Author |
Session |
Start page |
Title |
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Abdalla, Aly sabri |
Demo Session.12 |
251 |
Demo: SSxApp: Secure Slicing for O-RAN Deployments |
Abdelzaher, Tarek |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
Abdi, Mohammad |
Dist AI/ML.2 |
27 |
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness |
Abreu, Jefferson |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
Agnew, Dennis |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
S9.4 |
504 |
Detection of Cyberattacks in an Software-Defined UAV Relay Network |
Ahmed, Ejaz |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
Alanazi, Hamidah |
S11.2 |
542 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection |
Alexandrov, Boian |
S3.1 |
162 |
Electrical Grid Anomaly Detection via Tensor Decomposition |
Alter, Tomer |
S1.3 |
286 |
Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETs |
Alwan, Elias |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Amato, Alessandro |
Coalition Federated Operations.1 |
201 |
Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE |
Andersen, Emil |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Anderson, Cleon |
Dist AI/ML.5 |
45 |
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
Anderson, Gustave |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
Andersson, Andreas |
S22.3 |
574 |
Deep Learning-Based Demodulation in Impulse Noise Channels |
Arbi, Tarak |
S10.1 |
510 |
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption |
Arguello, Cesar |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
Argyriou, Antonios |
S22.4 |
580 |
Waveform Manipulation Against DNN-Based Modulation Classification Attacks |
Arya, Sudhanshu |
S11.4 |
554 |
SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection |
Ashdown, Jonathan |
Dist AI/ML.2 |
27 |
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness |
S6.3 |
418 |
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems |
S8.4 |
478 |
Online Learning Meets Semantic Communication Over Wireless Channels |
Assoume, Verdier |
S19.3 |
787 |
Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL |
Axell, Erik |
S22.3 |
574 |
Deep Learning-Based Demodulation in Impulse Noise Channels |
Axford, Roy |
S8.1 |
456 |
Increasing the Supportable Number of WGS Users |
Azarderakhsh, Reza |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Babatunde, Simeon |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
Baker, Patrick |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
Baron-Hyppolite, Adrian |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
Barz, Christoph |
Coalition Federated Operations.3 |
213 |
Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing |
Bash, Boulat |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
Bastian, Nathaniel |
Adversarial IoT.1 |
121 |
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
S5.2 |
268 |
Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
Bates, Isabella |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
Bathen, Luis |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
Beckwith, Luke |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Becue, Adrien |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
Bell, Richard |
S5.4 |
397 |
Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System |
Ben Mosbah, Aziza |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
Benson, Kent |
S20.1 |
799 |
Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches |
Bentley, Elizabeth |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
Berenbeim, Alexander |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
Bernhardt, Jordan |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
Beugin, Yohan |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
Bharadia, Dinesh |
Demo Session.9 |
245 |
BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios |
S5.4 |
397 |
Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System |
Bhattacharyya, Joydeep |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
Bi, Shengping |
S11.2 |
542 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection |
Bidon, Stéphanie |
S10.2 |
516 |
DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization |
Black, Ryan |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
Blackwell, David |
S12.3 |
|
Surface Wave Modes and Radiative Properties of a Plasma Antenna |
Bondada, Kumar Sai |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
Bovet, Gérôme |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
Bristow, Austin |
Quantum Tech.4 |
109 |
Pragmatic Quantum-Classic Phase Estimation of a Quantum Channel |
Brock, James |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
Brown, Scott |
Dist AI/ML.5 |
45 |
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment |
Bucklew, Victor |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
Buehrer, R. Michael |
S25.1 |
950 |
Time-Diverse Doppler-Only LEO PNT |
Bullock, Michael |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
Burger, Eric |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Burke, Quinn |
S20.4 |
821 |
mMLSnet: Multilevel Security Network With Mobility |
Burt, Timothy |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
Bush, Kyle |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Caesar, Matthew |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
Cailleux, Laurent |
S6.1 |
405 |
An Interoperable Zero Trust Federated Architecture for Tactical Systems |
Camp, Tracy |
S24.1 |
925 |
Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications |
Cao, Huiping |
S3.1 |
325 |
CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
Cardone, Martina |
S26.4 |
767 |
Low-Delay Proactive Mechanisms for Resilient Communication |
Chadha, Ritu |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
Chakraborty, Abhishek |
S17.2 |
605 |
On Reliability of CBRS Communications Near U.S. Navy Installations in San Diego |
Chan, Kevin |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
Chang, Shu-Ying |
Demo Session.6 |
239 |
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring |
Cheah, Jonathon |
S19.1 |
773 |
An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes |
Chen, Kwang-Cheng |
Quantum Tech.4 |
109 |
Pragmatic Quantum-Classic Phase Estimation of a Quantum Channel |
Chen, Peng |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
Chen, Xiaonan |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
Chen, Yading |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
Chen, Zheyu |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
Cheng, Xiang |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
Cheng, Zhenqiao |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
Chevalier, Pascal |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
Chiejina, Azuka |
Demo Session.7 |
241 |
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed |
Choi, Jaehyuk |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
Choi, Jungwook |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
Chowdhury, Md Sarwar Uddin |
S7.2 |
438 |
In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying Platforms |
Chu, Liang |
Military 5G.3 |
77 |
Anti-Jamming Resilient LEO Satellite Swarms |
Chuberre, Nicolas |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
Claus, Reinhard |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Clausen, Thomas |
S6.1 |
405 |
An Interoperable Zero Trust Federated Architecture for Tactical Systems |
Cobb, Adam |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
Cohen, Aaron |
S12.3 |
|
Surface Wave Modes and Radiative Properties of a Plasma Antenna |
Collins, Michael |
S11.3 |
548 |
Transient Modeling of Topology-Based Worms in Networks With Link Interference |
Conti, Andrea |
S18.3 |
735 |
Machine Learning Based Node Selection for UWB Network Localization |
Conway, Adrian |
S11.3 |
548 |
Transient Modeling of Topology-Based Worms in Networks With Link Interference |
Cook, Trevor |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
Coote, Emilie |
S8.3 |
471 |
Platform Management System Host-Based Anomaly Detection Using TF-IDF and LSTM Autoencoder |
Cortes, Jose |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
Coşandal, İsmail |
Technical Paper Presentations.1 |
176 |
Timely Multi-Goal Transmissions With an Intermittently Failing Sensor |
Cousik, Tarun |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
Coyle, Edward |
S14.3 |
635 |
Expected Probability of Radiometric Detection by Channelized Radiometer |
Cui, Huajun |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
Curry, James |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Da Silva, Aloizio |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
Dahdal, Simon |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
Dahlstrom, Jason |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
Dang, Do |
S19.3 |
787 |
Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL |
DaSilva, Luiz |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
Dean, Thomas |
S24.3 |
937 |
Input Output Grammar Coverage in Fuzzing |
del Aguila, Alvaro |
S9.4 |
504 |
Detection of Cyberattacks in an Software-Defined UAV Relay Network |
Delaveau, François |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
Di Caro, Edoardo |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Diggavi, Suhas |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
Ding, YueJin |
S14.2 |
629 |
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity |
Djapic, Relja |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
Dogan, Mine |
S26.4 |
767 |
Low-Delay Proactive Mechanisms for Resilient Communication |
Domico, Kyle |
S1.3 |
13 |
The Efficacy of Transformer-Based Adversarial Attacks in Security Domains |
Dong, Chaopeng |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
Doroslovacki, Milos |
S26.2 |
755 |
Urgency of Information Optimization at Query in an Interactive System |
Drakes, James |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
Du, Changlai |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
DuChez, Jason |
S8.1 |
456 |
Increasing the Supportable Number of WGS Users |
Duffy, Ken |
S14.4 |
643 |
Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol |
Dutta, Rudra |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Dwyer, Matthew |
Dist AI/ML.5 |
45 |
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Echeverry, Nicholas |
Demo Session.3 |
233 |
Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio |
Eckhardt, Josh |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
Efimov, Timofey |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
Ekin, Sabit |
S1.2 |
280 |
Warping Functions Design for Long Warped ZT-DFT-s-OFDM |
Ekti, Ali Rıza |
S1.2 |
280 |
Warping Functions Design for Long Warped ZT-DFT-s-OFDM |
Elkadi, Melissa |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
Eren, Maksim |
S3.1 |
162 |
Electrical Grid Anomaly Detection via Tensor Decomposition |
Erpek, Tugba |
S5.2 |
385 |
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection With Deep Learning |
S20.3 |
815 |
Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution |
Eveland, Brennan |
Demo Session.1 |
225 |
Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications |
Ewetz, Rickard |
S15.2 |
655 |
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions |
S13.3 |
710 |
Adversarial Pixel and Patch Detection Using Attribution Analysis |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Fadul, Mohamed |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
Fan, Enguang |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
Fang, Shiwei |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
Farhang-Boroujeny, Behrouz |
S14.1 |
622 |
A Method of Estimating Sparse and Doubly-Dispersive Channels |
Farrukh, Yasir Ali |
Adversarial IoT.1 |
121 |
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection |
Flores, Maya |
S23.2 |
907 |
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency |
Forsyth, M. Keith |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
Fourfouris, Ioannis |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
Fragouli, Christina |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
S26.4 |
767 |
Low-Delay Proactive Mechanisms for Resilient Communication |
Fraisse, Jean-Baptiste |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
Freire, Fernando |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Fronteddu, Roberto |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
Coalition Federated Operations.1 |
201 |
Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
Fryer, Andrew |
S24.3 |
937 |
Input Output Grammar Coverage in Fuzzing |
Funderburk, Mark |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Furtak, Janusz |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Galliera, Raffaele |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
Gamboa, Samantha |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
Garey, Wesley |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
Gartrell, Riley |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
Gautier, Roland |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
Geller, Benoît |
S10.1 |
510 |
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption |
Georgiadis, Apostolos |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
Gilbert, Joshua |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
Gilli, Alessandro |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
Gobbi, Richard |
S4.4 |
371 |
Satellite Communications Resilience - Service Restoration and Retainment |
Goeckel, Dennis |
S2.3 |
311 |
Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits |
Gómez-Vega, Carlos |
S18.3 |
735 |
Machine Learning Based Node Selection for UWB Network Localization |
Goveas, Neena |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
Gremban, Keith |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
Guerra, Barbara |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Guha, Saikat |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
Guide, Ryan |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
Guo, Huadong |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
Guo, Jinglong |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
Guo, Xiaolei |
S28.3 |
864 |
On the Secrecy Performance of Aerial IRS-Assisted Wireless Communications |
Gürses, Anıl |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Güvenç, Ismail |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Gyawali, Sohan |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ha, Jeongseok |
Quantum Tech.5 |
115 |
Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes |
Ha, Sean |
S19.4 |
793 |
Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4 |
Haab, David |
S14.1 |
622 |
A Method of Estimating Sparse and Doubly-Dispersive Channels |
Hägglund, Kristoffer |
S22.3 |
574 |
Deep Learning-Based Demodulation in Impulse Noise Channels |
Hanafy, Walid |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
Hänel, Thomas |
Coalition Federated Operations.3 |
213 |
Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing |
Hanna, Osama |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
Hao, Fang |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
Harding, Sean |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
Harikumar, Jayashree |
S3.1 |
325 |
CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
Harman, David |
Dist AI/ML.5 |
45 |
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environment |
Harnden, Blake |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
Harris, Frederic |
S5.4 |
397 |
Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System |
Hassan, Zoheb |
S25.3 |
963 |
Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation |
Headley, William |
Demo Session.4 |
235 |
Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications |
S25.1 |
950 |
Time-Diverse Doppler-Only LEO PNT |
Hofmann, Christian |
S4.3 |
365 |
Blind Geolocation of RF-Signals With LEO Satellite Formations |
Hofmeier, Michael |
Demo Session.5 |
237 |
Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes |
Holland, David |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
Hommel, Wolfgang |
Demo Session.5 |
237 |
Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes |
Hore, Aniruddha |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Hou, Tao |
S11.2 |
542 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection |
Hou, Thomas |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
Hua, Yingbo |
S21.2 |
833 |
Second-Order Analysis of Secret-Key Capacity From a MIMO Channel |
Huang, Jiaqi |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
Huang, Weiqing |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
Huertas Celdrán, Alberto |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
Huff, Alexandre |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
Hughes, James |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
Hughes, Jeffrey |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Hunt, Brandon |
S14.1 |
622 |
A Method of Estimating Sparse and Doubly-Dispersive Channels |
Hussey, Jason |
S24.1 |
925 |
Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications |
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ibrahim, Mostafa |
S1.2 |
280 |
Warping Functions Design for Long Warped ZT-DFT-s-OFDM |
Islam, Md Khadimul |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Ivans, Robert |
S13.4 |
716 |
Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis |
Izmailov, Rauf |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
S13.1 |
696 |
DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual Signatures |
S13.2 |
703 |
An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers |
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Jacobs, Jabril |
S4.4 |
371 |
Satellite Communications Resilience - Service Restoration and Retainment |
Jain, Ish Kumar |
Demo Session.9 |
245 |
BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios |
Jakubisin, Daniel |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
Jalaian, Brian |
S5.2 |
268 |
Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning |
Jana, Rittwik |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
Jang, Jungik |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
Jere, Shashank |
S15.4 |
667 |
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing |
Jha, Sumit |
S15.2 |
655 |
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions |
S13.3 |
710 |
Adversarial Pixel and Patch Detection Using Attribution Analysis |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
Jha, Susmit |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
S15.2 |
655 |
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
Jiang, Yili |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
Joe, Kevin |
S18.2 |
729 |
Passive Geolocation of Multiple Pulsed Emitters |
Johnsen, Frank |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Johnson, Amos |
Demo Session.4 |
235 |
Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications |
Jones, Alyse |
Demo Session.4 |
235 |
Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications |
Jones, Daniel |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
Ju, Zhuoxuan |
S26.2 |
755 |
Urgency of Information Optimization at Query in an Interactive System |
Jung, Bang Chul |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
Jung, Gyeong Hun |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
Jung, Hyunwoo |
Quantum Tech.5 |
115 |
Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes |
Jung, Taeho |
S27.1 |
876 |
TISIN: Traceable Information Sharing in Intermittent Networks |
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Kabigting, Nathaniel |
Demo Session.7 |
241 |
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed |
Kafetzis, Dimitrios |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
Kam, Clement |
Technical Paper Presentations.4 |
194 |
Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems |
Kang, Honggu |
Dist AI/ML.1 |
19 |
Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV |
Kang, Joonhyuk |
Dist AI/ML.1 |
19 |
Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV |
Kantheti, Venkata Srirama Rohit |
Military 5G.3 |
77 |
Anti-Jamming Resilient LEO Satellite Swarms |
Karaliopoulos, Merkourios |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
Kava, Donato |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Kaviani, Saeed |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
Kesler, John |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Khan, Irfan |
Adversarial IoT.1 |
121 |
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection |
Khan, Mahmudur |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
Kibiłda, Jacek |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
Kim, Deokseong |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
Kim, Heechan |
Dist AI/ML.1 |
19 |
Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV |
Kim, Jae |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
Kim, Jaemin |
Quantum Tech.5 |
115 |
Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes |
Kimberly, Greg |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
Kirby, Brian |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
Knarr, Samuel |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
Knightly, Edward |
S21.3 |
839 |
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO |
Knopp, Andreas |
S4.3 |
365 |
Blind Geolocation of RF-Signals With LEO Satellite Formations |
Ko, Young-Chai |
S25.2 |
957 |
Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System |
Kolias, Constantinos |
S13.4 |
716 |
Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis |
Kompella, Sastry |
S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
Kotz, David |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
Koutsopoulos, Iordanis |
S9.1 |
484 |
Learning the Jointly Optimal Routing and Controller Placement Policy in Mobile Software-Defined Networks |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
Krunz, Marwan |
S23.4 |
919 |
Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine Learning |
Kuester, Daniel |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
Kumar, Abhishek |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
Kumar, Anand Mahesh |
Demo Session.14 |
255 |
Optimization and Control of Autonomous UAV Swarm for Object Tracking |
Kumar, Pratyay |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
Kundu, Achintya |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
Kuzdeba, Scott |
S24.2 |
931 |
A Conditional Analysis of RF ML Latent Features |
Kwon, Girim |
NextG DoD.2 |
89 |
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology |
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
La Porta, Thomas |
S20.4 |
821 |
mMLSnet: Multilevel Security Network With Mobility |
Lachine, Brian |
S8.3 |
471 |
Platform Management System Host-Based Anomaly Detection Using TF-IDF and LSTM Autoencoder |
S24.3 |
937 |
Input Output Grammar Coverage in Fuzzing |
Lackpour, Alex |
S17.3 |
611 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update |
Lampe, Thorsten |
S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
Lawrence, Nigel |
S3.1 |
162 |
Electrical Grid Anomaly Detection via Tensor Decomposition |
Le, Anh |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
Lee, Alice |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Lee, Byeongheon |
S25.2 |
957 |
Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System |
Lee, Eun Jae |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
Lee, Howon |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
Lee, Ju-Hyung |
S25.2 |
957 |
Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System |
Lee, Ki-Hun |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
Lee, Rhui Dih |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
Lei, Ming |
S14.2 |
629 |
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity |
Leroy, Clément |
S10.1 |
510 |
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption |
Leung, Kin |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
Li, Bo |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
Li, Boning |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
Li, Chengzhang |
S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
Li, Chuanrong |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
Li, Hong |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
Li, Kunyang |
S1.3 |
13 |
The Efficacy of Transformer-Based Adversarial Attacks in Security Domains |
Li, Nanxi |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
Li, Siyuan |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
Li, Xinlin |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
Li, Xueying |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
Li, Yang |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
Liang, Hung-Wen |
Demo Session.6 |
239 |
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring |
Lim, Jeffery |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Lin, Chia-Hung |
Military 5G.3 |
77 |
Anti-Jamming Resilient LEO Satellite Swarms |
Lin, Po-Ching |
Demo Session.6 |
239 |
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring |
Lin, Shih-Chun |
Military 5G.3 |
77 |
Anti-Jamming Resilient LEO Satellite Swarms |
Lincoln, Patrick |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
Liu, Chunmei |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
Liu, Jiefei |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
Liu, Lingjia |
S8.4 |
478 |
Online Learning Meets Semantic Communication Over Wireless Channels |
S15.4 |
667 |
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing |
S25.3 |
963 |
Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation |
Liu, Qingyu |
S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
Liu, Wenming |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
Liu, Xiaofan |
S2.3 |
311 |
Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits |
Loevenich, Johannes |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
Lorenzo, Beatriz |
S2.3 |
311 |
Covert Communications in Cognitive Mobile Edge Computing Networks Using Restless Multi-Armed Bandits |
Lou, Wenjing |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
S26.1 |
747 |
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality |
Loveless, Thomas |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ma, Song |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
Maathuis, Clara |
S5.1 |
260 |
Human Centered Explainable AI Framework for Military Cyber Operations |
Madanayake, Arjuna |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Maksud, Ahmed |
S21.2 |
833 |
Second-Order Analysis of Secret-Key Capacity From a MIMO Channel |
Malek, Mai |
Demo Session.14 |
255 |
Optimization and Control of Autonomous UAV Swarm for Object Tracking |
Mangipudi, Pavan Kumar |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
Manso, Marco |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Marlin, Benjamin |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
Marojevic, Vuk |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Demo Session.12 |
251 |
Demo: SSxApp: Secure Slicing for O-RAN Deployments |
Martínez Beltrán, Enrique Tomás |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
Martinez Perez, Gregorio |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
Matsui, Hidetake |
S1.1 |
274 |
Design SNR Optimization of Polar Codes Over Block Rician Fading Channels |
Matsumine, Toshiki |
S1.1 |
274 |
Design SNR Optimization of Polar Codes Over Block Rician Fading Channels |
Mazzaro, Gregory |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
McDaniel, Patrick |
S1.3 |
13 |
The Efficacy of Transformer-Based Adversarial Attacks in Security Domains |
McDaniel, Patrick |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
S20.4 |
821 |
mMLSnet: Multilevel Security Network With Mobility |
