Abstract is missing.
- Multi-Signal Classification Using Deep Learning and Sparse ArraysSamuel R. Shebert, Moeness G. Amin, Benjamin H. Kirk, R. Michael Buehrer. 1-6 [doi]
- Enhanced Multi-Way Time Transfer for High-Precision Time Synchronization among UASsDan Shen, Genshe Chen, Khanh D. Pham, Erik Blasch. 1-6 [doi]
- SCRIP: Safe and Cycle-Free Multi-Path RoutingJ. J. Garcia-Luna-Aceves, Bradley R. Smith, Judith T. Samson. 1-6 [doi]
- Adversarial Sybil attacks against Deep RL based drone trajectory planningAdhitya Bantwal Bhandarkar, Sudharman K. Jayaweera, Steven A. Lane. 1-6 [doi]
- Multi-Agent DRL-Based Computation Offloading in Multiple RIS-Aided IoV NetworksBishmita Hazarika, Keshav Singh, Chih-Peng Li, Sudip Biswas. 1-6 [doi]
- NDN Experimental Evaluation in Multi-Domain Tactical EnvironmentsLorenzo Campioni, Bastiaan Wissingh, Mauro Tortonesi, Niranjan Suri, Cesare Stefanelli. 1-6 [doi]
- PulseNet: A Discriminative Model for Time Division Multiple Access Timeslot PredictionAndrew Wood, Tim Upthegrove, Colin Funai, Bishal Thapa, Scott Loos, Daniel Javorsek. 1-6 [doi]
- Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G NetworksSana Sharif, Sherali Zeadally, Waleed Ejaz. 7-12 [doi]
- Sensing-Throughput Tradeoffs with Generative Adversarial Networks for NextG Spectrum SharingYi Shi 0001, Yalin E. Sagduyu. 13-18 [doi]
- 3D-O-RAN: Dynamic Data Driven Open Radio Access Network SystemsFrancesco Restuccia, Erik Blasch, Andrew Ashdown, Jonathan D. Ashdown, Kurt A. Turck. 19-24 [doi]
- Positive and Unlabeled Learning for Mobile Application Traffic ClassificationJason Hussey, Kerri Stone, Tracy Camp. 25-30 [doi]
- UAV aided FD-NOMA for Energy-efficient Ultra-Reliable Low-latency CommunicationsMayur Katwe, Rasika Deshpande, Keshav Singh, Chih-Peng Li. 31-36 [doi]
- Outage Probability Analysis of Uplink Cell-Free Massive MIMO with User MobilitySravani Kurma, Keshav Singh, Prabhat Kumar Sharma, Chih-Peng Li. 37-42 [doi]
- A Secured Protocol for IoT Devices in Tactical NetworksWei Wang 0190, Zicheng Chi, Xin Liu, Ananth Vishnu Bhaskar, Ankit Baingane, Ryan Jahnige, Qingquan Zhang, Ting Zhu 0001. 43-48 [doi]
- Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based EncryptionSaad Inshi, Rasel Chowdhury, Hakima Ould-Slimane, Chamseddine Talhi. 49-54 [doi]
- DRL Algorithms for Efficient Spectrum Sharing in RIS-aided MIMO Radar and Cellular SystemsPrajwalita Saikia, Keshav Singh, Omid Taghizadeh, Wan-Jen Huang, Sudip Biswas. 55-60 [doi]
- Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated LearningPrakhar Consul, Ishan Budhiraja, Rajat Chaudhary, Neeraj Kumar 0001. 61-65 [doi]
- Testing and Analysis of IPv6-Based Internet of Things Products for Mission-Critical Network ApplicationsKe Lu, Wenjuan Yan, Shuyi Wang. 66-71 [doi]
- Machine Learning-Based Frequency Bands Classification for Efficient Frequency Hopping Spread Spectrum ApplicationsInna Valieva, Bharath Shashidhar, Mats Björkman, Johan Åkerberg, Mikael Ekström, Iurii Voitenko. 72-77 [doi]
- A Comprehensive Study of CPM Trellis Initialization MethodsAndreas Lang, Berthold Lankl. 78-83 [doi]
- Polynomial Phase Modulation-Based Code-Domain NOMAXing Hao, Yu Xiao, Guillermo E. Atkin. 84-88 [doi]
- Performance Variation of Gray Codes for Cropped Gaussian 16PAM ConstellationsBrett Wiens, Daniel C. Lee. 89-94 [doi]
