default search action
40th MILCOM 2022: Rockville, MD, USA
- IEEE Military Communications Conference, MILCOM 2022, Rockville, MD, USA, November 28 - December 2, 2022. IEEE 2022, ISBN 978-1-6654-8534-0
- J. J. Garcia-Luna-Aceves, Bradley R. Smith, Judith T. Samson:
SCRIP: Safe and Cycle-Free Multi-Path Routing. 1-6 - Andrew Wood, Tim Upthegrove, Colin Funai, Bishal Thapa, Scott Loos, Daniel Javorsek:
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction. 1-6 - Dan Shen, Genshe Chen, Khanh D. Pham, Erik Blasch:
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization among UASs. 1-6 - Samuel R. Shebert, Moeness G. Amin, Benjamin H. Kirk, R. Michael Buehrer:
Multi-Signal Classification Using Deep Learning and Sparse Arrays. 1-6 - Lorenzo Campioni, Bastiaan Wissingh, Mauro Tortonesi, Niranjan Suri, Cesare Stefanelli:
NDN Experimental Evaluation in Multi-Domain Tactical Environments. 1-6 - Adhitya Bantwal Bhandarkar, Sudharman K. Jayaweera, Steven A. Lane:
Adversarial Sybil attacks against Deep RL based drone trajectory planning. 1-6 - Bishmita Hazarika, Keshav Singh, Chih-Peng Li, Sudip Biswas:
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks. 1-6 - Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks. 7-12 - Yi Shi, Yalin E. Sagduyu:
Sensing-Throughput Tradeoffs with Generative Adversarial Networks for NextG Spectrum Sharing. 13-18 - Francesco Restuccia, Erik Blasch, Andrew Ashdown, Jonathan D. Ashdown, Kurt A. Turck:
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems. 19-24 - Jason Hussey, Kerri Stone, Tracy Camp:
Positive and Unlabeled Learning for Mobile Application Traffic Classification. 25-30 - Mayur Katwe, Rasika Deshpande, Keshav Singh, Chih-Peng Li:
UAV aided FD-NOMA for Energy-efficient Ultra-Reliable Low-latency Communications. 31-36 - Sravani Kurma, Keshav Singh, Prabhat Kumar Sharma, Chih-Peng Li:
Outage Probability Analysis of Uplink Cell-Free Massive MIMO with User Mobility. 37-42 - Wei Wang, Zicheng Chi, Xin Liu, Ananth Vishnu Bhaskar, Ankit Baingane, Ryan Jahnige, Qingquan Zhang, Ting Zhu:
A Secured Protocol for IoT Devices in Tactical Networks. 43-48 - Saad Inshi, Rasel Chowdhury, Hakima Ould-Slimane, Chamseddine Talhi:
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption. 49-54 - Prajwalita Saikia, Keshav Singh, Omid Taghizadeh, Wan-Jen Huang, Sudip Biswas:
DRL Algorithms for Efficient Spectrum Sharing in RIS-aided MIMO Radar and Cellular Systems. 55-60 - Prakhar Consul, Ishan Budhiraja, Rajat Chaudhary, Neeraj Kumar:
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning. 61-65 - Ke Lu, Wenjuan Yan, Shuyi Wang:
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications. 66-71 - Inna Valieva, Bharath Shashidhar, Mats Björkman, Johan Åkerberg, Mikael Ekström, Iurii Voitenko:
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications. 72-77 - Andreas Lang, Berthold Lankl:
A Comprehensive Study of CPM Trellis Initialization Methods. 78-83 - Xing Hao, Yu Xiao, Guillermo E. Atkin:
Polynomial Phase Modulation-Based Code-Domain NOMA. 84-88 - Brett Wiens, Daniel C. Lee:
Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations. 89-94 - Salil Sharma, Visa Koivunen:
Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs. 95-101 - Quang Minh Nguyen, M. Shahir Rahman, Xinzhe Fu, Sastry Kompella, Joseph P. Macker, Eytan H. Modiano:
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation. 102-109 - Paulo H. L. Rettore, Miodrag Djurica, Roberto Rigolin Ferreira Lopes, Vinícius F. S. Mota, Eelco Cramer, Floris Drijver, Johannes F. Loevenich:
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead. 110-116 - Klement Hagenhoff, Maximilian Tränkler, Corinna Schmitt, Gabi Dreo Rodosek:
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs. 117-124 - Yiannis Papageorgiou, Merkouris Karaliopoulos, Iordanis Koutsopoulos:
Joint Controller Placement and TDMA Link Scheduling in SDN-enabled Tactical MANETs. 125-132 - Juan David Pabon, Shaikha Alkandari, Matthew C. Valenti, Xi Yu:
