| Author |
Session |
Start page |
Title |
| A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Abbas, Adeeb |
MILCOM 2022 Track 5: WC1.3 |
311 |
Radio Modulation Classification Using Deep Residual Neural Networks |
| Abdelmawla, Ibrahim |
YSW.13 |
705 |
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach |
| Abdelzaher, Tarek |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
| WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
| Abdurrahman, Muhammad |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
| Acosta, Jaime |
DCA.2 |
|
Automatic Data Generation and Rule Creation for Network Scanning Tools |
| DEF.1 |
154 |
Locally-Hosted Fidelity-Adaptive Honeypots With Connection-Preserving Capabilities |
| Ahmed, Muddasar |
5GS.2 |
565 |
Threat Framework for 5G Cellular Communications |
| Ahmed, Shakil |
YSW.13 |
705 |
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach |
| Ajakwe, Simeon |
ROB.1 |
336 |
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach |
| Akbar, Monika |
DCA.2 |
|
Automatic Data Generation and Rule Creation for Network Scanning Tools |
| Åkerberg, Johan |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
| Akkaya, Kemal |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
| STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
| Akter, Rubina |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
| Alghamdi, Abdulmajeed |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
| Alkandari, Shaikha |
AIR.1 |
133 |
Air-Aided Communication Between Ground Assets in a Poisson Forest |
| Alkhowaiter, Mohammed |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
| Almubarak, Khalid |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
| Alves, João |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Alyami, Mnassar |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
| Amin, Moeness |
COG.2 |
186 |
Multi-Signal Classification Using Deep Learning and Sparse Arrays |
| Anderson, Cleon |
CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
| Anderson, Gustave |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
| SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
| Ara, Israt |
STC.1 |
968 |
An Intelligent and Private 6G Air Interface Using Physical Layer Security |
| Aris, Ahmet |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
| STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
| Ashdown, Andrew |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
| Ashdown, Jonathan |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
| Atkin, Guillermo |
MC1.2 |
84 |
Polynomial Phase Modulation Based NOMA |
| Axell, Erik |
MC2.1 |
204 |
Reduced Complexity Adaptive Demodulation in Impulse Noise Channels |
| B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Badr, Mahmoud |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
| Baker, Patrick |
FML.1 |
470 |
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings |
| Baksaas, Magnus |
PHY.3 |
861 |
Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks |
| Bandara, Eranga |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
| Banerjee, Ayan |
ATT.4 |
1005 |
Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems |
| Banik, Sejuti |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
| Banks, Jeremy |
NMS.2 |
522 |
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments |
| Bao, Huaifeng |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
| Barber, Don |
MCN.2 |
541 |
Manipulating the Automatic Identification System With Extremely Low-Cost Hardware |
| YSW.16 |
723 |
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications |
| Barry, John |
YSW.7 |
667 |
An Opportunistic Scheme for Low Probability of Detection Communication |
| Barz, Christoph |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Bastian, Nathaniel |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
| Bernardin, Fred |
MC2.1 |
757 |
Improving Text Security Classification Towards an Automated Information Guard |
| Bhandarkar, Adhitya Bantwal |
WS7: Paper Session II (Cyber Threats against UAVs).1 |
1059 |
Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning |
| Bharadwaj, Ramesh |
YSW.4 |
649 |
Improving Quality of Service in a Mesh Network Using Age of Information |
| Bieniasz, Jedrzej |
WS6: Paper Session.3 |
1024 |
5G-Enabled Defence-In-Depth for Multi-Domain Operations |
| Bingol, Ece |
RTN.1 |
229 |
Peak Age of Information With Receiver Induced Service Interruptions |
| Biswas, Pialy |
MMO.2 |
324 |
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems |
| Biswas, Sudip |
WS3: Paper Session I.1 |
1 |
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks |
| WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
| Björkman, Mats |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
| Blasch, Erik |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
| DRF.3 |
501 |
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs |
| Block, Frederick |
RES.1 |
822 |
Receiver Diversity in LEO Satcom Constellations |
| Bode, Jonas |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
| Borges de Sousa, João |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Boschetti, Nicolò |
YSW.9 |
679 |
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North |
| Bouzabia, Hamda |
YSW.5 |
655 |
Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems |
| Bradley, Eli |
MMO.1 |
318 |
Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction |
| Breedy, Maggie R |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
| Bristow, Austin |
YSW.2 |
635 |
A Robust Self-Synchronized Quantum Key Distribution Protocol |
| Brodnik, Luke |
ROB.3 |
350 |
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture |
| Brotzman, Robert |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
| Brown, Dane |
ROB.3 |
350 |
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture |
| Brown, David |
WS6: Paper Session.4 |
1030 |
Base Station Deployment Optimization in Federated Networks With Multi-Hop Communication |
| Brown, Eric |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
| Brown, Scott |
CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
| Brunnenmeyer, David |
RES.3 |
835 |
Near Term Resilient Teleports for DoD SATCOM |
| Budhiraja, Ishan |
WS3: Paper Session IV.3 |
61 |
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning |
| Budianu, Cristian |
NMS.1 |
515 |
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE |
| Buehrer, R. Michael |
COG.2 |
186 |
Multi-Signal Classification Using Deep Learning and Sparse Arrays |
| COG.4 |
198 |
Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming |
| YSW.15 |
717 |
Decentralized Bandits With Feedback for Cognitive Radar Networks |
| C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Cabuk, Umut |
UAV.3 |
962 |
An Architectural Design for Autonomous and Networked Drones |
| Cai, Lijun |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
| Calderbank, Robert |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
| Camp, L Jean |
YSW.10 |
687 |
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making |
| Camp, Tracy |
WS3: Paper Session II.1 |
25 |
Positive and Unlabeled Learning for Mobile Application Traffic Classification |
| Campbell, Jared |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
| Campioni, Lorenzo |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
| WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
| Castanares, Anthony |
ONC.4 |
273 |
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks |
| Castellanos, Miguel |
S&R.4 |
895 |
Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks |
| Castro, Alejandro |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
| Caven, Peter |
YSW.10 |
687 |
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making |
| Chache, Frederick |
YSW.4 |
649 |
Improving Quality of Service in a Mesh Network Using Age of Information |
| Chadha, Ritu |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
| Chan, Kevin |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
| CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
| Chandrasekaran, Shiv |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
| Chang, Hao-Hsuan |
S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
| Chang, Tammy |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
| Chaudhary, Rajat |
WS3: Paper Session IV.3 |
61 |
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning |
| Chen, Genshe |
MC2.2 |
210 |
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment |
| DRF.3 |
501 |
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs |
| Chen, Hao |
YSW.22 |
|
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization |
| WC2.3 |
368 |
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization |
| Chen, Hao |
S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
| Chen, Jinliang |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
| Chen, Kwang-Cheng |
YSW.2 |
635 |
A Robust Self-Synchronized Quantum Key Distribution Protocol |
| Chen, Ta |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
| Cheng, Bow-Nan |
YSW.18 |
735 |
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures |
| Cheng, Julian |
RSN.4 |
817 |
Coverage Estimation for Secure Ultraviolet Communication |
| Cheng, Xiang |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
| Chi, Zicheng |
WS3: Paper Session III.2 |
43 |
A Secured Protocol for IoT Devices in Tactical Networks |
| Chieh, Sam |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
| Chikkagoudar, Satish |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
| Chowdhury, Rasel |
WS3: Paper Session IV.1 |
49 |
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption |
| Cimini, Leonard |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
| Clark, Lillian |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
| Cleverly, Griffin |
RES.3 |
835 |
Near Term Resilient Teleports for DoD SATCOM |
| Coleman, Jared |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
| Consul, Prakhar |
WS3: Paper Session IV.3 |
61 |
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning |
| Corcoran, John |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
| Cramer, Eelco |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
| WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
| WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Crandall, Kyle |
RSN.1 |
799 |
Distributed Agent Consensus Performance in Resilient Communication Networks |
| Crouse, David |
ANT.3 |
606 |
On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies |
| Cusack, Melissa |
NMS.1 |
515 |
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE |
| MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
| D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| D'Amours, Claude |
SIG.4 |
920 |
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection |
| Dagdeviren, Orhan |
UAV.3 |
962 |
An Architectural Design for Autonomous and Networked Drones |
| Dandekar, Kapil |
WC1.3 |
311 |
Radio Modulation Classification Using Deep Residual Neural Networks |
| Das, Debarun |
YSW.17 |
729 |
Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access |
| Davaslioglu, Kemal |
MCN.3 |
547 |
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems |
| Dawson, Bryan |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
| De, Swades |
YSW.21 |
751 |
SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels |
| De Lucia, Michael |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
| del Aguila, Alvaro |
UAV.2 |
956 |
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks |
| Deshpande, Rasika |
WS3: Paper Session II.2 |
31 |
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications |
| Diamanti, Maria |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
| Ding, Steven |
NMS.2 |
522 |
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments |
| Djurica, Miodrag |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
| Do, Tri Nhu |
YSW.1 |
629 |
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks |
| YSW.5 |
655 |
Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems |
| Doan, Van-Sang |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
| Draxler, Paul |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
| Dreo Rodosek, Gabi |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
| Drijver, Floris |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
| Drocella, Edward |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
| Drozd, Andrew |
MCN.1 |
535 |
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks |
| DSouza, Daniel |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
| Du, Haizhou |
FML.1 |
470 |
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings |
| Dubey, Rajrshi |
YSW.21 |
751 |
SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels |
| Dulal, Saurab |
YSW.12 |
699 |
NDNSD: Service Publishing and Discovery in NDN |
| Duran, David |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
| Dussault, Heather |
ANT.3 |
606 |
On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies |
| Dwyer, Matthew |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
| CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
| Dzhezyan, Gregory |
SIG.4 |
920 |
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection |
| E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Eck, Christopher |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
| Eckhardt, Josh |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| Edwards, Stephen |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
| Ejaz, Waleed |
WS3: Paper Session I.2 |
7 |
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks |
| Ekström, Mikael |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
| El-Jamous, Ziad |
MCN.3 |
547 |
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems |
| Eliardsson, Patrik |
MC2.1 |
204 |
Reduced Complexity Adaptive Demodulation in Impulse Noise Channels |
| Ellis, Jason |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
| Enoch, Michael |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
| Entezari, Negin |
ATT.3 |
999 |
TensorShield: Tensor-Based Defense Against Adversarial Attacks on Images |
| F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Fadul, Mohamed |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
| Falco, Gregory |
YSW.9 |
679 |
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North |
| Falcon, Edward |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
| Fang, Yudong |
WS6: Paper Session.4 |
1030 |
Base Station Deployment Optimization in Federated Networks With Multi-Hop Communication |
| Farkouh, Raif |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
| Farooq, Junaid |
UAV.1 |
950 |
Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications |
| Fawaz, Kassem |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
| Feder, Andreas |
SIG.3 |
913 |
Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics |
| Ferri, Gabriele |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Fioravanti, Stefano |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Flin, Benjamin |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
| Forero, Pedro |
S&R.2 |
879 |
Toward Congestion Control in Lossy Networks via Local Queue-Management Policies |
| Fowler, Michael |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
| Foytik, Peter |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
| Frisbie, Stephan |
YSW.14 |
711 |
Data-Driven Wireless Anomaly Detection Using Spectral Features |
| Fritz, Tobias |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
| Fronteddu, Roberto |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
| WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Fu, Frank |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
| Fu, Xinzhe |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
| Funai, Colin |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
| MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
| Furfaro, Thomas |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Furman, Sean |
MCN.1 |
535 |
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks |
| Furtak, Janusz |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
| G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Gao, Yue |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
| Garcia-Luna-Aceves, J |
RTC.1 |
398 |
SCRIP: Safe and Cycle-Free Multi-Path Routing |
| Gaydos, Matthew |
RES.1 |
822 |
Receiver Diversity in LEO Satcom Constellations |
| Ge, Yunfei |
5GS.3 |
571 |
MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks |
| Gerstacker, Wolfgang |
SIG.3 |
913 |
Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics |
| Ghorbanzadeh, Michael |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
| Giridhar, K |
YSW.11 |
693 |
Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off |
| Gkelias, Athanasios |
WC2.1 |
356 |
GAN-Based Detection of Adversarial EM Signal Waveforms |
| Gogineni, Kailash |
MLC.2 |
450 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
| YSW.19 |
743 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
| Golam, Mohtasin |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
| Gold, Kimberly |
MLC.4 |
464 |
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness |
| Gopavaram, Shakthidhar Reddy |
YSW.10 |
687 |
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making |
| Gordon, Nathaniel |
YSW.9 |
679 |
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North |
| Graves, Eric |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
| Gregris, Jessica |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
| Grönkvist, Jimmi |
RTN.4 |
247 |
Frequency-Hop-Coded SCB for Tactical Networks |
| Grothendieck, John |
MC2.1 |
757 |
Improving Text Security Classification Towards an Automated Information Guard |
| Grov, Gudmund |
PHY.3 |
861 |
Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks |
| Guerra, Barbara |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
| Guo, Zheng |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
| Gupta, Sandeep |
ATT.4 |
1005 |
Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems |
| Gurevich, Marina |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
| H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Haddadin, Osama |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
| Hagenhoff, Klement |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
| Hägglund, Kristoffer |
MC2.1 |
204 |
Reduced Complexity Adaptive Demodulation in Impulse Noise Channels |
| Hale, Britta |
YSW.3 |
643 |
Securing Software Updates Under Receiver Radio Frequency Geolocation Risk |
| Hao, Xing |
MC1.2 |
84 |
Polynomial Phase Modulation Based NOMA |
| Haque, Md Ariful |
MLC.4 |
464 |
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness |
| Hauge, Mariann |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Hawkins, Matthew |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
| Hayden, Blake |
YSW.3 |
643 |
Securing Software Updates Under Receiver Radio Frequency Geolocation Risk |
| Hazarika, Bishmita |
WS3: Paper Session I.1 |
1 |
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks |
| Headley, William |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
| AJC.1 |
418 |
Considerations of Reinforcement Learning Within Real-Time Wireless Communication Systems |
| Heath, Robert |
S&R.4 |
895 |
Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks |
| Heintz, Ilana |
MC2.1 |
757 |
Improving Text Security Classification Towards an Automated Information Guard |
| Hills, Gerald |
DEF.2 |
160 |
A Customized Approach to Cybersecurity Education for Space Professionals |
| Hirschbeck, Martin |
SIG.3 |
913 |
Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics |
| Ho, Samson |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
| Hossain, Mahmud |
DCA.2 |
|
Automatic Data Generation and Rule Creation for Network Scanning Tools |
| Hou, Thomas |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
| Howard, William |
YSW.15 |
717 |
Decentralized Bandits With Feedback for Cognitive Radar Networks |
| Huang, Chao |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
| Huang, Orton |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
| Huang, Wan-Jen |
WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
| Hulede, Ian Ellis |
RTN.2 |
235 |
Allan Deviation of Social Learning Distributed Network Time Synchronization |
| Hürten, Tobias |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
| Hussey, Jason |
WS3: Paper Session II.1 |
25 |
Positive and Unlabeled Learning for Mobile Application Traffic Classification |
| I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ihekoronye, Vivian Ukamaka |
ROB.1 |
336 |
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach |
| Inshi, Saad |
WS3: Paper Session IV.1 |
49 |
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption |
| Izmailov, Rauf |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
| J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Jakubisin, Daniel |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
| Jalaian, Brian |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
| Javorsek, Daniel |
MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
| Jayaweera, Sudharman |
WS7: Paper Session II (Cyber Threats against UAVs).1 |
1059 |
Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning |
| Jha, Susmit |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
| Jiang, Wei |
PCM.4 |
793 |
Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks |
| Jin, Heng |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
| Jones, Alyse |
AJC.1 |
418 |
Considerations of Reinforcement Learning Within Real-Time Wireless Communication Systems |
| K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Kaasen, Andreas |
PHY.3 |
861 |
Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks |
| Kaddoum, Georges |
YSW.1 |
629 |
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks |
| YSW.5 |
655 |
Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems |
| Kalke, Martine |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
| Kamal, Ahmed |
YSW.13 |
705 |
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach |
| Kamhoua, Charles |
MLC.4 |
464 |
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness |
| MC2.2 |
763 |
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications |
| Kaminski, John |
SEC.1 |
374 |
Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments |
| Kaneko, Masayuki |
MC2.3 |
216 |
A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels |
| Kanth, Vikram |
MCN.2 |
541 |
Manipulating the Automatic Identification System With Extremely Low-Cost Hardware |
| Kaplan, Lance |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
| Kaplan, Michael |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
| Kara, Denizhan |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
| Karaliopoulos, Merkourios |
SDN.4 |
125 |
Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs |
| Karam, Andrew |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
| Katwe, Mayur |
WS3: Paper Session II.2 |
31 |
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications |
| Kaviani, Saeed |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
| Kelley, Brian |
STC.1 |
968 |
An Intelligent and Private 6G Air Interface Using Physical Layer Security |
| Kerber, Maxwell |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
| Kerr, Ryan |
NMS.2 |
522 |
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments |
| Khalil, Dahesh |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
| Kholidy, Hisham A. |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
| Kiamari, Mehrdad |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
| Kiciman, Emre |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
| Kim, Deokseong |
MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
| Kim, Dohyun |
S&R.4 |
895 |
Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks |
| Kim, Dong Seong |
ROB.1 |
336 |
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach |
| ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
| Kim, Gyuwan |
SAT.2 |
618 |
Link Reliability of Satellite-To-Ground Free-Space Optical Communication Systems in South Korea |
| Kim, Hoon |
SAT.2 |
618 |
Link Reliability of Satellite-To-Ground Free-Space Optical Communication Systems in South Korea |
| Kim, Jae |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
| WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| Kim, Kyo Hyun |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| Kim, Seung-Jun |
YSW.22 |
|
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization |
| MMO.3 |
330 |
Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery |
| WC2.3 |
368 |
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization |
| Kim, Seungjoo |
DEF.3 |
166 |
Do You Really Need to Disguise Normal Servers as Honeypots? |
| Kimberly, Greg |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| Kirk, Benjamin |
COG.2 |
186 |
Multi-Signal Classification Using Deep Learning and Sparse Arrays |
| Kirk, John |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
| Knopp, Andreas |
SAT.1 |
612 |
Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems |
| Knopp, Raymond |
MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
| Ko, Allan |
PCM.1 |
775 |
Rate Control With Autoregressive Forecasting for High Frequency Communication |
| Koivunen, Visa |
MC1.4 |
95 |
Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs |
| Kompella, Sastry |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
| S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
| SIG.2 |
907 |
SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence |
| Komulainen, Arwid |
RTN.4 |
247 |
Frequency-Hop-Coded SCB for Tactical Networks |
| Kose, Cenk |
CLD.3 |
938 |
Clustered Distributed Spatial Multiplexing |
| Kott, Alexander |
PHY.1 |
849 |
Mathematical Modeling of Cyber Resilience |
| PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
| Koutsopoulos, Iordanis |
SDN.4 |
125 |
Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs |
| Krishnamachari, Bhaskar |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
| Krishnan, Rajesh |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
| Kuklinski, Slawomir |
WS6: Paper Session.3 |
1024 |
5G-Enabled Defence-In-Depth for Multi-Domain Operations |
| Kulhandjian, Hovannes |
SIG.4 |
920 |
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection |
| Kulhandjian, Michel |
SIG.4 |
920 |
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection |
| Kumar, Neeraj |
WS3: Paper Session IV.3 |
61 |
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning |
| Kuperman, Gregory |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
| Kuperman, Gregory |
MC2.1 |
757 |
Improving Text Security Classification Towards an Automated Information Guard |
| Kurdziel, Michael |
STC.2 |
974 |
Statistical Analysis of the MK-3 Customizable Authenticated Encryption |
| Kurma, Sravani |
WS3: Paper Session III.1 |
37 |
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility |
| Kuzdeba, Scott |
WC2.2 |
362 |
Data-Centric Approaches to Radio Frequency Machine Learning |
| Kwon, Hyuck |
RTN.2 |
235 |
Allan Deviation of Social Learning Distributed Network Time Synchronization |
| YSW.6 |
661 |
Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO |
| L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| La Cour, Brian |
MMO.1 |
318 |
Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction |
| Lackpour, Alex |
COG.3 |
192 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems |
| Lan, Tian |
MLC.2 |
450 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
| YSW.19 |
743 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
| Lane, Steven |
WS7: Paper Session II (Cyber Threats against UAVs).1 |
1059 |
Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning |
| Lang, Andreas |
MC1.1 |
78 |
A Comprehensive Study of CPM Trellis Initialization Methods |
| Langus Rodríguez, David |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
| STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
| Lanham, S. Andrew |
MMO.1 |
318 |
Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction |
| Lankl, Berthold |
MC1.1 |
78 |
A Comprehensive Study of CPM Trellis Initialization Methods |
| Larson, Kevin |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
| LaSorte, Nickolas |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
| Latshaw, James |
WC1.1 |
298 |
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features |
| Lauer, Gregory |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
| Le, Anh |
NMS.1 |
515 |
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE |
| MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
| Leang, Kam |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
| Lee, Daniel |
MC1.3 |
89 |
Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations |
| Lee, Jae Min |
ROB.1 |
336 |
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach |
| ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
| Lee, Kennedy |
YSW.7 |
667 |
An Opportunistic Scheme for Low Probability of Detection Communication |
| Lee, Suhyeon |
DEF.3 |
166 |
Do You Really Need to Disguise Normal Servers as Honeypots? |
| Leung, Kin |
WC2.1 |
356 |
GAN-Based Detection of Adversarial EM Signal Waveforms |
| Levatich, Maxwell |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
| Lewis, Ambrose |
SIG.2 |
907 |
SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence |
| Li, Chengzhang |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
| Li, Chih-Peng |
WS3: Paper Session I.1 |