- Multicarrier DS-CDMA Based Integrated Sensing and Communication Waveform DesignsSalil Sharma, Visa Koivunen. 95-101 [doi]
- An Optimal Network Control Framework for Wireless SDN: From Theory to ImplementationQuang Minh Nguyen, M. Shahir Rahman, Xinzhe Fu, Sastry Kompella, Joseph P. Macker, Eytan H. Modiano. 102-109 [doi]
- Towards Software-Defined Tactical Networks: Experiments and Challenges for Control OverheadPaulo H. L. Rettore, Miodrag Djurica, Roberto Rigolin Ferreira Lopes, Vinícius F. S. Mota, Eelco Cramer, Floris Drijver, Johannes F. Loevenich. 110-116 [doi]
- RTC: Route to Controller Algorithm Providing SDN Capabilities in MANETsKlement Hagenhoff, Maximilian Tränkler, Corinna Schmitt, Gabi Dreo Rodosek. 117-124 [doi]
- Joint Controller Placement and TDMA Link Scheduling in SDN-enabled Tactical MANETsYiannis Papageorgiou, Merkouris Karaliopoulos, Iordanis Koutsopoulos. 125-132 [doi]
- Air-Aided Communication between Ground Assets in a Poisson ForestJuan David Pabon, Shaikha Alkandari, Matthew C. Valenti, Xi Yu. 133-139 [doi]
- Quantitative Assessment of Federal Airborne Systems' Spectrum UsageMichael Ghorbanzadeh, Edward Drocella, Robert Sole, April Lundy, Nicholas Lasorte. 140-147 [doi]
- Orchestration of Reconfigurable Intelligent Surfaces for Positioning, Navigation, and TimingMd Sadman Siraj, Aisha B. Rahman, Maria Diamanti, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou, Jim Plusquellic. 148-153 [doi]
- Locally-Hosted Fidelity-Adaptive Honeypots with Connection-Preserving CapabilitiesJaime C. Acosta. 154-159 [doi]
- A Customized Approach to Cybersecurity Education for Space ProfessionalsG. Hills, J. Baldasare, W. Henry, W. Connell. 160-165 [doi]
- Do You Really Need to Disguise Normal Servers as Honeypots?Suhyeon Lee 0001, Kwangsoo Cho, Seungjoo Kim. 166-172 [doi]
- Mission Resilience Experimentation and Evaluation TestbedBich Vu, John Darby Mitchell, Katherine Stowell, Mark Rabe, Orton Huang, Robert Lychev, Martine Kalke. 173-179 [doi]
- The Future of GNU Radio: Heterogeneous Computing, Distributed Processing, and Scheduler-as-a-PluginJoshua Morman, Marc Lichtman, Marcus Müller. 180-185 [doi]
- Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol for Spectrum Dependent SystemsMark D. Silvius, Mark McHenry, Alex Lackpour, Joe Molnar. 192-197 [doi]
- Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital JammingCharles E. Thornton, R. Michael Buehrer. 198-203 [doi]
- Reduced Complexity Adaptive Demodulation in Impulse Noise ChannelsKristoffer Hägglund, Erik Axell, Patrik Eliardsson. 204-209 [doi]
- Multi-carrier Constant Envelope GNSS Waveforms Compatible with Existing User EquipmentDan Shen, Genshe Chen, Tien Manh Nguyen, Khanh D. Pham. 210-215 [doi]
- A New Low-Complexity Polar Code Construction for BICM Over AWGN ChannelsMasayuki Kaneko, Hideki Ochiai. 216-221 [doi]
- On the Limits of Learning a Discrete Memoryless Communication ChannelMichael A. Tope, Joel M. Morris. 222-228 [doi]
- Peak Age of Information with Receiver Induced Service InterruptionsEce Bingöl, Aylin Yener. 229-234 [doi]
- Allan Deviation of Social Learning Distributed Network Time SynchronizationIan Ellis Lamptey Hulede, Hyuck M. Kwon. 235-240 [doi]
- Maritime Unmanned Systems and JANUS in Support to Distressed Submarine Search & Rescue: The REPMUS21 ExperienceRoberto Petroccia, Gabriele Ferri 0002, Pietro Stinco, Alessandra Tesei, Stefano Fioravanti, Thomas C. Furfaro, João Alves 0002, Andrea Molaschi, José M. Bioucas-Dias, Paulo Sousa Dias, João Borges de Sousa. 241-246 [doi]
- Frequency-Hop-Coded SCB for Tactical NetworksArwid Komulainen, Jimmi Grönkvist, Ulf Sterner. 247-252 [doi]
- Rapid Interoperability with OverlAI GatewaysTim Upthegrove, Guevara Noubir, Bishal Thapa, Dan Smith, Colin Funai, Scott Loos, Greg Kuperman. 253-258 [doi]
- Heterogeneous Network-Driven Data Fabrics to Enable Multi-Mission AutonomyMatthew Hawkins, A. K. Wang, Tammy Chang, David Rowe, Brandon Martin, Michael Enoch, Gustave Anderson, Julee Pandya. 259-264 [doi]
- Mission Critical Resiliency with IRONLaura Poplawski Ma, Christopher Eck, David Duran, Stephen Zabele, Marina Gurevich, Gregory Lauer. 265-272 [doi]
- Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield NetworksAnthony Castañares, Deepak K. Tosh. 273-278 [doi]
- MalGrid: Visualization of Binary Features in Large Malware CorporaTajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath. 279-284 [doi]
- C Program Partitioning with Fine-Grained Security Constraints and Post-Partition VerificationMaxwell Levatich, Robert Brotzman, Benjamin Flin, Ta Chen, Rajesh Krishnan, Stephen A. Edwards. 285-291 [doi]
- LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern MiningHuan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, Dan Meng. 292-297 [doi]
- Robust Classification of Digitally Modulated Signals Using Capsule Networks and Cyclic Cumulant FeaturesJohn A. Snoap, James A. Latshaw, Dimitrie C. Popescu, Chad M. Spooner. 298-303 [doi]
- Classification of Radio Signals Using Truncated Gaussian Discriminant Analysis of Convolutional Neural Network-Derived FeaturesJ. B. Persons, Lauren J. Wong, Megan O. Moore, William C. Headley, Michael Fowler. 304-310 [doi]
- Radio Modulation Classification Using Deep Residual Neural NetworksAdeeb Abbas, Vasil Pano, Geoffrey Mainland, Kapil R. Dandekar. 311-317 [doi]
- Generalized Noncoherent Space-Time Block Codes from Quantum Error CorrectionS. Andrew Lanham, Eli Bradley, Brian R. La Cour. 318-323 [doi]
- Differential Detection Based Deterministic Linear Processing for Single-User MIMO SystemsPialy Biswas, Ranjan K. Mallik, Jack H. Winters. 324-329 [doi]
- Performance of Compressed Sensing MIMO Radar Based on Low-Rank Matrix RecoveryByron McMullen, Seung-Jun Kim. 330-335 [doi]
- Hierarchical Intrusion Detection System for Secured Military Drone Network: A Perspicacious ApproachVivian Ukamaka Ihekoronye, Simeon Okechukwu Ajakwe, Dong-Seong Kim 0002, Jae-Min Lee. 336-341 [doi]
- Blockchain Inspired Intruder UAV Localization Using Lightweight CNN for Internet of Battlefield ThingsMohtasin Golam, Rubina Akter, Revin Naufal Alief, Van-Sang Doan, Jae-Min Lee, Dong-Seong Kim 0002. 342-349 [doi]
- Analysis of Vulnerabilities in Satellite Software Bus Network ArchitectureAdrian Schalk, Luke Brodnik, Dane Brown. 350-355 [doi]
- GAN-Based Detection of Adversarial EM Signal WaveformsAthanasios Gkelias, Kin K. Leung. 356-361 [doi]
- Data-Centric Approaches to Radio Frequency Machine LearningScott Kuzdeba, Josh Robinson. 362-367 [doi]
- Unsupervised Radio Scene Analysis Using Neural Expectation MaximizationHao Chen, Seung-Jun Kim. 368-373 [doi]
- Removing the RF Fingerprint: A Least Squares Approach to Compensate for a Device's Hardware ImpairmentsJohn S. Kaminski, David Stein, Jay Weitzen. 374-378 [doi]
