| Author |
Session |
Start page |
Title |
| A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Abdalla, Aly sabri |
Demo Session.12 |
251 |
Demo: SSxApp: Secure Slicing for O-RAN Deployments |
| Abdelzaher, Tarek |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
| Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
| Abdi, Mohammad |
Dist AI/ML.2 |
27 |
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness |
| Abreu, Jefferson |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
| Agnew, Dennis |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
| S9.4 |
504 |
Detection of Cyberattacks in an Software-Defined UAV Relay Network |
| Ahmed, Ejaz |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
| Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
| Alanazi, Hamidah |
S11.2 |
542 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection |
| Alexandrov, Boian |
S3.1 |
162 |
Electrical Grid Anomaly Detection via Tensor Decomposition |
| Alter, Tomer |
S1.3 |
286 |
Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETs |
| Alwan, Elias |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Amato, Alessandro |
Coalition Federated Operations.1 |
201 |
Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE |
| Andersen, Emil |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Anderson, Cleon |
Dist AI/ML.5 |
45 |
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment |
| S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
| Anderson, Gustave |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
| S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
| S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
| Andersson, Andreas |
S22.3 |
574 |
Deep Learning-Based Demodulation in Impulse Noise Channels |
| Arbi, Tarak |
S10.1 |
510 |
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption |
| Arguello, Cesar |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
| Argyriou, Antonios |
S22.4 |
580 |
Waveform Manipulation Against DNN-Based Modulation Classification Attacks |
| Arya, Sudhanshu |
S11.4 |
554 |
SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection |
| Ashdown, Jonathan |
Dist AI/ML.2 |
27 |
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness |
| S6.3 |
418 |
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems |
| S8.4 |
478 |
Online Learning Meets Semantic Communication Over Wireless Channels |
| Assoume, Verdier |
S19.3 |
787 |
Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL |
| Axell, Erik |
S22.3 |
574 |
Deep Learning-Based Demodulation in Impulse Noise Channels |
| Axford, Roy |
S8.1 |
456 |
Increasing the Supportable Number of WGS Users |
| Azarderakhsh, Reza |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Babatunde, Simeon |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
| Baker, Patrick |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
| Baron-Hyppolite, Adrian |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
| Barz, Christoph |
Coalition Federated Operations.3 |
213 |
Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing |
| Bash, Boulat |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
| Bastian, Nathaniel |
Adversarial IoT.1 |
121 |
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection |
| Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
| S5.2 |
268 |
Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning |
| S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
| Bates, Isabella |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
| Bathen, Luis |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
| Beckwith, Luke |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Becue, Adrien |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
| Bell, Richard |
S5.4 |
397 |
Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System |
| Ben-Mosbah, Aziza |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
| Benson, Kent |
S20.1 |
799 |
Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches |
| Bentley, Elizabeth |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
| S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
| Berenbeim, Alexander |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
| Bernhardt, Jordan |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
| Beugin, Yohan |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
| Bharadia, Dinesh |
Demo Session.9 |
245 |
BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios |
| S5.4 |
397 |
Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System |
| Bhattacharyya, Joydeep |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
| Bi, Shengping |
S11.2 |
542 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection |
| Bidon, Stéphanie |
S10.2 |
516 |
DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization |
| Black, Ryan |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
| Blackwell, David |
S12.3 |
|
Surface Wave Modes and Radiative Properties of a Plasma Antenna |
| Bondada, Kumar Sai |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
| S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
| S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
| Bovet, Gérôme |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
| Bristow, Austin |
Quantum Tech.4 |
109 |
Pragmatic Quantum-Classic Phase Estimation of a Quantum Channel |
| Brock, James |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
| Brown, Scott |
Dist AI/ML.5 |
45 |
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment |
| Bucklew, Victor |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
| Buehrer, R. Michael |
S25.1 |
950 |
Time-Diverse Doppler-Only LEO PNT |
| Bullock, Michael |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
| Burger, Eric |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Burke, Quinn |
S20.4 |
821 |
mMLSnet: Multilevel Security Network With Mobility |
| Burt, Timothy |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
| Bush, Kyle |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
| C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Caesar, Matthew |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
| Cailleux, Laurent |
S6.1 |
405 |
An Interoperable Zero Trust Federated Architecture for Tactical Systems |
| Camp, Tracy |
S24.1 |
925 |
Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications |
| Cao, Huiping |
S3.1 |
325 |
CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection |
| S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
| Cardone, Martina |
S26.4 |
767 |
Low-Delay Proactive Mechanisms for Resilient Communication |
| Chadha, Ritu |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
| Chakraborty, Abhishek |
S17.2 |
605 |
On Reliability of CBRS Communications Near U.S. Navy Installations in San Diego |
| Chan, Kevin |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
| S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
| Chang, Shu-Ying |
Demo Session.6 |
239 |
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring |
| Cheah, Jonathon |
S19.1 |
773 |
An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes |
| Chen, Kwang-Cheng |
Quantum Tech.4 |
109 |
Pragmatic Quantum-Classic Phase Estimation of a Quantum Channel |
| Chen, Peng |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
| S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
| Chen, Xiaonan |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
| Chen, Yading |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
| Chen, Zheyu |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
| Cheng, Xiang |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
| S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
| S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
| Cheng, Zhenqiao |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
| S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
| Chevalier, Pascal |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
| Chiejina, Azuka |
Demo Session.7 |
241 |
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed |
| Choi, Jaehyuk |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
| Choi, Jungwook |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
| Chowdhury, Md Sarwar Uddin |
S7.2 |
438 |
In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying Platforms |
| Chu, Liang |
Military 5G.3 |
77 |
Anti-Jamming Resilient LEO Satellite Swarms |
| Chuberre, Nicolas |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
| Claus, Reinhard |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Clausen, Thomas |
S6.1 |
405 |
An Interoperable Zero Trust Federated Architecture for Tactical Systems |
| Cobb, Adam |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
| Cohen, Aaron |
S12.3 |
|
Surface Wave Modes and Radiative Properties of a Plasma Antenna |
| Collins, Michael |
S11.3 |
548 |
Transient Modeling of Topology-Based Worms in Networks With Link Interference |
| Conti, Andrea |
S18.3 |
735 |
Machine Learning Based Node Selection for UWB Network Localization |
| Conway, Adrian |
S11.3 |
548 |
Transient Modeling of Topology-Based Worms in Networks With Link Interference |
| Cook, Trevor |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
| Coote, Emilie |
S8.3 |
471 |
Platform Management System Host-Based Anomaly Detection Using TF-IDF and LSTM Autoencoder |
| Cortes, Jose |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
| Cosandal, Ismail |
Technical Paper Presentations.1 |
176 |
Timely Multi-Goal Transmissions With an Intermittently Failing Sensor |
| Cousik, Tarun |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
| Coyle, Edward |
S14.3 |
635 |
Expected Probability of Radiometric Detection by Channelized Radiometer |
| Cui, Huajun |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
| Curry, James |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
| Cusack, Melissa |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
| D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Da Silva, Aloizio |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
| Dahdal, Simon |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
| Dahlstrom, Jason |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
| Dang, Do |
S19.3 |
787 |
Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL |
| DaSilva, Luiz |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
| Dean, Thomas |
S24.3 |
937 |
Input Output Grammar Coverage in Fuzzing |
| del Aguila, Alvaro |
S9.4 |
504 |
Detection of Cyberattacks in an Software-Defined UAV Relay Network |
| Delaveau, François |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
| Di Caro, Edoardo |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Diggavi, Suhas |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
| Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
| Ding, YueJin |
S14.2 |
629 |
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity |
| Djapic, Relja |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
| Dogan, Mine |
S26.4 |
767 |
Low-Delay Proactive Mechanisms for Resilient Communication |
| Domico, Kyle |
S1.3 |
13 |
The Efficacy of Transformer-Based Adversarial Attacks in Security Domains |
| Dong, Chaopeng |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
| Doroslovacki, Milos |
S26.2 |
755 |
Urgency of Information Optimization at Query in an Interactive System |
| Drakes, James |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
| Du, Changlai |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
| DuChez, Jason |
S8.1 |
456 |
Increasing the Supportable Number of WGS Users |
| Duffy, Ken |
S14.4 |
643 |
Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol |
| Dutta, Rudra |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Dwyer, Matthew |
Dist AI/ML.5 |
45 |
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment |
| S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
| E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Echeverry, Nicholas |
Demo Session.3 |
233 |
Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio |
| Eckhardt, Josh |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
| Efimov, Timofey |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
| Ekin, Sabit |
S1.2 |
280 |
Warping Functions Design for Long Warped ZT-DFT-s-OFDM |
| Ekti, Ali Rıza |
S1.2 |
280 |
Warping Functions Design for Long Warped ZT-DFT-s-OFDM |
| Eren, Maksim |
S3.1 |
162 |
Electrical Grid Anomaly Detection via Tensor Decomposition |
| Erpek, Tugba |
S5.2 |
385 |
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection With Deep Learning |
| S20.3 |
815 |
Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution |
| Eveland, Brennan |
Demo Session.1 |
225 |
Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications |
| Ewetz, Rickard |
S15.2 |
655 |
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions |
| S13.3 |
710 |
Adversarial Pixel and Patch Detection Using Attribution Analysis |
| S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
| F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Fadul, Mohamed |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
| Fan, Enguang |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
| Fang, Shiwei |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
| Farhang-Boroujeny, Behrouz |
S14.1 |
622 |
A Method of Estimating Sparse and Doubly-Dispersive Channels |
| Farrukh, Yasir Ali |
Adversarial IoT.1 |
121 |
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection |
| Flores, Maya |
S23.2 |
907 |
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency |
| Forsyth, M. Keith |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
| Fourfouris, Ioannis |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
| Fragouli, Christina |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
| S26.4 |
767 |
Low-Delay Proactive Mechanisms for Resilient Communication |
| Fraisse, Jean-Baptiste |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
| Freire, Fernando |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Fronteddu, Roberto |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
| Coalition Federated Operations.1 |
201 |
Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE |
| Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
| Fryer, Andrew |
S24.3 |
937 |
Input Output Grammar Coverage in Fuzzing |
| Funderburk, Mark |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Furtak, Janusz |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Galliera, Raffaele |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
