Author |
Session |
Start page |
Title |
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Abbas, Adeeb |
MILCOM 2022 Track 5: WC1.3 |
311 |
Radio Modulation Classification Using Deep Residual Neural Networks |
Abdelmawla, Ibrahim |
YSW.13 |
705 |
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach |
Abdelzaher, Tarek |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
Abdurrahman, Muhammad |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
Acosta, Jaime |
DCA.2 |
|
Automatic Data Generation and Rule Creation for Network Scanning Tools |
DEF.1 |
154 |
Locally-Hosted Fidelity-Adaptive Honeypots With Connection-Preserving Capabilities |
Ahmed, Muddasar |
5GS.2 |
565 |
Threat Framework for 5G Cellular Communications |
Ahmed, Shakil |
YSW.13 |
705 |
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach |
Ajakwe, Simeon |
ROB.1 |
336 |
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach |
Akbar, Monika |
DCA.2 |
|
Automatic Data Generation and Rule Creation for Network Scanning Tools |
Åkerberg, Johan |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
Akkaya, Kemal |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
Akter, Rubina |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
Alghamdi, Abdulmajeed |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
Alkandari, Shaikha |
AIR.1 |
133 |
Air-Aided Communication Between Ground Assets in a Poisson Forest |
Alkhowaiter, Mohammed |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
Almubarak, Khalid |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
Alves, João |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Alyami, Mnassar |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
Amin, Moeness |
COG.2 |
186 |
Multi-Signal Classification Using Deep Learning and Sparse Arrays |
Anderson, Cleon |
CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
Anderson, Gustave |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
Ara, Israt |
STC.1 |
968 |
An Intelligent and Private 6G Air Interface Using Physical Layer Security |
Aris, Ahmet |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
Ashdown, Andrew |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
Ashdown, Jonathan |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
Atkin, Guillermo |
MC1.2 |
84 |
Polynomial Phase Modulation Based NOMA |
Axell, Erik |
MC2.1 |
204 |
Reduced Complexity Adaptive Demodulation in Impulse Noise Channels |
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Badr, Mahmoud |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
Baker, Patrick |
FML.1 |
470 |
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings |
Baksaas, Magnus |
PHY.3 |
861 |
Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks |
Bandara, Eranga |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
Banerjee, Ayan |
ATT.4 |
1005 |
Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems |
Banik, Sejuti |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
Banks, Jeremy |
NMS.2 |
522 |
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments |
Bao, Huaifeng |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
Barber, Don |
MCN.2 |
541 |
Manipulating the Automatic Identification System With Extremely Low-Cost Hardware |
YSW.16 |
723 |
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications |
Barry, John |
YSW.7 |
667 |
An Opportunistic Scheme for Low Probability of Detection Communication |
Barz, Christoph |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Bastian, Nathaniel |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
Bernardin, Fred |
MC2.1 |
757 |
Improving Text Security Classification Towards an Automated Information Guard |
Bhandarkar, Adhitya Bantwal |
WS7: Paper Session II (Cyber Threats against UAVs).1 |
1059 |
Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning |
Bharadwaj, Ramesh |
YSW.4 |
649 |
Improving Quality of Service in a Mesh Network Using Age of Information |
Bieniasz, Jedrzej |
WS6: Paper Session.3 |
1024 |
5G-Enabled Defence-In-Depth for Multi-Domain Operations |
Bingol, Ece |
RTN.1 |
229 |
Peak Age of Information With Receiver Induced Service Interruptions |
Biswas, Pialy |
MMO.2 |
324 |
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems |
Biswas, Sudip |
WS3: Paper Session I.1 |
1 |
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks |
WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
Björkman, Mats |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
Blasch, Erik |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
DRF.3 |
501 |
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs |
Block, Frederick |
RES.1 |
822 |
Receiver Diversity in LEO Satcom Constellations |
Bode, Jonas |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
Borges de Sousa, João |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Boschetti, Nicolò |
YSW.9 |
679 |
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North |
Bouzabia, Hamda |
YSW.5 |
655 |
Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems |
Bradley, Eli |
MMO.1 |
318 |
Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction |
Breedy, Maggie R |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
Bristow, Austin |
YSW.2 |
635 |
A Robust Self-Synchronized Quantum Key Distribution Protocol |
Brodnik, Luke |
ROB.3 |
350 |
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture |
Brotzman, Robert |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
Brown, Dane |
ROB.3 |
350 |
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture |
Brown, David |
WS6: Paper Session.4 |
1030 |
Base Station Deployment Optimization in Federated Networks With Multi-Hop Communication |
Brown, Eric |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
Brown, Scott |
CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
Brunnenmeyer, David |
RES.3 |
835 |
Near Term Resilient Teleports for DoD SATCOM |
Budhiraja, Ishan |
WS3: Paper Session IV.3 |
61 |
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning |
Budianu, Cristian |
NMS.1 |
515 |
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE |
Buehrer, R. Michael |
COG.2 |
186 |
Multi-Signal Classification Using Deep Learning and Sparse Arrays |
COG.4 |
198 |
Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming |
YSW.15 |
717 |
Decentralized Bandits With Feedback for Cognitive Radar Networks |
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Cabuk, Umut |
UAV.3 |
962 |
An Architectural Design for Autonomous and Networked Drones |
Cai, Lijun |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
Calderbank, Robert |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
Camp, L Jean |
YSW.10 |
687 |
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making |
Camp, Tracy |
WS3: Paper Session II.1 |
25 |
Positive and Unlabeled Learning for Mobile Application Traffic Classification |
Campbell, Jared |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
Campioni, Lorenzo |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
Castanares, Anthony |
ONC.4 |
273 |
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks |
Castellanos, Miguel |
S&R.4 |
895 |
Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks |
Castro, Alejandro |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
Caven, Peter |
YSW.10 |
687 |
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making |
Chache, Frederick |
YSW.4 |
649 |
Improving Quality of Service in a Mesh Network Using Age of Information |
Chadha, Ritu |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
Chan, Kevin |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
Chandrasekaran, Shiv |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
Chang, Hao-Hsuan |
S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
Chang, Tammy |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
Chaudhary, Rajat |
WS3: Paper Session IV.3 |
61 |
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning |
Chen, Genshe |
MC2.2 |
210 |
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment |
DRF.3 |
501 |
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs |
Chen, Hao |
YSW.22 |
|
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization |
WC2.3 |
368 |
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization |
Chen, Hao |
S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
Chen, Jinliang |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
Chen, Kwang-Cheng |
YSW.2 |
635 |
A Robust Self-Synchronized Quantum Key Distribution Protocol |
Chen, Ta |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
Cheng, Bow-Nan |
YSW.18 |
735 |
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures |
Cheng, Julian |
RSN.4 |
817 |
Coverage Estimation for Secure Ultraviolet Communication |
Cheng, Xiang |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
Chi, Zicheng |
WS3: Paper Session III.2 |
43 |
A Secured Protocol for IoT Devices in Tactical Networks |
Chieh, Sam |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
Chikkagoudar, Satish |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
Chowdhury, Rasel |
WS3: Paper Session IV.1 |
49 |
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption |
Cimini, Leonard |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
Clark, Lillian |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
Cleverly, Griffin |
RES.3 |
835 |
Near Term Resilient Teleports for DoD SATCOM |
Coleman, Jared |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
Consul, Prakhar |
WS3: Paper Session IV.3 |
61 |
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning |
Corcoran, John |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
Cramer, Eelco |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Crandall, Kyle |
RSN.1 |
799 |
Distributed Agent Consensus Performance in Resilient Communication Networks |
Crouse, David |
ANT.3 |
606 |
On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies |
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
D'Amours, Claude |
SIG.4 |
920 |
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection |
Dagdeviren, Orhan |
UAV.3 |
962 |
An Architectural Design for Autonomous and Networked Drones |
Dandekar, Kapil |
WC1.3 |
311 |
Radio Modulation Classification Using Deep Residual Neural Networks |
Das, Debarun |
YSW.17 |
729 |
Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access |
Davaslioglu, Kemal |
MCN.3 |
547 |
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems |
Dawson, Bryan |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
De, Swades |
YSW.21 |
751 |
SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels |
De Lucia, Michael |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
del Aguila, Alvaro |
UAV.2 |
956 |
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks |
Deshpande, Rasika |
WS3: Paper Session II.2 |
31 |
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications |
Diamanti, Maria |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
Ding, Steven |
NMS.2 |
522 |
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments |
Djurica, Miodrag |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
Do, Tri Nhu |
YSW.1 |
629 |
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks |
YSW.5 |
655 |
Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems |
Doan, Van-Sang |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
Draxler, Paul |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
Dreo Rodosek, Gabi |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
Drijver, Floris |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
Drocella, Edward |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
Drozd, Andrew |
MCN.1 |
535 |
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks |
DSouza, Daniel |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
Du, Haizhou |
FML.1 |
470 |
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings |
Dubey, Rajrshi |
YSW.21 |
751 |
SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels |
Dulal, Saurab |
YSW.12 |
699 |
NDNSD: Service Publishing and Discovery in NDN |
Duran, David |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
Dussault, Heather |
ANT.3 |
606 |
On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies |
Dwyer, Matthew |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
Dzhezyan, Gregory |
SIG.4 |
920 |
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection |
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Eck, Christopher |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
Eckhardt, Josh |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
Edwards, Stephen |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
Ejaz, Waleed |
WS3: Paper Session I.2 |
7 |
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks |
Ekström, Mikael |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
El-Jamous, Ziad |
MCN.3 |
547 |
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems |
Eliardsson, Patrik |
MC2.1 |
204 |
Reduced Complexity Adaptive Demodulation in Impulse Noise Channels |
Elkadi, Melissa |
NMS.1 |
515 |
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE |
MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
Ellis, Jason |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
Enoch, Michael |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
Entezari, Negin |
ATT.3 |
999 |
TensorShield: Tensor-Based Defense Against Adversarial Attacks on Images |
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Fadul, Mohamed |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
Falco, Gregory |
YSW.9 |
679 |
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North |
Falcon, Edward |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
Fang, Yudong |
WS6: Paper Session.4 |
1030 |
Base Station Deployment Optimization in Federated Networks With Multi-Hop Communication |
Farkouh, Raif |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
Farooq, Junaid |
UAV.1 |
950 |
Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications |
Fawaz, Kassem |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
Feder, Andreas |
SIG.3 |
913 |
Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics |
Ferri, Gabriele |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Fioravanti, Stefano |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Flin, Benjamin |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
