MILCOM 2023 logo
IEEE

Author index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Author Session Start page Title
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Abdalla, Aly sabri Demo Session.12 251 Demo: SSxApp: Secure Slicing for O-RAN Deployments
Abdelzaher, Tarek Adversarial IoT.5 144 Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation
Adversarial IoT.6 150 Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines
Abdi, Mohammad Dist AI/ML.2 27 Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness
Abreu, Jefferson Demo Session.8 243 Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios
Agnew, Dennis S3.2 170 Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks
S9.4 504 Detection of Cyberattacks in an Software-Defined UAV Relay Network
Ahmed, Ejaz Dist AI/ML.6 51 DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning
Military 5G.1 63 Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed
Alanazi, Hamidah S11.2 542 Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection
Alexandrov, Boian S3.1 162 Electrical Grid Anomaly Detection via Tensor Decomposition
Alter, Tomer S1.3 286 Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETs
Alwan, Elias NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Amato, Alessandro Coalition Federated Operations.1 201 Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE
Andersen, Emil Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Anderson, Cleon Dist AI/ML.5 45 Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment
S27.3 888 Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments
Anderson, Gustave Demo Session.2 227 Demonstration of 5G-Underlay Signal Co-Existence
S2.1 298 Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling
S2.2 304 Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation
Andersson, Andreas S22.3 574 Deep Learning-Based Demodulation in Impulse Noise Channels
Arbi, Tarak S10.1 510 Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption
Arguello, Cesar S10.4 528 Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics
Argyriou, Antonios S22.4 580 Waveform Manipulation Against DNN-Based Modulation Classification Attacks
Arya, Sudhanshu S11.4 554 SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection
Ashdown, Jonathan Dist AI/ML.2 27 Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness
S6.3 418 Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems
S8.4 478 Online Learning Meets Semantic Communication Over Wireless Channels
Assoume, Verdier S19.3 787 Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL
Axell, Erik S22.3 574 Deep Learning-Based Demodulation in Impulse Noise Channels
Axford, Roy S8.1 456 Increasing the Supportable Number of WGS Users
Azarderakhsh, Reza NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Babatunde, Simeon Dist AI/ML.4 39 M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices
Baker, Patrick S8.2 464 Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation
Baron-Hyppolite, Adrian Demo Session.8 243 Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios
Barz, Christoph Coalition Federated Operations.3 213 Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing
Bash, Boulat Quantum Tech.3 103 Spread Photon Transceiver for Quantum Secure Communications
Bastian, Nathaniel Adversarial IoT.1 121 Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection
Adversarial IoT.7 156 Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models
S5.2 268 Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning
S24.4 944 Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving
Bates, Isabella S26.3 761 Modeling and Generation of Realistic Network Activity
Bathen, Luis Dist AI/ML.4 39 M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices
Beckwith, Luke NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Becue, Adrien Coalition Federated Operations.2 207 Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation
Bell, Richard S5.4 397 Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System
Ben Mosbah, Aziza S20.2 807 System-Level Evaluation of 5G NR UE-Based Relays
Benson, Kent S20.1 799 Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches
Bentley, Elizabeth Demo Session.11 249 Interference-Avoiding RFSoC-Based MIMO Links
S21.1 827 Dynamic Interference-Avoiding MIMO Links
Berenbeim, Alexander Adversarial IoT.7 156 Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models
Bernhardt, Jordan S17.1 599 ATIC: Automated Testbed for Interference Testing in Communication Systems
Beugin, Yohan S11.1 536 Characterizing the Modification Space of Signature IDS Rules
Bharadia, Dinesh Demo Session.9 245 BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios
S5.4 397 Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System
Bhattacharyya, Joydeep Adversarial IoT.4 139 Feature Compression for Multimodal Multi-Object Tracking
Bi, Shengping S11.2 542 Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection
Bidon, Stéphanie S10.2 516 DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization
Black, Ryan S7.3 444 Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network
Blackwell, David S12.3   Surface Wave Modes and Radiative Properties of a Plasma Antenna
Bondada, Kumar Sai Demo Session.2 227 Demonstration of 5G-Underlay Signal Co-Existence
S2.1 298 Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling
S2.2 304 Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation
Bovet, Gérôme S16.1 673 Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
Bristow, Austin Quantum Tech.4 109 Pragmatic Quantum-Classic Phase Estimation of a Quantum Channel
Brock, James S16.2 679 Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries
Brown, Scott Dist AI/ML.5 45 Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment
Bucklew, Victor Quantum Tech.3 103 Spread Photon Transceiver for Quantum Secure Communications
Buehrer, R. Michael S25.1 950 Time-Diverse Doppler-Only LEO PNT
Bullock, Michael Quantum Tech.3 103 Spread Photon Transceiver for Quantum Secure Communications
Burger, Eric NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Burke, Quinn S20.4 821 mMLSnet: Multilevel Security Network With Mobility
Burt, Timothy Quantum Tech.3 103 Spread Photon Transceiver for Quantum Secure Communications
Bush, Kyle S7.3 444 Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Caesar, Matthew S18.1 722 Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms
Cailleux, Laurent S6.1 405 An Interoperable Zero Trust Federated Architecture for Tactical Systems
Camp, Tracy S24.1 925 Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications
Cao, Huiping S3.1 325 CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection
S3.4 345 FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning
Cardone, Martina S26.4 767 Low-Delay Proactive Mechanisms for Resilient Communication
Chadha, Ritu S1.2 7 Data-Driven Constraint Mining for Realizable Adversarial Samples
Chakraborty, Abhishek S17.2 605 On Reliability of CBRS Communications Near U.S. Navy Installations in San Diego
Chan, Kevin S8.2 464 Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation
S27.3 888 Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments
Chang, Shu-Ying Demo Session.6 239 Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring
Cheah, Jonathon S19.1 773 An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes
Chen, Kwang-Cheng Quantum Tech.4 109 Pragmatic Quantum-Classic Phase Estimation of a Quantum Channel