| S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
| Gamboa, Samantha |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
| Garey, Wesley |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
| Gartrell, Riley |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
| Gautier, Roland |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
| Geller, Benoît |
S10.1 |
510 |
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption |
| Georgiadis, Apostolos |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
| Gilbert, Joshua |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
| Gilli, Alessandro |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
| Gobbi, Richard |
S4.4 |
371 |
Satellite Communications Resilience - Service Restoration and Retainment |
| Goeckel, Dennis |
S2.3 |
311 |
Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits |
| Gómez-Vega, Carlos |
S18.3 |
735 |
Machine Learning Based Node Selection for UWB Network Localization |
| Goveas, Neena |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
| Gremban, Keith |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
| Guerra, Barbara |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Guha, Saikat |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
| Guide, Ryan |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
| Guo, Huadong |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
| Guo, Jinglong |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
| Guo, Xiaolei |
S28.3 |
864 |
On the Secrecy Performance of Aerial IRS-Assisted Wireless Communications |
| Gürses, Anıl |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Güvenç, Ismail |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Gyawali, Sohan |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
| H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ha, Jeongseok |
Quantum Tech.5 |
115 |
Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes |
| Ha, Sean |
S19.4 |
793 |
Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4 |
| Haab, David |
S14.1 |
622 |
A Method of Estimating Sparse and Doubly-Dispersive Channels |
| Hägglund, Kristoffer |
S22.3 |
574 |
Deep Learning-Based Demodulation in Impulse Noise Channels |
| Hanafy, Walid |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
| Hänel, Thomas |
Coalition Federated Operations.3 |
213 |
Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing |
| Hanna, Osama |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
| Hao, Fang |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
| Harding, Sean |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
| Harikumar, Jayashree |
S3.1 |
325 |
CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection |
| S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
| Harman, David |
Dist AI/ML.5 |
45 |
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment |
| Harnden, Blake |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
| Harris, Frederic |
S5.4 |
397 |
Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System |
| Hassan, Zoheb |
S25.3 |
963 |
Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation |
| Headley, William |
Demo Session.4 |
235 |
Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications |
| S25.1 |
950 |
Time-Diverse Doppler-Only LEO PNT |
| Hofmann, Christian |
S4.3 |
365 |
Blind Geolocation of RF-Signals With LEO Satellite Formations |
| Hofmeier, Michael |
Demo Session.5 |
237 |
Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes |
| Holland, David |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
| Hommel, Wolfgang |
Demo Session.5 |
237 |
Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes |
| Hore, Aniruddha |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Hou, Tao |
S11.2 |
542 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection |
| Hou, Thomas |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
| S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
| Hua, Yingbo |
S21.2 |
833 |
Second-Order Analysis of Secret-Key Capacity From a MIMO Channel |
| Huang, Jiaqi |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
| Huang, Weiqing |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
| Huertas Celdrán, Alberto |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
| Huff, Alexandre |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
| Hughes, James |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
| Hughes, Jeffrey |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Hunt, Brandon |
S14.1 |
622 |
A Method of Estimating Sparse and Doubly-Dispersive Channels |
| Hussey, Jason |
S24.1 |
925 |
Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications |
| I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ibrahim, Mostafa |
S1.2 |
280 |
Warping Functions Design for Long Warped ZT-DFT-s-OFDM |
| Islam, Md Khadimul |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Ivans, Robert |
S13.4 |
716 |
Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis |
| Izmailov, Rauf |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
| S13.1 |
696 |
DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual Signatures |
| S13.2 |
703 |
An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers |
| J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Jacobs, Jabril |
S4.4 |
371 |
Satellite Communications Resilience - Service Restoration and Retainment |
| Jain, Ish Kumar |
Demo Session.9 |
245 |
BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios |
| Jakubisin, Daniel |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
| S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
| S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
| Jalaian, Brian |
S5.2 |
268 |
Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning |
| Jana, Rittwik |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
| Jang, Jungik |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
| Jere, Shashank |
S15.4 |
667 |
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing |
| Jha, Sumit |
S15.2 |
655 |
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions |
| S13.3 |
710 |
Adversarial Pixel and Patch Detection Using Attribution Analysis |
| S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
| Jha, Susmit |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
| S15.2 |
655 |
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions |
| S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
| Jiang, Yili |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
| Joe, Kevin |
S18.2 |
729 |
Passive Geolocation of Multiple Pulsed Emitters |
| Johnsen, Frank |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Johnson, Amos |
Demo Session.4 |
235 |
Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications |
| Jones, Alyse |
Demo Session.4 |
235 |
Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications |
| Jones, Daniel |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
| Ju, Zhuoxuan |
S26.2 |
755 |
Urgency of Information Optimization at Query in an Interactive System |
| Jung, Bang Chul |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
| Jung, Gyeong Hun |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
| Jung, Hyunwoo |
Quantum Tech.5 |
115 |
Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes |
| Jung, Taeho |
S27.1 |
876 |
TISIN: Traceable Information Sharing in Intermittent Networks |
| K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Kabigting, Nathaniel |
Demo Session.7 |
241 |
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed |
| Kafetzis, Dimitrios |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
| Kam, Clement |
Technical Paper Presentations.4 |
194 |
Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems |
| Kang, Honggu |
Dist AI/ML.1 |
19 |
Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV |
| Kang, Joonhyuk |
Dist AI/ML.1 |
19 |
Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV |
| Kantheti, Venkata Srirama Rohit |
Military 5G.3 |
77 |
Anti-Jamming Resilient LEO Satellite Swarms |
| Karaliopoulos, Merkourios |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
| Kava, Donato |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Kaviani, Saeed |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
| Kesler, John |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Khan, Irfan |
Adversarial IoT.1 |
121 |
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection |
| Khan, Mahmudur |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
| Kibilda, Jacek |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
| Kim, Deokseong |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
| Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
| Kim, Heechan |
Dist AI/ML.1 |
19 |
Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV |
| Kim, Jae |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
| S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
| Kim, Jaemin |
Quantum Tech.5 |
115 |
Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes |
| Kimberly, Greg |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
| Kirby, Brian |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
| Knarr, Samuel |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
| Knightly, Edward |
S21.3 |
839 |
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO |
| Knopp, Andreas |
S4.3 |
365 |
Blind Geolocation of RF-Signals With LEO Satellite Formations |
| Ko, Young-Chai |
S25.2 |
957 |
Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System |
| Kolias, Constantinos |
S13.4 |
716 |
Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis |
| Kompella, Sastry |
S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
| Kotz, David |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
| Koutsopoulos, Iordanis |
S9.1 |
484 |
Learning the Jointly Optimal Routing and Controller Placement Policy in Mobile Software-Defined Networks |
| S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
| Krunz, Marwan |
S23.4 |
919 |
Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine Learning |
| Kuester, Daniel |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
| Kumar, Abhishek |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
| Kumar, Anand Mahesh |
Demo Session.14 |
255 |
Optimization and Control of Autonomous UAV Swarm for Object Tracking |
| Kumar, Pratyay |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
| Kundu, Achintya |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
| Kuzdeba, Scott |
S24.2 |
931 |
A Conditional Analysis of RF ML Latent Features |
| Kwon, Girim |
NextG DoD.2 |
89 |
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology |
| L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| La Porta, Thomas |
S20.4 |
821 |
mMLSnet: Multilevel Security Network With Mobility |
| Lachine, Brian |
S8.3 |
471 |
Platform Management System Host-Based Anomaly Detection Using TF-IDF and LSTM Autoencoder |
| S24.3 |
937 |
Input Output Grammar Coverage in Fuzzing |
| Lackpour, Alex |
S17.3 |
611 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update |
| Lampe, Thorsten |
S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
| Lawrence, Nigel |
S3.1 |
162 |
Electrical Grid Anomaly Detection via Tensor Decomposition |
| Le, Anh |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
| Lee, Alice |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Lee, Byeongheon |
S25.2 |
957 |
Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System |
| Lee, Eun Jae |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
| Lee, Howon |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
| Lee, Ju-Hyung |
S25.2 |
957 |
Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System |
| Lee, Ki-Hun |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
| Lee, Rhui Dih |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
| Lei, Ming |
S14.2 |
629 |
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity |
| Leroy, Clément |
S10.1 |
510 |
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption |
| Leung, Kin |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
| Li, Bo |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
| Li, Boning |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
| Li, Chengzhang |
S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
| Li, Chuanrong |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
| Li, Hong |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
| Li, Kunyang |
S1.3 |
13 |
The Efficacy of Transformer-Based Adversarial Attacks in Security Domains |
| Li, Nanxi |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
| S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
| Li, Siyuan |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
| Li, Xinlin |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
| Li, Xueying |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
| Li, Yang |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
| Liang, Hung-Wen |
Demo Session.6 |
239 |
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring |
| Lim, Jeffery |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Lin, Chia-Hung |
Military 5G.3 |
77 |
Anti-Jamming Resilient LEO Satellite Swarms |
| Lin, Po-Ching |
Demo Session.6 |
239 |
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring |
| Lin, Shih-Chun |
Military 5G.3 |
77 |
Anti-Jamming Resilient LEO Satellite Swarms |
| Lincoln, Patrick |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
| Liu, Chunmei |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
| Liu, Jiefei |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
| Liu, Lingjia |
S8.4 |
478 |
Online Learning Meets Semantic Communication Over Wireless Channels |
| S15.4 |
667 |
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing |
| S25.3 |
963 |
Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation |
| Liu, Qingyu |
S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
| Liu, Wenming |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
| Liu, Xiaofan |
S2.3 |
311 |
Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits |
| Loevenich, Johannes |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
| S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
| S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
| Lorenzo, Beatriz |
S2.3 |
311 |
Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits |
| Lou, Wenjing |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
| S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
| Loveless, Thomas |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
| M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ma, Song |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
| Maathuis, Clara |
S5.1 |
260 |
Human Centered Explainable AI Framework for Military Cyber Operations |
| Madanayake, Arjuna |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Maksud, Ahmed |
S21.2 |
833 |
Second-Order Analysis of Secret-Key Capacity From a MIMO Channel |
| Malek, Mai |
Demo Session.14 |
255 |
Optimization and Control of Autonomous UAV Swarm for Object Tracking |
| Mangipudi, Pavan Kumar |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
| Manso, Marco |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Marlin, Benjamin |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
| Marojevic, Vuk |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Demo Session.12 |
251 |
Demo: SSxApp: Secure Slicing for O-RAN Deployments |
| Martínez Beltrán, Enrique Tomás |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
| Martinez Perez, Gregorio |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
| Matsui, Hidetake |
S1.1 |
274 |
Design SNR Optimization of Polar Codes Over Block Rician Fading Channels |
| Matsumine, Toshiki |
S1.1 |
274 |
Design SNR Optimization of Polar Codes Over Block Rician Fading Channels |
| Mazzaro, Gregory |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
| McDaniel, Patrick |
S1.3 |
13 |
The Efficacy of Transformer-Based Adversarial Attacks in Security Domains |
| McDaniel, Patrick |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
| S20.4 |
821 |
mMLSnet: Multilevel Security Network With Mobility |
| McGillivray, Duncan |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
| McHenry, Mark |
S17.3 |
611 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update |
| McNair, Janise |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
| S9.4 |
504 |
Detection of Cyberattacks in an Software-Defined UAV Relay Network |
| Md Tayeen, Abu Saleh |
S3.1 |
325 |
CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection |
| S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
| Médard, Muriel |
S14.4 |
643 |
Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol |
| Medley, Michael |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
| S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
| Michaelis, James |
Technical Paper Presentations.3 |
188 |
Applying Mission Information Requirements to Value of Information Middleware |
| Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Misra, Satyajayant |
S3.1 |
325 |
CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection |
| S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
| Mohammed, Awab |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
| Molnar, Joe |
S17.3 |
611 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update |
| Moltafet, Mohammad |
S16.3 |
685 |
A Practical Perfect Secrecy Approach for IoBT Systems |
| Moore, Joshua |
Demo Session.12 |
251 |
Demo: SSxApp: Secure Slicing for O-RAN Deployments |
| Moore, Megan |
S25.1 |
950 |
Time-Diverse Doppler-Only LEO PNT |
| Moradi, Hussein |
S14.1 |
622 |
A Method of Estimating Sparse and Doubly-Dispersive Channels |
| Morelli, Alessandro |
Technical Paper Presentations.3 |
188 |
Applying Mission Information Requirements to Value of Information Middleware |
| S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
| Moscola, James |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
| Moser, Steffen |
S7.1 |
430 |
Online Reduction of Exploration Space for Automated Underwater Modem Optimization |
| Most, Alexander |
S3.1 |
162 |
Electrical Grid Anomaly Detection via Tensor Decomposition |
| Mukherjee, Sarit |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
| Muralkrishan, Madhuvanti |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Mushi, Magreth |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Naderi, Sanaz |
S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
| Nagaraj, Keerthiraj |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
| Nahill, Ben |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Neema, Sandeep |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
| Ng, Nathan |
Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
| Nguyen, Huy |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Nguyen, Kim Khoa |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
| S19.3 |
787 |
Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL |
| Nguyen, Ti |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
| Nguyen, Van-Linh |
Demo Session.6 |
239 |
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring |
| Nie, Zixiang |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
| Nikam, Piyush |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
| Noirot Ferrand, Jean-Charles |
S1.3 |
13 |
The Efficacy of Transformer-Based Adversarial Attacks in Security Domains |
| Nomeir, Mohamed |
Dist AI/ML.7 |
57 |
Private Membership Aggregation |
| O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ochiai, Hideki |
S1.1 |
274 |
Design SNR Optimization of Polar Codes Over Block Rician Fading Channels |
| Oprea, Alina |
S13.2 |
703 |
An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers |
| Ornee, Tasmeen Zaman |
Technical Paper Presentations.4 |
194 |
Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems |
| Osipychev, Denis |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
| Ota, Daniel |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Ouyang, Chongjun |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
| S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
| Özdemir, Özgür |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Pabon, Juan |
S27.4 |
894 |
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement |
| Padnos, Steve |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
| Pados, Dimitris |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
| S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
| Pandey, Divyanshu |
S21.3 |
839 |
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO |
| Park, Hyuncheol |
NextG DoD.2 |
89 |
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology |
| Park, Joo Sung |
NextG DoD.2 |
89 |
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology |
| Park, SooBum |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
| Pasquero, Oudomsack-Pierre |
S10.1 |
510 |
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption |
| Pauley, Eric |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
| Peng, Anfeng |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
| Peng, Qihang |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
| Peng, Yifeng |
S11.4 |
554 |
SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection |
| Perazzone, Jake |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
| Perez, Beatrice |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
| Perez, Oscar |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
| Piatt, Emma |
S12.3 |
|
Surface Wave Modes and Radiative Properties of a Plasma Antenna |
| Pierson, Timothy |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
| Pirrone, Michelle |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
| Poirrier, Alexandre |
S6.1 |
405 |
An Interoperable Zero Trust Federated Architecture for Tactical Systems |
| Poltronieri, Filippo |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
| S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
| Popescu, Dimitrie |
S22.1 |
562 |
Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications |
| Poulliat, Charly |
S10.2 |
516 |
DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization |
| Powell, Keith |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Poy, Isamu |
S5.4 |
397 |
Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System |
| Provost, Lauren |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
| Pyo, Jisung |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
| Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Qiu, Zhaohua |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
| R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| R. Rao, Ramesh |
S17.2 |
605 |
On Reliability of CBRS Communications Near U.S. Navy Installations in San Diego |
| Rahman, Mahfuzur |
S25.3 |
963 |
Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation |
| Rahman, Md Habibur |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
| Rahman, Talha |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Ramirez, David |
S21.3 |
839 |
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO |
| Rastogi, Rishabh |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Ratazzi, Paul |
S27.1 |
876 |
TISIN: Traceable Information Sharing in Intermittent Networks |
| Ravesteyn, Benjamin |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
| Reddy, Achyut |
S13.2 |
703 |
An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers |
| Reed, Jeffrey |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
| Reed, Jeffrey |
Demo Session.14 |
255 |
Optimization and Control of Autonomous UAV Swarm for Object Tracking |
| Reed, Jeffrey |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
| S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
| Reed, Jeffrey |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
| Reed, Jeffrey |
S25.3 |
963 |
Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation |
| Reising, Donald |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
| Restuccia, Francesco |
Dist AI/ML.2 |
27 |
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness |
| S6.3 |
418 |
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems |
| Rettore, Paulo Henrique |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
| Coalition Federated Operations.3 |
213 |
Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing |
| S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
| S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
| Rezki, Zouheir |
S16.3 |
685 |
A Practical Perfect Secrecy Approach for IoBT Systems |
| Rice, Tarence |
S21.3 |
839 |
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO |
| Rieß, Marcel |
S7.1 |
430 |
Online Reduction of Exploration Space for Automated Underwater Modem Optimization |
| Rifat, Shahriar |
S6.3 |
418 |
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems |
| Rigolin F. Lopes, Roberto |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
| S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
| S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
| Robinson, Joshua |
S24.2 |
931 |
A Conditional Analysis of RF ML Latent Features |
| Roque, Damien |
S10.2 |
516 |
DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization |
| Rosenfeld, Bleema |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
| Rouil, Richard |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
| Roy, Anirban |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
| Roy, Sumit |
S20.1 |
799 |
Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches |
| Roy Chowdhury, Mayukh |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
| Rupar, Michael |
S12.3 |
|
Surface Wave Modes and Radiative Properties of a Plasma Antenna |
| Russell, Paul |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
| Ryu, Bo |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
| Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
| S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| S. R. Mallu, Jaswanth |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
| Saarnisaari, Harri |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
| Sadeghi, Moein |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
| Sadjadpour, Hamid |
S16.3 |
685 |
A Practical Perfect Secrecy Approach for IoBT Systems |
| Saeed, Usama |
S8.4 |
478 |
Online Learning Meets Semantic Communication Over Wireless Channels |
| Sagduyu, Yalin |
S5.2 |
385 |
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection With Deep Learning |
| S20.3 |
815 |
Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution |
| Saha, Souradip |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
| Sahin, Alphan |
S3.3 |
339 |
Wireless Federated 𝑘-Means Clustering With Non-Coherent Over-The-Air Computation |
| S28.1 |
852 |
Majority Vote Computation With Complementary Sequences for Distributed UAV Guidance |
| Sahu, Aryan |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
| Said, Karim |
S15.4 |
667 |
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing |
| Samplawski, Colin |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
| Sánchez Sánchez, Pedro Miguel |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
| Sanchez-Viloria, Jose |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Sanders, Aric |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
| Santos, Bruno |
S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
| Santos, Joao |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
| Sartipi, Kamran |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
| Sathish, Aditya |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
| Schaefer, Elsa |
S4.4 |
371 |
Satellite Communications Resilience - Service Restoration and Retainment |
| Schneider, Fred |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Schütz, Bertram |
Coalition Federated Operations.3 |
213 |
Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing |
| Scott, Lisa |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
| Segarra, Santiago |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
| Seidenfad, Karl |
Demo Session.5 |
237 |
Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes |
| Seo, Sang Yong |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
| Serban, Constantin |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
| Sevenich, Peter |
S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
| Shah, Dhruv |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
| Shah, Vijay |
Demo Session.7 |
241 |
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed |
| S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
| Shake, Thomas |
S4.2 |
357 |
Hybrid Geometric/Shortest-Path Routing in Proliferated Low-Earth-Orbit Satellite Networks |
| Shanafelt, Robert |
Demo Session.1 |
225 |
Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications |
| Shao, Shihai |
S17.4 |
617 |
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields |
| Sharma, Pragya |
Adversarial IoT.3 |
133 |
Impact of Delays and Computation Placement on Sense-Act Application Performance in IoT |
| She, Xiaoming |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
| S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
| Sheatsley, Ryan |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
| Shenoy, Prashant |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
| Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
| Shi, Shanghao |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
| Shi, Yi |
S20.3 |
815 |
Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution |
| Shikula, Roman |
Demo Session.3 |
233 |
Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio |
| Shisher, Md Kamran Chowdhury |
Technical Paper Presentations.4 |
194 |
Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems |
| Shlezinger, Nir |
S1.3 |
286 |
Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETs |
| Sichitiu, Mihail |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
| Siegel, Alexandra |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
| Silva, Udara |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Silverman, Steven |
Quantum Tech.1 |
95 |
Quantum MBSE and Quantum SysML |
| Silvius, Mark |
S17.3 |
611 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update |
| Simon, Dominic |
S13.3 |
710 |
Adversarial Pixel and Patch Detection Using Attribution Analysis |
| Simpson, Eric |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Singh, Satinder |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
| S19.3 |
787 |
Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL |
| Sinha, Sujata |
S1.1 |
1 |
Channel Aware Adversarial Attacks are Not Robust |
| Sklivanitis, George |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
| S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
| Slomka, Frank |
S7.1 |
430 |
Online Reduction of Exploration Space for Automated Underwater Modem Optimization |
| Smith, Brad |
S9.3 |
497 |
Dominant Network Slices |
| Smith, Gavin |
S19.4 |
793 |
Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4 |
| Snoap, John |
S22.1 |
562 |
Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications |
| Son, Hyunsoo |
NextG DoD.2 |
89 |
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology |
| Song, Changqing |
S17.4 |
617 |
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields |
| Souza, Abel |
Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
| Soysal, Alkan |
S1.1 |
1 |
Channel Aware Adversarial Attacks are Not Robust |
| Spiker, Carrie |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
| Spitzmiller, John |
S23.3 |
913 |
Tradespace Performance Study of Polarization-Insensitive Spatial Filtering for Jamming Suppression |
| Spooner, Chad |
S22.1 |
562 |
Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications |
| Srivastava, Arunabh |
Technical Paper Presentations.2 |
182 |
Age of Gossip on Generalized Rings |
| Srivastava, Mani |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
| Adversarial IoT.3 |
133 |
Impact of Delays and Computation Placement on Sense-Act Application Performance in IoT |
| Stahlbuhk, Thomas |
S23.2 |
907 |
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency |
| Starke, Allen |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
| Starr, Robert |
S19.1 |
773 |
An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes |
| S19.4 |
793 |
Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4 |
| Steele, Matt |
S19.1 |
773 |
An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes |
| Stephenson, Nathan |
Demo Session.7 |
241 |
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed |
| Stevers, William |
Demo Session.3 |
233 |
Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio |
| Stiller, Burkhard |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
| Stone, Kerri |
S24.1 |
925 |
Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications |
| Stone, Rylee |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
| Street, Dow |
S4.4 |
371 |
Satellite Communications Resilience - Service Restoration and Retainment |
| Sultana, Abida |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
| Sun, Limin |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
| Sun, Yin |
Technical Paper Presentations.4 |
194 |
Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems |
| Suprenant, Joseph |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
| S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
| Suri, Niranjan |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
| Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
| Coalition Federated Operations.1 |
201 |
Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE |
| Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
| Swami, Ananthram |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
| T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Taha, Mohamed A. |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
| Tang, Wenyi |
S27.1 |
876 |
TISIN: Traceable Information Sharing in Intermittent Networks |
| Tassiulas, Leandros |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
| Taylor, Stephen |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
| Tkachenko, Olena |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
| Torabi, Amir |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
| Torres, Gabriel |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Tortonesi, Mauro |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
| S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
| Towsley, Don |
Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
| Tran, Xuan Tuyen |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
| Traverso, Sylvain |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
| Tripathi, Asheesh |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
| Tripathi, Nishith |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
| S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
| S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
| Tschimben, Stefan |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
| Turck, Kurt |
Dist AI/ML.2 |
27 |
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness |
| S6.3 |
418 |
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems |
| Tuukkanen, Topi |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
| Tyler, Joshua |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
| U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ulukus, Sennur |
Dist AI/ML.7 |
57 |
Private Membership Aggregation |
| Technical Paper Presentations.1 |
176 |
Timely Multi-Goal Transmissions With an Intermittently Failing Sensor |
| Technical Paper Presentations.2 |
182 |
Age of Gossip on Generalized Rings |
| V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Vai, Michael |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
| Valenti, Matthew |
S27.4 |
894 |
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement |
| Van Hau, Le |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
| Vardoulias, Georgios |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
| Varkatzas, Dimitrios |
S22.4 |
580 |
Waveform Manipulation Against DNN-Based Modulation Classification Attacks |
| Varvello, Matteo |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
| Vassilaras, Spyridon |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
| Vedros, Kurt |
S13.4 |
716 |
Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis |
| Velasquez, Alvaro |
S15.2 |
655 |
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions |
| S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
| Velazquez, Alexander |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
| Velazquez, Scott |
Demo Session.1 |
225 |
Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications |
| Venkatesan, Sridhar |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
| S13.2 |
703 |
An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers |
| Verdier, Assoume Mba |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
| Verma, Gunjan |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
| S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
| Vidhyadharan, Sreejith |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
| Vithana, Sajani |
Dist AI/ML.7 |
57 |
Private Membership Aggregation |
| Vitullo, Dashiell |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
| Volakis, John |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
| Vuksani, Era |
S11.3 |
548 |
Transient Modeling of Topology-Based Worms in Networks With Link Interference |
| W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Wali, Syed |
Adversarial IoT.1 |
121 |
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection |
| Walker, Chase |
S13.3 |
710 |
Adversarial Pixel and Patch Detection Using Attribution Analysis |
| Wang, Fei |
S28.2 |
858 |
Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks |
| Wang, Jun |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
| Wang, Jz |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
| Wang, Ning |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
| Wang, Shiqiang |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
| Wang, Tao |
S11.2 |
542 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection |
| Wang, Weijie |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
| Wang, Weiping |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
| Wang, Wen |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
| Wang, Xiaofeng |
S28.1 |
852 |
Majority Vote Computation With Complementary Sequences for Distributed UAV Guidance |
| Wang, Ying |
S11.4 |
554 |
SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection |
| Wang, Yongpan |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
| Wang, Ziqi |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
| Wassink, Robin |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
| Watters, Kyle |
S14.3 |
635 |
Expected Probability of Radiometric Detection by Channelized Radiometer |
| Webb, Wesley |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
| Weerackody, Vijitha |
S20.1 |
799 |
Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches |
| Wei, Shuangqing |
S2.4 |
319 |
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary |
| Weinzierl, Daniel |
S4.3 |
365 |
Blind Geolocation of RF-Signals With LEO Satellite Formations |
| Wigness, Maggie |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
| Win, Moe |
S18.3 |
735 |
Machine Learning Based Node Selection for UWB Network Localization |
| Wright, Kevin |
S11.3 |
548 |
Transient Modeling of Topology-Based Worms in Networks With Link Interference |
| Wrona, Konrad |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
| Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
| Wu, Li |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
| Wunderlich, Adam |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
| Wyglinski, Alexander |
S23.2 |
907 |
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency |
| Wynter, Laura |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
| X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Xu, Jiarui |
S8.4 |
478 |
Online Learning Meets Semantic Communication Over Wireless Channels |
| Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Yang, Hanchao |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
| S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
| S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
| Yang, Jingda |
S11.4 |
554 |
SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection |
| Yang, Kathleen |
S14.4 |
643 |
Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol |
| Yang, Yaling |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
| S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
| S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
| Yi, Shuming |
S28.2 |
858 |
Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks |
| Ying, Chenhao |
S2.4 |
319 |
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary |
| Yoon, Young Il |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
| Yu, Mingli |
S20.4 |
821 |
mMLSnet: Multilevel Security Network With Mobility |
| Yu, Xi |
S27.4 |
894 |
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement |
| Yu, Xinchun |
S2.4 |
319 |
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary |
| Yudin, Matthew |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
| S13.1 |
696 |
DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual Signatures |
| Yuksel, Murat |
S7.2 |
438 |
In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying Platforms |
| Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Zaccarini, Mattia |
S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
| Zhan, Mengqi |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
| Zhang, Chaoyu |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
| Zhang, Jinchao |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
| Zhang, Meng |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
| Zhang, Minglong |
Demo Session.12 |
251 |
Demo: SSxApp: Secure Slicing for O-RAN Deployments |
| Zhang, Shunliang |
S28.3 |
864 |
On the Secrecy Performance of Aerial IRS-Assisted Wireless Communications |
| Zhang, Xi |
S28.2 |
858 |
Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks |
| Zhang, Xiao-Ping (Steven) |
S2.4 |
319 |
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary |
| Zhang, Zhengguang |
S23.4 |
919 |
Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine Learning |
| Zhao, Hongzhi |
S17.4 |
617 |
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields |
| Zhao, Ming-Min |
S14.2 |
629 |
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity |
| Zhao, Minjian |
S14.2 |
629 |
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity |
| Zheng, Lizhong |
S15.4 |
667 |
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing |
| Zhou, Shengtang |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
| Zhou, Yuxi |
S17.4 |
617 |
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields |
| Zhu, Hongsong |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
| Zhu, Jianchi |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
| S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
| Zissner, Philipp |
S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
| S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
| Zumegen, Frederik |
Demo Session.9 |
245 |
BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios |