This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors that pass the state estim...
详细信息
ISBN:
(纸本)9781467360906
This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while keep the estimation residues in a small range. We employ a coding matrix to the original sensor outputs to increase the estimation residues, such that the alarm will be triggered by the detector even under intelligent data injection attacks. This is a low cost method compared with encryption over sensor communication networks. We prove the conditions the coding matrix should satisfy under the assumption that the attacker does not know the coding matrix yet. An iterative optimization algorithm is developed to compute a feasible coding matrix, and, we show that in general, multiple feasible coding matrices exist.
A Code Division Multiple Access (CDMA) wireless network is simulated to analyze errors, determine impact on services, and provide an upper bound on the number of active channels. The simulation emphasizes the encoder,...
详细信息
ISBN:
(纸本)0780338715
A Code Division Multiple Access (CDMA) wireless network is simulated to analyze errors, determine impact on services, and provide an upper bound on the number of active channels. The simulation emphasizes the encoder, decoder/correlator, and a threshold detector;bur assumes a resultant Gaussian function for the ''air interface'' noise. Since the characteristics of a wireless environment vary significantly, we examine, as a whole, the errors on the received signal without accounting for specific error contributions from power, fading, propagation, interference from other users, and other factors in such environment. The CDMA encoder uses the 64 Walsh codes that are specified in the draft Wideband CDMA Air Interface Compatibility Standard for 1.85 to 1.99 GHz PCS Applications [I]. We use a digitized actual speech database to test for the intelligibility of the voice service over such a CDMA air interface. Therefore, we are able to learn about the nature of the errors inherent in such a frequency spreading technique and also determine an upper bound apt the simultaneous active channels that would preserve the quality of service (QOS).
Peer-to-peer networks are networks of heterogeneous computers sharing files or services. This paper proposes to use a data storage scheme using maximum distance separable codes to optimize the dissemination of the dat...
详细信息
ISBN:
(纸本)0780377281
Peer-to-peer networks are networks of heterogeneous computers sharing files or services. This paper proposes to use a data storage scheme using maximum distance separable codes to optimize the dissemination of the data in the network in order to globally enhance the data access.
In the task of code translation, neural network-based models frequently generate semantically incorrect code that deviates from the original logic of the source code. This problem persists even with advanced large mod...
详细信息
In machine learning, one of the methods to solve multiclass classification problems is a framework called Error-Correcting Output Codes (ECOC), which constructs a multiclass classifier by combining a lot of binary cla...
详细信息
In this article, we reviewed the basic principles of BCH codes, their features and advantages in comparison with other error correction methods. When analyzing data transmission in a binary symmetric communication cha...
详细信息
There are many challenges when it comes to compiling huge lines of code or codes with huge time complexity. Also, if there is an error in the last line of the code, for example, a simple syntax error or a syntactic er...
详细信息
A framework for the analysis of error propagation for high rate runlength-limited codes is developed. The susceptibility to errors of capacity approaching code constructions, the enumerative and sequence replacement t...
详细信息
A framework for the analysis of error propagation for high rate runlength-limited codes is developed. The susceptibility to errors of capacity approaching code constructions, the enumerative and sequence replacement technique and bit stuffing, are analyzed in detail. It is shown that the first two techniques experience low error propagation and that they are superior to the popular bit-stuffing technique.
We present a combinatorial analysis to derive an explicit expression for the number of transmission errors that occur in a block transmitted through a Gilbert channel. This expression can be used to investigate the tr...
详细信息
ISBN:
(纸本)0780318269
We present a combinatorial analysis to derive an explicit expression for the number of transmission errors that occur in a block transmitted through a Gilbert channel. This expression can be used to investigate the tradeoffs among the decoding error probability, degree of interleaving, and the error-correction ability of a code. We illustrate how a designer may apply our method to determine different combinations of the degree of interleaving and error correction ability to achieve a specified decoding error rate.
Applications of Large Language Models (LLM) for source code analysis and related tasks arising during the development of an industrial static analyzer are becoming increasingly relevant due to the rapid development of...
详细信息
暂无评论