Chen, Peng S12.2 593 Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design
S21.4 845 Secure Beamforming in DLA-Based CAP-MIMO
Chen, Xiaonan S23.1 901 Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach
Chen, Yading S23.1 901 Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach
Chen, Zheyu S8.2 464 Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation
Cheng, Xiang Demo Session.2 227 Demonstration of 5G-Underlay Signal Co-Existence
S2.1 298 Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling
S2.2 304 Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation
Cheng, Zhenqiao S12.2 593 Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design
S21.4 845 Secure Beamforming in DLA-Based CAP-MIMO
Chevalier, Pascal S10.3 522 Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling
Chiejina, Azuka Demo Session.7 241 Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed
Choi, Jaehyuk S22.2 568 Towards Scalable Automatic Modulation Classification via Meta-Learning
Choi, Jungwook S1.4 292 Distributed Space-Time Block Coding for Barrage Relay Networks
Chowdhury, Md Sarwar Uddin S7.2 438 In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying Platforms
Chu, Liang Military 5G.3 77 Anti-Jamming Resilient LEO Satellite Swarms
Chuberre, Nicolas Military 5G.2 71 DOTMFLPI Analysis of 5G for Several Military Use Cases
Claus, Reinhard Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Clausen, Thomas S6.1 405 An Interoperable Zero Trust Federated Architecture for Tactical Systems
Cobb, Adam Adversarial IoT.7 156 Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models
Cohen, Aaron S12.3   Surface Wave Modes and Radiative Properties of a Plasma Antenna
Collins, Michael S11.3 548 Transient Modeling of Topology-Based Worms in Networks With Link Interference
Conti, Andrea S18.3 735 Machine Learning Based Node Selection for UWB Network Localization
Conway, Adrian S11.3 548 Transient Modeling of Topology-Based Worms in Networks With Link Interference
Cook, Trevor Quantum Tech.2 100 Computational Simulation Framework for Tactical Quantum Network Applications
Coote, Emilie S8.3 471 Platform Management System Host-Based Anomaly Detection Using TF-IDF and LSTM Autoencoder
Cortes, Jose S15.3 661 Learnable Digital Twin for Efficient Wireless Network Evaluation
Coşandal, İsmail Technical Paper Presentations.1 176 Timely Multi-Goal Transmissions With an Intermittently Failing Sensor
Cousik, Tarun S12.1 586 Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems
Coyle, Edward S14.3 635 Expected Probability of Radiometric Detection by Channelized Radiometer
Cui, Huajun S5.3 391 MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method
Curry, James S26.3 761 Modeling and Generation of Realistic Network Activity
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Da Silva, Aloizio Demo Session.13 253 End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network
Dahdal, Simon Dist AI/ML.3 33 RoamML: Distributed Machine Learning at the Tactical Edge
Dahlstrom, Jason S16.2 679 Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries
Dang, Do S19.3 787 Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL
DaSilva, Luiz Demo Session.8 243 Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios
Dean, Thomas S24.3 937 Input Output Grammar Coverage in Fuzzing
del Aguila, Alvaro S9.4 504 Detection of Cyberattacks in an Software-Defined UAV Relay Network
Delaveau, François S10.3 522 Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling
Di Caro, Edoardo Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Diggavi, Suhas Adversarial IoT.4 139 Feature Compression for Multimodal Multi-Object Tracking
Adversarial IoT.5 144 Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation
Ding, YueJin S14.2 629 Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity
Djapic, Relja Military 5G.2 71 DOTMFLPI Analysis of 5G for Several Military Use Cases
Dogan, Mine S26.4 767 Low-Delay Proactive Mechanisms for Resilient Communication
Domico, Kyle S1.3 13 The Efficacy of Transformer-Based Adversarial Attacks in Security Domains
Dong, Chaopeng S18.4 741 LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries
Doroslovacki, Milos S26.2 755 Urgency of Information Optimization at Query in an Interactive System
Drakes, James Quantum Tech.3 103 Spread Photon Transceiver for Quantum Secure Communications
Du, Changlai S3.2 331 MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection
DuChez, Jason S8.1 456 Increasing the Supportable Number of WGS Users
Duffy, Ken S14.4 643 Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol
Dutta, Rudra Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Dwyer, Matthew Dist AI/ML.5 45 Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment
S27.3 888 Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Echeverry, Nicholas Demo Session.3 233 Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio
Eckhardt, Josh S18.1 722 Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms
Efimov, Timofey S15.3 661 Learnable Digital Twin for Efficient Wireless Network Evaluation
Ekin, Sabit S1.2 280 Warping Functions Design for Long Warped ZT-DFT-s-OFDM
Ekti, Ali Rıza S1.2 280 Warping Functions Design for Long Warped ZT-DFT-s-OFDM
Elkadi, Melissa Military 5G.1 63 Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed
Eren, Maksim S3.1 162 Electrical Grid Anomaly Detection via Tensor Decomposition
Erpek, Tugba S5.2 385 Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection With Deep Learning
S20.3 815 Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution
Eveland, Brennan Demo Session.1 225 Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications
Ewetz, Rickard S15.2 655 Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions
S13.3 710 Adversarial Pixel and Patch Detection Using Attribution Analysis
S24.4 944 Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Fadul, Mohamed S5.1 377 CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints
Fan, Enguang S18.1 722 Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms
Fang, Shiwei Adversarial IoT.2 127 IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research
Farhang-Boroujeny, Behrouz S14.1 622 A Method of Estimating Sparse and Doubly-Dispersive Channels
Farrukh, Yasir Ali Adversarial IoT.1 121 Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection
Flores, Maya S23.2 907 Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency
Forsyth, M. Keith S17.1 599 ATIC: Automated Testbed for Interference Testing in Communication Systems
Fourfouris, Ioannis S19.2 779 Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs
Fragouli, Christina Adversarial IoT.4 139 Feature Compression for Multimodal Multi-Object Tracking
S26.4 767 Low-Delay Proactive Mechanisms for Resilient Communication
Fraisse, Jean-Baptiste S10.3 522 Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling
Freire, Fernando Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Fronteddu, Roberto Dist AI/ML.3 33 RoamML: Distributed Machine Learning at the Tactical Edge
Coalition Federated Operations.1 201 Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE
Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
S6.4 424 Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments
Fryer, Andrew S24.3 937 Input Output Grammar Coverage in Fuzzing
Funderburk, Mark Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Furtak, Janusz Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Galliera, Raffaele Dist AI/ML.3 33 RoamML: Distributed Machine Learning at the Tactical Edge
S6.4 424 Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments
Gamboa, Samantha S20.2 807 System-Level Evaluation of 5G NR UE-Based Relays
Garey, Wesley S20.2 807 System-Level Evaluation of 5G NR UE-Based Relays
Gartrell, Riley S7.3 444 Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network
Gautier, Roland S10.3 522 Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling
Geller, Benoît S10.1 510 Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption
Georgiadis, Apostolos S19.2 779 Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs
Gilbert, Joshua S7.3 444 Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network
Gilli, Alessandro Dist AI/ML.3 33 RoamML: Distributed Machine Learning at the Tactical Edge
Gobbi, Richard S4.4 371 Satellite Communications Resilience - Service Restoration and Retainment
Goeckel, Dennis S2.3 311 Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits
Gómez-Vega, Carlos S18.3 735 Machine Learning Based Node Selection for UWB Network Localization
Goveas, Neena S28.4 870 Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework
Gremban, Keith S26.3 761 Modeling and Generation of Realistic Network Activity
Guerra, Barbara Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Guha, Saikat Quantum Tech.3 103 Spread Photon Transceiver for Quantum Secure Communications
Guide, Ryan S11.1 536 Characterizing the Modification Space of Signature IDS Rules
Guo, Huadong S4.1 351 Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems
Guo, Jinglong S4.1 351 Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems
Guo, Xiaolei S28.3 864 On the Secrecy Performance of Aerial IRS-Assisted Wireless Communications
Gürses, Anıl Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Güvenç, Ismail Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Gyawali, Sohan S15.1 649 Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ha, Jeongseok Quantum Tech.5 115 Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes
Ha, Sean S19.4 793 Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4
Haab, David S14.1 622 A Method of Estimating Sparse and Doubly-Dispersive Channels
Hägglund, Kristoffer S22.3 574 Deep Learning-Based Demodulation in Impulse Noise Channels
Hanafy, Walid Adversarial IoT.5 144 Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation
Hänel, Thomas Coalition Federated Operations.3 213 Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing
Hanna, Osama Adversarial IoT.4 139 Feature Compression for Multimodal Multi-Object Tracking
Hao, Fang S27.2 882 BIER-Like Multicast for Mobile Ad Hoc Networks
Harding, Sean S27.3 888 Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments
Harikumar, Jayashree S3.1 325 CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection
S3.4 345 FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning
Harman, David Dist AI/ML.5 45 Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment
Harnden, Blake Dist AI/ML.6 51 DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning
Harris, Frederic S5.4 397 Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System
Hassan, Zoheb S25.3 963 Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation
Headley, William Demo Session.4 235 Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications
S25.1 950 Time-Diverse Doppler-Only LEO PNT
Hofmann, Christian S4.3 365 Blind Geolocation of RF-Signals With LEO Satellite Formations
Hofmeier, Michael Demo Session.5 237 Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes
Holland, David S27.2 882 BIER-Like Multicast for Mobile Ad Hoc Networks
Hommel, Wolfgang Demo Session.5 237 Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes
Hore, Aniruddha NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Hou, Tao S11.2 542 Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection
Hou, Thomas S3.2 331 MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection
S26.1 747 Age of Critical Information: Optimizing Data Freshness Based on Content Criticality
Hua, Yingbo S21.2 833 Second-Order Analysis of Secret-Key Capacity From a MIMO Channel
Huang, Jiaqi S15.1 649 Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks
Huang, Weiqing S4.1 351 Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems
Huertas Celdrán, Alberto S16.1 673 Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
Huff, Alexandre Demo Session.13 253 End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network
Hughes, James S27.2 882 BIER-Like Multicast for Mobile Ad Hoc Networks
Hughes, Jeffrey S16.4 691 Security-As-A-Service for Embedded Systems
Hunt, Brandon S14.1 622 A Method of Estimating Sparse and Doubly-Dispersive Channels
Hussey, Jason S24.1 925 Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ibrahim, Mostafa S1.2 280 Warping Functions Design for Long Warped ZT-DFT-s-OFDM
Islam, Md Khadimul NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Ivans, Robert S13.4 716 Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis
Izmailov, Rauf S1.2 7 Data-Driven Constraint Mining for Realizable Adversarial Samples
S13.1 696 DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual Signatures
S13.2 703 An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Jacobs, Jabril S4.4 371 Satellite Communications Resilience - Service Restoration and Retainment
Jain, Ish Kumar Demo Session.9 245 BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios
Jakubisin, Daniel Demo Session.2 227 Demonstration of 5G-Underlay Signal Co-Existence
S2.1 298 Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling
S2.2 304 Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation
Jalaian, Brian S5.2 268 Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning
Jana, Rittwik S12.1 586 Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems
Jang, Jungik S22.2 568 Towards Scalable Automatic Modulation Classification via Meta-Learning
Jere, Shashank S15.4 667 Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing
Jha, Sumit S15.2 655 Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions
S13.3 710 Adversarial Pixel and Patch Detection Using Attribution Analysis
S24.4 944 Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving
Jha, Susmit Adversarial IoT.7 156 Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models
S15.2 655 Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions
S24.4 944 Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving
Jiang, Yili S15.1 649 Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks
Joe, Kevin S18.2 729 Passive Geolocation of Multiple Pulsed Emitters
Johnsen, Frank Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Johnson, Amos Demo Session.4 235 Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications
Jones, Alyse Demo Session.4 235 Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications
Jones, Daniel Quantum Tech.2 100 Computational Simulation Framework for Tactical Quantum Network Applications
Ju, Zhuoxuan S26.2 755 Urgency of Information Optimization at Query in an Interactive System
Jung, Bang Chul S1.4 292 Distributed Space-Time Block Coding for Barrage Relay Networks
Jung, Gyeong Hun S22.2 568 Towards Scalable Automatic Modulation Classification via Meta-Learning
Jung, Hyunwoo Quantum Tech.5 115 Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes
Jung, Taeho S27.1 876 TISIN: Traceable Information Sharing in Intermittent Networks
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Kabigting, Nathaniel Demo Session.7 241 Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed
Kafetzis, Dimitrios S19.2 779 Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs
Kam, Clement Technical Paper Presentations.4 194 Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems
Kang, Honggu Dist AI/ML.1 19 Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV
Kang, Joonhyuk Dist AI/ML.1 19 Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV
Kantheti, Venkata Srirama Rohit Military 5G.3 77 Anti-Jamming Resilient LEO Satellite Swarms
Karaliopoulos, Merkourios S19.2 779 Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs
Kava, Donato S16.4 691 Security-As-A-Service for Embedded Systems
Kaviani, Saeed Dist AI/ML.6 51 DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning
Kesler, John Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Khan, Irfan Adversarial IoT.1 121 Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection
Khan, Mahmudur S7.3 444 Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network
Kibiłda, Jacek Demo Session.8 243 Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios
Kim, Deokseong Dist AI/ML.6 51 DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning
Military 5G.1 63 Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed
Kim, Heechan Dist AI/ML.1 19 Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV
Kim, Jae Dist AI/ML.6 51 DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning
S18.1 722 Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms
Kim, Jaemin Quantum Tech.5 115 Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes
Kimberly, Greg S18.1 722 Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms
Kirby, Brian Quantum Tech.2 100 Computational Simulation Framework for Tactical Quantum Network Applications
Knarr, Samuel Quantum Tech.3 103 Spread Photon Transceiver for Quantum Secure Communications
Knightly, Edward S21.3 839 Experimental Evaluation of AoA Estimation for UAV to Massive MIMO
Knopp, Andreas S4.3 365 Blind Geolocation of RF-Signals With LEO Satellite Formations
Ko, Young-Chai S25.2 957 Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System
Kolias, Constantinos S13.4 716 Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis
Kompella, Sastry S26.1 747 Age of Critical Information: Optimizing Data Freshness Based on Content Criticality
Kotz, David S10.4 528 Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics
Koutsopoulos, Iordanis S9.1 484 Learning the Jointly Optimal Routing and Controller Placement Policy in Mobile Software-Defined Networks
S19.2 779 Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs
Krunz, Marwan S23.4 919 Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine Learning
Kuester, Daniel S17.1 599 ATIC: Automated Testbed for Interference Testing in Communication Systems
Kumar, Abhishek S15.3 661 Learnable Digital Twin for Efficient Wireless Network Evaluation
Kumar, Anand Mahesh Demo Session.14 255 Optimization and Control of Autonomous UAV Swarm for Object Tracking
Kumar, Pratyay S3.4 345 FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning
Kundu, Achintya Dist AI/ML.4 39 M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices
Kuzdeba, Scott S24.2 931 A Conditional Analysis of RF ML Latent Features
Kwon, Girim NextG DoD.2 89 Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
La Porta, Thomas S20.4 821 mMLSnet: Multilevel Security Network With Mobility
Lachine, Brian S8.3 471 Platform Management System Host-Based Anomaly Detection Using TF-IDF and LSTM Autoencoder
S24.3 937 Input Output Grammar Coverage in Fuzzing
Lackpour, Alex S17.3 611 Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update
Lampe, Thorsten S6.2 411 Cooperative Agent System for Quantifying Link Robustness in Tactical Networks
Lawrence, Nigel S3.1 162 Electrical Grid Anomaly Detection via Tensor Decomposition
Le, Anh Military 5G.1 63 Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed
Lee, Alice S16.4 691 Security-As-A-Service for Embedded Systems
Lee, Byeongheon S25.2 957 Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System
Lee, Eun Jae S22.2 568 Towards Scalable Automatic Modulation Classification via Meta-Learning
Lee, Howon S1.4 292 Distributed Space-Time Block Coding for Barrage Relay Networks
Lee, Ju-Hyung S25.2 957 Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System
Lee, Ki-Hun S1.4 292 Distributed Space-Time Block Coding for Barrage Relay Networks
Lee, Rhui Dih Dist AI/ML.4 39 M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices
Lei, Ming S14.2 629 Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity
Leroy, Clément S10.1 510 Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption
Leung, Kin S8.2 464 Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation
Li, Bo S5.3 391 MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method
Li, Boning S15.3 661 Learnable Digital Twin for Efficient Wireless Network Evaluation
Li, Chengzhang S26.1 747 Age of Critical Information: Optimizing Data Freshness Based on Content Criticality
Li, Chuanrong S5.3 391 MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method
Li, Hong S18.4 741 LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries
Li, Kunyang S1.3 13 The Efficacy of Transformer-Based Adversarial Attacks in Security Domains
Li, Nanxi S12.2 593 Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design
S21.4 845 Secure Beamforming in DLA-Based CAP-MIMO
Li, Siyuan S18.4 741 LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries
Li, Xinlin Adversarial IoT.4 139 Feature Compression for Multimodal Multi-Object Tracking
Li, Xueying S23.1 901 Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach
Li, Yang S5.3 391 MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method
Liang, Hung-Wen Demo Session.6 239 Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring
Lim, Jeffery S16.4 691 Security-As-A-Service for Embedded Systems
Lin, Chia-Hung Military 5G.3 77 Anti-Jamming Resilient LEO Satellite Swarms
Lin, Po-Ching Demo Session.6 239 Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring
Lin, Shih-Chun Military 5G.3 77 Anti-Jamming Resilient LEO Satellite Swarms
Lincoln, Patrick S24.4 944 Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving
Liu, Chunmei S20.2 807 System-Level Evaluation of 5G NR UE-Based Relays
Liu, Jiefei S3.4 345 FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning
Liu, Lingjia S8.4 478 Online Learning Meets Semantic Communication Over Wireless Channels
S15.4 667 Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing
S25.3 963 Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation
Liu, Qingyu S26.1 747 Age of Critical Information: Optimizing Data Freshness Based on Content Criticality
Liu, Wenming S18.4 741 LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries
Liu, Xiaofan S2.3 311 Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits
Loevenich, Johannes Coalition Federated Operations.2 207 Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation
S6.2 411 Cooperative Agent System for Quantifying Link Robustness in Tactical Networks
S9.2 491 Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN
Lorenzo, Beatriz S2.3 311 Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits
Lou, Wenjing S3.2 331 MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection
S26.1 747 Age of Critical Information: Optimizing Data Freshness Based on Content Criticality
Loveless, Thomas S5.1 377 CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ma, Song S23.1 901 Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach
Maathuis, Clara S5.1 260 Human Centered Explainable AI Framework for Military Cyber Operations
Madanayake, Arjuna NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Maksud, Ahmed S21.2 833 Second-Order Analysis of Secret-Key Capacity From a MIMO Channel
Malek, Mai Demo Session.14 255 Optimization and Control of Autonomous UAV Swarm for Object Tracking
Mangipudi, Pavan Kumar S3.2 170 Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks
Manso, Marco Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Marlin, Benjamin Adversarial IoT.2 127 IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research
Marojevic, Vuk Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Demo Session.12 251 Demo: SSxApp: Secure Slicing for O-RAN Deployments
Martínez Beltrán, Enrique Tomás S16.1 673 Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
Martinez Perez, Gregorio S16.1 673 Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
Matsui, Hidetake S1.1 274 Design SNR Optimization of Polar Codes Over Block Rician Fading Channels
Matsumine, Toshiki S1.1 274 Design SNR Optimization of Polar Codes Over Block Rician Fading Channels
Mazzaro, Gregory S10.4 528 Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics
McDaniel, Patrick S1.3 13 The Efficacy of Transformer-Based Adversarial Attacks in Security Domains
McDaniel, Patrick S11.1 536 Characterizing the Modification Space of Signature IDS Rules
S20.4 821 mMLSnet: Multilevel Security Network With Mobility
McGillivray, Duncan S17.1 599 ATIC: Automated Testbed for Interference Testing in Communication Systems
McHenry, Mark S17.3 611 Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update
McNair, Janise S3.2 170 Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks
S9.4 504 Detection of Cyberattacks in an Software-Defined UAV Relay Network
Md Tayeen, Abu Saleh S3.1 325 CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection
S3.4 345 FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning
Médard, Muriel S14.4 643 Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol
Medley, Michael Demo Session.11 249 Interference-Avoiding RFSoC-Based MIMO Links
S21.1 827 Dynamic Interference-Avoiding MIMO Links
Michaelis, James Technical Paper Presentations.3 188 Applying Mission Information Requirements to Value of Information Middleware
Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Misra, Satyajayant S3.1 325 CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection
S3.4 345 FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning
Mohammed, Awab S5.1 377 CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints
Molnar, Joe S17.3 611 Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update
Moltafet, Mohammad S16.3 685 A Practical Perfect Secrecy Approach for IoBT Systems
Moore, Joshua Demo Session.12 251 Demo: SSxApp: Secure Slicing for O-RAN Deployments
Moore, Megan S25.1 950 Time-Diverse Doppler-Only LEO PNT
Moradi, Hussein S14.1 622 A Method of Estimating Sparse and Doubly-Dispersive Channels
Morelli, Alessandro Technical Paper Presentations.3 188 Applying Mission Information Requirements to Value of Information Middleware
S6.4 424 Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments
Moscola, James S7.3 444 Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network
Moser, Steffen S7.1 430 Online Reduction of Exploration Space for Automated Underwater Modem Optimization
Most, Alexander S3.1 162 Electrical Grid Anomaly Detection via Tensor Decomposition
Mukherjee, Sarit S27.2 882 BIER-Like Multicast for Mobile Ad Hoc Networks
Muralkrishan, Madhuvanti NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Mushi, Magreth Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Naderi, Sanaz S21.1 827 Dynamic Interference-Avoiding MIMO Links
Nagaraj, Keerthiraj S3.2 170 Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks
Nahill, Ben S16.4 691 Security-As-A-Service for Embedded Systems
Neema, Sandeep S24.4 944 Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving
Ng, Nathan Adversarial IoT.6 150 Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines
Nguyen, Huy S16.4 691 Security-As-A-Service for Embedded Systems
Nguyen, Kim Khoa S7.4 450 Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches
S19.3 787 Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL
Nguyen, Ti S7.4 450 Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches
Nguyen, Van-Linh Demo Session.6 239 Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring
Nie, Zixiang S3.2 170 Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks
Nikam, Piyush S28.4 870 Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework
Noirot Ferrand, Jean-Charles S1.3 13 The Efficacy of Transformer-Based Adversarial Attacks in Security Domains
Nomeir, Mohamed Dist AI/ML.7 57 Private Membership Aggregation
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ochiai, Hideki S1.1 274 Design SNR Optimization of Polar Codes Over Block Rician Fading Channels
Oprea, Alina S13.2 703 An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers
Ornee, Tasmeen Zaman Technical Paper Presentations.4 194 Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems
Osipychev, Denis S18.1 722 Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms
Ota, Daniel Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Ouyang, Chongjun S12.2 593 Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design
S21.4 845 Secure Beamforming in DLA-Based CAP-MIMO
Özdemir, Özgür Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Pabon, Juan S27.4 894 Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement
Padnos, Steve S16.2 679 Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries
Pados, Dimitris NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Demo Session.11 249 Interference-Avoiding RFSoC-Based MIMO Links
S21.1 827 Dynamic Interference-Avoiding MIMO Links
Pandey, Divyanshu S21.3 839 Experimental Evaluation of AoA Estimation for UAV to Massive MIMO
Park, Hyuncheol NextG DoD.2 89 Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology
Park, Joo Sung NextG DoD.2 89 Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology
Park, SooBum S1.4 292 Distributed Space-Time Block Coding for Barrage Relay Networks
Pasquero, Oudomsack-Pierre S10.1 510 Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption
Pauley, Eric S11.1 536 Characterizing the Modification Space of Signature IDS Rules
Peng, Anfeng S18.1 722 Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms
Peng, Qihang S23.1 901 Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach
Peng, Yifeng S11.4 554 SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection
Perazzone, Jake S27.3 888 Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments
Perez, Beatrice S10.4 528 Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics
Perez, Oscar S3.4 345 FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning
Piatt, Emma S12.3   Surface Wave Modes and Radiative Properties of a Plasma Antenna
Pierson, Timothy S10.4 528 Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics
Pirrone, Michelle S17.1 599 ATIC: Automated Testbed for Interference Testing in Communication Systems
Poirrier, Alexandre S6.1 405 An Interoperable Zero Trust Federated Architecture for Tactical Systems
Poltronieri, Filippo Dist AI/ML.3 33 RoamML: Distributed Machine Learning at the Tactical Edge
S6.4 424 Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments
Popescu, Dimitrie S22.1 562 Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications
Poulliat, Charly S10.2 516 DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization
Powell, Keith Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Poy, Isamu S5.4 397 Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System
Provost, Lauren S16.2 679 Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries
Pyo, Jisung S22.2 568 Towards Scalable Automatic Modulation Classification via Meta-Learning
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Qiu, Zhaohua S4.1 351 Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
R. Rao, Ramesh S17.2 605 On Reliability of CBRS Communications Near U.S. Navy Installations in San Diego
Rahman, Mahfuzur S25.3 963 Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation
Rahman, Md Habibur Demo Session.13 253 End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network
Rahman, Talha Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Ramirez, David S21.3 839 Experimental Evaluation of AoA Estimation for UAV to Massive MIMO
Rastogi, Rishabh NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Ratazzi, Paul S27.1 876 TISIN: Traceable Information Sharing in Intermittent Networks
Ravesteyn, Benjamin S15.1 649 Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks
Reddy, Achyut S13.2 703 An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers
Reed, Jeffrey Demo Session.2 227 Demonstration of 5G-Underlay Signal Co-Existence
Reed, Jeffrey Demo Session.14 255 Optimization and Control of Autonomous UAV Swarm for Object Tracking
Reed, Jeffrey S2.1 298 Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling
S2.2 304 Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation
Reed, Jeffrey S12.1 586 Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems
Reed, Jeffrey S25.3 963 Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation
Reising, Donald S5.1 377 CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints
Restuccia, Francesco Dist AI/ML.2 27 Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness
S6.3 418 Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems
Rettore, Paulo Henrique Coalition Federated Operations.2 207 Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation
Coalition Federated Operations.3 213 Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing
S6.2 411 Cooperative Agent System for Quantifying Link Robustness in Tactical Networks
S9.2 491 Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN
Rezki, Zouheir S16.3 685 A Practical Perfect Secrecy Approach for IoBT Systems
Rice, Tarence S21.3 839 Experimental Evaluation of AoA Estimation for UAV to Massive MIMO
Rieß, Marcel S7.1 430 Online Reduction of Exploration Space for Automated Underwater Modem Optimization
Rifat, Shahriar S6.3 418 Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems
Rigolin F. Lopes, Roberto Coalition Federated Operations.2 207 Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation
S6.2 411 Cooperative Agent System for Quantifying Link Robustness in Tactical Networks
S9.2 491 Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN
Robinson, Joshua S24.2 931 A Conditional Analysis of RF ML Latent Features
Roque, Damien S10.2 516 DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization
Rosenfeld, Bleema S1.2 7 Data-Driven Constraint Mining for Realizable Adversarial Samples
Rouil, Richard S20.2 807 System-Level Evaluation of 5G NR UE-Based Relays
Roy, Anirban Adversarial IoT.7 156 Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models
Roy, Sumit S20.1 799 Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches
Roy Chowdhury, Mayukh Demo Session.13 253 End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network
Rupar, Michael S12.3   Surface Wave Modes and Radiative Properties of a Plasma Antenna
Russell, Paul Military 5G.1 63 Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed
Ryu, Bo Dist AI/ML.6 51 DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning
Military 5G.1 63 Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
S. R. Mallu, Jaswanth Demo Session.13 253 End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network
Saarnisaari, Harri Military 5G.2 71 DOTMFLPI Analysis of 5G for Several Military Use Cases
Sadeghi, Moein Military 5G.1 63 Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed
Sadjadpour, Hamid S16.3 685 A Practical Perfect Secrecy Approach for IoBT Systems
Saeed, Usama S8.4 478 Online Learning Meets Semantic Communication Over Wireless Channels
Sagduyu, Yalin S5.2 385 Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection With Deep Learning
S20.3 815 Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution
Saha, Souradip Military 5G.2 71 DOTMFLPI Analysis of 5G for Several Military Use Cases
Şahin, Alphan S3.3 339 Wireless Federated 𝑘-Means Clustering With Non-Coherent Over-The-Air Computation
S28.1 852 Majority Vote Computation With Complementary Sequences for Distributed UAV Guidance
Sahu, Aryan S28.4 870 Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework
Said, Karim S15.4 667 Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing
Samplawski, Colin Adversarial IoT.2 127 IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research
Sánchez Sánchez, Pedro Miguel S16.1 673 Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
Sanchez-Viloria, Jose NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Sanders, Aric S17.1 599 ATIC: Automated Testbed for Interference Testing in Communication Systems
Santos, Bruno S9.2 491 Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN
Santos, Joao Demo Session.8 243 Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios
Sartipi, Kamran S15.1 649 Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks
Sathish, Aditya Demo Session.13 253 End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network
Schaefer, Elsa S4.4 371 Satellite Communications Resilience - Service Restoration and Retainment
Schneider, Fred S16.4 691 Security-As-A-Service for Embedded Systems
Schütz, Bertram Coalition Federated Operations.3 213 Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing
Scott, Lisa Quantum Tech.2 100 Computational Simulation Framework for Tactical Quantum Network Applications
Segarra, Santiago S15.3 661 Learnable Digital Twin for Efficient Wireless Network Evaluation
Seidenfad, Karl Demo Session.5 237 Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes
Seo, Sang Yong S22.2 568 Towards Scalable Automatic Modulation Classification via Meta-Learning
Serban, Constantin S1.2 7 Data-Driven Constraint Mining for Realizable Adversarial Samples
Sevenich, Peter S9.2 491 Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN
Shah, Dhruv S28.4 870 Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework
Shah, Vijay Demo Session.7 241 Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed
S12.1 586 Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems
Shake, Thomas S4.2 357 Hybrid Geometric/Shortest-Path Routing in Proliferated Low-Earth-Orbit Satellite Networks
Shanafelt, Robert Demo Session.1 225 Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications
Shao, Shihai S17.4 617 Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields
Sharma, Pragya Adversarial IoT.3 133 Impact of Delays and Computation Placement on Sense-Act Application Performance in IoT
She, Xiaoming S12.2 593 Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design
S21.4 845 Secure Beamforming in DLA-Based CAP-MIMO
Sheatsley, Ryan S11.1 536 Characterizing the Modification Space of Signature IDS Rules
Shenoy, Prashant Adversarial IoT.5 144 Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation
Adversarial IoT.6 150 Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines
Shi, Shanghao S3.2 331 MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection
Shi, Yi S20.3 815 Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution
Shikula, Roman Demo Session.3 233 Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio
Shisher, Md Kamran Chowdhury Technical Paper Presentations.4 194 Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems
Shlezinger, Nir S1.3 286 Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETs
Sichitiu, Mihail Demo Session.10 247 Demonstration of Joint SDR/UAV Experiment Development in AERPAW
Siegel, Alexandra S26.3 761 Modeling and Generation of Realistic Network Activity
Silva, Udara NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Silverman, Steven Quantum Tech.1 95 Quantum MBSE and Quantum SysML
Silvius, Mark S17.3 611 Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update
Simon, Dominic S13.3 710 Adversarial Pixel and Patch Detection Using Attribution Analysis
Simpson, Eric S16.4 691 Security-As-A-Service for Embedded Systems
Singh, Satinder S7.4 450 Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches
S19.3 787 Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL
Sinha, Sujata S1.1 1 Channel Aware Adversarial Attacks are Not Robust
Sklivanitis, George NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Demo Session.11 249 Interference-Avoiding RFSoC-Based MIMO Links
S21.1 827 Dynamic Interference-Avoiding MIMO Links
Slomka, Frank S7.1 430 Online Reduction of Exploration Space for Automated Underwater Modem Optimization
Smith, Brad S9.3 497 Dominant Network Slices
Smith, Gavin S19.4 793 Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4
Snoap, John S22.1 562 Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications
Son, Hyunsoo NextG DoD.2 89 Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology
Song, Changqing S17.4 617 Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields
Souza, Abel Adversarial IoT.6 150 Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines
Soysal, Alkan S1.1 1 Channel Aware Adversarial Attacks are Not Robust
Spiker, Carrie Dist AI/ML.6 51 DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning
Spitzmiller, John S23.3 913 Tradespace Performance Study of Polarization-Insensitive Spatial Filtering for Jamming Suppression
Spooner, Chad S22.1 562 Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications
Srivastava, Arunabh Technical Paper Presentations.2 182 Age of Gossip on Generalized Rings
Srivastava, Mani Adversarial IoT.2 127 IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research
Adversarial IoT.3 133 Impact of Delays and Computation Placement on Sense-Act Application Performance in IoT
Stahlbuhk, Thomas S23.2 907 Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency
Starke, Allen S3.2 170 Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks
Starr, Robert S19.1 773 An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes
S19.4 793 Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4
Steele, Matt S19.1 773 An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes
Stephenson, Nathan Demo Session.7 241 Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed
Stevers, William Demo Session.3 233 Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio
Stiller, Burkhard S16.1 673 Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
Stone, Kerri S24.1 925 Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications
Stone, Rylee S16.2 679 Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries
Street, Dow S4.4 371 Satellite Communications Resilience - Service Restoration and Retainment
Sultana, Abida Demo Session.13 253 End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network
Sun, Limin S18.4 741 LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries
Sun, Yin Technical Paper Presentations.4 194 Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems
Suprenant, Joseph Demo Session.11 249 Interference-Avoiding RFSoC-Based MIMO Links
S21.1 827 Dynamic Interference-Avoiding MIMO Links
Suri, Niranjan Dist AI/ML.3 33 RoamML: Distributed Machine Learning at the Tactical Edge
Adversarial IoT.2 127 IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research
Coalition Federated Operations.1 201 Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE
Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
S6.4 424 Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments
Swami, Ananthram S15.3 661 Learnable Digital Twin for Efficient Wireless Network Evaluation
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Taha, Mohamed A. S5.1 377 CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints
Tang, Wenyi S27.1 876 TISIN: Traceable Information Sharing in Intermittent Networks
Tassiulas, Leandros S8.2 464 Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation
Taylor, Stephen S16.2 679 Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries
Tkachenko, Olena S27.3 888 Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments
Torabi, Amir Demo Session.11 249 Interference-Avoiding RFSoC-Based MIMO Links
Torres, Gabriel S16.4 691 Security-As-A-Service for Embedded Systems
Tortonesi, Mauro Dist AI/ML.3 33 RoamML: Distributed Machine Learning at the Tactical Edge
S6.4 424 Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments
Towsley, Don Adversarial IoT.6 150 Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines
Tran, Xuan Tuyen S12.1 586 Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems
Traverso, Sylvain S10.3 522 Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling
Tripathi, Asheesh Demo Session.13 253 End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network
Tripathi, Nishith Demo Session.2 227 Demonstration of 5G-Underlay Signal Co-Existence
S2.1 298 Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling
S2.2 304 Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation
Tschimben, Stefan S26.3 761 Modeling and Generation of Realistic Network Activity
Turck, Kurt Dist AI/ML.2 27 Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness
S6.3 418 Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems
Tuukkanen, Topi Military 5G.2 71 DOTMFLPI Analysis of 5G for Several Military Use Cases
Tyler, Joshua S5.1 377 CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Ulukus, Sennur Dist AI/ML.7 57 Private Membership Aggregation
Technical Paper Presentations.1 176 Timely Multi-Goal Transmissions With an Intermittently Failing Sensor
Technical Paper Presentations.2 182 Age of Gossip on Generalized Rings
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Vai, Michael S16.4 691 Security-As-A-Service for Embedded Systems
Valenti, Matthew S27.4 894 Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement
Van Hau, Le S7.4 450 Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches
Vardoulias, Georgios S19.2 779 Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs
Varkatzas, Dimitrios S22.4 580 Waveform Manipulation Against DNN-Based Modulation Classification Attacks
Varvello, Matteo S27.2 882 BIER-Like Multicast for Mobile Ad Hoc Networks
