Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
lower bounds
biblio
Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation
Submitted by aekwall on Mon, 07/13/2020 - 10:18am
System performance
receiver
Resiliency
Scalability
secrecy performance
secrecy rate
secrecy rate analysis
SM based VLC
spatial modulation
spatial modulation scheme
pubcrawl
telecommunication security
Telecommunications
uniform selection
upper bounds
US scheme
visible light communication
visible light communications
Visual Light Communications Security
light emitting diodes
CAS scheme
channel adaptive selection scheme
derived secrecy rate bounds
dimmable average optical intensity constraints
eavesdropper
free-space optical communication
indoor communication
indoor VLC system
information theory
active transmitter
lower bounds
Metrics
modulation
multiple transmitters
optical modulation
optical receivers
optical transmitters
physical layer security
biblio
Semi-Finite Length Analysis for Secure Random Number Generation
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
upper bounds
random key generation
STEM
Solids
semifinite length analysis
secure random number generation
secure key generation length
lower bounds
imperfect random numbers
asymptotic expansion
Upper bound
Scalability
set theory
random number generation
Lattices
Entropy
Distribution functions
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by el_wehby on Mon, 05/14/2018 - 3:07pm
physical power flow maximization
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
power system vulnerability evaluation
power system security
Polish system
Algorithm design and analysis
optimization
mixed-integer linear program
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
bi-level optimization problem
1449080
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by grigby1 on Mon, 11/27/2017 - 11:24am
Polish system
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
Resiliency
pubcrawl
power system vulnerability evaluation
power system security
power grid vulnerability analysis
Algorithm design and analysis
physical power flow maximization
optimization
mixed-integer linear program
Metrics
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
composability
bi-level optimization problem
biblio
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography Does Not Necessarily Imply One-Way Functions
Submitted by grigby1 on Mon, 07/24/2017 - 1:02pm
Compositionality
cryptographic primitives
lower bounds
Metrics
provable security
pubcrawl
Resiliency
Steganography
biblio
An Algorithm for Computing Lower Bounds for Unrestricted Black-Box Complexities
Submitted by grigby1 on Mon, 03/27/2017 - 9:51am
black box
black box encryption
black-box complexity
composability
Cryptography
encryption
lower bounds
mastermind
Metrics
onemax
pubcrawl
Resiliency