| Author |
Session |
Start page |
Title |
| A A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Abdel Nour, Charbel |
MILCOM 2021 Track 1: MC1.2 |
7 |
Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes |
| Abdelzaher, Tarek |
IoBT-1.1 |
777 |
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification |
| IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
| IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
| Abdou, Ahmed |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
| Acosta, Jaime |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
| Adams, Paul |
NATO2.2 |
366 |
Adopting a Dynamic Spectrum Management Philosophy in NATO |
| Adamson, Brian |
NPP2.3 |
175 |
Multicast Enhancements to Event-Driven Tactical Networking |
| Afanasyev, Alexander |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
| NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
| Afroze, Zeenat |
PCM1.1 |
402 |
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions |
| Ahmed, Ejaz |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
| Ahmed, Shakil |
NPP3.3 |
297 |
Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT Devices |
| Ahn, Jin-Hyun |
ML-OPT.3 |
515 |
Gradient Compression via Count-Sketch for Analog Federated Learning |
| Ai, Bo |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
| Alberth, William |
MIMO.2 |
607 |
Massive MIMO Review and 12 GHz Opportunity |
| Alghazo, Jaafar |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
| Amin, Rahul |
NPP2.2 |
169 |
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System |
| Anderson, Christopher |
PCM1.4 |
420 |
Improving Propagation Model Predictions via Machine Learning With Engineered Features |
| Anderson, Robert |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Anevlavis, Tzanis |
IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
| Annavaram, Murali |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
| Arabian, Farah |
PCM2.1 |
544 |
Polarization Combining and Equalization for Aeronautical Mobile Telemetry |
| Arasu, Krishnasamy |
IoBT-1.2 |
783 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications |
| Arbi, Tarak |
AJC.4 |
670 |
Direct-Sequence Spread Spectrum With Signal Space Diversity for High Resistance to Jamming |
| Aschenbruck, Nils |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
| Ashdown, Jonathan |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
| COMM.4 |
354 |
All-Domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing With Implemented Dynamic Spectrum Access Toolchain |
| Atighetchi, Michael |
CSTC-1.2 |
55 |
Using Distributed Ledgers for Command and Control - Concepts and Challenges |
| Aubry, Augusto |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
| Avestimehr, Salman |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
| Axford, Roy |
SATCOM-1.2 |
77 |
Margin and Availability in Transponded SATCOM |
| B A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Badi, Mahmoud |
PCM2.3 |
556 |
Measurement-Based Characterization of Human Body Impact on Ultra-Low UAV-To-Ground Channels |
| Baker, Patrick |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
| Bandara, Eranga |
CSTC-4.4 |
470 |
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform |
| Barry, John |
SPAC2.1 |
378 |
Direct-Sequence Spread-Spectrum Acquisition for High Dynamic Environments via Signal Partitioning |
| Barz, Christoph |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
| Bastiaansen, Harrie |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
| Bastian, Nathaniel |
IoBT-3.3 |
1011 |
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models |
| Bastos, Luis |
NATO2.2 |
366 |
Adopting a Dynamic Spectrum Management Philosophy in NATO |
| NATO2.3 |
372 |
Protected Core Networking: Communications Challenges in Tactical Environments |
| Basu, Samyadeep |
AML-2.1 |
981 |
Privacy Leakage Avoidance With Switching Ensembles |
| Bauer, Kevin |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
| Becker, Albert |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
| Benchaaboun, Sanae |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
| Berg, Albert |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Beugin, Yohan |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
| Beytur, Hasan Burhan |
NPP3.2 |
291 |
RF-Based Network Inference: Theoretical Foundations |
| Bharadwaj, Ramesh |
NPP1.4 |
43 |
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network |
| Birman, Ken |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
| Blasco, Ruben |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
| Block, Frederick |
MC1.4 |
19 |
Low-Rate FEC for M-Ary Orthogonal Modulation |
| MC2.1 |
145 |
Capacity Bounds for Frequency-Hopped BPSK |
| Bohannon, Addison |
ML-12.4 |
771 |
A Reinforcement Learning Approach for Scheduling in mmWave Networks |
| Bolas, Eduardo |
NATO2.3 |
372 |
Protected Core Networking: Communications Challenges in Tactical Environments |
| Bollmann, Chad |
CSTC-4.1 |
451 |
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols |
| Bosler, Clay |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
| Bowers, Caleb |
NPP2.3 |
175 |
Multicast Enhancements to Event-Driven Tactical Networking |
| NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
| NPP7.2 |
830 |
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node |
| Braca, Paolo |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
| NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
| Brambilla, Mattia |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
| Breedy, Maggie R |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Bretmersky, Steven |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
| Breton, Daniel |
PCM1.2 |
408 |
Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain |
| Brown, Eric |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
| Brueck, Nadine |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
| Brunnenmeyer, David |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
| SATCOM-1.4 |
91 |
Flexible Network Interface (FNI): A Mission-Centric Integration Framework for Next Generation DoD SATCOM Networks |
| Buckley, Richard |
ML-CH.2 |
623 |
Application of Machine Learning Techniques to HF Propagation Prediction |
| Buehrer, R. Michael |
MIMO.3 |
612 |
Multi-Target Localization Using Polarization Sensitive Arrays |
| ML-12.2 |
757 |
Open Set Wireless Standard Classification Using Convolutional Neural Networks |
| LT.1 |
963 |
Waveform Selection for Radar Tracking in Target Channels With Memory via Universal Learning |
| Bunton, Jonathan |
IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
| C A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Caceres, Ivan |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
| Camp, Joseph |
PCM2.3 |
556 |
Measurement-Based Characterization of Human Body Impact on Ultra-Low UAV-To-Ground Channels |
| Campioni, Lorenzo |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Canestrare, David |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Cao, Lei |
CDC.2 |
951 |
Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection Networks |
| Cao, Pan |
NLaN-1.1 |
521 |
Asynchronous Integration of Communication and Localization Systems Using IR-UWB Signals |
| Capela, Germano |
NATO2.2 |
366 |
Adopting a Dynamic Spectrum Management Philosophy in NATO |
| NATO2.3 |
372 |
Protected Core Networking: Communications Challenges in Tactical Environments |
| Carter, James |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Carutasu, Diana |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
| Castanares, Anthony |
NWK-1.3 |
489 |
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks |
| Chache, Frederick |
NPP1.4 |
43 |
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network |
| Chadha, Ritu |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
| Chan, Kevin |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
| Chandrasekaran, Shiv |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
| CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
| Chatzigeorgiou, Ioannis |
MC1.1 |
1 |
Spark Optimization of Linear Codes for Reliable Data Delivery by Relay Drones |
| Cheah, Jonathon |
SPAC1.4 |
139 |
Phase Noise Time Series Model |
| Chen, Songqing |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
| Chen, Xiaofei |
SPAC1.2 |
127 |
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers |
| Chen, Zheyu |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
| Cheng, Zihang |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
| Chikkagoudar, Satish |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
| CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
| Chin, Peter |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Choi, Joongsub |
MIMO.2 |
267 |
Joint Beamforming Design for LOS MIMO Systems With Multiple Intelligent Reflecting Surfaces |
| Chowdhury, Arindam |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
| Chu, Derrick |
SPAC2.1 |
378 |
Direct-Sequence Spread-Spectrum Acquisition for High Dynamic Environments via Signal Partitioning |
| Chugg, Keith |
SPAC1.1 |
121 |
Analysis of the Average Sampling Frequency for Level Crossing Analog-To-Digital Converters |
| Cichocki, Andrzej |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
| Clark, Michael |
IoBT-1.2 |
783 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications |
| Clark, Richard |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Clark, William |
SPAC2.2 |
384 |
Quantifying Dataset Quality in Radio Frequency Machine Learning |
| Clarke, Luisana |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
| Cohen, Alejandro |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
| Conan, Vania |
NPP4.4 |
445 |
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links |
| Consul, Shorya |
NPP3.2 |
291 |
RF-Based Network Inference: Theoretical Foundations |
| Conti, Andrea |
NLaN-1.4 |
538 |
A Statistical Range Information Model With Application to UWB Localization |
| Corradi, Antonio |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
| Correia, Jeffery |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
| Corwin, Paul |
5G.1 |
727 |
Operational Views of Vertical Tactical 5G |
| 5G.2 |
733 |
Hiding the RF Signal Signature in Tactical 5G |
| Cousik, Tarun |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
| Cowles, Donald |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
| Cramer, Eelco |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Cuevas, Enrique |
COMM.1 |
335 |
Methodologies for Spectrum Sharing for a Network of Land-ESIMs With Stations in the Mobile Service |
| D A B C D E F G H I J K L M N O P R S T V W X Y Z |
| D'Oliveira, Rafael |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
| Dagres, Ioannis |
CDC.3 |
957 |
Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler Spread |
| Das, Subhro |
IoBT-1.4 |
795 |
On Multisensor Activation Policies for Bernoulli Tracking |
| Daughety, Nathan |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
| De Lucia, Michael |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
| De Maio, Antonio |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
| de Veciana, Gustavo |
NPP3.2 |
291 |
RF-Based Network Inference: Theoretical Foundations |
| Decleene, Brian |
NPP1.1 |
25 |
Wireless Resilient Routing Reconfiguration |
| Deepti, Chilaka |
MIMO.1 |
601 |
Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO Radars |
| Defrancesco, Dana |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| den Boer, Hans |
ML-12.1 |
751 |
FPGA-Based Deep Learning Accelerator for RF Applications |
| Denney, Kyle |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Dinis, Rui |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
| Ditzler, Gregory |
AML-2.2 |
987 |
Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared Spectrum |
| Do, Emily |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Dogan, Mine |
ML-12.4 |
771 |
A Reinforcement Learning Approach for Scheduling in mmWave Networks |
| Doherty, John |
SPAC1.3 |
133 |
Wideband Auto_Ambiguity Function Nulling Algorithm |
| Doucette, Cody |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Draxler, Paul |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
| Dye, Hudson |
PCM1.1 |
402 |
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions |
| E A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Eddy, Wesley |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
| Ekici, Eylem |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
| Elbadry, Mohammed |
NPP2.1 |
162 |
Unifying Address and Name Based Communication in Wireless Medium Access Control |
| Elliott, Ronald |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Ellis, Jason |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
| Elmasry, George |
5G.1 |
727 |
Operational Views of Vertical Tactical 5G |
| 5G.2 |
733 |
Hiding the RF Signal Signature in Tactical 5G |
| Encarnado, Florendo |
PCM2.2 |
550 |
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel |
| England, Paul |
CSTC-2.1 |
181 |
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance |
| Ephremides, Anthony |
NPP3.4 |
303 |
The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and Tradeoffs |
| Erpek, Tugba |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
| Erricolo, Danilo |
MIMO.2 |
607 |
Massive MIMO Review and 12 GHz Opportunity |
| Evancich, Nicholas |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Ezzeldin, Yahya |
ML-12.4 |
771 |
A Reinforcement Learning Approach for Scheduling in mmWave Networks |
| F A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Fadul, Mohamed |
IoBT-1.2 |
783 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications |
| Fan, Jian |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
| Fang, Shiwei |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
| Farhang-Boroujeny, Behrouz |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
| Farris, Steven |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
| Feng, Pengbin |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
| Fevold, Jerediah |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
| Flavell, Paul |
NATO2.2 |
366 |
Adopting a Dynamic Spectrum Management Philosophy in NATO |
| Flint, Christopher |
PCM2.2 |
550 |
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel |
| Fogli, Mattia |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
| Foschini, Luca |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
| Fowkes, Laurence |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
| Fragouli, Christina |
ML-12.4 |
771 |
A Reinforcement Learning Approach for Scheduling in mmWave Networks |
| IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
| Franco, John |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
| Freeberg, Connor |
5G.3 |
739 |
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems |
| Frey, Caleb |
NWK-1.2 |
482 |
Analysis of Time-Sensitive MANET Channel Allocation in Contested Environments |
| Fronterhouse, Don |
SATCOM-1.4 |
91 |
Flexible Network Interface (FNI): A Mission-Centric Integration Framework for Next Generation DoD SATCOM Networks |
| Fuchs, Christoph |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
| Furman, Sean |
COMM.4 |
354 |
All-Domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing With Implemented Dynamic Spectrum Access Toolchain |
| Furman, William |
ML-CH.2 |
623 |
Application of Machine Learning Techniques to HF Propagation Prediction |
| G A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Gabrielson, Anthony |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
| Gaglione, Domenico |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
| NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
| Galvan, Julio |
CSTC-5.2 |
589 |
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach |
| Ganesan, Deepak |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
| Garcia Lazo, Edir |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
| Geck, Frank |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
| Geller, Benoît |
AJC.4 |
670 |
Direct-Sequence Spread Spectrum With Signal Space Diversity for High Resistance to Jamming |
| Giridhar, K |
MIMO.1 |
601 |
Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO Radars |
| NWK-2.2 |
868 |
Mitigating Blockage of Transmission and Reception Due to Rotor Blades in Air-To-Air Data Link Using Single-Carrier Block Modulation |
| Gkelias, Athanasios |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
| Gluck, Jonathan |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
| Gómez-Vega, Carlos |
NLaN-1.4 |
538 |
A Statistical Range Information Model With Application to UWB Localization |
| Gosselin, Jordan |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
| Gou, Gaopeng |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
| Green, Daniel |
SPAC2.4 |
396 |
Pulsed Signal Detection Utilizing Wavelet Analysis With a Deep Learning Approach |
| Greenwald, Lloyd |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
| Gregris, Jessica |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Grönkvist, Jimmi |
NPP6.4 |
696 |
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks |
| Guan, Yangyang |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
| Guerreiro, João |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
| Guo, Katherine |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
| Gururajan, Arun |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
| H A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Ha, Sean |
NPP5.3 |
577 |
Using NDN and P4 for Effective Traffic Management in Tactical Networks |
| Haab, David |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
| Haedrich, Caitlin |
PCM1.2 |
408 |
Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain |
| Hall, Donald |
LT.2 |
969 |
Conditional Rician K-Factor Discrimination for Indoor Localization via AOA Estimation |
| Hamilton, Stephen |
AART.2 |
808 |
Silent Tuning |
| Hansson, Anders |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Haq, A F M Saniul |
AART.4 |
818 |
Defocal Lens Assembly for Multi-Element Full-Duplex Free Space Optical Transceiver |
| Harris, Frederic |
SPAC1.2 |
127 |
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers |
| He, Ruisi |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
| Heath, Robert |
NWK-2.1 |
861 |
Optimization of a Millimeter-Wave UAV-To-Ground Network in Urban Deployments |
| Hemida, Ahmed |
IoBT-3.2 |
1005 |
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems |
| Henney, Justin |
NPP8.1 |
927 |
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here! |
| Henry, Nathaniel |
SPAC1.3 |
133 |
Wideband Auto_Ambiguity Function Nulling Algorithm |
| Hernandez Jimenez, Jarilyn |
CSTC-5.1 |
583 |
Detection of Anomalous Zigbee Transmissions Using Machine Learning |
| Hershberger, Donald |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Hoffman, Karla |
NWK-1.2 |
482 |
Analysis of Time-Sensitive MANET Channel Allocation in Contested Environments |
| Holschuh, Tom |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
| Hong, Hope |
CSTC-5.1 |
583 |
Detection of Anomalous Zigbee Transmissions Using Machine Learning |
| Howard, William |
MIMO.3 |
612 |
Multi-Target Localization Using Polarization Sensitive Arrays |
| Hriba, Enass |
NWK-2.1 |
861 |
Optimization of a Millimeter-Wave UAV-To-Ground Network in Urban Deployments |
| Hu, Yi |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
| Hua, Yingbo |
CC.1 |
910 |
Anti-Eavesdropping Channel Estimation Using Multi-Antenna Half-Duplex Radios |
| Huang, Chen |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
| Huang, Jin |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
| Hughes, Jeffery |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Hunt, Brandon |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
| Huntsman, Steve |
NPP1.1 |
25 |
Wireless Resilient Routing Reconfiguration |
| Hunziker, James |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
| Hussain, Ahmed |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
| Hyatt, John |
ML-CH.1 |
618 |
Convolutional Neural Networks for Radio Frequency Ray Tracing |
| I A B C D E F G H I J K L M N O P R S T V W X Y Z |
| I. Zakir Ahmed, Fnu |
DRASM.1 |
243 |
Constrained Resource Allocation Problems in Communications: An Information-Assisted Approach |
| Izmailov, Rauf |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
| AML-1.2 |
880 |
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks |
| AML-2.1 |
981 |
Privacy Leakage Avoidance With Switching Ensembles |
| J A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Jabbari, Bijan |
NPP3.1 |
285 |
On Wireless Link Connectivity for Resilient Multi-Hop Networks |
| Jacobsen, Rune |
CSTC-3.2 |
316 |
Security Threats Analysis of the Unmanned Aerial Vehicle System |
| Jagannath, Anu |
NPP8.1 |
927 |
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here! |
| Jagannath, Jithin |
NPP8.1 |
927 |
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here! |
| Jajodia, Sushil |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
| Janin, Elie |
CDC.1 |
945 |
Distributed Dynamic Channel Assignment in Military Ad Hoc Networks Within the MAENA Project: New Algorithm and High Fidelity Simulation Results |
| Jayasumana, Anura |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
| Jenkins, David |
SPAC1.3 |
133 |
Wideband Auto_Ambiguity Function Nulling Algorithm |
| Jenkins, David |
LT.2 |
969 |
Conditional Rician K-Factor Discrimination for Indoor Localization via AOA Estimation |
| Ji, Mengkun |
SPAC1.1 |
121 |
Analysis of the Average Sampling Frequency for Level Crossing Analog-To-Digital Converters |
| Johnson, William |
ML-EDGE.1 |
96 |
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification |
| Joo, William |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Jorgensen, Erik |
CSTC-7.3 |
855 |
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms |
| K A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Kalashian, Brandon |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| COMM.3 |
347 |
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge |
| Kam, Clement |
NPP3.4 |
303 |
The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and Tradeoffs |
| NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
| NPP7.2 |
830 |
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node |
| Kamal, Ahmed |
NPP3.3 |
297 |
Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT Devices |
| Kamhoua, Charles |
NWK-1.3 |
489 |
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks |
| IoBT-3.2 |
1005 |
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems |
| Kaminsky, Alan |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
| Kane, Kevin |
CSTC-2.1 |
181 |
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance |
| Kang, Joonhyuk |
ML-OPT.3 |
515 |
Gradient Compression via Count-Sketch for Analog Federated Learning |
| Kant, Latha |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
| Kanth, Vikram |
CSTC-4.1 |
451 |
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols |
| CSTC-7.1 |
843 |
WannaCry Data Collection System Design and Tutorial |
| Kapple, Sarah |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
| Kassas, Zaher |
NLaN-2.3 |
647 |
Doppler Stretch Estimation With Application to Tracking Globalstar Satellite Signals |
| Kaur, Manveen |
NPP2.2 |
169 |
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System |
| Kava, Donato |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Kaviani, Saeed |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
| Kearns, Adam |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
| Kelly, Devin |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
| Kelly, John |
DRASM.3 |
255 |
Novel RF Spectrum Characterization Using Information Measures |
| Khalife, Hicham |
NPP4.4 |
445 |
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links |
| Khalife, Joe |
NLaN-2.3 |
647 |
Doppler Stretch Estimation With Application to Tracking Globalstar Satellite Signals |
| Khalil, Dahesh |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Kim, Jae |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
| Kim, Jinwook |
ML-CH.3 |
629 |
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments |
| Kim, Seong-Cheol |
ML-CH.3 |
629 |
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments |
| Kim, Taejin |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
| Kirchhoff, Jonathan |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
| Klaimi, Rami |
MC1.2 |
7 |
Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes |
| Knight, Ashton |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
| Kokalj-Filipović, Silvija |
ML-EDGE.1 |
96 |
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification |
| Kompella, Sastry |
NPP3.4 |
303 |
The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and Tradeoffs |
| NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
| NPP7.2 |
830 |
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node |
| Komulainen, Arwid |
NPP6.4 |
696 |
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks |
| Kozee, Jeremy |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Kraczek, Brent |
NPP6.3 |
690 |
Geometry-Informed Transmission Strength Scaling in Barrage Relay Networks |
| Krishnamachari, Bhaskar |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
| Krunz, Marwan |
AML-2.2 |
987 |
Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared Spectrum |
| Kudla, Thomas |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
| Kumar, Vaibhav |
MIMO.1 |
261 |
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap Channels |
| Kunz, Thomas |
ML-12.3 |
763 |
Downlink Scheduling in LTE With Deep Reinforcement Learning, LSTMs and Pointers |
| Kurdziel, Michael |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
| Kwak, Kyung |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Kwon, Girim |
MIMO.2 |
267 |
Joint Beamforming Design for LOS MIMO Systems With Multiple Intelligent Reflecting Surfaces |
| L A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Laing, Jeff |
SATCOM-1.4 |
91 |
Flexible Network Interface (FNI): A Mission-Centric Integration Framework for Next Generation DoD SATCOM Networks |
| LaMar, Suzanna |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
| Larsen, Erlend |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
| Larson, Kevin |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
| Larsson, Emil |
CSTC-4.3 |
464 |
Cyber Vulnerability Implantation Revisited |
| Last, David |
CSTC-1.2 |
55 |
Using Distributed Ledgers for Command and Control - Concepts and Challenges |
| ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Le, Anh |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
| Le Martret, Christophe |
CDC.1 |
945 |
Distributed Dynamic Channel Assignment in Military Ad Hoc Networks Within the MAENA Project: New Algorithm and High Fidelity Simulation Results |
| Lee, Alice |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Lee, Eunji |
ML-CH.3 |
629 |
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments |
| Lee, Michael |
ML-CH.1 |
618 |
Convolutional Neural Networks for Radio Frequency Ray Tracing |
| Lefebre, Shawn |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
| Lenz, Nathan |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Leslie, Nandi |
IoBT-3.2 |
1005 |
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems |
| Leturc, Xavier |
CDC.1 |
945 |
Distributed Dynamic Channel Assignment in Military Ad Hoc Networks Within the MAENA Project: New Algorithm and High Fidelity Simulation Results |
| Leung, Kin |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
| ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
| Li, Jason |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Li, Jinyang |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
| Li, Yanyan |
CSTC-5.2 |
589 |
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach |
| Li, Yuxiao |
NLaN-1.2 |
528 |
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation |
| NLaN-1.3 |
533 |
A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB Waveform |
| Liang, Teng |
NPP4.2 |
432 |
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling |
| Lide, David |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Lin, Peter |
AML-1.2 |
880 |
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks |
| AML-2.1 |
981 |
Privacy Leakage Avoidance With Switching Ensembles |
| Liu, Chang |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
| Liu, Dongxin |
IoBT-1.1 |
777 |
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification |
| Liu, Fan |
NLaN-1.1 |
521 |
Asynchronous Integration of Communication and Localization Systems Using IR-UWB Signals |
| Loevenich, Johannes |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
| Lu, Edward |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Lukaszewski, Daniel |
SATCOM-2.2 |
213 |
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links |
| Lukowiak, Marcin |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
| Lychev, Robert |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Lynch, Michael |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| M A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Ma, Runyu |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
| Machacek, Travis |
5G.3 |
739 |
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems |
| Macker, Joseph |
NPP2.3 |
175 |
Multicast Enhancements to Event-Driven Tactical Networking |
| NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
| NPP7.2 |
830 |
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node |
| Madeira, Ricardo |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
| Mailthody, Vikram Sharma |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
| Malangone, Dane |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
| Maneriker, Pranav |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
| Manjunath, B. |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
| CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
| Manso, Marco |
NATO1.2 |
231 |
Concepts and Directions for Future IoT and C2 Interoperability |
| Maracchion, Christopher |
COMM.4 |
354 |
All-Domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing With Implemented Dynamic Spectrum Access Toolchain |
| Marandi, Ali |
CSTC-3.2 |
316 |
Security Threats Analysis of the Unmanned Aerial Vehicle System |
| Marino, Angela |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
| Marlin, Benjamin |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
| IoBT-2.2 |
898 |
Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking Study |
| IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
| Martin, James |
NPP2.2 |
169 |
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System |
| Martin, Peter |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
| Martone, Anthony |
ML-12.2 |
757 |
Open Set Wireless Standard Classification Using Convolutional Neural Networks |
| LT.1 |
963 |
Waveform Selection for Radar Tracking in Target Channels With Memory via Universal Learning |
| Matolak, David |
PCM1.1 |
402 |
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions |
| Maxon, Sean |
NPP1.4 |
43 |
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network |
| Mazuelas, Santiago |
NLaN-1.2 |
528 |
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation |
| NLaN-1.3 |
533 |
A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB Waveform |
| McDaniel, Patrick |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
| McEachen, John |
SPAC2.4 |
396 |
Pulsed Signal Detection Utilizing Wavelet Analysis With a Deep Learning Approach |
| CSTC-4.1 |
451 |
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols |
| Médard, Muriel |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
| NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
| Medina, Stephanie |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
| Melville, Robert |
AART.2 |
808 |
Silent Tuning |
| Mesterharm, Chris |
AML-2.1 |
981 |
Privacy Leakage Avoidance With Switching Ensembles |
| Michaelis, James |
NATO1.2 |
231 |
Concepts and Directions for Future IoT and C2 Interoperability |
| Michaels, Alan |
SPAC2.2 |
384 |
Quantifying Dataset Quality in Radio Frequency Machine Learning |
| Milder, Peter |
NPP2.1 |
162 |
Unifying Address and Name Based Communication in Wireless Medium Access Control |
| Millefiori, Leonardo Maria |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
| Miller, Robert |
ML-EDGE.1 |
96 |
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification |
| Milstein, Laurence |
AJC.1 |
652 |
Design of an Ultra-Low Power MFSK System in the Presence of Jamming |
| Minor, Devon |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Minor, Philip |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Mobayenjarihani, Mohammad |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
| Mohammed, Tajuddin Manhar |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
| CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
| Mohsen, Mohanad |
PCM1.1 |
402 |
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions |
| Molisch, Andreas |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
| Moll, Philipp |
NPP4.3 |
438 |
Resilient Brokerless Publish-Subscribe Over NDN |
| NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
| Montezuma, Paulo |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
| Moradi, Hussein |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
| Morelli, Alessandro |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Morselli, Flavio |
NLaN-1.4 |
538 |
A Statistical Range Information Model With Application to UWB Localization |
| Mounsif, Leila |
MC2.3 |
157 |
Optimal Pilot Sequences for Phase and Timing Synchronization in FTN Systems |
| Moustakas, Aris |
CDC.3 |
957 |
Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler Spread |
| Mukherjee, Anshu |
MIMO.1 |
261 |
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap Channels |
| Mukkamala, Ravi |
CSTC-4.4 |
470 |
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform |
| Muller, Robert |
ML-12.1 |
751 |
FPGA-Based Deep Learning Accelerator for RF Applications |
| Murawski, Robert |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
| N A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Nanjundaswamy, Tejaswi |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
| Narayanan, Ram |
NPP1.4 |
43 |
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network |
| Nataraj, Lakshmanan |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
| CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
| Naves, Raphael |
NPP4.4 |
445 |
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links |
| Neinavaie, Mohammad |
NLaN-2.3 |
647 |
Doppler Stretch Estimation With Application to Tracking Globalstar Satellite Signals |
| Newcomb, Allison |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
| Nguyen, Duy |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
| Nguyen, Lan |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
| Nicholas, Paul |
NWK-1.2 |
482 |
Analysis of Time-Sensitive MANET Channel Allocation in Contested Environments |
| Nicoli, Monica |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
| Nieto, John |
CC.2 |
916 |
Application of Sub-Sample Dithering to Reduce Probability of Signal Detection |
| Nieves, David |
ML-EDGE.4 |
115 |
ACE: An ATAK Plugin for Enhanced Acoustic Situational Awareness at the Edge |
| Niewiejska, Julia |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
| Nilsson, Jan |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Njilla, Laurent |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
| Norris, James |
CC.2 |
916 |
Application of Sub-Sample Dithering to Reduce Probability of Signal Detection |
| Noyes, Elias |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| O A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Oliveira, João |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
| Oprea, Alina |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
| P A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Pal, Partha |
CSTC-1.2 |
55 |
Using Distributed Ledgers for Command and Control - Concepts and Challenges |
| Panigrahy, Nitish |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
| Park, Chanho |
ML-OPT.3 |
515 |
Gradient Compression via Count-Sketch for Analog Federated Learning |
| Park, Hyuncheol |
MIMO.2 |
267 |
Joint Beamforming Design for LOS MIMO Systems With Multiple Intelligent Reflecting Surfaces |
| Park, Jae |
PCM2.2 |
550 |
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel |
| Park, Kyoung-Min |
ML-CH.3 |
629 |
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments |
| Pasquero, Oudomsack-Pierre |
AJC.4 |
670 |
Direct-Sequence Spread Spectrum With Signal Space Diversity for High Resistance to Jamming |
| Pathak, Parth |
NPP1.3 |
37 |
Joint AP Probing and Scheduling: A Contextual Bandit Approach |
| Patil, Varun |
NPP4.3 |
438 |
Resilient Brokerless Publish-Subscribe Over NDN |
| Pendleton, Marcus |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
| Perkins, Daniel |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
| Pesavento, Davide |
NPP4.3 |
438 |
Resilient Brokerless Publish-Subscribe Over NDN |
| Peuhkuri, Markus |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Pham, Khanh |
MC1.3 |
13 |
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC |
| Phillips, Pamela |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Pingen, Geert |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
| Pittner, Kenneth |
SATCOM-2.2 |
213 |
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links |
| Polydoros, Andreas |
CDC.3 |
957 |
Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler Spread |
| Poulliat, Charly |
MC2.3 |
157 |
Optimal Pilot Sequences for Phase and Timing Synchronization in FTN Systems |
| Poylisher, Alexander |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
| Pradhan, Manas |
NATO1.2 |
231 |
Concepts and Directions for Future IoT and C2 Interoperability |
| Prahl-Kamps, Maximilian |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
| Prvulovic, Milos |
CSTC-7.3 |
855 |
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms |
| R A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Radziszowski, Stanisław |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
| Rahman, Abdul |
CSTC-4.4 |
470 |
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform |
| Rahman, Md Ashiqur |
NPP4.2 |
432 |
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling |
| Rahman, Md. Hasan |
MC1.3 |
13 |
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC |
| Raja, Ashok Vardhan |
CSTC-5.2 |
589 |
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach |
| Rajan, Dinesh |
PCM2.3 |
556 |
Measurement-Based Characterization of Human Body Impact on Ultra-Low UAV-To-Ground Channels |
| Ramanathan, C |
NWK-2.2 |
868 |
Mitigating Blockage of Transmission and Reception Due to Rotor Blades in Air-To-Air Data Link Using Single-Carrier Block Modulation |
| Ramaswamy, Venkatesh |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
| 5G.3 |
739 |
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems |
| Ranjbar, Mohammad |
MC1.3 |
13 |
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC |
| Rao, Chirag |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
| Rawat, Danda |
IoBT-3.1 |
999 |
Securing Unmanned Aerial Vehicular Networks Using Modified Elliptic Curve Cryptography |
| Redwine, Keith |
PCM2.2 |
550 |
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel |
| Reed, Jeffrey |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
| Refaei, Tamer |
NPP5.3 |
577 |
Using NDN and P4 for Effective Traffic Management in Tactical Networks |
| Reising, Donald |
IoBT-1.2 |
783 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications |
| Rettore, Paulo Henrique |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
| Rice, Michael |
MIMO.4 |
279 |
On Alamouti-Encoded 16-APSK in Aeronautical Mobile Telemetry |
| PCM2.1 |
544 |
Polarization Combining and Equalization for Aeronautical Mobile Telemetry |
| Ridgway, Richard |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
| Rigolin F. Lopes, Roberto |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
| Rivas, Veronica |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
| Robinson, Aisha |
ML-12.3 |
763 |
Downlink Scheduling in LTE With Deep Reinforcement Learning, LSTMs and Pointers |
| Robinson, John |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
| Rock, Colleen |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| COMM.3 |
347 |
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge |
| Rogers, Darren |
CSTC-7.1 |
843 |
WannaCry Data Collection System Design and Tutorial |
| Roque, Damien |
MC2.3 |
157 |
Optimal Pilot Sequences for Phase and Timing Synchronization in FTN Systems |
| Rosa, Lorenzo |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
| Rupar, Michael |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
| Ryu, Bo |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
| S A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Sadjadpour, Hamid |
DRASM.1 |
243 |
Constrained Resource Allocation Problems in Communications: An Information-Assisted Approach |
| Safavat, Sunitha |
IoBT-3.1 |
999 |
Securing Unmanned Aerial Vehicular Networks Using Modified Elliptic Curve Cryptography |
| Sagduyu, Yalin |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
| Saglam, Harun Bugra |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
| Samplawski, Colin |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
| IoBT-2.2 |
898 |
Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking Study |
| IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
| Saucan, Augustin |
IoBT-1.4 |
795 |
On Multisensor Activation Policies for Bernoulli Tracking |
| Savin, Julian |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
| Schafer, Douglas |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Schütz, Bertram |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
| Segarra, Santiago |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
| Sego, Thomas |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
| Sehwag, Vikash |
CSTC-2.2 |
189 |
Beyond Lp Norms: Delving Deeper Into Robustness to Physical Image Transformations |
| Seipel, Patrick |
CSTC-5.1 |
583 |
Detection of Anomalous Zigbee Transmissions Using Machine Learning |
| Selim, Mohamed |
NPP3.3 |
297 |
Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT Devices |
| Serban, Constantin |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
| Serra, Hugo |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
| Sevenich, Peter |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
| Shah, Vijay |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
| Shao, Sihua |
NWK-1.4 |
495 |
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach |
| Sharma, Anjali |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
| Sheatsley, Ryan |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
| Shebert, Samuel |
ML-12.2 |
757 |
Open Set Wireless Standard Classification Using Convolutional Neural Networks |
| Shen, Yuan |
NLaN-1.2 |
528 |
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation |
| NLaN-1.3 |
533 |
A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB Waveform |
| Sherman, Michelle |
NWK-1.4 |
495 |
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach |
| Shetty, Sachin |
CSTC-4.4 |
470 |
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform |
| Shipp, Tyler |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
| Sigholm, Johan |
CSTC-4.3 |
464 |
Cyber Vulnerability Implantation Revisited |
| Sikka, Harshvardhan |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
| Smith, Mark |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
| Smith, Robert |
5G.3 |
739 |
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems |
| Soldi, Giovanni |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
| Soliman, Abdel-Hamid |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
| Song, Weijia |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
| Soule, Nathaniel |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| COMM.3 |
347 |
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge |
| Sruti, S |
MIMO.1 |
601 |
Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO Radars |
| Stahlbuhk, Thomas |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
| Starr, Robert |
NPP5.3 |
577 |
Using NDN and P4 for Effective Traffic Management in Tactical Networks |
| Stavrou, Ioannis |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
| Steele, Matt |
NPP5.3 |
577 |
Using NDN and P4 for Effective Traffic Management in Tactical Networks |
| Sterner, Ulf |
NPP6.4 |
696 |
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks |
| Stevens, Daniel |
DRASM.3 |
255 |
Novel RF Spectrum Characterization Using Information Measures |
| Stockdale, John |
IoBT-3.3 |
1011 |
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models |
| Stokes, Jack |
CSTC-2.1 |
181 |
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance |
| CSTC-2.2 |
189 |
Beyond Lp Norms: Delving Deeper Into Robustness to Physical Image Transformations |
| CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
| Sugrim, Shridatt |
AML-1.2 |
880 |
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks |
| Sun, Guiqi |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
| Sun, Kun |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
| Sun, Xiang |
NWK-1.4 |
495 |
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach |
| Sun, Xingjian |
CDC.2 |
951 |
Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection Networks |
| Suri, Niranjan |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
| NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Swain Walsh, Darcy |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
| Swami, Ananthram |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
| T A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Tabuada, Paulo |
IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
| Tajaddodianfar, Farid |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
| Tall, Anne |
CSTC-1.4 |
69 |
Integrating Cybersecurity Into a Big Data Ecosystem |
| Talty, Kevin |
IoBT-3.3 |
1011 |
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models |
| Tang, WanBin |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
| Tao, Xiaojie |
CSTC-3.4 |
329 |
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud |
| CSTC-6.4 |
721 |
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification |
| Tassiulas, Leandros |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
| Tayem, Nizar |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
| Thebault, Didier |
NPP4.4 |
445 |
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links |
| Thieme, Stefanie |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
| Thornton, Charles |
LT.1 |
963 |
Waveform Selection for Radar Tracking in Target Channels With Memory via Universal Learning |
| Tian, Jing |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
| Tillotson, Kyle |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Tirenin, Wladimir |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Toliver, Paul |
ML-EDGE.1 |
96 |
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification |
| Tomcho, Landon |
COMM.3 |
347 |
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge |
| Toner, Ryan |
CSTC-1.2 |
55 |
Using Distributed Ledgers for Command and Control - Concepts and Challenges |
| Tortonesi, Mauro |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
| Tosh, Deepak |
NWK-1.3 |
489 |
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks |
| Towsley, Don |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
| ML-OPT.2 |
509 |
Optimizing Flows in Changing Tree-Based Sensor Networks |
| Tran, Le-Nam |
MIMO.1 |
261 |
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap Channels |
| Tran, Nghi |
MC1.3 |
13 |
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC |
| SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
| Trivedi, Gautam |
NPP3.1 |
285 |
On Wireless Link Connectivity for Resilient Multi-Hop Networks |
| Tummala, Murali |
SPAC2.4 |
396 |
Pulsed Signal Detection Utilizing Wavelet Analysis With a Deep Learning Approach |
| CSTC-4.1 |
451 |
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols |
| Turck, Kurt |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
| Twitchell, Autumn |
MIMO.4 |
279 |
On Alamouti-Encoded 16-APSK in Aeronautical Mobile Telemetry |
| V A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Vai, Michael |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Valenti, Matthew |
NWK-2.1 |
861 |
Optimization of a Millimeter-Wave UAV-To-Ground Network in Urban Deployments |
| Vanleer, Ann |
PCM1.4 |
420 |
Improving Propagation Model Predictions via Machine Learning With Engineered Features |
| Venkatesan, Sridhar |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
| AML-1.2 |
880 |
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks |
| Venkatesh, C |
NWK-2.2 |
868 |
Mitigating Blockage of Transmission and Reception Due to Rotor Blades in Air-To-Air Data Link Using Single-Carrier Block Modulation |
| Venosa, Elettra |
SPAC1.2 |
127 |
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers |
| Veramareddy, Vinay |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
| Verma, Gunjan |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
| IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
| Vesey, William |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
| Viegas, Pedro |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
| Vigil, A |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
| Vikalo, Haris |
NPP3.2 |
291 |
RF-Based Network Inference: Theoretical Foundations |
| Viswanathan, Ramanarayanan |
CDC.2 |
951 |
Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection Networks |
| von Rechenberg, Merlin |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
| Voogt, Vincent |
ML-12.1 |
751 |
FPGA-Based Deep Learning Accelerator for RF Applications |
| W A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Walczak, Nicholas |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
| Wang, Jianquan |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
| Wang, Jun |
CSTC-1.4 |
69 |
Integrating Cybersecurity Into a Big Data Ecosystem |
| Wang, Lan |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
| Wang, Liming |
CSTC-3.4 |
329 |
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud |
| CSTC-6.4 |
721 |
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification |
| Wang, Peng |
IoBT-1.1 |
777 |
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification |
| Wang, Shiqiang |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
| Wang, Shu |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
| Wang, Tianshi |
IoBT-1.1 |
777 |
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification |
| Wang, Xinda |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
| Wang, Xinyuan |
CSTC-3.1 |
309 |
CloudImmu: Transparent Protection of Binary Applications in the Cloud |
| CSTC-4.2 |
458 |
On the Feasibility of Detecting Software Supply Chain Attacks |
| Webb, Sean |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
| Weber, Daniel |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
| Weerackody, Vijitha |
COMM.1 |
335 |
Methodologies for Spectrum Sharing for a Network of Land-ESIMs With Stations in the Mobile Service |
| Weithoffer, Stefan |
MC1.2 |
7 |
Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes |
| Werberich, Elias |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
| Werner, Frank |
CSTC-7.3 |
855 |
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms |
| Weston, Jeffery |
NPP2.3 |
175 |
Multicast Enhancements to Event-Driven Tactical Networking |
| NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
| Whelihan, David |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
| Wigness, Maggie |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
| Willett, Peter |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
| NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
| Williams, Albert |
ML-OPT.2 |
509 |
Optimizing Flows in Changing Tree-Based Sensor Networks |
| Willstatter, Kyle |
SPAC2.3 |
390 |
Complementary Sequence Construction for Constant-Envelope OFDM Transmission Enabling Nonlinear Amplification and Clipping |
| Win, Moe |
NLaN-1.4 |
538 |
A Statistical Range Information Model With Application to UWB Localization |
| NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
| IoBT-1.4 |
795 |
On Multisensor Activation Policies for Bernoulli Tracking |
| Won, Su Yong |
NPP5.2 |
570 |
Investigating the Design Space for Name Confidentiality in Named Data Networking |
| Wong, Stephan |
ML-12.1 |
751 |
FPGA-Based Deep Learning Accelerator for RF Applications |
| Woods, Timothy |
COMM.4 |
354 |
All-Domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing With Implemented Dynamic Spectrum Access Toolchain |
| Woolsey, Nicholas |
NPP6.3 |
690 |
Geometry-Informed Transmission Strength Scaling in Barrage Relay Networks |
| Worthington, Olwen |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
| X A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Xia, Wei |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
| Xiang, Yi |
AJC.1 |
652 |
Design of an Ultra-Low Power MFSK System in the Presence of Jamming |
| Xiao, Sa |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
| Xie, Geoffrey |
SATCOM-2.2 |
213 |
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links |
| Xie, Ru |
CSTC-3.4 |
329 |
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud |
| CSTC-6.4 |
721 |
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification |
| Xiong, Gang |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
| Xu, Shouhuai |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
| Xu, Tianyi |
NPP1.3 |
37 |
Joint AP Probing and Scheduling: A Contextual Bandit Approach |
| Xu, Zhen |
CSTC-3.4 |
329 |
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud |
| Y A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Yahja, Alex |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
| Yan, Jonmei |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
| Yang, Kathleen |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
| Yao, Shuochao |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
| Ye, Fan |
NPP2.1 |
162 |
Unifying Address and Name Based Communication in Wireless Medium Access Control |
| Yousefi, Shahram |
DRASM.1 |
243 |
Constrained Resource Allocation Problems in Communications: An Information-Assisted Approach |
| Yu, Tianyuan |
NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
| Yuan, Jiawei |
CSTC-5.2 |
589 |
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach |
| Yuan, Xiaojun |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
| Yuksel, Murat |
AART.4 |
818 |
Defocal Lens Assembly for Multi-Element Full-Duplex Free Space Optical Transceiver |
| Z A B C D E F G H I J K L M N O P R S T V W X Y Z |
| Zajic, Alenka |
CSTC-7.3 |
855 |
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms |
| Zhang, Beichuan |
NPP4.2 |
432 |
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling |
| Zhang, Cha |
CSTC-2.2 |
189 |
Beyond Lp Norms: Delving Deeper Into Robustness to Physical Image Transformations |
| Zhang, Ding |
NPP1.3 |
37 |
Joint AP Probing and Scheduling: A Contextual Bandit Approach |
| Zhang, Kevin |
SATCOM-1.4 |
91 |
Flexible Network Interface (FNI): A Mission-Centric Integration Framework for Next Generation DoD SATCOM Networks |
| Zhang, Lixia |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
| NPP4.3 |
438 |
Resilient Brokerless Publish-Subscribe Over NDN |
| NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
| NPP5.2 |
570 |
Investigating the Design Space for Name Confidentiality in Named Data Networking |
| Zhang, Tingting |
NLaN-1.1 |
521 |
Asynchronous Integration of Communication and Localization Systems Using IR-UWB Signals |
| Zhang, Wenhan |
AML-2.2 |
987 |
Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared Spectrum |
| Zhang, Yuchen |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
| Zhang, Zhiyi |
NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
| NPP5.2 |
570 |
Investigating the Design Space for Name Confidentiality in Named Data Networking |
| Zheng, Jun |
NWK-1.4 |
495 |
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach |
| Zheng, Zizhan |
NPP1.3 |
37 |
Joint AP Probing and Scheduling: A Contextual Bandit Approach |
| Ziemann, Matthew |
ML-CH.1 |
618 |
Convolutional Neural Networks for Radio Frequency Ray Tracing |
| Zoltowski, Michael |
SPAC2.3 |
390 |
Complementary Sequence Construction for Constant-Envelope OFDM Transmission Enabling Nonlinear Amplification and Clipping |
| Zou, Cliff |
CSTC-1.4 |
69 |
Integrating Cybersecurity Into a Big Data Ecosystem |