McGillivray, Duncan |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
McHenry, Mark |
S17.3 |
611 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update |
McNair, Janise |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
S9.4 |
504 |
Detection of Cyberattacks in an Software-Defined UAV Relay Network |
Md Tayeen, Abu Saleh |
S3.1 |
325 |
CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
Médard, Muriel |
S14.4 |
643 |
Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol |
Medley, Michael |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
Michaelis, James |
Technical Paper Presentations.3 |
188 |
Applying Mission Information Requirements to Value of Information Middleware |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Misra, Satyajayant |
S3.1 |
325 |
CAFNet: Compressed Autoencoder-Based Federated Network for Anomaly Detection |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
Mohammed, Awab |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
Molnar, Joe |
S17.3 |
611 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update |
Moltafet, Mohammad |
S16.3 |
685 |
A Practical Perfect Secrecy Approach for IoBT Systems |
Moore, Joshua |
Demo Session.12 |
251 |
Demo: SSxApp: Secure Slicing for O-RAN Deployments |
Moore, Megan |
S25.1 |
950 |
Time-Diverse Doppler-Only LEO PNT |
Moradi, Hussein |
S14.1 |
622 |
A Method of Estimating Sparse and Doubly-Dispersive Channels |
Morelli, Alessandro |
Technical Paper Presentations.3 |
188 |
Applying Mission Information Requirements to Value of Information Middleware |
S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
Moscola, James |
S7.3 |
444 |
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network |
Moser, Steffen |
S7.1 |
430 |
Online Reduction of Exploration Space for Automated Underwater Modem Optimization |
Most, Alexander |
S3.1 |
162 |
Electrical Grid Anomaly Detection via Tensor Decomposition |
Mukherjee, Sarit |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
Muralkrishan, Madhuvanti |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Mushi, Magreth |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Naderi, Sanaz |
S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
Nagaraj, Keerthiraj |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
Nahill, Ben |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Neema, Sandeep |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
Ng, Nathan |
Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
Nguyen, Huy |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Nguyen, Kim Khoa |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
S19.3 |
787 |
Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL |
Nguyen, Ti |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
Nguyen, Van-Linh |
Demo Session.6 |
239 |
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring |
Nie, Zixiang |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
Nikam, Piyush |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
Noirot Ferrand, Jean-Charles |
S1.3 |
13 |
The Efficacy of Transformer-Based Adversarial Attacks in Security Domains |
Nomeir, Mohamed |
Dist AI/ML.7 |
57 |
Private Membership Aggregation |
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ochiai, Hideki |
S1.1 |
274 |
Design SNR Optimization of Polar Codes Over Block Rician Fading Channels |
Oprea, Alina |
S13.2 |
703 |
An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers |
Ornee, Tasmeen Zaman |
Technical Paper Presentations.4 |
194 |
Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems |
Osipychev, Denis |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
Ota, Daniel |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Ouyang, Chongjun |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
Özdemir, Özgür |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Pabon, Juan |
S27.4 |
894 |
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement |
Padnos, Steve |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
Pados, Dimitris |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
Pandey, Divyanshu |
S21.3 |
839 |
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO |
Park, Hyuncheol |
NextG DoD.2 |
89 |
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology |
Park, Joo Sung |
NextG DoD.2 |
89 |
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology |
Park, SooBum |
S1.4 |
292 |
Distributed Space-Time Block Coding for Barrage Relay Networks |
Pasquero, Oudomsack-Pierre |
S10.1 |
510 |
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption |
Pauley, Eric |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
Peng, Anfeng |
S18.1 |
722 |
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms |
Peng, Qihang |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
Peng, Yifeng |
S11.4 |
554 |
SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection |
Perazzone, Jake |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
Perez, Beatrice |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
Perez, Oscar |
S3.4 |
345 |
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning |
Piatt, Emma |
S12.3 |
|
Surface Wave Modes and Radiative Properties of a Plasma Antenna |
Pierson, Timothy |
S10.4 |
528 |
Evaluating the Practical Range of Harmonic Radar to Detect Smart Electronics |
Pirrone, Michelle |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
Poirrier, Alexandre |
S6.1 |
405 |
An Interoperable Zero Trust Federated Architecture for Tactical Systems |
Poltronieri, Filippo |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
Popescu, Dimitrie |
S22.1 |
562 |
Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications |
Poulliat, Charly |
S10.2 |
516 |
DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization |
Powell, Keith |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Poy, Isamu |
S5.4 |
397 |
Searchlight: An Accurate, Sensitive, and Fast Radio Frequency Energy Detection System |
Provost, Lauren |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
Pyo, Jisung |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Qiu, Zhaohua |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
R. Rao, Ramesh |
S17.2 |
605 |
On Reliability of CBRS Communications Near U.S. Navy Installations in San Diego |
Rahman, Mahfuzur |
S25.3 |
963 |
Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation |
Rahman, Md Habibur |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
Rahman, Talha |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Ramirez, David |
S21.3 |
839 |
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO |
Rastogi, Rishabh |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Ratazzi, Paul |
S27.1 |
876 |
TISIN: Traceable Information Sharing in Intermittent Networks |
Ravesteyn, Benjamin |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
Reddy, Achyut |
S13.2 |
703 |
An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers |
Reed, Jeffrey |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
Reed, Jeffrey |
Demo Session.14 |
255 |
Optimization and Control of Autonomous UAV Swarm for Object Tracking |
Reed, Jeffrey |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
Reed, Jeffrey |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
Reed, Jeffrey |
S25.3 |
963 |
Non-Terrestrial Network (NTN): A Noble Alternate Fractional Programming for the Downlink Channels Power Allocation |
Reising, Donald |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
Restuccia, Francesco |
Dist AI/ML.2 |
27 |
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness |
S6.3 |
418 |
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems |
Rettore, Paulo Henrique |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
Coalition Federated Operations.3 |
213 |
Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing |
S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
Rezki, Zouheir |
S16.3 |
685 |
A Practical Perfect Secrecy Approach for IoBT Systems |
Rice, Tarence |
S21.3 |
839 |
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO |
Rieß, Marcel |
S7.1 |
430 |
Online Reduction of Exploration Space for Automated Underwater Modem Optimization |
Rifat, Shahriar |
S6.3 |
418 |
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems |
Rigolin F. Lopes, Roberto |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
Robinson, Joshua |
S24.2 |
931 |
A Conditional Analysis of RF ML Latent Features |
Roque, Damien |
S10.2 |
516 |
DSSS Chip-Wise Faster-Than-Nyquist Signaling With DPSK for Robust Carrier Synchronization |
Rosenfeld, Bleema |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
Rouil, Richard |
S20.2 |
807 |
System-Level Evaluation of 5G NR UE-Based Relays |
Roy, Anirban |
Adversarial IoT.7 |
156 |
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models |
Roy, Sumit |
S20.1 |
799 |
Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches |
Roy Chowdhury, Mayukh |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
Rupar, Michael |
S12.3 |
|
Surface Wave Modes and Radiative Properties of a Plasma Antenna |
Russell, Paul |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
Ryu, Bo |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
S. R. Mallu, Jaswanth |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
Saarnisaari, Harri |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
Sadeghi, Moein |
Military 5G.1 |
63 |
Open Source-Based Over-The-Air 5G New Radio Sidelink Testbed |
Sadjadpour, Hamid |
S16.3 |
685 |
A Practical Perfect Secrecy Approach for IoBT Systems |
Saeed, Usama |
S8.4 |
478 |
Online Learning Meets Semantic Communication Over Wireless Channels |
Sagduyu, Yalin |
S5.2 |
385 |
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection With Deep Learning |
S20.3 |
815 |
Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution |
Saha, Souradip |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
Şahin, Alphan |
S3.3 |
339 |
Wireless Federated 𝑘-Means Clustering With Non-Coherent Over-The-Air Computation |
S28.1 |
852 |
Majority Vote Computation With Complementary Sequences for Distributed UAV Guidance |
Sahu, Aryan |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
Said, Karim |
S15.4 |
667 |
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing |
Samplawski, Colin |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
Sánchez Sánchez, Pedro Miguel |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
Sanchez-Viloria, Jose |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Sanders, Aric |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
Santos, Bruno |
S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
Santos, Joao |
Demo Session.8 |
243 |
Adaptive Beam Management for Secure mmWave Communications Using Software-Defined Radios |
Sartipi, Kamran |
S15.1 |
649 |
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks |
Sathish, Aditya |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
Schaefer, Elsa |
S4.4 |
371 |
Satellite Communications Resilience - Service Restoration and Retainment |
Schneider, Fred |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Schütz, Bertram |
Coalition Federated Operations.3 |
213 |
Site-Specific Radio Signal Propagation for Tactical Environments Using 3D Path Tracing |
Scott, Lisa |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
Segarra, Santiago |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
Seidenfad, Karl |
Demo Session.5 |
237 |
Validating a Modified JSON Web Signature Format Using the Scenario of Ammunition Issuance for Training Purposes |
Seo, Sang Yong |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
Serban, Constantin |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
Sevenich, Peter |
S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
Shah, Dhruv |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
Shah, Vijay |
Demo Session.7 |
241 |
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
Shake, Thomas |
S4.2 |
357 |
Hybrid Geometric/Shortest-Path Routing in Proliferated Low-Earth-Orbit Satellite Networks |
Shanafelt, Robert |
Demo Session.1 |
225 |
Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications |
Shao, Shihai |
S17.4 |
617 |
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields |
Sharma, Pragya |
Adversarial IoT.3 |
133 |
Impact of Delays and Computation Placement on Sense-Act Application Performance in IoT |
She, Xiaoming |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
Sheatsley, Ryan |
S11.1 |
536 |
Characterizing the Modification Space of Signature IDS Rules |
Shenoy, Prashant |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
Shi, Shanghao |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
Shi, Yi |
S20.3 |
815 |
Securing NextG Systems Against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution |
Shikula, Roman |
Demo Session.3 |
233 |
Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio |
Shisher, Md Kamran Chowdhury |
Technical Paper Presentations.4 |
194 |
Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems |
Shlezinger, Nir |
S1.3 |
286 |
Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETs |
Sichitiu, Mihail |
Demo Session.10 |
247 |
Demonstration of Joint SDR/UAV Experiment Development in AERPAW |
Siegel, Alexandra |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
Silva, Udara |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Silverman, Steven |
Quantum Tech.1 |
95 |
Quantum MBSE and Quantum SysML |
Silvius, Mark |
S17.3 |
611 |
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update |
Simon, Dominic |
S13.3 |
710 |
Adversarial Pixel and Patch Detection Using Attribution Analysis |
Simpson, Eric |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Singh, Satinder |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
S19.3 |
787 |
Efficient Link-State Multicast Routing by Optimizing Link-Weight With MARL |
Sinha, Sujata |
S1.1 |
1 |
Channel Aware Adversarial Attacks are Not Robust |
Sklivanitis, George |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
Slomka, Frank |
S7.1 |
430 |
Online Reduction of Exploration Space for Automated Underwater Modem Optimization |
Smith, Brad |
S9.3 |
497 |
Dominant Network Slices |
Smith, Gavin |
S19.4 |
793 |
Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4 |
Snoap, John |
S22.1 |
562 |
Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications |
Son, Hyunsoo |
NextG DoD.2 |
89 |
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology |
Song, Changqing |
S17.4 |
617 |
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields |
Souza, Abel |
Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
Soysal, Alkan |
S1.1 |
1 |
Channel Aware Adversarial Attacks are Not Robust |
Spiker, Carrie |
Dist AI/ML.6 |
51 |
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks Through Multi-Agent Deep Reinforcement Learning |
Spitzmiller, John |
S23.3 |
913 |
Tradespace Performance Study of Polarization-Insensitive Spatial Filtering for Jamming Suppression |
Spooner, Chad |
S22.1 |
562 |
Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications |
Srivastava, Arunabh |
Technical Paper Presentations.2 |
182 |
Age of Gossip on Generalized Rings |
Srivastava, Mani |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
Adversarial IoT.3 |
133 |
Impact of Delays and Computation Placement on Sense-Act Application Performance in IoT |
Stahlbuhk, Thomas |
S23.2 |
907 |
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency |
Starke, Allen |
S3.2 |
170 |
Graph Machine Learning Based Cyber Attack Detection for Mobile Tactical Networks |
Starr, Robert |
S19.1 |
773 |
An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes |
S19.4 |
793 |
Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception With Data Plane Programming and P4 |
Steele, Matt |
S19.1 |
773 |
An Approach to Tactical Network Performance Analysis With In-Band Network Telemetry and Programmable Data Planes |
Stephenson, Nathan |
Demo Session.7 |
241 |
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed |
Stevers, William |
Demo Session.3 |
233 |
Multi-Waveform Bridging of Streaming Video With an Innovative Software Radio |
Stiller, Burkhard |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
Stone, Kerri |
S24.1 |
925 |
Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications |
Stone, Rylee |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
Street, Dow |
S4.4 |
371 |
Satellite Communications Resilience - Service Restoration and Retainment |
Sultana, Abida |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
Sun, Limin |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
Sun, Yin |
Technical Paper Presentations.4 |
194 |
Context-Aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-Critical Systems |
Suprenant, Joseph |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
S21.1 |
827 |
Dynamic Interference-Avoiding MIMO Links |
Suri, Niranjan |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
Coalition Federated Operations.1 |
201 |
Dynamically Creating Tactical Network Emulation Scenarios Using Unity and EMANE |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
Swami, Ananthram |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Taha, Mohamed A. |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
Tang, Wenyi |
S27.1 |
876 |
TISIN: Traceable Information Sharing in Intermittent Networks |
Tassiulas, Leandros |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
Taylor, Stephen |
S16.2 |
679 |
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries |
Tkachenko, Olena |
S27.3 |
888 |
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments |
Torabi, Amir |
Demo Session.11 |
249 |
Interference-Avoiding RFSoC-Based MIMO Links |
Torres, Gabriel |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Tortonesi, Mauro |
Dist AI/ML.3 |
33 |
RoamML: Distributed Machine Learning at the Tactical Edge |
S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
Towsley, Don |
Adversarial IoT.6 |
150 |
Unlocking Efficiency: Understanding End-To-End Performance in Distributed Analytics Pipelines |
Tran, Xuan Tuyen |
S12.1 |
586 |
Deep Learning Based Fast and Accurate Beamforming for Millimeter-Wave Systems |
Traverso, Sylvain |
S10.3 |
522 |
Power and Second Order Cyclic Covertness of Chip-Wise Direct Sequence Spread Spectrum Faster-Than-Nyquist Signaling |
Tripathi, Asheesh |
Demo Session.13 |
253 |
End-To-End O-RAN Control-Loop for Radio Resource Allocation in SDR-Based 5G Network |
Tripathi, Nishith |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
Tschimben, Stefan |
S26.3 |
761 |
Modeling and Generation of Realistic Network Activity |
Turck, Kurt |
Dist AI/ML.2 |
27 |
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness |
S6.3 |
418 |
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems |
Tuukkanen, Topi |
Military 5G.2 |
71 |
DOTMFLPI Analysis of 5G for Several Military Use Cases |
Tyler, Joshua |
S5.1 |
377 |
CNN-Based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks Using Entropy-Informed RF-DNA Fingerprints |
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Ulukus, Sennur |
Dist AI/ML.7 |
57 |
Private Membership Aggregation |
Technical Paper Presentations.1 |
176 |
Timely Multi-Goal Transmissions With an Intermittently Failing Sensor |
Technical Paper Presentations.2 |
182 |
Age of Gossip on Generalized Rings |
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Vai, Michael |
S16.4 |
691 |
Security-As-A-Service for Embedded Systems |
Valenti, Matthew |
S27.4 |
894 |
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement |
Van Hau, Le |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
Vardoulias, Georgios |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
Varkatzas, Dimitrios |
S22.4 |
580 |
Waveform Manipulation Against DNN-Based Modulation Classification Attacks |
Varvello, Matteo |
S27.2 |
882 |
BIER-Like Multicast for Mobile Ad Hoc Networks |
Vassilaras, Spyridon |
S19.2 |
779 |
Revisiting the OLSRv2 Protocol Optimization in SDN-Enabled Tactical MANETs |
Vedros, Kurt |
S13.4 |
716 |
Do Programs Dream of Electromagnetic Signals? Towards GAN-Based Code-To-Signal Synthesis |
Velasquez, Alvaro |
S15.2 |
655 |
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions |
S24.4 |
944 |
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving |
Velazquez, Alexander |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
Velazquez, Scott |
Demo Session.1 |
225 |
Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications |
Venkatesan, Sridhar |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
S13.2 |
703 |
An Improved Nested Training Approach to Mitigate Clean-Label Attacks Against Malware Classifiers |
Verdier, Assoume Mba |
S7.4 |
450 |
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches |
Verma, Gunjan |
Adversarial IoT.4 |
139 |
Feature Compression for Multimodal Multi-Object Tracking |
S15.3 |
661 |
Learnable Digital Twin for Efficient Wireless Network Evaluation |
Vidhyadharan, Sreejith |
S28.4 |
870 |
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework |
Vithana, Sajani |
Dist AI/ML.7 |
57 |
Private Membership Aggregation |
Vitullo, Dashiell |
Quantum Tech.2 |
100 |
Computational Simulation Framework for Tactical Quantum Network Applications |
Volakis, John |
NextG DoD.1 |
83 |
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks |
Vuksani, Era |
S11.3 |
548 |
Transient Modeling of Topology-Based Worms in Networks With Link Interference |
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Wali, Syed |
Adversarial IoT.1 |
121 |
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection |
Walker, Chase |
S13.3 |
710 |
Adversarial Pixel and Patch Detection Using Attribution Analysis |
Wang, Fei |
S28.2 |
858 |
Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks |
Wang, Jun |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
Wang, Jz |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
Wang, Ning |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
Wang, Shiqiang |
S8.2 |
464 |
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation |
Wang, Tao |
S11.2 |
542 |
Adaptive Feature Engineering via Attention-Based LSTM Towards High Performance Reconnaissance Attack Detection |
Wang, Weijie |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
Wang, Weiping |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
Wang, Wen |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
Wang, Xiaofeng |
S28.1 |
852 |
Majority Vote Computation With Complementary Sequences for Distributed UAV Guidance |
Wang, Ying |
S11.4 |
554 |
SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection |
Wang, Yongpan |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
Wang, Ziqi |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
Wassink, Robin |
S16.1 |
673 |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield |
Watters, Kyle |
S14.3 |
635 |
Expected Probability of Radiometric Detection by Channelized Radiometer |
Webb, Wesley |
Quantum Tech.3 |
103 |
Spread Photon Transceiver for Quantum Secure Communications |
Weerackody, Vijitha |
S20.1 |
799 |
Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches |
Wei, Shuangqing |
S2.4 |
319 |
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary |
Weinzierl, Daniel |
S4.3 |
365 |
Blind Geolocation of RF-Signals With LEO Satellite Formations |
Wigness, Maggie |
Adversarial IoT.2 |
127 |
IoBT-MAX: A Multimodal Analytics eXperimentation Testbed for IoBT Research |
Win, Moe |
S18.3 |
735 |
Machine Learning Based Node Selection for UWB Network Localization |
Wright, Kevin |
S11.3 |
548 |
Transient Modeling of Topology-Based Worms in Networks With Link Interference |
Wrona, Konrad |
Coalition Federated Operations.2 |
207 |
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation |
Coalition Federated Operations.4 |
219 |
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments |
Wu, Li |
Adversarial IoT.5 |
144 |
Failure-Resilient ML Inference at the Edge Through Graceful Service Degradation |
Wunderlich, Adam |
S17.1 |
599 |
ATIC: Automated Testbed for Interference Testing in Communication Systems |
Wyglinski, Alexander |
S23.2 |
907 |
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency |
Wynter, Laura |
Dist AI/ML.4 |
39 |
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices |
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Xu, Jiarui |
S8.4 |
478 |
Online Learning Meets Semantic Communication Over Wireless Channels |
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Yang, Hanchao |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
Yang, Jingda |
S11.4 |
554 |
SmiLe Net: A Supervised Graph Embedding-Based Machine Learning Approach for NextG Vulnerability Detection |
Yang, Kathleen |
S14.4 |
643 |
Separating Interferers From Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol |
Yang, Yaling |
Demo Session.2 |
227 |
Demonstration of 5G-Underlay Signal Co-Existence |
S2.1 |
298 |
Enhanced Non-Preemptive Support of URLLC Using Spread Spectrum Underlay Signalling |
S2.2 |
304 |
Underlay-Based 5G Sidelink With Co-Channel Interference Cancellation |
Yi, Shuming |
S28.2 |
858 |
Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks |
Ying, Chenhao |
S2.4 |
319 |
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary |
Yoon, Young Il |
S22.2 |
568 |
Towards Scalable Automatic Modulation Classification via Meta-Learning |
Yu, Mingli |
S20.4 |
821 |
mMLSnet: Multilevel Security Network With Mobility |
Yu, Xi |
S27.4 |
894 |
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement |
Yu, Xinchun |
S2.4 |
319 |
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary |
Yudin, Matthew |
S1.2 |
7 |
Data-Driven Constraint Mining for Realizable Adversarial Samples |
S13.1 |
696 |
DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual Signatures |
Yuksel, Murat |
S7.2 |
438 |
In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying Platforms |
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Zaccarini, Mattia |
S6.4 |
424 |
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments |
Zhan, Mengqi |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
Zhang, Chaoyu |
S3.2 |
331 |
MINDFL: Mitigating the Impact of Imbalanced and Noisy-Labeled Data in Federated Learning With Quality and Fairness-Aware Client Selection |
Zhang, Jinchao |
S5.3 |
391 |
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method |
Zhang, Meng |
S4.1 |
351 |
Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems |
Zhang, Minglong |
Demo Session.12 |
251 |
Demo: SSxApp: Secure Slicing for O-RAN Deployments |
Zhang, Shunliang |
S28.3 |
864 |
On the Secrecy Performance of Aerial IRS-Assisted Wireless Communications |
Zhang, Xi |
S28.2 |
858 |
Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks |
Zhang, Xiao-Ping (Steven) |
S2.4 |
319 |
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary |
Zhang, Zhengguang |
S23.4 |
919 |
Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine Learning |
Zhao, Hongzhi |
S17.4 |
617 |
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields |
Zhao, Ming-Min |
S14.2 |
629 |
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity |
Zhao, Minjian |
S14.2 |
629 |
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems With 2D-Clustered Sparsity |
Zheng, Lizhong |
S15.4 |
667 |
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing |
Zhou, Shengtang |
S23.1 |
901 |
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach |
Zhou, Yuxi |
S17.4 |
617 |
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields |
Zhu, Hongsong |
S18.4 |
741 |
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries |
Zhu, Jianchi |
S12.2 |
593 |
Secure Line-Of-Sight Communications: Optimal Antenna Selection and Beamforming Design |
S21.4 |
845 |
Secure Beamforming in DLA-Based CAP-MIMO |
Zissner, Philipp |
S6.2 |
411 |
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks |
S9.2 |
491 |
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN |
Zumegen, Frederik |
Demo Session.9 |
245 |
BeamArmor Demo: Anti-Jamming System in Cellular Networks With srsRAN Software Radios |