Papers by title
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols
A Novel Approach to Characterize Aggregate Interference From LTE-Based Cellular Deployments
A Reinforcement Learning Approach for Scheduling in mmWave Networks
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification
A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB Waveform
A Statistical Range Information Model With Application to UWB Localization
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels
A Study on Security Analysis of the Unlinkability in Tor
ACE: An ATAK Plugin for Enhanced Acoustic Situational Awareness at the Edge
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node
Adopting a Dynamic Spectrum Management Philosophy in NATO
Adversarial Machine Learning for Enhanced Spread Spectrum Communications
Agile and Resilient Embedded Systems
Airborne Beyond Line of Sight Communication Networks
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems
Analysis of the Average Sampling Frequency for Level Crossing Analog-To-Digital Converters
Analysis of Time-Sensitive MANET Channel Allocation in Contested Environments
Anti-Eavesdropping Channel Estimation Using Multi-Antenna Half-Duplex Radios
Application of Machine Learning Techniques to HF Propagation Prediction
Application of Sub-Sample Dithering to Reduce Probability of Signal Detection
Asynchronous Integration of Communication and Localization Systems Using IR-UWB Signals
BBR-Inspired Congestion Control for Data Fetching Over NDN
Beyond Lp Norms: Delving Deeper Into Robustness to Physical Image Transformations
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling
Capacity Bounds for Frequency-Hopped BPSK
Characterization and Modeling of Frequency-Selective Ship-To-Ship Channel
CloudImmu: Transparent Protection of Binary Applications in the Cloud
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers
Concepts and Directions for Future IoT and C2 Interoperability
Conditional Rician K-Factor Discrimination for Indoor Localization via AOA Estimation
Constrained Resource Allocation Problems in Communications: An Information-Assisted Approach
Constrained Target Localization for Multiplatform Radar Systems
Convolutional Neural Networks for Radio Frequency Ray Tracing
Covert Communications Under Multiple-Antenna Eavesdropping Without Channel State Information
CUE: A Standalone Testbed for 5G Experimentation
Cyber Vulnerability Implantation Revisited
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation
Defocal Lens Assembly for Multi-Element Full-Duplex Free Space Optical Transceiver
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications
Design of an Ultra-Low Power MFSK System in the Presence of Jamming
Detection of Anomalous Zigbee Transmissions Using Machine Learning
Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection Networks
Direct-Sequence Spread Spectrum With Signal Space Diversity for High Resistance to Jamming
Direct-Sequence Spread-Spectrum Acquisition for High Dynamic Environments via Signal Partitioning
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area
Doppler Stretch Estimation With Application to Tracking Globalstar Satellite Signals
Downlink Scheduling in LTE With Deep Reinforcement Learning, LSTMs and Pointers
Enabling Plug-n-Play in Named Data Networking
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels
Fast Initial Access With Deep Learning for Beam Prediction in 5G mmWave Networks
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here!
FPGA-Based Deep Learning Accelerator for RF Applications
Geometry-Informed Transmission Strength Scaling in Barrage Relay Networks
Gradient Compression via Count-Sketch for Analog Federated Learning
HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis
Hiding the RF Signal Signature in Tactical 5G
HoneyModels: Machine Learning Honeypots
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems
Improved Propagation Modeling for Non-Terrestrial Network Operations
Improving Propagation Model Predictions via Machine Learning With Engineered Features
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions
Integrating Cybersecurity Into a Big Data Ecosystem
Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared Spectrum
Investigating the Design Space for Name Confidentiality in Named Data Networking
Joint AP Probing and Scheduling: A Contextual Bandit Approach
Joint Beamforming Design for LOS MIMO Systems With Multiple Intelligent Reflecting Surfaces
Low-Rate FEC for M-Ary Orthogonal Modulation
Margin and Availability in Transponded SATCOM
Massive MIMO Review and 12 GHz Opportunity
Measurement-Based Characterization of Human Body Impact on Ultra-Low UAV-To-Ground Channels
Methodologies for Spectrum Sharing for a Network of Land-ESIMs With Stations in the Mobile Service
Migration of DOD SATCOM Earth Segment Architectures to Digital IF
Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes
ML-Aided Power Allocation for Tactical MIMO
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks
Multi-Target Localization Using Polarization Sensitive Arrays
Multicast Enhancements to Event-Driven Tactical Networking
MUOS Terminal Automation With JMACS
Network Coding-Based Multi-Path Forward Erasure Correction for Tactical Scenarios
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation
Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO Radars
Novel RF Spectrum Characterization Using Information Measures
OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features
On Alamouti-Encoded 16-APSK in Aeronautical Mobile Telemetry
On Multisensor Activation Policies for Bernoulli Tracking
On the Feasibility of Detecting Software Supply Chain Attacks
On Wireless Link Connectivity for Resilient Multi-Hop Networks
Open Set Wireless Standard Classification Using Convolutional Neural Networks
Operational Views of Vertical Tactical 5G
Optimal Pilot Sequences for Phase and Timing Synchronization in FTN Systems
Optimal Signaling Schemes of 2-User Gaussian Mixture Multiple-Access Channels With 1-Bit ADC
Optimization of a Millimeter-Wave UAV-To-Ground Network in Urban Deployments
Optimized NDN Forwarding in Tactical Networks With Asymmetric Radio Links
Optimizing Flows in Changing Tree-Based Sensor Networks
Optimizing Intelligent Edge-Clouds With Partitioning, Compression and Speculative Inference
Over-The-Air Testing of Impulsive Frequency Shift Keying Modulation
PatchRNN: A Deep Learning-Based System for Security Patch Identification
Polarization Combining and Equalization for Aeronautical Mobile Telemetry
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance
Privacy Leakage Avoidance With Switching Ensembles
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data
Protected Core Networking: Communications Challenges in Tactical Environments
Pulsed Signal Detection Utilizing Wavelet Analysis With a Deep Learning Approach
QoS Extension to a B.A.T.M.A.N. Based LoRa Mesh Network
Quantifying Dataset Quality in Radio Frequency Machine Learning
Ray-Tracing Based Channel Modeling for Rough-Boundary Environments
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification
Resilient Brokerless Publish-Subscribe Over NDN
Resource Management in Software Defined Coalitions (SDC) Through Slicing
RF-Based Network Inference: Theoretical Foundations
Robust Solutions to Constrained Optimization Problems by LSTM Networks
SATCOM Jamming Resiliency Under Non-Uniform Probability of Attacks
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap Channels
Securing Unmanned Aerial Vehicular Networks Using Modified Elliptic Curve Cryptography
Security Threats Analysis of the Unmanned Aerial Vehicle System
Self-Contrastive Learning Based Semi-Supervised Radio Modulation Classification
Sensor Data-Driven UAV Anomaly Detection Using Deep Learning Approach
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks
Software Acoustic Modem for TAK Communications With Analog Radios at the Tactical Edge
Solving the Cross Domain Problem With Functional Encryption
Spark Optimization of Linear Codes for Reliable Data Delivery by Relay Drones
Split to Win: Near-Optimal Sensor Network Synthesis via Path-Greedy Subproblems
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs
TAK-ML: Applying Machine Learning at the Tactical Edge
Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System
The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and Tradeoffs
Toward Effective Moving Target Defense Against Adversarial AI
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs
Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking Study
Unifying Address and Name Based Communication in Wireless Medium Access Control
URLTran: Improving Phishing URL Detection Using Transformers
Using Distributed Ledgers for Command and Control - Concepts and Challenges
Using NDN and P4 for Effective Traffic Management in Tactical Networks
vCDS: A Virtualized Cross Domain Solution Architecture
WannaCry Data Collection System Design and Tutorial
Waveform Selection for Radar Tracking in Target Channels With Memory via Universal Learning
Wideband Auto_Ambiguity Function Nulling Algorithm
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery