronization
synchronisation
security verification
Resiliency
resilience
quantum cryptography
pubcrawl
policy-based governance
passive attacks
Artificial Neural Networks
Neurons
Neural Network Security
neural nets
Metrics
machine learning
error rates
error correction codes
error correction
collaboration
biblio
Analyzing the Browser Security Warnings on HTTPS Errors
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
Error analysis
Resistance
browser behaviors
browser defects
browser security warnings
certificate verification
certification
common HTTPS errors
cryptographic algorithm
Compositionality
HPKP
HSTS
name validation
Phase change materials
secure connections
secure Web applications
valid certificate chain
Web Browser Security
internet
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data confidentiality
telecommunication security
data privacy
Cryptography
composability
encoding
programming
online front-ends
error correction codes
Metrics
Reliability
biblio
Delay Optimal Coding for Secure Transmission over a Burst Erasure Wiretap Channel
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
Resiliency
Metrics
minimum possible delay
network coding
optimal secure burst erasure
perfect security
pubcrawl
Receivers
resilience
low-delay coding
Secure Messages
secure transmission
security
streaming code
Streaming communication
Systematics
telecommunication security
delay optimal burst erasure correcting
block codes
burst erasure correcting code
burst erasure wiretap channel
code parameters
composability
cyber physical systems
Decoding
delay constraint
channel coding
delay optimal coding
delay optimal streaming codes
delays
diagonal interleaving
DO-SBE block codes
error correction codes
information security
biblio
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
parity check codes
LLR-based turbo code
log-likelihood ratio
low-density parity check code
Maximum likelihood decoding
Metrics
MIMO communication
modulation
modulation coding
network coding
numerical analysis
numerical evaluation
LLR-based outer channel coding
physical layer security
polar code
polar code concatenation
polar codes
pubcrawl
resilience
Resiliency
SCAD
secure channel coding effect
sequential LLR
composability
5G networks
bit error rate performance
block codes
C-MIMO transmission scheme
channel coding
chaos
chaos multiple-input multiple-output-based polar concatenation code
chaos transmission
chaotic communication
chaotic MIMO block modulation
5 G
concatenated codes
convolutional code
Convolutional codes
cyber physical systems
Decoding
error correction ability
error correction codes
error statistics
iterative decoding
LDPC-concatenated transmission
biblio
Security Analysis of Forward Error Correction Codes in Relay Aided Networks
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
relay aided networks
Metrics
network coding
nonfunctional requirements
physical layer security
physical layer security scheme
physical layer security techniques
Predictive Metrics
pubcrawl
random error vector
Receivers
relay aided network security
McEliece cryptosystem.
Relays
Reliability
Resiliency
secure communication
security
security level
security performance
transmission
transmitted information
wireless sensor networks
Error control codes
composability
cryptographic methods
Cryptography
cyber physical systems
data confidentiality
decentralized relay nodes
Decoding
eavesdropper
encoding
energy efficiency requirements
Channel models
error correction codes
error probability
error statistics
FEC coding schemes
forward error correction
forward error correction codes
Golay codes
industrial wireless sensor networks
IWSN setups
iwsns
biblio
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Submitted by aekwall on Mon, 04/06/2020 - 9:55am
cyber physical systems
zero-error communication
worst-case adversarial setting
wire-tap channel
unbounded computational resources
sum-subspace codes
sum-rank metric
secure multishot network coding
reliable multishot network coding
random codes
network error-correction
multishot network coding
linearized Reed-Solomon codes
linear network code
inject erroneous packets
coding scheme
telecommunication security
linear codes
Reed-Solomon codes
network coding
Knowledge engineering
error correction codes
encoding
Predictive Metrics
telecommunication network topology
computational complexity
network topology
Reliability
Decoding
composability
pubcrawl
Resiliency
« first
‹ previous
1
2
3
4
5
next ›
last »