Papers by title
3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems
5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study
5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference
5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE
5G-Enabled Defence-In-Depth for Multi-Domain Operations
A Comprehensive Study of CPM Trellis Initialization Methods
A Customized Approach to Cybersecurity Education for Space Professionals
A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels
A Novel Resilient HF Data Communications Architecture
A Robust Self-Synchronized Quantum Key Distribution Protocol
A Secured Protocol for IoT Devices in Tactical Networks
A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications
Adaptive Monitoring for Analytics Placement in Tactical Networks
Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study
Adversarial Machine Learning and Defense Game for NextG Signal Classification With Deep Learning
Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning
Air-Aided Communication Between Ground Assets in a Poisson Forest
Allan Deviation of Social Learning Distributed Network Time Synchronization
An Architectural Design for Autonomous and Networked Drones
An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications
An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience
An Intelligent and Private 6G Air Interface Using Physical Layer Security
An Opportunistic Scheme for Low Probability of Detection Communication
An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation
Analysis of Vulnerabilities in Satellite Software Bus Network Architecture
Asymmetric Collision Phenomenon and Its Impact on Underwater Acoustic Networks
Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness
Automatic Data Generation and Rule Creation for Network Scanning Tools
Base Station Deployment Optimization in Federated Networks With Multi-Hop Communication
Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics
Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach
C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification
Clustered Distributed Spatial Multiplexing
Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments
Considerations of Reinforcement Learning Within Real-Time Wireless Communication Systems
Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs
Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks
Coverage Estimation for Secure Ultraviolet Communication
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems
Data-Centric Approaches to Radio Frequency Machine Learning
Data-Driven Wireless Anomaly Detection Using Spectral Features
Decentralized Bandits With Feedback for Cognitive Radar Networks
Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems
Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications
Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems
DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing
Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)
Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems
Distributed Agent Consensus Performance in Resilient Communication Networks
Do You Really Need to Disguise Normal Servers as Honeypots?
DOD SATCOM Growth Measurement and Planning
DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption
Efficient Generative Wireless Anomaly Detection for Next Generation Networks
Enabling Adaptive Communications at the Tactical Edge
Enabling Machine Learning on Resource-Constrained Tactical Networks
Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication
Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs
Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks
FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective
Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems
Forming Coalition Sets From Directional Radios
Frequency-Hop-Coded SCB for Tactical Networks
GAN-Based Detection of Adversarial EM Signal Waveforms
Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction
Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm
Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy
Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree
I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation
Improving Quality of Service in a Mesh Network Using Age of Information
Improving Text Security Classification Towards an Automated Information Guard
Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network
Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making
Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks
Jamming Vulnerability of Terahertz Wireless Networks
Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs
Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles
Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming
Link Reliability of Satellite-To-Ground Free-Space Optical Communication Systems in South Korea
Locally-Hosted Fidelity-Adaptive Honeypots With Connection-Preserving Capabilities
LoFin: LoRa-Based UAV Fingerprinting Framework
LoFin: LoRa-Based UAV Fingerprinting Framework
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining
Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler
Lyapunov Stability Analyses for Controlling UAV Trajectory Over 6G Mobile Wireless Networks
MADRL Based Scheduling for 5G and Beyond
MalGrid: Visualization of Binary Features in Large Malware Corpora
Manipulating the Automatic Identification System With Extremely Low-Cost Hardware
Mathematical Modeling of Cyber Resilience
Mission Critical Resiliency With IRON
Mission Resilience Experimentation and Evaluation Testbed
Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band
MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks
Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks
Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment
Multi-Signal Classification Using Deep Learning and Sparse Arrays
Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs
NDN Experimental Evaluation in Multi-Domain Tactical Environments
NDNSD: Service Publishing and Discovery in NDN
Near Term Resilient Teleports for DoD SATCOM
Network Anomaly Detection Using Federated Learning
On the Limits of Learning a Discrete Memoryless Communication Channel
On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies
Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing
Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility
Peak Age of Information With Receiver Induced Service Interruptions
Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off
Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery
Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations
Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE
Polynomial Phase Modulation Based NOMA
Positive and Unlabeled Learning for Mobile Application Traffic Classification
Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications
Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems
Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection
PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction
Quantitative Assessment of Federal Airborne Systems' Spectrum Usage
Radio Modulation Classification Using Deep Residual Neural Networks
Rapid Interoperability With OverlAI Gateways
Rate Control With Autoregressive Forecasting for High Frequency Communication
Receiver Diversity in LEO Satcom Constellations
Reduced Complexity Adaptive Demodulation in Impulse Noise Channels
Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks
RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs
SCRIP: Safe and Cycle-Free Multi-Path Routing
Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO
Securing Software Updates Under Receiver Radio Frequency Geolocation Risk
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning
Sensing-Throughput Tradeoffs With Generative Adversarial Networks for NextG Spectrum Sharing
SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels
Some Discussions on PHY Security in DF Relay
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks
Statistical Analysis of the MK-3 Customizable Authenticated Encryption
Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks
TensorShield: Tensor-Based Defense Against Adversarial Attacks on Images
The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin
The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example
Threat Framework for 5G Cellular Communications
Toward Congestion Control in Lossy Networks via Local Queue-Management Policies
Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES
Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead
UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization
Unsupervised Radio Scene Analysis Using Neural Expectation Maximization
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects
Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects