Abstract is missing.
- Channel Aware Adversarial Attacks are Not RobustSujata Sinha, Alkan Soysal. 1-6 [doi]
- BIER-Like Multicast for Mobile Ad Hoc NetworksMatteo Varvello, Fang Hao, David Holland, James M. Hughes, Sarit Mukherjee. 1-6 [doi]
- Data-Driven Constraint Mining for Realizable Adversarial SamplesBleema Rosenfeld, Sridhar Venkatesan, Rauf Izmailov, Matthew Yudin, Constantin Serban, Ritu Chadha. 7-12 [doi]
- The Efficacy of Transformer-based Adversarial Attacks in Security DomainsKunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick D. McDaniel. 13-18 [doi]
- Joint Optimization of E2E Latency, FPS, Energy, and Confidentiality for Surveillance UAVHeechan Kim, Honggu Kang, Joonhyuk Kang. 19-26 [doi]
- Channel-Adaptive Dynamic Neural Networks for Low-Complexity Distributed Signal AwarenessMohammad Abdi, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia. 27-32 [doi]
- RoamML: Distributed Machine Learning at the Tactical EdgeSimon Dahdal, Filippo Poltronieri, Alessandro Gilli, Mauro Tortonesi, Roberto Fronteddu, Raffaele Galliera, Niranjan Suri. 33-38 [doi]
- M3: Towards Efficient Mixed Machine Learning Model Co-Location on Constrained Edge DevicesLuis Angel D. Bathen, Simeon Babatunde, Rhui Dih Lee, Achintya Kundu, Laura Wynter. 39-44 [doi]
- Characterizing Distributed Inferencing at the Edge in Resource-Constrained EnvironmentsScott E. Brown, David Harman, Cleon Anderson, Matthew Dwyer 0004. 45-50 [doi]
- DeepMPR: Enhancing Opportunistic Routing in Wireless Networks via Multi-Agent Deep Reinforcement LearningSaeed Kaviani, Bo Ryu, Ejaz Ahmed, Deokseong Kim, Jae H. Kim, Carrie Spiker, Blake Harnden. 51-56 [doi]
- Private Membership AggregationMohamed Nomeir, Sajani Vithana, Sennur Ulukus. 57-62 [doi]
- Open Source-Based Over-the-Air 5G New Radio Sidelink TestbedMelissa Elkadi, Deokseong Kim, Ejaz Ahmed, Anh Le, Moein Sadeghi, Paul Russell, Bo Ryu. 63-70 [doi]
- DOTMFLPI Analysis of 5G for Several Military Use CasesHarri Saarnisaari, Relja Djapic, Topi Tuukkanen, Warren Low, Nicolas Chuberre, Souradip Saha. 71-76 [doi]
- Anti-Jamming Resilient LEO Satellite SwarmsVenkata Srirama Rohit Kantheti, Chia-Hung Lin, Shih-Chun Lin, Liang C. Chu. 77-82 [doi]
- Covert and Quantum-Safe Tunneling of Multi-Band Military-RF Communication Waveforms Through Non-Cooperative 5G NetworksElias A. Alwan, John L. Volakis, Md Khadimul Islam, Udara De Silva, Arjuna Madanayake, José Ángel Sánchez, George Sklivanitis, Dimitris A. Pados, Luke Beckwith, Reza Azarderakhsh, Madhuvanti Muralkrishan, Rishabh Rastogi, Aniruddha Hore, Eric W. Burger. 83-88 [doi]
- Impact of Imperfect Channel State Information on Achievable Rate With Zero-Forcing Precoding in Massive MIMO Systems for Multi-NumerologyHyunsoo Son, Girim Kwon, Hyuncheol Park, Joo Sung Park. 89-94 [doi]
- Quantum MBSE and Quantum SysMLSteven J. Silverman, Trey Jiron. 95-99 [doi]
- Computational Simulation Framework for Tactical Quantum Network ApplicationsDashiell L. P. Vitullo, Trevor Cook, Daniel E. Jones, Lisa M. Scott, Brian T. Kirby. 100-102 [doi]
- Spread Photon Transceiver for Quantum Secure CommunicationsWesley Webb, Michael S. Bullock, Samuel H. Knarr, Timothy C. Burt, Jim A. Drakes, Saikat Guha 0001, Boulat A. Bash, Victor G. Bucklew. 103-108 [doi]
- Pragmatic Quantum-Classic Phase Estimation of a Quantum ChannelAustin Bristow, Kwang-Cheng Chen. 109-114 [doi]
- Low-Complexity Decoding Algorithm Utilizing Degeneracy for Quantum LDPC CodesJaemin Kim, Hyunwoo Jung, Jeongseok Ha. 115-120 [doi]
- Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion DetectionYasir Ali Farrukh, Syed Wali, Irfan Khan 0001, Nathaniel D. Bastian. 121-126 [doi]
- IoBT-MAX: a Multimodal Analytics eXperimentation Testbed for IoBT ResearchBenjamin M. Marlin, Niranjan Suri, Shiwei Fang, Mani B. Srivastiva, Colin Samplawski, Ziqi Wang 0001, Maggie B. Wigness. 127-132 [doi]
- Impact of Delays and Computation Placement on Sense-Act Application Performance in IoTPragya Sharma, Mani B. Srivastava. 133-138 [doi]
- Feature Compression for Multimodal Multi-Object TrackingXinlin Li, Osama A. Hanna, Christina Fragouli, Suhas N. Diggavi, Gunjan Verma, Joydeep Bhattacharyya. 139-143 [doi]
- Failure-Resilient ML Inference at the Edge through Graceful Service DegradationWalid A. Hanafy, Li Wu, Tarek F. Abdelzaher, Suhas N. Diggavi, Prashant J. Shenoy. 144-149 [doi]
- Unlocking Efficiency: Understanding End-to-End Performance in Distributed Analytics PipelinesAbel Souza, Nathan Ng, Tarek F. Abdelzaher, Don Towsley, Prashant J. Shenoy. 150-155 [doi]
- Challenges and Opportunities in Neuro-Symbolic Composition of Foundation ModelsSusmit Jha, Anirban Roy, Adam D. Cobb, Alexander M. Berenbeim, Nathaniel D. Bastian. 156-161 [doi]
- Electrical Grid Anomaly Detection via Tensor DecompositionAlexander Most, Maksim Ekin Eren, Boian S. Alexandrov, Nigel Lawrence. 162-169 [doi]
- Graph Machine Learning based Cyber Attack Detection for Mobile Tactical NetworksKeerthiraj Nagaraj, Dennis Agnew, Pavan Kumar Mangipudi, Allen Starke, ZiXiang Nie, Janise McNair. 170-175 [doi]
- Timely Multi-Goal Transmissions With an Intermittently Failing SensorIsmail Cosandal, Sennur Ulukus. 176-181 [doi]
- Age of Gossip on Generalized RingsArunabh Srivastava, Sennur Ulukus. 182-187 [doi]
- Applying Mission Information Requirements to Value of Information MiddlewareJames Michaelis, Alessandro Morelli. 188-193 [doi]
- Context-aware Status Updating: Wireless Scheduling for Maximizing Situational Awareness in Safety-critical SystemsTasmeen Zaman Ornee, Md Kamran Chowdhury Shisher, Clement Kam, Yin Sun. 194-200 [doi]
- Dynamically Creating Tactical Network Emulation Scenarios using Unity and EMANEAlessandro Amato, Roberto Fronteddu, Niranjan Suri. 201-206 [doi]
- Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and ExperimentationAlexander Velazquez, Roberto Rigolin Ferreira Lopes, Adrien Bécue, Johannes F. Loevenich, Paulo H. L. Rettore, Konrad S. Wrona. 207-212 [doi]
- Site-specific Radio Signal Propagation for Tactical Environments using 3D Path TracingBertram Schütz, Christoph Barz, Paulo H. L. Rettore, Thomas Hänel. 213-218 [doi]
- IoT in Coalition Federated Operations: Multi-National C2 Integration and Technical Interoperability ExperimentsMarco Manso, Fernando Freire, Janusz Furlak, Bárbara Guerra, James Michaelis, Daniel Ota, Reinhard Claus, Niranjan Suri, Roberto Fronteddu, Edoardo Di Caro, Konrad S. Wrona, Emil P. Andersen, Frank T. Johnsen. 219-224 [doi]
- Live Demonstration of Spectrum Maximization and Encryption Techniques for 5G and Wideband NFC ApplicationsScott R. Velazquez, Robert Shanafelt, Brennan Eveland. 225-226 [doi]