Air-Aided Communication between Ground Assets in a Poisson Forest. 133-139 - Michael Ghorbanzadeh, Edward Drocella, Robert Sole, April Lundy, Nicholas Lasorte:
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage. 140-147 - Md. Sadman Siraj, Aisha B. Rahman, Maria Diamanti, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou, Jim Plusquellic:
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing. 148-153 - Jaime C. Acosta:
Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities. 154-159 - Gerald Hills, Julia Baldasare, Wayne Henry, Warren Connell:
A Customized Approach to Cybersecurity Education for Space Professionals. 160-165 - Suhyeon Lee, Kwangsoo Cho, Seungjoo Kim:
Do You Really Need to Disguise Normal Servers as Honeypots? 166-172 - Bich Vu, John Darby Mitchell, Katherine Stowell, Mark Rabe, Orton Huang, Robert Lychev, Martine Kalke:
Mission Resilience Experimentation and Evaluation Testbed. 173-179 - Joshua Morman, Marc Lichtman, Marcus Müller:
The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-as-a-Plugin. 180-185 - Mark D. Silvius, Mark A. McHenry, Alex Lackpour, Joe Molnar:
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems. 192-197 - Charles E. Thornton, R. Michael Buehrer:
Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming. 198-203 - Kristoffer Hägglund, Erik Axell, Patrik Eliardsson:
Reduced Complexity Adaptive Demodulation in Impulse Noise Channels. 204-209 - Dan Shen, Genshe Chen, Tien Manh Nguyen, Khanh D. Pham:
Multi-carrier Constant Envelope GNSS Waveforms Compatible with Existing User Equipment. 210-215 - Masayuki Kaneko, Hideki Ochiai:
A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels. 216-221 - Michael A. Tope, Joel M. Morris:
On the Limits of Learning a Discrete Memoryless Communication Channel. 222-228 - Ece Bingöl, Aylin Yener:
Peak Age of Information with Receiver Induced Service Interruptions. 229-234 - Ian Ellis Lamptey Hulede, Hyuck M. Kwon:
Allan Deviation of Social Learning Distributed Network Time Synchronization. 235-240 - Roberto Petroccia, Gabriele Ferri, Pietro Stinco, Alessandra Tesei, Stefano Fioravanti, Thomas C. Furfaro, João Alves, Andrea Molaschi, José M. Bioucas-Dias, Paulo Sousa Dias, João Borges de Sousa:
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience. 241-246 - Arwid Komulainen, Jimmi Grönkvist, Ulf Sterner:
Frequency-Hop-Coded SCB for Tactical Networks. 247-252 - Tim Upthegrove, Guevara Noubir, Bishal Thapa, Dan Smith, Colin Funai, Scott Loos, Greg Kuperman:
Rapid Interoperability with OverlAI Gateways. 253-258 - Matthew Hawkins, A. K. Wang, Tammy Chang, David Rowe, Brandon Martin, Michael Enoch, Gustave Anderson, Julee Pandya:
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy. 259-264 - Laura Poplawski Ma, Christopher Eck, David Duran, Stephen Zabele, Marina Gurevich, Gregory Lauer:
Mission Critical Resiliency with IRON. 265-272 - Anthony Castañares, Deepak K. Tosh:
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks. 273-278 - Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath:
MalGrid: Visualization of Binary Features in Large Malware Corpora. 279-284 - Maxwell Levatich, Robert Brotzman, Benjamin Flin, Ta Chen, Rajesh Krishnan, Stephen A. Edwards:
C Program Partitioning with Fine-Grained Security Constraints and Post-Partition Verification. 285-291 - Huan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, Dan Meng:
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. 292-297 - John A. Snoap, James A. Latshaw, Dimitrie C. Popescu, Chad M. Spooner:
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features. 298-303 - J. B. Persons, Lauren J. Wong, Megan O. Moore, William C. Headley, Michael Fowler:
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features. 304-310 - Adeeb Abbas, Vasil Pano, Geoffrey Mainland, Kapil R. Dandekar:
Radio Modulation Classification Using Deep Residual Neural Networks. 311-317 - S. Andrew Lanham, Eli Bradley, Brian R. La Cour:
