Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
channel conditions
biblio
Chaos-based Information Rotated Polar Coding Scheme for Visible Light Wiretap Channel
Submitted by aekwall on Mon, 07/13/2020 - 11:17am
polar codes
Visual Light Communications Security
visible light wiretap channel
visible light communication systems
telecommunication security
telecommunication network reliability
security
secure polar coding scheme
Scalability
rotation principle
rotated information
Resiliency
Reliability
pubcrawl
channel coding
Metrics
light polarisation
free-space optical communication
chaotic sequences
chaotic communication
chaos-based information rotated polar coding scheme
chaos
channel polarization
channel conditions
bit-channels
bit-channel identification
composability
biblio
Multi-Agent Reinforcement Learning-Based User Pairing in Multi-Carrier NOMA Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
multicarrier NOMA systems
cooperative game
deep deterministic policy gradient
end-to-end low complexity method
exhaustive search method
hard channel capacities
MC-NOMA
multiagent deep reinforcement learning
multiagent reinforcement learning-based user pairing
Communication Systems
multicarrier nonorthogonal multiple access systems
resource allocation problems
search problems
soft channel capacities
transmission capability
user paring network
Trustworthy Systems
optimisation
learning (artificial intelligence)
Resiliency
pubcrawl
composability
multi-agent systems
convolutional neural nets
convolutional neural network
resource allocation
game theory
channel capacity
telecommunication computing
multi-access systems
wireless channels
optimization problems
cyber physical systems
channel conditions
biblio
On Protecting Location Secrecy
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
LSM
wireless localization network
Wireless communication
telecommunication security
Scalability
Resiliency
resilience
pubcrawl
privacy
Position measurement
Particle measurements
mobility management (mobile radio)
Metrics
Adversary Models
location secrecy metric
Location secrecy
location information
localization process
localization
Human behavior
general measurement model
eavesdropper
Communication system security
channel conditions
Atmospheric measurements
Algorithm design and analysis