MILCOM 2022 logo
IEEE

Author index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Author Session Start page Title
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Abbas, Adeeb MILCOM 2022 Track 5: WC1.3 311 Radio Modulation Classification Using Deep Residual Neural Networks
Abdelmawla, Ibrahim YSW.13 705 Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach
Abdelzaher, Tarek WS7: Paper Session I (Battlefield IoT).1 1053 Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs
WS7: Position Paper.1 1082 The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example
Abdurrahman, Muhammad SDN.1 102 An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation
Acosta, Jaime DCA.2   Automatic Data Generation and Rule Creation for Network Scanning Tools
DEF.1 154 Locally-Hosted Fidelity-Adaptive Honeypots With Connection-Preserving Capabilities
Ahmed, Muddasar 5GS.2 565 Threat Framework for 5G Cellular Communications
Ahmed, Shakil YSW.13 705 Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach
Ajakwe, Simeon ROB.1 336 Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach
Akbar, Monika DCA.2   Automatic Data Generation and Rule Creation for Network Scanning Tools
Åkerberg, Johan WS2: Paper Session II.1 72 Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications
Akkaya, Kemal YSW.20   LoFin: LoRa-Based UAV Fingerprinting Framework
STC.3 980 LoFin: LoRa-Based UAV Fingerprinting Framework
Akter, Rubina ROB.2 342 Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things
Alghamdi, Abdulmajeed YSW.8 672 Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms
Alkandari, Shaikha AIR.1 133 Air-Aided Communication Between Ground Assets in a Poisson Forest
Alkhowaiter, Mohammed YSW.8 672 Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms
Almubarak, Khalid YSW.8 672 Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms
Alves, João RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Alyami, Mnassar YSW.8 672 Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms
Amin, Moeness COG.2 186 Multi-Signal Classification Using Deep Learning and Sparse Arrays
Anderson, Cleon CLD.2 932 Enabling Machine Learning on Resource-Constrained Tactical Networks
Anderson, Gustave ONC.2 259 Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
SEC.2 379 5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
Ara, Israt STC.1 968 An Intelligent and Private 6G Air Interface Using Physical Layer Security
Aris, Ahmet YSW.20   LoFin: LoRa-Based UAV Fingerprinting Framework
STC.3 980 LoFin: LoRa-Based UAV Fingerprinting Framework
Ashdown, Andrew WS2: Paper Session I.2 19 3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems
Ashdown, Jonathan WS2: Paper Session I.2 19 3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems
Atkin, Guillermo MC1.2 84 Polynomial Phase Modulation Based NOMA
Axell, Erik MC2.1 204 Reduced Complexity Adaptive Demodulation in Impulse Noise Channels
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Badr, Mahmoud 5GS.4 577 Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Baker, Patrick FML.1 470 Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings
Baksaas, Magnus PHY.3 861 Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks
Bandara, Eranga 5GS.1 559 Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace
Banerjee, Ayan ATT.4 1005 Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems
Banik, Sejuti SIG.1 901 Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC
Banks, Jeremy NMS.2 522 SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments
Bao, Huaifeng MLC.3 458 High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree
Barber, Don MCN.2 541 Manipulating the Automatic Identification System With Extremely Low-Cost Hardware
YSW.16 723 A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications
Barry, John YSW.7 667 An Opportunistic Scheme for Low Probability of Detection Communication
Barz, Christoph WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Bastian, Nathaniel WS7: Paper Session I (Battlefield IoT).1 1053 Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs
Bernardin, Fred MC2.1 757 Improving Text Security Classification Towards an Automated Information Guard
Bhandarkar, Adhitya Bantwal WS7: Paper Session II (Cyber Threats against UAVs).1 1059 Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning
Bharadwaj, Ramesh YSW.4 649 Improving Quality of Service in a Mesh Network Using Age of Information
Bieniasz, Jedrzej WS6: Paper Session.3 1024 5G-Enabled Defence-In-Depth for Multi-Domain Operations
Bingol, Ece RTN.1 229 Peak Age of Information With Receiver Induced Service Interruptions
Biswas, Pialy MMO.2 324 Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems
Biswas, Sudip WS3: Paper Session I.1 1 Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks
WS3: Paper Session IV.2 55 DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems
Björkman, Mats WS2: Paper Session II.1 72 Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications
Blasch, Erik WS2: Paper Session I.2 19 3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems
DRF.3 501 Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs
Block, Frederick RES.1 822 Receiver Diversity in LEO Satcom Constellations
Bode, Jonas ATT.1 986 Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Borges de Sousa, João RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Boschetti, Nicolò YSW.9 679 Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North
Bouzabia, Hamda YSW.5 655 Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems
Bradley, Eli MMO.1 318 Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction
Breedy, Maggie R WS6: Paper Session.1 1011 Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks
Bristow, Austin YSW.2 635 A Robust Self-Synchronized Quantum Key Distribution Protocol
Brodnik, Luke ROB.3 350 Analysis of Vulnerabilities in Satellite Software Bus Network Architecture
Brotzman, Robert DCA.3 285 C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification
Brown, Dane ROB.3 350 Analysis of Vulnerabilities in Satellite Software Bus Network Architecture
Brown, David WS6: Paper Session.4 1030 Base Station Deployment Optimization in Federated Networks With Multi-Hop Communication
Brown, Eric ANT.2 600 Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays
Brown, Scott CLD.2 932 Enabling Machine Learning on Resource-Constrained Tactical Networks
Brunnenmeyer, David RES.3 835 Near Term Resilient Teleports for DoD SATCOM
Budhiraja, Ishan WS3: Paper Session IV.3 61 Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning
Budianu, Cristian NMS.1 515 Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE
Buehrer, R. Michael COG.2 186 Multi-Signal Classification Using Deep Learning and Sparse Arrays
COG.4 198 Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming
YSW.15 717 Decentralized Bandits With Feedback for Cognitive Radar Networks
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cabuk, Umut UAV.3 962 An Architectural Design for Autonomous and Networked Drones
Cai, Lijun DCA.4 292 LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining
Calderbank, Robert PCM.3 787 Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler
Camp, L Jean YSW.10 687 Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making
Camp, Tracy WS3: Paper Session II.1 25 Positive and Unlabeled Learning for Mobile Application Traffic Classification
Campbell, Jared DRF.1 490 Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network
Campioni, Lorenzo WS6: Paper Session.1 1011 Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks
WS6: Paper Session.2 1018 NDN Experimental Evaluation in Multi-Domain Tactical Environments
Castanares, Anthony ONC.4 273 Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks
Castellanos, Miguel S&R.4 895 Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks
Castro, Alejandro ANT.1   Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)
Caven, Peter YSW.10 687 Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making
Chache, Frederick YSW.4 649 Improving Quality of Service in a Mesh Network Using Age of Information
Chadha, Ritu ATT.2 993 Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems
Chan, Kevin CLD.1 926 Adaptive Monitoring for Analytics Placement in Tactical Networks
CLD.2 932 Enabling Machine Learning on Resource-Constrained Tactical Networks
Chandrasekaran, Shiv DCA.1 279 MalGrid: Visualization of Binary Features in Large Malware Corpora
Chang, Hao-Hsuan S&R.1 873 MADRL Based Scheduling for 5G and Beyond
Chang, Tammy ONC.2 259 Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
Chaudhary, Rajat WS3: Paper Session IV.3 61 Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning
Chen, Genshe MC2.2 210 Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment
DRF.3 501 Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs
Chen, Hao YSW.22   Unsupervised Radio Scene Analysis Using Neural Expectation Maximization
WC2.3 368 Unsupervised Radio Scene Analysis Using Neural Expectation Maximization
Chen, Hao S&R.1 873 MADRL Based Scheduling for 5G and Beyond
Chen, Jinliang MC1.1 583 CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel
Chen, Kwang-Cheng YSW.2 635 A Robust Self-Synchronized Quantum Key Distribution Protocol
Chen, Ta DCA.3 285 C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification
Cheng, Bow-Nan YSW.18 735 Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures
Cheng, Julian RSN.4 817 Coverage Estimation for Secure Ultraviolet Communication
Cheng, Xiang SEC.2 379 5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
Chi, Zicheng WS3: Paper Session III.2 43 A Secured Protocol for IoT Devices in Tactical Networks
Chieh, Sam ANT.1   Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)
Chikkagoudar, Satish DCA.1 279 MalGrid: Visualization of Binary Features in Large Malware Corpora
Chowdhury, Rasel WS3: Paper Session IV.1 49 Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption
Cimini, Leonard PCM.2 781 Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication
Clark, Lillian WS7: Paper Session III (Machine Learning Services).1 1070 Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things
Cleverly, Griffin RES.3 835 Near Term Resilient Teleports for DoD SATCOM
Coleman, Jared WS7: Paper Session III (Machine Learning Services).1 1070 Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things
Consul, Prakhar WS3: Paper Session IV.3 61 Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning
Corcoran, John CLD.1 926 Adaptive Monitoring for Analytics Placement in Tactical Networks
Cramer, Eelco SDN.2 110 Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead
WS6: Paper Session.1 1011 Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks
WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Crandall, Kyle RSN.1 799 Distributed Agent Consensus Performance in Resilient Communication Networks
Crouse, David ANT.3 606 On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D'Amours, Claude SIG.4 920 Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection
Dagdeviren, Orhan UAV.3 962 An Architectural Design for Autonomous and Networked Drones
Dandekar, Kapil WC1.3 311 Radio Modulation Classification Using Deep Residual Neural Networks
Das, Debarun YSW.17 729 Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access
Davaslioglu, Kemal MCN.3 547 Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems
Dawson, Bryan CLD.1 926 Adaptive Monitoring for Analytics Placement in Tactical Networks
De, Swades YSW.21 751 SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels
De Lucia, Michael FML.2 478 FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective
del Aguila, Alvaro UAV.2 956 Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks
Deshpande, Rasika WS3: Paper Session II.2 31 UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications
Diamanti, Maria AIR.3 148 Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing
Ding, Steven NMS.2 522 SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments
Djurica, Miodrag SDN.2 110 Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead
Do, Tri Nhu YSW.1 629 Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks
YSW.5 655 Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems
Doan, Van-Sang ROB.2 342 Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things
Draxler, Paul ANT.2 600 Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays
Dreo Rodosek, Gabi SDN.3 117 RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs
Drijver, Floris SDN.2 110 Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead
Drocella, Edward AIR.2 140 Quantitative Assessment of Federal Airborne Systems' Spectrum Usage
Drozd, Andrew MCN.1 535 The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks
DSouza, Daniel WS7: Paper Session III (Machine Learning Services).1 1070 Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things
Du, Haizhou FML.1 470 Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings
Dubey, Rajrshi YSW.21 751 SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels
Dulal, Saurab YSW.12 699 NDNSD: Service Publishing and Discovery in NDN
Duran, David ONC.3 265 Mission Critical Resiliency With IRON
Dussault, Heather ANT.3 606 On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies
Dwyer, Matthew CLD.1 926 Adaptive Monitoring for Analytics Placement in Tactical Networks
CLD.2 932 Enabling Machine Learning on Resource-Constrained Tactical Networks
Dzhezyan, Gregory SIG.4 920 Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Eck, Christopher ONC.3 265 Mission Critical Resiliency With IRON
Eckhardt, Josh WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Edwards, Stephen DCA.3 285 C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification
Ejaz, Waleed WS3: Paper Session I.2 7 Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks
Ekström, Mikael WS2: Paper Session II.1 72 Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications
El-Jamous, Ziad MCN.3 547 Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems
Eliardsson, Patrik MC2.1 204 Reduced Complexity Adaptive Demodulation in Impulse Noise Channels
Elkadi, Melissa NMS.1 515 Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE
MCN.4 553 5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE
Ellis, Jason PHY.2 855 An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
Enoch, Michael ONC.2 259 Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
Entezari, Negin ATT.3 999 TensorShield: Tensor-Based Defense Against Adversarial Attacks on Images
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Fadul, Mohamed SEC.3 385 An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications
Falco, Gregory YSW.9 679 Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North
Falcon, Edward ANT.2 600 Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays
Fang, Yudong WS6: Paper Session.4 1030 Base Station Deployment Optimization in Federated Networks With Multi-Hop Communication
Farkouh, Raif ANT.1   Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)
Farooq, Junaid UAV.1 950 Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications
Fawaz, Kassem MLC.1 442 I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation
Feder, Andreas SIG.3 913 Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics
Ferri, Gabriele RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Fioravanti, Stefano RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Flin, Benjamin DCA.3 285 C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification
Forero, Pedro S&R.2 879 Toward Congestion Control in Lossy Networks via Local Queue-Management Policies
Fowler, Michael WC1.2 304 Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features
Foytik, Peter 5GS.1 559 Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace
Frisbie, Stephan YSW.14 711 Data-Driven Wireless Anomaly Detection Using Spectral Features
Fritz, Tobias SDN.3 117 RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs
Fronteddu, Roberto WS6: Paper Session.1 1011 Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks
WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Fu, Frank RSN.3 810 WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions
Fu, Xinzhe SDN.1 102 An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation
Funai, Colin ONC.1 253 Rapid Interoperability With OverlAI Gateways
MC1.2 588 PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction
Furfaro, Thomas RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Furman, Sean MCN.1 535 The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks
Furtak, Janusz WS7: Invited Paper.1 1045 Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Gao, Yue MLC.1 442 I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation
Garcia-Luna-Aceves, Jj RTC.1 398 SCRIP: Safe and Cycle-Free Multi-Path Routing
Gaydos, Matthew RES.1 822 Receiver Diversity in LEO Satcom Constellations
Ge, Yunfei 5GS.3 571 MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks
Gerstacker, Wolfgang SIG.3 913 Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics
Ghorbanzadeh, Michael AIR.2 140 Quantitative Assessment of Federal Airborne Systems' Spectrum Usage
Giridhar, K YSW.11 693 Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off
Gkelias, Athanasios WC2.1 356 GAN-Based Detection of Adversarial EM Signal Waveforms
Gogineni, Kailash MLC.2 450 Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
YSW.19 743 Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
Golam, Mohtasin ROB.2 342 Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things
Gold, Kimberly MLC.4 464 Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness
Gopavaram, Shakthidhar Reddy YSW.10 687 Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making
Gordon, Nathaniel YSW.9 679 Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North
Graves, Eric CLD.1 926 Adaptive Monitoring for Analytics Placement in Tactical Networks
Gregris, Jessica RES.4 841 DOD SATCOM Growth Measurement and Planning
Grönkvist, Jimmi RTN.4 247 Frequency-Hop-Coded SCB for Tactical Networks
Grothendieck, John MC2.1 757 Improving Text Security Classification Towards an Automated Information Guard
Grov, Gudmund PHY.3 861 Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks
Guerra, Barbara WS7: Invited Paper.1 1045 Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
Guo, Zheng PCM.2 781 Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication
Gupta, Sandeep ATT.4 1005 Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems
Gurevich, Marina ONC.3 265 Mission Critical Resiliency With IRON
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Haddadin, Osama DRF.1 490 Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network
Hagenhoff, Klement SDN.3 117 RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs
Hägglund, Kristoffer MC2.1 204 Reduced Complexity Adaptive Demodulation in Impulse Noise Channels
Hale, Britta YSW.3 643 Securing Software Updates Under Receiver Radio Frequency Geolocation Risk
Hao, Xing MC1.2 84 Polynomial Phase Modulation Based NOMA
Haque, Md Ariful MLC.4 464 Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness
Hauge, Mariann WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Hawkins, Matthew ONC.2 259 Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
Hayden, Blake YSW.3 643 Securing Software Updates Under Receiver Radio Frequency Geolocation Risk
Hazarika, Bishmita WS3: Paper Session I.1 1 Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks
Headley, William WC1.2 304 Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features
AJC.1 418 Considerations of Reinforcement Learning Within Real-Time Wireless Communication Systems
Heath, Robert S&R.4 895 Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks
Heintz, Ilana MC2.1 757 Improving Text Security Classification Towards an Automated Information Guard
Hills, Gerald DEF.2 160 A Customized Approach to Cybersecurity Education for Space Professionals
Hirschbeck, Martin SIG.3 913 Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics
Ho, Samson ATT.2 993 Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems
Hossain, Mahmud DCA.2   Automatic Data Generation and Rule Creation for Network Scanning Tools
Hou, Thomas S&R.3 887 Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm
Howard, William YSW.15 717 Decentralized Bandits With Feedback for Cognitive Radar Networks
Huang, Chao FML.2 478 FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective
Huang, Orton DEF.4 173 Mission Resilience Experimentation and Evaluation Testbed
Huang, Wan-Jen WS3: Paper Session IV.2 55 DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems
Hulede, Ian Ellis RTN.2 235 Allan Deviation of Social Learning Distributed Network Time Synchronization
Hürten, Tobias ATT.1 986 Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Hussey, Jason WS3: Paper Session II.1 25 Positive and Unlabeled Learning for Mobile Application Traffic Classification
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ihekoronye, Vivian Ukamaka ROB.1 336 Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach
Inshi, Saad WS3: Paper Session IV.1 49 Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption
Izmailov, Rauf ATT.2 993 Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Jakubisin, Daniel SEC.2 379 5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
Jalaian, Brian WS7: Position Paper.1 1082 The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example
Javorsek, Daniel MC1.2 588 PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction
Jayaweera, Sudharman WS7: Paper Session II (Cyber Threats against UAVs).1 1059 Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning
Jha, Susmit WS7: Paper Session I (Battlefield IoT).1 1053 Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs
Jiang, Wei PCM.4 793 Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks
Jin, Heng S&R.3 887 Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm
Jones, Alyse AJC.1 418 Considerations of Reinforcement Learning Within Real-Time Wireless Communication Systems
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Kaasen, Andreas PHY.3 861 Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks
Kaddoum, Georges YSW.1 629 Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks
YSW.5 655 Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems
Kalke, Martine DEF.4 173 Mission Resilience Experimentation and Evaluation Testbed
Kamal, Ahmed YSW.13 705 Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach
Kamhoua, Charles MLC.4 464 Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness
MC2.2 763 Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications
Kaminski, John SEC.1 374 Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments
Kaneko, Masayuki MC2.3 216 A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels
Kanth, Vikram MCN.2 541 Manipulating the Automatic Identification System With Extremely Low-Cost Hardware
Kaplan, Lance WS7: Paper Session I (Battlefield IoT).1 1053 Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs
Kaplan, Michael DCA.3 285 C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification
Kara, Denizhan WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
WS7: Position Paper.1 1082 The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example
Karaliopoulos, Merkourios SDN.4 125 Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs
Karam, Andrew 5GS.4 577 Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Katwe, Mayur WS3: Paper Session II.2 31 UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications
Kaviani, Saeed RTC.3 412 DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing
Kelley, Brian STC.1 968 An Intelligent and Private 6G Air Interface Using Physical Layer Security
Kerber, Maxwell ANT.1   Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)
Kerr, Ryan NMS.2 522 SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments
Khalil, Dahesh RES.4 841 DOD SATCOM Growth Measurement and Planning
Kholidy, Hisham A. 5GS.4 577 Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Kiamari, Mehrdad WS7: Paper Session III (Machine Learning Services).1 1070 Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things
Kiciman, Emre MLC.1 442 I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation
Kim, Deokseong MCN.4 553 5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE
Kim, Dohyun S&R.4 895 Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks
Kim, Dong Seong ROB.1 336 Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach
ROB.2 342 Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things
Kim, Gyuwan SAT.2 618 Link Reliability of Satellite-To-Ground Free-Space Optical Communication Systems in South Korea
Kim, Hoon SAT.2 618 Link Reliability of Satellite-To-Ground Free-Space Optical Communication Systems in South Korea
Kim, Jae RTC.3 412 DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing
WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Kim, Kyo Hyun WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Kim, Seung-Jun YSW.22   Unsupervised Radio Scene Analysis Using Neural Expectation Maximization
MMO.3 330 Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery
WC2.3 368 Unsupervised Radio Scene Analysis Using Neural Expectation Maximization
Kim, Seungjoo DEF.3 166 Do You Really Need to Disguise Normal Servers as Honeypots?
Kimberly, Greg WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Kirk, Benjamin COG.2 186 Multi-Signal Classification Using Deep Learning and Sparse Arrays
Kirk, John RES.4 841 DOD SATCOM Growth Measurement and Planning
Knopp, Andreas SAT.1 612 Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems
Knopp, Raymond MCN.4 553 5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE
Ko, Allan PCM.1 775 Rate Control With Autoregressive Forecasting for High Frequency Communication
Koivunen, Visa MC1.4 95 Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs
Kompella, Sastry SDN.1 102 An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation
S&R.3 887 Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm
SIG.2 907 SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence
Komulainen, Arwid RTN.4 247 Frequency-Hop-Coded SCB for Tactical Networks
Kose, Cenk CLD.3 938 Clustered Distributed Spatial Multiplexing
Kott, Alexander PHY.1 849 Mathematical Modeling of Cyber Resilience
PHY.2 855 An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
Koutsopoulos, Iordanis SDN.4 125 Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs
Krishnamachari, Bhaskar WS7: Paper Session III (Machine Learning Services).1 1070 Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things
Krishnan, Rajesh DCA.3 285 C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification
Kuklinski, Slawomir WS6: Paper Session.3 1024 5G-Enabled Defence-In-Depth for Multi-Domain Operations
Kulhandjian, Hovannes SIG.4 920 Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection
Kulhandjian, Michel SIG.4 920 Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection
Kumar, Neeraj WS3: Paper Session IV.3 61 Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning
Kuperman, Gregory ONC.1 253 Rapid Interoperability With OverlAI Gateways
Kuperman, Gregory MC2.1 757 Improving Text Security Classification Towards an Automated Information Guard
Kurdziel, Michael STC.2 974 Statistical Analysis of the MK-3 Customizable Authenticated Encryption
Kurma, Sravani WS3: Paper Session III.1 37 Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility
Kuzdeba, Scott WC2.2 362 Data-Centric Approaches to Radio Frequency Machine Learning
Kwon, Hyuck RTN.2 235 Allan Deviation of Social Learning Distributed Network Time Synchronization
YSW.6 661 Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
La Cour, Brian MMO.1 318 Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction
Lackpour, Alex COG.3 192 Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems
Lan, Tian MLC.2 450 Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
YSW.19 743 Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
Lane, Steven WS7: Paper Session II (Cyber Threats against UAVs).1 1059 Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning
Lang, Andreas MC1.1 78 A Comprehensive Study of CPM Trellis Initialization Methods
Langus Rodríguez, David YSW.20   LoFin: LoRa-Based UAV Fingerprinting Framework
STC.3 980 LoFin: LoRa-Based UAV Fingerprinting Framework
Lanham, S. Andrew MMO.1 318 Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction
Lankl, Berthold MC1.1 78 A Comprehensive Study of CPM Trellis Initialization Methods
Larson, Kevin RTC.3 412 DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing
LaSorte, Nickolas AIR.2 140 Quantitative Assessment of Federal Airborne Systems' Spectrum Usage
Latshaw, James WC1.1 298 Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features
Lauer, Gregory ONC.3 265 Mission Critical Resiliency With IRON
Le, Anh NMS.1 515 Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE
MCN.4 553 5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE
Leang, Kam DRF.1 490 Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network
Lee, Daniel MC1.3 89 Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations
Lee, Jae Min ROB.1 336 Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach
ROB.2 342 Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things
Lee, Kennedy YSW.7 667 An Opportunistic Scheme for Low Probability of Detection Communication
Lee, Suhyeon DEF.3 166 Do You Really Need to Disguise Normal Servers as Honeypots?
Leung, Kin WC2.1 356 GAN-Based Detection of Adversarial EM Signal Waveforms
Levatich, Maxwell DCA.3 285 C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification
Lewis, Ambrose SIG.2 907 SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence
Li, Chengzhang S&R.3 887 Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm
Li, Chih-Peng WS3: Paper Session I.1 1 Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks
WS3: Paper Session II.2 31 UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications
WS3: Paper Session III.1 37 Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility
Li, Jinyang WS7: Position Paper.1 1082 The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example
Li, Wenhao MLC.3 458 High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree
Liang, Xueping 5GS.1 559 Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace
Liberto, Luca ATT.1 986 Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Lichtman, Marc COG.1 180 The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin
Liu, Feng MLC.3 458 High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree
Liu, Lingjia PCM.3 787 Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler
S&R.1 873 MADRL Based Scheduling for 5G and Beyond
Liu, Qingyu S&R.3 887 Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm
Liu, Shengzhong WS7: Position Paper.1 1082 The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example
Liu, Xin WS3: Paper Session III.2 43 A Secured Protocol for IoT Devices in Tactical Networks
Liu, Xin FML.2 478 FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective
Loevenich, Johannes SDN.2 110 Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead
ATT.1 986 Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Loos, Scott ONC.1 253 Rapid Interoperability With OverlAI Gateways
MC1.2 588 PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction
Lou, Wenjing S&R.3 887 Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm
Love, David RES.1 822 Receiver Diversity in LEO Satcom Constellations
Loveless, Thomas SEC.3 385 An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications
Lu, Ke WS3: Paper Session IV.4 66 Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications
Lundy, April AIR.2 140 Quantitative Assessment of Federal Airborne Systems' Spectrum Usage
Luo, Yu NMS.3 529 Asymmetric Collision Phenomenon and Its Impact on Underwater Acoustic Networks
Lychev, Robert DEF.4 173 Mission Resilience Experimentation and Evaluation Testbed
Lyon, Scott DRF.1 490 Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ma, Jiangang DCA.4 292 LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining
Ma, Laura ONC.3 265 Mission Critical Resiliency With IRON
Macker, Joseph SDN.1 102 An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation
RSN.1 799 Distributed Agent Consensus Performance in Resilient Communication Networks
Magalhães, José RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Mahmoud, Mohamed 5GS.4 577 Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Mahmud, Maqsood 5GS.4 577 Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Mainland, Geoffrey WC1.3 311 Radio Modulation Classification Using Deep Residual Neural Networks
Makara, Eric RSN.3 810 WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions
Malangone, Dane ANT.2 600 Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays
Mallik, Ranjan MMO.2 324 Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems
Mancini, Federico PHY.3 861 Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks
Mandavilli, Sai Bhargav UAV.2 956 Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks
Manjunath, B. DCA.1 279 MalGrid: Visualization of Binary Features in Large Malware Corpora
Manso, Marco WS7: Invited Paper.1 1045 Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
Maracchion, Christopher MCN.1 535 The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks
Marcus, Kelvin WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Marfo, William FML.3 484 Network Anomaly Detection Using Federated Learning
Mark, Brian SAT.3 623 Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band
Marshall, Andrew MLC.1 442 I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation
Martin, Brandon ONC.2 259 Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
Maxon, Sean YSW.4 649 Improving Quality of Service in a Mesh Network Using Age of Information
McEachen, John YSW.16 723 A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications
McHenry, Mark COG.3 192 Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems
Mckee, Sasha DRF.1 490 Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network
McMullen, Byron MMO.3 330 Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery
McNair, Janise UAV.2 956 Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks
Meftah, Aida YSW.1 629 Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks
Mei, Yongsheng MLC.2 450 Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
YSW.19 743 Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
Mendler, Bridgit RES.3 835 Near Term Resilient Teleports for DoD SATCOM
Meng, Dan DCA.4 292 LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining
Michaelis, James WS7: Invited Paper.1 1045 Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
Minson, Zachary YSW.6 661 Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO
Mitchell, J. DEF.4 173 Mission Resilience Experimentation and Evaluation Testbed
Modiano, Eytan SDN.1 102 An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation
Mohammed, Tajuddin Manhar DCA.1 279 MalGrid: Visualization of Binary Features in Large Malware Corpora
Mohan, Sibin WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Mohapatra, Prasant FML.2 478 FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective
Molaschi, Andrea RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Molnar, Joe COG.3 192 Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems
RSN.3 810 WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions
Moore, Megan WC1.2 304 Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features
Moore, Shirley FML.3 484 Network Anomaly Detection Using Federated Learning
Morman, Joshua COG.1 180 The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin
Morris, Carl RES.4 841 DOD SATCOM Growth Measurement and Planning
Morris, Joel MC2.4 222 On the Limits of Learning a Discrete Memoryless Communication Channel
Mota, Vinícius SDN.2 110 Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead
Mukherjee, Amitav AJC.2 426 Jamming Vulnerability of Terahertz Wireless Networks
Mukkamala, Ravi 5GS.1 559 Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace
Müller, Marcus COG.1 180 The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin
Muralidhar, Nikhil MC1.3 594 Efficient Generative Wireless Anomaly Detection for Next Generation Networks
Murphy, Brian PHY.2 855 An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Nanzer, Jeffrey DRF.2 496 A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays
Narayanan, Ram YSW.4 649 Improving Quality of Service in a Mesh Network Using Age of Information
Narula-Tam, Aradhana RTC.2 404 Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks
RES.2 828 Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies
Nataraj, Lakshmanan DCA.1 279 MalGrid: Visualization of Binary Features in Large Malware Corpora
Naufal, Revin ROB.2 342 Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things
Navaroli, Martin ANT.2 600 Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays
Ng, Wee-Keong 5GS.1 559 Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace
Nguyen, Kim Khoa MC2.3 769 Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems
PHY.4 867 Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles
Nguyen, Quang SDN.1 102 An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation
Nguyen, Ti MC2.3 769 Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems
PHY.4 867 Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles
Nguyen, Tien MC2.2 210 Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment
Nia, Omid SAT.3 623 Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band
Nilsson, Jan WS6: Paper Session.1 1011 Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks
WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Noubir, Guevara ONC.1 253 Rapid Interoperability With OverlAI Gateways
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
O'Shea, Timothy MC1.3 594 Efficient Generative Wireless Anomaly Detection for Next Generation Networks
Ochiai, Hideki MC2.3 216 A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels
Olowononi, Felix MC2.2 763 Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications
Olsen, Nathan DRF.1 490 Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network
Olsen, Randall ANT.1   Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)
Oprea, Alina ATT.2 993 Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems
Osipychev, Denis WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Ota, Daniel WS7: Invited Paper.1 1045 Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
Ould-Slimane, Hakima WS3: Paper Session IV.1 49 Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption
Ouyang, Chongjun SEC.4 393 Some Discussions on PHY Security in DF Relay
Ozturk, Yusuf UAV.3 962 An Architectural Design for Autonomous and Networked Drones
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Pabon, Juan AIR.1 133 Air-Aided Communication Between Ground Assets in a Poisson Forest
Pajic, Miroslav WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Pandya, Julee ONC.2 259 Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
Pano, Vasil WC1.3 311 Radio Modulation Classification Using Deep Residual Neural Networks
Papageorgiou, Yiannis SDN.4 125 Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs
Papalexakis, Evangelos ATT.3 999 TensorShield: Tensor-Based Defense Against Adversarial Attacks on Images
Papavassiliou, Symeon AIR.3 148 Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing
Paris, Bernd-Peter AJC.3 431 Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications
Parker, Travis PHY.2 855 An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
Paruchuri, Vineetha WS7: Paper Session II (Cyber Threats against UAVs).2 1065 Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Pattar, Sudhir AJC.4 437 5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference
Perazzone, Jake CLD.2 932 Enabling Machine Learning on Resource-Constrained Tactical Networks
Persons, Jeffrey WC1.2 304 Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features
Petroccia, Roberto RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Pham, Khanh MC2.2 210 Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment
DRF.3 501 Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs
SIG.1 901 Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC
Pietraski, Philip AJC.4 437 5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference
Plusquellic, Jim AIR.3 148 Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing
Poltronieri, Filippo WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Polydoros, Andreas CLD.3 938 Clustered Distributed Spatial Multiplexing
Popescu, Dimitrie WC1.1 298 Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features
Prasad, Manoj MLC.1 442 I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation
Pu, Lina NMS.3 529 Asymmetric Collision Phenomenon and Its Impact on Underwater Acoustic Networks
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Qing, Chaojin MC1.1 583 CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
R, Sai Sree S&R.1 873 MADRL Based Scheduling for 5G and Beyond
Rabe, Mark DEF.4 173 Mission Resilience Experimentation and Evaluation Testbed
Radosevic, Dusan S&R.2 879 Toward Congestion Control in Lossy Networks via Local Queue-Management Policies
Rahman, Abdul 5GS.1 559 Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace
Rahman, Aisha B AIR.3 148 Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing
Rahman, Md. Hasan SIG.1 901 Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC
Rahman, Mohammad Ashiqur 5GS.4 577 Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Ramakrishnan, Narendran MC1.3 594 Efficient Generative Wireless Anomaly Detection for Next Generation Networks
Ramlall, Sunil ANT.1   Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)
Ranjbar, Mohammad SIG.1 901 Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC
Ranstrom, Thomas AJC.4 437 5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference
Rao, Chuangui MC1.1 583 CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel
Rashid, Mohammed DRF.2 496 A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays
Rathinavel, Gopikrishna MC1.3 594 Efficient Generative Wireless Anomaly Detection for Next Generation Networks
Rawat, Danda MC2.2 763 Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications
Rayermann, Patrick RES.4 841 DOD SATCOM Growth Measurement and Planning
Reddy, Achyut ATT.2 993 Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems
Reed, Jeffrey SEC.2 379 5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
Reising, Donald SEC.3 385 An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications
Restuccia, Francesco WS2: Paper Session I.2 19 3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems
Rettore, Paulo Henrique SDN.2 110 Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead
ATT.1 986 Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Rigolin F. Lopes, Roberto SDN.2 110 Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead
ATT.1 986 Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Rivas, Veronica DCA.2   Automatic Data Generation and Rule Creation for Network Scanning Tools
Robinson, Joshua WC2.2 362 Data-Centric Approaches to Radio Frequency Machine Learning
Rogers, Darren MCN.2 541 Manipulating the Automatic Identification System With Extremely Low-Cost Hardware
Rowe, David ONC.2 259 Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
Royster, Thomas RTC.2 404 Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks
RES.1 822 Receiver Diversity in LEO Satcom Constellations
RES.2 828 Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies
Ryu, Bo RTC.3 412 DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing
NMS.1 515 Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE
MCN.4 553 5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Sadeghi, Koosha ATT.4 1005 Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems
Sadler, Brian MC2.2 763 Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications
Sagduyu, Yalin WS2: Paper Session I.1 13 Sensing-Throughput Tradeoffs With Generative Adversarial Networks for NextG Spectrum Sharing
MCN.3 547 Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems
WS7: Paper Session III (Machine Learning Services).2 1076 Adversarial Machine Learning and Defense Game for NextG Signal Classification With Deep Learning
Sai Teja, Kolliboina YSW.11 693 Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off
Saikia, Prajwalita WS3: Paper Session IV.2 55 DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems
Samson, Judith RTC.1 398 SCRIP: Safe and Cycle-Free Multi-Path Routing
Sayed, Ahmed 5GS.4 577 Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Schalk, Adrian ROB.3 350 Analysis of Vulnerabilities in Satellite Software Bus Network Architecture
Schmitt, Corinna SDN.3 117 RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs
Schotten, Hans PCM.4 793 Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks
Schraml, Matthias SAT.1 612 Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems
Selim, Mohamed YSW.13 705 Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach
Seth, Sayanta DRF.4 507 Forming Coalition Sets From Directional Radios
Shake, Thomas RTC.2 404 Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks
RES.2 828 Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies
Shan, Tao RSN.4 817 Coverage Estimation for Secure Ultraviolet Communication
Sharif, Sana WS3: Paper Session I.2 7 Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks
Sharma, Prabhat WS3: Paper Session III.1 37 Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility
Sharma, Salil MC1.4 95 Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs
Shashidhar, Bharath WS2: Paper Session II.1 72 Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications
Shebert, Samuel COG.2 186 Multi-Signal Classification Using Deep Learning and Sparse Arrays
Shen, Dan MC2.2 210 Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment
DRF.3 501 Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs
Shetty, Sachin MLC.4 464 Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness
5GS.1 559 Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace
Shi, Yi WS2: Paper Session I.1 13 Sensing-Throughput Tradeoffs With Generative Adversarial Networks for NextG Spectrum Sharing
Shrader, Brooke PCM.1 775 Rate Control With Autoregressive Forecasting for High Frequency Communication
Sidoran, James L. 5GS.4 577 Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Sigholm, Johan YSW.9 679 Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North
Sikora, Paul ANT.3 606 On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies
Silvius, Mark COG.3 192 Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems
Singh, Keshav WS3: Paper Session I.1 1 Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks
WS3: Paper Session II.2 31 UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications
WS3: Paper Session III.1 37 Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility
WS3: Paper Session IV.2 55 DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems
Singh, Satinder MC2.3 769 Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems
PHY.4 867 Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles
Siraj, Md Sadman AIR.3 148 Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing
Smith, Brad RTC.1 398 SCRIP: Safe and Cycle-Free Multi-Path Routing
Smith, Daniel ONC.1 253 Rapid Interoperability With OverlAI Gateways
Smith, Sidney PHY.2 855 An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
Snoap, John WC1.1 298 Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features
Sole, Robert AIR.2 140 Quantitative Assessment of Federal Airborne Systems' Spectrum Usage
Song, Aijun PCM.2 781 Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication
Song, Daniel YSW.18 735 Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures
Song, William YSW.18 735 Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures
Sousa Dias, Paulo RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Spelter, Florian ATT.1 986 Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Spooner, Chad WC1.1 298 Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features
Srivastava, Mani WS7: Paper Session I (Battlefield IoT).1 1053 Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs
Sruti, S YSW.11 693 Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off
Stahlbuhk, Thomas PCM.1 775 Rate Control With Autoregressive Forecasting for High Frequency Communication
Stefanelli, Cesare WS6: Paper Session.2 1018 NDN Experimental Evaluation in Multi-Domain Tactical Environments
Stein, David SEC.1 374 Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments
Sterner, Ulf RTN.4 247 Frequency-Hop-Coded SCB for Tactical Networks
Stevens, Nathan ANT.1   Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)
Stinco, Pietro RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Stokes, Jack MLC.1 442 I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation
Stone, Kerri WS3: Paper Session II.1 25 Positive and Unlabeled Learning for Mobile Application Traffic Classification
Stowell, Kate DEF.4 173 Mission Resilience Experimentation and Evaluation Testbed
Sun, Jun RTC.2 404 Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks
RES.2 828 Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies
Suri, Niranjan WS6: Paper Session.1 1011 Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks
WS6: Paper Session.2 1018 NDN Experimental Evaluation in Multi-Domain Tactical Environments
WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
WS7: Invited Paper.1 1045 Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
Sweeney, Matthew YSW.3 643 Securing Software Updates Under Receiver Radio Frequency Geolocation Risk
Szczypiorski, Krzysztof WS6: Paper Session.3 1024 5G-Enabled Defence-In-Depth for Multi-Domain Operations
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Taghizadeh, Omid WS3: Paper Session IV.2 55 DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems
Taha, Mohamed A. SEC.3 385 An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications
Talhi, Chamseddine WS3: Paper Session IV.1 49 Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption
YSW.1 629 Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks
Tang, Shuhai MC1.1 583 CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel
Tang, Zixian MLC.3 458 High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree
Tchakountio, Fabrice SIG.2 907 SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence
Tesei, Alessandra RTN.3 241 Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience
Thapa, Bishal ONC.1 253 Rapid Interoperability With OverlAI Gateways
MC1.2 588 PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction
Thornton, Charles COG.4 198 Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming
Tope, Michael MC2.4 222 On the Limits of Learning a Discrete Memoryless Communication Channel
Tortonesi, Mauro WS6: Paper Session.1 1011 Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks
WS6: Paper Session.2 1018 NDN Experimental Evaluation in Multi-Domain Tactical Environments
WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Tosh, Deepak ONC.4 273 Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks
FML.3 484 Network Anomaly Detection Using Federated Learning
Tosun, Mustafa UAV.3 962 An Architectural Design for Autonomous and Networked Drones
Towliat, Mohammad PCM.2 781 Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication
Tran, Lan RSN.3 810 WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions
Tran, Nghi SIG.1 901 Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC
Tränkler, Maximilian SDN.3 117 RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs
Tripathi, Nishith SEC.2 379 5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
Tsiropoulou, Eirini Eleni AIR.3 148 Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing
Tummala, Murali YSW.16 723 A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications
Turck, Kurt WS2: Paper Session I.2 19 3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems
Tyler, Joshua SEC.3 385 An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Uluagac, Selcuk YSW.20   LoFin: LoRa-Based UAV Fingerprinting Framework
STC.3 980 LoFin: LoRa-Based UAV Fingerprinting Framework
Upthegrove, Tim ONC.1 253 Rapid Interoperability With OverlAI Gateways
MC1.2 588 PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Valdez Mendoza, Jonathan UAV.2 956 Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks
Valenti, Matthew AIR.1 133 Air-Aided Communication Between Ground Assets in a Poisson Forest
Valieva, Inna WS2: Paper Session II.1 72 Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications
Van Hau, Le PHY.4 867 Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles
Vandekerckhove, Joachim PHY.1 849 Mathematical Modeling of Cyber Resilience
PHY.2 855 An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
Vanderveen, Michaela 5GS.2 565 Threat Framework for 5G Cellular Communications
Veeravalli, Venugopal WS7: Paper Session I (Battlefield IoT).1 1053 Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs
Veksler, Maryna YSW.20   LoFin: LoRa-Based UAV Fingerprinting Framework
STC.3 980 LoFin: LoRa-Based UAV Fingerprinting Framework
Venkataramani, Guru MLC.2 450 Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
YSW.19 743 Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
Venkatesan, Sridhar ATT.2 993 Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems
Vigil, A RES.4 841 DOD SATCOM Growth Measurement and Planning
Voitenko, Iurii WS2: Paper Session II.1 72 Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications
Vosoughi, Azadeh DRF.4 507 Forming Coalition Sets From Directional Radios
Vu, Bich DEF.4 173 Mission Resilience Experimentation and Evaluation Testbed
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wang, Angela ONC.2 259 Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
SEC.2 379 5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
Wang, Jiafan MC1.1 583 CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel
Wang, Lan YSW.12 699 NDNSD: Service Publishing and Discovery in NDN
Wang, Qiang MLC.3 458 High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree
Wang, Shuyi WS3: Paper Session IV.4 66 Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications
Wang, Tianshi WS7: Position Paper.1 1082 The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example
Wang, Wei WS3: Paper Session III.2 43 A Secured Protocol for IoT Devices in Tactical Networks
Wang, Wen MLC.3 458 High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree
Wang, Yuhui UAV.1 950 Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications
Wang, Zheng PCM.3 787 Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler
Weisman, Michael PHY.1 849 Mathematical Modeling of Cyber Resilience
PHY.2 855 An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
Weiss, Martin YSW.17 729 Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access
Weitzen, Jay SEC.1 374 Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments
Weston, Jeffery RSN.1 799 Distributed Agent Consensus Performance in Resilient Communication Networks
White, Zachary YSW.16 723 A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications
Whitehead, James RSN.2 805 A Novel Resilient HF Data Communications Architecture
Wibisono, Andre FML.1 470 Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings
Wiens, Brett MC1.3 89 Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations
Winters, Jack MMO.2 324 Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems
Wissingh, Bastiaan WS6: Paper Session.2 1018 NDN Experimental Evaluation in Multi-Domain Tactical Environments
Wong, Lauren WC1.2 304 Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features
Wood, Andrew MC1.2 588 PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction
Wood, John RSN.3 810 WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions
Woods, Timothy MCN.1 535 The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks
Wrona, Konrad WS6: Paper Session.3 1024 5G-Enabled Defence-In-Depth for Multi-Domain Operations
WS7: Invited Paper.1 1045 Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
Wu, Eugene YSW.18 735 Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Xia, Xianggen PCM.2 781 Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication
Xiao, Yu MC1.2 84 Polynomial Phase Modulation Based NOMA
Xu, Hao SEC.4 393 Some Discussions on PHY Security in DF Relay
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Yahja, Alex RTC.3 412 DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing
Yan, Jonmei ANT.2 600 Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays
Yan, Wenjuan WS3: Paper Session IV.4 66 Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications
Yang, Hanchao SEC.2 379 5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
Yang, Hongwen SEC.4 393 Some Discussions on PHY Security in DF Relay
Yang, Na MC1.1 583 CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel
Yang, Ryan FML.1 470 Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings
Yang, Yaling SEC.2 379 5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
Yener, Aylin RTN.1 229 Peak Age of Information With Receiver Induced Service Interruptions
Yi, Yang PCM.3 787 Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler
Ying, Lingyun MLC.3 458 High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree
Younis, Mohamed YSW.14 711 Data-Driven Wireless Anomaly Detection Using Spectral Features
Yu, Aimin DCA.4 292 LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining
Yu, Paul CLD.1 926 Adaptive Monitoring for Analytics Placement in Tactical Networks
Yu, Xi AIR.1 133 Air-Aided Communication Between Ground Assets in a Poisson Forest
Yuksel, Murat DRF.4 507 Forming Coalition Sets From Directional Radios
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Zabele, Stephen ONC.3 265 Mission Critical Resiliency With IRON
Zaccarini, Mattia WS6: Paper Session.5 1038 Enabling Adaptive Communications at the Tactical Edge
Zang, Xujie SEC.4 393 Some Discussions on PHY Security in DF Relay
Zeadally, Sherali WS3: Paper Session I.2 7 Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks
Zhai, Haotian AJC.3 431 Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications
Zhang, Huan DCA.4 292 LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining
Zhang, Huanle FML.2 478 FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective
Zhang, Jianzhong PCM.3 787 Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler
S&R.1 873 MADRL Based Scheduling for 5G and Beyond
Zhang, Mi FML.2 478 FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective
Zhang, Peng S&R.2 879 Toward Congestion Control in Lossy Networks via Local Queue-Management Policies
Zhang, Xi CLD.4 944 Lyapunov Stability Analyses for Controlling UAV Trajectory Over 6G Mobile Wireless Networks
Zhao, Lixin DCA.4 292 LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining
Zhu, Qixuan CLD.4 944 Lyapunov Stability Analyses for Controlling UAV Trajectory Over 6G Mobile Wireless Networks
Zhu, Quanyan 5GS.3 571 MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks
Zhu, Ting WS3: Paper Session III.2 43 A Secured Protocol for IoT Devices in Tactical Networks
Znati, Taieb YSW.17 729 Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access
Zou, Cliff YSW.8 672 Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms
Zulkernine, Mohammad NMS.2 522 SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments