Abstract: A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing ...
Abstract: Blind recognition of polar codes in non-cooperative scenarios remains insufficiently addressed. Although existing methods have achieved reliable performance in code length recognition, ...