default search action
41st MILCOM 2023: Boston, MA, USA
- IEEE Military Communications Conference, MILCOM 2023, Boston, MA, USA, October 30 - Nov. 3, 2023. IEEE 2023, ISBN 979-8-3503-2181-4
- Sujata Sinha, Alkan Soysal:
Channel Aware Adversarial Attacks are Not Robust. 1-6 - Matteo Varvello, Fang Hao, David Holland, James M. Hughes, Sarit Mukherjee:
BIER-Like Multicast for Mobile Ad Hoc Networks. 1-6 - Bleema Rosenfeld, Sridhar Venkatesan, Rauf Izmailov, Matthew Yudin, Constantin Serban, Ritu Chadha:
Data-Driven Constraint Mining for Realizable Adversarial Samples. 7-12 - Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick D. McDaniel:
The Efficacy of Transformer-based Adversarial Attacks in Security Domains. 13-18 - Heechan Kim, Honggu Kang, Joonhyuk Kang:
Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAV. 19-26 - Mohammad Abdi, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia:
Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal Awareness. 27-32 - Simon Dahdal, Filippo Poltronieri, Alessandro Gilli, Mauro Tortonesi, Roberto Fronteddu, Raffaele Galliera, Niranjan Suri:
RoamML: Distributed Machine Learning at the Tactical Edge. 33-38 - Luis Angel D. Bathen, Simeon Babatunde, Rhui Dih Lee, Achintya Kundu, Laura Wynter:
M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge Devices. 39-44 - Scott E. Brown, David Harman, Cleon Anderson, Matthew Dwyer:
Characterizing Distributed Inferencing at the Edge in Resource-Constrained Environments. 45-50 - Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Deokseong Kim, Jae H. Kim, Carrie Spiker, Blake Harnden:
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks via Multi-Agent Deep Reinforcement Learning. 51-56 - Mohamed Nomeir, Sajani Vithana, Sennur Ulukus:
Private Membership Aggregation. 57-62 - Melissa Elkadi, Deokseong Kim, Ejaz Ahmed, Anh Le, Moein Sadeghi, Paul Russell, Bo Ryu:
Open Source-Based Over-the-Air 5G New Radio Sidelink Testbed. 63-70 - Harri Saarnisaari, Relja Djapic, Topi Tuukkanen, Warren Low, Nicolas Chuberre, Souradip Saha:
DOTMFLPI Analysis of 5G for Several Military Use Cases. 71-76 - Venkata Srirama Rohit Kantheti, Chia-Hung Lin, Shih-Chun Lin, Liang C. Chu:
Anti-Jamming Resilient LEO Satellite Swarms. 77-82 - Elias A. Alwan, John L. Volakis, Md Khadimul Islam, Udara De Silva, Arjuna Madanayake, José Ángel Sánchez, George Sklivanitis, Dimitris A. Pados, Luke Beckwith, Reza Azarderakhsh, Madhuvanti Muralkrishan, Rishabh Rastogi, Aniruddha Hore, Eric W. Burger:
Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G Networks. 83-88 - Hyunsoo Son, Girim Kwon, Hyuncheol Park, Joo Sung Park:
Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-Numerology. 89-94 - Steven J. Silverman, Trey Jiron:
Quantum MBSE and Quantum SysML. 95-99 - Dashiell L. P. Vitullo, Trevor Cook, Daniel E. Jones, Lisa M. Scott, Brian T. Kirby:
Computational Simulation Framework for Tactical Quantum Network Applications. 100-102 - Wesley Webb, Michael S. Bullock, Samuel H. Knarr, Timothy C. Burt, Jim A. Drakes, Saikat Guha, Boulat A. Bash, Victor G. Bucklew:
Spread Photon Transceiver for Quantum Secure Communications. 103-108 - Austin Bristow, Kwang-Cheng Chen:
Pragmatic Quantum-Classic Phase Estimation of a Quantum Channel. 109-114 - Jaemin Kim, Hyunwoo Jung, Jeongseok Ha:
Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC Codes. 115-120 - Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian:
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection. 121-126 - Benjamin M. Marlin, Niranjan Suri, Shiwei Fang, Mani B. Srivastava, Colin Samplawski, Ziqi Wang, Maggie B. Wigness:
IoBT-MAX: a Multimodal Analytics eXperimentation Testbed for IoBT Research. 127-132 - Pragya Sharma, Mani B. Srivastava:
Impact of Delays and Computation Placement on Sense-Act Application Performance in IoT. 133-138 - Xinlin Li, Osama A. Hanna, Christina Fragouli, Suhas N. Diggavi, Gunjan Verma, Joydeep Bhattacharyya:
Feature Compression for Multimodal Multi-Object Tracking. 139-143 - Walid A. Hanafy, Li Wu, Tarek F. Abdelzaher, Suhas N. Diggavi, Prashant J. Shenoy:
Failure-Resilient ML Inference at the Edge through Graceful Service Degradation. 144-149 - Abel Souza, Nathan Ng, Tarek F. Abdelzaher, Don Towsley, Prashant J. Shenoy:
Unlocking Efficiency: Understanding End-to-End Performance in Distributed Analytics Pipelines. 150-155 - Susmit Jha, Anirban Roy, Adam D. Cobb, Alexander M. Berenbeim, Nathaniel D. Bastian:
Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models. 156-161 - Alexander Most, Maksim Ekin Eren, Boian S. Alexandrov, Nigel Lawrence:
Electrical Grid Anomaly Detection via Tensor Decomposition. 162-169 - Keerthiraj Nagaraj, Dennis Agnew, Pavan Kumar Mangipudi, Allen Starke, Zixiang Nie, Janise McNair:
Graph Machine Learning based Cyber Attack Detection for Mobile Tactical Networks. 170-175 - Ismail Cosandal, Sennur Ulukus:
Timely Multi-Goal Transmissions With an Intermittently Failing Sensor. 176-181 - Arunabh Srivastava, Sennur Ulukus:
Age of Gossip on Generalized Rings. 182-187 - James Michaelis, Alessandro Morelli:
Applying Mission Information Requirements to Value of Information Middleware. 188-193 - Tasmeen Zaman Ornee, Md Kamran Chowdhury Shisher, Clement Kam, Yin Sun:
Context-aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-critical Systems. 194-200 - Alessandro Amato, Roberto Fronteddu, Niranjan Suri:
Dynamically Creating Tactical Network Emulation Scenarios using Unity and EMANE. 201-206 - Alexander Velazquez, Roberto Rigolin Ferreira Lopes, Adrien Bécue, Johannes F. Loevenich, Paulo H. L. Rettore, Konrad S. Wrona:
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation. 207-212 - Bertram Schütz, Christoph Barz, Paulo H. L. Rettore, Thomas Hänel:
Site-specific Radio Signal Propagation for Tactical Environments using 3D Path Tracing. 213-218 - Marco Manso, Fernando Freire, Janusz Furlak, Bárbara Guerra, James Michaelis, Daniel Ota, Reinhard Claus, Niranjan Suri, Roberto Fronteddu, Edoardo Di Caro, Konrad S. Wrona, Emil P. Andersen, Frank T. Johnsen:
IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability Experiments. 219-224 - Scott R. Velazquez, Robert Shanafelt, Brennan Eveland:
Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC Applications. 225-226 - Kumar Sai Bondada, Xiang Cheng, Hanchao Yang, Daniel J. Jakubisin, Nishith D. Tripathi, G. Anderson, Yaling Yang, Jeffrey H. Reed:
Demonstration of 5G-Underlay Signal Co-existence. 227-232 - Roman Shikula, Nicholas Echeverry, William Stevers:
Multi-waveform Bridging of Streaming Video with an Innovative Software Radio. 233-234 - Alyse M. Jones, Amos Johnson, William C. Headley:
Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless Communications. 235-236 - Michael Hofmeier, Karl Seidenfad, Wolfgang Hommel:
Validating a Modified JSON Web Signature Format using the Scenario of Ammunition Issuance for Training Purposes. 237-238 - Shu-Ying Chang, Hung-Wen Liang, Van-Linh Nguyen, Po-Ching Lin:
Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring. 239-240 - Nathan Stephenson, Azuka J. Chiejina, Nathaniel B. Kabigting, Vijay K. Shah:
Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR Testbed. 241-242 - Adrian Baron-Hyppolite, Jefferson V. F. Abreu, Joao F. Santos, Luiz A. DaSilva, Jacek Kibilda:
Adaptive Beam Management for Secure mmWave Communications using Software-Defined Radios. 243-244 - Frederik Jonathan Zumegen, Ish Kumar Jain, Dinesh Bharadia:
BeamArmor Demo: Anti-Jamming System in Cellular Networks with srsRAN Software Radios. 245-246 - Anil Gürses, Mark Funderburk, John Kesler, Keith Powell, Talha Faizur Rahman, Özgür Özdemir, Magreth Mushi, Mihail L. Sichitiu, Ismail Güvenç, Rudra Dutta, Vuk Marojevic:
Demonstration of Joint SDR/UAV Experiment Development in AERPAW. 247-248 - Amir Torabi, George Sklivanitis, Dimitris A. Pados, Elizabeth Serena Bentley, Joseph Suprenant, Michael J. Medley:
Interference-Avoiding RFSoC-based MIMO Links. 249-250 - Joshua Moore, Aly Sabri Abdalla, Minglong Zhang, Vuk Marojevic:
Demo: SSxApp: Secure Slicing for O-RAN Deployments. 251-252 - Asheesh Tripathi, Jaswanth S. R. Mallu, Md. Habibur Rahman, Abida Sultana, Aditya Sathish, Alexandre Huff, Mayukh Roy Chowdhury, Aloizio Pereira da Silva:
End-to-End O-RAN Control-Loop For Radio Resource Allocation in SDR-Based 5G Network. 253-254 - Anand Mahesh Kumar, Mai A. Abdel-Malek, Jeffrey H. Reed:
Optimization and Control of Autonomous UAV Swarm for Object Tracking. 255-259 - Clara Maathuis:
Human Centered Explainable AI Framework for Military Cyber Operations. 260-267 - Brian Jalaian, Nathaniel D. Bastian:
Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning. 268-273 - Hidetake Matsui, Toshiki Matsumine, Hideki Ochiai:
Design SNR Optimization of Polar Codes Over Block Rician Fading Channels. 274-279 - Mostafa Ibrahim, Sabit Ekin, Ali Riza Ekti:
Warping Functions Design for Long Warped ZT-DFT-s-OFDM. 280-285 - Tomer Alter, Nir Shlezinger:
Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETs. 286-291 - Ki-Hun Lee, Howon Lee, Jungwook Choi, Soobum Park, Bang Chul Jung:
Distributed Space-Time Block Coding for Barrage Relay Networks. 292-297 - Kumar Sai Bondada, Hanchao Yang, Xiang Cheng, Daniel J. Jakubisin, Nishith D. Tripathi, Gus Anderson, Yaling Yang, Jeffrey H. Reed:
Enhanced Non-preemptive Support of URLLC using Spread Spectrum Underlay Signalling. 298-303 - Hanchao Yang, Kumar Sai Bondada, Xiang Cheng, Daniel J. Jakubisin, Nishith D. Tripathi, Yaling Yang, Gustave Anderson, Jeffrey H. Reed:
Underlay-based 5G Sidelink with Co-channel Interference Cancellation. 304-310 - X. Liu, Beatriz Lorenzo, Dennis Goeckel:
Covert Communications in Cognitive Mobile Edge Computing Networks using Restless Multi-Armed Bandits. 311-318 - Xinchun Yu, Shuangqin Wei, Chenhao Ying, Xiao-Ping Zhang:
Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective Adversary. 319-324 - Abu Saleh Md Tayeen, Satyajayant Misra, Huiping Cao, Jayashree Harikumar:
CAFNet: Compressed Autoencoder-based Federated Network for Anomaly Detection. 325-330 - Chaoyu Zhang, Ning Wang, Shanghao Shi, Changlai Du, Wenjing Lou, Y. Thomas Hou:
MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client Selection. 331-338 - Alphan Sahin:
Wireless Federated k-Means Clustering with Non-coherent Over-the-Air Computation. 339-344 - Pratyay Kumar, Jiefei Liu, Abu Saleh Md Tayeen, Satyajayant Misra, Huiping Cao, Jayashree Harikumar, Oscar Perez:
FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning. 345-350 - Huadong Guo, Weiqing Huang, Wen Wang, Meng Zhang, Zhaohua Qiu, Jinglong Guo:
Analysis and Optimization of Anti-jamming Performance of User Terminals with Low Sidelobe Levels for LEO Satellite Systems. 351-356 - Thomas H. Shake:
Hybrid Geometric/Shortest-path Routing in Proliferated Low-Earth-Orbit Satellite Networks. 357-364 - Daniel Weinzierl, Christian A. Hofmann, Andreas Knopp:
Blind Geolocation of RF-Signals with LEO Satellite Formations. 365-370 - Richard L. Gobbi, Elsa Schaefer, Jabril Jacobs, Dow Street:
Satellite Communications Resilience - Service Restoration and Retainment. 371-376 - Awab A. H. Mohammed, Mohamed A. Taha, Joshua H. Tyler, Mohamed K. M. Fadul, Donald R. Reising, T. Daniel Loveless:
CNN-based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks using Entropy-Informed RF-DNA Fingerprints. 377-384 - Yalin E. Sagduyu, Tugba Erpek:
Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep Learning. 385-390 - Mengqi Zhan, Yang Li, Huajun Cui, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang:
MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting Method. 391-396 - Richard Bell, Kyle Watson, Tianyi Hu, Isamu Poy, Fredric J. Harris, Dinesh Bharadia:
Searchlight: An accurate, sensitive, and fast radio frequency energy detection system. 397-404 - Alexandre Poirrier, Laurent Cailleux, Thomas Heide Clausen:
An Interoperable Zero Trust Federated Architecture for Tactical Systems. 405-410 - Johannes F. Loevenich, Philipp Zißner, Paulo H. L. Rettore, Jonas Bode, Tobias Hürten, Thorsten Lampe, Roberto Rigolin Ferreira Lopes:
Cooperative Agent System for Quantifying Link Robustness in Tactical Networks. 411-417 - Shahriar Rifat, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia:
Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless Systems. 418-423 - Raffaele Galliera, Mattia Zaccarini, Alessandro Morelli, Roberto Fronteddu, Filippo Poltronieri, Niranjan Suri, Mauro Tortonesi:
Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical Environments. 424-429 - Marcel Rieß, Steffen Moser, Frank Slomka:
Online Reduction of Exploration Space for Automated Underwater Modem Optimization. 430-437 - Md Sarwar Uddin Chowdhury, Murat Yuksel:
In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying Platforms. 438-443 - Riley Gartrell, Ryan Black, Kyle Bush, Mahmudur Khan, James Moscola, Josh Gilbert:
Reliable Communication in a Multi-Transceiver Mobile Optical Wireless Network. 444-449 - Van Hau Le, Ti Ti Nguyen, Kim Khoa Nguyen, Verdier Assoume, Satinder Singh:
Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning Approaches. 450-455 - Roy Axford, Jason DuChez:
Increasing the Supportable Number of WGS Users. 456-463 - Zheyu Chen, Kin K. Leung, Shiqiang Wang, Leandros Tassiulas, Kevin S. Chan, Patrick J. Baker:
Learning Technique to Solve Periodic Markov Decision Process for Network Resource Allocation. 464-470 - Emilie Coote, Brian Lachine:
Platform Management System Host-Based Anomaly Detection using TF-IDF and an LSTM Autoencoder. 471-477 - Jiarui Xu, Usama Saeed, Jonathan D. Ashdown, Lingjia Liu:
Online Learning Meets Semantic Communication over Wireless Channels. 478-483 - Iordanis Koutsopoulos:
Learning the Jointly Optimal Routing and Controller Placement Policy in Mobile Software-Defined Networks. 484-490 - Philipp Zißner, Paulo H. L. Rettore, Bruno P. Santos, Roberto Rigolin Ferreira Lopes, Johannes F. Loevenich, Peter Sevenich:
Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDN. 491-496 - Bradley R. Smith:
Dominant Network Slices. 497-503 - Dennis Agnew, Alvaro del Aguila, Janise McNair:
Detection of Cyberattacks in an Software-Defined UAV Relay Network. 504-509 - Clément Leroy, Tarak Arbi, Oudomsack Pierre Pasquero, Benoit Geller:
Chip-Interleaved DSSS for Energy-Efficient Physical Layer Encryption. 510-515 - Damien Roque, Stéphanie Bidon, Charly Poulliat:
DSSS Chip-Wise Faster-than-Nyquist Signaling with DPSK for Robust Carrier Synchronization. 516-521 - Jean-Baptiste Fraisse, Pascal Chevalier, Roland Gautier, François Delaveau, Sylvain Traverso:
Power and second order cyclic covertness of chip-wise Direct Sequence Spread Spectrum Faster-Than-Nyquist signaling. 522-527 - Beatrice Perez, Cesar Arguello, Timothy J. Pierson, Gregory J. Mazzaro, David Kotz:
Evaluating the practical range of harmonic radar to detect smart electronics. 528-535 - Ryan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick D. McDaniel:
Characterizing the Modification Space of Signature IDS Rules. 536-541 - Hamidah Alanazi, Shengping Bi, Tao Wang, Tao Hou:
Adaptive Feature Engineering via Attention-based LSTM towards High Performance Reconnaissance Attack Detection. 542-547 - Adrian E. Conway, Era Vuksani, Kevin Wright, M. Patrick Collins:
Transient Modeling of Topology-based Worms in Networks with Link Interference. 548-553 - Yifeng Peng, Jingda Yang, Sudhanshu Arya, Ying Wang:
SmiLe Net: A Supervised Graph Embedding-based Machine Learning Approach for NextG Vulnerability Detection. 554-561 - John A. Snoap, Dimitrie C. Popescu, Chad M. Spooner:
Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition Applications. 562-567 - Jungik Jang, Jisung Pyo, Young-Il Yoon, Sang Yong Seo, Eun Jae Lee, Gyeong Hun Jung, Jaehyuk Choi:
Towards Scalable Automatic Modulation Classification via Meta-Learning. 568-573 - Andreas Andersson, Kristoffer Hägglund, Erik Axell:
Deep Learning-Based Demodulation in Impulse Noise Channels. 574-579 - Dimitrios Varkatzas, Antonios Argyriou:
Waveform Manipulation Against DNN-based Modulation Classification Attacks. 580-585 - Tarun S. Cousik, Vijay K. Shah, Jeffrey H. Reed, Harry X. Tran, Rittwik Jana:
Deep Learning based Fast and Accurate Beamforming for Millimeter-Wave Systems. 586-592 - Zhenqiao Cheng, Nanxi Li, Jianchi Zhu, Xiaoming She, Chongjun Ouyang, Peng Chen:
Secure Line-of-Sight Communications: Optimal Antenna Selection and Beamforming Design. 593-598 - Michelle Pirrone, M. Keith Forsyth, Jordan Bernhardt, Daniel Kuester, Aric Sanders, Duncan McGillivray, Adam Wunderlich:
ATIC: Automated Testbed for Interference Testing in Communication Systems. 599-604 - Abhishek Chakraborty, Ramesh R. Rao:
On Reliability of CBRS Communications near U.S. Navy Installations in San Diego. 605-610 - Mark D. Silvius, Mark A. McHenry, Alex Lackpour, Joe Molnar:
Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation Update. 611-616 - Changqing Song, Yuxi Zhou, Hongzhi Zhao, Shihai Shao:
Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight Battlefields. 617-621 - Brandon T. Hunt, David B. Haab, Hussein Moradi, Behrouz Farhang-Boroujeny:
A Method of Estimating Sparse and Doubly-Dispersive Channels. 622-628 - Yuejin Ding, Ming Lei, Ming-Min Zhao, Minjian Zhao:
Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems with 2D-Clustered Sparsity. 629-634 - Kyle Watters, Edward J. Coyle:
Expected Probability of Radiometric Detection by Channelized Radiometer. 635-642 - Kathleen Yang, Muriel Médard, Ken R. Duffy:
Separating Interferers from Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol. 643-648 - Sohan Gyawali, Kamran Sartipi, Benjamin Van Ravesteyn, Jiaqi Huang, Yili Jiang:
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks. 649-654 - Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Alvaro Velasquez:
Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions. 655-660 - Boning Li, Timofey Efimov, Abhishek Kumar, Jose Cortes, Gunjan Verma, Ananthram Swami, Santiago Segarra:
Learnable Digital Twin for Efficient Wireless Network Evaluation. 661-666 - Shashank Jere, Karim A. Said, Lizhong Zheng, Lingjia Liu:
Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive Processing. 667-672 - Pedro Miguel Sánchez Sánchez, Enrique Tomás Martínez Beltrán, Alberto Huertas Celdrán, Robin Wassink, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield. 673-678 - James Brock, Lauren Provost, Rylee Stone, Stephen Padnos, Stephen Taylor, Jason Dahlstrom:
Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System Binaries. 679-684 - Mohammad Moltafet, Hamid R. Sadjadpour, Zouheir Rezki:
A Practical Perfect Secrecy Approach for IoBT Systems. 685-690 - Michael Vai, Eric Simpson, Donato Kava, Alice Lee, Huy Nguyen, Jeffrey J. Hughes, Gabriel Torres, Jeffery Lim, Ben Nahill, Roger Khazan, Fred Schneider:
Security-as-a-Service for Embedded Systems. 691-695 - Matthew Yudin, Rauf Izmailov:
DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual Signatures. 696-702 - Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov, Alina Oprea:
An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers. 703-709 - Chase Walker, Dominic Simon, Sumit Kumar Jha, Rickard Ewetz:
Adversarial Pixel and Patch Detection Using Attribution Analysis. 710-715 - Kurt A. Vedros, Constantinos Kolias, Robert C. Ivans:
Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis. 716-721 - Enguang Fan, Anfeng Peng, Matthew Caesar, Jae Kim, Josh D. Eckhardt, Greg Kimberly, Denis Osipychev:
Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged Platforms. 722-728 - Kevin Joe:
Passive Geolocation of Multiple Pulsed Emitters. 729-734 - Carlos A. Gómez-Vega, Moe Z. Win, Andrea Conti:
Machine Learning Based Node Selection for UWB Network Localization. 735-740 - Siyuan Li, Chaopeng Dong, Yongpan Wang, Wenming Liu, Weijie Wang, Hong Li, Hongsong Zhu, Limin Sun:
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries. 741-746 - Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Age of Critical Information: Optimizing Data Freshness Based on Content Criticality. 747-754 - Zhuoxuan Ju, Milos Doroslovacki:
Urgency of Information Optimization at Query in an Interactive System. 755-760 - Stefan Tschimben, Isabella Bates, James H. Curry, Keith D. Gremban, Alexandra Siegel:
Modeling and Generation of Realistic Network Activity. 761-766 - Mine Gokce Dogan, Martina Cardone, Christina Fragouli:
Low-Delay Proactive Mechanisms for Resilient Communication. 767-772 - Robert Starr, Matt Steele, Jonathon Cheah:
An Approach to Tactical Network Performance Analysis with In-Band Network Telemetry and Programmable Data Planes. 773-778 - Ioannis Fourfouris, Merkouris Karaliopoulos, Dimitrios Kafetzis, Georgios Vardoulias, Apostolos Georgiadis, Spyridon Vassilaras, Iordanis Koutsopoulos:
Revisiting the OLSRv2 Protocol Optimization in SDN-enabled Tactical MANETs. 779-786 - Do Dang, Kim Khoa Nguyen, Verdier Assoume, Satinder Singh:
Efficient Link-State Multicast Routing by Optimizing Link-Weight with MARL. 787-792 - Sean Ha, Gavin Smith, Robert Starr:
Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception with Data Plane Programming and P4. 793-798 - Vijitha Weerackody, Sumit Roy, Kent Benson, Eric Yang:
Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential Approaches. 799-806 - Samantha Gamboa, Aziza Ben Mosbah, Wesley Garey, Chunmei Liu, Richard Rouil:
System-Level Evaluation of 5G NR UE-Based Relays. 807-814 - Yalin E. Sagduyu, Tugba Erpek, Yi Shi:
Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution. 815-820 - Mingli Yu, Quinn K. Burke, Thomas La Porta, Patrick D. McDaniel:
mMLSnet: Multilevel Security Network with Mobility. 821-826 - Sanaz Naderi, Dimitris A. Pados, George Sklivanitis, Elizabeth Serena Bentley, Joseph Suprenant, Michael J. Medley:
Dynamic Interference-Avoiding MIMO Links. 827-832 - Ahmed Maksud, Yingbo Hua:
Second-Order Analysis of Secret-Key Capacity From a MIMO Channel. 833-838 - Tarence Rice, Divyanshu Pandey, David Ramirez, Edward W. Knightly:
Experimental Evaluation of AoA Estimation for UAV to Massive MIMO. 839-844 - Zhenqiao Cheng, Nanxi Li, Jianchi Zhu, Xiaoming She, Chongjun Ouyang, Peng Chen:
Secure Beamforming in DLA-Based CAP-MIMO. 845-851 - Alphan Sahin, Xiaofeng Wang:
Majority Vote Computation With Complementary Sequences for Distributed UAV Guidance. 852-857 - Shuming Yi, Fei Wang, Xi Zhang:
Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless Networks. 858-863 - Xiaolei Guo, Shunliang Zhang:
On the secrecy performance of aerial IRS-assisted wireless communications. 864-869 - Piyush Nikam, Dhruv Shah, Aryan Sahu, Neena Goveas, Sreejith Vidhyadharan:
Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training Framework. 870-875 - Wenyi Tang, Taeho Jung, E. Paul Ratazzi:
TISIN: Traceable Information Sharing in Intermittent Networks. 876-881 - Olena Tkachenko, Sean Harding, Cleon Anderson, Jake B. Perazzone, Matthew Dwyer, Kevin S. Chan:
Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked Environments. 888-893 - Juan David Pabon, Matthew C. Valenti, Xi Yu:
Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement. 894-900 - Song Ma, Xiaonan Chen, Jingzhou Wang, Jun Wang, Xueying Li, Shengtang Zhou, Yading Chen, Qihang Peng:
Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision Approach. 901-906 - Maya E. Flores, Thomas Stahlbuhk, Alexander M. Wyglinski:
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency. 907-912 - John N. Spitzmiller:
Tradespace Performance Study of Polarization-Insensitive Spatial Filtering for Jamming Suppression. 913-918 - Zhengguang Zhang, Marwan Krunz:
Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine Learning. 919-924 - Jason Hussey, Kerri Stone, Tracy Camp:
Generalizing Machine Learning Models for Zero-Day Encrypted Messaging Applications. 925-930 - Scott Kuzdeba, Josh Robinson:
A Conditional Analysis of RF ML Latent Features. 931-936 - Andrew Fryer, Thomas Dean, Brian Lachine:
Input Output Grammar Coverage in Fuzzing. 937-943 - Sumit Kumar Jha, Susmit Jha, Patrick Lincoln, Nathaniel D. Bastian, Alvaro Velasquez, Rickard Ewetz, Sandeep Neema:
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving. 944-949 - Megan O. Moore, R. Michael Buehrer, William C. Headley:
Time-Diverse Doppler-only LEO PNT. 950-956 - Byeongheon Lee, Ju-Hyung Lee, Young-Chai Ko:
Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate System. 957-962 - Mahfuzur Rahman, Md. Zoheb Hassan, Jeffrey H. Reed, Lingjia Liu:
Non-Terrestrial Network (NTN): a Novel Alternate Fractional Programming for the Downlink Channels Power Allocation. 963-968
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.