- 5G Physical Layer Resiliency Enhancements with NB-IoT Use Case StudyXiang Cheng, Hanchao Yang, Daniel J. Jakubisin, N. Tripathi, G. Anderson, A. K. Wang, Y. Yang, Jeffrey H. Reed. 379-384 [doi]
- An Assessment of Entropy-Based Data Reduction for SEI Within IoT ApplicationsMohamed A. Taha, Mohamed K. M. Fadul, Joshua H. Tyler, Donald R. Reising, T. Daniel Loveless. 385-392 [doi]
- Some Discussions on PHY Security in DF RelayChongjun Ouyang, Hao Xu, Xujie Zang, Hongwen Yang. 393-397 [doi]
- Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite NetworksThomas H. Shake, Jun Sun, Thomas Royster, Aradhana Narula-Tam. 404-411 [doi]
- DeepADMR: A Deep Learning based Anomaly Detection for MANET RoutingAlex Yahja, Saeed Kaviani, Bo Ryu, Jae H. Kim, Kevin A. Larson. 412-417 [doi]
- Considerations of Reinforcement Learning within Real-Time Wireless Communication SystemsAlyse M. Jones, William C. Headley. 418-425 [doi]
- Jamming Vulnerability of Terahertz Wireless NetworksAmitav Mukherjee. 426-430 [doi]
- Practical Methods for Joint Time and Carrier Synchronization in LPI/LPD CommunicationsHaotian Zhai, Bernd-Peter Paris. 431-436 [doi]
- 5G PUSCH Channel Estimation and Decoding Subject to High-Power Pulse Radar InterferenceThomas Ranström, Philip Pietraski, Sudhir B. Pattar. 437-441 [doi]
- I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor AugmentationYue Gao 0011, Jack W. Stokes, Manoj Ajith Prasad, Andrew T. Marshall, Kassem Fawaz, Emre Kiciman. 442-449 [doi]
- Verify-Pro: A Framework for Server Authentication Using Communication Protocol DialectsKailash Gogineni, Yongsheng Mei, Guru Venkataramani, Tian Lan. 450-457 [doi]
- High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep TreeQiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng Liu, Lingyun Ying. 458-463 [doi]
- Attack Graph Embedded Machine Learning Platform For Cyber Situational AwarenessMd Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold. 464-469 [doi]
- Aggregation in the Mirror Space (AIMS): Fast, Accurate Distributed Machine Learning in Military SettingsRyan Yang, Haizhou Du, Andre Wibisono, Patrick Baker. 470-477 [doi]
- FedTune: Automatic Tuning of Federated Learning Hyper-Parameters from System PerspectiveHuanle Zhang, Mi Zhang, Xin Liu, Prasant Mohapatra, Michael DeLucia. 478-483 [doi]
- Network Anomaly Detection Using Federated LearningWilliam Marfo, Deepak K. Tosh, Shirley V. Moore. 484-489 [doi]
- Information-Based Mobile Sensor Network Localization and Tracking of an Uncooperative TargetNathaniel R. Olsen, Sasha M. McKee, Osama S. Haddadin, Scott Lyon, Jared Campbell, Kam K. Leang. 490-495 [doi]
- A Message Passing Based Consensus Averaging Algorithm for Decentralized Frequency and Phase Synchronization in Distributed Phased ArraysMohammed Rashid, Jeffrey A. Nanzer. 496-500 [doi]
- Forming Coalition Sets from Directional RadiosSayanta Seth, Murat Yuksel, Azadeh Vosoughi. 507-514 [doi]
- Physical Layer Abstraction for LTE and 5G New Radio with Imbalance Receiver in EMANEAnh Duc Le, Cristian Budianu, Melissa Elkadi, Bo Ryu. 515-521 [doi]
- SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and AssessmentsJeremy Banks, Ryan Kerr, Steven H. H. Ding, Mohammad Zulkernine. 522-528 [doi]
- Asymmetric Collision Phenomenon and its Impact on Underwater Acoustic NetworksYu Luo 0001, Lina Pu. 529-534 [doi]
- The Role of Private Blockchain Architectures and Smart Contracts for Decentralized 5G Militarized NetworksChristopher Maracchion, Timothy Woods, Sean Furman, Andrew L. Drozd. 535-540 [doi]
- Manipulating the Automatic Identification System with Extremely Low-Cost HardwareDon Barber, Vikram Kanth, Darren Rogers. 541-546 [doi]
- Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network SystemsZiad El Jamous, Kemal Davaslioglu, Yalin E. Sagduyu. 547-552 [doi]
- 5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator with EMANEBo Ryu, Raymond Knopp, Melissa Elkadi, Deoksung Kim, Anh Le. 553-558 [doi]
- Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and MarketplaceEranga Bandara, Sachin Shetty, Ravi Mukkamala, Abdul-Rahman, Peter Foytik, Xueping Liang, Wee Keong Ng. 559-564 [doi]
- Threat framework for 5G cellular communicationsMichaela C. Vanderveen. 565-570 [doi]
- MUFAZA: Multi-Source Fast and Autonomous Zero-Trust Authentication for 5G NetworksYunfei Ge, Quanyan Zhu. 571-576 [doi]
- Toward Zero Trust Security IN 5G Open Architecture Network SlicesHisham A. Kholidy, Andrew Karam, James L. Sidoran, Mohammad Ashiqur Rahman, Mohammed Mahmoud, Mahmoud M. Badr, Maqsood Mahmud, Ahmed F. Sayed. 577-582 [doi]
- CNN-based Timing Synchronization for OFDM Systems Assisted by Initial Path Acquisition in Frequency Selective Fading ChannelChaojin Qing, Na Yang, Shuhai Tang, Chuangui Rao, Jiafan Wang 0002, Jinliang Chen. 583-587 [doi]
- Efficient Generative Wireless Anomaly Detection for Next Generation NetworksGopikrishna Rathinavel, Nikhil Muralidhar, Naren Ramakrishnan, Timothy O'Shea. 594-599 [doi]
- Linear, Efficient Multi-Carrier Envelope Tracking Power Amplifiers with Frequency Hopping for Phased ArraysMartin Navaroli, Paul J. Draxler, Dane Malangone, Eric Brown, Edward Falcon, Jonmei J. Yan. 600-605 [doi]
- On the Tunability of Apollonian-Loaded Split Ring Resonator TopologiesPaul Sikora, David Crouse, Heather B. Dussault. 606-611 [doi]
- Precoding for Security Gap Physical Layer Security in Multiuser MIMO Satellite SystemsMatthias G. Schraml, Andreas Knopp. 612-617 [doi]
- Link Reliability of Satellite-to-Ground Free-Space Optical Communication Systems in South KoreaGyuwan Kim, Hoon Kim. 618-622 [doi]
- Models for Frequency Doppler Shift Prediction for LEO Satellites at L-BandOmid Nia, Brian L. Mark. 623-628 [doi]
- Federated Learning-Based Jamming Detection for Distributed Tactical Wireless NetworksAida Meftah, Georges Kaddoum, Tri Nhu Do, Chamseddine Talhi. 629-634 [doi]
- A Robust Self-Synchronized Quantum Key Distribution ProtocolAustin Bristow, Kwang-Cheng Chen. 635-642 [doi]
- Securing Software Updates under Receiver Radio Frequency Geolocation RiskBlake Hayden, Matthew Sweeney, Britta Hale. 643-648 [doi]
- Improving Quality of Service in a Mesh Network Using Age of InformationFrederick M. Chache, Sean Maxon, Ram M. Narayanan, Ramesh Bharadwaj. 649-654 [doi]
- Deep Learning-based Interference Detection and Classification for LPI/LPD Radar SystemsHamda Bouzabia, Georges Kaddoum, Tri Nhu Do. 655-660 [doi]
- Secrecy Rate of Relay and Intelligent Reflecting Surface Antenna-Assisted MIMOZachary T. Minson, Hyuck M. Kwon. 661-666 [doi]
- Opportunistic Power Control for Low Probability of Detection CommunicationKennedy A. Lee, John R. Barry. 667-671 [doi]
- Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network PlatformsMohammed Alkhowaiter, Khalid Almubarak, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Changchun Zou. 672-678 [doi]
- Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High NorthNicolò Boschetti, Nathaniel Gordon, Johan Sigholm, Gregory Falco. 679-686 [doi]
- Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-MakingPeter J. Caven, Shakthidhar Reddy Gopavaram, L. Jean Camp. 687-692 [doi]
- Performance Comparison of OTFS and MC-CDMA with Channel Estimation and Power Back-OffS. Sruti, Kolliboina Sai Teja, K. Giridhar. 693-698 [doi]
- NDNSD: Service Publishing and Discovery in NDNSaurab Dulal, Lan Wang. 699-704 [doi]
- Blockage Prediction for Mobile UE in RIS-assisted Wireless Networks: A Deep Learning ApproachShakil Ahmed, Ibrahim Abdelmawla, Ahmed E. Kamal 0001, Mohamed Y. Selim. 705-710 [doi]
- Data-Driven Wireless Anomaly Detection Using Spectral FeaturesStephan D. Frisbie, Mohamed F. Younis. 711-716 [doi]
- Decentralized Bandits with Feedback for Cognitive Radar NetworksWilliam W. Howard, R. Michael Buehrer. 717-722 [doi]
- A Transmit Diversity Scheme for Multi-pulse Pulse Position Modulated Visible Light CommunicationsZachary White, Don Barber, Murali Tummala, John McEachen. 723-728 [doi]
- Efficient Monitoring of Dynamic Spectrum Access for Robust and Reliable Detection of Unauthorized AccessDebarun Das, Taieb Znati, Martin B. H. Weiss. 729-734 [doi]
- Resource-Efficient and Power-Efficient FPGA Frequency Channelizer Using Novel Systolic Array ArchitecturesDaniel Song, Eugene Wu 0003, William Song, Bow-Nan Cheng. 735-742 [doi]
- SIC Based Secondary Coexistence Over ATSC 3.0 Broadcast ChannelsRajrshi Dubey, Swades De. 751-756 [doi]
- Improving Text Security Classification Towards an Automated Information GuardIlana Heintz, John Grothendieck, Fred Bernardin, Gregory Kuperman. 757-762 [doi]
- Deep Reinforcement Learning for Deception in IRS-assisted UAV CommunicationsFelix O. Olowononi, Danda B. Rawat, Charles A. Kamhoua, Brian M. Sadler. 763-768 [doi]
- Intelligent Reflecting Surface-based Secrecy Rate Enhancement in Multicast Multigroup Tactical Communication SystemsTi Ti Nguyen, Kim Khoa Nguyen, Satinder Singh. 769-774 [doi]
- Rate Control with Autoregressive Forecasting for High Frequency CommunicationAllan Ko, Thomas Stahlbuhk, Brooke Shrader. 775-780 [doi]
- Enhanced Accuracy of Self-Interference Cancellation in Underwater Acoustic Full-Duplex CommunicationMohammad Towliat, Zheng Guo, Leonard J. Cimini Jr., Xiang-Gen Xia 0001, Aijun Song. 781-786 [doi]
- Low-Complexity Channel Matrix Calculation for OTFS Systems with Fractional Delay and DopplerZheng Wang, Lingjia Liu 0001, Yang Yi, A. Robert Calderbank, Jianzhong Zhang. 787-792 [doi]
- Intelligent Reflecting Vehicle Surface: A Novel IRS Paradigm for Moving Vehicular NetworksWei Jiang, Hans D. Schotten. 793-798 [doi]
- Distributed Agent Consensus Performance in Resilient Communication NetworksJoseph P. Macker, Jeffery W. Weston, Kyle Lawson Crandall. 799-804 [doi]
- A Novel Resilient HF Data Communications ArchitectureJames Whitehead, Andre van Heerden, Nirin Thanirat, Kobkiat Sukmanee, Witras Smabut. 805-809 [doi]
- WHAC-A-MOLEEric T. Makara, Joseph A. Molnar, Lan H. Tran, John B. Wood, Er-Hsien Frank Fu. 810-816 [doi]
- Coverage Estimation for Secure Ultraviolet CommunicationTao Shan, Julian Cheng. 817-821 [doi]
- Receiver Diversity in LEO Satcom ConstellationsMatthew Gaydos, Frederick J. Block, Thomas C. Royster IV, David J. Love. 822-827 [doi]
- Failure Resilience in Proliferated Low Earth Orbit Satellite Network TopologiesThomas H. Shake, Jun Sun, Thomas C. Royster IV, Aradhana Narula-Tam. 828-834 [doi]
- Near Term Resilient Teleports for DoD SATCOMGriffin Cleverly, Bridgit Mendler, David Brunnenmeyer, Jeffrey Fry. 835-840 [doi]
- DOD SATCOM Growth Measurement and PlanningArmando J. Vigil, John Kirk, Patrick Rayermann, Jessica L. Gregris, Dahesh A. Khalil, Carl O. Morris. 841-848 [doi]
- Mathematical Modeling of Cyber ResilienceAlexander Kott, Michael J. Weisman, Joachim Vandekerckhove. 849-854 [doi]
- An Experimentation Infrastructure for Quantitative Measurements of Cyber ResilienceJason E. Ellis, Travis W. Parker, Joachim Vandekerckhove, Brian J. Murphy, Sidney C. Smith, Alexander Kott, Michael J. Weisman. 855-860 [doi]
- Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacksAndreas Dybvik Kaasen, Gudmund Grov, Federico Mancini 0001, Magnus Baksaas. 861-866 [doi]
- Joint Energy and Correlation Based Anti-Intercepts for Ground Combat VehiclesVan Hau Le, Ti Ti Nguyen, Kim Khoa Nguyen, Satinder Singh. 867-872 [doi]
- MADRL Based Scheduling for 5G and BeyondHao-Hsuan Chang, R. B. Sai Sree, Hao Chen, Jianzhong Zhang, Lingjia Liu 0001. 873-878 [doi]
- Toward Congestion Control in Lossy Networks via Local Queue-Management PoliciesPedro A. Forero, Peng Zhang, Dusan Radosevic. 879-886 [doi]
- Hector: A Reinforcement Learning-based Scheduler for Minimizing Casualties of a Military Drone SwarmHeng Jin, Qingyu Liu, Chengzhang Li, Y. Thomas Hou, Wenjing Lou, Sastry Kompella. 887-894 [doi]
- Joint Beam Management and Relay Selection Using Deep Reinforcement Learning for MmWave UAV Relay NetworksDohyun Kim, Miguel R. Castellanos, Robert W. Heath Jr.. 895-900 [doi]
- Sum-Capacity Achieving Schemes of a 2-User Gaussian Multiple-Access Channel with 1-bit ADCSejuti Banik, Md Hasan Rahman, Mohammad Ranjbar, Nghi H. Tran, Khanh Pham. 901-906 [doi]
- SARA: A Practical Framework for Quantitative Risk Assessment Applied to Federal/Commercial Spectrum CoexistenceFabrice Tchakountio, Ambrose Lewis, Sastry Kompella. 907-912 [doi]
- Blind Estimation of the Carrier Powers and SNRs in PCMA Satellite Signals by Cyclic StatisticsAndreas Feder, Martin Hirschbeck, Wolfgang H. Gerstacker. 913-919 [doi]
- Pulse Shaping for Faster-than-Nyquist to Enable Low-Complexity DetectionMichel Kulhandjian, Gregory Dzhezyan, Hovannes Kulhandjian, Claude D'Amours. 920-925 [doi]
- Adaptive Monitoring for Analytics Placement in Tactical NetworksJohn Corcoran, Eric Graves 0001, Bryan Dawson, Matthew Dwyer 0004, Paul Yu, Kevin Chan. 926-931 [doi]
- Enabling Machine Learning on Resource-constrained Tactical NetworksJake B. Perazzone, Matthew Dwyer 0004, Kevin S. Chan, Cleon Anderson, Scott Brown. 932-937 [doi]
- Clustered Distributed Spatial MultiplexingAndreas Polydoros, Cenk Köse. 938-943 [doi]
- 1 Lyapunov Stability Analysis for Controlling UAV Trajectory Over 6G Wireless NetworksXi Zhang 0005, Qixuan Zhu. 944-949 [doi]
- Zero Touch Coordinated UAV Network Formation for $360^{\circ}$ Views of a Moving Ground Target in Remote VR ApplicationsYuhui Wang, Junaid Farooq. 950-955 [doi]
- Remote and Rural Connectivity via Multi-tier Systems through SDN-Managed Drone NetworksAlvaro del Aguila, Jonathan Valdez Mendoza, Sai Bhargav Mandavilli, Janise McNair. 956-961 [doi]
- An Architectural Design for Autonomous and Networked DronesUmut Can Çabuk, Mustafa Tosun, Orhan Dagdeviren, Yusuf Ozturk. 962-967 [doi]
- An Intelligent and Private 6G Air Interface Using Physical Layer SecurityBrian Kelley, Israt Ara. 968-973 [doi]
- Statistical Analysis of the MK-3 Customizable Authenticated EncryptionPeter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski. 974-979 [doi]
- LoFin: LoRa-based UAV Fingerprinting FrameworkMaryna Veksler, David Langus Rodríguez, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac. 980-985 [doi]
- Adversarial Attacks Against Reinforcement Learning Based Tactical Networks: A Case StudyJohannes F. Loevenich, Jonas Bode, Tobias Hürten, Luca Liberto, Florian Spelter, Paulo H. L. Rettore, Roberto Rigolin Ferreira Lopes. 986-992 [doi]
- Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection SystemsSamson Ho, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov, Ritu Chadha, Alina Oprea. 993-998 [doi]
- Tensorshield: Tensor-based Defense Against Adversarial Attacks on ImagesNegin Entezari, Evangelos E. Papalexakis. 999-1004 [doi]
- Formal Adversarial Analysis of Machine Learning based Cyber Physical Authentication SystemsKoosha Sadeghi, Ayan Banerjee, Sandeep K. S. Gupta. 1005-1010 [doi]
- Comparing Performance of Group Communications Protocols Over SCB versus Routed MANET NetworksNiranjan Suri, Maggie B. Wigness, Lorenzo Campioni, Jan Nilsson, Eelco Cramer, Roberto Fronteddu, Mauro Tortonesi. 1011-1017 [doi]
- 5G-Enabled Defence-in-Depth for Multi-domain OperationsSlawomir Kuklinski, Krzysztof Szczypiorski, Konrad S. Wrona, Jedrzej Bieniasz. 1024-1029 [doi]
- Base Station Deployment Optimization in Federated Networks with Multi-Hop CommunicationYudong Fang, David Brown. 1030-1037 [doi]
- Enabling Adaptive Communications at the Tactical EdgeChristoph Barz, Eelco Cramer, Roberto Fronteddu, Mariann Hauge, Kelvin Marcus, Jan Nilsson, Filippo Poltronieri, Mauro Tortonesi, Niranjan Suri, Mattia Zaccarini. 1038-1044 [doi]
- Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated EnvironmentsMarco Manso, Janusz Furtak, Barbara Guerra, James Michaelis, Daniel Ota, Niranjan Suri, Konrad S. Wrona. 1045-1052 [doi]
- Context-aware Collaborative Neuro-Symbolic Inference in IoBTsTarek F. Abdelzaher, Nathaniel D. Bastian, Susmit Jha, Lance M. Kaplan, Mani B. Srivastava, Venugopal V. Veeravalli. 1053-1058 [doi]
- Insights on Using Deep Learning to Spoof Inertial Measurement Units for Stealthy Attacks on UAVsKyo Hyun Kim, Denizkhan Kara, Vineetha Paruchuri, Sibin Mohan, Greg Kimberly, Denis Osipychev, Jae H. Kim, Josh D. Eckhardt, Miroslav Pajic. 1065-1069 [doi]
- Graph Convolutional Network-based Scheduler for Distributing Computation in the Internet of Robotic ThingsJared Coleman, Mehrdad Kiamari, Lillian Clark, Daniel D'Souza, Bhaskar Krishnamachari. 1070-1075 [doi]
- Adversarial Machine Learning and Defense Game for NextG Signal Classification with Deep LearningYalin E. Sagduyu. 1076-1081 [doi]
- The Methodological Pitfall of Dataset-Driven Research on Deep Learning: An IoT ExampleTianshi Wang, Denizhan Kara, Jinyang Li 0004, Shengzhong Liu, Tarek F. Abdelzaher, Brian Jalaian. 1082-1087 [doi]