1 |
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks |
| WS3: Paper Session II.2 |
31 |
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications |
| WS3: Paper Session III.1 |
37 |
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility |
| Li, Jinyang |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
| Li, Wenhao |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
| Liang, Xueping |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
| Liberto, Luca |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
| Lichtman, Marc |
COG.1 |
180 |
The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin |
| Liu, Feng |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
| Liu, Lingjia |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
| S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
| Liu, Qingyu |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
| Liu, Shengzhong |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
| Liu, Xin |
WS3: Paper Session III.2 |
43 |
A Secured Protocol for IoT Devices in Tactical Networks |
| Liu, Xin |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
| Loevenich, Johannes |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
| ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
| Loos, Scott |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
| MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
| Lou, Wenjing |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
| Love, David |
RES.1 |
822 |
Receiver Diversity in LEO Satcom Constellations |
| Loveless, Thomas |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
| Lu, Ke |
WS3: Paper Session IV.4 |
66 |
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications |
| Lundy, April |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
| Luo, Yu |
NMS.3 |
529 |
Asymmetric Collision Phenomenon and Its Impact on Underwater Acoustic Networks |
| Lychev, Robert |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
| Lyon, Scott |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
| M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ma, Jiangang |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
| Ma, Laura |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
| Macker, Joseph |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
| RSN.1 |
799 |
Distributed Agent Consensus Performance in Resilient Communication Networks |
| Magalhães, José |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Mahmoud, Mohamed |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
| Mahmud, Maqsood |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
| Mainland, Geoffrey |
WC1.3 |
311 |
Radio Modulation Classification Using Deep Residual Neural Networks |
| Makara, Eric |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
| Malangone, Dane |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
| Mallik, Ranjan |
MMO.2 |
324 |
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems |
| Mancini, Federico |
PHY.3 |
861 |
Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks |
| Mandavilli, Sai Bhargav |
UAV.2 |
956 |
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks |
| Manjunath, B. |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
| Manso, Marco |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
| Maracchion, Christopher |
MCN.1 |
535 |
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks |
| Marcus, Kelvin |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Marfo, William |
FML.3 |
484 |
Network Anomaly Detection Using Federated Learning |
| Mark, Brian |
SAT.3 |
623 |
Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band |
| Marshall, Andrew |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
| Martin, Brandon |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
| Maxon, Sean |
YSW.4 |
649 |
Improving Quality of Service in a Mesh Network Using Age of Information |
| McEachen, John |
YSW.16 |
723 |
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications |
| McHenry, Mark |
COG.3 |
192 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems |
| Mckee, Sasha |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
| McMullen, Byron |
MMO.3 |
330 |
Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery |
| McNair, Janise |
UAV.2 |
956 |
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks |
| Meftah, Aida |
YSW.1 |
629 |
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks |
| Mei, Yongsheng |
MLC.2 |
450 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
| YSW.19 |
743 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
| Mendler, Bridgit |
RES.3 |
835 |
Near Term Resilient Teleports for DoD SATCOM |
| Meng, Dan |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
| Michaelis, James |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
| Minson, Zachary |
YSW.6 |
661 |
Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO |
| Mitchell, J. |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
| Modiano, Eytan |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
| Mohammed, Tajuddin Manhar |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
| Mohan, Sibin |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| Mohapatra, Prasant |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
| Molaschi, Andrea |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Molnar, Joe |
COG.3 |
192 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems |
| RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
| Moore, Megan |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
| Moore, Shirley |
FML.3 |
484 |
Network Anomaly Detection Using Federated Learning |
| Morman, Joshua |
COG.1 |
180 |
The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin |
| Morris, Carl |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
| Morris, Joel |
MC2.4 |
222 |
On the Limits of Learning a Discrete Memoryless Communication Channel |
| Mota, Vinícius |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
| Mukherjee, Amitav |
AJC.2 |
426 |
Jamming Vulnerability of Terahertz Wireless Networks |
| Mukkamala, Ravi |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
| Müller, Marcus |
COG.1 |
180 |
The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin |
| Muralidhar, Nikhil |
MC1.3 |
594 |
Efficient Generative Wireless Anomaly Detection for Next Generation Networks |
| Murphy, Brian |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
| N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Nanzer, Jeffrey |
DRF.2 |
496 |
A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays |
| Narayanan, Ram |
YSW.4 |
649 |
Improving Quality of Service in a Mesh Network Using Age of Information |
| Narula-Tam, Aradhana |
RTC.2 |
404 |
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks |
| RES.2 |
828 |
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies |
| Nataraj, Lakshmanan |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
| Naufal, Revin |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
| Navaroli, Martin |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
| Ng, Wee-Keong |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
| Nguyen, Kim Khoa |
MC2.3 |
769 |
Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems |
| PHY.4 |
867 |
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles |
| Nguyen, Quang |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
| Nguyen, Ti |
MC2.3 |
769 |
Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems |
| PHY.4 |
867 |
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles |
| Nguyen, Tien |
MC2.2 |
210 |
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment |
| Nia, Omid |
SAT.3 |
623 |
Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band |
| Nilsson, Jan |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
| WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Noubir, Guevara |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
| O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| O'Shea, Timothy |
MC1.3 |
594 |
Efficient Generative Wireless Anomaly Detection for Next Generation Networks |
| Ochiai, Hideki |
MC2.3 |
216 |
A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels |
| Olowononi, Felix |
MC2.2 |
763 |
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications |
| Olsen, Nathan |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
| Olsen, Randall |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
| Oprea, Alina |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
| Osipychev, Denis |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| Ota, Daniel |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
| Ould-Slimane, Hakima |
WS3: Paper Session IV.1 |
49 |
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption |
| Ouyang, Chongjun |
SEC.4 |
393 |
Some Discussions on PHY Security in DF Relay |
| Ozturk, Yusuf |
UAV.3 |
962 |
An Architectural Design for Autonomous and Networked Drones |
| P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Pabon, Juan |
AIR.1 |
133 |
Air-Aided Communication Between Ground Assets in a Poisson Forest |
| Pajic, Miroslav |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| Pandya, Julee |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
| Pano, Vasil |
WC1.3 |
311 |
Radio Modulation Classification Using Deep Residual Neural Networks |
| Papageorgiou, Yiannis |
SDN.4 |
125 |
Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs |
| Papalexakis, Evangelos |
ATT.3 |
999 |
TensorShield: Tensor-Based Defense Against Adversarial Attacks on Images |
| Papavassiliou, Symeon |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
| Paris, Bernd-Peter |
AJC.3 |
431 |
Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications |
| Parker, Travis |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
| Paruchuri, Vineetha |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
| Pattar, Sudhir |
AJC.4 |
437 |
5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference |
| Perazzone, Jake |
CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
| Persons, Jeffrey |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
| Petroccia, Roberto |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Pham, Khanh |
MC2.2 |
210 |
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment |
| DRF.3 |
501 |
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs |
| SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
| Pietraski, Philip |
AJC.4 |
437 |
5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference |
| Plusquellic, Jim |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
| Poltronieri, Filippo |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Polydoros, Andreas |
CLD.3 |
938 |
Clustered Distributed Spatial Multiplexing |
| Popescu, Dimitrie |
WC1.1 |
298 |
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features |
| Prasad, Manoj |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
| Pu, Lina |
NMS.3 |
529 |
Asymmetric Collision Phenomenon and Its Impact on Underwater Acoustic Networks |
| Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Qing, Chaojin |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
| R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Rabe, Mark |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
| Radosevic, Dusan |
S&R.2 |
879 |
Toward Congestion Control in Lossy Networks via Local Queue-Management Policies |
| Rahman, Abdul |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
| Rahman, Aisha |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
| Rahman, Md. Hasan |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
| Rahman, Mohammad Ashiqur |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
| Ramakrishnan, Narendran |
MC1.3 |
594 |
Efficient Generative Wireless Anomaly Detection for Next Generation Networks |
| Ramlall, Sunil |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
| Ranjbar, Mohammad |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
| Ranstrom, Thomas |
AJC.4 |
437 |
5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference |
| Rao, Chuangui |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
| Rashid, Mohammed |
DRF.2 |
496 |
A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays |
| Rathinavel, Gopikrishna |
MC1.3 |
594 |
Efficient Generative Wireless Anomaly Detection for Next Generation Networks |
| Rawat, Danda |
MC2.2 |
763 |
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications |
| Rayala, Sai Sree |
S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
| Rayermann, Patrick |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
| Reddy, Achyut |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
| Reed, Jeffrey |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
| Reising, Donald |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
| Restuccia, Francesco |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
| Rettore, Paulo Henrique |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
| ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
| Rigolin F. Lopes, Roberto |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
| ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
| Rivas, Veronica |
DCA.2 |
|
Automatic Data Generation and Rule Creation for Network Scanning Tools |
| Robinson, Joshua |
WC2.2 |
362 |
Data-Centric Approaches to Radio Frequency Machine Learning |
| Rogers, Darren |
MCN.2 |
541 |
Manipulating the Automatic Identification System With Extremely Low-Cost Hardware |
| Rowe, David |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
| Royster, Thomas |
RTC.2 |
404 |
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks |
| RES.1 |
822 |
Receiver Diversity in LEO Satcom Constellations |
| RES.2 |
828 |
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies |
| Ryu, Bo |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
| NMS.1 |
515 |
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE |
| MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
| S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Sadeghi, Koosha |
ATT.4 |
1005 |
Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems |
| Sadler, Brian |
MC2.2 |
763 |
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications |
| Sagduyu, Yalin |
WS2: Paper Session I.1 |
13 |
Sensing-Throughput Tradeoffs With Generative Adversarial Networks for NextG Spectrum Sharing |
| MCN.3 |
547 |
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems |
| WS7: Paper Session III (Machine Learning Services).2 |
1076 |
Adversarial Machine Learning and Defense Game for NextG Signal Classification With Deep Learning |
| Sai Teja, Kolliboina |
YSW.11 |
693 |
Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off |
| Saikia, Prajwalita |
WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
| Samson, Judith |
RTC.1 |
398 |
SCRIP: Safe and Cycle-Free Multi-Path Routing |
