no code implementations • 23 Feb 2023 • Alexandros Palaios, Christian L. Vielhaus, Daniel F. Külzer, Cara Watermann, Rodrigo Hernangomez, Sanket Partani, Philipp Geuer, Anton Krause, Raja Sattiraju, Martin Kasparick, Gerhard Fettweis, Frank H. P. Fitzek, Hans D. Schotten, Slawomir Stanczak
This proactive behavior of the network can be leveraged to sustain, for example, a specific quality of service requirement.
Explainable Artificial Intelligence (XAI) Feature Engineering
no code implementations • 13 Sep 2019 • Andreas Weinand, Raja Sattiraju, Michael Karrenbauer, Hans D. Schotten
PHYSEC based message authentication can, as an alternative to conventional security schemes, be applied within \gls{urllc} scenarios in order to meet the requirement of secure user data transmissions in the sense of authenticity and integrity.
no code implementations • 14 Nov 2017 • Andreas Weinand, Michael Karrenbauer, Raja Sattiraju, Hans D. Schotten
Beside unfulfilled reliability requirements, the availability of a system can further be reduced, if it is under attack in the sense of violation of information security goals such as data authenticity or integrity.
Networking and Internet Architecture Signal Processing