Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information theory
biblio
Modeling and analyzing privacy-awareness social behavior network
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
privacy protection
Computing Theory and Privacy
social behavior network
privacy driven model
privacy disclosure behavior
networked human society
network evolutions
highly dynamical network behaviors
Habitual privacy
driving force
decision process
privacy awareness
behavioural sciences computing
Social Behavior
Sensitivity
Scalability
information theory
complex networks
social network
social networking (online)
Computational modeling
Social network services
privacy
pubcrawl
Human behavior
Resiliency
security
Conferences
data privacy
biblio
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Submitted by aekwall on Mon, 09/21/2020 - 3:48pm
Resiliency
Human behavior
information theory
multistage two player game
privacy
privacy breaches
privacy preserving
Privacy Risk
privacy violation access requests
pubcrawl
Games
risk adaptive access control
risk analysis
Risk based access control
risk based access model
risk value
Scalability
Shannon information
sub-game perfect Nash equilibrium
cross-domain environment
Access Control
access control system
access request
Adaptation models
authorisation
Big Data
Cloud Computing
Control Theory and Privacy
Computing Theory and Privacy
cyber physical systems
cyber-physical systems
data privacy
estimation
game model
game theoretical analysis
game theoretical risk based access control
game theory
biblio
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes
Submitted by grigby1 on Fri, 09/18/2020 - 1:47pm
Upper bound
secure exact-repair regenerating codes
secure determinant codes
repair bandwidth
per-node storage
information-theoretic secrecy
Distributed storage system
codes
Manganese
linear codes
coding theory
information theory
security of data
Compositionality
Bandwidth
Metrics
Redundancy
maintenance engineering
storage management
Cryptography
Resiliency
resilience
pubcrawl
security
biblio
Flexible Design of Finite Blocklength Wiretap Codes by Autoencoders
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
leakage tradeoff
wiretap code
wireless devices
vanishing leakage
traditional codes
telecommunication security
security
Resiliency
resilience
radiocommunication
pubcrawl
physical layer security
Neural networks
neural network autoencoders
Metrics
legitimate receiver
autoencoder
information theory
Gaussian wiretap channels
Gaussian channels
flexible wiretap code design
flexible design
finite blocklength wiretap codes
finite blocklength
error statistics
error rate
decoding error probability
Decoding
Cryptography
Compositionality
coding theory
channel coding
biblio
Extrinsic Information Transfer (EXIT) Analysis for Short Polar Codes
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
iterative decoding
wireless channels
short polar codes
Resiliency
Receivers
pubcrawl
polarized channels
polar codes
parity check codes
Noise measurement
noieseless channels
Mutual information
Metrics
low density parity check codes
coding theory
information theory
information bit
frozen bit
extrinsic information transfer analysis
EXIT chart
error correction codes
Decoding
composability
completely noisy channels
channel coding
channel capacity
5G mobile communication
security
biblio
Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
policy-based governance
brute force attacks
plaintext
key space
information theory
cryptosystem key
cryptographer
Crypto-System
Brute Force Attack
game theory
Ciphers
Ciphertext
Human Factors
Games
collaboration
pubcrawl
Security Evaluation
Mathematical model
Cryptography
biblio
Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
System performance
receiver
Resiliency
Scalability
secrecy performance
secrecy rate
secrecy rate analysis
SM based VLC
spatial modulation
spatial modulation scheme
pubcrawl
telecommunication security
Telecommunications
uniform selection
upper bounds
US scheme
visible light communication
visible light communications
Visual Light Communications Security
light emitting diodes
CAS scheme
channel adaptive selection scheme
derived secrecy rate bounds
dimmable average optical intensity constraints
eavesdropper
free-space optical communication
indoor communication
indoor VLC system
information theory
active transmitter
lower bounds
Metrics
modulation
multiple transmitters
optical modulation
optical receivers
optical transmitters
physical layer security
biblio
Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
Metrics
two-hop combination network
security of data
secure delivery
secure caching
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
asymmetric connectivity
information theory
information theoretic security
information retrieval
Human Factors
Human behavior
file retrieval
cache-aided end-user
cache storage
biblio
Interactive Compression to External Information
Submitted by grigby1 on Tue, 12/10/2019 - 11:19am
communication complexity
composability
compressive sampling
Correlated sampling
Cyber Physical System
cyber physical systems
External information cost
information theory
Interactive compression
privacy
pubcrawl
resilience
Resiliency
biblio
A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Submitted by grigby1 on Mon, 05/20/2019 - 4:29pm
information theoretic security
triangular game
security evaluator
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
Mathematical model
information theory
Ciphers
Human Factors
Human behavior
Games
game theory
Entropy
cryptosystem security
cryptosystem
Cryptography
composability
collaboration
« first
‹ previous
1
2
3
4
5
next ›
last »