Generalized Noncoherent Space-Time Block Codes from Quantum Error Correction. 318-323 - Pialy Biswas, Ranjan K. Mallik, Jack H. Winters:
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems. 324-329 - Byron McMullen, Seung-Jun Kim:
Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery. 330-335 - Vivian Ukamaka Ihekoronye, Simeon Okechukwu Ajakwe, Dong-Seong Kim, Jae-Min Lee:
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach. 336-341 - Mohtasin Golam, Rubina Akter, Revin Naufal Alief, Van-Sang Doan, Jae-Min Lee, Dong-Seong Kim:
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things. 342-349 - Adrian Schalk, Luke Brodnik, Dane Brown:
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture. 350-355 - Athanasios Gkelias, Kin K. Leung:
GAN-Based Detection of Adversarial EM Signal Waveforms. 356-361 - Scott Kuzdeba, Josh Robinson:
Data-Centric Approaches to Radio Frequency Machine Learning. 362-367 - Hao Chen, Seung-Jun Kim:
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization. 368-373 - John S. Kaminski, David Stein, Jay Weitzen:
Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments. 374-378 - Xiang Cheng, Hanchao Yang, Daniel J. Jakubisin, Nishith D. Tripathi, Gus Anderson, A. K. Wang, Y. Yang, Jeffrey H. Reed:
5G Physical Layer Resiliency Enhancements with NB-IoT Use Case Study. 379-384 - Mohamed A. Taha, Mohamed K. M. Fadul, Joshua H. Tyler, Donald R. Reising, T. Daniel Loveless:
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications. 385-392 - Chongjun Ouyang, Hao Xu, Xujie Zang, Hongwen Yang:
Some Discussions on PHY Security in DF Relay. 393-397 - Thomas H. Shake, Jun Sun, Thomas C. Royster IV, Aradhana Narula-Tam:
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks. 404-411 - Alex Yahja, Saeed Kaviani, Bo Ryu, Jae H. Kim, Kevin A. Larson:
DeepADMR: A Deep Learning based Anomaly Detection for MANET Routing. 412-417 - Alyse M. Jones, William C. Headley:
Considerations of Reinforcement Learning within Real-Time Wireless Communication Systems. 418-425 - Amitav Mukherjee:
Jamming Vulnerability of Terahertz Wireless Networks. 426-430 - Haotian Zhai, Bernd-Peter Paris:
Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications. 431-436 - Thomas Ranström, Philip Pietraski, Sudhir B. Pattar:
5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference. 437-441 - Yue Gao, Jack W. Stokes, Manoj Ajith Prasad, Andrew T. Marshall, Kassem Fawaz, Emre Kiciman:
I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation. 442-449 - Kailash Gogineni, Yongsheng Mei, Guru Venkataramani, Tian Lan:
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects. 450-457 - Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng Liu, Lingyun Ying:
High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree. 458-463 - Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness. 464-469 - Ryan Yang, Haizhou Du, Andre Wibisono, Patrick Baker:
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings. 470-477 - Huanle Zhang, Mi Zhang, Xin Liu, Prasant Mohapatra, Michael DeLucia:
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters from System Perspective. 478-483 - William Marfo, Deepak K. Tosh, Shirley V. Moore:
Network Anomaly Detection Using Federated Learning. 484-489 - Nathaniel R. Olsen, Sasha M. McKee, Osama S. Haddadin, Scott Lyon, Jared Campbell, Kam K. Leang:
Information-Based Mobile Sensor Network Localization and Tracking of an Uncooperative Target. 490-495 - Mohammed Rashid, Jeffrey A. Nanzer:
A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays. 496-500 - Sayanta Seth, Murat Yuksel, Azadeh Vosoughi:
Forming Coalition Sets from Directional Radios. 507-514 - Anh Duc Le, Cristian Budianu, Melissa Elkadi, Bo Ryu:
Physical Layer Abstraction for LTE and 5G New Radio with Imbalance Receiver in EMANE. 515-521 - Jeremy Banks, Ryan Kerr, Steven H. H. Ding, Mohammad Zulkernine:
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments. 522-528 - Yu Luo, Lina Pu:
Asymmetric Collision Phenomenon and its Impact on Underwater Acoustic Networks. 529-534 - Christopher Maracchion, Timothy Woods, Sean Furman, Andrew L. Drozd:
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks. 535-540 - Don Barber, Vikram Kanth, Darren Rogers:
Manipulating the Automatic Identification System with Extremely Low-Cost Hardware. 541-546 - Ziad El Jamous, Kemal Davaslioglu, Yalin E. Sagduyu:
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems. 547-552 - Bo Ryu, Raymond Knopp, Melissa Elkadi, Deoksung Kim, Anh Le:
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator with EMANE. 553-558 - Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Peter Foytik, Xueping Liang, Wee Keong Ng:
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace. 559-564 - Michaela C. Vanderveen:
Threat framework for 5G cellular communications. 565-570 - Yunfei Ge, Quanyan Zhu:
MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks. 571-576 - Hisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman, Mohamed Mahmoud, Mahmoud M. Badr, Maqsood Mahmud, Ahmed F. Sayed:
Toward Zero Trust Security IN 5G Open Architecture Network Slices. 577-582 - Chaojin Qing, Na Yang, Shuhai Tang, Chuangui Rao, Jiafan Wang, Jinliang Chen:
CNN-based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel. 583-587 - Paul Sikora, David Crouse, Heather B. Dussault:
On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies. 606-611 - Matthias G. Schraml, Andreas Knopp:
Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems. 612-617 - Gyuwan Kim, Hoon Kim:
Link Reliability of Satellite-to-Ground Free-Space Optical Communication Systems in South Korea. 618-622 - Omid Nia, Brian L. Mark:
Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band. 623-628 - Aida Meftah, Georges Kaddoum, Tri Nhu Do, Chamseddine Talhi:
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks. 629-634 - Austin Bristow, Kwang-Cheng Chen:
A Robust Self-Synchronized Quantum Key Distribution Protocol. 635-642 - Blake Hayden, Matthew Sweeney, Britta Hale:
Securing Software Updates under Receiver Radio Frequency Geolocation Risk. 643-648 - Frederick M. Chache, Sean Maxon, Ram M. Narayanan, Ramesh Bharadwaj:
Improving Quality of Service in a Mesh Network Using Age of Information. 649-654 - Hamda Bouzabia, Georges Kaddoum, Tri Nhu Do:
Deep Learning-based Interference Detection and Classification for LPI/LPD Radar Systems. 655-660 - Zachary T. Minson, Hyuck M. Kwon:
Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO. 661-666 - Kennedy A. Lee, John R. Barry:
Opportunistic Power Control for Low Probability of Detection Communication. 667-671 - Mohammed Alkhowaiter, Khalid Almubarak, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Changchun Zou:
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms. 672-678 - Nicolò Boschetti, Nathaniel G. Gordon, Johan Sigholm, Gregory Falco:
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North. 679-686 - Peter J. Caven, Shakthidhar Reddy Gopavaram, L. Jean Camp:
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making. 687-692 - S. Sruti, Kolliboina Sai Teja, K. Giridhar:
Performance Comparison of OTFS and MC-CDMA with Channel Estimation and Power Back-Off. 693-698 - Saurab Dulal, Lan Wang:
NDNSD: Service Publishing and Discovery in NDN. 699-704 - Shakil Ahmed, Ibrahim Abdelmawla, Ahmed E. Kamal, Mohamed Y. Selim:
Blockage Prediction for Mobile UE in RIS-assisted Wireless Networks: A Deep Learning Approach. 705-710 - Stephan D. Frisbie, Mohamed F. Younis:
Data-Driven Wireless Anomaly Detection Using Spectral Features. 711-716 - William W. Howard, R. Michael Buehrer:
Decentralized Bandits with Feedback for Cognitive Radar Networks. 717-722 - Zachary White, Don Barber, Murali Tummala, John McEachen:
A Transmit Diversity Scheme for Multi-pulse Pulse Position Modulated Visible Light Communications. 723-728 - Debarun Das, Taieb Znati, Martin B. H. Weiss:
Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access. 729-734 - Daniel Song, Eugene Wu, William Song, Bow-Nan Cheng:
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures. 735-742 - Rajrshi Dubey, Swades De:
SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels. 751-756 - Ilana Heintz, John Grothendieck, Fred Bernardin, Gregory Kuperman:
Improving Text Security Classification Towards an Automated Information Guard. 757-762 - Felix O. Olowononi, Danda B. Rawat, Charles A. Kamhoua, Brian M. Sadler:
Deep Reinforcement Learning for Deception in IRS-assisted UAV Communications. 763-768 - Ti Ti Nguyen, Kim-Khoa Nguyen, Satinder Singh:
Intelligent Reflecting Surface-based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems. 769-774 - Allan Ko, Thomas Stahlbuhk, Brooke Shrader:
Rate Control with Autoregressive Forecasting for High Frequency Communication. 775-780 - Mohammad Towliat, Zheng Guo, Leonard J. Cimini Jr., Xiang-Gen Xia, Aijun Song:
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication. 781-786 - Zheng Wang, Lingjia Liu, Yang Yi, A. Robert Calderbank, Jianzhong Zhang:
Low-Complexity Channel Matrix Calculation for OTFS Systems with Fractional Delay and Doppler. 787-792 - Wei Jiang, Hans D. Schotten:
Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks. 793-798 - Joseph P. Macker, Jeffery W. Weston, Kyle Lawson Crandall:
Distributed Agent Consensus Performance in Resilient Communication Networks. 799-804 - James Whitehead, Andre van Heerden, Nirin Thanirat, Kobkiat Sukmanee, Witras Smabut:
A Novel Resilient HF Data Communications Architecture. 805-809 - Eric T. Makara, Joseph A. Molnar, Lan H. Tran, John B. Wood, Er-Hsien Frank Fu:
WHAC-A-MOLE. 810-816 - Tao Shan, Julian Cheng:
Coverage Estimation for Secure Ultraviolet Communication. 817-821 - Matthew Gaydos, Frederick J. Block, Thomas C. Royster IV, David J. Love:
Receiver Diversity in LEO Satcom Constellations. 822-827 - Thomas H. Shake, Jun Sun, Thomas C. Royster IV, Aradhana Narula-Tam:
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies. 828-834 - Griffin Cleverly, Bridgit Mendler, David Brunnenmeyer, Jeffrey Fry:
Near Term Resilient Teleports for DoD SATCOM. 835-840 - Armando J. Vigil, John Kirk, Patrick Rayermann, Jessica L. Gregris, Dahesh A. Khalil, Carl O. Morris:
DOD SATCOM Growth Measurement and Planning. 841-848 - Alexander Kott, Michael J. Weisman, Joachim Vandekerckhove:
Mathematical Modeling of Cyber Resilience. 849-854 - Jason E. Ellis, Travis W. Parker, Joachim Vandekerckhove, Brian J. Murphy, Sidney C. Smith, Alexander Kott, Michael J. Weisman:
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience. 855-860 - Andreas Dybvik Kaasen, Gudmund Grov, Federico Mancini, Magnus Baksaas:
Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks. 861-866 - Van Hau Le, Ti Ti Nguyen, Kim Khoa Nguyen, Satinder Singh:
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles. 867-872 - Hao-Hsuan Chang, R. B. Sai Sree, Hao Chen, Jianzhong Zhang, Lingjia Liu:
MADRL Based Scheduling for 5G and Beyond. 873-878 - Pedro A. Forero, Peng Zhang, Dusan Radosevic:
Toward Congestion Control in Lossy Networks via Local Queue-Management Policies. 879-886 - Heng Jin, Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone Swarm. 887-894 - Dohyun Kim, Miguel R. Castellanos, Robert W. Heath Jr.:
Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks. 895-900 - Sejuti Banik, Md Hasan Rahman, Mohammad Ranjbar, Nghi H. Tran, Khanh Pham:
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel with 1-bit ADC. 901-906 - Fabrice Tchakountio, Ambrose Lewis, Sastry Kompella:
SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence. 907-912 - Andreas Feder, Martin Hirschbeck, Wolfgang H. Gerstacker:
Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics. 913-919 - Michel Kulhandjian, Gregory Dzhezyan, Hovannes Kulhandjian, Claude D'Amours:
Pulse Shaping for Faster-than-Nyquist to Enable Low-Complexity Detection. 920-925 - John Corcoran, Eric Graves, Bryan Dawson, Matthew Dwyer, Paul L. Yu, Kevin Chan:
Adaptive Monitoring for Analytics Placement in Tactical Networks. 926-931 - Jake B. Perazzone, Matthew Dwyer, Kevin S. Chan, Cleon Anderson, Scott E. Brown:
Enabling Machine Learning on Resource-constrained Tactical Networks. 932-937 - Andreas Polydoros, Cenk Köse:
Clustered Distributed Spatial Multiplexing. 938-943 - Xi Zhang, Qixuan Zhu:
1 Lyapunov Stability Analysis for Controlling UAV Trajectory Over 6G Wireless Networks. 944-949 - Yuhui Wang, Junaid Farooq:
Zero Touch Coordinated UAV Network Formation for $360^{\circ}$ Views of a Moving Ground Target in Remote VR Applications. 950-955 - Alvaro del Aguila, Jonathan Valdez Mendoza, Sai Bhargav Mandavilli, Janise McNair:
Remote and Rural Connectivity via Multi-tier Systems through SDN-Managed Drone Networks. 956-961 - Umut Can Çabuk, Mustafa Tosun, Orhan Dagdeviren, Yusuf Ozturk:
An Architectural Design for Autonomous and Networked Drones. 962-967 - Brian Kelley, Israt Ara:
An Intelligent and Private 6G Air Interface Using Physical Layer Security. 968-973 - Peter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:
Statistical Analysis of the MK-3 Customizable Authenticated Encryption. 974-979 - Maryna Veksler, David Langus Rodríguez, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:
LoFin: LoRa-based UAV Fingerprinting Framework. 980-985 - Johannes F. Loevenich, Jonas Bode, Tobias Hürten, Luca Liberto, Florian Spelter, Paulo H. L. Rettore, Roberto Rigolin Ferreira Lopes:
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study. 986-992 - Samson Ho, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov, Ritu Chadha, Alina Oprea:
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems. 993-998 - Negin Entezari, Evangelos E. Papalexakis:
Tensorshield: Tensor-based Defense Against Adversarial Attacks on Images. 999-1004 - Koosha Sadeghi, Ayan Banerjee, Sandeep K. S. Gupta:
Formal Adversarial Analysis of Machine Learning based Cyber Physical Authentication Systems. 1005-1010 - Niranjan Suri, Maggie B. Wigness, Lorenzo Campioni, Jan Nilsson, Eelco Cramer, Roberto Fronteddu, Mauro Tortonesi:
Comparing Performance of Group Communications Protocols Over SCB versus Routed MANET Networks. 1011-1017 - Slawomir Kuklinski, Krzysztof Szczypiorski, Konrad S. Wrona, Jedrzej Bieniasz:
5G-Enabled Defence-in-Depth for Multi-domain Operations. 1024-1029 - Yudong Fang, David Brown:
Base Station Deployment Optimization in Federated Networks with Multi-Hop Communication. 1030-1037 - Christoph Barz, Eelco Cramer, Roberto Fronteddu, Mariann Hauge, Kelvin Marcus, Jan Nilsson, Filippo Poltronieri, Mauro Tortonesi, Niranjan Suri, Mattia Zaccarini:
Enabling Adaptive Communications at the Tactical Edge. 1038-1044 - Marco Manso, Janusz Furtak, Barbara Guerra, James Michaelis, Daniel Ota, Niranjan Suri, Konrad S. Wrona:
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments. 1045-1052 - Tarek F. Abdelzaher, Nathaniel D. Bastian, Susmit Jha, Lance M. Kaplan, Mani B. Srivastava, Venugopal V. Veeravalli:
Context-aware Collaborative Neuro-Symbolic Inference in IoBTs. 1053-1058 - Kyo Hyun Kim, Denizkhan Kara, Vineetha Paruchuri, Sibin Mohan, Greg Kimberly, Denis Osipychev, Jae H. Kim, Josh D. Eckhardt, Miroslav Pajic:
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs. 1065-1069 - Jared Ray Coleman, Mehrdad Kiamari, Lillian Clark, Daniel D'Souza, Bhaskar Krishnamachari:
Graph Convolutional Network-based Scheduler for Distributing Computation in the Internet of Robotic Things. 1070-1075 - Yalin E. Sagduyu:
Adversarial Machine Learning and Defense Game for NextG Signal Classification with Deep Learning. 1076-1081 - Tianshi Wang, Denizhan Kara, Jinyang Li, Shengzhong Liu, Tarek F. Abdelzaher, Brian Jalaian:
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example. 1082-1087
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.