default search action
39th MILCOM 2021: San Diego, CA, USA
- 2021 IEEE Military Communications Conference, MILCOM 2021, San Diego, CA, USA, November 29 - Dec. 2, 2021. IEEE 2021, ISBN 978-1-6654-3956-5
- M. Tamer Refaei, Sean Ha, Robbie Starr, Matt Steele:
Using NDN and P4 For Effective Traffic Management in Tactical Networks. 1-6 - Darren Rogers, Vikram Kanth:
WannaCry Data Collection System Design and Tutorial. 1-6 - Joseph P. Macker, Caleb Bowers, Sastry Kompella, Clement Kam, Jeffery W. Weston:
Wireless Network Topology Control: Adjustable Resiliency and Network Traffic Delivery. 1-6 - Ioannis Chatzigeorgiou:
Spark Optimization of Linear Codes for Reliable Data Delivery by Relay Drones. 1-6 - Stefan Weithoffer, Rami Klaimi, Charbel Abdel Nour:
Mitigating Blind Detection Through Protograph Based Interleaving for Turbo Codes. 7-12 - Md Hasan Rahman, Mohammad Ranjbar, Nghi H. Tran, Khanh Pham:
Optimal Signaling Schemes of 2- User Gaussian Mixture Multiple-Access Channels with 1-bit ADC. 13-18 - Frederick J. Block:
Low-Rate FEC for $M$-ary Orthogonal Modulation. 19-24 - Brian DeCleene, Steve Huntsman:
Wireless Resilient Routing Reconfiguration. 25-30 - Saeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin A. Larson, Anh Le, Alex Yahja, Jae H. Kim:
DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks. 31-36 - Tianyi Xu, Ding Zhang, Parth H. Pathak, Zizhan Zheng:
Joint AP Probing and Scheduling: A Contextual Bandit Approach. 37-42 - Frederick M. Chache, Sean Maxon, Ram M. Narayanan, Ramesh Bharadwaj:
QoS Extension to a B.A.T.M.A.N. based LoRa Mesh Network. 43-48 - Alan Kaminsky, Michael T. Kurdziel, Steven Farris, Marcin Lukowiak, Stanislaw P. Radziszowski:
Solving the Cross Domain Problem with Functional Encryption. 49-54 - David Last, Michael Atighetchi, Partha P. Pal, Ryan Toner:
Using Distributed Ledgers For Command and Control - Concepts and Challenges. 55-60 - Nathan Daughety, Marcus Pendleton, Shouhuai Xu, Laurent Njilla, John V. Franco:
vCDS: A Virtualized Cross Domain Solution Architecture. 61-68 - Anne M. Tall, Cliff C. Zou, Jun Wang:
Integrating Cybersecurity Into a Big Data Ecosystem. 69-76 - Roy Axford:
Margin and Availability in Transponded SATCOM. 77-84 - Lan K. Nguyen, Duy H. N. Nguyen, Nghi H. Tran, Clayton Bosler, David Brunnenmeyer:
SATCOM Jamming Resiliency under Non-Uniform Probability of Attacks. 85-90 - Joseph Vanderpoorten, James Lyke, David Brunnenmeyer, Kevin Zhang, Don Fronterhouse, Joseph Kidder, Jeffrey Laing:
Flexible Network Interface (FNI): A Mission-centric Integration Framework for Next Generation DoD SATCOM Networks. 91-95 - Silvija Kokalj-Filipovic, Paul Toliver, William Johnson, Rob Miller:
Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification. 96-101 - Alexander Poylisher, Andrzej Cichocki, Katherine Guo, James Hunziker, Latha A. Kant, Bhaskar Krishnamachari, Salman Avestimehr, Murali Annavaram:
Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETs. 102-107 - Peter Chin, Emily Do, Cody Doucette, Brandon Kalashian, David Last, Nathan Lenz, Edward Lu, Devon Minor, Elias Noyes, Colleen T. Rock, Nathaniel Soule, Nicholas Walczak, Dave Canestrare:
TAK-ML: Applying Machine Learning at the Tactical Edge. 108-114 - David Nieves-Acaron, Benjamin Luchterhand, Akshay Aravamudan, David Elliott, Steven Wyatt, Carlos E. Otero, Luis Daniel Otero, Anthony O. Smith, Adrian M. Peter, Wesley Jones, Eric Lam:
ACE: An ATAK Plugin for Enhanced Acoustic Situational Awareness at the Edge. 115-120 - Mengkun Ji, Keith M. Chugg:
Analysis of the Average Sampling Frequency for Level Crossing Analog-to-Digital Converters. 121-126 - Xiaofei Chen, Elettra Venosa, Fredric J. Harris:
Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) Receivers. 127-132 - Nathaniel A. Henry, John F. Doherty, David M. Jenkins:
Wideband Auto-Ambiguity Function Nulling Algorithm. 133-138 - Jonathon Cheah:
Phase Noise Time Series Model. 139-144 - Frederick J. Block:
Capacity Bounds for Frequency-Hopped BPSK. 145-150 - Kathleen Yang, Jonathan Gluck, Daniel Perkins, Richard K. Ridgway, Muriel Médard:
Over-the-Air Testing of Impulsive Frequency Shift Keying Modulation. 151-156 - Leila Mounsif, Damien Roque, Charly Poulliat:
Optimal Pilot Sequences for Phase and Timing Synchronization in FTN Systems. 157-161 - Mohammed Elbadry, Fan Ye, Peter A. Milder:
Unifying Address and Name Based Communication in Wireless Medium Access Control. 162-168 - Manveen Kaur, Rahul Amin, Jim Martin:
The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial System. 169-174 - Caleb Bowers, Joseph P. Macker, Jeffery W. Weston, Brian Adamson:
Multicast Enhancements to Event-Driven Tactical Networking. 175-180 - Jack W. Stokes, Paul England, Kevin Kane:
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance. 181-188 - Vikash Sehwag, Jack W. Stokes, Cha Zhang:
Beyond $L_{p}$ Norms: Delving Deeper into Robustness to Physical Image Transformations. 189-196 - Pranav Maneriker, Jack W. Stokes, Edir Garcia Lazo, Diana Carutasu, Farid Tajaddodianfar, Arun Gururajan:
URLTran: Improving Phishing URL Detection Using Transformers. 197-204 - Robert E. Anderson, Albert P. Berg, James R. Carter, Dana DeFrancesco, Ronald W. Elliott, Jessica L. Gregris, Donald W. Hershberger, William Y. Joo, Dahesh A. Khalil, Jeremy R. Kozee, Philip C. Minor, Pamela A. Phillips, Armando J. Vigil:
Migration of DOD SATCOM Earth Segment Architectures to Digital IF. 205-212 - Kenneth Pittner, Daniel Lukaszewski, Geoffrey G. Xie:
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links. 213-218 - Michael A. Rupar, Erlend Larsen, H. Bugra Saglam, Ruben Bascuñana Blasco, Julian A. Savin, Nadine Brück:
Airborne Beyond Line of Sight Communication Networks. 219-224 - Mattia Fogli, Geert Pingen, Thomas Kudla, Sean Webb, Niranjan Suri, Harrie Bastiaansen:
Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of Kubernetes. 225-230 - Manas Pradhan, Marco Manso, James R. Michaelis:
Concepts and Directions for Future IoT and C2 Interoperability. 231-236 - Athanasios Gkelias, Nitish K. Panigrahy, Mohammad Mobayenjarihani, Kin K. Leung, Don Towsley, Patrick J. Baker, Olwen Worthington, Laurence Fowkes:
Resource Management in Software Defined Coalitions (SDC) through Slicing. 237-242 - I. Zakir Ahmed, Hamid R. Sadjadpour, Shahram Yousefi:
Constrained Resource Allocation Problems in Communications: An Information-assisted Approach. 243-248 - Ashton Knight, Venkatesh Ramaswamy, Jeffrey T. Correia, Darcy Swain-Walsh, Jerediah R. Fevold, Shawn Lefebre, Howard McDonald, Anthony Rennier, Mike DiFrancisco:
A Novel Approach to Characterize Aggregate Interference from LTE-Based Cellular Deployments. 249-254 - John J. Kelly, Daniel L. Stevens:
Novel RF Spectrum Characterization Using Information Measures. 255-260 - Anshu Mukherjee, Vaibhav Kumar, Le-Nam Tran:
Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap Channels. 261-266 - Joongsub Choi, Girim Kwon, Hyuncheol Park:
Joint Beamforming Design for LOS MIMO Systems with Multiple Intelligent Reflecting Surfaces. 267-272 - Arindam Chowdhury, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra:
ML-aided power allocation for Tactical MIMO. 273-278 - Autumn Twitchell, Michael Rice:
On Alamouti-Encoded 16-APSK in Aeronautical Mobile Telemetry. 279-284 - Gautam Trivedi, Bijan Jabbari:
On Wireless Link Connectivity for Resilient Multi-Hop Networks. 285-290 - Shorya Consul, Hasan Burhan Beytur, Gustavo de Veciana, Haris Vikalo:
RF-based Network Inference: Theoretical Foundations. 291-296 - Shakil Ahmed, Ahmed E. Kamal, Mohamed Y. Selim:
Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT Devices. 297-302 - Clement Kam, Sastry Kompella, Anthony Ephremides:
The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and Tradeoffs. 303-308 - Xinyuan Wang:
CloudImmu: Transparent Protection of Binary Applications in the Cloud. 309-315 - Rune Hylsberg Jacobsen, Ali Marandi:
Security Threats Analysis of the Unmanned Aerial Vehicle System. 316-322 - Jing Tian, Gaopeng Gou, Yangyang Guan, Wei Xia, Gang Xiong, Chang Liu:
A Study on Security Analysis of the Unlinkability in Tor. 323-328 - Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud. 329-334 - Vijitha Weerackody, Enrique Cuevas:
Methodologies for Spectrum Sharing for a Network of Land-ESIMs with Stations in the Mobile Service. 335-340 - Robert Murawski, Steven C. Bretmersky, Wesley Eddy, Eylem Ekici, Albert Becker, Jonathan D. Ashdown, Kurt A. Turck:
Improved Propagation Modeling for Non-Terrestrial Networks. 341-346 - Nathaniel Soule, Brandon Kalashian, Colleen T. Rock, Landon Tomcho:
Software Acoustic Modem for TAK Communications with Analog Radios at the Tactical Edge. 347-353 - Timothy Woods, Sean Furman, Christopher Maracchion, Andrew L. Drozd, Fred Frantz, Jonathan D. Ashdown:
All-domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing with Implemented Dynamic Spectrum Access Toolchain. 354-359 - Christoph Barz, Jonathan Kirchhoff, Julia Niewiejska, Maximilian Prahl-Kamps, Ioannis Stavrou, Elias Werberich:
Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus Area. 360-365 - Paul Flavell, Paul Adams, Germano Capela, Luis Bastos:
Adopting a dynamic spectrum management philosophy in NATO. 366-371 - Eduardo Bolas, Germano Capela, Luis Bastos:
Protected core networking: communications challenges in tactical environments. 372-377 - Derrick A. Chu, John R. Barry:
Direct-Sequence Spread-Spectrum Acquisition for High Dynamic Environments via Signal Partitioning. 378-383 - William H. Clark, Alan J. Michaels:
Quantifying Dataset Quality in Radio Frequency Machine Learning. 384-389 - Kyle Willstatter, Michael D. Zoltowski:
Complementary Sequence Construction for Constant-Envelope OFDM Transmission Enabling Nonlinear Amplification and Clipping. 390-395 - Daniel Green, Murali Tummala, John McEachen:
Pulsed Signal Detection Utilizing Wavelet Analysis with a Deep Learning Approach. 396-401 - Zeenat Afroze, Mohanad Mohsen, David W. Matolak, Hudson Dye:
Indoor 90 GHz Channel Measurement Results for LOS to NLOS Transitions. 402-407 - Daniel J. Breton, Caitlin E. Haedrich:
Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain: (Invited Paper). 408-413 - Guiqi Sun, Chen Huang, Zihang Cheng, Ruisi He, Bo Ai, Andreas F. Molisch:
A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless Channels. 414-419 - Ann C. Vanleer, Christopher Robert Anderson:
Improving Propagation Model Predictions via Machine Learning with Engineered Features. 420-425 - Yi Hu, Constantin Serban, Lan Wang, Alexander Afanasyev, Lixia Zhang:
BBR-Inspired Congestion Control for Data Fetching over NDN. 426-431 - Md Ashiqur Rahman, Teng Liang, Beichuan Zhang:
BLEnD: Improving NDN Performance Over Wireless Links Using Interest Bundling. 432-437 - Philipp Moll, Varun Patil, Lixia Zhang, Davide Pesavento:
Resilient Brokerless Publish-Subscribe over NDN. 438-444 - Hicham Khalifé, Raphaël Naves, Didier Thebault, Vania Conan:
Optimized NDN Forwarding in Tactical Networks with Asymmetric Radio Links. 445-450 - Vikram Kanth, Chad A. Bollmann, Murali Tummala, John C. McEachen:
A Novel Adaptable Framework for Covert Communications in Anonymized Protocols. 451-457 - Xinyuan Wang:
On the Feasibility of Detecting Software Supply Chain Attacks. 458-463 - Johan Sigholm, Emil Larsson:
Cyber Vulnerability Implantation Revisited. 464-469 - Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala:
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform. 470-476 - Suzanna LaMar, Jordan J. Gosselin, Ivan Cáceres, Sarah Kapple, Anura P. Jayasumana:
Congestion Aware Intent-Based Routing using Graph Neural Networks for Improved Quality of Experience in Heterogeneous Networks. 477-481 - Paul J. Nicholas, Karla L. Hoffman, Caleb P. Frey:
Analysis of Time-Sensitive MANET Channel Allocation in Contested Environments. 482-488 - Anthony Castañares, Deepak K. Tosh, Charles A. Kamhoua:
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks. 489-494 - Michelle Sherman, Sihua Shao, Xiang Sun, Jun Zheng:
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach. 495-502 - Zheyu Chen, Kin K. Leung, Shiqiang Wang, Leandros Tassiulas, Kevin Chan:
Robust Solutions to Constrained Optimization Problems by LSTM Networks. 503-508 - Albert Williams, Don Towsley:
Optimizing Flows in Changing Tree-based Sensor Networks. 509-514 - Chanho Park, Jin-Hyun Ahn, Joonhyuk Kang:
Gradient Compression via Count-Sketch for Analog Federated Learning. 515-520 - Fan Liu, Tingting Zhang, Pan Cao:
Asynchronous Integration of Communication and Localization Systems Using IR-UWB Signals. 521-527 - Yuxiao Li, Santiago Mazuelas, Yuan Shen:
Deep GEM-Based Network for Weakly Supervised UWB Ranging Error Mitigation. 528-532 - Yuxiao Li, Santiago Mazuelas, Yuan Shen:
A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB Waveform. 533-537 - Carlos A. Gómez-Vega, Flavio Morselli, Moe Z. Win, Andrea Conti:
A Statistical Range Information Model with Application to UWB Localization. 538-543 - Farah Arabian, Michael Rice:
Polarization Combining and Equalization for Aeronautical Mobile Telemetry. 544-549 - Jae Y. Park, Florendo S. Encarnado, Christopher R. Flint, Keith H. Redwine:
Characterization and Modeling of Frequency-Selective Ship-to-Ship Channels. 550-555 - Mahmoud Badi, Dinesh Rajan, Joseph Camp:
Measurement-based Characterization of Human Body Impact on Ultra-low UAV-to-Ground Channels. 556-561 - Tianyuan Yu, Philipp Moll, Zhiyi Zhang, Alexander Afanasyev, Lixia Zhang:
Enabling Plug-n-Play in Named Data Networking. 562-569 - Zhiyi Zhang, Su Yong Won, Lixia Zhang:
Investigating the Design Space for Name Confidentiality in Named Data Networking. 570-576 - Jarilyn M. Hernández Jiménez, Hope Hong, Patrick Seipel:
Detection of Anomalous Zigbee Transmissions Using Machine Learning. 583-588 - Julio Galvan, Ashok Raja, Yanyan Li, Jiawei Yuan:
Sensor Data-Driven UAV Anomaly Detection using Deep Learning Approach. 589-594 - Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. 595-600 - S. Sruti, Chilaka Deepti, K. Giridhar:
Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO Radars. 601-606 - Danilo Erricolo, William Alberth:
Massive MIMO: review and a case for the 12 GHz band. 607-611 - William W. Howard, R. Michael Buehrer:
Multi-Target Localization Using Polarization Sensitive Arrays. 612-617 - Matthew R. Ziemann, John S. Hyatt, Michael S. Lee:
Convolutional Neural Networks for Radio Frequency Ray Tracing. 618-622 - Richard Buckley, William N. Furman:
Application of Machine Learning Techniques to HF Propagation Prediction. 623-628 - Kyoung-Min Park, Eunji Lee, Jinwook Kim, Jaehoon Jung, Seong-Cheol Kim:
Ray-tracing based Channel Modeling for Rough-boundary Environments. 629-634 - Angela Marino, Augusto Aubry, Antonio De Maio, Paolo Braca, Domenico Gaglione, Peter Willett:
Constrained Target Localization for Multiplatform Radar Systems. 635-640 - Mattia Brambilla, Giovanni Soldi, Domenico Gaglione, Leonardo Maria Millefiori, Monica Nicoli, Paolo Braca, Peter Willett, Moe Z. Win:
Sensors Localization and Target Tracking in Underwater Environment via Belief Propagation. 641-646 - Yi Xiang, Laurence B. Milstein:
Design of an ultra-low power MFSK system in the presence of jamming. 652-657 - Brandon T. Hunt, David B. Haab, Thomas Cameron Sego, Tom V. Holschuh, Hussein Moradi, Behrouz Farhang-Boroujeny:
Examining the Performance of Walsh-DSSS Against FBMC-SS in HF Channels. 658-663 - Tarun S. Cousik, Vijay K. Shah, Jeffrey H. Reed, Tugba Erpek, Yalin E. Sagduyu:
Fast Initial Access with Deep Learning for Beam Prediction in 5G mmWave Networks. 664-669 - Tarak Arbi, Benoit Geller, Oudomsack Pierre Pasquero:
Direct-Sequence Spread Spectrum with Signal Space Diversity for High Resistance to Jamming. 670-676 - Mauro Tortonesi, Maggie R. Breedy, Lorenzo Campioni, Eelco Cramer, Anders Hansson, Alessandro Morelli, Jan Nilsson, Markus Peuhkuri, Niranjan Suri:
Evaluating the Impact of Jamming on Group Communication Protocols in Tactical Environments. 677-683 - Lorenzo Rosa, Weijia Song, Luca Foschini, Antonio Corradi, Ken Birman:
DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical Applications. 684-689 - Brent Kraczek, Nicholas Woolsey:
Geometry-Informed Transmission Strength Scaling in Barrage Relay Networks. 690-695 - Arwid Komulainen, Jimmi Grönkvist, Ulf Sterner:
Multi-Channel Cooperative Broadcast for Narrowband Tactical Networks. 696-702 - Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Tejaswi Nanjundaswamy, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath:
OMD: Orthogonal Malware Detection using Audio, Image, and Static Features. 703-708 - Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath:
HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical Analysis. 709-714 - Michael Vai, David Whelihan, Kyle Denney, Robert Lychev, Jeffrey J. Hughes, Donato Kava, Alice Lee, Nick Evancich, Richard Clark, David Lide, Kyung Joon Kwak, Jason H. Li, Douglas Schafer, Michael Lynch, Kyle Tillotson, Wladimir Tirenin:
Agile and Resilient Embedded Systems. 715-720 - Ru Xie, Liming Wang, Xiaojie Tao:
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification. 721-726 - George F. Elmasry, Paul Corwin:
Operational Views of Vertical Tactical 5G. 727-732 - George F. Elmasry, Paul Corwin:
Hiding the RF Signal Signature in Tactical 5G. 733-738 - Rob Smith, Connor Freeberg, Travis Machacek, Venkatesh Ramaswamy:
An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite Systems. 739-744 - Anthony Gabrielson, Kevin Bauer, Devin Kelly, Adam Kearns, W. Mark Smith:
CUE: A Standalone Testbed for 5G Experimentation. 745-750 - Hans den Boer, Robert W. D. Muller, Stephan Wong, Vincent Voogt:
FPGA-based Deep Learning Accelerator for RF Applications. 751-756 - Samuel R. Shebert, Anthony F. Martone, R. Michael Buehrer:
Open Set Wireless Standard Classification Using Convolutional Neural Networks. 757-762 - Aisha Robinson, Thomas Kunz:
Downlink Scheduling in LTE with Deep Reinforcement Learning, LSTMs and Pointers. 763-770 - Mine Gokce Dogan, Yahya H. Ezzeldin, Christina Fragouli, Addison W. Bohannon:
A Reinforcement Learning Approach for Scheduling in mmWave Networks. 771-776 - Dongxin Liu, Peng Wang, Tianshi Wang, Tarek F. Abdelzaher:
Self-Contrastive Learning based Semi-Supervised Radio Modulation Classification. 777-782 - Mohamed K. M. Fadul, Donald R. Reising, K. T. Arasu, Michael R. Clark:
Adversarial Machine Learning for Enhanced Spread Spectrum Communications. 783-788 - Jonathan Bunton, Tzanis Anevlavis, Gunjan Verma, Christina Fragouli, Paulo Tabuada:
Split to win: near-optimal sensor network synthesis via path-greedy subproblems. 789-794 - Augustin-Alexandru Saucan, Subhro Das, Moe Z. Win:
On Multisensor Activation Policies for Bernoulli Tracking. 795-801 - Paulo Montezuma, Ricardo Madeira, Hugo Serra, Pedro Viegas, Rui Dinis, João Pedro Oliveira, João Guerreiro:
Quantized Digital Amplification with combination over the air - Achieving maximum efficiency on communication links between long range UAVs and satellites. 802-807 - Robert Melville, Stephen Hamilton:
Silent Tuning: Matching a transmitter to an antenna without emitting a signal. 808-812 - Paul J. Draxler, Anjali Sharma, Dane Malangone, Donald E. Cowles, Eric Brown, Jonmei J. Yan:
Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power Amplifiers. 813-817 - A. F. M. Saniul Haq, Murat Yuksel:
Defocal Lens Assembly for Multi-Element Full-Duplex Free Space Optical Transceiver. 818-823 - Clement Kam, Joseph P. Macker, Caleb Bowers, Sastry Kompella:
Ad Hoc Networking Under Limitations on Sum Power Interference to an External Node. 830-835 - Paulo H. L. Rettore, Merlin von Rechenberg, Johannes F. Loevenich, Roberto Rigolin Ferreira Lopes, Peter Sevenich:
A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive Scenarios. 836-842 - Jaime C. Acosta, Stephanie Medina, Jason Ellis, Luisana Clarke, Veronica Rivas, Allison Newcomb:
Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation. 849-854 - Erik J. Jorgensen, Frank T. Werner, Milos Prvulovic, Alenka G. Zajic:
A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms. 855-860 - Enass Hriba, Matthew C. Valenti, Robert W. Heath Jr.:
Optimization of a Millimeter-Wave UAV-to-Ground Network in Urban Deployments. 861-867 - C. Ramanathan, C. R. Venkatesh, K. Giridhar:
Mitigating blockage of transmission and reception due to rotor blades in air-to-air data link using single-carrier block modulation. 868-873 - Sridhar Venkatesan, Harshvardhan Sikka, Rauf Izmailov, Ritu Chadha, Alina Oprea, Michael J. De Lucia:
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems. 874-879 - Rauf Izmailov, Peter Lin, Sridhar Venkatesan, Shridatt Sugrim:
Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks. 880-885 - Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel:
HoneyModels: Machine Learning Honeypots. 886-891 - Shiwei Fang, Jin Huang, Colin Samplawski, Deepak Ganesan, Benjamin M. Marlin, Tarek F. Abdelzaher, Maggie B. Wigness:
Optimizing Intelligent Edge-clouds with Partitioning, Compression and Speculative Inference. 892-896 - Colin Samplawski, Benjamin M. Marlin:
Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking Study. 898-903 - Jinyang Li, Runyu Ma, Vikram Sharma Mailthody, Colin Samplawski, Benjamin M. Marlin, Songqing Chen, Shuochao Yao, Tarek F. Abdelzaher:
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs. 904-909 - Yingbo Hua:
Anti-Eavesdropping Channel Estimation Using Multi-Antenna Half-Duplex Radios. 910-915 - James Norris, John Nieto:
Application of Sub-Sample Dithering to Reduce Probability of Signal Detection. 916-920 - Yuchen Zhang, Sa Xiao, Jianquan Wang, Xiaojun Yuan, Wanbin Tang:
Covert Communications under Multiple-Antenna Eavesdropping without Channel State Information. 921-926 - Jithin Jagannath, Anu Jagannath, Justin Henney, Noor Biswas, Tyler Gwin, Zackary Kane, Andrew L. Drozd:
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here! 927-932 - Rafael G. L. D'Oliveira, Alejandro Cohen, John Robinson, Thomas Stahlbuhk, Muriel Médard:
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks. 933-938 - Bertram Schütz, Stefanie Thieme, Christoph Fuchs, Daniel Weber, Nils Aschenbruck:
Network Coding-based Multi-Path Forward Erasure Correction for Tactical Scenarios. 939-944 - Xavier Leturc, Elie Janin, Christophe J. Le Martret:
Distributed Dynamic Channel Assignment in Military Ad Hoc Networks within the MAENA Project: New Algorithm and High Fidelity Simulation Results. 945-950 - Xingjian Sun, Lei Cao, Ramanarayanan Viswanathan:
Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection Networks. 951-956 - Ioannis Dagres, Andreas Polydoros, Aris L. Moustakas:
Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler spread. 957-962 - Charles E. Thornton, R. Michael Buehrer, Anthony F. Martone:
Waveform Selection for Radar Tracking in Target Channels With Memory via Universal Learning. 963-968 - Donald L. Hall, David M. Jenkins:
Conditional Rician $K$-Factor Discrimination for Indoor Localization via AOA Estimation. 969-974 - Nizar Tayem, Ahmed A. Hussain, Vinay Reddy Veramareddy, Abdel-Hamid Soliman, Jaafar M. Alghazo:
Propagator Rooting Method Direction of Arrival Estimation Based on Real Data. 975-980 - Rauf Izmailov, Peter Lin, Chris Mesterharm, Samyadeep Basu:
Privacy Leakage Avoidance with Switching Ensembles. 981-986 - Wenhan Zhang, Marwan Krunz, Gregory Ditzler:
Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared Spectrum. 987-992 - Peter Martin, Jian Fan, Taejin Kim, W. Konrad Vesey, Lloyd G. Greenwald:
Toward Effective Moving Target Defense Against Adversarial AI. 993-998 - Sunitha Safavat, Danda B. Rawat:
Securing Unmanned Aerial Vehicular Networks Using Modified Elliptic Curve Cryptography. 999-1004 - Ahmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua:
Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems. 1005-1010 - Kevin Talty, John Stockdale, Nathaniel D. Bastian:
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models. 1011-1016
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.