


default search action
41st MILCOM 2023: Boston, MA, USA
- IEEE Military Communications Conference, MILCOM 2023, Boston, MA, USA, October 30 - Nov. 3, 2023. IEEE 2023, ISBN 979-8-3503-2181-4
- Sujata Sinha, Alkan Soysal:
Channel Aware Adversarial Attacks are Not Robust. 1-6 - Matteo Varvello, Fang Hao, David Holland, James M. Hughes, Sarit Mukherjee:
BIER-Like Multicast for Mobile Ad Hoc Networks. 1-6 - Bleema Rosenfeld, Sridhar Venkatesan, Rauf Izmailov, Matthew Yudin, Constantin Serban, Ritu Chadha:
Data-Driven Constraint Mining for Realizable Adversarial Samples. 7-12 - Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand
, Patrick D. McDaniel:
The Efficacy of Transformer-based Adversarial Attacks in Security Domains. 13-18 - Heechan Kim, Honggu Kang, Joonhyuk Kang:
Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV. 19-26 - Mohammad Abdi
, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia:
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness. 27-32 - Simon Dahdal
, Filippo Poltronieri
, Alessandro Gilli, Mauro Tortonesi
, Roberto Fronteddu, Raffaele Galliera, Niranjan Suri
:
RoamML: Distributed Machine Learning at the Tactical Edge. 33-38 - Luis Angel D. Bathen, Simeon Babatunde, Rhui Dih Lee, Achintya Kundu
, Laura Wynter:
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices. 39-44 - Scott E. Brown, David Harman, Cleon Anderson, Matthew Dwyer:
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environments. 45-50 - Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Deokseong Kim, Jae H. Kim, Carrie Spiker, Blake Harnden:
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks via Multi-Agent Deep Reinforcement Learning. 51-56 - Mohamed W. Nomeir, Sajani Vithana, Sennur Ulukus:
Private Membership Aggregation. 57-62 - Melissa Elkadi, Deokseong Kim, Ejaz Ahmed, Anh Le, Moein Sadeghi, Paul Russell, Bo Ryu:
Open Source-Based Over-the-Air 5G New Radio Sidelink Testbed. 63-70 - Harri Saarnisaari, Relja Djapic, Topi Tuukkanen, Warren Low, Nicolas Chuberre, Souradip Saha:
DOTMFLPI Analysis of 5G for Several Military Use Cases. 71-76 - Venkata Srirama Rohit Kantheti
, Chia-Hung Lin, Shih-Chun Lin
, Liang C. Chu:
Anti-Jamming Resilient LEO Satellite Swarms. 77-82 - Elias A. Alwan, John L. Volakis
, Md Khadimul Islam, Udara De Silva, Arjuna Madanayake
, José Ángel Sánchez, George Sklivanitis, Dimitris A. Pados, Luke Beckwith, Reza Azarderakhsh, Madhuvanti Muralkrishan, Rishabh Rastogi, Aniruddha Hore, Eric W. Burger:
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks. 83-88 - Hyunsoo Son, Girim Kwon, Hyuncheol Park, Joo Sung Park:
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology. 89-94 - Steven J. Silverman, Trey Jiron:
Quantum MBSE and Quantum SysML. 95-99 - Dashiell L. P. Vitullo, Trevor Cook, Daniel E. Jones, Lisa M. Scott, Brian T. Kirby:
Computational Simulation Framework for Tactical Quantum Network Applications. 100-102 - Wesley Webb, Michael S. Bullock, Samuel H. Knarr, Timothy C. Burt, Jim A. Drakes, Saikat Guha, Boulat A. Bash, Victor G. Bucklew:
Spread Photon Transceiver for Quantum Secure Communications. 103-108 - Austin Bristow, Kwang-Cheng Chen:
Pragmatic Quantum-Classic Phase Estimation of a Quantum Channel. 109-114 - Jaemin Kim, Hyunwoo Jung, Jeongseok Ha:
Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes. 115-120 - Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian:
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection. 121-126 - Benjamin M. Marlin
, Niranjan Suri
, Shiwei Fang
, Mani B. Srivastava, Colin Samplawski, Ziqi Wang, Maggie B. Wigness:
IoBT-MAX: a Multimodal Analytics eXperimentation Testbed for IoBT Research. 127-132 - Pragya Sharma
, Mani B. Srivastava
:
Impact of Delays and Computation Placement on Sense-Act Application Performance in IoT. 133-138 - Xinlin Li, Osama A. Hanna, Christina Fragouli, Suhas N. Diggavi, Gunjan Verma, Joydeep Bhattacharyya:
Feature Compression for Multimodal Multi-Object Tracking. 139-143 - Walid A. Hanafy, Li Wu
, Tarek F. Abdelzaher, Suhas N. Diggavi, Prashant J. Shenoy:
Failure-Resilient ML Inference at the Edge through Graceful Service Degradation. 144-149 - Abel Souza
, Nathan Ng
, Tarek F. Abdelzaher, Don Towsley, Prashant J. Shenoy:
Unlocking Efficiency: Understanding End-to-End Performance in Distributed Analytics Pipelines. 150-155 - Susmit Jha, Anirban Roy, Adam D. Cobb, Alexander M. Berenbeim, Nathaniel D. Bastian:
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models. 156-161 - Alexander Most, Maksim Ekin Eren, Boian S. Alexandrov
, Nigel Lawrence:
Electrical Grid Anomaly Detection via Tensor Decomposition. 162-169 - Keerthiraj Nagaraj, Dennis Agnew, Pavan Kumar Mangipudi, Allen Starke, Zixiang Nie, Janise McNair
:
Graph Machine Learning based Cyber Attack Detection for Mobile Tactical Networks. 170-175 - Ismail Cosandal, Sennur Ulukus:
Timely Multi-Goal Transmissions With an Intermittently Failing Sensor. 176-181 - Arunabh Srivastava, Sennur Ulukus:
Age of Gossip on Generalized Rings. 182-187 - James Michaelis, Alessandro Morelli:
Applying Mission Information Requirements to Value of Information Middleware. 188-193 - Tasmeen Zaman Ornee, Md Kamran Chowdhury Shisher
, Clement Kam, Yin Sun:
Context-aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-critical Systems. 194-200 - Alessandro Amato, Roberto Fronteddu, Niranjan Suri:
Dynamically Creating Tactical Network Emulation Scenarios using Unity and EMANE. 201-206 - Alexander Velazquez
, Roberto Rigolin Ferreira Lopes
, Adrien Bécue
, Johannes F. Loevenich, Paulo H. L. Rettore, Konrad S. Wrona
:
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation. 207-212 - Bertram Schütz, Christoph Barz, Paulo H. L. Rettore, Thomas Hänel:
Site-specific Radio Signal Propagation for Tactical Environments using 3D Path Tracing. 213-218 - Marco Manso
, Fernando Freire, Janusz Furlak, Bárbara Guerra, James Michaelis, Daniel Ota, Reinhard Claus, Niranjan Suri, Roberto Fronteddu, Edoardo Di Caro, Konrad S. Wrona
, Emil P. Andersen, Frank T. Johnsen:
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments. 219-224 - Scott R. Velazquez, Robert Shanafelt, Brennan Eveland:
Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications. 225-226 - Kumar Sai Bondada, Xiang Cheng, Hanchao Yang, Daniel J. Jakubisin, Nishith D. Tripathi, G. Anderson, Yaling Yang, Jeffrey H. Reed:
Demonstration of 5G-Underlay Signal Co-existence. 227-232 - Roman Shikula, Nicholas Echeverry, William Stevers:
Multi-waveform Bridging of Streaming Video with an Innovative Software Radio. 233-234 - Alyse M. Jones, Amos Johnson, William C. Headley:
Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications. 235-236 - Michael Hofmeier, Karl Seidenfad
, Wolfgang Hommel:
Validating a Modified JSON Web Signature Format using the Scenario of Ammunition Issuance for Training Purposes. 237-238 - Shu-Ying Chang, Hung-Wen Liang, Van-Linh Nguyen, Po-Ching Lin:
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring. 239-240 - Nathan Stephenson, Azuka J. Chiejina, Nathaniel B. Kabigting, Vijay K. Shah:
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed. 241-242 - Adrian Baron-Hyppolite, Jefferson V. F. Abreu
, Joao F. Santos, Luiz A. DaSilva, Jacek Kibilda:
Adaptive Beam Management for Secure mmWave Communications using Software-Defined Radios. 243-244 - Frederik Jonathan Zumegen
, Ish Kumar Jain
, Dinesh Bharadia:
BeamArmor Demo: Anti-Jamming System in Cellular Networks with srsRAN Software Radios. 245-246 - Anil Gürses
, Mark Funderburk, John Kesler, Keith Powell, Talha Faizur Rahman, Özgür Özdemir, Magreth Mushi, Mihail L. Sichitiu
, Ismail Güvenç
, Rudra Dutta
, Vuk Marojevic:
Demonstration of Joint SDR/UAV Experiment Development in AERPAW. 247-248 - Amir Torabi, George Sklivanitis, Dimitris A. Pados, Elizabeth Serena Bentley, Joseph Suprenant, Michael J. Medley:
Interference-Avoiding RFSoC-based MIMO Links. 249-250 - Joshua Moore, Aly Sabri Abdalla
, Minglong Zhang, Vuk Marojevic:
Demo: SSxApp: Secure Slicing for O-RAN Deployments. 251-252 - Asheesh Tripathi
, Jaswanth S. R. Mallu, Md. Habibur Rahman, Abida Sultana, Aditya Sathish, Alexandre Huff
, Mayukh Roy Chowdhury, Aloizio Pereira da Silva:
End-to-End O-RAN Control-Loop For Radio Resource Allocation in SDR-Based 5G Network. 253-254 - Anand Mahesh Kumar, Mai A. Abdel-Malek
, Jeffrey H. Reed:
Optimization and Control of Autonomous UAV Swarm for Object Tracking. 255-259 - Clara Maathuis:
Human Centered Explainable AI Framework for Military Cyber Operations. 260-267 - Brian Jalaian, Nathaniel D. Bastian:
Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning. 268-273 - Hidetake Matsui, Toshiki Matsumine, Hideki Ochiai:
Design SNR Optimization of Polar Codes Over Block Rician Fading Channels. 274-279 - Mostafa Ibrahim, Sabit Ekin, Ali Riza Ekti:
Warping Functions Design for Long Warped ZT-DFT-s-OFDM. 280-285 - Tomer Alter, Nir Shlezinger:
Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETs. 286-291 - Ki-Hun Lee, Howon Lee, Jungwook Choi, Soobum Park, Bang Chul Jung:
Distributed Space-Time Block Coding for Barrage Relay Networks. 292-297 - Kumar Sai Bondada, Hanchao Yang, Xiang Cheng, Daniel J. Jakubisin, Nishith D. Tripathi, Gus Anderson, Yaling Yang, Jeffrey H. Reed:
Enhanced Non-preemptive Support of URLLC using Spread Spectrum Underlay Signalling. 298-303 - Hanchao Yang, Kumar Sai Bondada, Xiang Cheng, Daniel J. Jakubisin, Nishith D. Tripathi, Yaling Yang, Gustave Anderson, Jeffrey H. Reed:
Underlay-based 5G Sidelink with Co-channel Interference Cancellation. 304-310 - X. Liu, Beatriz Lorenzo, Dennis Goeckel:
Covert Communications in Cognitive Mobile Edge Computing Networks using Restless Multi-Armed Bandits. 311-318 - Xinchun Yu, Shuangqin Wei, Chenhao Ying, Xiao-Ping Zhang:
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary. 319-324 - Abu Saleh Md Tayeen, Satyajayant Misra, Huiping Cao
, Jayashree Harikumar:
CAFNet: Compressed Autoencoder-based Federated Network for Anomaly Detection. 325-330 - Chaoyu Zhang, Ning Wang
, Shanghao Shi, Changlai Du, Wenjing Lou
, Y. Thomas Hou
:
MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection. 331-338 - Alphan Sahin:
Wireless Federated k-Means Clustering with Non-coherent Over-the-Air Computation. 339-344 - Pratyay Kumar, Jiefei Liu, Abu Saleh Md Tayeen, Satyajayant Misra, Huiping Cao
, Jayashree Harikumar, Oscar Perez:
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning. 345-350 - Huadong Guo, Weiqing Huang, Wen Wang, Meng Zhang, Zhaohua Qiu, Jinglong Guo:
Analysis and Optimization of Anti-jamming Performance of User Terminals with Low Sidelobe Levels for LEO Satellite Systems. 351-356 - Thomas H. Shake:
Hybrid Geometric/Shortest-path Routing in Proliferated Low-Earth-Orbit Satellite Networks. 357-364 - Daniel Weinzierl, Christian A. Hofmann, Andreas Knopp:
Blind Geolocation of RF-Signals with LEO Satellite Formations. 365-370 - Richard L. Gobbi, Elsa Schaefer, Jabril Jacobs, Dow Street:
Satellite Communications Resilience - Service Restoration and Retainment. 371-376 - Awab A. H. Mohammed, Mohamed A. Taha, Joshua H. Tyler, Mohamed K. M. Fadul, Donald R. Reising, T. Daniel Loveless:
CNN-based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks using Entropy-Informed RF-DNA Fingerprints. 377-384 - Yalin E. Sagduyu, Tugba Erpek:
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep Learning. 385-390 - Mengqi Zhan
, Yang Li, Huajun Cui, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang
:
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method. 391-396 - Richard Bell, Kyle Watson, Tianyi Hu, Isamu Poy, Fredric J. Harris, Dinesh Bharadia:
Searchlight: An accurate, sensitive, and fast radio frequency energy detection system. 397-404 - Alexandre Poirrier
, Laurent Cailleux, Thomas Heide Clausen:
An Interoperable Zero Trust Federated Architecture for Tactical Systems. 405-410 - Johannes F. Loevenich, Philipp Zißner, Paulo H. L. Rettore, Jonas Bode, Tobias Hürten
, Thorsten Lampe, Roberto Rigolin Ferreira Lopes
:
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks. 411-417 - Shahriar Rifat
, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia:
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems. 418-423 - Raffaele Galliera, Mattia Zaccarini
, Alessandro Morelli, Roberto Fronteddu, Filippo Poltronieri
, Niranjan Suri, Mauro Tortonesi
:
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments. 424-429 - Marcel Rieß
, Steffen Moser, Frank Slomka:
Online Reduction of Exploration Space for Automated Underwater Modem Optimization. 430-437 - Md Sarwar Uddin Chowdhury, Murat Yuksel:
In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying Platforms. 438-443 - Riley Gartrell, Ryan Black, Kyle Bush, Mahmudur Khan, James Moscola, Josh Gilbert:
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network. 444-449 - Van Hau Le, Ti Ti Nguyen, Kim Khoa Nguyen, Verdier Assoume, Satinder Singh:
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches. 450-455 - Roy Axford, Jason DuChez:
Increasing the Supportable Number of WGS Users. 456-463 - Zheyu Chen, Kin K. Leung, Shiqiang Wang, Leandros Tassiulas, Kevin S. Chan, Patrick J. Baker:
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation. 464-470 - Emilie Coote, Brian Lachine:
Platform Management System Host-Based Anomaly Detection using TF-IDF and an LSTM Autoencoder. 471-477 - Jiarui Xu, Usama Saeed, Jonathan D. Ashdown, Lingjia Liu:
Online Learning Meets Semantic Communication over Wireless Channels. 478-483 - Iordanis Koutsopoulos:
Learning the Jointly Optimal Routing and Controller Placement Policy in Mobile Software-Defined Networks. 484-490 - Philipp Zißner, Paulo H. L. Rettore, Bruno P. Santos, Roberto Rigolin Ferreira Lopes
, Johannes F. Loevenich, Peter Sevenich:
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN. 491-496 - Bradley R. Smith:
Dominant Network Slices. 497-503 - Dennis Agnew, Alvaro del Aguila, Janise McNair
:
Detection of Cyberattacks in an Software-Defined UAV Relay Network. 504-509 - Clément Leroy, Tarak Arbi, Oudomsack Pierre Pasquero, Benoit Geller:
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption. 510-515 - Damien Roque, Stéphanie Bidon, Charly Poulliat:
DSSS Chip-Wise Faster-than-Nyquist Signaling with DPSK for Robust Carrier Synchronization. 516-521 - Jean-Baptiste Fraisse, Pascal Chevalier, Roland Gautier, François Delaveau, Sylvain Traverso:
Power and second order cyclic covertness of chip-wise Direct Sequence Spread Spectrum Faster-Than-Nyquist signaling. 522-527 - Beatrice Perez, Cesar Arguello
, Timothy J. Pierson, Gregory J. Mazzaro, David Kotz:
Evaluating the practical range of harmonic radar to detect smart electronics. 528-535 - Ryan Guide, Eric Pauley, Yohan Beugin
, Ryan Sheatsley, Patrick D. McDaniel:
Characterizing the Modification Space of Signature IDS Rules. 536-541 - Hamidah Alanazi, Shengping Bi
, Tao Wang, Tao Hou:
Adaptive Feature Engineering via Attention-based LSTM towards High Performance Reconnaissance Attack Detection. 542-547 - Adrian E. Conway, Era Vuksani, Kevin Wright, M. Patrick Collins:
Transient Modeling of Topology-based Worms in Networks with Link Interference. 548-553 - Yifeng Peng, Jingda Yang, Sudhanshu Arya, Ying Wang:
SmiLe Net: A Supervised Graph Embedding-based Machine Learning Approach for NextG Vulnerability Detection. 554-561 - John A. Snoap, Dimitrie C. Popescu, Chad M. Spooner:
Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications. 562-567 - Jungik Jang, Jisung Pyo
, Young-Il Yoon, Sang Yong Seo, Eun Jae Lee, Gyeong Hun Jung, Jaehyuk Choi:
Towards Scalable Automatic Modulation Classification via Meta-Learning. 568-573 - Andreas Andersson, Kristoffer Hägglund, Erik Axell
:
Deep Learning-Based Demodulation in Impulse Noise Channels. 574-579 - Dimitrios Varkatzas, Antonios Argyriou
:
Waveform Manipulation Against DNN-based Modulation Classification Attacks. 580-585 - Tarun S. Cousik, Vijay K. Shah, Jeffrey H. Reed, Harry X. Tran, Rittwik Jana:
Deep Learning based Fast and Accurate Beamforming for Millimeter-Wave Systems. 586-592 - Zhenqiao Cheng, Nanxi Li, Jianchi Zhu, Xiaoming She, Chongjun Ouyang, Peng Chen:
Secure Line-of-Sight Communications: Optimal Antenna Selection and Beamforming Design. 593-598 - Michelle Pirrone, M. Keith Forsyth, Jordan Bernhardt, Daniel Kuester, Aric Sanders, Duncan McGillivray, Adam Wunderlich:
ATIC: Automated Testbed for Interference Testing in Communication Systems. 599-604 - Abhishek Chakraborty, Ramesh R. Rao:
On Reliability of CBRS Communications near U.S. Navy Installations in San Diego. 605-610 - Mark D. Silvius, Mark A. McHenry, Alex Lackpour, Joe Molnar:
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update. 611-616 - Changqing Song, Yuxi Zhou, Hongzhi Zhao, Shihai Shao:
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields. 617-621 - Brandon T. Hunt
, David B. Haab, Hussein Moradi, Behrouz Farhang-Boroujeny
:
A Method of Estimating Sparse and Doubly-Dispersive Channels. 622-628 - Yuejin Ding, Ming Lei, Ming-Min Zhao, Minjian Zhao:
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems with 2D-Clustered Sparsity. 629-634 - Kyle C. Watters, Edward J. Coyle
:
Expected Probability of Radiometric Detection by Channelized Radiometer. 635-642 - Kathleen Yang, Muriel Médard, Ken R. Duffy
:
Separating Interferers from Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol. 643-648 - Sohan Gyawali
, Kamran Sartipi, Benjamin Van Ravesteyn, Jiaqi Huang
, Yili Jiang
:
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks. 649-654 - Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Alvaro Velasquez:
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions. 655-660 - Boning Li, Timofey Efimov
, Abhishek Kumar, Jose Cortes, Gunjan Verma, Ananthram Swami, Santiago Segarra:
Learnable Digital Twin for Efficient Wireless Network Evaluation. 661-666 - Shashank Jere
, Karim A. Said
, Lizhong Zheng, Lingjia Liu:
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing. 667-672 - Pedro Miguel Sánchez Sánchez, Enrique Tomás Martínez Beltrán, Alberto Huertas Celdrán
, Robin Wassink, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield. 673-678 - James Brock, Lauren Provost, Rylee Stone, Stephen Padnos, Stephen Taylor, Jason Dahlstrom:
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries. 679-684 - Mohammad Moltafet, Hamid R. Sadjadpour, Zouheir Rezki:
A Practical Perfect Secrecy Approach for IoBT Systems. 685-690 - Michael Vai, Eric Simpson, Donato Kava, Alice Lee, Huy Nguyen, Jeffrey J. Hughes, Gabriel Torres, Jeffery Lim, Ben Nahill, Roger Khazan, Fred B. Schneider:
Security-as-a-Service for Embedded Systems. 691-695 - Matthew Yudin, Rauf Izmailov:
DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual Signatures. 696-702 - Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov, Alina Oprea:
An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers. 703-709 - Chase Walker, Dominic Simon
, Sumit Kumar Jha, Rickard Ewetz:
Adversarial Pixel and Patch Detection Using Attribution Analysis. 710-715 - Kurt A. Vedros, Constantinos Kolias, Robert C. Ivans:
Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis. 716-721 - Enguang Fan, Anfeng Peng, Matthew Caesar, Jae Kim, Josh D. Eckhardt, Greg Kimberly, Denis Osipychev:
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms. 722-728 - Kevin Joe:
Passive Geolocation of Multiple Pulsed Emitters. 729-734 - Carlos A. Gómez-Vega
, Moe Z. Win, Andrea Conti:
Machine Learning Based Node Selection for UWB Network Localization. 735-740 - Siyuan Li
, Chaopeng Dong, Yongpan Wang, Wenming Liu, Weijie Wang, Hong Li, Hongsong Zhu, Limin Sun:
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries. 741-746 - Qingyu Liu, Chengzhang Li, Y. Thomas Hou
, Wenjing Lou
, Sastry Kompella:
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality. 747-754 - Zhuoxuan Ju, Milos Doroslovacki:
Urgency of Information Optimization at Query in an Interactive System. 755-760 - Stefan Tschimben
, Isabella Bates, James H. Curry, Keith D. Gremban, Alexandra Siegel:
Modeling and Generation of Realistic Network Activity. 761-766 - Mine Gokce Dogan, Martina Cardone
, Christina Fragouli:
Low-Delay Proactive Mechanisms for Resilient Communication. 767-772 - Robert Starr, Matt Steele, Jonathon Cheah:
An Approach to Tactical Network Performance Analysis with In-Band Network Telemetry and Programmable Data Planes. 773-778 - Ioannis Fourfouris, Merkouris Karaliopoulos, Dimitrios Kafetzis, Georgios Vardoulias, Apostolos Georgiadis, Spyridon Vassilaras, Iordanis Koutsopoulos:
Revisiting the OLSRv2 Protocol Optimization in SDN-enabled Tactical MANETs. 779-786 - Do Dang, Kim Khoa Nguyen, Verdier Assoume, Satinder Singh:
Efficient Link-State Multicast Routing by Optimizing Link-Weight with MARL. 787-792 - Sean Ha, Gavin Smith, Robert Starr:
Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception with Data Plane Programming and P4. 793-798 - Vijitha Weerackody, Sumit Roy, Kent Benson, Eric Yang:
Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches. 799-806 - Samantha Gamboa, Aziza Ben Mosbah
, Wesley Garey, Chunmei Liu
, Richard Rouil:
System-Level Evaluation of 5G NR UE-Based Relays. 807-814 - Yalin E. Sagduyu, Tugba Erpek, Yi Shi:
Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution. 815-820 - Mingli Yu, Quinn K. Burke, Thomas La Porta, Patrick D. McDaniel:
mMLSnet: Multilevel Security Network with Mobility. 821-826 - Sanaz Naderi, Dimitris A. Pados, George Sklivanitis, Elizabeth Serena Bentley, Joseph Suprenant, Michael J. Medley:
Dynamic Interference-Avoiding MIMO Links. 827-832 - Ahmed Maksud
, Yingbo Hua:
Second-Order Analysis of Secret-Key Capacity From a MIMO Channel. 833-838 - Tarence Rice, Divyanshu Pandey
, David Ramirez, Edward W. Knightly:
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO. 839-844 - Zhenqiao Cheng, Nanxi Li, Jianchi Zhu, Xiaoming She, Chongjun Ouyang, Peng Chen:
Secure Beamforming in DLA-Based CAP-MIMO. 845-851 - Alphan Sahin, Xiaofeng Wang:
Majority Vote Computation With Complementary Sequences for Distributed UAV Guidance. 852-857 - Shuming Yi, Fei Wang, Xi Zhang:
Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks. 858-863 - Xiaolei Guo, Shunliang Zhang:
On the secrecy performance of aerial IRS-assisted wireless communications. 864-869 - Piyush Nikam, Dhruv Shah, Aryan Sahu, Neena Goveas, Sreejith Vidhyadharan:
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework. 870-875 - Wenyi Tang, Taeho Jung, E. Paul Ratazzi:
TISIN: Traceable Information Sharing in Intermittent Networks. 876-881 - Olena Tkachenko, Sean Harding, Cleon Anderson, Jake B. Perazzone, Matthew Dwyer, Kevin S. Chan:
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments. 888-893 - Juan David Pabon, Matthew C. Valenti, Xi Yu:
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement. 894-900 - Song Ma, Xiaonan Chen, Jingzhou Wang, Jun Wang, Xueying Li, Shengtang Zhou, Yading Chen, Qihang Peng:
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach. 901-906 - Maya E. Flores, Thomas Stahlbuhk, Alexander M. Wyglinski:
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency. 907-912 - John N. Spitzmiller:
Tradespace Performance Study of Polarization-Insensitive Spatial Filtering for Jamming Suppression. 913-918 - Zhengguang Zhang
, Marwan Krunz
:
Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine Learning. 919-924 - Jason Hussey, Kerri Stone, Tracy Camp:
Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications. 925-930 - Scott Kuzdeba, Josh Robinson:
A Conditional Analysis of RF ML Latent Features. 931-936 - Andrew Fryer, Thomas Dean, Brian Lachine:
Input Output Grammar Coverage in Fuzzing. 937-943 - Sumit Kumar Jha, Susmit Jha, Patrick Lincoln, Nathaniel D. Bastian, Alvaro Velasquez, Rickard Ewetz, Sandeep Neema:
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving. 944-949 - Megan O. Moore, R. Michael Buehrer, William C. Headley:
Time-Diverse Doppler-only LEO PNT. 950-956 - Byeongheon Lee, Ju-Hyung Lee, Young-Chai Ko:
Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System. 957-962 - Mahfuzur Rahman
, Md. Zoheb Hassan, Jeffrey H. Reed, Lingjia Liu:
Non-Terrestrial Network (NTN): a Novel Alternate Fractional Programming for the Downlink Channels Power Allocation. 963-968

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.