Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
physical layer security
biblio
A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center
Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
fusion center
AF-CSSCRN security
Amplify-and-Forward
amplify-and-forward cooperative spectrum sensing
antenna arrays
average secrecy rate
cognitive relay
CRN
external malicious threats
fifth-generation systems
AF-CSS
Geometry
multiple antennas
secondary users
secure communication
secure transmission
spectrum sensing data
stochastic geometry
Cognitive Radio Security
physical layer security
resilience
Resiliency
telecommunication security
5G mobile communication
sensor fusion
Communication system security
Stochastic processes
cooperative communication
pubcrawl
cognitive radio
radio spectrum management
signal detection
amplify and forward communication
Cognitive Radio Network
cognitive radio networks
5G systems
access points
biblio
Physical Layer Security of a Two-Hop Mixed RF-FSO System in a Cognitive Radio Network
Submitted by grigby1 on Fri, 09/18/2020 - 1:55pm
physical layer security
dual-hop transmission
end-to-end signal-to-noise-ratio
free space optical link
FSO
FSO links
gamma distribution
Gamma-Gamma distribution
licensed primary user
Nakagami channels
optical links
cognitive-radio system
physical layer security performance
PU receiver
relay
relaying
RF links
secrecy outage probability
two-hop mixed RF-FSO system
unlicensed secondary user
Cognitive Radio Security
cooperative communication
pubcrawl
resilience
Resiliency
Radio frequency
telecommunication security
Signal to noise ratio
Receivers
probability
telecommunication network reliability
Capacity planning
security
Relays
Rayleigh channels
Interference
cognitive radio
amplify and forward communication
asymmetric radio frequency link
atmospheric turbulence
average secrecy capacity
Cognitive Radio Network
biblio
Flexible Design of Finite Blocklength Wiretap Codes by Autoencoders
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
leakage tradeoff
wiretap code
wireless devices
vanishing leakage
traditional codes
telecommunication security
security
Resiliency
resilience
radiocommunication
pubcrawl
physical layer security
Neural networks
neural network autoencoders
Metrics
legitimate receiver
autoencoder
information theory
Gaussian wiretap channels
Gaussian channels
flexible wiretap code design
flexible design
finite blocklength wiretap codes
finite blocklength
error statistics
error rate
decoding error probability
Decoding
Cryptography
Compositionality
coding theory
channel coding
biblio
Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
numerical analysis
third-party eavesdropping elimination
stream encryption
secret key generation schemes
secret key generation
second-level concatenated code
RS codes
numerical simulations
noninteractive information reconciliation scheme
information reconciliation
first-level error correction code
concatenated error correction code
BCH
a shortened RS (SRS)
wireless channel
Cryptography
BCH codes
Reed-Solomon codes
error correction codes
physical layer security
concatenated codes
channel coding
Decoding
Metrics
Wireless communication
composability
pubcrawl
Resiliency
encryption
biblio
Asymmetric Physical Layer Encryption for Wireless Communications
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
quantisation (signal)
Wireless communications
quantized information entropy
private channel
possible eavesdroppers
orthogonal frequency-division multiplexing (OFDM)
cryptographic primitive
constellation confusion degree
complex-domain signals
asymmetric PLE
asymmetric physical layer encryption scheme
Asymmetric Encryption
radio receivers
Wireless communication
wireless channels
encryption
Compositionality
Elliptic curve cryptography
physical layer security
Physical layer
public key cryptography
error statistics
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
telecommunication security
Receivers
biblio
A Novel Physical Layer Authentication Method with Convolutional Neural Network
Submitted by aekwall on Mon, 08/10/2020 - 10:36am
MIMO-OFDM system security
Artificial Neural Networks
MIMO communication
spoofing attacks
channel authentication
convolutional-neural-network-based approach
hypothesis test based methods
L1 regularization
MIMO-OFDM
OFDM
mini batch scheme
Multi-user
multiple-input multiple-output system
multiuser authentication system
OFDM modulation
orthogonal frequency division multiplexing
physical layer authentication method
radio transmitters
authentication
Resiliency
pubcrawl
policy-based governance
Wireless communication
CNN
convolutional neural nets
convolutional neural network
convolutional neural networks
telecommunication security
physical layer security
convolution
cyber physical systems
authentication accuracy
multi-access systems
wireless networks
channel state information
CSI
biblio
Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
System performance
receiver
Resiliency
Scalability
secrecy performance
secrecy rate
secrecy rate analysis
SM based VLC
spatial modulation
spatial modulation scheme
pubcrawl
telecommunication security
Telecommunications
uniform selection
upper bounds
US scheme
visible light communication
visible light communications
Visual Light Communications Security
light emitting diodes
CAS scheme
channel adaptive selection scheme
derived secrecy rate bounds
dimmable average optical intensity constraints
eavesdropper
free-space optical communication
indoor communication
indoor VLC system
information theory
active transmitter
lower bounds
Metrics
modulation
multiple transmitters
optical modulation
optical receivers
optical transmitters
physical layer security
biblio
A Practical, Provably Unbreakable Approach to Physical Layer Security
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
reciprocal channel state
Phase measurement
Phase shift keying
phase shift keying constellation
physical layer security
provably unbreakable approach
PSK constellation points
pubcrawl
Radio frequency
radio frequency propagation path
radiowave propagation
raw key bits
multipath fading
resilience
Resiliency
secure key exchange
SNR
static fading channel
telecommunication security
Time measurement
under-determined system
wireless transmission
zero information leakage
independent channel realization
channel coding
channel perturbation
composability
Cryptography
error statistics
Eves antennas
Eves signal-to-noise ratio
fading channel
fading channels
FEC
forward error correction
antennas
independent realizations
key consolidation
key size
linear equations
masking property
measured reciprocal channel phase
Metrics
mirrors
modulo 2π
multipath channel
biblio
Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
source coding
pubcrawl
public channel
public key cryptography
Relays
resilience
Resiliency
Scalability
secret keys
security
policy-based governance
source coding scheme
source sequences
source-type model
telecommunication security
Telecommunications
trusted helper
untrusted helper
Upper bound
Indexes
cooperative communication
cooperative key generation
cooperative two-key generation
Decoding
discrete memoryless sources
five-terminal system
generated keys
Human behavior
Human Factors
channel capacity
information theoretic security
information-theoretic security
key capacity region
key leakage rate
Metrics
partial-trusted helpers
passive eavesdropper
physical layer security
biblio
Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
physical layer security
wireless communication protocols
typical cryptography
radiocommunication
PLS
Internet of Things applications
initial performance analysis
Force
computational power
classical cryptography
IoT devices
IoT
Ciphers
resilience
Resiliency
Metrics
composability
pubcrawl
Receivers
Protocols
Internet of Things
encryption
Cryptography
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »