Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
network coding
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
Scalability
telecommunication security
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
policy-based governance
wireless sensor networks
Cryptography
Metrics
information theory
information security
computer networks
error correction codes
network coding
error correction
Upper bound
multicast communication
information theoretic security
cryptographic approach
cryptographic signature
Information rates
information-theoretic approach
network coding security
network error correction
Pollution
pollution attack
biblio
High-Performance and Range-Supported Packet Classification Algorithm for Network Security Systems in SDN
Submitted by grigby1 on Tue, 02/23/2021 - 2:38pm
security
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Throughput
internet
Communication networks
composability
telecommunication network routing
encoding
pattern classification
SDN
software defined networking
pipeline processing
network coding
Clocks
512-bit OpenFlow rule
Bit Vector-based packet classification methods
content-addressable storage
high clock frequency
key function
multidimensional fields
multifield matching
network security systems
packet header bits
packet switching
range fields
range matching
Range Supported Bit Vector algorithm
Range-Supported packet classification algorithm
RSBV
rule sets
two-dimensional modular architecture
biblio
Surface Codes Based Quantum Networking
Submitted by grigby1 on Tue, 02/23/2021 - 2:37pm
quantum computing
security
pubcrawl
Metrics
resilience
Resiliency
Quantum entanglement
composability
network coding
Lattices
quantum communication
arbitrary network topology
arbitrary two nodes
Entanglement
multipartite quantum communication network
multiple nodes
optical fiber communication
Optical surface waves
QCN
Quantum communications
quantum communications networks
quantum networking
quantum optics
Repeaters
surface codes
biblio
Highly Secured all Optical DIM Codes using AND Gate
Submitted by grigby1 on Tue, 02/23/2021 - 2:37pm
Logic gates
security
pubcrawl
Metrics
resilience
Resiliency
composability
telecommunication traffic
Q-factor
network coding
Optical fibers
codes
Optical fiber networks
interference suppression
Integrated optics
AND Gate
code division multiple access
correlation methods
Diagonal Identity Matrix (DIM)
highly secured all optical DIM codes
MAI reduction
multiple access interference
multiple access interference (MAI)
optical amplifiers
optical code division multiple access
Optical Code Division Multiple Access system (OCDMA)
optical communication equipment
optical diagonal identity matrices codes
optical gating
optical logic
optical systems
regularly expanding information traffic
semiconductor optical amplifier
Semiconductor optical amplifiers
spectral amplitude coding-OCDMA systems
zero cross-correlation
Zero Cross-Correlation (ZCC)
biblio
Secure Communication Based on Reliability-Based Hybrid ARQ and LDPC Codes
Submitted by grigby1 on Tue, 02/23/2021 - 2:36pm
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
composability
probability
security performance
communication system
Decoding
telecommunication network reliability
channel coding
error statistics
network coding
low-density parity-check codes
AWGN channels
parity check codes
secure communication
additive white gaussian noise channel
additive white Gaussian noise wire-tap channel
Automatic repeat request
bit-error rate
Gaussian approximation
hybrid ARQ
irregular LDPC codes
low-density parity-check codes.
physical-layer security
posteriori probability log-likelihood ratios
RB-HARQ protocol
re-transmission strategy
re-transmissions
reliability-based hybrid ARQ
reliability-based hybrid automatic repeat-request
unreliable bits
variable nodes
biblio
The Impact of CFO on OFDM based Physical-layer Network Coding with QPSK Modulation
Submitted by grigby1 on Tue, 02/23/2021 - 2:36pm
pubcrawl
Metrics
resilience
Resiliency
composability
wireless channels
Decoding
channel coding
error statistics
network coding
modulation coding
signal detection
relay networks (telecommunication)
OFDM
OFDM modulation
BER
carrier frequency offset
CFO compensation
Channel estimation
ICI
intercarrier interference
low bit error rate
medium CFO levels
network-coded information
physical-layer network coding
pilot insertion
PNC
point-to-point transmissions
QPSK modulation
quadrature phase shift keying
RA codes
repeat-accumulate codes
subsequent channel decoding
TWRC
biblio
Binarized Attributed Network Embedding via Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:36pm
learning (artificial intelligence)
feature extraction
Neural networks
pubcrawl
Metrics
resilience
Resiliency
matrix algebra
optimization
composability
Data mining
pattern classification
neural nets
Task Analysis
network theory (graphs)
pattern clustering
Binary codes
neural network training
network coding
Knowledge engineering
autoencoder
attribute similarity penalizing term
Attributed Network
binary code learning
data reduction
dimension reduction
feature aggregation
Hamming space
learned binary representation vectors
network embedding
node classification
node clustering
relaxation-quantization method
unsupervised neural based binarized attributed network embedding
Weisfeiler-Lehman Proximity Matirx
Weisfeiler-Lehman proximity matrix
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
channel coding
Metrics
Resiliency
composability
A-channel
adders
adversarial multiple access channels
arbitrary coefficients
binary adder channel
Binary codes
broadcast channels
collusion attack
compressed sensing
Conferences
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
encoding
error statistics
Information systems
linear combinations
malicious multiple access channels
Mathematical model
multi-access systems
Multimedia communication
multimedia computing
multimedia fingerprinting code
multiple access channel
network coding
noise-like signals
privacy
pubcrawl
Receivers
resilience
security
security of data
Watermarking
zero-error probability
biblio
A New Homomorphic Message Authentication Code Scheme for Network Coding
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
encryption
pubcrawl
Metrics
resilience
Resiliency
message authentication
telecommunication security
authentication
composability
encoding
access protocols
network coding
Pollution
homomorphic mac
homomorphic MAC scheme
homomorphic message authentication code
known-plaintext attacks
MAC length
network data flow
packet decoding
pollution attacks
security parameter
some what homomorphic encryption
vector length
biblio
Malicious user identification scheme for network coding enabled small cell environment
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
computer architecture
security
Peer-to-peer computing
pubcrawl
Metrics
resilience
Resiliency
Throughput
telecommunication security
5G mobile communication
cellular radio
composability
Protocols
wireless network
Communication networks
telecommunication network reliability
cooperative communication
network coding
5G
Microprocessors
next generation networks
dense network coding
device to device communication
fifth generation of communication networks
malicious user identification scheme
network coding environment
next generation communication technologies
Pollution
reliable communication
small cell technology
Small Cells
1
2
3
4
5
6
7
8
next ›
last »