Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
error correction
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
error correction codes
pollution attack
Pollution
network error correction
network coding security
information-theoretic approach
Information rates
cryptographic signature
cryptographic approach
information theoretic security
multicast communication
Upper bound
error correction
network coding
Scalability
computer networks
information security
information theory
Metrics
Cryptography
wireless sensor networks
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
biblio
PAIR: Pin-aligned In-DRAM ECC architecture using expandability of Reed-Solomon code
Submitted by aekwall on Mon, 03/22/2021 - 1:09pm
In-DRAM ECC
Resiliency
Reliability
Reed-Solomon codes
Reed-Solomon code
pubcrawl
process scaling
pin-aligned In-DRAM ECC architecture
performance degradation
PAIR
numerous inherent faults
In-DRAM Error Correcting Code
Compositionality
expandability
error correction codes
error correction
ECC codewords
DRAM vendors
DRAM chips
DRAM
DQ pin lines
density
computer systems
biblio
Application of Bit Interleaving to Convolutional Codes for Short Packet Transmission
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
communication system
short packets
short packet transmission
radiocommunication
long packet transmission
Interleaver
interleaved codes
industrial wireless communication
High reliability
code coding scheme
bit interleaving structure
bit interleaving coding schemes
bit interleaving channel coding
bit interleaving
modulation coding
Resiliency
Error analysis
Convolutional codes
industrial wireless networks
telecommunication network reliability
error correction
Data Transmission
channel coding
Reliability
Metrics
Wireless communication
simulation
composability
pubcrawl
biblio
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
error correction codes
unacceptably-high payload error rates
trellis codes
syndrome codes
STC
nonadversarial noise
embedding process
Dual-syndrome Trellis Codes
channel error rate
Adaptive steganography
forward error correction
noisy channel
Steganography
Convolutional codes
Resiliency
error correction
Payloads
Transform coding
distortion
Noise measurement
channel coding
Bit error rate
Image coding
data encapsulation
Metrics
composability
pubcrawl
biblio
Composable, Unconditionally Secure Message Authentication without any Secret Key
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
message authentication
secure message authentication
Scalability
Resiliency
resilience
pubcrawl
Protocols
probability
policy-based governance
Noise measurement
Metrics
authentication
information theoretic security
Human Factors
Human behavior
error correction codes
error correction
encoding
Decoding
Cryptography
Cryptographic Protocols
channel coding
biblio
Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography
Submitted by grigby1 on Fri, 05/08/2020 - 3:01pm
partially synchronized neural networks
telecommunication security
Synchronization
synchronisation
security verification
Resiliency
resilience
quantum cryptography
pubcrawl
policy-based governance
passive attacks
Artificial Neural Networks
Neurons
Neural Network Security
neural nets
Metrics
machine learning
error rates
error correction codes
error correction
collaboration
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
A Low-Rank Framework of PMU Data Recovery and Event Identification
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
phasor measurement
Vectors
System recovery
synchrophasor measurements
Synchrophasor data
security of data
Resiliency
resilience
real-time event identification method
pubcrawl
privacy-preserving data
power system situational awareness
power engineering computing
PMU data recovery
PMU channels
cyber data attacks
matrix algebra
low-rank matrices
low-rank framework
high-dimensional spatial-temporal blocks
ground-truth data
false data injection attacks
event identification methods
error correction
disturbance identification
data recovery method
data quality
data privacy enhancement
data privacy
data matrix
biblio
Optimizing Quantum Circuits for Modular Exponentiation
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
pubcrawl
verilog implementation
tools
scalable synthesis methods
Scalability
reversible modular exponentiation function
Resiliency
Qubit
Quantum error correction
Quantum Error Correcting Codes (QECC)
quantum computing
quantum computers
quantum circuits
quantum architectures
Quantum Algorithm(QA)
computer architecture
modular exponentiation functions
modular exponentiation
Logic gates
logic designs
logic design
logic circuits
linear nearest neighbor property
Linear Nearest Neighbor (LNN)
Hardware design languages
hardware description languages
exponentiation functions
exponentiation
error correction
biblio
Secure Physical Layer Network Coding versus Secure Network Coding
Submitted by grigby1 on Thu, 12/05/2019 - 10:47am
Physical layer
telecommunication security
Task Analysis
Silicon
security
secure physical layer network coding
secure communication
secrecy analysis
Resiliency
resilience
Receivers
pubcrawl
Predictive Metrics
physical layer security
coding theory
noisy channel
noiseless network
Noise measurement
network coding
Metrics
forward error correction
error correction codes
error correction
cyber physical systems
Cryptography
computation and forward
Compositionality
composability
« first
‹ previous
1
2
3
next ›
last »