Forero, Pedro |
S&R.2 |
879 |
Toward Congestion Control in Lossy Networks via Local Queue-Management Policies |
Fowler, Michael |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
Foytik, Peter |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
Frisbie, Stephan |
YSW.14 |
711 |
Data-Driven Wireless Anomaly Detection Using Spectral Features |
Fritz, Tobias |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
Fronteddu, Roberto |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Fu, Frank |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
Fu, Xinzhe |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
Funai, Colin |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
Furfaro, Thomas |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Furman, Sean |
MCN.1 |
535 |
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks |
Furtak, Janusz |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Gao, Yue |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
Garcia-Luna-Aceves, Jj |
RTC.1 |
398 |
SCRIP: Safe and Cycle-Free Multi-Path Routing |
Gaydos, Matthew |
RES.1 |
822 |
Receiver Diversity in LEO Satcom Constellations |
Ge, Yunfei |
5GS.3 |
571 |
MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks |
Gerstacker, Wolfgang |
SIG.3 |
913 |
Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics |
Ghorbanzadeh, Michael |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
Giridhar, K |
YSW.11 |
693 |
Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off |
Gkelias, Athanasios |
WC2.1 |
356 |
GAN-Based Detection of Adversarial EM Signal Waveforms |
Gogineni, Kailash |
MLC.2 |
450 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
YSW.19 |
743 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
Golam, Mohtasin |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
Gold, Kimberly |
MLC.4 |
464 |
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness |
Gopavaram, Shakthidhar Reddy |
YSW.10 |
687 |
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making |
Gordon, Nathaniel |
YSW.9 |
679 |
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North |
Graves, Eric |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
Gregris, Jessica |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
Grönkvist, Jimmi |
RTN.4 |
247 |
Frequency-Hop-Coded SCB for Tactical Networks |
Grothendieck, John |
MC2.1 |
757 |
Improving Text Security Classification Towards an Automated Information Guard |
Grov, Gudmund |
PHY.3 |
861 |
Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks |
Guerra, Barbara |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
Guo, Zheng |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
Gupta, Sandeep |
ATT.4 |
1005 |
Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems |
Gurevich, Marina |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Haddadin, Osama |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
Hagenhoff, Klement |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
Hägglund, Kristoffer |
MC2.1 |
204 |
Reduced Complexity Adaptive Demodulation in Impulse Noise Channels |
Hale, Britta |
YSW.3 |
643 |
Securing Software Updates Under Receiver Radio Frequency Geolocation Risk |
Hao, Xing |
MC1.2 |
84 |
Polynomial Phase Modulation Based NOMA |
Haque, Md Ariful |
MLC.4 |
464 |
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness |
Hauge, Mariann |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Hawkins, Matthew |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
Hayden, Blake |
YSW.3 |
643 |
Securing Software Updates Under Receiver Radio Frequency Geolocation Risk |
Hazarika, Bishmita |
WS3: Paper Session I.1 |
1 |
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks |
Headley, William |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
AJC.1 |
418 |
Considerations of Reinforcement Learning Within Real-Time Wireless Communication Systems |
Heath, Robert |
S&R.4 |
895 |
Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks |
Heintz, Ilana |
MC2.1 |
757 |
Improving Text Security Classification Towards an Automated Information Guard |
Hills, Gerald |
DEF.2 |
160 |
A Customized Approach to Cybersecurity Education for Space Professionals |
Hirschbeck, Martin |
SIG.3 |
913 |
Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics |
Ho, Samson |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
Hossain, Mahmud |
DCA.2 |
|
Automatic Data Generation and Rule Creation for Network Scanning Tools |
Hou, Thomas |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
Howard, William |
YSW.15 |
717 |
Decentralized Bandits With Feedback for Cognitive Radar Networks |
Huang, Chao |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
Huang, Orton |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
Huang, Wan-Jen |
WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
Hulede, Ian Ellis |
RTN.2 |
235 |
Allan Deviation of Social Learning Distributed Network Time Synchronization |
Hürten, Tobias |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
Hussey, Jason |
WS3: Paper Session II.1 |
25 |
Positive and Unlabeled Learning for Mobile Application Traffic Classification |
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ihekoronye, Vivian Ukamaka |
ROB.1 |
336 |
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach |
Inshi, Saad |
WS3: Paper Session IV.1 |
49 |
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption |
Izmailov, Rauf |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Jakubisin, Daniel |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
Jalaian, Brian |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
Javorsek, Daniel |
MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
Jayaweera, Sudharman |
WS7: Paper Session II (Cyber Threats against UAVs).1 |
1059 |
Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning |
Jha, Susmit |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
Jiang, Wei |
PCM.4 |
793 |
Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks |
Jin, Heng |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
Jones, Alyse |
AJC.1 |
418 |
Considerations of Reinforcement Learning Within Real-Time Wireless Communication Systems |
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Kaasen, Andreas |
PHY.3 |
861 |
Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks |
Kaddoum, Georges |
YSW.1 |
629 |
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks |
YSW.5 |
655 |
Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems |
Kalke, Martine |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
Kamal, Ahmed |
YSW.13 |
705 |
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach |
Kamhoua, Charles |
MLC.4 |
464 |
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness |
MC2.2 |
763 |
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications |
Kaminski, John |
SEC.1 |
374 |
Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments |
Kaneko, Masayuki |
MC2.3 |
216 |
A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels |
Kanth, Vikram |
MCN.2 |
541 |
Manipulating the Automatic Identification System With Extremely Low-Cost Hardware |
Kaplan, Lance |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
