Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
signal processing
biblio
Detection with compressive measurements corrupted by sparse errors
Submitted by grigby1 on Thu, 08/23/2018 - 11:41am
Nyquist-rate samples
sparse signal representation
Sparse matrices
sparse error corruption
signal sampling
signal reconstruction algorithms
signal reconstruction
signal processing
signal detection
Resiliency
resilience
pubcrawl
privacy
composability
Noise measurement
narrowband interference
measurement uncertainty
interference (signal)
impulse noise
Image reconstruction
Distortion measurement
Detectors
cyber-physical systems
compressive sampling
compressive measurement detection problem
compressed sensing
biblio
Jellyfish attack detection and prevention in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
JF reorder attack
telecommunication security
signal processing
sensors
security
Resiliency
resilience
pubcrawl
Protocols
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
attack prevention
JF periodic dropping attack
JF delay variance attack
JF attack delay data packets
Jellyfish Delay Variance Attack (JFDV)
jellyfish attack prevention
jellyfish attack detection
Jellyfish Attack
DoS attack
delays
Conferences
Compositionality
biblio
Real-time localization of mobile targets using abnormal wireless signals
Submitted by K_Hooper on Wed, 04/04/2018 - 9:52am
pubcrawl
wireless sensor networks
Wireless communication
Underwater Networks
target tracking
signal processing
Scalability
Resiliency
real-time systems
real-time localization
abnormal wireless signals
multiwireless signals
mobile targets
Mobile communication
Metrics
Mathematical model
GPS signals
Global Positioning System
Communication system security
biblio
A secure localization algorithm based on reputation against wormhole attack in UWSNS
Submitted by K_Hooper on Wed, 04/04/2018 - 9:51am
secure localization algorithm
wormhole attack
wireless sensor networks
UWSNs-RDV-HOP
UWSNs
Underwater Wireless Sensor Networks
Underwater Networks
telecommunication security
Signal processing algorithms
signal processing
security
secure scheme
Acoustics
Scalability
Resiliency
reputation values
pubcrawl
propagation distance
Metrics
Mathematical model
marine communication
inconsistent propagation delays
DV-hop
anchor nodes
biblio
Smart grid data privacy protection algorithm
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
Communication Systems
Human behavior
Human Factors
Indexes
L-diversity algorithm
Manganese
privacy preserving
pubcrawl
resilience
Resiliency
Scalability
service computing
signal processing
smart gird
Smart Grid Privacy
biblio
Immersive 360 Holoscopic 3D system design
Submitted by K_Hooper on Wed, 01/10/2018 - 11:11am
immersive 360 holoscopic 3D system design
Three-dimensional displays
stereoscopic 3D imaging
stereo image processing
spatial image
single aperture camera
signal processing
Resiliency
pubcrawl
panoramic 3D image
Microoptics
microlenses
microlens array
Lenses
integral image
immersive systems
3D depth
immersive 3D acquisition
Human behavior
Holoscopic 3D Imaging
Holoscopic 3D image
holoscopic 3D camera
H3D Imaging
Fly's eye technique
composability
camera separation baseline
Cameras
360-degree holoscopic 3D imaging system design
360 Camera
3D stitching
3D parallax
biblio
Reversible Chaotic Encryption Techniques For Images
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Image Processing
UACI
tent map
Signal processing algorithms
signal processing
reversible chaotic encryption technique
Resiliency
pubcrawl
PSNR
pixel shuffling
NPCR
MSE
Metrics
Logistics
logistic map
Arnold cat map
image pixels
image encryption security
image encryption
encryption
Cryptography
composability
civilian systems
Chaotic techniques
Chaotic maps
chaotic cryptography
chaotic communication
Cats
Arnold's cat map
biblio
Designing ECG-based physical unclonable function for security of wearable devices
Submitted by grigby1 on Wed, 12/20/2017 - 1:00pm
feature extraction
wearables security
wearable device security
signal processing security
signal processing
Resiliency
pubcrawl
privacy
personal ECG signals
Metrics
medical signal processing
machine learning algorithms
learning (artificial intelligence)
intersubject Hamming distance
Finite impulse response filters
Artificial Neural Networks
encryption engines
Electrocardiography
electrocardiogram
ECG-based physical unclonable function
ECG feature extraction
ECG database
decryption engines
Cryptography
Cost function
composability
biometrics (access control)
biometric authentication
Band-pass filters
authentication
biblio
Implementation of GPS signal simulation for drone security using Matlab/Simulink
Submitted by grigby1 on Wed, 12/20/2017 - 12:59pm
signal data
Jamming
Mathematical model
noise models
P code
radio receivers
radiofrequency interference
Satellite broadcasting
Satellites
IF GPS signal
signal processing
signal processing algorithm
Signal to noise ratio
Signal-to-noise ratio (SNR)
simulated signals
simulation model
spoofing-jamming interference
signal processing security
Drone security
pubcrawl
Resiliency
privacy
composability
Radiation detectors
Generators
carrier-to-noise ratio estimation
digital intermediate frequency GPS signal
Metrics
drone security applications
Global Positioning System
GPS receivers
GPS signal generator
GPS signal simulation
GPS spoofing signal generation
IF (intermediate frequency) signals
biblio
Secrecy outage probability of full-duplex networks with cognitive radio environment and partial relay selection
Submitted by K_Hooper on Wed, 12/20/2017 - 11:29am
pubcrawl
underlay cognitive radio networks
Transmitters
Telecommunications
signal processing
secrecy outage probability
Resiliency
Relays
relay networks (telecommunication)
receiving antennas
cognitive radio
Protocols
probability
partial relay selection
multiple relays selection
full-duplex networks
decode-and-forward relay selection
decode and forward communication
Cognitive Radio Security
cognitive radio environment
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »