the simulation about the physical layer key generation
☆10Oct 11, 2021Updated 4 years ago
Alternatives and similar repositories for physical-key-generation
Users that are interested in physical-key-generation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A .NET implementation of the Reed-Solomon algorithm, supporting error, erasure and errata correction☆16Mar 22, 2019Updated 7 years ago
- ☆16Oct 3, 2025Updated 5 months ago
- Source code for the paper CSI-Based Physical Layer Authentication via Deep Learning☆14Jun 2, 2022Updated 3 years ago
- UAV-IRS☆19May 11, 2023Updated 2 years ago
- Library routines for the different pathloss model from 3GPP & ITU for IMT2020 evaluation & 5G simulation works☆17Oct 23, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repository includes supervised and unsupervised machine learning methods which are used to detect anomalies on network datasets. Dec…☆17Jun 24, 2019Updated 6 years ago
- wireless channel simulation☆50May 6, 2019Updated 6 years ago
- Not All Poisons are Created Equal: Robust Training against Data Poisoning (ICML 2022)☆22Aug 8, 2022Updated 3 years ago
- An implementation of ABS Polar Code, including construction, encoding and decoding.☆12Jul 21, 2023Updated 2 years ago
- Flexibly construct and implement attacks on Learning Parity with Noise☆11Sep 26, 2023Updated 2 years ago
- there is matlab code for channel estimate with ls and dft and mmse☆23Jul 14, 2017Updated 8 years ago
- Neural Synchronization: A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication☆18Nov 22, 2024Updated last year
- Scripts relating to decryption failures in PQCRYPTO schemes☆11Feb 22, 2021Updated 5 years ago
- Deep learning projects☆13Aug 13, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14Jan 17, 2019Updated 7 years ago
- ☆13Sep 9, 2019Updated 6 years ago
- Polar code implementation in C☆21Aug 17, 2019Updated 6 years ago
- FPGA implementation of a cryptographically secure physical unclonable function based on learning parity with noise problem.☆16Oct 25, 2017Updated 8 years ago
- Matlab Code to parse the *.p2m files from Wireless Insite☆18Jul 24, 2020Updated 5 years ago
- Topics - Linear Regression, Logistic Regression, Regularization, Neural Networks, System Design, Support Vector Machines, Unsupervised Le…☆24Jul 2, 2018Updated 7 years ago
- the simulation of document "Weighted Sum Rate Maximization for Multiuser Multirelay MIMO Systems"☆10Aug 3, 2017Updated 8 years ago
- Construction, encoding and decoding of Polar Codes. List decoding of Polar Codes.☆16Nov 27, 2020Updated 5 years ago
- BRAT Lab files for generating CSI datasets with QuaDRiGa channel model☆22Jan 19, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Transferring of data like audio, video, image or any signal over WiFi range between USRPs☆21Nov 23, 2014Updated 11 years ago
- 基于导频的ofdm_ls算法信道估计☆28Jun 26, 2022Updated 3 years ago
- Radio frequency fingeprinting NFC tags using deep learning techniques☆24Nov 7, 2022Updated 3 years ago
- Polar Code C++ Implementation☆23Jun 3, 2022Updated 3 years ago
- This example shows how to co-execute MATLAB and Python to simulate the effect of channel estimate compression on precoding in a MIMO OFDM…☆18Sep 17, 2024Updated last year
- you can use PDW to sort radar singal☆38Jun 30, 2017Updated 8 years ago
- Source code from the paper: A. Elkelesh, M. Ebada, S. Cammerer, L. Schmalen, and S. ten Brink, “Decoder-in-the-Loop: Genetic Optimization…☆24Oct 16, 2019Updated 6 years ago
- ☆42Mar 11, 2025Updated last year
- Baha’ A. Alsaify, Mahmoud M. Almazari, Rami Alazrai, Mohammad I. Daoud, A dataset for Wi-Fi-based human activity recognition in line-of-s…☆23Aug 17, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simulation code for "Fast Converging Algorithm for Weighted Sum Rate Maximization in Multicell MISO Downlink" by Le-Nam Tran, Muhammad Fa…☆22Feb 9, 2022Updated 4 years ago
- A framework to estimate the Channel State Information for a 5G communication☆39Nov 9, 2019Updated 6 years ago
- Matlab code to compute entropy, conditional entropy, mutual information, channel capacity, and rate distortion.☆35Jun 29, 2020Updated 5 years ago
- A CRC-aided successive cancellation list (SCL) decoding algorithm for polar codes and PAC codes with various code constructions/rate prof…☆30Jul 13, 2022Updated 3 years ago
- Elliptic Curve Integrated Encryption Scheme (ECIES)☆73Jan 8, 2018Updated 8 years ago
- Simple Keras implementation of Triplet-Center Loss on the MNIST dataset☆45Jul 3, 2019Updated 6 years ago
- Security Estimation Scripts for Kyber and Dilithium☆54Mar 16, 2021Updated 5 years ago