Program for 2018 IEEE Military Communications Conference (MILCOM)
Monday, October 29
Monday, October 29 8:00 - 12:00
Geolocation enhanced mobile communication networks
- Geolocation enhanced mobile communication networks
Systematic Exploration of Critical Software for Catastrophic Cyber-Physical Malware
- Systematic Exploration of Critical Software for Catastrophic Cyber-Physical Malware
Monday, October 29 9:40 - 12:00
BDML1: Machine Learning for PHY Layer (I)
- Long Short-term Memory for Radio Frequency Spectral Prediction and Its Real-time FPGA Implementation
- Band Assignment in Dual Band Systems: A Learning-based Approach
- Reinforcement Learning for Quality of Experience Optimization in Tactical Networks
- 15-min session break
- Hierarchical Modulation Classification Using Deep Learning
- Clustering Learned CNN Features from Raw I/Q Data for Emitter Identification
Monday, October 29 9:40 - 10:55
BDML2: Robust Machine Learning
Monday, October 29 9:40 - 12:00
CSTC1: Network Security Technology
- Resolving Access Conflicts: An Auction-based Incentive Approach
- Fast and Accurate Typosquatting Domains Evaluation with Siamese Networks
- P4Guard: Designing P4 Based Firewall
- 15-min session break
- A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs
- Characterizing the Effectiveness of Network-based Intrusion Detection Systems
CSTC2: Network Protocol Security
- Secure Neighbor Discovery Using Symmetric Link Management in Tactical Sensor Networks
- Efficient Interconnectivity Among Networks Under Security Constraint
- Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs
- 15-min session break
- Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models
- On Defensive Cyber Deception: A Case Study Using SDN
Monday, October 29 9:40 - 11:20
NPP1: Multipoint Communication
- ECHO: Efficient Zero-Control Network-wide Broadcast for Mobile Multi-hop Wireless Networks
- Impact of Header Compression on Tactical Networks
- Fountain-Coded Multicast in Tactical Packet Radio Networks: Throughput Improvements Provided by Relay Nodes
- Experimental Evaluation of Group Communications Protocols for Tactical Data Dissemination
Monday, October 29 9:40 - 12:00
SYS1: Reliable Communication
- Tactical Communication Link Under Joint Jamming and Interception by Same-Frequency Simultaneous Transmit and Receive Radio
- Analysis of Spectrum Allocation to Support Mobile Ad-hoc Networks in Contested Environments
- Performance Metrics for Cognitive Electronic Warfare - Electronic Support Measures
- 15-min session break
- Routing, Network Coding and TCP Support for Wideband HF Communications
- Utilization of Inter-Block Interference in MIMO-OFDM Communication Systems
WSP1: Wireless Channel Measurements and Modeling
- Modeling of Highly Non-Stationary Low Altitude Aircraft-to-Aircraft Channels
- Antenna Radiation Pattern Compressive Sensing
- The Impact of Correlated Blocking on Millimeter-Wave Personal Networks
- 15-min session break
- Frequency Correlation Modelling for Tactical VHF Channels in Mountainous Terrain
- Joint Characterization of mm-Wave and cm-Wave Device-to-Device MIMO Channels
Monday, October 29 13:00 - 17:00
Navigating Through the Maze of Digital Communication Options in the 21st Century
- Navigating Through the Maze of Digital Communication Options in the 21st Century
Towards a Data-Centric Battlefield: Applications of Named Data Networks in Tactical Networks
- Towards a Data-Centric Battlefield: Applications of Named Data Networks in Tactical Networks
Monday, October 29 14:00 - 15:15
BDML1: Machine Learning for PHY Layer (II)
Monday, October 29 14:00 - 17:00
CSTC3: Cyber Attack and Countermeasure I
- TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets
- Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails
- A Platform Service for Remote Integrity Measurement and Attestation
- 30-min session break
- Capacity of Deliberate Side-Channels Created by Software Activities
- Towards Practical Protection of Data Access Pattern to Cloud Storage
- Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks
Monday, October 29 14:00 - 16:35
NPP2: Routing, Topology Management, and Localization
- Loop-Free Integrated Forwarding and Routing with Gradients
- ASAP: Preventing Starvation in Backpressure Forwarding
- A Reinforcement Learning Approach to Adaptive Redundancy for Routing in Tactical Networks
- 30-min session break
- Topology Algorithm Enhancements for Aerial High Capacity Directional Networks
- Through-the-Body Localization of Implanted Biochip in Wearable Nano-Biosensing Networks
Monday, October 29 14:00 - 17:00
SYS2: RF Systems and Technologies
- Signal Combination Techniques to Improve Long Range Communication with Multiple Relays
- Outage Probability and Constrained Capacity of Moderate-Length Codes for Gaussian Mixture over AWGN Channel
- Communications Performance Based Specification of Phase Noise for SATCOM Systems
- 30-min session break
- Nonlinear Co-site Interference Measurement
- Design and Performance Evaluation of High-Capacity Mobile Troposcatter Links Under Mobility, Frequency Selectivity, and Antenna Pointing Errors
- Multi-Carrier Envelope Tracking Power Amplifier
WSP2: LPI, LPD, and Secure Communications
- On Jammer Power Allocation Against OFDM Signals in Fading Channels
- Distortion Filtering for Communications Localization Denial
- Chirp Spread Spectrum Performance in Low Probability of Intercept Theater
- 30-min session break
- Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability
- Analysis of Pilot-Spoofing Attack in MISO-OFDM System over Correlated Fading Channel
- Low Probability of Exploitation Waveform Design Using Barankin Bound Formulation
WSP3: Modulation and Coding
- Precoding for Non-coherent Detection of Continuous Phase Modulations
- Broadband IP over SATCOM Networking for Rotary Wing Aircraft
- Very Short Channel Codes for Burst-Type Transmissions
- 30-min session break
- High Bandwidth Electrically Small Antennas Through BFSK Direct Antenna Modulation
- A Receiver for Multicarrier Logarithmic Warped Frequency Domain Code Waveforms
- Machine Learning Based Featureless Signalling
Monday, October 29 15:45 - 17:00
BDML3: Machine Learning for Network Analysis
Tuesday, October 30
Tuesday, October 30 8:00 - 12:00
Intelligent Learning Algorithms and their Applications to Communications and Networking
- Intelligent Learning Algorithms and their Applications to Communications and Networking
LTE and 5G protocol security procedures and vulnerability analyses using software radio testbeds
- LTE and 5G protocol security procedures and vulnerability analyses using software radio testbeds
Tuesday, October 30 9:40 - 11:20
BDML4: Adversarial Machine Learning for Tactical Networks (I)
Tuesday, October 30 9:40 - 12:00
CSTC4: Cyber Operation
- On Detecting Manifestation of Adversary Characteristics
- Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations
- Wargaming a Closed National Network:What are You Willing to Sacrifice?
- 15-min session break
- Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth
- Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example
Tuesday, October 30 9:40 - 11:20
NPP3: Support for Delay-Sensitive Applications
- Age of Information for Queues in Tandem
- On the Design of Resource Allocation Algorithms for Low-Latency Video Analytics
- Latency-Aware Forwarding for IRON: Latency Support for Back-Pressure Forwarding
- Hierarchical-Caching Based Statistical QoS Provisioning over 5G Multimedia Big-Data Mobile Wireless Networks
Tuesday, October 30 9:40 - 12:00
SYS3: Use of Commercial Technology
- Autonomous, Cooperative UAV Operations Using COTS Consumer Drones and Custom Ground Control Station
- Emulation of Large-Scale LTE Networks in NS-3 and CORE: A Distributed Approach
- Adaptive Link Optimization for 802.11 UAV Uplink Using a Reconfigurable Antenna
- 15-min session break
- LTE Uplink Interference Mitigation Features
- Enhancing Service Availability of LTE-in-a-Box Systems Using 3GPP-Compliant Strategies
WSP4: MIMO
- Capacity Analysis and Bit Allocation Design for Variable-Resolution ADCs in Massive MIMO
- Performance Analysis for MIMO HF Communications with Dominant Galactic Noise
- Dimension-optimized Two-stage Precoder Design for Massive MIMO Systems with Limited Feedback
- 15-min session break
- A Noise-Masking Physical Layer Security Technique for MIMO Communications Systems
- A Coded MIMO Spatial Multiplexing Approach with Low-Complexity Matched-Filter Detector and CRC-Assisted Interference Cancellation
Tuesday, October 30 13:00 - 17:00
Cyber Resiliency Engineering in Practice: Challenges and Lessons-Learned
- Cyber Resiliency Engineering in Practice: Challenges and Lessons-Learned
Software Defined Networking for Military Networks
- Software Defined Networking for Military Networks
Tuesday, October 30 14:00 - 15:15
BDML4: Adversarial Machine Learning for Tactical Networks (II)
Tuesday, October 30 14:00 - 17:00
CSTC5: Machine Learning and Block Chain Technologies for Security
- Machine Learning Based DDos Detection Through NetFlow Analysis
- Robust Neural Malware Detection Models for Emulation Sequence Learning
- DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-based Network Traffic
- 30-min session break
- SOTA: Secure Over-the-Air Programming of IoT Devices
- Blockchain-Empowered Secure Internet-of-Battlefield Things (IoBT) Architecture
- Secure Communications Using Blockchain Technology
NPP4: Named Data Networking
- A Brief Introduction to Named Data Networking
- A Brief Introduction to NDN Dataset Synchronization (NDN Sync)
- Publish/Subscribe Versus a Content-Based Approach for Information Dissemination
- 30-min session break
- NAC: Automating Access Control via Named Data
- Enabling a Data-Centric Battlefield Through Information Access Gateways
- NDN Impact on Tactical Application Development
SYS4: NATO Special Session
- Tactical Router Interoperability: Concepts and Experiments
- Secure Multi-domain Information Sharing in Tactical Networks
- Enabling XEP-0258 Security Labels in XMPP
- 30-min session break
- Does NATO Need a Blockchain
- Functional Analysis of Cyberspace Operations
- DCIS CUBE: Defining Architecture Building Blocks for Next Generation Deployable IT Systems
WSP5: Filterbank Multcarrier Techniques
- Time Synchronization Sequence with Weighted Conjugate Symmetry Property for FBMC-OQAM Systems
- RAKE Receiver for HF Filter Bank Multicarrier Spread Spectrum Systems
- Efficient Multirate Filter Bank Structure with Full Spectral Utilization for Multicarrier Communications
- 30-min session break
- Filter Bank Multi-Carrier Spread Spectrum with Biorthogonal Signaling for High Speed Data Transmission Through HF Skywave Channels
- PAPR Analysis for Dual-Polarization FBMC
- Experimental Comparison of FB-MC-SS and DS-SS in HF Channels
Tuesday, October 30 15:45 - 17:00
BDML5: Machine Learning for Social Networks
Wednesday, October 31
Wednesday, October 31 8:00 - 12:00
How to Synchronize Carrier and Timing Loops in Digital Modems
- How to Synchronize Carrier and Timing Loops in Digital Modems
Wednesday, October 31 9:40 - 12:00
BDML6: Internet of Battledfield Things (IoBT)(I)
- The Internet of Battlefield Things: The Next Generation of Command, Control, Communications and Intelligence (C3I) Decision-Making
- On Tracking Realistic Targets in a Megacity with Contested Domain Access
- Investigating LoRa for the Internet of Battlefield Things: A Cyber Perspective
- 15-min session break
- Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force Environment
- Radio Frequency IoT Sensors in Military Operations in a Smart City
CSTC6: Data Security Research
- Runtime State Verification on Resource-Constrained Platforms
- Sharing Susceptible Passwords as Cyber Threat Intelligence Feed
- Secure Proxy-Reencryption-based Inter-network Key Exchange
- 15-min session break
- An Empirical Upper Bound on Secrecy Capacity of Multipath Fading Channels
- Secrecy Performance of a Relaying System over Non-identical Fading Channels
NPP5: Performance Enhancement and Analysis for Tactical Communications
- Distributed Coherent Group Communications
- Inter-Network Interference in Synchronized Cooperative Broadcast Systems
- Socio-spatial Resource Management in Wireless Powered Public Safety Networks
- 15-min session break
- The Effects of a UAV on a Terrestrial MANET
- Emulating Wireless Networks with High Fidelity RF Interference Modeling
SYS5: Satcom
- Spatial Modulation for Improved Eavesdropping Resistance in Multi-Beam Satellite Downlinks
- Synchronous Waveform Clock Synchronization Without a System Controller
- Passive Channel Orthogonality Measurement Technique for MIMO SATCOM
- 15-min session break
- Resilient Satellite Communications with Autonomous Multi-Modem Adapter
- Satellite Downlink Jamming Propagation Measurements at Ku-Band
Wednesday, October 31 9:40 - 10:55
WSP6: Spectrum Sensing
Wednesday, October 31 9:40 - 12:00
WSP7: Signal Processing for Communications (A)
- On the Performance of Single-Channel Source Separation of Two Co-Frequency PSK Signals with Carrier Frequency Offsets
- Doubly-Selective Channel Estimation for Continuous Phase Modulation
- A Multi-branch Linear Amplification with Nonlinear Components Technique
- 15-min session break
- RF Photonic Equalization Using Stimulated Brillouin Scattering
- Frequency Estimation for Burst Communication Based on Irregular Repetition of Data Symbols
Wednesday, October 31 13:00 - 17:00
Resilient and Scalable Interactive Learning
- Resilient and Scalable Interactive Learning
Wednesday, October 31 14:00 - 15:15
BDML6: Internet of Battledfield Things (IoBT)(II)
Wednesday, October 31 14:00 - 17:00
CSTC7: Cyber Attack and Countermeasure II
- Multi-Stage Attack Detection Using Contextual Information
- OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework
- Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal Logic
- 30-min session break
- PatchSweetner: Exploit Detection Through the Automatic Transformation of Security Patches
- Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
- Latte: Large-Scale Lateral Movement Detection
CSTC8: Information Security
- Attribute Based Encryption for Information Sharing on Tactical Mobile Networks
- Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm
- Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones
- 30-min session break
- Achieving Perfect Secrecy with One Bit Keys
- Array-Based Statistical Analysis of the MK-3 Authenticated Encryption Scheme
- A New Lightweight Two-Party Key Agreement Protocol Defined on Underdetermined Systems of Polynomial Equations for Probable Security
Wednesday, October 31 14:00 - 15:40
NPP6: Software Defined Networking
Wednesday, October 31 14:00 - 16:35
SYS6: Algorithms and Implementations
- CHIL: Common-modem Hardware Integrated Library
- Enhancing the Common-modem Hardware Integrated Library (CHIL) Framework
- Towards Rapid Waveform Design and Deployment via Modular Signal Processing Frameworks
- 30-min session break
- Image Classification on the Edge for Fast Multi-Camera Object Tracking
- State Estimation for Tactical Networks: Challenges and Approaches
Wednesday, October 31 14:00 - 15:40
WSP8: Signal Processing for Communications (B)
- On Cooperative Broadcast in MANETs with Imperfect Clock Synchronization
- How to Introduce a Narrowband IoT Solution to an Existing Wireless Communications System
- Power Optimization for Energy Efficient Wireless Communications Using Hybrid-ARQ
- Normalized Matched Filter for Blind Interference Suppression