Kaplan, Michael |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
Kara, Denizhan |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
Karaliopoulos, Merkourios |
SDN.4 |
125 |
Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs |
Karam, Andrew |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
Katwe, Mayur |
WS3: Paper Session II.2 |
31 |
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications |
Kaviani, Saeed |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
Kelley, Brian |
STC.1 |
968 |
An Intelligent and Private 6G Air Interface Using Physical Layer Security |
Kerber, Maxwell |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
Kerr, Ryan |
NMS.2 |
522 |
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments |
Khalil, Dahesh |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
Kholidy, Hisham A. |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
Kiamari, Mehrdad |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
Kiciman, Emre |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
Kim, Deokseong |
MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
Kim, Dohyun |
S&R.4 |
895 |
Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks |
Kim, Dong Seong |
ROB.1 |
336 |
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
Kim, Gyuwan |
SAT.2 |
618 |
Link Reliability of Satellite-To-Ground Free-Space Optical Communication Systems in South Korea |
Kim, Hoon |
SAT.2 |
618 |
Link Reliability of Satellite-To-Ground Free-Space Optical Communication Systems in South Korea |
Kim, Jae |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
Kim, Kyo Hyun |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
Kim, Seung-Jun |
YSW.22 |
|
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization |
MMO.3 |
330 |
Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery |
WC2.3 |
368 |
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization |
Kim, Seungjoo |
DEF.3 |
166 |
Do You Really Need to Disguise Normal Servers as Honeypots? |
Kimberly, Greg |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
Kirk, Benjamin |
COG.2 |
186 |
Multi-Signal Classification Using Deep Learning and Sparse Arrays |
Kirk, John |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
Knopp, Andreas |
SAT.1 |
612 |
Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems |
Knopp, Raymond |
MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
Ko, Allan |
PCM.1 |
775 |
Rate Control With Autoregressive Forecasting for High Frequency Communication |
Koivunen, Visa |
MC1.4 |
95 |
Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs |
Kompella, Sastry |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
SIG.2 |
907 |
SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence |
Komulainen, Arwid |
RTN.4 |
247 |
Frequency-Hop-Coded SCB for Tactical Networks |
Kose, Cenk |
CLD.3 |
938 |
Clustered Distributed Spatial Multiplexing |
Kott, Alexander |
PHY.1 |
849 |
Mathematical Modeling of Cyber Resilience |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
Koutsopoulos, Iordanis |
SDN.4 |
125 |
Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs |
Krishnamachari, Bhaskar |
WS7: Paper Session III (Machine Learning Services).1 |
1070 |
Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things |
Krishnan, Rajesh |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
Kuklinski, Slawomir |
WS6: Paper Session.3 |
1024 |
5G-Enabled Defence-In-Depth for Multi-Domain Operations |
Kulhandjian, Hovannes |
SIG.4 |
920 |
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection |
Kulhandjian, Michel |
SIG.4 |
920 |
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection |
Kumar, Neeraj |
WS3: Paper Session IV.3 |
61 |
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning |
Kuperman, Gregory |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
Kuperman, Gregory |
MC2.1 |
757 |
Improving Text Security Classification Towards an Automated Information Guard |
Kurdziel, Michael |
STC.2 |
974 |
Statistical Analysis of the MK-3 Customizable Authenticated Encryption |
Kurma, Sravani |
WS3: Paper Session III.1 |
37 |
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility |
Kuzdeba, Scott |
WC2.2 |
362 |
Data-Centric Approaches to Radio Frequency Machine Learning |
Kwon, Hyuck |
RTN.2 |
235 |
Allan Deviation of Social Learning Distributed Network Time Synchronization |
YSW.6 |
661 |
Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO |
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
La Cour, Brian |
MMO.1 |
318 |
Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction |
Lackpour, Alex |
COG.3 |
192 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems |
Lan, Tian |
MLC.2 |
450 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
YSW.19 |
743 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
Lane, Steven |
WS7: Paper Session II (Cyber Threats against UAVs).1 |
1059 |
Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning |
Lang, Andreas |
MC1.1 |
78 |
A Comprehensive Study of CPM Trellis Initialization Methods |
Langus Rodríguez, David |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
Lanham, S. Andrew |
MMO.1 |
318 |
Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction |
Lankl, Berthold |
MC1.1 |
78 |
A Comprehensive Study of CPM Trellis Initialization Methods |
Larson, Kevin |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
LaSorte, Nickolas |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
Latshaw, James |
WC1.1 |
298 |
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features |
Lauer, Gregory |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
Le, Anh |
NMS.1 |
515 |
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE |
MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
Leang, Kam |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
Lee, Daniel |
MC1.3 |
89 |
Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations |
Lee, Jae Min |
ROB.1 |
336 |
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
Lee, Kennedy |
YSW.7 |
667 |
An Opportunistic Scheme for Low Probability of Detection Communication |
Lee, Suhyeon |
DEF.3 |
166 |
Do You Really Need to Disguise Normal Servers as Honeypots? |
Leung, Kin |
WC2.1 |
356 |
GAN-Based Detection of Adversarial EM Signal Waveforms |
Levatich, Maxwell |
DCA.3 |
285 |
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification |
Lewis, Ambrose |
SIG.2 |
907 |
SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence |
Li, Chengzhang |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
Li, Chih-Peng |
WS3: Paper Session I.1 |
1 |
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks |
WS3: Paper Session II.2 |
31 |
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications |
WS3: Paper Session III.1 |
37 |
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility |
Li, Jinyang |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
Li, Wenhao |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
Liang, Xueping |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
Liberto, Luca |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
Lichtman, Marc |
COG.1 |
180 |
The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin |
Liu, Feng |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
Liu, Lingjia |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
Liu, Qingyu |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
Liu, Shengzhong |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
Liu, Xin |
WS3: Paper Session III.2 |
43 |
A Secured Protocol for IoT Devices in Tactical Networks |
Liu, Xin |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
Loevenich, Johannes |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
Loos, Scott |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
Lou, Wenjing |
S&R.3 |
887 |
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm |
Love, David |
RES.1 |
822 |
Receiver Diversity in LEO Satcom Constellations |
Loveless, Thomas |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
Lu, Ke |
WS3: Paper Session IV.4 |
66 |
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications |
Lundy, April |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
Luo, Yu |
NMS.3 |
529 |
Asymmetric Collision Phenomenon and Its Impact on Underwater Acoustic Networks |
Lychev, Robert |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
Lyon, Scott |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ma, Jiangang |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
Ma, Laura |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
Macker, Joseph |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
RSN.1 |
799 |
Distributed Agent Consensus Performance in Resilient Communication Networks |
Magalhães, José |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Mahmoud, Mohamed |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
Mahmud, Maqsood |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
Mainland, Geoffrey |
WC1.3 |
311 |
Radio Modulation Classification Using Deep Residual Neural Networks |
Makara, Eric |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
Malangone, Dane |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
Mallik, Ranjan |
MMO.2 |
324 |
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems |
Mancini, Federico |
PHY.3 |
861 |
Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks |
Mandavilli, Sai Bhargav |
UAV.2 |
956 |
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks |
Manjunath, B. |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
Manso, Marco |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
Maracchion, Christopher |
MCN.1 |
535 |
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks |
Marcus, Kelvin |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Marfo, William |
FML.3 |
484 |
Network Anomaly Detection Using Federated Learning |
Mark, Brian |
SAT.3 |
623 |
Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band |
Marshall, Andrew |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
Martin, Brandon |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
Maxon, Sean |
YSW.4 |
649 |
Improving Quality of Service in a Mesh Network Using Age of Information |
McEachen, John |
YSW.16 |
723 |
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications |
McHenry, Mark |
COG.3 |
192 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems |
Mckee, Sasha |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
McMullen, Byron |
MMO.3 |
330 |
Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery |
McNair, Janise |
UAV.2 |
956 |
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks |
Meftah, Aida |
YSW.1 |
629 |
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks |
Mei, Yongsheng |
MLC.2 |
450 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
YSW.19 |
743 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
Mendler, Bridgit |
RES.3 |
835 |
Near Term Resilient Teleports for DoD SATCOM |
Meng, Dan |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
Michaelis, James |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
Minson, Zachary |
YSW.6 |
661 |
Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO |
Mitchell, J. |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
Modiano, Eytan |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
Mohammed, Tajuddin Manhar |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
Mohan, Sibin |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
Mohapatra, Prasant |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
Molaschi, Andrea |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Molnar, Joe |
COG.3 |
192 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
Moore, Megan |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
Moore, Shirley |
FML.3 |
484 |
Network Anomaly Detection Using Federated Learning |
Morman, Joshua |
COG.1 |
180 |
The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin |
Morris, Carl |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
Morris, Joel |
MC2.4 |
222 |
On the Limits of Learning a Discrete Memoryless Communication Channel |
Mota, Vinícius |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
Mukherjee, Amitav |
AJC.2 |
426 |
Jamming Vulnerability of Terahertz Wireless Networks |
Mukkamala, Ravi |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
Müller, Marcus |
COG.1 |
180 |
The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin |
Muralidhar, Nikhil |
MC1.3 |
594 |
Efficient Generative Wireless Anomaly Detection for Next Generation Networks |
Murphy, Brian |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Nanzer, Jeffrey |
DRF.2 |
496 |
A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays |
Narayanan, Ram |
YSW.4 |
649 |
Improving Quality of Service in a Mesh Network Using Age of Information |
Narula-Tam, Aradhana |
RTC.2 |
404 |
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks |
RES.2 |
828 |
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies |
Nataraj, Lakshmanan |
DCA.1 |
279 |
MalGrid: Visualization of Binary Features in Large Malware Corpora |
Naufal, Revin |
ROB.2 |
342 |
Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things |
Navaroli, Martin |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
Ng, Wee-Keong |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
Nguyen, Kim Khoa |
MC2.3 |
769 |
Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems |
PHY.4 |
867 |
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles |
Nguyen, Quang |
SDN.1 |
102 |
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation |
Nguyen, Ti |
MC2.3 |
769 |
Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems |
PHY.4 |
867 |
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles |
Nguyen, Tien |
MC2.2 |
210 |
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment |
Nia, Omid |
SAT.3 |
623 |
Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band |
Nilsson, Jan |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Noubir, Guevara |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
O'Shea, Timothy |
MC1.3 |
594 |
Efficient Generative Wireless Anomaly Detection for Next Generation Networks |
Ochiai, Hideki |
MC2.3 |
216 |
A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels |
Olowononi, Felix |
MC2.2 |
763 |
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications |
Olsen, Nathan |
DRF.1 |
490 |
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network |
Olsen, Randall |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
Oprea, Alina |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
Osipychev, Denis |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
Ota, Daniel |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
Ould-Slimane, Hakima |
WS3: Paper Session IV.1 |
49 |
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption |
Ouyang, Chongjun |
SEC.4 |
393 |
Some Discussions on PHY Security in DF Relay |
Ozturk, Yusuf |
UAV.3 |
962 |
An Architectural Design for Autonomous and Networked Drones |
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Pabon, Juan |
AIR.1 |
133 |
Air-Aided Communication Between Ground Assets in a Poisson Forest |
Pajic, Miroslav |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
Pandya, Julee |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
Pano, Vasil |
WC1.3 |
311 |
Radio Modulation Classification Using Deep Residual Neural Networks |
Papageorgiou, Yiannis |
SDN.4 |
125 |
Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs |
Papalexakis, Evangelos |
ATT.3 |
999 |
TensorShield: Tensor-Based Defense Against Adversarial Attacks on Images |
Papavassiliou, Symeon |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
Paris, Bernd-Peter |
AJC.3 |
431 |
Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications |
Parker, Travis |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
Paruchuri, Vineetha |
WS7: Paper Session II (Cyber Threats against UAVs).2 |
1065 |
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs |
Pattar, Sudhir |
AJC.4 |
437 |
5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference |
Perazzone, Jake |
CLD.2 |
932 |
Enabling Machine Learning on Resource-Constrained Tactical Networks |
Persons, Jeffrey |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
Petroccia, Roberto |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Pham, Khanh |
MC2.2 |
210 |
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment |
DRF.3 |
501 |
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
Pietraski, Philip |
AJC.4 |
437 |
5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference |
Plusquellic, Jim |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
Poltronieri, Filippo |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Polydoros, Andreas |
CLD.3 |
938 |
Clustered Distributed Spatial Multiplexing |
Popescu, Dimitrie |
WC1.1 |
298 |
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features |
Prasad, Manoj |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
Pu, Lina |
NMS.3 |
529 |
Asymmetric Collision Phenomenon and Its Impact on Underwater Acoustic Networks |
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Qing, Chaojin |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
R, Sai Sree |
S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
Rabe, Mark |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
Radosevic, Dusan |
S&R.2 |
879 |
Toward Congestion Control in Lossy Networks via Local Queue-Management Policies |
Rahman, Abdul |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
Rahman, Aisha B |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
Rahman, Md. Hasan |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
Rahman, Mohammad Ashiqur |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
Ramakrishnan, Narendran |
MC1.3 |
594 |
Efficient Generative Wireless Anomaly Detection for Next Generation Networks |
Ramlall, Sunil |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
Ranjbar, Mohammad |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
Ranstrom, Thomas |
AJC.4 |
437 |
5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference |
Rao, Chuangui |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
Rashid, Mohammed |
DRF.2 |
496 |
A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays |
Rathinavel, Gopikrishna |
MC1.3 |
594 |
Efficient Generative Wireless Anomaly Detection for Next Generation Networks |
Rawat, Danda |
MC2.2 |
763 |
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications |
Rayermann, Patrick |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
Reddy, Achyut |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
Reed, Jeffrey |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
Reising, Donald |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
Restuccia, Francesco |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
Rettore, Paulo Henrique |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
Rigolin F. Lopes, Roberto |
SDN.2 |
110 |
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
Rivas, Veronica |
DCA.2 |
|
Automatic Data Generation and Rule Creation for Network Scanning Tools |
Robinson, Joshua |
WC2.2 |
362 |
Data-Centric Approaches to Radio Frequency Machine Learning |
Rogers, Darren |
MCN.2 |
541 |
Manipulating the Automatic Identification System With Extremely Low-Cost Hardware |
Rowe, David |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
Royster, Thomas |
RTC.2 |
404 |
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks |
RES.1 |
822 |
Receiver Diversity in LEO Satcom Constellations |
RES.2 |
828 |
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies |
Ryu, Bo |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
NMS.1 |
515 |
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE |
MCN.4 |
553 |
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE |
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Sadeghi, Koosha |
ATT.4 |
1005 |
Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems |
Sadler, Brian |
MC2.2 |
763 |
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications |
Sagduyu, Yalin |
WS2: Paper Session I.1 |
13 |
Sensing-Throughput Tradeoffs With Generative Adversarial Networks for NextG Spectrum Sharing |
MCN.3 |
547 |
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems |
WS7: Paper Session III (Machine Learning Services).2 |
1076 |
Adversarial Machine Learning and Defense Game for NextG Signal Classification With Deep Learning |
Sai Teja, Kolliboina |
YSW.11 |
693 |
Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off |
Saikia, Prajwalita |
WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
Samson, Judith |
RTC.1 |
398 |
SCRIP: Safe and Cycle-Free Multi-Path Routing |
Sayed, Ahmed |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
Schalk, Adrian |
ROB.3 |
350 |
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture |
Schmitt, Corinna |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
Schotten, Hans |
PCM.4 |
793 |
Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks |
Schraml, Matthias |
SAT.1 |
612 |
Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems |
Selim, Mohamed |
YSW.13 |
705 |
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach |
Seth, Sayanta |
DRF.4 |
507 |
Forming Coalition Sets From Directional Radios |
Shake, Thomas |
RTC.2 |
404 |
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks |
RES.2 |
828 |
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies |
Shan, Tao |
RSN.4 |
817 |
Coverage Estimation for Secure Ultraviolet Communication |
Sharif, Sana |
WS3: Paper Session I.2 |
7 |
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks |
Sharma, Prabhat |
WS3: Paper Session III.1 |
37 |
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility |
Sharma, Salil |
MC1.4 |
95 |
Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs |
Shashidhar, Bharath |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
Shebert, Samuel |
COG.2 |
186 |
Multi-Signal Classification Using Deep Learning and Sparse Arrays |
Shen, Dan |
MC2.2 |
210 |
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment |
DRF.3 |
501 |
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs |
Shetty, Sachin |
MLC.4 |
464 |
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness |
5GS.1 |
559 |
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace |
Shi, Yi |
WS2: Paper Session I.1 |
13 |
Sensing-Throughput Tradeoffs With Generative Adversarial Networks for NextG Spectrum Sharing |
Shrader, Brooke |
PCM.1 |
775 |
Rate Control With Autoregressive Forecasting for High Frequency Communication |
Sidoran, James L. |
5GS.4 |
577 |
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES |
Sigholm, Johan |
YSW.9 |
679 |
Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North |
Sikora, Paul |
ANT.3 |
606 |
On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies |
Silvius, Mark |
COG.3 |
192 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems |
Singh, Keshav |
WS3: Paper Session I.1 |
1 |
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks |
WS3: Paper Session II.2 |
31 |
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications |
WS3: Paper Session III.1 |
37 |
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility |
WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
Singh, Satinder |
MC2.3 |
769 |
Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems |
PHY.4 |
867 |
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles |
Siraj, Md Sadman |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
Smith, Brad |
RTC.1 |
398 |
SCRIP: Safe and Cycle-Free Multi-Path Routing |
Smith, Daniel |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
Smith, Sidney |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
Snoap, John |
WC1.1 |
298 |
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features |
Sole, Robert |
AIR.2 |
140 |
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage |
Song, Aijun |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
Song, Daniel |
YSW.18 |
735 |
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures |
Song, William |
YSW.18 |
735 |
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures |
Sousa Dias, Paulo |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Spelter, Florian |
ATT.1 |
986 |
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study |
Spooner, Chad |
WC1.1 |
298 |
Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features |
Srivastava, Mani |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
Sruti, S |
YSW.11 |
693 |
Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off |
Stahlbuhk, Thomas |
PCM.1 |
775 |
Rate Control With Autoregressive Forecasting for High Frequency Communication |
Stefanelli, Cesare |
WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
Stein, David |
SEC.1 |
374 |
Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments |
Sterner, Ulf |
RTN.4 |
247 |
Frequency-Hop-Coded SCB for Tactical Networks |
Stevens, Nathan |
ANT.1 |
|
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL) |
Stinco, Pietro |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Stokes, Jack |
MLC.1 |
442 |
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation |
Stone, Kerri |
WS3: Paper Session II.1 |
25 |
Positive and Unlabeled Learning for Mobile Application Traffic Classification |
Stowell, Kate |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
Sun, Jun |
RTC.2 |
404 |
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks |
RES.2 |
828 |
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies |
Suri, Niranjan |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
Sweeney, Matthew |
YSW.3 |
643 |
Securing Software Updates Under Receiver Radio Frequency Geolocation Risk |
Szczypiorski, Krzysztof |
WS6: Paper Session.3 |
1024 |
5G-Enabled Defence-In-Depth for Multi-Domain Operations |
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Taghizadeh, Omid |
WS3: Paper Session IV.2 |
55 |
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems |
Taha, Mohamed A. |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
Talhi, Chamseddine |
WS3: Paper Session IV.1 |
49 |
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption |
YSW.1 |
629 |
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks |
Tang, Shuhai |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
Tang, Zixian |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
Tchakountio, Fabrice |
SIG.2 |
907 |
SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence |
Tesei, Alessandra |
RTN.3 |
241 |
Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience |
Thapa, Bishal |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
Thornton, Charles |
COG.4 |
198 |
Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming |
Tope, Michael |
MC2.4 |
222 |
On the Limits of Learning a Discrete Memoryless Communication Channel |
Tortonesi, Mauro |
WS6: Paper Session.1 |
1011 |
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks |
WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Tosh, Deepak |
ONC.4 |
273 |
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks |
FML.3 |
484 |
Network Anomaly Detection Using Federated Learning |
Tosun, Mustafa |
UAV.3 |
962 |
An Architectural Design for Autonomous and Networked Drones |
Towliat, Mohammad |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
Tran, Lan |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
Tran, Nghi |
SIG.1 |
901 |
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC |
Tränkler, Maximilian |
SDN.3 |
117 |
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs |
Tripathi, Nishith |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
Tsiropoulou, Eirini Eleni |
AIR.3 |
148 |
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing |
Tummala, Murali |
YSW.16 |
723 |
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications |
Turck, Kurt |
WS2: Paper Session I.2 |
19 |
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems |
Tyler, Joshua |
SEC.3 |
385 |
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications |
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Uluagac, Selcuk |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
Upthegrove, Tim |
ONC.1 |
253 |
Rapid Interoperability With OverlAI Gateways |
MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Valdez Mendoza, Jonathan |
UAV.2 |
956 |
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks |
Valenti, Matthew |
AIR.1 |
133 |
Air-Aided Communication Between Ground Assets in a Poisson Forest |
Valieva, Inna |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
Van Hau, Le |
PHY.4 |
867 |
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles |
Vandekerckhove, Joachim |
PHY.1 |
849 |
Mathematical Modeling of Cyber Resilience |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
Vanderveen, Michaela |
5GS.2 |
565 |
Threat Framework for 5G Cellular Communications |
Veeravalli, Venugopal |
WS7: Paper Session I (Battlefield IoT).1 |
1053 |
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs |
Veksler, Maryna |
YSW.20 |
|
LoFin: LoRa-Based UAV Fingerprinting Framework |
STC.3 |
980 |
LoFin: LoRa-Based UAV Fingerprinting Framework |
Venkataramani, Guru |
MLC.2 |
450 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
YSW.19 |
743 |
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects |
Venkatesan, Sridhar |
ATT.2 |
993 |
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems |
Vigil, A |
RES.4 |
841 |
DOD SATCOM Growth Measurement and Planning |
Voitenko, Iurii |
WS2: Paper Session II.1 |
72 |
Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications |
Vosoughi, Azadeh |
DRF.4 |
507 |
Forming Coalition Sets From Directional Radios |
Vu, Bich |
DEF.4 |
173 |
Mission Resilience Experimentation and Evaluation Testbed |
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Wang, Angela |
ONC.2 |
259 |
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
Wang, Jiafan |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
Wang, Lan |
YSW.12 |
699 |
NDNSD: Service Publishing and Discovery in NDN |
Wang, Qiang |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
Wang, Shuyi |
WS3: Paper Session IV.4 |
66 |
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications |
Wang, Tianshi |
WS7: Position Paper.1 |
1082 |
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example |
Wang, Wei |
WS3: Paper Session III.2 |
43 |
A Secured Protocol for IoT Devices in Tactical Networks |
Wang, Wen |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
Wang, Yuhui |
UAV.1 |
950 |
Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications |
Wang, Zheng |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
Weisman, Michael |
PHY.1 |
849 |
Mathematical Modeling of Cyber Resilience |
PHY.2 |
855 |
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience |
Weiss, Martin |
YSW.17 |
729 |
Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access |
Weitzen, Jay |
SEC.1 |
374 |
Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments |
Weston, Jeffery |
RSN.1 |
799 |
Distributed Agent Consensus Performance in Resilient Communication Networks |
White, Zachary |
YSW.16 |
723 |
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications |
Whitehead, James |
RSN.2 |
805 |
A Novel Resilient HF Data Communications Architecture |
Wibisono, Andre |
FML.1 |
470 |
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings |
Wiens, Brett |
MC1.3 |
89 |
Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations |
Winters, Jack |
MMO.2 |
324 |
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems |
Wissingh, Bastiaan |
WS6: Paper Session.2 |
1018 |
NDN Experimental Evaluation in Multi-Domain Tactical Environments |
Wong, Lauren |
WC1.2 |
304 |
Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features |
Wood, Andrew |
MC1.2 |
588 |
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction |
Wood, John |
RSN.3 |
810 |
WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions |
Woods, Timothy |
MCN.1 |
535 |
The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks |
Wrona, Konrad |
WS6: Paper Session.3 |
1024 |
5G-Enabled Defence-In-Depth for Multi-Domain Operations |
WS7: Invited Paper.1 |
1045 |
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments |
Wu, Eugene |
YSW.18 |
735 |
Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures |
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Xia, Xianggen |
PCM.2 |
781 |
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication |
Xiao, Yu |
MC1.2 |
84 |
Polynomial Phase Modulation Based NOMA |
Xu, Hao |
SEC.4 |
393 |
Some Discussions on PHY Security in DF Relay |
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Yahja, Alex |
RTC.3 |
412 |
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing |
Yan, Jonmei |
ANT.2 |
600 |
Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays |
Yan, Wenjuan |
WS3: Paper Session IV.4 |
66 |
Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications |
Yang, Hanchao |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
Yang, Hongwen |
SEC.4 |
393 |
Some Discussions on PHY Security in DF Relay |
Yang, Na |
MC1.1 |
583 |
CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel |
Yang, Ryan |
FML.1 |
470 |
Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings |
Yang, Yaling |
SEC.2 |
379 |
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study |
Yener, Aylin |
RTN.1 |
229 |
Peak Age of Information With Receiver Induced Service Interruptions |
Yi, Yang |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
Ying, Lingyun |
MLC.3 |
458 |
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree |
Younis, Mohamed |
YSW.14 |
711 |
Data-Driven Wireless Anomaly Detection Using Spectral Features |
Yu, Aimin |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
Yu, Paul |
CLD.1 |
926 |
Adaptive Monitoring for Analytics Placement in Tactical Networks |
Yu, Xi |
AIR.1 |
133 |
Air-Aided Communication Between Ground Assets in a Poisson Forest |
Yuksel, Murat |
DRF.4 |
507 |
Forming Coalition Sets From Directional Radios |
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Zabele, Stephen |
ONC.3 |
265 |
Mission Critical Resiliency With IRON |
Zaccarini, Mattia |
WS6: Paper Session.5 |
1038 |
Enabling Adaptive Communications at the Tactical Edge |
Zang, Xujie |
SEC.4 |
393 |
Some Discussions on PHY Security in DF Relay |
Zeadally, Sherali |
WS3: Paper Session I.2 |
7 |
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks |
Zhai, Haotian |
AJC.3 |
431 |
Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications |
Zhang, Huan |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
Zhang, Huanle |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
Zhang, Jianzhong |
PCM.3 |
787 |
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler |
S&R.1 |
873 |
MADRL Based Scheduling for 5G and Beyond |
Zhang, Mi |
FML.2 |
478 |
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective |
Zhang, Peng |
S&R.2 |
879 |
Toward Congestion Control in Lossy Networks via Local Queue-Management Policies |
Zhang, Xi |
CLD.4 |
944 |
Lyapunov Stability Analyses for Controlling UAV Trajectory Over 6G Mobile Wireless Networks |
Zhao, Lixin |
DCA.4 |
292 |
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining |
Zhu, Qixuan |
CLD.4 |
944 |
Lyapunov Stability Analyses for Controlling UAV Trajectory Over 6G Mobile Wireless Networks |
Zhu, Quanyan |
5GS.3 |
571 |
MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks |
Zhu, Ting |
WS3: Paper Session III.2 |
43 |
A Secured Protocol for IoT Devices in Tactical Networks |
Znati, Taieb |
YSW.17 |
729 |
Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access |
Zou, Cliff |
YSW.8 |
672 |
Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms |
Zulkernine, Mohammad |
NMS.2 |
522 |
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments |