MILCOM 2022 logo
IEEE

Papers by title

3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z
3top 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

3D-O-RAN: Dynamic Data Driven Open Radio Access Network Systems

5top 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

5G Physical Layer Resiliency Enhancements With NB-IoT Use Case Study

5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar Interference

5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator With EMANE

5G-Enabled Defence-In-Depth for Multi-Domain Operations

Atop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

A Comprehensive Study of CPM Trellis Initialization Methods

A Customized Approach to Cybersecurity Education for Space Professionals

A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased Arrays

A New Low-Complexity Polar Code Construction for BICM Over AWGN Channels

A Novel Resilient HF Data Communications Architecture

A Robust Self-Synchronized Quantum Key Distribution Protocol

A Secured Protocol for IoT Devices in Tactical Networks

A Transmit Diversity Scheme for Multipulse-Pulse Position Modulated Visible Light Communications

Adaptive Monitoring for Analytics Placement in Tactical Networks

Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case Study

Adversarial Machine Learning and Defense Game for NextG Signal Classification With Deep Learning

Adversarial Sybil Attacks Against Deep RL Based Drone Trajectory Planning

Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military Settings

Air-Aided Communication Between Ground Assets in a Poisson Forest

Allan Deviation of Social Learning Distributed Network Time Synchronization

An Architectural Design for Autonomous and Networked Drones

An Assessment of Entropy-Based Data Reduction for SEI Within IoT Applications

An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience

An Intelligent and Private 6G Air Interface Using Physical Layer Security

An Opportunistic Scheme for Low Probability of Detection Communication

An Optimal Network Control Framework for Wireless SDN: From Theory to Implementation

Analysis of Vulnerabilities in Satellite Software Bus Network Architecture

Asymmetric Collision Phenomenon and Its Impact on Underwater Acoustic Networks

Attack Graph Embedded Machine Learning Platform for Cyber Situational Awareness

Automatic Data Generation and Rule Creation for Network Scanning Tools

Btop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Base Station Deployment Optimization in Federated Networks With Multi-Hop Communication

Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic Statistics

Blockage Prediction for Mobile UE in RIS-Assisted Wireless Networks: A Deep Learning Approach

Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield Things

Ctop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

C Program Partitioning With Fine-Grained Security Constraints and Post-Partition Verification

Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived Features

Clustered Distributed Spatial Multiplexing

CNN-Based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading Channel

Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North

Comparing Performance of Group Communications Protocols Over SCB Versus Routed MANET Networks

Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments

Considerations of Reinforcement Learning Within Real-Time Wireless Communication Systems

Context-Aware Collaborative Neuro-Symbolic Inference in IoBTs

Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks

Coverage Estimation for Secure Ultraviolet Communication

Dtop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems

Data-Centric Approaches to Radio Frequency Machine Learning

Data-Driven Wireless Anomaly Detection Using Spectral Features

Decentralized Bandits With Feedback for Cognitive Radar Networks

Deep Learning-Based Interference Detection and Classification for LPI/LPD Radar Systems

Deep Reinforcement Learning for Deception in IRS-Assisted UAV Communications

Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems

DeepADMR: A Deep Learning Based Anomaly Detection for MANET Routing

Development of a Transmit and Receive (T/R) Phased Array Antenna for Common Data Link (CDL)

Differential Detection Based Deterministic Linear Processing for Single-User MIMO Systems

Distributed Agent Consensus Performance in Resilient Communication Networks

Do You Really Need to Disguise Normal Servers as Honeypots?

DOD SATCOM Growth Measurement and Planning

DRL Algorithms for Efficient Spectrum Sharing in RIS-Aided MIMO Radar and Cellular Systems

Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption

Etop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Efficient Generative Wireless Anomaly Detection for Next Generation Networks

Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized Access

Enabling Adaptive Communications at the Tactical Edge

Enabling Machine Learning on Resource-Constrained Tactical Networks

Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex Communication

Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization Among UASs

Ftop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies

Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks

FedTune: Automatic Tuning of Federated Learning Hyper-Parameters From System Perspective

Formal Adversarial Analysis of Machine Learning Based Cyber Physical Authentication Systems

Forming Coalition Sets From Directional Radios

Frequency-Hop-Coded SCB for Tactical Networks

Gtop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

GAN-Based Detection of Adversarial EM Signal Waveforms

Generalized Noncoherent Space-Time Block Codes From Quantum Error Correction

Graph Convolutional Network-Based Scheduler for Distributing Computation in the Internet of Robotic Things

Htop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Hector: A Reinforcement Learning-Based Scheduler for Minimizing Casualties of a Military Drone Swarm

Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission Autonomy

Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious Approach

High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree

Itop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

I Know Your Triggers: Defending Against Textual Backdoor Attacks With Benign Backdoor Augmentation

Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms

Improving Quality of Service in a Mesh Network Using Age of Information

Improving Text Security Classification Towards an Automated Information Guard

Information-Based Localization and Tracking of an Uncooperative Target by Mobile Sensor Network

Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVs

Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making

Intelligent Reflecting Surface-Based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication Systems

Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular Networks

Jtop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Jamming Vulnerability of Terahertz Wireless Networks

Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay Networks

Joint Controller Placement and TDMA Link Scheduling in SDN-Enabled Tactical MANETs

Joint Energy and Correlation Based Anti-Intercepts for Ground Combat Vehicles

Ktop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace

Ltop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming

Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers With Frequency Hopping for Phased Arrays

Link Reliability of Satellite-To-Ground Free-Space Optical Communication Systems in South Korea

Locally-Hosted Fidelity-Adaptive Honeypots With Connection-Preserving Capabilities

LoFin: LoRa-Based UAV Fingerprinting Framework

LoFin: LoRa-Based UAV Fingerprinting Framework

LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining

Low-Complexity Channel Matrix Calculation for OTFS Systems With Fractional Delay and Doppler

Lyapunov Stability Analyses for Controlling UAV Trajectory Over 6G Mobile Wireless Networks

Mtop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum Applications

MADRL Based Scheduling for 5G and Beyond

MalGrid: Visualization of Binary Features in Large Malware Corpora

Manipulating the Automatic Identification System With Extremely Low-Cost Hardware

Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 Experience

Mathematical Modeling of Cyber Resilience

Mission Critical Resiliency With IRON

Mission Resilience Experimentation and Evaluation Testbed

Models for Frequency Doppler Shift Prediction for LEO Satellites at L-Band

MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G Networks

Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV Networks

Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent Systems

Multi-Carrier Constant Envelope GNSS Waveforms Compatible With Existing User Equipment

Multi-Signal Classification Using Deep Learning and Sparse Arrays

Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform Designs

Ntop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

NDN Experimental Evaluation in Multi-Domain Tactical Environments

NDNSD: Service Publishing and Discovery in NDN

Near Term Resilient Teleports for DoD SATCOM

Network Anomaly Detection Using Federated Learning

Otop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

On the Limits of Learning a Discrete Memoryless Communication Channel

On the Tunability of Apollonian-Loaded Split Ring Resonator Topologies

Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and Timing

Outage Probability Analysis of Uplink Cell-Free Massive MIMO With User Mobility

Ptop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Peak Age of Information With Receiver Induced Service Interruptions

Performance Comparison of OTFS and MC-CDMA With Channel Estimation and Power Back-Off

Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix Recovery

Performance Variation of Gray Codes for Cropped Gaussian 16PAM Constellations

Physical Layer Abstraction for LTE and 5G New Radio With Imbalance Receiver in EMANE

Polynomial Phase Modulation Based NOMA

Positive and Unlabeled Learning for Mobile Application Traffic Classification

Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD Communications

Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite Systems

Pulse Shaping for Faster-Than-Nyquist to Enable Low-Complexity Detection

PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot Prediction

Qtop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Quantitative Assessment of Federal Airborne Systems' Spectrum Usage

Rtop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Radio Modulation Classification Using Deep Residual Neural Networks

Rapid Interoperability With OverlAI Gateways

Rate Control With Autoregressive Forecasting for High Frequency Communication

Receiver Diversity in LEO Satcom Constellations

Reduced Complexity Adaptive Demodulation in Impulse Noise Channels

Remote and Rural Connectivity via Multi-Tier Systems Through SDN-Managed Drone Networks

Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware Impairments

Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array Architectures

Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant Features

RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETs

Stop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum Coexistence

SCRIP: Safe and Cycle-Free Multi-Path Routing

Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMO

Securing Software Updates Under Receiver Radio Frequency Geolocation Risk

Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning

Sensing-Throughput Tradeoffs With Generative Adversarial Networks for NextG Spectrum Sharing

SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast Channels

Some Discussions on PHY Security in DF Relay

Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks

Statistical Analysis of the MK-3 Customizable Authenticated Encryption

Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel With 1-Bit ADC

SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator With Flight Subsystems for Cyber-Attack Modeling and Assessments

Ttop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks

TensorShield: Tensor-Based Defense Against Adversarial Attacks on Images

Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network Applications

The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-As-a-Plugin

The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT Example

The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized Networks

Threat Framework for 5G Cellular Communications

Toward Congestion Control in Lossy Networks via Local Queue-Management Policies

Toward Zero Trust Security IN 5G OPEN ARCHITECTURE NETWORK SLICES

Towards Data-Driven Autonomous Cyber Defence for Military Unmanned Vehicles With Autonomous Capabilities -- Threats & Attacks

Towards Software-Defined Tactical Networks: Experiments and Challenges for Control Overhead

Utop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

UAV Aided FD-NOMA for Energy-Efficient Ultra-Reliable Low-Latency Communications

Unsupervised Radio Scene Analysis Using Neural Expectation Maximization

Unsupervised Radio Scene Analysis Using Neural Expectation Maximization

Vtop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects

Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects

Wtop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

WHAC-A-MOLE: Wireless Heterogeneous Adaptive Communications Architecture for Multi-Waveform Obfuscation of Localizable Emissions

Ztop 3 5 A B C D E F G H I J K L M N O P Q R S T U V W Z

Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications