


default search action
40th MILCOM 2022: Rockville, MD, USA
- IEEE Military Communications Conference, MILCOM 2022, Rockville, MD, USA, November 28 - December 2, 2022. IEEE 2022, ISBN 978-1-6654-8534-0

- J. J. Garcia-Luna-Aceves, Bradley R. Smith, Judith T. Samson:

SCRIP: Safe and Cycle-Free Multi-Path Routing. 1-6 - Andrew Wood, Tim Upthegrove, Colin Funai, Bishal Thapa, Scott Loos, Daniel Javorsek:

PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction. 1-6 - Dan Shen, Genshe Chen, Khanh Pham, Erik Blasch:

Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization among UASs. 1-6 - Samuel R. Shebert

, Moeness G. Amin
, Benjamin H. Kirk, R. Michael Buehrer:
Multi-Signal Classification Using Deep Learning and Sparse Arrays. 1-6 - Lorenzo Campioni, Bastiaan Wissingh, Mauro Tortonesi, Niranjan Suri, Cesare Stefanelli:

NDN Experimental Evaluation in Multi-Domain Tactical Environments. 1-6 - Adhitya Bantwal Bhandarkar, Sudharman K. Jayaweera

, Steven A. Lane:
Adversarial Sybil attacks against Deep RL based drone trajectory planning. 1-6 - Bishmita Hazarika, Keshav Singh, Chih-Peng Li, Sudip Biswas

:
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks. 1-6 - Sana Sharif, Sherali Zeadally, Waleed Ejaz:

Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks. 7-12 - Yi Shi

, Yalin E. Sagduyu:
Sensing-Throughput Tradeoffs with Generative Adversarial Networks for NextG Spectrum Sharing. 13-18 - Francesco Restuccia, Erik Blasch, Andrew Ashdown, Jonathan D. Ashdown, Kurt A. Turck:

3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems. 19-24 - Jason Hussey, Kerri Stone, Tracy Camp:

Positive and Unlabeled Learning for Mobile Application Traffic Classification. 25-30 - Mayur Katwe, Rasika Deshpande, Keshav Singh, Chih-Peng Li:

UAV aided FD-NOMA for Energy-efficient Ultra-Reliable Low-latency Communications. 31-36 - Sravani Kurma

, Keshav Singh, Prabhat Kumar Sharma
, Chih-Peng Li:
Outage Probability Analysis of Uplink Cell-Free Massive MIMO with User Mobility. 37-42 - Wei Wang, Zicheng Chi, Xin Liu, Ananth Vishnu Bhaskar, Ankit Baingane, Ryan Jahnige, Qingquan Zhang, Ting Zhu:

A Secured Protocol for IoT Devices in Tactical Networks. 43-48 - Saad Inshi

, Rasel Chowdhury
, Hakima Ould-Slimane, Chamseddine Talhi:
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption. 49-54 - Prajwalita Saikia, Keshav Singh, Omid Taghizadeh, Wan-Jen Huang, Sudip Biswas

:
DRL Algorithms for Efficient Spectrum Sharing in RIS-aided MIMO Radar and Cellular Systems. 55-60 - Prakhar Consul

, Ishan Budhiraja
, Rajat Chaudhary
, Neeraj Kumar:
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning. 61-65 - Ke Lu, Wenjuan Yan, Shuyi Wang:

Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications. 66-71 - Inna Valieva, Bharath Shashidhar, Mats Björkman, Johan Åkerberg, Mikael Ekström, Iurii Voitenko:

Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications. 72-77 - Andreas Lang, Berthold Lankl:

A Comprehensive Study of CPM Trellis Initialization Methods. 78-83 - Xing Hao

, Yu Xiao, Guillermo E. Atkin:
Polynomial Phase Modulation-Based Code-Domain NOMA. 84-88 - Brett Wiens, Daniel C. Lee:

Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations. 89-94 - Salil Sharma

, Visa Koivunen:
Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs. 95-101 - Quang Minh Nguyen, M. Shahir Rahman, Xinzhe Fu, Sastry Kompella, Joseph P. Macker, Eytan H. Modiano:

An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation. 102-109 - Paulo H. L. Rettore

, Miodrag Djurica, Roberto Rigolin Ferreira Lopes
, Vinícius F. S. Mota, Eelco Cramer, Floris Drijver, Johannes F. Loevenich:
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead. 110-116 - Klement Hagenhoff, Maximilian Tränkler, Corinna Schmitt, Gabi Dreo Rodosek:

RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs. 117-124 - Yiannis Papageorgiou, Merkouris Karaliopoulos

, Iordanis Koutsopoulos:
Joint Controller Placement and TDMA Link Scheduling in SDN-enabled Tactical MANETs. 125-132 - Juan David Pabon, Shaikha Alkandari, Matthew C. Valenti, Xi Yu:

Air-Aided Communication between Ground Assets in a Poisson Forest. 133-139 - Michael Ghorbanzadeh, Edward Drocella, Robert Sole, April Lundy, Nicholas Lasorte:

Quantitative Assessment of Federal Airborne Systems' Spectrum Usage. 140-147 - Md Sadman Siraj

, Aisha B. Rahman
, Maria Diamanti
, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou, Jim Plusquellic:
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing. 148-153 - Jaime C. Acosta:

Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving Capabilities. 154-159 - Gerald Hills, Julia Baldasare, Wayne Henry, Warren Connell:

A Customized Approach to Cybersecurity Education for Space Professionals. 160-165 - Suhyeon Lee

, Kwangsoo Cho, Seungjoo Kim:
Do You Really Need to Disguise Normal Servers as Honeypots? 166-172 - Bich Vu, John Darby Mitchell, Katherine Stowell, Mark Rabe, Orton Huang, Robert Lychev, Martine Kalke:

Mission Resilience Experimentation and Evaluation Testbed. 173-179 - Joshua Morman, Marc Lichtman, Marcus Müller:

The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-as-a-Plugin. 180-185 - Mark D. Silvius, Mark A. McHenry

, Alex Lackpour, Joe Molnar:
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems. 192-197 - Charles E. Thornton

, R. Michael Buehrer:
Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming. 198-203 - Kristoffer Hägglund, Erik Axell, Patrik Eliardsson:

Reduced Complexity Adaptive Demodulation in Impulse Noise Channels. 204-209 - Dan Shen, Genshe Chen, Tien Manh Nguyen, Khanh Pham:

Multi-carrier Constant Envelope GNSS Waveforms Compatible with Existing User Equipment. 210-215 - Masayuki Kaneko, Hideki Ochiai:

A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels. 216-221 - Michael A. Tope, Joel M. Morris:

On the Limits of Learning a Discrete Memoryless Communication Channel. 222-228 - Ece Bingöl, Aylin Yener:

Peak Age of Information with Receiver Induced Service Interruptions. 229-234 - Ian Ellis Lamptey Hulede, Hyuck M. Kwon:

Allan Deviation of Social Learning Distributed Network Time Synchronization. 235-240 - Roberto Petroccia, Gabriele Ferri, Pietro Stinco

, Alessandra Tesei, Stefano Fioravanti, Thomas C. Furfaro, João Alves, Andrea Molaschi, José M. Bioucas-Dias, Paulo Sousa Dias, João Borges de Sousa
:
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience. 241-246 - Arwid Komulainen, Jimmi Grönkvist, Ulf Sterner:

Frequency-Hop-Coded SCB for Tactical Networks. 247-252 - Tim Upthegrove, Guevara Noubir, Bishal Thapa, Dan Smith, Colin Funai, Scott Loos, Greg Kuperman:

Rapid Interoperability with OverlAI Gateways. 253-258 - Matthew Hawkins, A. K. Wang, Tammy Chang, David Rowe, Brandon Martin, Michael Enoch, Gustave Anderson

, Julee Pandya:
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy. 259-264 - Laura Poplawski Ma, Christopher Eck, David Duran, Stephen Zabele, Marina Gurevich, Gregory Lauer:

Mission Critical Resiliency with IRON. 265-272 - Anthony Castañares, Deepak K. Tosh

:
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks. 273-278 - Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar

, Shivkumar Chandrasekaran, B. S. Manjunath:
MalGrid: Visualization of Binary Features in Large Malware Corpora. 279-284 - Maxwell Levatich, Robert Brotzman, Benjamin Flin, Ta Chen, Rajesh Krishnan, Stephen A. Edwards:

C Program Partitioning with Fine-Grained Security Constraints and Post-Partition Verification. 285-291 - Huan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, Dan Meng:

LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. 292-297 - John A. Snoap, James A. Latshaw, Dimitrie C. Popescu, Chad M. Spooner:

Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features. 298-303 - J. B. Persons, Lauren J. Wong, Megan O. Moore, William C. Headley

, Michael Fowler:
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features. 304-310 - Adeeb Abbas, Vasil Pano, Geoffrey Mainland, Kapil R. Dandekar:

Radio Modulation Classification Using Deep Residual Neural Networks. 311-317 - S. Andrew Lanham, Eli Bradley, Brian R. La Cour

:
Generalized Noncoherent Space-Time Block Codes from Quantum Error Correction. 318-323 - Pialy Biswas

, Ranjan K. Mallik, Jack H. Winters:
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems. 324-329 - Byron McMullen, Seung-Jun Kim:

Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery. 330-335 - Vivian Ukamaka Ihekoronye, Simeon Okechukwu Ajakwe

, Dong-Seong Kim
, Jae-Min Lee:
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach. 336-341 - Mohtasin Golam, Rubina Akter, Revin Naufal Alief, Van-Sang Doan

, Jae-Min Lee, Dong-Seong Kim
:
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things. 342-349 - Adrian Schalk

, Luke Brodnik, Dane Brown
:
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture. 350-355 - Athanasios Gkelias

, Kin K. Leung:
GAN-Based Detection of Adversarial EM Signal Waveforms. 356-361 - Scott Kuzdeba, Josh Robinson:

Data-Centric Approaches to Radio Frequency Machine Learning. 362-367 - Hao Chen, Seung-Jun Kim:

Unsupervised Radio Scene Analysis Using Neural Expectation Maximization. 368-373 - John S. Kaminski, David Stein, Jay Weitzen:

Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments. 374-378 - Xiang Cheng, Hanchao Yang, Daniel J. Jakubisin, Nishith D. Tripathi, Gus Anderson

, A. K. Wang, Yaling Yang, Jeffrey H. Reed:
5G Physical Layer Resiliency Enhancements with NB-IoT Use Case Study. 379-384 - Mohamed A. Taha, Mohamed K. M. Fadul, Joshua H. Tyler, Donald R. Reising, T. Daniel Loveless:

An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications. 385-392 - Chongjun Ouyang, Hao Xu, Xujie Zang, Hongwen Yang:

Some Discussions on PHY Security in DF Relay. 393-397 - Thomas H. Shake, Jun Sun, Thomas C. Royster IV, Aradhana Narula-Tam:

Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks. 404-411 - Alex Yahja, Saeed Kaviani, Bo Ryu, Jae H. Kim, Kevin A. Larson:

DeepADMR: A Deep Learning based Anomaly Detection for MANET Routing. 412-417 - Alyse M. Jones, William C. Headley

:
Considerations of Reinforcement Learning within Real-Time Wireless Communication Systems. 418-425 - Amitav Mukherjee:

Jamming Vulnerability of Terahertz Wireless Networks. 426-430 - Haotian Zhai, Bernd-Peter Paris

:
Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications. 431-436 - Thomas Ranström, Philip Pietraski, Sudhir B. Pattar:

5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference. 437-441 - Yue Gao, Jack W. Stokes, Manoj Ajith Prasad, Andrew T. Marshall, Kassem Fawaz, Emre Kiciman:

I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation. 442-449 - Kailash Gogineni

, Yongsheng Mei
, Guru Venkataramani, Tian Lan:
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects. 450-457 - Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng Liu, Lingyun Ying:

High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree. 458-463 - Md Ariful Haque, Sachin Shetty

, Charles A. Kamhoua, Kimberly Gold:
Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness. 464-469 - Ryan Yang, Haizhou Du, Andre Wibisono, Patrick Baker:

Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings. 470-477 - Huanle Zhang, Mi Zhang, Xin Liu, Prasant Mohapatra, Michael DeLucia:

FedTune: Automatic Tuning of Federated Learning Hyper-Parameters from System Perspective. 478-483 - William Marfo

, Deepak K. Tosh
, Shirley V. Moore
:
Network Anomaly Detection Using Federated Learning. 484-489 - Nathaniel R. Olsen, Sasha M. McKee, Osama S. Haddadin, Scott Lyon, Jared Campbell, Kam K. Leang:

Information-Based Mobile Sensor Network Localization and Tracking of an Uncooperative Target. 490-495 - Mohammed Rashid

, Jeffrey A. Nanzer:
A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays. 496-500 - Sayanta Seth

, Murat Yuksel, Azadeh Vosoughi:
Forming Coalition Sets from Directional Radios. 507-514 - Anh Duc Le, Cristian Budianu, Melissa Elkadi, Bo Ryu:

Physical Layer Abstraction for LTE and 5G New Radio with Imbalance Receiver in EMANE. 515-521 - Jeremy Banks, Ryan Kerr, Steven H. H. Ding, Mohammad Zulkernine:

SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments. 522-528 - Yu Luo, Lina Pu:

Asymmetric Collision Phenomenon and its Impact on Underwater Acoustic Networks. 529-534 - Christopher Maracchion, Timothy Woods, Sean Furman, Andrew L. Drozd:

The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks. 535-540 - Don Barber

, Vikram Kanth, Darren Rogers:
Manipulating the Automatic Identification System with Extremely Low-Cost Hardware. 541-546 - Ziad El Jamous, Kemal Davaslioglu

, Yalin E. Sagduyu:
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems. 547-552 - Bo Ryu, Raymond Knopp, Melissa Elkadi, Deoksung Kim, Anh Le:

5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator with EMANE. 553-558 - Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Peter Foytik, Xueping Liang, Wee Keong Ng:

Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace. 559-564 - Michaela C. Vanderveen

:
Threat framework for 5G cellular communications. 565-570 - Yunfei Ge, Quanyan Zhu:

MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks. 571-576 - Hisham A. Kholidy

, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman
, Mohamed Mahmoud
, Mahmoud M. Badr
, Maqsood Mahmud
, Ahmed F. Sayed:
Toward Zero Trust Security IN 5G Open Architecture Network Slices. 577-582 - Chaojin Qing

, Na Yang, Shuhai Tang, Chuangui Rao, Jiafan Wang, Jinliang Chen:
CNN-based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel. 583-587 - Paul Sikora, David Crouse, Heather B. Dussault:

On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies. 606-611 - Matthias G. Schraml, Andreas Knopp:

Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems. 612-617 - Gyuwan Kim, Hoon Kim:

Link Reliability of Satellite-to-Ground Free-Space Optical Communication Systems in South Korea. 618-622 - Omid Nia, Brian L. Mark

:
Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band. 623-628 - Aida Meftah, Georges Kaddoum

, Tri Nhu Do, Chamseddine Talhi:
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks. 629-634 - Austin Bristow, Kwang-Cheng Chen

:
A Robust Self-Synchronized Quantum Key Distribution Protocol. 635-642 - Blake Hayden, Matthew Sweeney, Britta Hale:

Securing Software Updates under Receiver Radio Frequency Geolocation Risk. 643-648 - Frederick M. Chache, Sean Maxon, Ram M. Narayanan, Ramesh Bharadwaj:

Improving Quality of Service in a Mesh Network Using Age of Information. 649-654 - Hamda Bouzabia

, Georges Kaddoum
, Tri Nhu Do:
Deep Learning-based Interference Detection and Classification for LPI/LPD Radar Systems. 655-660 - Zachary T. Minson, Hyuck M. Kwon:

Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO. 661-666 - Kennedy A. Lee, John R. Barry:

Opportunistic Power Control for Low Probability of Detection Communication. 667-671 - Mohammed Alkhowaiter

, Khalid Almubarak, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Changchun Zou:
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms. 672-678 - Nicolò Boschetti, Nathaniel G. Gordon, Johan Sigholm, Gregory Falco:

Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North. 679-686 - Peter J. Caven, Shakthidhar Reddy Gopavaram, L. Jean Camp:

Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making. 687-692 - S. Sruti, Kolliboina Sai Teja, K. Giridhar:

Performance Comparison of OTFS and MC-CDMA with Channel Estimation and Power Back-Off. 693-698 - Saurab Dulal, Lan Wang:

NDNSD: Service Publishing and Discovery in NDN. 699-704 - Shakil Ahmed, Ibrahim Abdelmawla, Ahmed E. Kamal, Mohamed Y. Selim:

Blockage Prediction for Mobile UE in RIS-assisted Wireless Networks: A Deep Learning Approach. 705-710 - Stephan D. Frisbie, Mohamed F. Younis:

Data-Driven Wireless Anomaly Detection Using Spectral Features. 711-716 - William W. Howard, R. Michael Buehrer:

Decentralized Bandits with Feedback for Cognitive Radar Networks. 717-722 - Zachary White, Don Barber

, Murali Tummala, John McEachen:
A Transmit Diversity Scheme for Multi-pulse Pulse Position Modulated Visible Light Communications. 723-728 - Debarun Das, Taieb Znati, Martin B. H. Weiss:

Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access. 729-734 - Daniel Song, Eugene Wu, William Song, Bow-Nan Cheng:

Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures. 735-742 - Rajrshi Dubey, Swades De:

SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels. 751-756 - Ilana Heintz, John Grothendieck, Fred Bernardin, Gregory Kuperman:

Improving Text Security Classification Towards an Automated Information Guard. 757-762 - Felix O. Olowononi, Danda B. Rawat, Charles A. Kamhoua, Brian M. Sadler:

Deep Reinforcement Learning for Deception in IRS-assisted UAV Communications. 763-768 - Ti Ti Nguyen, Kim-Khoa Nguyen, Satinder Singh:

Intelligent Reflecting Surface-based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems. 769-774 - Allan Ko, Thomas Stahlbuhk, Brooke Shrader:

Rate Control with Autoregressive Forecasting for High Frequency Communication. 775-780 - Mohammad Towliat, Zheng Guo

, Leonard J. Cimini Jr., Xiang-Gen Xia, Aijun Song:
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication. 781-786 - Zheng Wang, Lingjia Liu, Yang Yi, A. Robert Calderbank, Jianzhong Zhang:

Low-Complexity Channel Matrix Calculation for OTFS Systems with Fractional Delay and Doppler. 787-792 - Wei Jiang, Hans D. Schotten:

Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks. 793-798 - Joseph P. Macker, Jeffery W. Weston

, Kyle Lawson Crandall:
Distributed Agent Consensus Performance in Resilient Communication Networks. 799-804 - James Whitehead, Andre van Heerden, Nirin Thanirat, Kobkiat Sukmanee, Witras Smabut:

A Novel Resilient HF Data Communications Architecture. 805-809 - Eric T. Makara, Joseph A. Molnar, Lan H. Tran, John B. Wood, Er-Hsien Frank Fu:

WHAC-A-MOLE. 810-816 - Tao Shan, Julian Cheng:

Coverage Estimation for Secure Ultraviolet Communication. 817-821 - Matthew Gaydos, Frederick J. Block, Thomas C. Royster IV, David J. Love:

Receiver Diversity in LEO Satcom Constellations. 822-827 - Thomas H. Shake, Jun Sun, Thomas C. Royster IV, Aradhana Narula-Tam:

Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies. 828-834 - Griffin Cleverly, Bridgit Mendler, David Brunnenmeyer, Jeffrey Fry:

Near Term Resilient Teleports for DoD SATCOM. 835-840 - Armando J. Vigil, John Kirk, Patrick Rayermann, Jessica L. Gregris, Dahesh A. Khalil, Carl O. Morris:

DOD SATCOM Growth Measurement and Planning. 841-848 - Alexander Kott, Michael J. Weisman, Joachim Vandekerckhove:

Mathematical Modeling of Cyber Resilience. 849-854 - Jason E. Ellis, Travis W. Parker, Joachim Vandekerckhove, Brian J. Murphy, Sidney C. Smith

, Alexander Kott, Michael J. Weisman:
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience. 855-860 - Andreas Dybvik Kaasen, Gudmund Grov, Federico Mancini, Magnus Baksaas:

Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks. 861-866 - Van Hau Le, Ti Ti Nguyen, Kim Khoa Nguyen, Satinder Singh:

Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles. 867-872 - Hao-Hsuan Chang, R. B. Sai Sree, Hao Chen, Jianzhong Zhang, Lingjia Liu:

MADRL Based Scheduling for 5G and Beyond. 873-878 - Pedro A. Forero, Peng Zhang, Dusan Radosevic:

Toward Congestion Control in Lossy Networks via Local Queue-Management Policies. 879-886 - Heng Jin, Qingyu Liu, Chengzhang Li, Y. Thomas Hou

, Wenjing Lou, Sastry Kompella:
Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone Swarm. 887-894 - Dohyun Kim, Miguel R. Castellanos, Robert W. Heath Jr.

:
Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks. 895-900 - Sejuti Banik, Md Hasan Rahman, Mohammad Ranjbar, Nghi H. Tran, Khanh Pham:

Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel with 1-bit ADC. 901-906 - Fabrice Tchakountio, Ambrose Lewis, Sastry Kompella:

SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence. 907-912 - Andreas Feder, Martin Hirschbeck, Wolfgang H. Gerstacker:

Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics. 913-919 - Michel Kulhandjian, Gregory Dzhezyan, Hovannes Kulhandjian, Claude D'Amours:

Pulse Shaping for Faster-than-Nyquist to Enable Low-Complexity Detection. 920-925 - John Corcoran, Eric Graves, Bryan Dawson, Matthew Dwyer, Paul L. Yu, Kevin Chan:

Adaptive Monitoring for Analytics Placement in Tactical Networks. 926-931 - Jake B. Perazzone, Matthew Dwyer, Kevin S. Chan, Cleon Anderson, Scott E. Brown:

Enabling Machine Learning on Resource-constrained Tactical Networks. 932-937 - Andreas Polydoros, Cenk Köse:

Clustered Distributed Spatial Multiplexing. 938-943 - Xi Zhang, Qixuan Zhu:

1 Lyapunov Stability Analysis for Controlling UAV Trajectory Over 6G Wireless Networks. 944-949 - Yuhui Wang, Junaid Farooq:

Zero Touch Coordinated UAV Network Formation for $360^{\circ}$ Views of a Moving Ground Target in Remote VR Applications. 950-955 - Alvaro del Aguila, Jonathan Valdez Mendoza, Sai Bhargav Mandavilli, Janise McNair

:
Remote and Rural Connectivity via Multi-tier Systems through SDN-Managed Drone Networks. 956-961 - Umut Can Çabuk

, Mustafa Tosun, Orhan Dagdeviren
, Yusuf Ozturk:
An Architectural Design for Autonomous and Networked Drones. 962-967 - Brian Kelley

, Israt Ara
:
An Intelligent and Private 6G Air Interface Using Physical Layer Security. 968-973 - Peter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:

Statistical Analysis of the MK-3 Customizable Authenticated Encryption. 974-979 - Maryna Veksler, David Langus Rodríguez, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac:

LoFin: LoRa-based UAV Fingerprinting Framework. 980-985 - Johannes F. Loevenich, Jonas Bode, Tobias Hürten

, Luca Liberto, Florian Spelter, Paulo H. L. Rettore
, Roberto Rigolin Ferreira Lopes
:
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study. 986-992 - Samson Ho, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov, Ritu Chadha, Alina Oprea:

Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems. 993-998 - Negin Entezari, Evangelos E. Papalexakis:

Tensorshield: Tensor-based Defense Against Adversarial Attacks on Images. 999-1004 - Koosha Sadeghi, Ayan Banerjee, Sandeep K. S. Gupta:

Formal Adversarial Analysis of Machine Learning based Cyber Physical Authentication Systems. 1005-1010 - Niranjan Suri, Maggie B. Wigness, Lorenzo Campioni, Jan Nilsson, Eelco Cramer, Roberto Fronteddu

, Mauro Tortonesi:
Comparing Performance of Group Communications Protocols Over SCB versus Routed MANET Networks. 1011-1017 - Slawomir Kuklinski

, Krzysztof Szczypiorski, Konrad S. Wrona
, Jedrzej Bieniasz:
5G-Enabled Defence-in-Depth for Multi-domain Operations. 1024-1029 - Yudong Fang, David Brown:

Base Station Deployment Optimization in Federated Networks with Multi-Hop Communication. 1030-1037 - Christoph Barz, Eelco Cramer, Roberto Fronteddu

, Mariann Hauge, Kelvin Marcus, Jan Nilsson, Filippo Poltronieri
, Mauro Tortonesi
, Niranjan Suri, Mattia Zaccarini
:
Enabling Adaptive Communications at the Tactical Edge. 1038-1044 - Marco Manso

, Janusz Furtak
, Barbara Guerra, James Michaelis, Daniel Ota, Niranjan Suri, Konrad S. Wrona
:
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments. 1045-1052 - Tarek F. Abdelzaher, Nathaniel D. Bastian, Susmit Jha, Lance M. Kaplan, Mani B. Srivastava, Venugopal V. Veeravalli:

Context-aware Collaborative Neuro-Symbolic Inference in IoBTs. 1053-1058 - Kyo Hyun Kim, Denizkhan Kara, Vineetha Paruchuri, Sibin Mohan

, Greg Kimberly, Denis Osipychev, Jae H. Kim, Josh D. Eckhardt, Miroslav Pajic:
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs. 1065-1069 - Jared Coleman

, Mehrdad Kiamari, Lillian Clark, Daniel D'Souza, Bhaskar Krishnamachari:
Graph Convolutional Network-based Scheduler for Distributing Computation in the Internet of Robotic Things. 1070-1075 - Yalin E. Sagduyu:

Adversarial Machine Learning and Defense Game for NextG Signal Classification with Deep Learning. 1076-1081 - Tianshi Wang

, Denizhan Kara, Jinyang Li, Shengzhong Liu, Tarek F. Abdelzaher, Brian Jalaian:
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example. 1082-1087

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














