Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
multi-access systems
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Conferences
Mathematical model
privacy
composability
encoding
Information systems
Receivers
Binary codes
broadcast channels
channel coding
error statistics
network coding
compressed sensing
Watermarking
multimedia computing
adders
Multimedia communication
A-channel
adversarial multiple access channels
arbitrary coefficients
binary adder channel
collusion attack
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
linear combinations
malicious multiple access channels
multi-access systems
multimedia fingerprinting code
multiple access channel
noise-like signals
zero-error probability
biblio
Joint User Association and Power Allocation Using Swarm Intelligence Algorithms in Non-Orthogonal Multiple Access Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:38am
5G
composability
Compositionality
Evolutionary algorithms
Grey Wolf optimizer
Interference
joint user association-power allocation
multi-access systems
multiple base stations
NOMA
NOMA networks
Non-Orthogonal Multiple Access (NOMA)
nonorthogonal multiple access networks
orthogonal clusters
particle swarm optimisation
particle swarm optimization
physical resource block allocation
power allocation
PSO
pubcrawl
Receivers
resource allocation
resource management
Signal to noise ratio
Silicon carbide
Swarm Intelligence
swarm intelligence algorithms
user association
user grouping procedure
weighted sum rate maximization
biblio
A Novel Physical Layer Authentication Method with Convolutional Neural Network
Submitted by aekwall on Mon, 08/10/2020 - 9:36am
telecommunication security
Resiliency
pubcrawl
policy-based governance
Wireless communication
CNN
convolutional neural nets
convolutional neural network
convolutional neural networks
authentication
physical layer security
convolution
cyber physical systems
authentication accuracy
multi-access systems
wireless networks
channel state information
CSI
OFDM
Artificial Neural Networks
MIMO communication
spoofing attacks
channel authentication
convolutional-neural-network-based approach
hypothesis test based methods
L1 regularization
MIMO-OFDM
MIMO-OFDM system security
mini batch scheme
Multi-user
multiple-input multiple-output system
multiuser authentication system
OFDM modulation
orthogonal frequency division multiplexing
physical layer authentication method
radio transmitters
biblio
Framework for Handover process using Visible Light Communications in 5G
Submitted by aekwall on Mon, 07/13/2020 - 10:16am
5G mobile communication
bidirectional transmission
digital machines
free-space optical communication
Handover
handover process
iiot
indoor environment
indoor radio
Industrial Internet of Things
Industrial IoT
Internet of Everything
Internet of Things
IoE
Li-Fi concept
light fidelity
light-fidelity
Light-Fidelity (Li-Fi)
mechanical machines
Metrics
mobility and handover
mobility management (mobile radio)
multi-access systems
multiuser access
Optical Wireless Communication
pubcrawl
Radio Frequency spectrum resources
Resiliency
RF spectrum resources
Scalability
smart devices
steerable access point
visible light communication (VLC)
visible light communications
Visual Light Communications Security
Wireless communication
wireless communication technologies
Wireless fidelity
biblio
Multi-Agent Reinforcement Learning-Based User Pairing in Multi-Carrier NOMA Systems
Submitted by aekwall on Mon, 04/13/2020 - 9:21am
game theory
learning (artificial intelligence)
Resiliency
pubcrawl
composability
multi-agent systems
convolutional neural nets
convolutional neural network
resource allocation
optimisation
channel capacity
telecommunication computing
multi-access systems
wireless channels
optimization problems
cyber physical systems
channel conditions
Communication Systems
cooperative game
deep deterministic policy gradient
end-to-end low complexity method
exhaustive search method
hard channel capacities
MC-NOMA
multiagent deep reinforcement learning
multiagent reinforcement learning-based user pairing
multicarrier NOMA systems
multicarrier nonorthogonal multiple access systems
resource allocation problems
search problems
soft channel capacities
transmission capability
user paring network
Trustworthy Systems
biblio
An Access Authentication Algorithm Based on a Hierarchical Identity-Based Signature over Lattice for the Space-Ground Integrated Network
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
signature based defense
pubcrawl
access authentication
access authentication algorithm
adaptive selection messages
authentication
authentication delay
bidirectional authentication
composability
Compositionality
computer architecture
Cryptographic Protocols
Cryptography
digital signatures
Generators
hierarchical access authentication architecture
hierarchical identity-based cryptography
hierarchical identity-based signature
L-HIBS scheme
lattice based mobile access authentication mechanism
lattice-based cryptography
Lattices
mobile access authentication protocol
mobile radio
mobile users
multi-access systems
private key cryptography
Protocols
SGIN
shared session key exchange
SIS problem
small integer solution
space communication links
space-ground integrated network
standard security model
telecommunication security
theoretical cryptography
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
Cloud Computing
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
5G mobile communication
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
security challenges
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
multiaccess edge computing feasibility
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 9:03am
Cryptography
authentication
authentication security
cloud
Cloud Authentication
Cloud Computing
Cloud Security
computer network security
control database
Cryptographic Protocols
Databases
ECC
Elliptic curve cryptography
encryption method
Human behavior
integrated model
Kerberos
Kerberos authentication protocol
message authentication
Metrics
multi-access systems
multi-tenancy
multitenancy
Protocols
pubcrawl
public key cryptography
Resiliency
resource allocation
resource allocation manager unit
resource allocation map
resource management
security protocols