- Demonstration of 5G-Underlay Signal Co-existenceKumar Sai Bondada, Xiang Cheng, Hanchao Yang, Daniel J. Jakubisin, Nishith D. Tripathi, G. Anderson, Yaling Yang, Jeffrey H. Reed. 227-232 [doi]
- Multi-waveform Bridging of Streaming Video with an Innovative Software RadioRoman Shikula, Nicholas Echeverry, William Stevers. 233-234 [doi]
- Demoing the RFRL Gym: A Reinforcement Learning Testbed for Wireless CommunicationsAlyse M. Jones, Amos Johnson, William C. Headley. 235-236 [doi]
- Validating a Modified JSON Web Signature Format using the Scenario of Ammunition Issuance for Training PurposesMichael Hofmeier, Karl Seidenfad, Wolfgang Hommel. 237-238 [doi]
- Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security MonitoringShu-Ying Chang, Hung-Wen Liang, Van Linh Nguyen, Po-Ching Lin. 239-240 [doi]
- Demonstration of Closed Loop AI-Driven RAN Controllers Using O-RAN SDR TestbedNathan Stephenson, Azuka J. Chiejina, Nathaniel B. Kabigting, Vijay K. Shah. 241-242 [doi]
- Adaptive Beam Management for Secure mmWave Communications using Software-Defined RadiosAdrian Baron-Hyppolite, Jefferson V. F. Abreu, Joao F. Santos, Luiz A. DaSilva, Jacek Kibilda. 243-244 [doi]
- BeamArmor Demo: Anti-Jamming System in Cellular Networks with srsRAN Software RadiosFrederik Jonathan Zumegen, Ish Kumar Jain, Dinesh Bharadia. 245-246 [doi]
- Demonstration of Joint SDR/UAV Experiment Development in AERPAWAnil Gürses, Mark Funderburk, John Kesler, Keith Powell, Talha Faizur Rahman, Özgür Özdemir, Magreth Mushi, Mihail L. Sichitiu, Ismail Güvenç, Rudra Dutta, Vuk Marojevic. 247-248 [doi]
- Interference-Avoiding RFSoC-based MIMO LinksAmir Torabi, George Sklivanitis, Dimitris A. Pados, Elizabeth Serena Bentley, Joseph Suprenant, Michael J. Medley. 249-250 [doi]
- Demo: SSxApp: Secure Slicing for O-RAN DeploymentsJoshua Moore, Aly Sabri Abdalla, Minglong Zhang, Vuk Marojevic. 251-252 [doi]
- End-to-End O-RAN Control-Loop For Radio Resource Allocation in SDR-Based 5G NetworkAsheesh Tripathi, Jaswanth S. R. Mallu, Md. Habibur Rahman, Abida Sultana, Aditya Sathish, Alexandre Huff, Mayukh Roy Chowdhury, Aloizio Pereira da Silva. 253-254 [doi]
- Optimization and Control of Autonomous UAV Swarm for Object TrackingAnand Mahesh Kumar, Mai A. Abdel-Malek, Jeffery Reed. 255-259 [doi]
- Human Centered Explainable AI Framework for Military Cyber OperationsClara Maathuis. 260-267 [doi]
- Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic ReasoningBrian Jalaian, Nathaniel D. Bastian. 268-273 [doi]
- Design SNR Optimization of Polar Codes Over Block Rician Fading ChannelsHidetake Matsui, Toshiki Matsumine, Hideki Ochiai. 274-279 [doi]
- Warping Functions Design for Long Warped ZT-DFT-s-OFDMMostafa Ibrahim, Sabit Ekin, Ali Riza Ekti. 280-285 [doi]
- Deep Unfolded Superposition Coding Optimization for Two-Hop NOMA MANETsTomer Alter, Nir Shlezinger. 286-291 [doi]
- Distributed Space-Time Block Coding for Barrage Relay NetworksKi Hun Lee, Howon Lee, Jungwook Choi, Soobum Park, Bang Chul Jung. 292-297 [doi]
- Enhanced Non-preemptive Support of URLLC using Spread Spectrum Underlay SignallingKumar Sai Bondada, Hanchao Yang, Xiang Cheng, Daniel J. Jakubisin, Nishith D. Tripathi, Gus Anderson, Yaling Yang, Jeffrey H. Reed. 298-303 [doi]
- Underlay-based 5G Sidelink with Co-channel Interference CancellationHanchao Yang, Kumar Sai Bondada, Xiang Cheng, Daniel J. Jakubisin, Nishith D. Tripathi, Yaling Yang, Gustave Anderson, Jeffrey H. Reed. 304-310 [doi]
- Covert Communications in Cognitive Mobile Edge Computing Networks using Restless Multi-Armed BanditsX. Liu, B. Lorenzo, Dennis Goeckel. 311-318 [doi]
- Constant Scaling Asymptotics of Communication Bounds in Covert Channels Against Selective AdversaryXinchun Yu, Shuangqin Wei, Chenhao Ying, Xiao-Ping Zhang. 319-324 [doi]
- CAFNet: Compressed Autoencoder-based Federated Network for Anomaly DetectionAbu Saleh Md Tayeen, Satyajayant Misra, Huiping Cao, Jayashree Harikumar. 325-330 [doi]
- MINDFL: Mitigating the Impact of Imbalanced and Noisy-labeled Data in Federated Learning with Quality and Fairness-Aware Client SelectionChaoyu Zhang, Ning Wang, Shanghao Shi, Changlai Du, Wenjing Lou, Y. Thomas Hou 0001. 331-338 [doi]
- Wireless Federated k-Means Clustering with Non-coherent Over-the-Air ComputationAlphan Sahin. 339-344 [doi]
- FLNET2023: Realistic Network Intrusion Detection Dataset for Federated LearningPratyay Kumar, Jiefei Liu, Abu Saleh Md Tayeen, Satyajayant Misra, Huiping Cao, Jayashree Harikumar, Oscar Perez. 345-350 [doi]
- Analysis and Optimization of Anti-jamming Performance of User Terminals with Low Sidelobe Levels for LEO Satellite SystemsHuadong Guo, Weiqing Huang, Wen Wang, Meng Zhang, Zhaohua Qiu, Jinglong Guo. 351-356 [doi]
- Hybrid Geometric/Shortest-path Routing in Proliferated Low-Earth-Orbit Satellite NetworksThomas H. Shake. 357-364 [doi]
- Blind Geolocation of RF-Signals with LEO Satellite FormationsDaniel Weinzierl, Christian A. Hofmann, Andreas Knopp. 365-370 [doi]
- Satellite Communications Resilience - Service Restoration and RetainmentRichard L. Gobbi, Elsa Schaefer, Jabril Jacobs, Dow Street. 371-376 [doi]
- CNN-based Emitter ID-Verification and Rogue Emitter Rejection for IoT Networks using Entropy-Informed RF-DNA FingerprintsAwab A. H. Mohammed, Mohamed A. Taha, Joshua H. Tyler, Mohamed K. M. Fadul, Donald R. Reising, T. Daniel Loveless. 377-384 [doi]
- Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep LearningYalin E. Sagduyu, Tugba Erpek. 385-390 [doi]
- MCRFF: A Meta-Contrastive Learning-Based RF Fingerprinting MethodMengqi Zhan, Yang Li, Huajun Cui, Bo Li, Jinchao Zhang, Chuanrong Li, Weiping Wang 0005. 391-396 [doi]
- Searchlight: An accurate, sensitive, and fast radio frequency energy detection systemRichard Bell, Kyle Watson, Tianyi Hu, Isamu Poy, Fredric J. Harris, Dinesh Bharadia. 397-404 [doi]
- An Interoperable Zero Trust Federated Architecture for Tactical SystemsAlexandre Poirrier, Laurent Cailleux, Thomas Heide Clausen. 405-410 [doi]
- Cooperative Agent System for Quantifying Link Robustness in Tactical NetworksJohannes F. Loevenich, Philipp Zißner, Paulo H. L. Rettore, Jonas Bode, Tobias Hürten, Thorsten Lampe, Roberto Rigolin Ferreira Lopes. 411-417 [doi]
- Zero-Shot Dynamic Neural Network Adaptation in Tactical Wireless SystemsShahriar Rifat, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia. 418-423 [doi]
- Learning to Sail Dynamic Networks: The MARLIN Reinforcement Learning Framework for Congestion Control in Tactical EnvironmentsRaffaele Galliera, Mattia Zaccarini, Alessandro Morelli, Roberto Fronteddu, Filippo Poltronieri, Niranjan Suri, Mauro Tortonesi. 424-429 [doi]
- Online Reduction of Exploration Space for Automated Underwater Modem OptimizationMarcel Rieß, Steffen Moser, Frank Slomka. 430-437 [doi]
- In-Band Full-Duplex Free-Space Optical Transceiver Design for Flying PlatformsMd Sarwar Uddin Chowdhury, Murat Yuksel. 438-443 [doi]
- Reliable Communication in a Multi-Transceiver Mobile Optical Wireless NetworkRiley Gartrell, Ryan Black, Kyle Bush, Mahmudur Khan 0001, James Moscola, Josh Gilbert. 444-449 [doi]
- Joint Jamming Alleviation for Mixed RF/FSO Relay Networks: Optimization and Learning ApproachesVan Hau Le, Ti Ti Nguyen, Kim Khoa Nguyen, Verdier Assoume, Satinder Singh. 450-455 [doi]
- Increasing the Supportable Number of WGS UsersRoy Axford, Jason DuChez. 456-463 [doi]
- Learning Technique to Solve Periodic Markov Decision Process for Network Resource AllocationZheyu Chen, Kin K. Leung, Shiqiang Wang 0001, Leandros Tassiulas, Kevin S. Chan, Patrick J. Baker. 464-470 [doi]
- Platform Management System Host-Based Anomaly Detection using TF-IDF and an LSTM AutoencoderEmilie Coote, Brian Lachine. 471-477 [doi]
- Online Learning Meets Semantic Communication over Wireless ChannelsJiarui Xu, Usama Saeed, Jonathan D. Ashdown, Lingjia Liu 0001. 478-483 [doi]
- Learning the Jointly Optimal Routing and Controller Placement Policy in Mobile Software-Defined NetworksIordanis Koutsopoulos. 484-490 [doi]
- Improving Robustness and Reducing Control Overhead via Dynamic Clustering in Tactical SDNPhilipp Zißner, Paulo H. L. Rettore, Bruno P. Santos, Roberto Rigolin Ferreira Lopes, Johannes F. Loevenich, Peter Sevenich. 491-496 [doi]
- Dominant Network SlicesBradley R. Smith. 497-503 [doi]
- Detection of Cyberattacks in an Software-Defined UAV Relay NetworkDennis Agnew, Alvaro del Aguila, Janise McNair. 504-509 [doi]
- Chip-Interleaved DSSS for Energy-Efficient Physical Layer EncryptionClément Leroy, Tarak Arbi, Oudomsack Pierre Pasquero, Benoit Geller. 510-515 [doi]
- DSSS Chip-Wise Faster-than-Nyquist Signaling with DPSK for Robust Carrier SynchronizationDamien Roque, Stéphanie Bidon, Charly Poulliat. 516-521 [doi]
- Power and second order cyclic covertness of chip-wise Direct Sequence Spread Spectrum Faster-Than-Nyquist signalingJean-Baptiste Fraisse, Pascal Chevalier 0001, Roland Gautier, François Delaveau, Sylvain Traverso. 522-527 [doi]
- Evaluating the practical range of harmonic radar to detect smart electronicsBeatrice Perez, Cesar Arguello, Timothy J. Pierson, Gregory J. Mazzaro, David Kotz. 528-535 [doi]
- Characterizing the Modification Space of Signature IDS RulesRyan Guide, Eric Pauley, Yohan Beugin, Ryan Sheatsley, Patrick D. McDaniel. 536-541 [doi]
- Adaptive Feature Engineering via Attention-based LSTM towards High Performance Reconnaissance Attack DetectionHamidah Alanazi, Shengping Bi, Tao Wang 0026, Tao Hou. 542-547 [doi]
- Transient Modeling of Topology-based Worms in Networks with Link InterferenceAdrian E. Conway, Era Vuksani, Kevin Wright, M. Patrick Collins. 548-553 [doi]
- SmiLe Net: A Supervised Graph Embedding-based Machine Learning Approach for NextG Vulnerability DetectionYifeng Peng, Jingda Yang, Sudhanshu Arya, Ying Wang. 554-561 [doi]
- Novel Nonlinear Neural-Network Layers for High Performance and Generalization in Modulation-Recognition ApplicationsJohn A. Snoap, Dimitrie C. Popescu, Chad M. Spooner. 562-567 [doi]
- Towards Scalable Automatic Modulation Classification via Meta-LearningJungik Jang, Jisung Pyo, Young-Il Yoon, Sang Yong Seo, Eun-Jae Lee, Gyeong Hun Jung, Jaehyuk Choi 0002. 568-573 [doi]
- Deep Learning-Based Demodulation in Impulse Noise ChannelsAndreas Andersson, Kristoffer Hägglund, Erik Axell. 574-579 [doi]
- Waveform Manipulation Against DNN-based Modulation Classification AttacksDimitrios Varkatzas, Antonios Argyriou. 580-585 [doi]
- Deep Learning based Fast and Accurate Beamforming for Millimeter-Wave SystemsTarun S. Cousik, Vijay K. Shah, Jeffrey H. Reed, Harry X. Tran, Rittwik Jana. 586-592 [doi]
- Secure Line-of-Sight Communications: Optimal Antenna Selection and Beamforming DesignZhenqiao Cheng, Nanxi Li, Jianchi Zhu, Xiaoming She, Chongjun Ouyang, Peng Chen 0028. 593-598 [doi]
- ATIC: Automated Testbed for Interference Testing in Communication SystemsMichelle Pirrone, M. Keith Forsyth, Jordan Bernhardt, Daniel Kuester, Aric Sanders, Duncan McGillivray, Adam Wunderlich. 599-604 [doi]
- On Reliability of CBRS Communications near U.S. Navy Installations in San DiegoAbhishek Chakraborty, Ramesh R. Rao. 605-610 [doi]
- Multi-Band Control Channel Architecture (MICCA): Mass Reconfiguration Protocol Design and Implementation UpdateMark D. Silvius, Mark A. McHenry, Alex Lackpour, Joe Molnar. 611-616 [doi]
- Analysis of Full-Duplex Radios With Transceiver Phase Noise on Spectrum-Tight BattlefieldsChangqing Song, Yuxi Zhou, Hongzhi Zhao, Shihai Shao. 617-621 [doi]
- A Method of Estimating Sparse and Doubly-Dispersive ChannelsBrandon T. Hunt, David B. Haab, Hussein Moradi, Behrouz Farhang-Boroujeny. 622-628 [doi]
- Turbo-VBI Based Off-Grid Channel Estimation for OTFS Systems with 2D-Clustered SparsityYuejin Ding, Ming Lei 0001, Ming-Min Zhao, Minjian Zhao 0001. 629-634 [doi]
- Expected Probability of Radiometric Detection by Channelized RadiometerKyle Watters, Edward J. Coyle. 635-642 [doi]
- Separating Interferers from Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided MacrosymbolKathleen Yang, Muriel Médard, Ken R. Duffy. 643-648 [doi]
- Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT NetworksSohan Gyawali, Kamran Sartipi, Benjamin Van Ravesteyn, Jiaqi Huang, Yili Jiang. 649-654 [doi]
- Neural SDEs for Robust and Explainable Analysis of Electromagnetic Unintended Radiated EmissionsSumit Kumar Jha 0001, Susmit Jha, Rickard Ewetz, Alvaro Velasquez. 655-660 [doi]
- Learnable Digital Twin for Efficient Wireless Network EvaluationBoning Li, Timofey Efimov, Abhishek Kumar, Jose Cortes, Gunjan Verma, Ananthram Swami, Santiago Segarra. 661-666 [doi]
- Towards Explainable Machine Learning: The Effectiveness of Reservoir Computing in Wireless Receive ProcessingShashank Jere, Karim Said, Lizhong Zheng, Lingjia Liu 0001. 667-672 [doi]
- Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the BattlefieldPedro Miguel Sánchez Sánchez, Enrique Tomás Martínez Beltrán, Alberto Huertas Celdrán, Robin Wassink, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller. 673-678 [doi]
- Dynamic, Real-Time Analysis, Patching and Protection of Vehicle System BinariesJames Brock, Lauren Provost, Rylee Stone, Stephen Padnos, Stephen Taylor, Jason Dahlstrom. 679-684 [doi]
- A Practical Perfect Secrecy Approach for IoBT SystemsMohammad Moltafet, Hamid R. Sadjadpour, Zouheir Rezki. 685-690 [doi]
- Security-as-a-Service for Embedded SystemsMichael Vai, Eric Simpson, Donato Kava, Alice Lee, Huy Nguyen, Jeffrey J. Hughes, Gabriel Torres, Jeffery Lim, Ben Nahill, Roger Khazan, Fred Schneider. 691-695 [doi]
- DUBIOUS: Detecting Unknown Backdoored Input by Observing Unusual SignaturesMatthew Yudin, Rauf Izmailov. 696-702 [doi]
- An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware ClassifiersAchyut Reddy, Sridhar Venkatesan, Rauf Izmailov, Alina Oprea. 703-709 [doi]
- Adversarial Pixel and Patch Detection Using Attribution AnalysisChase Walker, Dominic Simon, Sumit Kumar Jha 0001, Rickard Ewetz. 710-715 [doi]
- Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal SynthesisKurt A. Vedros, Constantinos Kolias, Robert C. Ivans. 716-721 [doi]
- Towards Effective Swarm-Based GPS Spoofing Detection in Disadvantaged PlatformsEnguang Fan, Anfeng Peng, Matthew Caesar 0001, Jae Kim, Josh D. Eckhardt, Greg Kimberly, Denis Osipychev. 722-728 [doi]
- Passive Geolocation of Multiple Pulsed EmittersKevin Joe. 729-734 [doi]
- Machine Learning Based Node Selection for UWB Network LocalizationCarlos A. Gómez-Vega, Moe Z. Win, Andrea Conti 0001. 735-740 [doi]
- LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in BinariesSiyuan Li, Chaopeng Dong, Yongpan Wang, Wenming Liu, Weijie Wang, Hong Li, Hongsong Zhu, Limin Sun. 741-746 [doi]
- Age of Critical Information: Optimizing Data Freshness Based on Content CriticalityQingyu Liu, Chengzhang Li, Y. Thomas Hou 0001, Wenjing Lou, Sastry Kompella. 747-754 [doi]
- Urgency of Information Optimization at Query in an Interactive SystemZhuoxuan Ju, Milos Doroslovacki. 755-760 [doi]
- Modeling and Generation of Realistic Network ActivityStefan Tschimben, Isabella Bates, James H. Curry, Keith D. Gremban, Alexandra Siegel. 761-766 [doi]
- Low-Delay Proactive Mechanisms for Resilient CommunicationMine Gokce Dogan, Martina Cardone, Christina Fragouli. 767-772 [doi]
- An Approach to Tactical Network Performance Analysis with In-Band Network Telemetry and Programmable Data PlanesRobert Starr, Matt Steele, Jonathon Cheah. 773-778 [doi]
- Revisiting the OLSRv2 Protocol Optimization in SDN-enabled Tactical MANETsIoannis Fourfouris, Merkouris Karaliopoulos, Dimitrios Kafetzis, Georgios Vardoulias, Apostolos Georgiadis, Spyridon Vassilaras, Iordanis Koutsopoulos. 779-786 [doi]
- Efficient Link-State Multicast Routing by Optimizing Link-Weight with MARLDo Dang, Kim Khoa Nguyen, Verdier Assoume, Satinder Singh. 787-792 [doi]
- Thwarting Adversarial Network Reconnaissance Through Vulnerability Scan Denial and Deception with Data Plane Programming and P4Sean Ha, Gavin Smith, Robert Starr. 793-798 [doi]
- Sidelink Mode 2 Operations in Unlicensed Bands: Design Challenges and Potential ApproachesVijitha Weerackody, Sumit Roy, Kent Benson, Eric Yang. 799-806 [doi]
- System-Level Evaluation of 5G NR UE-Based RelaysSamantha Gamboa, Aziza Ben Mosbah, Wesley Garey, Chunmei Liu, Richard Rouil. 807-814 [doi]
- Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic SolutionYalin E. Sagduyu, Tugba Erpek, Yi Shi 0001. 815-820 [doi]
- mMLSnet: Multilevel Security Network with MobilityMingli Yu, Quinn K. Burke, Thomas La Porta, Patrick D. McDaniel. 821-826 [doi]
- Dynamic Interference-Avoiding MIMO LinksSanaz Naderi, Dimitris A. Pados, George Sklivanitis, Elizabeth Serena Bentley, Joseph Suprenant, Michael J. Medley. 827-832 [doi]
- Second-Order Analysis of Secret-Key Capacity From a MIMO ChannelAhmed Maksud, Yingbo Hua. 833-838 [doi]
- Experimental Evaluation of AoA Estimation for UAV to Massive MIMOTarence Rice, Divyanshu Pandey, David Ramirez, Edward W. Knightly. 839-844 [doi]
- Secure Beamforming in DLA-Based CAP-MIMOZhenqiao Cheng, Nanxi Li, Jianchi Zhu, Xiaoming She, Chongjun Ouyang, Peng Chen 0028. 845-851 [doi]
- Majority Vote Computation With Complementary Sequences for Distributed UAV GuidanceAlphan Sahin, Xiaofeng Wang. 852-857 [doi]
- Hybrid Multi-Agent Deep Reinforcement Learning for Active-IRS-Based Rate Maximization Over 6G UAV Mobile Wireless NetworksShuming Yi, Fei Wang, Xi Zhang. 858-863 [doi]
- On the secrecy performance of aerial IRS-assisted wireless communicationsXiaolei Guo, Shunliang Zhang. 864-869 [doi]
- Enhancing Real-Time Training of Heterogeneous UAVs Using a Federated Teacher-Student Self-Training FrameworkPiyush Nikam, Dhruv Shah, Aryan Sahu, Neena Goveas, Sreejith Vidhyadharan. 870-875 [doi]
- TISIN: Traceable Information Sharing in Intermittent NetworksWenyi Tang, Taeho Jung, E. Paul Ratazzi. 876-881 [doi]
- Characterizing the Performance of Distributed Edge Processing Resource Allocation in Dynamic Networked EnvironmentsOlena Tkachenko, Sean Harding, Cleon Anderson, Jake B. Perazzone, Matthew Dwyer 0004, Kevin S. Chan. 888-893 [doi]
- Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS EnhancementJuan David Pabon, Matthew C. Valenti, Xi Yu. 894-900 [doi]
- Implementing Jamming Detection on FPGA: An Accelerated Forward Consecutive Mean Excision ApproachSong Ma, Xiaonan Chen, Jingzhou Wang, Jun Wang, Xueying Li, Shengtang Zhou, Yading Chen, Qihang Peng. 901-906 [doi]
- Persistent Throughput-Optimal Scheduling for Smart Jamming ResiliencyMaya E. Flores, Thomas Stahlbuhk, Alexander M. Wyglinski. 907-912 [doi]
- Tradespace Performance Study of Polarization-Insensitive Spatial Filtering for Jamming SuppressionJohn N. Spitzmiller. 913-918 [doi]
- Detection and Classification of Smart Jamming in Wi-Fi Networks Using Machine LearningZhengguang Zhang, Marwan Krunz. 919-924 [doi]
- Generalizing Machine Learning Models for Zero-Day Encrypted Messaging ApplicationsJason Hussey, Kerri Stone, Tracy Camp. 925-930 [doi]
- A Conditional Analysis of RF ML Latent FeaturesScott Kuzdeba, Josh Robinson. 931-936 [doi]
- Input Output Grammar Coverage in FuzzingAndrew Fryer, Thomas Dean, Brian Lachine. 937-943 [doi]
- Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability SolvingSumit Kumar Jha 0001, Susmit Jha, Patrick Lincoln, Nathaniel D. Bastian, Alvaro Velasquez, Rickard Ewetz, Sandeep Neema. 944-949 [doi]
- Time-Diverse Doppler-only LEO PNTMegan O. Moore, R. Michael Buehrer, William C. Headley. 950-956 [doi]
- Fairness-Aware Scheduling Optimization for NB-IoT in LEO Satellite Networks Using a 3D Spherical Coordinate SystemByeongheon Lee, Ju Hyung Lee, Young-Chai Ko. 957-962 [doi]
- Non-Terrestrial Network (NTN): a Novel Alternate Fractional Programming for the Downlink Channels Power AllocationMahfuzur Rahman, Md. Zoheb Hassan, Jeffrey H. Reed, Lingjia Liu 0001. 963-968 [doi]