Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
channel coding
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
Acoustic Fingerprints
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
gradient methods
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
markov chain
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
telecommunication computing
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
biblio
Performance of Spatially Coupled LDPC Codes over Underwater Acoustic Communication Channel
Submitted by aekwall on Mon, 12/21/2020 - 12:31pm
Scalability
Resiliency
Human behavior
pubcrawl
channel capacity
channel coding
error statistics
parity check codes
wireless channels
LDPC
turbo codes
telecommunication network reliability
acoustic coupling
Doppler shift
underwater acoustic communication
reliable communication
OFDM
equalisers
OFDM modulation
bandwidth 10.0 kHz
Belief Propagation (BP)
low equalization complexity
low-density parity-check codes
protograph based SC-LDPC codes
shallow water acoustic environment
terrestrial communication
underwater acoustic channel
underwater acoustic communication channel
UWA channels
UWA communication
biblio
Semantic Security for Quantum Wiretap Channels
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
Cryptography
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
security
Compositionality
secrecy
channel coding
biregular irreducible functions
semantic security
coding theory
quantum communication
biregular irreducible
BRI
BRI functions
capacity
classical channels
classical-quantum
classical-quantum channels
Indistinguishability
nonsecure code
quantum wiretap channels
semantic security capacity
semantically secure code
strongly secure code
biblio
Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Compositionality
synchronisation
Decoding
channel coding
eavesdropper
coding theory
secure transmission
burst erasure multiple-link code
channel model
code parameters
decoding delay constraint
delay-optimal coding
delay-optimal M-link codes
low delay
parallel burst erasure channels
source symbol
streaming applications
streaming code
biblio
Straggler Resilient Serverless Computing Based on Polar Codes
Submitted by grigby1 on Tue, 10/06/2020 - 12:40pm
channel coding
Cloud Computing
coded computation scheme
coded computation technique
coding methods
coding theory
Complexity theory
computational burden
Computational modeling
computationally effective manner
computationally expensive tasks
Computing Theory
Decoding
distributed computation
emerging cloud based computation model
encoding
gradient methods
hybrid computing framework
linear algebra
matrix multiplication
optimisation
polar codes
pubcrawl
Random access memory
resilience
Resiliency
sequential decoding
serverless computing mechanism
serverless platforms
Servers
straggler resilient serverless computing
straggler-resilience
Task Analysis
biblio
SystemVue based Secure data transmission using Gold codes
Submitted by grigby1 on Fri, 09/18/2020 - 12:46pm
security
pubcrawl
resilience
Resiliency
telecommunication security
Cryptography
Wireless communication
Gold
Metrics
Compositionality
wireless channels
graph theory
channel coding
error statistics
Convolutional codes
coding theory
advanced wireless techniques
channel noise Convolutional code
gold codes
OFDM
OFDM modulation
orthogonal frequency division multiplexing modulation scheme
quadrature amplitude modulation
radio transceivers
signal to noise ratio graphs
SystemVue
SystemVue based Secure data transmission
transceiver
transceivers
Viterbi decoder
Viterbi decoding
wireless technology
biblio
Flexible Design of Finite Blocklength Wiretap Codes by Autoencoders
Submitted by grigby1 on Fri, 09/18/2020 - 12:46pm
security
pubcrawl
resilience
Resiliency
telecommunication security
Cryptography
Neural networks
Metrics
Compositionality
error rate
Decoding
channel coding
decoding error probability
error statistics
physical layer security
information theory
wireless devices
autoencoder
Gaussian channels
finite blocklength
finite blocklength wiretap codes
flexible design
flexible wiretap code design
Gaussian wiretap channels
leakage tradeoff
legitimate receiver
neural network autoencoders
radiocommunication
traditional codes
vanishing leakage
wiretap code
coding theory
biblio
The LDPC Code and Rateless Code for Wireless Sensor Network
Submitted by aekwall on Tue, 09/08/2020 - 9:06am
channel coding
composability
Decoding
decoding algorithm
encoding
encoding algorithm
LDPC code
LT code
Metrics
parity check codes
pubcrawl
Raptor code
rateless code
rayleigh channel
Rayleigh channels
Resiliency
Sparse matrices
wireless sensor networks
WSN
WSN environment
biblio
Crypto Polar Codes based on Pseudorandom Frozen Bits Values and Indices
Submitted by aekwall on Tue, 09/08/2020 - 9:06am
Cryptography
telecommunication security
Resiliency
pubcrawl
composability
Metrics
probability
channel capacity
channel coding
Decoding
error statistics
random number generation
pseudorandom number generator
polar codes
High reliability
232-bit ciphering key
BER probability
crypto polar codes
crypto-system ciphering key
decoding cipher key
decoding obscurity
discrete memoryless channel
discrete memoryless channel capacity
encoder security
generated sequences
grouping polar codes
modern communication systems
MT PRNG
one-bit change
original encoding cipher key
originally sent information data bits
polarized bit channels
pseudorandom frozen bits values
secret Mersenne- Twister pseudo
secret pre-shared initial state
secured system
system secrecy
talented coding technique
biblio
Extrinsic Information Transfer (EXIT) Analysis for Short Polar Codes
Submitted by aekwall on Tue, 09/08/2020 - 9:05am
coding theory
security
5G mobile communication
channel capacity
channel coding
completely noisy channels
composability
Decoding
error correction codes
EXIT chart
extrinsic information transfer analysis
frozen bit
information bit
information theory
iterative decoding
low density parity check codes
Metrics
Mutual information
noieseless channels
Noise measurement
parity check codes
polar codes
polarized channels
pubcrawl
Receivers
Resiliency
short polar codes
wireless channels
1
2
3
4
5
6
7
next ›
last »