Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radiocommunication
biblio
Flexible Design of Finite Blocklength Wiretap Codes by Autoencoders
Submitted by grigby1 on Fri, 09/18/2020 - 12:46pm
leakage tradeoff
wiretap code
wireless devices
vanishing leakage
traditional codes
telecommunication security
security
Resiliency
resilience
radiocommunication
pubcrawl
physical layer security
Neural networks
neural network autoencoders
Metrics
legitimate receiver
autoencoder
information theory
Gaussian wiretap channels
Gaussian channels
flexible wiretap code design
flexible design
finite blocklength wiretap codes
finite blocklength
error statistics
error rate
decoding error probability
Decoding
Cryptography
Compositionality
coding theory
channel coding
biblio
Application of Bit Interleaving to Convolutional Codes for Short Packet Transmission
Submitted by aekwall on Tue, 09/08/2020 - 9:05am
communication system
short packets
short packet transmission
radiocommunication
long packet transmission
Interleaver
interleaved codes
industrial wireless communication
High reliability
code coding scheme
bit interleaving structure
bit interleaving coding schemes
bit interleaving channel coding
bit interleaving
modulation coding
Resiliency
Error analysis
Convolutional codes
industrial wireless networks
telecommunication network reliability
error correction
Data Transmission
channel coding
Reliability
Metrics
Wireless communication
simulation
composability
pubcrawl
biblio
Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications
Submitted by grigby1 on Fri, 04/10/2020 - 11:20am
physical layer security
wireless communication protocols
typical cryptography
radiocommunication
PLS
Internet of Things applications
initial performance analysis
Force
computational power
classical cryptography
IoT devices
IoT
Ciphers
resilience
Resiliency
Metrics
composability
pubcrawl
Receivers
Protocols
Internet of Things
encryption
Cryptography
biblio
An energy-efficient wireless image transmission method based on adaptive block compressive sensing and softcast
Submitted by grigby1 on Thu, 08/23/2018 - 10:41am
SoftCast
power allocation
power allocation factors
privacy
pubcrawl
radical evolution
radiocommunication
receiving image qualities
resilience
Resiliency
sampling rate
optimization
SR
staggering rate
telecommunication power management
transmission distortion
visual communication
Wireless communication
wireless image transmission
wireless multimedia communication
wireless sensor networks
energy consumption
adaptive block compressive sensing
Communication system security
composability
compressed sensing
compression distortion
compressive sampling
cyber-physical systems
data compression
distortion
energy conservation
ABCS-SoftCast
energy-distortion model
energy-efficient wireless image transmission method
energy-efficient wireless image transmission scheme
image block
Image coding
Image communication
information and communication technology
Multimedia communication
optimisation
biblio
Cyber attacks targeting Android cellphones
Submitted by grigby1 on Wed, 02/21/2018 - 12:47pm
resilience
mobile attack approaches
Mobile communication
mobile computing
mobile phones
Primary Mobile Hack Builder
primary mobile hack builder software
pubcrawl
radiocommunication
Metrics
Resiliency
Scalability
security of data
smart phones
SMS information
Software
software based radio circuit
conversation eavesdropping
android encryption
Android operated cellphone control
Android smartphone
application based attacks
Application Based Mobile Attackers
Cameras
cellphone camera
computer software
Android (operating system)
Cyber Attacks
encryption
frequency based attacks
Frequency Based Mobile Attackers
GSM
Human behavior
Human Factors
biblio
Frequency diverse array beamforming for physical-layer security with directionally-aligned legitimate user and eavesdropper
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
Frequency diversity
signal processing security
telecommunication security
secrecy rate maximization problem
radiocommunication
radio transmitters
physical-layer security
PHY security problem
Phased arrays
OFDM
mmWave transmissions
millimeter wave transmission
highly directional transmission feature
frequency offsets
Frequency modulation
security
frequency diverse array beamforming
FDA beamforming
directionally-aligned LU
directionally-aligned legitimate user
artificial noise
angle-range dependent beampattern
array signal processing
optimisation
composability
privacy
Resiliency
pubcrawl
Metrics