| Sayed, Ahmed |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
| Schalk, Adrian |
ROB.3 |
350 |
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture |
| Schmitt, Corinna |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
| Schotten, Hans |
PCM.4 |
793 |
Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks |
| Schraml, Matthias |
SAT.1 |
612 |
Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems |
| Selim, Mohamed |
YSW.13 |
705 |
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach |
| Seth, Sayanta |
DRF.4 |
507 |
Forming Coalition Sets From Directional Radios |
| Shake, Thomas |
RTC.2 |
404 |
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks |
| RES.2 |
828 |
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies |
| Shan, Tao |
RSN.4 |
817 |
Coverage Estimation for Secure Ultraviolet Communication |
| Sharif, Sana |
WS3: Paper Session I.2 |
7 |
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks |
| Sharma, Prabhat |
WS3: Paper Session III.1 |
37 |
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility |
| Sharma, Salil |
MC1.4 |
95 |
Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs |
| Shashidhar, Bharath |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
| Shebert, Samuel |
COG.2 |
186 |
Multi-Signal Classification Using Deep Learning and Sparse Arrays |
| Shen, Dan |
MC2.2 |
210 |
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment |
| DRF.3 |
501 |
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs |
| Shetty, Sachin |
MLC.4 |
464 |
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness |
| 5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
| Shi, Yi |
WS2: Paper Session I.1 |
13 |
Sensing-Throughput Tradeoffs With Generative Adversarial Networks for NextG Spectrum Sharing |
| Shrader, Brooke |
PCM.1 |
775 |
Rate Control With Autoregressive Forecasting for High Frequency Communication |
| Sidoran, James L. |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
| Sigholm, Johan |
YSW.9 |
679 |
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North |
| Sikora, Paul |
ANT.3 |
606 |
On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies |
| Silvius, Mark |
COG.3 |
192 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems |
| Singh, Keshav |
WS3: Paper Session I.1 |
1 |
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks |
| WS3: Paper Session II.2 |
31 |
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications |
| WS3: Paper Session III.1 |
37 |
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility |
| WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
| Singh, Satinder |
MC2.3 |
769 |
Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems |
| PHY.4 |
867 |
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles |
| Siraj, Md Sadman |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
| Smith, Brad |
RTC.1 |
398 |
SCRIP: Safe and Cycle-Free Multi-Path Routing |
| Smith, Daniel |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
| Smith, Sidney |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
| Snoap, John |
WC1.1 |
298 |
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features |
| Sole, Robert |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
| Song, Aijun |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
| Song, Daniel |
YSW.18 |
735 |
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures |
| Song, William |
YSW.18 |
735 |
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures |
| Sousa Dias, Paulo |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Spelter, Florian |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
| Spooner, Chad |
WC1.1 |
298 |
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features |
| Srivastava, Mani |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
| Sruti, S |
YSW.11 |
693 |
Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off |
| Stahlbuhk, Thomas |
PCM.1 |
775 |
Rate Control With Autoregressive Forecasting for High Frequency Communication |
| Stefanelli, Cesare |
WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
| Stein, David |
SEC.1 |
374 |
Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments |
| Sterner, Ulf |
RTN.4 |
247 |
Frequency-Hop-Coded SCB for Tactical Networks |
| Stevens, Nathan |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
| Stinco, Pietro |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Stokes, Jack |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
| Stone, Kerri |
WS3: Paper Session II.1 |
25 |
Positive and Unlabeled Learning for Mobile Application Traffic Classification |
| Stowell, Kate |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
| Sun, Jun |
RTC.2 |
404 |
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks |
| RES.2 |
828 |
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies |
| Suri, Niranjan |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
| WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
| WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
| Sweeney, Matthew |
YSW.3 |
643 |
Securing Software Updates Under Receiver Radio Frequency Geolocation Risk |
| Szczypiorski, Krzysztof |
WS6: Paper Session.3 |
1024 |
5G-Enabled Defence-In-Depth for Multi-Domain Operations |
| T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Taghizadeh, Omid |
WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
| Taha, Mohamed A. |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
| Talhi, Chamseddine |
WS3: Paper Session IV.1 |
49 |
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption |
| YSW.1 |
629 |
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks |
| Tang, Shuhai |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
| Tang, Zixian |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
| Tchakountio, Fabrice |
SIG.2 |
907 |
SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence |
| Tesei, Alessandra |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
| Thapa, Bishal |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
| MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
| Thornton, Charles |
COG.4 |
198 |
Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming |
| Tope, Michael |
MC2.4 |
222 |
On the Limits of Learning a Discrete Memoryless Communication Channel |
| Tortonesi, Mauro |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
| WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
| WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Tosh, Deepak |
ONC.4 |
273 |
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks |
| FML.3 |
484 |
Network Anomaly Detection Using Federated Learning |
| Tosun, Mustafa |
UAV.3 |
962 |
An Architectural Design for Autonomous and Networked Drones |
| Towliat, Mohammad |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
| Tran, Lan |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
| Tran, Nghi |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
| Tränkler, Maximilian |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
| Tripathi, Nishith |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
| Tsiropoulou, Eirini Eleni |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
| Tummala, Murali |
YSW.16 |
723 |
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications |
| Turck, Kurt |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
| Tyler, Joshua |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
| U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Uluagac, Selcuk |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
| STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
| Upthegrove, Tim |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
| MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
| V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Valdez Mendoza, Jonathan |
UAV.2 |
956 |
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks |
| Valenti, Matthew |
AIR.1 |
133 |
Air-Aided Communication Between Ground Assets in a Poisson Forest |
| Valieva, Inna |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
| Van Hau, Le |
PHY.4 |
867 |
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles |
| Vandekerckhove, Joachim |
PHY.1 |
849 |
Mathematical Modeling of Cyber Resilience |
| PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
| Vanderveen, Michaela |
5GS.2 |
565 |
Threat Framework for 5G Cellular Communications |
| Veeravalli, Venugopal |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
| Veksler, Maryna |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
| STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
| Venkataramani, Guru |
MLC.2 |
450 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
| YSW.19 |
743 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
| Venkatesan, Sridhar |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
| Vigil, A |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
| Voitenko, Iurii |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
| Vosoughi, Azadeh |
DRF.4 |
507 |
Forming Coalition Sets From Directional Radios |
| Vu, Bich |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
| W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Wang, Angela |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
| SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
| Wang, Jiafan |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
| Wang, Lan |
YSW.12 |
699 |
NDNSD: Service Publishing and Discovery in NDN |
| Wang, Qiang |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
| Wang, Shuyi |
WS3: Paper Session IV.4 |
66 |
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications |
| Wang, Tianshi |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
| Wang, Wei |
WS3: Paper Session III.2 |
43 |
A Secured Protocol for IoT Devices in Tactical Networks |
| Wang, Wen |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
| Wang, Yuhui |
UAV.1 |
950 |
Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications |
| Wang, Zheng |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
| Weisman, Michael |
PHY.1 |
849 |
Mathematical Modeling of Cyber Resilience |
| PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
| Weiss, Martin |
YSW.17 |
729 |
Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access |
| Weitzen, Jay |
SEC.1 |
374 |
Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments |
| Weston, Jeffery |
RSN.1 |
799 |
Distributed Agent Consensus Performance in Resilient Communication Networks |
| White, Zachary |
YSW.16 |
723 |
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications |
| Whitehead, James |
RSN.2 |
805 |
A Novel Resilient HF Data Communications Architecture |
| Wibisono, Andre |
FML.1 |
470 |
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings |
| Wiens, Brett |
MC1.3 |
89 |
Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations |
| Winters, Jack |
MMO.2 |
324 |
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems |
| Wissingh, Bastiaan |
WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
| Wong, Lauren |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
| Wood, Andrew |
MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
| Wood, John |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
| Woods, Timothy |
MCN.1 |
535 |
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks |
| Wrona, Konrad |
WS6: Paper Session.3 |
1024 |
5G-Enabled Defence-In-Depth for Multi-Domain Operations |
| WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
| Wu, Eugene |
YSW.18 |
735 |
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures |
| X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Xia, Xianggen |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
| Xiao, Yu |
MC1.2 |
84 |
Polynomial Phase Modulation Based NOMA |
| Xu, Hao |
SEC.4 |
393 |
Some Discussions on PHY Security in DF Relay |
| Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Yahja, Alex |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
| Yan, Jonmei |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
| Yan, Wenjuan |
WS3: Paper Session IV.4 |
66 |
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications |
| Yang, Hanchao |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
| Yang, Hongwen |
SEC.4 |
393 |
Some Discussions on PHY Security in DF Relay |
| Yang, Na |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
| Yang, Ryan |
FML.1 |
470 |
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings |
| Yang, Yaling |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
| Yener, Aylin |
RTN.1 |
229 |
Peak Age of Information With Receiver Induced Service Interruptions |
| Yi, Yang |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
| Ying, Lingyun |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
| Younis, Mohamed |
YSW.14 |
711 |
Data-Driven Wireless Anomaly Detection Using Spectral Features |
| Yu, Aimin |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
| Yu, Paul |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
| Yu, Xi |
AIR.1 |
133 |
Air-Aided Communication Between Ground Assets in a Poisson Forest |
| Yuksel, Murat |
DRF.4 |
507 |
Forming Coalition Sets From Directional Radios |
| Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Zabele, Stephen |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
| Zaccarini, Mattia |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
| Zang, Xujie |
SEC.4 |
393 |
Some Discussions on PHY Security in DF Relay |
| Zeadally, Sherali |
WS3: Paper Session I.2 |
7 |
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks |
| Zhai, Haotian |
AJC.3 |
431 |
Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications |
| Zhang, Huan |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
| Zhang, Huanle |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
| Zhang, Jianzhong |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
| S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
| Zhang, Mi |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
| Zhang, Peng |
S&R.2 |
879 |
Toward Congestion Control in Lossy Networks via Local Queue-Management Policies |
| Zhang, Xi |
CLD.4 |
944 |
Lyapunov Stability Analyses for Controlling UAV Trajectory Over 6G Mobile Wireless Networks |
| Zhao, Lixin |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
| Zhu, Qixuan |
CLD.4 |
944 |
Lyapunov Stability Analyses for Controlling UAV Trajectory Over 6G Mobile Wireless Networks |
| Zhu, Quanyan |
5GS.3 |
571 |
MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks |
| Zhu, Ting |
WS3: Paper Session III.2 |
43 |
A Secured Protocol for IoT Devices in Tactical Networks |
| Znati, Taieb |
YSW.17 |
729 |
Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access |
| Zou, Cliff |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
| Zulkernine, Mohammad |
NMS.2 |
522 |
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments |