Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
multi-access systems
biblio
Cooperative Spectrum Sensing and Hard Decision Rules for Cognitive Radio Network
Submitted by aekwall on Mon, 03/15/2021 - 12:02pm
unused spectrum
Cognitive Radio Security
unlicensed spectrum
spectrum sensing cognitive radio
spectrum sensing
spectrum owners
spectrum hole
Simulink Energy Detection
sense signals
recycle licensed spectrum
primary users
MATLAB Simulink
energy detection
cooperative spectrum sensing
Cooperative Sensing
Cognitive Radio Network.
Detectors
Cognitive Radio Network
cognitive radio
fading channels
radio spectrum management
Wireless communication
AWGN channels
signal detection
cooperative communication
multi-access systems
Interference
Signal to noise ratio
pubcrawl
Resiliency
mobile computing
biblio
Sparse Code Multiple Access based Cooperative Spectrum Sensing in 5G Cognitive Radio Networks
Submitted by aekwall on Mon, 03/15/2021 - 11:57am
Log-MPA detector
fading channels
NOMA
cooperative spectrum sensing
AWGN channel
5G cognitive radio networks
cognitive feature spectrum sensing
fifth-generation network demands
future 5G networks
cognitive radio
Log-MPA iterative receiver based log-likelihood ratio soft test statistic
Non Orthogonal Multiple Access (NOMA)
Rayleigh fading channel
SCMA
sparse code multiple access scheme
spectrum efficiency
Wald-hypothesis test
radio networks
Resiliency
pubcrawl
composability
Metrics
testing
Signal to noise ratio
channel coding
5G mobile communication
Detectors
statistical testing
sensors
multi-access systems
cooperative communication
AWGN channels
Rayleigh channels
radio spectrum management
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
noise-like signals
linear combinations
malicious multiple access channels
Mathematical model
multi-access systems
Multimedia communication
multimedia computing
multimedia fingerprinting code
multiple access channel
network coding
Information systems
privacy
pubcrawl
Receivers
resilience
security
security of data
Watermarking
zero-error probability
broadcast channels
Metrics
Resiliency
composability
A-channel
adders
adversarial multiple access channels
arbitrary coefficients
binary adder channel
Binary codes
channel coding
collusion attack
compressed sensing
Conferences
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
encoding
error statistics
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:38pm
particle swarm optimization
weighted sum rate maximization
user grouping procedure
user association
swarm intelligence algorithms
Swarm Intelligence
Silicon carbide
Signal to noise ratio
resource management
resource allocation
Receivers
pubcrawl
PSO
power allocation
physical resource block allocation
5G
particle swarm optimisation
orthogonal clusters
nonorthogonal multiple access networks
Non-Orthogonal Multiple Access (NOMA)
NOMA networks
NOMA
multiple base stations
multi-access systems
joint user association-power allocation
Interference
Grey Wolf optimizer
Evolutionary algorithms
Compositionality
composability
biblio
A Novel Physical Layer Authentication Method with Convolutional Neural Network
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
MIMO-OFDM system security
Artificial Neural Networks
MIMO communication
spoofing attacks
channel authentication
convolutional-neural-network-based approach
hypothesis test based methods
L1 regularization
MIMO-OFDM
OFDM
mini batch scheme
Multi-user
multiple-input multiple-output system
multiuser authentication system
OFDM modulation
orthogonal frequency division multiplexing
physical layer authentication method
radio transmitters
authentication
Resiliency
pubcrawl
policy-based governance
Wireless communication
CNN
convolutional neural nets
convolutional neural network
convolutional neural networks
telecommunication security
physical layer security
convolution
cyber physical systems
authentication accuracy
multi-access systems
wireless networks
channel state information
CSI
biblio
Framework for Handover process using Visible Light Communications in 5G
Submitted by aekwall on Mon, 07/13/2020 - 11:16am
Scalability
mobility and handover
mobility management (mobile radio)
multi-access systems
multiuser access
Optical Wireless Communication
pubcrawl
Radio Frequency spectrum resources
Resiliency
RF spectrum resources
Metrics
smart devices
steerable access point
visible light communication (VLC)
visible light communications
Visual Light Communications Security
Wireless communication
wireless communication technologies
Wireless fidelity
Industrial IoT
bidirectional transmission
digital machines
free-space optical communication
Handover
handover process
iiot
indoor environment
indoor radio
Industrial Internet of Things
5G mobile communication
Internet of Everything
Internet of Things
IoE
Li-Fi concept
light fidelity
light-fidelity
Light-Fidelity (Li-Fi)
mechanical machines
biblio
Multi-Agent Reinforcement Learning-Based User Pairing in Multi-Carrier NOMA Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
multicarrier NOMA systems
cooperative game
deep deterministic policy gradient
end-to-end low complexity method
exhaustive search method
hard channel capacities
MC-NOMA
multiagent deep reinforcement learning
multiagent reinforcement learning-based user pairing
Communication Systems
multicarrier nonorthogonal multiple access systems
resource allocation problems
search problems
soft channel capacities
transmission capability
user paring network
Trustworthy Systems
optimisation
learning (artificial intelligence)
Resiliency
pubcrawl
composability
multi-agent systems
convolutional neural nets
convolutional neural network
resource allocation
game theory
channel capacity
telecommunication computing
multi-access systems
wireless channels
optimization problems
cyber physical systems
channel conditions
biblio
An Access Authentication Algorithm Based on a Hierarchical Identity-Based Signature over Lattice for the Space-Ground Integrated Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
SGIN
lattice based mobile access authentication mechanism
lattice-based cryptography
Lattices
mobile access authentication protocol
mobile radio
mobile users
multi-access systems
private key cryptography
Protocols
L-HIBS scheme
shared session key exchange
SIS problem
small integer solution
space communication links
space-ground integrated network
standard security model
telecommunication security
theoretical cryptography
Compositionality
pubcrawl
access authentication
access authentication algorithm
adaptive selection messages
authentication
authentication delay
bidirectional authentication
composability
signature based defense
computer architecture
Cryptographic Protocols
Cryptography
digital signatures
Generators
hierarchical access authentication architecture
hierarchical identity-based cryptography
hierarchical identity-based signature
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication