Author |
Session |
Start page |
Title |
A A B C D E F G H I J K L M N O P R S T V W X Y Z |
Abdel Nour, Charbel |
MILCOM 2021 Track 1: MC1.2 |
7 |
Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes |
Abdelzaher, Tarek |
IoBT-1.1 |
777 |
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
Abdou, Ahmed |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
Acosta, Jaime |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
Adams, Paul |
NATO2.2 |
366 |
Adopting a Dynamic Spectrum Management Philosophy in NATO |
Adamson, Brian |
NPP2.3 |
175 |
Multicast Enhancements to Event-Driven Tactical Networking |
Afanasyev, Alexander |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
Afroze, Zeenat |
PCM1.1 |
402 |
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions |
Ahmed, Ejaz |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
Ahmed, Shakil |
NPP3.3 |
297 |
Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT Devices |
Ahn, Jin-Hyun |
ML-OPT.3 |
515 |
Gradient Compression via Count-Sketch for Analog Federated Learning |
Ai, Bo |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
Alberth, William |
MIMO.2 |
607 |
Massive MIMO Review and 12 GHz Opportunity |
Alghazo, Jaafar |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
Amin, Rahul |
NPP2.2 |
169 |
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System |
Anderson, Christopher |
PCM1.4 |
420 |
Improving Propagation Model Predictions via Machine Learning With Engineered Features |
Anderson, Robert |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Anevlavis, Tzanis |
IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
Annavaram, Murali |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
Arabian, Farah |
PCM2.1 |
544 |
Polarization Combining and Equalization for Aeronautical Mobile Telemetry |
Arasu, Krishnasamy |
IoBT-1.2 |
783 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications |
Arbi, Tarak |
AJC.4 |
670 |
Direct-Sequence Spread Spectrum With Signal Space Diversity for High Resistance to Jamming |
Aschenbruck, Nils |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
Ashdown, Jonathan |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
COMM.4 |
354 |
All-Domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing With Implemented Dynamic Spectrum Access Toolchain |
Atighetchi, Michael |
CSTC-1.2 |
55 |
Using Distributed Ledgers for Command and Control - Concepts and Challenges |
Aubry, Augusto |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
Avestimehr, Salman |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
Axford, Roy |
SATCOM-1.2 |
77 |
Margin and Availability in Transponded SATCOM |
B A B C D E F G H I J K L M N O P R S T V W X Y Z |
Badi, Mahmoud |
PCM2.3 |
556 |
Measurement-Based Characterization of Human Body Impact on Ultra-Low UAV-To-Ground Channels |
Baker, Patrick |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
Bandara, Eranga |
CSTC-4.4 |
470 |
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform |
Barry, John |
SPAC2.1 |
378 |
Direct-Sequence Spread-Spectrum Acquisition for High Dynamic Environments via Signal Partitioning |
Barz, Christoph |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
Bastiaansen, Harrie |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
Bastian, Nathaniel |
IoBT-3.3 |
1011 |
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models |
Bastos, Luis |
NATO2.2 |
366 |
Adopting a Dynamic Spectrum Management Philosophy in NATO |
NATO2.3 |
372 |
Protected Core Networking: Communications Challenges in Tactical Environments |
Basu, Samyadeep |
AML-2.1 |
981 |
Privacy Leakage Avoidance With Switching Ensembles |
Bauer, Kevin |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
Becker, Albert |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
Benchaaboun, Sanae |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
Berg, Albert |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Beugin, Yohan |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
Beytur, Hasan Burhan |
NPP3.2 |
291 |
RF-Based Network Inference: Theoretical Foundations |
Bharadwaj, Ramesh |
NPP1.4 |
43 |
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network |
Birman, Ken |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
Blasco, Ruben |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
Block, Frederick |
MC1.4 |
19 |
Low-Rate FEC for M-Ary Orthogonal Modulation |
MC2.1 |
145 |
Capacity Bounds for Frequency-Hopped BPSK |
Bohannon, Addison |
ML-12.4 |
771 |
A Reinforcement Learning Approach for Scheduling in mmWave Networks |
Bolas, Eduardo |
NATO2.3 |
372 |
Protected Core Networking: Communications Challenges in Tactical Environments |
Bollmann, Chad |
CSTC-4.1 |
451 |
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols |
Bosler, Clay |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
Bowers, Caleb |
NPP2.3 |
175 |
Multicast Enhancements to Event-Driven Tactical Networking |
NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
NPP7.2 |
830 |
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node |
Braca, Paolo |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
Brambilla, Mattia |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
Breedy, Maggie R |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Bretmersky, Steven |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
Breton, Daniel |
PCM1.2 |
408 |
Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain |
Brown, Eric |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
Brueck, Nadine |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
Brunnenmeyer, David |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
SATCOM-1.4 |
91 |
Flexible Network Interface (FNI): A Mission-Centric Integration Framework for Next Generation DoD SATCOM Networks |
Buckley, Richard |
ML-CH.2 |
623 |
Application of Machine Learning Techniques to HF Propagation Prediction |
Buehrer, R. Michael |
MIMO.3 |
612 |
Multi-Target Localization Using Polarization Sensitive Arrays |
ML-12.2 |
757 |
Open Set Wireless Standard Classification Using Convolutional Neural Networks |
LT.1 |
963 |
Waveform Selection for Radar Tracking in Target Channels With Memory via Universal Learning |
Bunton, Jonathan |
IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
C A B C D E F G H I J K L M N O P R S T V W X Y Z |
Caceres, Ivan |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
Camp, Joseph |
PCM2.3 |
556 |
Measurement-Based Characterization of Human Body Impact on Ultra-Low UAV-To-Ground Channels |
Campioni, Lorenzo |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Canestrare, David |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Cao, Lei |
CDC.2 |
951 |
Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection Networks |
Cao, Pan |
NLaN-1.1 |
521 |
Asynchronous Integration of Communication and Localization Systems Using IR-UWB Signals |
Capela, Germano |
NATO2.2 |
366 |
Adopting a Dynamic Spectrum Management Philosophy in NATO |
NATO2.3 |
372 |
Protected Core Networking: Communications Challenges in Tactical Environments |
Carter, James |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Carutasu, Diana |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
Castanares, Anthony |
NWK-1.3 |
489 |
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks |
Chache, Frederick |
NPP1.4 |
43 |
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network |
Chadha, Ritu |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
Chan, Kevin |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
Chandrasekaran, Shiv |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
Chatzigeorgiou, Ioannis |
MC1.1 |
1 |
Spark Optimization of Linear Codes for Reliable Data Delivery by Relay Drones |
Cheah, Jonathon |
SPAC1.4 |
139 |
Phase Noise Time Series Model |
Chen, Songqing |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
Chen, Xiaofei |
SPAC1.2 |
127 |
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers |
Chen, Zheyu |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
Cheng, Zihang |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
Chikkagoudar, Satish |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
Chin, Peter |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Choi, Joongsub |
MIMO.2 |
267 |
Joint Beamforming Design for LOS MIMO Systems With Multiple Intelligent Reflecting Surfaces |
Chowdhury, Arindam |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
Chu, Derrick |
SPAC2.1 |
378 |
Direct-Sequence Spread-Spectrum Acquisition for High Dynamic Environments via Signal Partitioning |
Chugg, Keith |
SPAC1.1 |
121 |
Analysis of the Average Sampling Frequency for Level Crossing Analog-To-Digital Converters |
Cichocki, Andrzej |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
Clark, Michael |
IoBT-1.2 |
783 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications |
Clark, Richard |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Clark, William |
SPAC2.2 |
384 |
Quantifying Dataset Quality in Radio Frequency Machine Learning |
Clarke, Luisana |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
Cohen, Alejandro |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
Conan, Vania |
NPP4.4 |
445 |
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links |
Consul, Shorya |
NPP3.2 |
291 |
RF-Based Network Inference: Theoretical Foundations |
Conti, Andrea |
NLaN-1.4 |
538 |
A Statistical Range Information Model With Application to UWB Localization |
Corradi, Antonio |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
Correia, Jeffery |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
Corwin, Paul |
5G.1 |
727 |
Operational Views of Vertical Tactical 5G |
5G.2 |
733 |
Hiding the RF Signal Signature in Tactical 5G |
Cousik, Tarun |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
Cowles, Donald |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
Cramer, Eelco |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Cuevas, Enrique |
COMM.1 |
335 |
Methodologies for Spectrum Sharing for a Network of Land-ESIMs With Stations in the Mobile Service |
D A B C D E F G H I J K L M N O P R S T V W X Y Z |
D'Oliveira, Rafael |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
Dagres, Ioannis |
CDC.3 |
957 |
Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler Spread |
Das, Subhro |
IoBT-1.4 |
795 |
On Multisensor Activation Policies for Bernoulli Tracking |
Daughety, Nathan |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
De Lucia, Michael |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
De Maio, Antonio |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
de Veciana, Gustavo |
NPP3.2 |
291 |
RF-Based Network Inference: Theoretical Foundations |
Decleene, Brian |
NPP1.1 |
25 |
Wireless Resilient Routing Reconfiguration |
Deepti, Chilaka |
MIMO.1 |
601 |
Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO Radars |
Defrancesco, Dana |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
den Boer, Hans |
ML-12.1 |
751 |
FPGA-Based Deep Learning Accelerator for RF Applications |
Denney, Kyle |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Dinis, Rui |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
Ditzler, Gregory |
AML-2.2 |
987 |
Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared Spectrum |
Do, Emily |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Dogan, Mine |
ML-12.4 |
771 |
A Reinforcement Learning Approach for Scheduling in mmWave Networks |
Doherty, John |
SPAC1.3 |
133 |
Wideband Auto_Ambiguity Function Nulling Algorithm |
Doucette, Cody |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Draxler, Paul |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
Dye, Hudson |
PCM1.1 |
402 |
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions |
E A B C D E F G H I J K L M N O P R S T V W X Y Z |
Eddy, Wesley |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
Ekici, Eylem |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
Elbadry, Mohammed |
NPP2.1 |
162 |
Unifying Address and Name Based Communication in Wireless Medium Access Control |
Elliott, Ronald |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Ellis, Jason |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
Elmasry, George |
5G.1 |
727 |
Operational Views of Vertical Tactical 5G |
5G.2 |
733 |
Hiding the RF Signal Signature in Tactical 5G |
Encarnado, Florendo |
PCM2.2 |
550 |
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel |
England, Paul |
CSTC-2.1 |
181 |
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance |
Ephremides, Anthony |
NPP3.4 |
303 |
The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and Tradeoffs |
Erpek, Tugba |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
Erricolo, Danilo |
MIMO.2 |
607 |
Massive MIMO Review and 12 GHz Opportunity |
Evancich, Nicholas |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Ezzeldin, Yahya |
ML-12.4 |
771 |
A Reinforcement Learning Approach for Scheduling in mmWave Networks |
F A B C D E F G H I J K L M N O P R S T V W X Y Z |
Fadul, Mohamed |
IoBT-1.2 |
783 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications |
Fan, Jian |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
Fang, Shiwei |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
Farhang-Boroujeny, Behrouz |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
Farris, Steven |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
Feng, Pengbin |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
Fevold, Jerediah |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
Flavell, Paul |
NATO2.2 |
366 |
Adopting a Dynamic Spectrum Management Philosophy in NATO |
Flint, Christopher |
PCM2.2 |
550 |
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel |
Fogli, Mattia |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
Foschini, Luca |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
Fowkes, Laurence |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
Fragouli, Christina |
ML-12.4 |
771 |
A Reinforcement Learning Approach for Scheduling in mmWave Networks |
IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
Franco, John |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
Freeberg, Connor |
5G.3 |
739 |
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems |
Frey, Caleb |
NWK-1.2 |
482 |
Analysis of Time-Sensitive MANET Channel Allocation in Contested Environments |
Fronterhouse, Don |
SATCOM-1.4 |
91 |
Flexible Network Interface (FNI): A Mission-Centric Integration Framework for Next Generation DoD SATCOM Networks |
Fuchs, Christoph |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
Furman, Sean |
COMM.4 |
354 |
All-Domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing With Implemented Dynamic Spectrum Access Toolchain |
Furman, William |
ML-CH.2 |
623 |
Application of Machine Learning Techniques to HF Propagation Prediction |
G A B C D E F G H I J K L M N O P R S T V W X Y Z |
Gabrielson, Anthony |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
Gaglione, Domenico |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
Galvan, Julio |
CSTC-5.2 |
589 |
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach |
Ganesan, Deepak |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
Garcia Lazo, Edir |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
Geck, Frank |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
Geller, Benoît |
AJC.4 |
670 |
Direct-Sequence Spread Spectrum With Signal Space Diversity for High Resistance to Jamming |
Giridhar, K |
MIMO.1 |
601 |
Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO Radars |
NWK-2.2 |
868 |
Mitigating Blockage of Transmission and Reception Due to Rotor Blades in Air-To-Air Data Link Using Single-Carrier Block Modulation |
Gkelias, Athanasios |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
Gluck, Jonathan |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
Gómez-Vega, Carlos |
NLaN-1.4 |
538 |
A Statistical Range Information Model With Application to UWB Localization |
Gosselin, Jordan |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
Gou, Gaopeng |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
Green, Daniel |
SPAC2.4 |
396 |
Pulsed Signal Detection Utilizing Wavelet Analysis With a Deep Learning Approach |
Greenwald, Lloyd |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
Gregris, Jessica |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Grönkvist, Jimmi |
NPP6.4 |
696 |
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks |
Guan, Yangyang |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
Guerreiro, João |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
Guo, Katherine |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
Gururajan, Arun |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
H A B C D E F G H I J K L M N O P R S T V W X Y Z |
Ha, Sean |
NPP5.3 |
577 |
Using NDN and P4 for Effective Traffic Management in Tactical Networks |
Haab, David |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
Haedrich, Caitlin |
PCM1.2 |
408 |
Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain |
Hall, Donald |
LT.2 |
969 |
Conditional Rician K-Factor Discrimination for Indoor Localization via AOA Estimation |
Hamilton, Stephen |
AART.2 |
808 |
Silent Tuning |
Hansson, Anders |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Haq, A F M Saniul |
AART.4 |
818 |
Defocal Lens Assembly for Multi-Element Full-Duplex Free Space Optical Transceiver |
Harris, Frederic |
SPAC1.2 |
127 |
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers |
He, Ruisi |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
Heath, Robert |
NWK-2.1 |
861 |
Optimization of a Millimeter-Wave UAV-To-Ground Network in Urban Deployments |
Hemida, Ahmed |
IoBT-3.2 |
1005 |
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems |
Henney, Justin |
NPP8.1 |
927 |
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here! |
Henry, Nathaniel |
SPAC1.3 |
133 |
Wideband Auto_Ambiguity Function Nulling Algorithm |
Hernandez Jimenez, Jarilyn |
CSTC-5.1 |
583 |
Detection of Anomalous Zigbee Transmissions Using Machine Learning |
Hershberger, Donald |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Hoffman, Karla |
NWK-1.2 |
482 |
Analysis of Time-Sensitive MANET Channel Allocation in Contested Environments |
Holschuh, Tom |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
Hong, Hope |
CSTC-5.1 |
583 |
Detection of Anomalous Zigbee Transmissions Using Machine Learning |
Howard, William |
MIMO.3 |
612 |
Multi-Target Localization Using Polarization Sensitive Arrays |
Hriba, Enass |
NWK-2.1 |
861 |
Optimization of a Millimeter-Wave UAV-To-Ground Network in Urban Deployments |
Hu, Yi |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
Hua, Yingbo |
CC.1 |
910 |
Anti-Eavesdropping Channel Estimation Using Multi-Antenna Half-Duplex Radios |
Huang, Chen |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
Huang, Jin |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
Hughes, Jeffery |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Hunt, Brandon |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
Huntsman, Steve |
NPP1.1 |
25 |
Wireless Resilient Routing Reconfiguration |
Hunziker, James |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
Hussain, Ahmed |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
Hyatt, John |
ML-CH.1 |
618 |
Convolutional Neural Networks for Radio Frequency Ray Tracing |
I A B C D E F G H I J K L M N O P R S T V W X Y Z |
I. Zakir Ahmed, Fnu |
DRASM.1 |
243 |
Constrained Resource Allocation Problems in Communications: An Information-Assisted Approach |
Izmailov, Rauf |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
AML-1.2 |
880 |
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks |
AML-2.1 |
981 |
Privacy Leakage Avoidance With Switching Ensembles |
J A B C D E F G H I J K L M N O P R S T V W X Y Z |
Jabbari, Bijan |
NPP3.1 |
285 |
On Wireless Link Connectivity for Resilient Multi-Hop Networks |
Jacobsen, Rune |
CSTC-3.2 |
316 |
Security Threats Analysis of the Unmanned Aerial Vehicle System |
Jagannath, Anu |
NPP8.1 |
927 |
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here! |
Jagannath, Jithin |
NPP8.1 |
927 |
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here! |
Jajodia, Sushil |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
Janin, Elie |
CDC.1 |
945 |
Distributed Dynamic Channel Assignment in Military Ad Hoc Networks Within the MAENA Project: New Algorithm and High Fidelity Simulation Results |
Jayasumana, Anura |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
Jenkins, David |
SPAC1.3 |
133 |
Wideband Auto_Ambiguity Function Nulling Algorithm |
Jenkins, David |
LT.2 |
969 |
Conditional Rician K-Factor Discrimination for Indoor Localization via AOA Estimation |
Jester, John |
SATCOM-1.1 |
|
MUOS Terminal Automation With JMACS |
Ji, Mengkun |
SPAC1.1 |
121 |
Analysis of the Average Sampling Frequency for Level Crossing Analog-To-Digital Converters |
Johnson, William |
ML-EDGE.1 |
96 |
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification |
Joo, William |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Jorgensen, Erik |
CSTC-7.3 |
855 |
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms |
K A B C D E F G H I J K L M N O P R S T V W X Y Z |
Kalashian, Brandon |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
COMM.3 |
347 |
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge |
Kam, Clement |
NPP3.4 |
303 |
The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and Tradeoffs |
NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
NPP7.2 |
830 |
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node |
Kamal, Ahmed |
NPP3.3 |
297 |
Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT Devices |
Kamhoua, Charles |
NWK-1.3 |
489 |
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks |
IoBT-3.2 |
1005 |
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems |
Kaminsky, Alan |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
Kane, Kevin |
CSTC-2.1 |
181 |
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance |
Kang, Joonhyuk |
ML-OPT.3 |
515 |
Gradient Compression via Count-Sketch for Analog Federated Learning |
Kant, Latha |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
Kanth, Vikram |
CSTC-4.1 |
451 |
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols |
CSTC-7.1 |
843 |
WannaCry Data Collection System Design and Tutorial |
Kapple, Sarah |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
Kassas, Zaher |
NLaN-2.3 |
647 |
Doppler Stretch Estimation With Application to Tracking Globalstar Satellite Signals |
Kaur, Manveen |
NPP2.2 |
169 |
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System |
Kava, Donato |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Kaviani, Saeed |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
Kearns, Adam |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
Kelly, Devin |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
Kelly, John |
DRASM.3 |
255 |
Novel RF Spectrum Characterization Using Information Measures |
Khalife, Hicham |
NPP4.4 |
445 |
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links |
Khalife, Joe |
NLaN-2.3 |
647 |
Doppler Stretch Estimation With Application to Tracking Globalstar Satellite Signals |
Khalil, Dahesh |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Kim, Jae |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
Kim, Jinwook |
ML-CH.3 |
629 |
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments |
Kim, Seong-Cheol |
ML-CH.3 |
629 |
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments |
Kim, Taejin |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
Kirchhoff, Jonathan |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
Klaimi, Rami |
MC1.2 |
7 |
Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes |
Knight, Ashton |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
Kokalj-Filipović, Silvija |
ML-EDGE.1 |
96 |
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification |
Kompella, Sastry |
NPP3.4 |
303 |
The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and Tradeoffs |
NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
NPP7.2 |
830 |
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node |
Komulainen, Arwid |
NPP6.4 |
696 |
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks |
Kozee, Jeremy |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Kraczek, Brent |
NPP6.3 |
690 |
Geometry-Informed Transmission Strength Scaling in Barrage Relay Networks |
Krishnamachari, Bhaskar |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
Krunz, Marwan |
AML-2.2 |
987 |
Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared Spectrum |
Kudla, Thomas |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
Kumar, Vaibhav |
MIMO.1 |
261 |
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap Channels |
Kunz, Thomas |
ML-12.3 |
763 |
Downlink Scheduling in LTE With Deep Reinforcement Learning, LSTMs and Pointers |
Kurdziel, Michael |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
Kwak, Kyung |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Kwon, Girim |
MIMO.2 |
267 |
Joint Beamforming Design for LOS MIMO Systems With Multiple Intelligent Reflecting Surfaces |
L A B C D E F G H I J K L M N O P R S T V W X Y Z |
Laing, Jeff |
SATCOM-1.4 |
91 |
Flexible Network Interface (FNI): A Mission-Centric Integration Framework for Next Generation DoD SATCOM Networks |
LaMar, Suzanna |
NWK-1.1 |
477 |
Congestion Aware Intent-Based Routing Using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks |
Lanez, Andrew |
SATCOM-1.1 |
|
MUOS Terminal Automation With JMACS |
Larsen, Erlend |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
Larson, Kevin |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
Larsson, Emil |
CSTC-4.3 |
464 |
Cyber Vulnerability Implantation Revisited |
Last, David |
CSTC-1.2 |
55 |
Using Distributed Ledgers for Command and Control - Concepts and Challenges |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Le, Anh |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
Le Martret, Christophe |
CDC.1 |
945 |
Distributed Dynamic Channel Assignment in Military Ad Hoc Networks Within the MAENA Project: New Algorithm and High Fidelity Simulation Results |
Lee, Alice |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Lee, Eunji |
ML-CH.3 |
629 |
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments |
Lee, Michael |
ML-CH.1 |
618 |
Convolutional Neural Networks for Radio Frequency Ray Tracing |
Lefebre, Shawn |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
Lenz, Nathan |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Leslie, Nandi |
IoBT-3.2 |
1005 |
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems |
Leturc, Xavier |
CDC.1 |
945 |
Distributed Dynamic Channel Assignment in Military Ad Hoc Networks Within the MAENA Project: New Algorithm and High Fidelity Simulation Results |
Leung, Kin |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
Li, Jason |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Li, Jinyang |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
Li, Yanyan |
CSTC-5.2 |
589 |
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach |
Li, Yuxiao |
NLaN-1.2 |
528 |
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation |
NLaN-1.3 |
533 |
A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB Waveform |
Liang, Teng |
NPP4.2 |
432 |
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling |
Lide, David |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Lin, Peter |
AML-1.2 |
880 |
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks |
AML-2.1 |
981 |
Privacy Leakage Avoidance With Switching Ensembles |
Liu, Chang |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
Liu, Dongxin |
IoBT-1.1 |
777 |
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification |
Liu, Fan |
NLaN-1.1 |
521 |
Asynchronous Integration of Communication and Localization Systems Using IR-UWB Signals |
Loevenich, Johannes |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
Lu, Edward |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Lukaszewski, Daniel |
SATCOM-2.2 |
213 |
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links |
Lukowiak, Marcin |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
Lychev, Robert |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Lynch, Michael |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
M A B C D E F G H I J K L M N O P R S T V W X Y Z |
Ma, Runyu |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
Machacek, Travis |
5G.3 |
739 |
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems |
Macker, Joseph |
NPP2.3 |
175 |
Multicast Enhancements to Event-Driven Tactical Networking |
NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
NPP7.2 |
830 |
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node |
Madeira, Ricardo |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
Mailthody, Vikram Sharma |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
Malangone, Dane |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
Maneriker, Pranav |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
Manjunath, B. |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
Manso, Marco |
NATO1.2 |
231 |
Concepts and Directions for Future IoT and C2 Interoperability |
Maracchion, Christopher |
COMM.4 |
354 |
All-Domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing With Implemented Dynamic Spectrum Access Toolchain |
Marandi, Ali |
CSTC-3.2 |
316 |
Security Threats Analysis of the Unmanned Aerial Vehicle System |
Marino, Angela |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
Marlin, Benjamin |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
IoBT-2.2 |
898 |
Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking Study |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
Martin, James |
NPP2.2 |
169 |
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System |
Martin, Peter |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
Martone, Anthony |
ML-12.2 |
757 |
Open Set Wireless Standard Classification Using Convolutional Neural Networks |
LT.1 |
963 |
Waveform Selection for Radar Tracking in Target Channels With Memory via Universal Learning |
Matolak, David |
PCM1.1 |
402 |
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions |
Maxon, Sean |
NPP1.4 |
43 |
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network |
Mazuelas, Santiago |
NLaN-1.2 |
528 |
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation |
NLaN-1.3 |
533 |
A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB Waveform |
McDaniel, Patrick |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
McEachen, John |
SPAC2.4 |
396 |
Pulsed Signal Detection Utilizing Wavelet Analysis With a Deep Learning Approach |
CSTC-4.1 |
451 |
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols |
Médard, Muriel |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
Medina, Stephanie |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
Melville, Robert |
AART.2 |
808 |
Silent Tuning |
Mesterharm, Chris |
AML-2.1 |
981 |
Privacy Leakage Avoidance With Switching Ensembles |
Michaelis, James |
NATO1.2 |
231 |
Concepts and Directions for Future IoT and C2 Interoperability |
Michaels, Alan |
SPAC2.2 |
384 |
Quantifying Dataset Quality in Radio Frequency Machine Learning |
Milder, Peter |
NPP2.1 |
162 |
Unifying Address and Name Based Communication in Wireless Medium Access Control |
Millefiori, Leonardo Maria |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
Miller, Robert |
ML-EDGE.1 |
96 |
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification |
Milstein, Laurence |
AJC.1 |
652 |
Design of an Ultra-Low Power MFSK System in the Presence of Jamming |
Minor, Devon |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Minor, Philip |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Mobayenjarihani, Mohammad |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
Mohammed, Tajuddin Manhar |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
Mohsen, Mohanad |
PCM1.1 |
402 |
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions |
Molisch, Andreas |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
Moll, Philipp |
NPP4.3 |
438 |
Resilient Brokerless Publish-Subscribe Over NDN |
NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
Montezuma, Paulo |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
Moradi, Hussein |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
Morelli, Alessandro |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Morselli, Flavio |
NLaN-1.4 |
538 |
A Statistical Range Information Model With Application to UWB Localization |
Mounsif, Leila |
MC2.3 |
157 |
Optimal Pilot Sequences for Phase and Timing Synchronization in FTN Systems |
Moustakas, Aris |
CDC.3 |
957 |
Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler Spread |
Mukherjee, Anshu |
MIMO.1 |
261 |
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap Channels |
Mukkamala, Ravi |
CSTC-4.4 |
470 |
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform |
Muller, Robert |
ML-12.1 |
751 |
FPGA-Based Deep Learning Accelerator for RF Applications |
Murawski, Robert |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
N A B C D E F G H I J K L M N O P R S T V W X Y Z |
Nanjundaswamy, Tejaswi |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
Narayanan, Ram |
NPP1.4 |
43 |
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network |
Nataraj, Lakshmanan |
CSTC-6.1 |
703 |
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features |
CSTC-6.2 |
709 |
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis |
Naves, Raphael |
NPP4.4 |
445 |
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links |
Neinavaie, Mohammad |
NLaN-2.3 |
647 |
Doppler Stretch Estimation With Application to Tracking Globalstar Satellite Signals |
Newcomb, Allison |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
Nguyen, Duy |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
Nguyen, Lan |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
Nicholas, Paul |
NWK-1.2 |
482 |
Analysis of Time-Sensitive MANET Channel Allocation in Contested Environments |
Nicoli, Monica |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
Nieto, John |
CC.2 |
916 |
Application of Sub-Sample Dithering to Reduce Probability of Signal Detection |
Nieves, David |
ML-EDGE.4 |
115 |
ACE: An ATAK Plugin for Enhanced Acoustic Situational Awareness at the Edge |
Niewiejska, Julia |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
Nilsson, Jan |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Nishida, Bryce |
SATCOM-1.1 |
|
MUOS Terminal Automation With JMACS |
Njilla, Laurent |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
Norris, James |
CC.2 |
916 |
Application of Sub-Sample Dithering to Reduce Probability of Signal Detection |
Noyes, Elias |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
O A B C D E F G H I J K L M N O P R S T V W X Y Z |
Oliveira, João |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
Oprea, Alina |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
P A B C D E F G H I J K L M N O P R S T V W X Y Z |
Pal, Partha |
CSTC-1.2 |
55 |
Using Distributed Ledgers for Command and Control - Concepts and Challenges |
Panigrahy, Nitish |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
Park, Chanho |
ML-OPT.3 |
515 |
Gradient Compression via Count-Sketch for Analog Federated Learning |
Park, Hyuncheol |
MIMO.2 |
267 |
Joint Beamforming Design for LOS MIMO Systems With Multiple Intelligent Reflecting Surfaces |
Park, Jae |
PCM2.2 |
550 |
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel |
Park, Kyoung-Min |
ML-CH.3 |
629 |
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments |
Pasquero, Oudomsack-Pierre |
AJC.4 |
670 |
Direct-Sequence Spread Spectrum With Signal Space Diversity for High Resistance to Jamming |
Pathak, Parth |
NPP1.3 |
37 |
Joint AP Probing and Scheduling: A Contextual Bandit Approach |
Patil, Varun |
NPP4.3 |
438 |
Resilient Brokerless Publish-Subscribe Over NDN |
Pendleton, Marcus |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
Perkins, Daniel |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
Pesavento, Davide |
NPP4.3 |
438 |
Resilient Brokerless Publish-Subscribe Over NDN |
Peuhkuri, Markus |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Pham, Khanh |
MC1.3 |
13 |
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC |
Phillips, Pamela |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Pingen, Geert |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
Pittner, Kenneth |
SATCOM-2.2 |
213 |
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links |
Polydoros, Andreas |
CDC.3 |
957 |
Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler Spread |
Poulliat, Charly |
MC2.3 |
157 |
Optimal Pilot Sequences for Phase and Timing Synchronization in FTN Systems |
Poylisher, Alexander |
ML-EDGE.2 |
102 |
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs |
Pradhan, Manas |
NATO1.2 |
231 |
Concepts and Directions for Future IoT and C2 Interoperability |
Prahl-Kamps, Maximilian |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
Prvulovic, Milos |
CSTC-7.3 |
855 |
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms |
R A B C D E F G H I J K L M N O P R S T V W X Y Z |
Radziszowski, Stanisław |
CSTC-1.1 |
49 |
Solving the Cross Domain Problem With Functional Encryption |
Rahman, Abdul |
CSTC-4.4 |
470 |
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform |
Rahman, Md Ashiqur |
NPP4.2 |
432 |
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling |
Rahman, Md. Hasan |
MC1.3 |
13 |
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC |
Raja, Ashok Vardhan |
CSTC-5.2 |
589 |
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach |
Rajan, Dinesh |
PCM2.3 |
556 |
Measurement-Based Characterization of Human Body Impact on Ultra-Low UAV-To-Ground Channels |
Ramanathan, C |
NWK-2.2 |
868 |
Mitigating Blockage of Transmission and Reception Due to Rotor Blades in Air-To-Air Data Link Using Single-Carrier Block Modulation |
Ramaswamy, Venkatesh |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
5G.3 |
739 |
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems |
Ranjbar, Mohammad |
MC1.3 |
13 |
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC |
Rao, Chirag |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
Rawat, Danda |
IoBT-3.1 |
999 |
Securing Unmanned Aerial Vehicular Networks Using Modified Elliptic Curve Cryptography |
Redwine, Keith |
PCM2.2 |
550 |
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel |
Reed, Jeffrey |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
Refaei, Tamer |
NPP5.3 |
577 |
Using NDN and P4 for Effective Traffic Management in Tactical Networks |
Reising, Donald |
IoBT-1.2 |
783 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications |
Rettore, Paulo Henrique |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
Rice, Michael |
MIMO.4 |
279 |
On Alamouti-Encoded 16-APSK in Aeronautical Mobile Telemetry |
PCM2.1 |
544 |
Polarization Combining and Equalization for Aeronautical Mobile Telemetry |
Ridgway, Richard |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
Rigolin F. Lopes, Roberto |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
Rivas, Veronica |
CSTC-7.2 |
849 |
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation |
Robinson, Aisha |
ML-12.3 |
763 |
Downlink Scheduling in LTE With Deep Reinforcement Learning, LSTMs and Pointers |
Robinson, John |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
Rock, Colleen |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
COMM.3 |
347 |
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge |
Rogers, Darren |
CSTC-7.1 |
843 |
WannaCry Data Collection System Design and Tutorial |
Roque, Damien |
MC2.3 |
157 |
Optimal Pilot Sequences for Phase and Timing Synchronization in FTN Systems |
Rosa, Lorenzo |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
Rupar, Michael |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
Ryu, Bo |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
S A B C D E F G H I J K L M N O P R S T V W X Y Z |
Sadjadpour, Hamid |
DRASM.1 |
243 |
Constrained Resource Allocation Problems in Communications: An Information-Assisted Approach |
Safavat, Sunitha |
IoBT-3.1 |
999 |
Securing Unmanned Aerial Vehicular Networks Using Modified Elliptic Curve Cryptography |
Sagduyu, Yalin |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
Saglam, Harun Bugra |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
Samplawski, Colin |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
IoBT-2.2 |
898 |
Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking Study |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
Saucan, Augustin |
IoBT-1.4 |
795 |
On Multisensor Activation Policies for Bernoulli Tracking |
Savin, Julian |
SATCOM-2.3 |
219 |
Airborne Beyond Line of Sight Communication Networks |
Schafer, Douglas |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Schütz, Bertram |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
Segarra, Santiago |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
Sego, Thomas |
AJC.2 |
658 |
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels |
Sehwag, Vikash |
CSTC-2.2 |
189 |
Beyond Lp Norms: Delving Deeper Into Robustness to Physical Image Transformations |
Seipel, Patrick |
CSTC-5.1 |
583 |
Detection of Anomalous Zigbee Transmissions Using Machine Learning |
Selim, Mohamed |
NPP3.3 |
297 |
Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT Devices |
Serban, Constantin |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
Serra, Hugo |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
Sevenich, Peter |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
Shah, Vijay |
AJC.3 |
664 |
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks |
Shao, Sihua |
NWK-1.4 |
495 |
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach |
Sharma, Anjali |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
Sheatsley, Ryan |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
Shebert, Samuel |
ML-12.2 |
757 |
Open Set Wireless Standard Classification Using Convolutional Neural Networks |
Shen, Yuan |
NLaN-1.2 |
528 |
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation |
NLaN-1.3 |
533 |
A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB Waveform |
Sherman, Michelle |
NWK-1.4 |
495 |
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach |
Shetty, Sachin |
CSTC-4.4 |
470 |
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform |
Shipp, Tyler |
AML-1.3 |
886 |
HoneyModels: Machine Learning Honeypots |
Sigholm, Johan |
CSTC-4.3 |
464 |
Cyber Vulnerability Implantation Revisited |
Sikka, Harshvardhan |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
Smith, Mark |
5G.4 |
745 |
CUE: A Standalone Testbed for 5G Experimentation |
Smith, Robert |
5G.3 |
739 |
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems |
Soldi, Giovanni |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
Soliman, Abdel-Hamid |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
Song, Weijia |
NPP6.2 |
684 |
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications |
Soule, Nathaniel |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
COMM.3 |
347 |
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge |
Sruti, S |
MIMO.1 |
601 |
Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO Radars |
Stahlbuhk, Thomas |
NPP8.2 |
933 |
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks |
Starr, Robert |
NPP5.3 |
577 |
Using NDN and P4 for Effective Traffic Management in Tactical Networks |
Stavrou, Ioannis |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
Steele, Matt |
NPP5.3 |
577 |
Using NDN and P4 for Effective Traffic Management in Tactical Networks |
Sterner, Ulf |
NPP6.4 |
696 |
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks |
Stevens, Daniel |
DRASM.3 |
255 |
Novel RF Spectrum Characterization Using Information Measures |
Stockdale, John |
IoBT-3.3 |
1011 |
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models |
Stokes, Jack |
CSTC-2.1 |
181 |
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance |
CSTC-2.2 |
189 |
Beyond Lp Norms: Delving Deeper Into Robustness to Physical Image Transformations |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
Sugrim, Shridatt |
AML-1.2 |
880 |
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks |
Sun, Guiqi |
PCM1.3 |
414 |
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels |
Sun, Kun |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
Sun, Xiang |
NWK-1.4 |
495 |
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach |
Sun, Xingjian |
CDC.2 |
951 |
Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection Networks |
Suri, Niranjan |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Swain Walsh, Darcy |
DRASM.2 |
249 |
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments |
Swami, Ananthram |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
T A B C D E F G H I J K L M N O P R S T V W X Y Z |
Tabuada, Paulo |
IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
Tajaddodianfar, Farid |
CSTC-2.3 |
197 |
URLTran: Improving Phishing URL Detection Using Transformers |
Tall, Anne |
CSTC-1.4 |
69 |
Integrating Cybersecurity Into a Big Data Ecosystem |
Talty, Kevin |
IoBT-3.3 |
1011 |
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models |
Tang, WanBin |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
Tao, Xiaojie |
CSTC-3.4 |
329 |
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud |
CSTC-6.4 |
721 |
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification |
Tassiulas, Leandros |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
Tayem, Nizar |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
Thebault, Didier |
NPP4.4 |
445 |
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links |
Thieme, Stefanie |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
Thornton, Charles |
LT.1 |
963 |
Waveform Selection for Radar Tracking in Target Channels With Memory via Universal Learning |
Tian, Jing |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
Tillotson, Kyle |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Tirenin, Wladimir |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Toliver, Paul |
ML-EDGE.1 |
96 |
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification |
Tomcho, Landon |
COMM.3 |
347 |
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge |
Toner, Ryan |
CSTC-1.2 |
55 |
Using Distributed Ledgers for Command and Control - Concepts and Challenges |
Tortonesi, Mauro |
NPP6.1 |
677 |
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments |
Tosh, Deepak |
NWK-1.3 |
489 |
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks |
Towsley, Don |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
ML-OPT.2 |
509 |
Optimizing Flows in Changing Tree-Based Sensor Networks |
Tran, Le-Nam |
MIMO.1 |
261 |
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap Channels |
Tran, Nghi |
MC1.3 |
13 |
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC |
SATCOM-1.3 |
85 |
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks |
Trivedi, Gautam |
NPP3.1 |
285 |
On Wireless Link Connectivity for Resilient Multi-Hop Networks |
Tummala, Murali |
SPAC2.4 |
396 |
Pulsed Signal Detection Utilizing Wavelet Analysis With a Deep Learning Approach |
CSTC-4.1 |
451 |
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols |
Turck, Kurt |
COMM.2 |
341 |
Improved Propagation Modeling for Non-Terrestrial Network Operations |
Twitchell, Autumn |
MIMO.4 |
279 |
On Alamouti-Encoded 16-APSK in Aeronautical Mobile Telemetry |
V A B C D E F G H I J K L M N O P R S T V W X Y Z |
Vai, Michael |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Valenti, Matthew |
NWK-2.1 |
861 |
Optimization of a Millimeter-Wave UAV-To-Ground Network in Urban Deployments |
Vanleer, Ann |
PCM1.4 |
420 |
Improving Propagation Model Predictions via Machine Learning With Engineered Features |
Venkatesan, Sridhar |
AML-1.1 |
874 |
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems |
AML-1.2 |
880 |
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks |
Venkatesh, C |
NWK-2.2 |
868 |
Mitigating Blockage of Transmission and Reception Due to Rotor Blades in Air-To-Air Data Link Using Single-Carrier Block Modulation |
Venosa, Elettra |
SPAC1.2 |
127 |
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers |
Veramareddy, Vinay |
LT.3 |
975 |
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data |
Verma, Gunjan |
MIMO.3 |
273 |
ML-Aided Power Allocation for Tactical MIMO |
IoBT-1.3 |
789 |
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems |
Vesey, William |
AML-2.3 |
993 |
Toward Effective Moving Target Defense Against Adversarial AI |
Viegas, Pedro |
AART.1 |
802 |
Quantized Digital Amplification With Combination Over the Air - Achieving Maximum Efficiency on Communication Links Between Long Range UAVs and Satellites |
Vigil, A |
SATCOM-2.1 |
205 |
Migration of DOD SATCOM Earth Segment Architectures to Digital IF |
Vikalo, Haris |
NPP3.2 |
291 |
RF-Based Network Inference: Theoretical Foundations |
Viswanathan, Ramanarayanan |
CDC.2 |
951 |
Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection Networks |
von Rechenberg, Merlin |
NPP7.3 |
836 |
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios |
Voogt, Vincent |
ML-12.1 |
751 |
FPGA-Based Deep Learning Accelerator for RF Applications |
W A B C D E F G H I J K L M N O P R S T V W X Y Z |
Walczak, Nicholas |
ML-EDGE.3 |
108 |
TAK-ML: Applying Machine Learning at the Tactical Edge |
Wang, Jianquan |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
Wang, Jun |
CSTC-1.4 |
69 |
Integrating Cybersecurity Into a Big Data Ecosystem |
Wang, Lan |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
Wang, Liming |
CSTC-3.4 |
329 |
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud |
CSTC-6.4 |
721 |
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification |
Wang, Peng |
IoBT-1.1 |
777 |
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification |
Wang, Shiqiang |
ML-OPT.1 |
503 |
Robust Solutions to Constrained Optimization Problems by LSTM Networks |
Wang, Shu |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
Wang, Tianshi |
IoBT-1.1 |
777 |
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification |
Wang, Xinda |
CSTC-5.3 |
595 |
PatchRNN: A Deep Learning-Based System for Security Patch Identification |
Wang, Xinyuan |
CSTC-3.1 |
309 |
CloudImmu: Transparent Protection of Binary Applications in the Cloud |
CSTC-4.2 |
458 |
On the Feasibility of Detecting Software Supply Chain Attacks |
Webb, Sean |
NATO1.1 |
225 |
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes |
Weber, Daniel |
NPP8.3 |
939 |
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios |
Weerackody, Vijitha |
COMM.1 |
335 |
Methodologies for Spectrum Sharing for a Network of Land-ESIMs With Stations in the Mobile Service |
Weithoffer, Stefan |
MC1.2 |
7 |
Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes |
Werberich, Elias |
NATO2.1 |
360 |
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area |
Werner, Frank |
CSTC-7.3 |
855 |
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms |
Weston, Jeffery |
NPP2.3 |
175 |
Multicast Enhancements to Event-Driven Tactical Networking |
NPP7.1 |
824 |
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery |
Whelihan, David |
CSTC-6.3 |
715 |
Agile and Resilient Embedded Systems |
Wigness, Maggie |
IoBT-2.1 |
892 |
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference |
Willett, Peter |
NLaN-2.1 |
635 |
Constrained Target Localization for Multiplatform Radar Systems |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
Williams, Albert |
ML-OPT.2 |
509 |
Optimizing Flows in Changing Tree-Based Sensor Networks |
Willstatter, Kyle |
SPAC2.3 |
390 |
Complementary Sequence Construction for Constant-Envelope OFDM Transmission Enabling Nonlinear Amplification and Clipping |
Win, Moe |
NLaN-1.4 |
538 |
A Statistical Range Information Model With Application to UWB Localization |
NLaN-2.2 |
641 |
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation |
IoBT-1.4 |
795 |
On Multisensor Activation Policies for Bernoulli Tracking |
Won, Su Yong |
NPP5.2 |
570 |
Investigating the Design Space for Name Confidentiality in Named Data Networking |
Wong, Stephan |
ML-12.1 |
751 |
FPGA-Based Deep Learning Accelerator for RF Applications |
Woods, Timothy |
COMM.4 |
354 |
All-Domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing With Implemented Dynamic Spectrum Access Toolchain |
Woolsey, Nicholas |
NPP6.3 |
690 |
Geometry-Informed Transmission Strength Scaling in Barrage Relay Networks |
Worthington, Olwen |
NATO1.3 |
237 |
Resource Management in Software Defined Coalitions (SDC) Through Slicing |
X A B C D E F G H I J K L M N O P R S T V W X Y Z |
Xia, Wei |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
Xiang, Yi |
AJC.1 |
652 |
Design of an Ultra-Low Power MFSK System in the Presence of Jamming |
Xiao, Sa |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
Xie, Geoffrey |
SATCOM-2.2 |
213 |
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links |
Xie, Ru |
CSTC-3.4 |
329 |
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud |
CSTC-6.4 |
721 |
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification |
Xiong, Gang |
CSTC-3.3 |
323 |
A Study on Security Analysis of the Unlinkability in Tor |
Xu, Shouhuai |
CSTC-1.3 |
61 |
vCDS: A Virtualized Cross Domain Solution Architecture |
Xu, Tianyi |
NPP1.3 |
37 |
Joint AP Probing and Scheduling: A Contextual Bandit Approach |
Xu, Zhen |
CSTC-3.4 |
329 |
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud |
Y A B C D E F G H I J K L M N O P R S T V W X Y Z |
Yahja, Alex |
NPP1.2 |
31 |
DeepCQ+: Robust and Scalable Routing With Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks |
Yan, Jonmei |
AART.3 |
813 |
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers |
Yang, Kathleen |
MC2.2 |
151 |
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation |
Yao, Shuochao |
IoBT-2.3 |
904 |
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs |
Ye, Fan |
NPP2.1 |
162 |
Unifying Address and Name Based Communication in Wireless Medium Access Control |
Yousefi, Shahram |
DRASM.1 |
243 |
Constrained Resource Allocation Problems in Communications: An Information-Assisted Approach |
Yu, Tianyuan |
NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
Yuan, Jiawei |
CSTC-5.2 |
589 |
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach |
Yuan, Xiaojun |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
Yuksel, Murat |
AART.4 |
818 |
Defocal Lens Assembly for Multi-Element Full-Duplex Free Space Optical Transceiver |
Z A B C D E F G H I J K L M N O P R S T V W X Y Z |
Zajic, Alenka |
CSTC-7.3 |
855 |
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms |
Zhang, Beichuan |
NPP4.2 |
432 |
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling |
Zhang, Cha |
CSTC-2.2 |
189 |
Beyond Lp Norms: Delving Deeper Into Robustness to Physical Image Transformations |
Zhang, Ding |
NPP1.3 |
37 |
Joint AP Probing and Scheduling: A Contextual Bandit Approach |
Zhang, Kevin |
SATCOM-1.4 |
91 |
Flexible Network Interface (FNI): A Mission-Centric Integration Framework for Next Generation DoD SATCOM Networks |
Zhang, Lixia |
NPP4.1 |
426 |
BBR-Inspired Congestion Control for Data Fetching Over NDN |
NPP4.3 |
438 |
Resilient Brokerless Publish-Subscribe Over NDN |
NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
NPP5.2 |
570 |
Investigating the Design Space for Name Confidentiality in Named Data Networking |
Zhang, Tingting |
NLaN-1.1 |
521 |
Asynchronous Integration of Communication and Localization Systems Using IR-UWB Signals |
Zhang, Wenhan |
AML-2.2 |
987 |
Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared Spectrum |
Zhang, Yuchen |
CC.3 |
921 |
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information |
Zhang, Zhiyi |
NPP5.1 |
562 |
Enabling Plug-n-Play in Named Data Networking |
NPP5.2 |
570 |
Investigating the Design Space for Name Confidentiality in Named Data Networking |
Zheng, Jun |
NWK-1.4 |
495 |
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach |
Zheng, Zizhan |
NPP1.3 |
37 |
Joint AP Probing and Scheduling: A Contextual Bandit Approach |
Ziemann, Matthew |
ML-CH.1 |
618 |
Convolutional Neural Networks for Radio Frequency Ray Tracing |
Zoltowski, Michael |
SPAC2.3 |
390 |
Complementary Sequence Construction for Constant-Envelope OFDM Transmission Enabling Nonlinear Amplification and Clipping |
Zou, Cliff |
CSTC-1.4 |
69 |
Integrating Cybersecurity Into a Big Data Ecosystem |