Abstract is missing.
- Using NDN and P4 For Effective Traffic Management in Tactical NetworksM. Tamer Refaei, Sean Ha, Robbie Starr, Matt Steele. 1-6 [doi]
- Wireless Network Topology Control: Adjustable Resiliency and Network Traffic DeliveryJoseph P. Macker, Caleb Bowers, Sastry Kompella, Clement Kam, Jeffery W. Weston. 1-6 [doi]
- WannaCry Data Collection System Design and TutorialDarren Rogers, Vikram Kanth. 1-6 [doi]
- Spark Optimization of Linear Codes for Reliable Data Delivery by Relay DronesIoannis Chatzigeorgiou. 1-6 [doi]
- Mitigating Blind Detection Through Protograph Based Interleaving for Turbo CodesStefan Weithoffer, Rami Klaimi, Charbel Abdel Nour. 7-12 [doi]
- Optimal Signaling Schemes of 2- User Gaussian Mixture Multiple-Access Channels with 1-bit ADCMd Hasan Rahman, Mohammad Ranjbar, Nghi H. Tran, Khanh Pham. 13-18 [doi]
- Low-Rate FEC for $M$-ary Orthogonal ModulationFrederick J. Block. 19-24 [doi]
- Wireless Resilient Routing ReconfigurationBrian DeCleene, Steve Huntsman. 25-30 [doi]
- DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic NetworksSaeed Kaviani, Bo Ryu, Ejaz Ahmed, Kevin A. Larson, Anh Le, Alex Yahja, Jae H. Kim. 31-36 [doi]
- Joint AP Probing and Scheduling: A Contextual Bandit ApproachTianyi Xu, Ding Zhang, Parth H. Pathak, Zizhan Zheng. 37-42 [doi]
- QoS Extension to a B.A.T.M.A.N. based LoRa Mesh NetworkFrederick M. Chache, Sean Maxon, Ram M. Narayanan, Ramesh Bharadwaj. 43-48 [doi]
- Solving the Cross Domain Problem with Functional EncryptionAlan Kaminsky, Michael T. Kurdziel, Steven Farris, Marcin Lukowiak, Stanislaw P. Radziszowski. 49-54 [doi]
- Using Distributed Ledgers For Command and Control - Concepts and ChallengesDavid Last, Michael Atighetchi, Partha Pal, Ryan Toner. 55-60 [doi]
- vCDS: A Virtualized Cross Domain Solution ArchitectureNathan Daughety, Marcus Pendleton, Shouhuai Xu, Laurent Njilla, John Franco. 61-68 [doi]
- Integrating Cybersecurity Into a Big Data EcosystemAnne M. Tall, Cliff C. Zou, Jun Wang. 69-76 [doi]
- Margin and Availability in Transponded SATCOMRoy Axford. 77-84 [doi]
- SATCOM Jamming Resiliency under Non-Uniform Probability of AttacksLan K. Nguyen, Duy H. N. Nguyen, Nghi H. Tran, Clayton Bosler, David Brunnenmeyer. 85-90 [doi]
- Flexible Network Interface (FNI): A Mission-centric Integration Framework for Next Generation DoD SATCOM NetworksJoseph Vanderpoorten, James Lyke, David Brunnenmeyer, Kevin Zhang, Don Fronterhouse, Joseph Kidder, Jeffrey Laing. 91-95 [doi]
- Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter IdentificationSilvija Kokalj-Filipovic, Paul Toliver, William Johnson, Rob Miller. 96-101 [doi]
- Tactical Jupiter: Dynamic Scheduling of Dispersed Computations in Tactical MANETsAlexander Poylisher, Andrzej Cichocki, K. Guo, J. Hunziker, Latha A. Kant, Bhaskar Krishnamachari, Salman Avestimehr, Murali Annavaram. 102-107 [doi]
- TAK-ML: Applying Machine Learning at the Tactical EdgePeter Chin, Emily Do, Cody Doucette, Brandon Kalashian, David Last, Nathan Lenz, Edward Lu, Devon Minor, Elias Noyes, Colleen T. Rock, Nathaniel Soule, Nicholas Walczak, Dave Canestrare. 108-114 [doi]
- ACE: An ATAK Plugin for Enhanced Acoustic Situational Awareness at the EdgeDavid Nieves-Acaron, Benjamin Luchterhand, Akshay Aravamudan, David Elliott, Steven Wyatt, Carlos E. Otero, Luis Daniel Otero, Anthony O. Smith, Adrian M. Peter, Wesley Jones, Eric Lam. 115-120 [doi]
- Analysis of the Average Sampling Frequency for Level Crossing Analog-to-Digital ConvertersMengkun Ji, Keith M. Chugg. 121-126 [doi]
- Synchronization Steps for Low Complexity Chirp Spread Spectrum (CSS) ReceiversXiaofei Chen, Elettra Venosa, Fredric J. Harris. 127-132 [doi]
- Wideband Auto-Ambiguity Function Nulling AlgorithmNathaniel A. Henry, John F. Doherty, David M. Jenkins. 133-138 [doi]
- Phase Noise Time Series ModelJonathon Cheah. 139-144 [doi]
- Capacity Bounds for Frequency-Hopped BPSKFrederick J. Block. 145-150 [doi]
- Over-the-Air Testing of Impulsive Frequency Shift Keying ModulationKathleen Yang, Jonathan Gluck, Daniel Perkins, Richard K. Ridgway, Muriel Médard. 151-156 [doi]
- Optimal Pilot Sequences for Phase and Timing Synchronization in FTN SystemsLeila Mounsif, Damien Roque, Charly Poulliat. 157-161 [doi]
- Unifying Address and Name Based Communication in Wireless Medium Access ControlMohammed Elbadry, Fan Ye 0003, Peter A. Milder. 162-168 [doi]
- The Design and Validation of ICN-Enabled Hybrid Unmanned Aerial SystemManveen Kaur, Rahul Amin, Jim Martin 0001. 169-174 [doi]
- Multicast Enhancements to Event-Driven Tactical NetworkingCaleb Bowers, Joseph P. Macker, Jeffery W. Weston, Brian Adamson. 175-180 [doi]
- Preventing Machine Learning Poisoning Attacks Using Authentication and ProvenanceJack W. Stokes, Paul England, Kevin Kane. 181-188 [doi]
- Beyond $L_{p}$ Norms: Delving Deeper into Robustness to Physical Image TransformationsVikash Sehwag, Jack W. Stokes, Cha Zhang. 189-196 [doi]
- URLTran: Improving Phishing URL Detection Using TransformersPranav Maneriker, Jack W. Stokes, Edir Garcia Lazo, Diana Carutasu, Farid Tajaddodianfar, Arun Gururajan. 197-204 [doi]
- Migration of DOD SATCOM Earth Segment Architectures to Digital IFRobert E. Anderson, Albert P. Berg, James R. Carter, Dana DeFrancesco, Ronald W. Elliott, Jessica L. Gregris, Donald W. Hershberger, William Y. Joo, Dahesh A. Khalil, Jeremy R. Kozee, Philip C. Minor, Pamela A. Phillips, A. J. Vigil. 205-212 [doi]
- An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM LinksKenneth Pittner, Daniel Lukaszewski, Geoffrey G. Xie. 213-218 [doi]
- Airborne Beyond Line of Sight Communication NetworksMichael A. Rupar, Erlend Larsen, H. Bugra Saglam, Ruben Bascuñana Blasco, Julian A. Savin, Nadine Brück. 219-224 [doi]
- Towards a COTS-Enabled Federated Cloud Architecture for Adaptive C2 in Coalition Tactical Operations: A Performance Analysis of KubernetesMattia Fogli, Geert Pingen, Thomas Kudla, Sean Webb, Niranjan Suri, Harrie Bastiaansen. 225-230 [doi]
- Concepts and Directions for Future IoT and C2 InteroperabilityManas Pradhan, Marco Manso, James R. Michaelis. 231-236 [doi]
- Resource Management in Software Defined Coalitions (SDC) through SlicingAthanasios Gkelias, Nitish K. Panigrahy, Mohammad Mobayenjarihani, Kin K. Leung, Don Towsley, Patrick J. Baker, Olwen Worthington, Laurence Fowkes. 237-242 [doi]
- Constrained Resource Allocation Problems in Communications: An Information-assisted ApproachI. Zakir Ahmed, Hamid R. Sadjadpour, Shahram Yousefi. 243-248 [doi]
- A Novel Approach to Characterize Aggregate Interference from LTE-Based Cellular DeploymentsAshton Knight, Venkatesh Ramaswamy, Jeffrey T. Correia, Darcy Swain-Walsh, Jerediah R. Fevold, Shawn Lefebre, Howard McDonald, Anthony Rennier, Mike DiFrancisco. 249-254 [doi]
- Novel RF Spectrum Characterization Using Information MeasuresJohn J. Kelly, Daniel L. Stevens. 255-260 [doi]
- Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted MIMOME Wiretap ChannelsAnshu Mukherjee, Vaibhav Kumar, Le-Nam Tran. 261-266 [doi]
- Joint Beamforming Design for LOS MIMO Systems with Multiple Intelligent Reflecting SurfacesJoongsub Choi, Girim Kwon, Hyuncheol Park. 267-272 [doi]
- ML-aided power allocation for Tactical MIMOArindam Chowdhury, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra. 273-278 [doi]
- On Alamouti-Encoded 16-APSK in Aeronautical Mobile TelemetryAutumn Twitchell, Michael Rice. 279-284 [doi]
- On Wireless Link Connectivity for Resilient Multi-Hop NetworksGautam Trivedi, Bijan Jabbari. 285-290 [doi]
- RF-based Network Inference: Theoretical FoundationsShorya Consul, Hasan Burhan Beytur, Gustavo de Veciana, Haris Vikalo. 291-296 [doi]
- Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT DevicesShakil Ahmed, Ahmed E. Kamal 0001, Mohamed Y. Selim. 297-302 [doi]
- The Role of AoI in a Cognitive Radio Network: Lyapunov Optimization and TradeoffsClement Kam, Sastry Kompella, Anthony Ephremides. 303-308 [doi]
- CloudImmu: Transparent Protection of Binary Applications in the CloudXinyuan Wang. 309-315 [doi]
- Security Threats Analysis of the Unmanned Aerial Vehicle SystemRune Hylsberg Jacobsen, Ali Marandi. 316-322 [doi]
- A Study on Security Analysis of the Unlinkability in TorJing Tian, Gaopeng Gou, Yangyang Guan, Wei Xia, Gang Xiong 0001, Chang Liu 0049. 323-328 [doi]
- SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS CloudXiaojie Tao, Liming Wang, Zhen Xu, Ru Xie. 329-334 [doi]
- Methodologies for Spectrum Sharing for a Network of Land-ESIMs with Stations in the Mobile ServiceVijitha Weerackody, Enrique Cuevas. 335-340 [doi]
- Improved Propagation Modeling for Non-Terrestrial NetworksRobert Murawski, Steven C. Bretmersky, Wesley Eddy, Eylem Ekici, Albert Becker, Jonathan D. Ashdown, Kurt A. Turck. 341-346 [doi]
- Software Acoustic Modem for TAK Communications with Analog Radios at the Tactical EdgeNathaniel Soule, Brandon Kalashian, Colleen T. Rock, Landon Tomcho. 347-353 [doi]
- All-domain Spectrum Command and Control via Hierarchical Dynamic Spectrum Sharing with Implemented Dynamic Spectrum Access ToolchainTimothy Woods, Sean Furman, Christopher Maracchion, Andrew L. Drozd, Fred Frantz, Jonathan Ashdown. 354-359 [doi]
- Distributed Network Experimentation in the NATO CWIX 2021 Communications Focus AreaChristoph Barz, Jonathan Kirchhoff, Julia Niewiejska, Maximilian Prahl-Kamps, Ioannis Stavrou, Elias Werberich. 360-365 [doi]
- Adopting a dynamic spectrum management philosophy in NATOPaul Flavell, Paul Adams, Germano Capela, Luis Bastos. 366-371 [doi]
- Protected core networking: communications challenges in tactical environmentsEduardo Bolas, Germano Capela, Luis Bastos. 372-377 [doi]
- Direct-Sequence Spread-Spectrum Acquisition for High Dynamic Environments via Signal PartitioningDerrick A. Chu, John R. Barry. 378-383 [doi]
- Quantifying Dataset Quality in Radio Frequency Machine LearningWilliam H. Clark, Alan J. Michaels. 384-389 [doi]
- Complementary Sequence Construction for Constant-Envelope OFDM Transmission Enabling Nonlinear Amplification and ClippingKyle Willstatter, Michael D. Zoltowski. 390-395 [doi]
- Pulsed Signal Detection Utilizing Wavelet Analysis with a Deep Learning ApproachDaniel Green, Murali Tummala, John McEachen. 396-401 [doi]
- Indoor 90 GHz Channel Measurement Results for LOS to NLOS TransitionsZeenat Afroze, Mohanad Mohsen, David W. Matolak, Hudson Dye. 402-407 [doi]
- Terrain-Scatter Augmented Vertical Plane Model for Radio Path Loss Estimation in Complex Terrain: (Invited Paper)Daniel J. Breton, Caitlin E. Haedrich. 408-413 [doi]
- A Study of Clustering Algorithms for Time-Varying Multipath Components in Wireless ChannelsGuiqi Sun, Chen Huang, Zihang Cheng, Ruisi He, Bo Ai 0001, Andreas F. Molisch. 414-419 [doi]
- Improving Propagation Model Predictions via Machine Learning with Engineered FeaturesAnn C. Vanleer, Christopher R. Anderson. 420-425 [doi]
- BBR-Inspired Congestion Control for Data Fetching over NDNYi Hu, Constantin Serban, Lan Wang, Alexander Afanasyev, Lixia Zhang 0001. 426-431 [doi]
- BLEnD: Improving NDN Performance Over Wireless Links Using Interest BundlingMd Ashiqur Rahman, Teng Liang, Beichuan Zhang. 432-437 [doi]
- Resilient Brokerless Publish-Subscribe over NDNPhilipp Moll, Varun Patil, Lixia Zhang 0001, Davide Pesavento. 438-444 [doi]
- Optimized NDN Forwarding in Tactical Networks with Asymmetric Radio LinksHicham Khalifé, Raphaël Naves, Didier Thebault, Vania Conan. 445-450 [doi]
- A Novel Adaptable Framework for Covert Communications in Anonymized ProtocolsVikram Kanth, Chad A. Bollmann, Murali Tummala, John C. McEachen. 451-457 [doi]
- On the Feasibility of Detecting Software Supply Chain AttacksXinyuan Wang. 458-463 [doi]
- Cyber Vulnerability Implantation RevisitedJohan Sigholm, Emil Larsson. 464-469 [doi]
- Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance PlatformEranga Bandara, Sachin Shetty, Abdul-Rahman, Ravi Mukkamala. 470-476 [doi]
- Congestion Aware Intent-Based Routing using Graph Neural Networks for Improved Quality of Experience in Heterogeneous NetworksSuzanna LaMar, Jordan J. Gosselin, Ivan Caceres, Sarah Kapple, Anura P. Jayasumana. 477-481 [doi]
- Analysis of Time-Sensitive MANET Channel Allocation in Contested EnvironmentsPaul J. Nicholas, Karla L. Hoffman, Caleb P. Frey. 482-488 [doi]
- Slice Aware Framework for Intelligent and Reconfigurable Battlefield NetworksAnthony Castañares, Deepak K. Tosh, Charles A. Kamhoua. 489-494 [doi]
- UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning ApproachMichelle Sherman, Sihua Shao, Xiang Sun 0001, Jun Zheng. 495-502 [doi]
- Robust Solutions to Constrained Optimization Problems by LSTM NetworksZheyu Chen, Kin K. Leung, Shiqiang Wang 0001, Leandros Tassiulas, Kevin Chan 0001. 503-508 [doi]
- Optimizing Flows in Changing Tree-based Sensor NetworksAlbert Williams, Don Towsley. 509-514 [doi]
- Gradient Compression via Count-Sketch for Analog Federated LearningChanho Park, Jin-Hyun Ahn, Joonhyuk Kang. 515-520 [doi]
- Asynchronous Integration of Communication and Localization Systems Using IR-UWB SignalsFan Liu, Tingting Zhang, Pan Cao. 521-527 [doi]
- Deep GEM-Based Network for Weakly Supervised UWB Ranging Error MitigationYuxiao Li, Santiago Mazuelas, Yuan Shen 0001. 528-532 [doi]
- A Semi-Supervised Learning Approach for Ranging Error Mitigation Based on UWB WaveformYuxiao Li, Santiago Mazuelas, Yuan Shen 0001. 533-537 [doi]
- A Statistical Range Information Model with Application to UWB LocalizationCarlos A. Gomez-Vega, Flavio Morselli, Moe Z. Win, Andrea Conti. 538-543 [doi]
- Polarization Combining and Equalization for Aeronautical Mobile TelemetryFarah Arabian, Michael Rice. 544-549 [doi]
- Characterization and Modeling of Frequency-Selective Ship-to-Ship ChannelsJae Y. Park, Florendo S. Encarnado, Christopher R. Flint, Keith H. Redwine. 550-555 [doi]
- Measurement-based Characterization of Human Body Impact on Ultra-low UAV-to-Ground ChannelsMahmoud Badi, Dinesh Rajan, Joseph Camp. 556-561 [doi]
- Enabling Plug-n-Play in Named Data NetworkingTianyuan Yu, Philipp Moll, Zhiyi Zhang, Alexander Afanasyev, Lixia Zhang 0001. 562-569 [doi]
- Investigating the Design Space for Name Confidentiality in Named Data NetworkingZhiyi Zhang, Su Yong Won, Lixia Zhang 0001. 570-576 [doi]
- Detection of Anomalous Zigbee Transmissions Using Machine LearningJarilyn M. Hernández Jiménez, Hope Hong, Patrick Seipel. 583-588 [doi]
- Sensor Data-Driven UAV Anomaly Detection using Deep Learning ApproachJulio Galvan, Ashok Raja, Yanyan Li, Jiawei Yuan. 589-594 [doi]
- PatchRNN: A Deep Learning-Based System for Security Patch IdentificationXinda Wang, Shu Wang, Pengbin Feng, Kun Sun 0001, Sushil Jajodia, Sanae Benchaaboun, Frank Geck. 595-600 [doi]
- Non-Parametric and Geometric Multi-Target Data Association for Distributed MIMO RadarsS. Sruti, Chilaka Deepti, K. Giridhar. 601-606 [doi]
- Massive MIMO: review and a case for the 12 GHz bandDanilo Erricolo, William Alberth. 607-611 [doi]
- Multi-Target Localization Using Polarization Sensitive ArraysWilliam W. Howard, R. Michael Buehrer. 612-617 [doi]
- Convolutional Neural Networks for Radio Frequency Ray TracingMatthew R. Ziemann, John S. Hyatt, Michael S. Lee. 618-622 [doi]
- Application of Machine Learning Techniques to HF Propagation PredictionRichard Buckley, William N. Furman. 623-628 [doi]
- Ray-tracing based Channel Modeling for Rough-boundary EnvironmentsKyoung-Min Park, Eunji Lee, Jinwook Kim, Jaehoon Jung, Seong-Cheol Kim. 629-634 [doi]
- Constrained Target Localization for Multiplatform Radar SystemsAngela Marino, Augusto Aubry, Antonio De Maio, Paolo Braca, Domenico Gaglione, Peter Willett 0001. 635-640 [doi]
- Sensors Localization and Target Tracking in Underwater Environment via Belief PropagationMattia Brambilla, Giovanni Soldi, Domenico Gaglione, Leonardo Maria Millefiori, Monica Nicoli, Paolo Braca, Peter Willett 0001, Moe Z. Win. 641-646 [doi]
- Doppler Stretch Estimation with Application to Tracking Globalstar Satellite SignalsMohammad Neinavaie, Joe Khalife, Zaher M. Kassas. 647-651 [doi]
- Design of an ultra-low power MFSK system in the presence of jammingYi Xiang, Laurence B. Milstein. 652-657 [doi]
- Examining the Performance of Walsh-DSSS Against FBMC-SS in HF ChannelsBrandon T. Hunt, David B. Haab, Thomas Cameron Sego, Tom Holschuh, Hussein Moradi, Behrouz Farhang-Boroujeny. 658-663 [doi]
- Fast Initial Access with Deep Learning for Beam Prediction in 5G mmWave NetworksTarun S. Cousik, Vijay K. Shah, Jeffrey H. Reed, Tugba Erpek, Yalin E. Sagduyu. 664-669 [doi]
- Direct-Sequence Spread Spectrum with Signal Space Diversity for High Resistance to JammingTarak Arbi, Benoit Geller, Oudomsack Pierre Pasquero. 670-676 [doi]
- Evaluating the Impact of Jamming on Group Communication Protocols in Tactical EnvironmentsMauro Tortonesi, Maggie R. Breedy, Lorenzo Campioni, Eelco Cramer, Anders Hansson, Alessandro Morelli, Jan Nilsson, Markus Peuhkuri, Niranjan Suri. 677-683 [doi]
- DerechoDDS: Strongly Consistent Data Distribution for Mission-Critical ApplicationsLorenzo Rosa, Weijia Song, Luca Foschini 0001, Antonio Corradi, Ken Birman. 684-689 [doi]
- Geometry-Informed Transmission Strength Scaling in Barrage Relay NetworksBrent Kraczek, Nicholas Woolsey. 690-695 [doi]
- Multi-Channel Cooperative Broadcast for Narrowband Tactical NetworksArwid Komulainen, Jimmi Grönkvist, Ulf Sterner. 696-702 [doi]
- OMD: Orthogonal Malware Detection using Audio, Image, and Static FeaturesLakshmanan Nataraj, Tajuddin Manhar Mohammed, Tejaswi Nanjundaswamy, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath. 703-708 [doi]
- HAPSSA: Holistic Approach to PDF malware detection using Signal and Statistical AnalysisTajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath. 709-714 [doi]
- Agile and Resilient Embedded SystemsMichael Vai, David Whelihan, Kyle Denney, Robert Lychev, Jeffrey J. Hughes, Donato Kava, Alice Lee, Nick Evancich, Richard Clark, David Lide, Kyung Joon Kwak, Jason H. Li, Douglas Schafer, Michael Lynch, Kyle Tillotson, Wladimir Tirenin. 715-720 [doi]
- A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly IdentificationRu Xie, Liming Wang, Xiaojie Tao. 721-726 [doi]
- Operational Views of Vertical Tactical 5GGeorge F. Elmasry, Paul Corwin. 727-732 [doi]
- Hiding the RF Signal Signature in Tactical 5GGeorge F. Elmasry, Paul Corwin. 733-738 [doi]
- An O-RAN Approach to Spectrum Sharing Between Commercial 5G and Government Satellite SystemsRob Smith, Connor Freeberg, Travis Machacek, Venkatesh Ramaswamy. 739-744 [doi]
- CUE: A Standalone Testbed for 5G ExperimentationAnthony Gabrielson, Kevin Bauer, Devin Kelly, Adam Kearns, W. Mark Smith. 745-750 [doi]
- FPGA-based Deep Learning Accelerator for RF ApplicationsH. den Boer, R. W. D. Muller, S. Wong, V. Voogt. 751-756 [doi]
- Open Set Wireless Standard Classification Using Convolutional Neural NetworksSamuel R. Shebert, Anthony F. Martone, R. Michael Buehrer. 757-762 [doi]
- Downlink Scheduling in LTE with Deep Reinforcement Learning, LSTMs and PointersAisha Robinson, Thomas Kunz. 763-770 [doi]
- A Reinforcement Learning Approach for Scheduling in mmWave NetworksMine Gokce Dogan, Yahya H. Ezzeldin, Christina Fragouli, Addison W. Bohannon. 771-776 [doi]
- Self-Contrastive Learning based Semi-Supervised Radio Modulation ClassificationDongxin Liu, Peng Wang, Tianshi Wang, Tarek F. Abdelzaher. 777-782 [doi]
- Adversarial Machine Learning for Enhanced Spread Spectrum CommunicationsMohamed K. M. Fadul, Donald R. Reising, K. T. Arasu 0001, Michael R. Clark. 783-788 [doi]
- Split to win: near-optimal sensor network synthesis via path-greedy subproblemsJonathan Bunton, Tzanis Anevlavis, Gunjan Verma, Christina Fragouli, Paulo Tabuada. 789-794 [doi]
- On Multisensor Activation Policies for Bernoulli TrackingAugustin-Alexandru Saucan, Subhro Das, Moe Z. Win. 795-801 [doi]
- Quantized Digital Amplification with combination over the air - Achieving maximum efficiency on communication links between long range UAVs and satellitesPaulo Montezuma, Ricardo Madeira, Hugo Serra, Pedro Viegas, Rui Dinis 0001, João Pedro Oliveira 0003, João Guerreiro 0001. 802-807 [doi]
- Silent Tuning: Matching a transmitter to an antenna without emitting a signalRobert Melville, Stephen Hamilton. 808-812 [doi]
- Computationally Efficient 2-D Predistortion for Multi-Carrier Envelope Tracking Power AmplifiersPaul J. Draxler, Anjali Sharma, Dane Malangone, Donald E. Cowles, Eric Brown, Jonmei J. Yan. 813-817 [doi]
- Defocal Lens Assembly for Multi-Element Full-Duplex Free Space Optical TransceiverA. F. M. Saniul Haq, Murat Yuksel. 818-823 [doi]
- Ad Hoc Networking Under Limitations on Sum Power Interference to an External NodeClement Kam, Joseph P. Macker, Caleb Bowers, Sastry Kompella. 830-835 [doi]
- A Handover Mechanism for Centralized/Decentralized Networks Over Disruptive ScenariosPaulo H. L. Rettore, Merlin von Rechenberg, Johannes F. Loevenich, Roberto Rigolin Ferreira Lopes, Peter Sevenich. 836-842 [doi]
- Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule GenerationJaime C. Acosta, Stephanie Medina, Jason Ellis, Luisana Clarke, Veronica Rivas, Allison Newcomb. 849-854 [doi]
- A Hierarchical Subsequence Clustering Method for Tracking Program States in SpectrogramsErik J. Jorgensen, Frank T. Werner, Milos Prvulovic, Alenka G. Zajic. 855-860 [doi]
- Optimization of a Millimeter-Wave UAV-to-Ground Network in Urban DeploymentsEnass Hriba, Matthew C. Valenti, Robert W. Heath Jr.. 861-867 [doi]
- Mitigating blockage of transmission and reception due to rotor blades in air-to-air data link using single-carrier block modulationC. Ramanathan, C. R. Venkatesh, K. Giridhar 0001. 868-873 [doi]
- Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection SystemsSridhar Venkatesan, Harshvardhan Sikka, Rauf Izmailov, Ritu Chadha, Alina Oprea, Michael J. De Lucia. 874-879 [doi]
- Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion AttacksRauf Izmailov, Peter Lin, Sridhar Venkatesan, Shridatt Sugrim. 880-885 [doi]
- HoneyModels: Machine Learning HoneypotsAhmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler J. Shipp, Patrick D. McDaniel. 886-891 [doi]
- Optimizing Intelligent Edge-clouds with Partitioning, Compression and Speculative InferenceShiwei Fang, Jin Huang, Colin Samplawski, Deepak Ganesan, Benjamin M. Marlin, Tarek F. Abdelzaher, Maggie B. Wigness. 892-896 [doi]
- Towards Transformer-Based Real-Time Object Detection at the Edge: A Benchmarking StudyColin Samplawski, Benjamin M. Marlin. 898-903 [doi]
- Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUsJinyang Li 0004, Runyu Ma, Vikram Sharma Mailthody, Colin Samplawski, Benjamin M. Marlin, Songqing Chen, Shuochao Yao, Tarek F. Abdelzaher. 904-909 [doi]
- Anti-Eavesdropping Channel Estimation Using Multi-Antenna Half-Duplex RadiosYingbo Hua. 910-915 [doi]
- Application of Sub-Sample Dithering to Reduce Probability of Signal DetectionJames Norris, John Nieto. 916-920 [doi]
- Covert Communications under Multiple-Antenna Eavesdropping without Channel State InformationYuchen Zhang, Sa Xiao, Jianquan Wang, Xiaojun Yuan, Wanbin Tang. 921-926 [doi]
- Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here!Jithin Jagannath, Anu Jagannath, Justin Henney, Noor Biswas, Tyler Gwin, Zackary Kane, Andrew L. Drozd. 927-932 [doi]
- Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous NetworksRafael G. L. D'Oliveira, Alejandro Cohen, John Robinson, Thomas Stahlbuhk, Muriel Médard. 933-938 [doi]
- Network Coding-based Multi-Path Forward Erasure Correction for Tactical ScenariosBertram Schütz, Stefanie Thieme, Christoph Fuchs, Daniel Weber, Nils Aschenbruck. 939-944 [doi]
- Distributed Dynamic Channel Assignment in Military Ad Hoc Networks within the MAENA Project: New Algorithm and High Fidelity Simulation ResultsXavier Leturc, Elie Janin, Christophe J. Le Martret. 945-950 [doi]
- Detection Performance Comparison of Two-Sensor Parallel and Tandem Distributed Detection NetworksXingjian Sun, Lei Cao 0001, Ramanarayanan Viswanathan. 951-956 [doi]
- Performance Analysis of Distributed Beamforming in Wireless Networks: The Effect of Synchronization and Doppler spreadIoannis Dagres, Andreas Polydoros, Aris L. Moustakas. 957-962 [doi]
- Waveform Selection for Radar Tracking in Target Channels With Memory via Universal LearningCharles E. Thornton, R. Michael Buehrer, Anthony F. Martone. 963-968 [doi]
- Conditional Rician $K$-Factor Discrimination for Indoor Localization via AOA EstimationDonald L. Hall, David M. Jenkins. 969-974 [doi]
- Propagator Rooting Method Direction of Arrival Estimation Based on Real DataNizar Tayem, Ahmed A. Hussain, Vinay Reddy Veramareddy, Abdel-Hamid Soliman, Jaafar M. Alghazo. 975-980 [doi]
- Privacy Leakage Avoidance with Switching EnsemblesRauf Izmailov, Peter Lin, Chris Mesterharm, Samyadeep Basu. 981-986 [doi]
- Intelligent Jamming of Deep Neural Network Based Signal Classification for Shared SpectrumWenhan Zhang, Marwan Krunz, Gregory Ditzler. 987-992 [doi]
- Toward Effective Moving Target Defense Against Adversarial AIPeter Martin, Jian Fan, Taejin Kim, W. Konrad Vesey, Lloyd G. Greenwald. 993-998 [doi]
- Securing Unmanned Aerial Vehicular Networks Using Modified Elliptic Curve CryptographySunitha Safavat, Danda B. Rawat. 999-1004 [doi]
- Honeypot Allocation for Cyber Deception in Internet of Battlefield Things SystemsAhmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua. 1005-1010 [doi]
- A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning ModelsKevin Talty, John Stockdale, Nathaniel D. Bastian. 1011-1016 [doi]