Vassilaras, Spyridon S19.2 779 Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs
Vedros, Kurt S13.4 716 Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis
Velasquez, Alvaro S15.2 655 Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions
S24.4 944 Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving
Velazquez, Alexander Coalition Federated Operations.2 207 Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation
Velazquez, Scott Demo Session.1 225 Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications
Venkatesan, Sridhar S1.2 7 Data-Driven Constraint Mining for Realizable Adversarial Samples
S13.2 703 An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers
Verdier, Assoume Mba S7.4 450 Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches
Verma, Gunjan Adversarial IoT.4 139 Feature Compression for Multimodal Multi-Object Tracking
S15.3 661 Learnable Digital Twin for Efficient Wireless Network Evaluation
Vidhyadharan, Sreejith S28.4 870 Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework
Vithana, Sajani Dist AI/ML.7 57 Private Membership Aggregation
Vitullo, Dashiell Quantum Tech.2 100 Computational Simulation Framework for Tactical Quantum Network Applications
Volakis, John NextG DoD.1 83 Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks
Vuksani, Era S11.3 548 Transient Modeling of Topology-Based Worms in Networks With Link Interference
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wali, Syed Adversarial IoT.1 121 Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection
Walker, Chase S13.3 710 Adversarial Pixel and Patch Detection Using Attribution Analysis
Wang, Fei S28.2 858 Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks
Wang, Jun S23.1 901 Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach
Wang, Jz S23.1 901 Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach
Wang, Ning S3.2 331 MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection
Wang, Shiqiang S8.2 464 Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation
Wang, Tao S11.2 542 Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection
Wang, Weijie S18.4 741 LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries
Wang, Weiping S5.3 391 MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method
Wang, Wen S4.1 351 Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems
Wang, Xiaofeng S28.1 852 Majority Vote Computation With Complementary Sequences for Distributed UAV Guidance
Wang, Ying S11.4 554 SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection
Wang, Yongpan S18.4 741 LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries
Wang, Ziqi Adversarial IoT.2 127 IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research
Wassink, Robin S16.1 673 Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
Watters, Kyle S14.3 635 Expected Probability of Radiometric Detection by Channelized Radiometer
Webb, Wesley Quantum Tech.3 103 Spread Photon Transceiver for Quantum Secure Communications
Weerackody, Vijitha S20.1 799 Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches
Wei, Shuangqing S2.4 319 Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary
Weinzierl, Daniel S4.3 365 Blind Geolocation of RF-Signals With LEO Satellite Formations
Wigness, Maggie Adversarial IoT.2 127 IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research
Win, Moe S18.3 735 Machine Learning Based Node Selection for UWB Network Localization
Wright, Kevin S11.3 548 Transient Modeling of Topology-Based Worms in Networks With Link Interference
Wrona, Konrad Coalition Federated Operations.2 207 Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation
Coalition Federated Operations.4 219 IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments
Wu, Li Adversarial IoT.5 144 Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation
Wunderlich, Adam S17.1 599 ATIC: Automated Testbed for Interference Testing in Communication Systems
Wyglinski, Alexander S23.2 907 Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency
Wynter, Laura Dist AI/ML.4 39 M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Xu, Jiarui S8.4 478 Online Learning Meets Semantic Communication Over Wireless Channels
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Yang, Hanchao Demo Session.2 227 Demonstration of 5G-Underlay Signal Co-Existence
S2.1 298 Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling
S2.2 304 Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation
Yang, Jingda S11.4 554 SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection
Yang, Kathleen S14.4 643 Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol
Yang, Yaling Demo Session.2 227 Demonstration of 5G-Underlay Signal Co-Existence
S2.1 298 Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling
S2.2 304 Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation
Yi, Shuming S28.2 858 Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks
Ying, Chenhao S2.4 319 Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary
Yoon, Young Il S22.2 568 Towards Scalable Automatic Modulation Classification via Meta-Learning
Yu, Mingli S20.4 821 mMLSnet: Multilevel Security Network With Mobility
Yu, Xi S27.4 894 Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement
Yu, Xinchun S2.4 319 Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary
Yudin, Matthew S1.2 7 Data-Driven Constraint Mining for Realizable Adversarial Samples
S13.1 696 DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual Signatures
Yuksel, Murat S7.2 438 In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying Platforms
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Zaccarini, Mattia S6.4 424 Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments
Zhan, Mengqi S5.3 391 MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method
Zhang, Chaoyu S3.2 331 MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection
Zhang, Jinchao S5.3 391 MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method
Zhang, Meng S4.1 351 Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems
Zhang, Minglong Demo Session.12 251 Demo: SSxApp: Secure Slicing for O-RAN Deployments
Zhang, Shunliang S28.3 864 On the Secrecy Performance of Aerial IRS-Assisted Wireless Communications
Zhang, Xi S28.2 858 Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks
Zhang, Xiao-Ping (Steven) S2.4 319 Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary
Zhang, Zhengguang S23.4 919 Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine Learning
Zhao, Hongzhi S17.4 617 Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields
Zhao, Ming-Min S14.2 629 Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity
Zhao, Minjian S14.2 629 Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity
Zheng, Lizhong S15.4 667 Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing
Zhou, Shengtang S23.1 901 Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach
Zhou, Yuxi S17.4 617 Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields
Zhu, Hongsong S18.4 741 LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries
Zhu, Jianchi S12.2 593 Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design
S21.4 845 Secure Beamforming in DLA-Based CAP-MIMO
Zissner, Philipp S6.2 411 Cooperative Agent System for Quantifying Link Robustness in Tactical Networks
S9.2 491 Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN
Zumegen, Frederik Demo Session.9 245 BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios