Abstract is missing.
- Joint Detection and Classification of Communication and Radar Signals in Congested RF Environments Using YOLOv8Xiwen Kang, Huamei Chen, Genshe Chen, Kuo-Chu Chang, Thomas M. Clemons. 1-6 [doi]
- +: Modeling and Simulation for Detecting Cognitive Biases in Advanced Persistent ThreatsShuo Huang, Fred Jones, Nikolos Gurney, David V. Pynadath, Kunal Srivastava, Stoney Trent, Peggy Wu, Quanyan Zhu. 1-6 [doi]
- Performance of TDOA Localization Versus Relay Assisted Communication SystemKevin Naranjo. 1-6 [doi]
- Constellation-Based Detection for Frequency Spread OFDM UnderlayXiang Cheng, Daniel J. Jakubisin, Hanchao Yang, Kumar Sai Bondada, Nishith D. Tripathi, Yaling Yang, Gustave Anderson, Jeffrey H. Reed. 1-6 [doi]
- Post-hoc Uncertainty Quantification for Neurosymbolic Artificial IntelligenceAlexander M. Berenbeim, Ramneet Kaur, Adam D. Cobb, Anirban Roy, Susmit Jha, Nathaniel D. Bastian. 1-6 [doi]
- Vulnerability Analysis of Dynamic Directional Modulations: a Multi-Sensor Receiver AttackJules Burgat, Jean-Baptiste Doré, Joumana Farah, Matthieu Crussière. 1-6 [doi]
- A Performance Prediction-based DNN Partitioner for Edge TPU PipeliningBohua Zou, Binqi Sun, Yigong Hu, Tomasz Kloda, Marco Caccamo, Tarek F. Abdelzaher. 1-6 [doi]
- Enhancing NextG Wireless Security: A Lightweight Secret Sharing Scheme with Robust Integrity Check for Military CommunicationsAbhisek Jha, SeyedMohammad Kashani, Hossein Mohammadi, Andre Kirchner, Minglong Zhang, Rémi A. Chou, Sang Wu Kim, Hyuck M. Kwon, Vuk Marojevic, Taejoon Kim. 1-6 [doi]
- Iterative MIMO Detection Using Stochastic SamplingStephen N. Jenkins, Behrouz Farhang-Boroujeny. 1-6 [doi]
- Analyzing Power Correlation Distributions for Dynamic Spectrum Awareness in 5G NetworksAndrew Ashdown, John J. Kelly, Jonathan Ashdown, Ian Kurzrock, Caden Turck, Francesco Restuccia 0001. 1-6 [doi]
- When URLLC is Worse than Rayleigh: Error Rates of Lomax FadingSébastien Roy, Matthew C. Valent. 1-6 [doi]
- Laplacian-ORBGRAND: Decoding for Impulsive NoiseJiewei Feng, Ken R. Duffy, Muriel Médard. 1-6 [doi]
- Exploiting Multi-Domain Features for Detection of Unclassified Electromagnetic SignalsXue Wei, Dola Saha, Anna Quach. 1-6 [doi]
- Error correction in interference-limited wireless systemsCharles Wiame, Ken R. Duffy, Muriel Médard. 1-6 [doi]
- Bit Interleaved and Coded Modulation with Indexed Partitions for Physical Layer SecurityLina Mroueh, Idowu Ajayi. 1-6 [doi]
- Wideband Cooperative Jamming with Band-Limited Known-Interference CancellationKarel Pärlin, Vincent Le Nir, Tommi Meriläinen, Aaron Byman, Marc Adrat, Taneli Riihonen. 1-6 [doi]
- Augmenting Training Data with Vector-Quantized Variational Autoencoder for Classifying RF SignalsSrihari Kamesh Kompella, Kemal Davaslioglu, Yalin E. Sagduyu, Sastry Kompella. 1-6 [doi]
- Rejection Capability of Anti-Jamming Wiener Filter for Multi-Tone Interference in DSSS SystemsCorentin Fonteneau, Matthieu Crussière, Alexis Bazin, Oudomsack Pierre Pasquero. 1-6 [doi]
- Propeller Modulation Equalization via Reference TonesMostafa Ibrahim, Sabit Ekin. 1-5 [doi]
- Applying Models of Historical Mujahideen Ambushes and Raids to Cyber Deception Practitioner DesignTim Pappa, Aadam Dirie, James Bradford. 1-6 [doi]
- Defining and Measuring Deception in Sequential Decision Systems: Application to Network DefenseYerin Kim, Alexander Benvenuti, Bo Chen, Mustafa O. Karabag, Abhishek Ninad Kulkarni, Nathaniel D. Bastian, Ufuk Topcu, Matthew T. Hale. 1-6 [doi]
- Spectrum Utilization Efficiency Analysis in 3D UAV NetworksKasun Prabhath, Sudharman K. Jayaweera. 1-6 [doi]
- On the Optimal Radius and Subcarrier Mapping for Binary Modulation on Conjugate-Reciprocal ZerosParker Huggins, Alphan Sahin. 1-6 [doi]
- Improving Receiver Detection Performance Through NLOS/LOS VisionSamuel B. Brown, Harpreet S. Dhillon. 1-6 [doi]
- Distributed and Secure Spectrum Sharing for 5G and 6G NetworksArupjyoti Bhuyan, Xiang Zhang 0019, Mingyue Ji. 1-5 [doi]
- Securing the Cloud-Native 5G Control PlaneUmakant Kulkarni, Sonia Fahmy. 1-6 [doi]
- I-SCOUT: Integrated Sensing and Communications to Uncover Moving Targets in NextG NetworksUtku Demir, Kemal Davaslioglu, Yalin E. Sagduyu, Tugba Erpek, Gustave Anderson, Sastry Kompella. 1-6 [doi]
- Elements of disinformation theory: cyber engagement via increasing adversary information consumptionTravis C. Cuvelier, Sean Ha, Maretta Morovitz. 1-8 [doi]
- Unveiling MIMO Potential: A Prototype for Enhanced Tactical Communications with Interference SuppressionKin-Ping Hui, Damien Phillips, Asanka Kekirigoda, Alan Allwright, J. Andrew Zhang, Hao Zhang 0082, Anh Tuyen Le, Beeshanga Abewardana Jayawickrama. 1-6 [doi]
- A mmWave Software-Defined Array Platform for Wireless Experimentation at 24-29.5 GHzAshwini Pondeycherry Ganesh, Anthony Perre, Alphan Sahin, Ismail Güvenç, Brian A. Floyd. 1-6 [doi]
- An Improved Weight Selection Algorithm for Interference Mitigation in Paraboloidal Reflector Antennas with Reconfigurable Rim ScatteringXinrui Li, R. Michael Buehrer, Steven W. Ellingson. 1-7 [doi]
- Interference Analysis of WLAN and 5G Coexisting with Fixed Satellite Services in the 6 GHz BandNadia Yoza-Mitsuishi, Yao Ma, Jason Coder. 1-6 [doi]
- Distributed Array Processing for Multi-Platform Signal IntelligenceDany Mestas, Thomas Delamotte, Hervé Legay, Andreas Knopp. 1-6 [doi]
- Optimizing the Tradeoff Between Incumbent Protection and Secondary Transmissions with AFCYao Ma, Nadia Yoza-Mitsuishi, Susanna Mosleh, Jason Coder. 1-6 [doi]
- Utility of Aged Measurements for LocalizationWasif J. Hussain, Gaurav Duggal, Harpreet S. Dhillon, R. Michael Buehrer. 1-6 [doi]
- Joint Interference Cancellation with Imperfect CSIZhibin Zou, Xue Wei, Xin Tian 0002, Genshe Chen, Aveek Dutta, Khanh Pham, Erik Blasch. 1-6 [doi]
- High Performance Pipe-lined Architecture for Open FEC EncoderThang Xuan Pham, Alex R. Chiriyath, Arindam Dutta, Owen Ma, Andrew Herschfelt, Daniel W. Bliss. 1-6 [doi]
- Reinforcement Learning over Noisy Channels: An Information Bottleneck ApproachClement Kam, Joseph P. Macker, Yin Sun. 1-6 [doi]
- Noncontiguous Channel Bonding in the High Frequency BandBrandon T. Hunt, Behrouz Farhang-Boroujeny. 1-6 [doi]
- COSMIC DAWN: Distributed Analysis of Wireless at NextscaleMichael M. Wise, Narasinga Rao Miniskar, Seth D. Hitefield, Mohammed M. Olama, Jeffrey S. Vetter. 1-6 [doi]
- Enhancing Resilience in Distributed ML Inference Pipelines for Edge ComputingLi Wu, Walid A. Hanafy, Abel Souza, Tarek F. Abdelzaher, Gunjan Verma, Prashant J. Shenoy. 1-6 [doi]
- Spectrum-Efficient LDPC Codes for CPMErik Perrins. 1-8 [doi]
- Detecting Weak Wideband Signals in Interference-Dominated EnvironmentsRegan Williamson, A. A. Louis Beex, Joseph D. Gaeddert. 1-7 [doi]
- Large Language Models for Automatic Standardization of Cyber Deception Plans based on the Adversary Engagement OntologyNancirose Piazza, Bibek Upadhayay, Ronald Scarpa, Vahid Behzadan. 1-5 [doi]
- Collaborative Inference in Resource-Constrained Edge Networks: Challenges and OpportunitiesNathan Ng, Abel Souza, Suhas N. Diggavi, Niranjan Suri, Tarek F. Abdelzaher, Don Towsley, Prashant J. Shenoy. 1-6 [doi]
- Quickest Change Detection in the Presence of Covert AdversariesAmir Reza Ramtin, James Zachary Hare, L. Kaplan, Philippe Nain, Venugopal V. Veeravalli, Don Towsley. 1-6 [doi]
- Blind Interference Suppression using Polyphase Channelizers and Rank-Reduced Array ProcessingLauren O. Lusk, Joseph D. Gaeddert. 1-6 [doi]
- Opportunistic Power Control for Physical Layer SecurityKennedy A. Lee, John R. Barry. 1-6 [doi]
- Maritime On-the-Move Troposcatter for Resilient Naval CommunicationsScott Enserink, Jia-Chi Samuel Chieh, Santanu Das, Sunoy Banerjee. 1-6 [doi]
- ACI-IoT-2023: A Robust Dataset for Internet of Things Network Security AnalysisEmily A. Nack, Morgan C. McKenzie, Nathaniel D. Bastian. 1-6 [doi]
- Adapting Complex Event Detection to Perceptual Domain ShiftsBrian Wang, Julian de Gortari Briseno, Liying Han, Henry Phillips, Jeffrey Craighead, Ben Purman, Lance M. Kaplan, Mani Srivastava 0001. 1-6 [doi]
- ADAPT: A Game-Theoretic and Neuro-Symbolic Framework for Automated Distributed Adaptive Penetration TestingHaozhe Lei, Yunfei Ge, Quanyan Zhu. 7-12 [doi]
- Uncertainty-Quantified Neurosymbolic AI for Open Set Recognition in Network Intrusion DetectionJacob Sander, Chung-En Johnny Yu, Brian Jalaian, Nathaniel D. Bastian. 13-18 [doi]
- Co-Design of Decision Trees for Network Intrusion Detection at the Edge on Digital vs. Analog HardwareJoseph Riem, Lei Zhang, Jingdi Chen, Henry Mackay, Tian Lan 0001, Nathaniel D. Bastian, Gina C. Adam. 39-44 [doi]
- Multi-Agent Reinforcement Learning for Distributed Workflow Orchestration at the Tactical EdgeAlessandro Amato, Alessandro Morelli, Mattia Fogli, Raffaele Galliera, Niranjan Suri. 64-69 [doi]
- Multipath Cluster Analysis for Device-to-Device Terahertz Outdoor MeasurementsZihang Cheng, Naveed A. Abbasi, Jorge Gomez-Ponce, Jianzhong Charlie Zhang, Andreas F. Molisch. 105-110 [doi]
- PanTera: RF-SoC Testbed using PYNQ Platform for 147 GHz SDR with 64 Mbps at up to 2 kmKasun Karunanayake, Arjun Singh, Josep Miquel Jornet, Arjuna Madanayake. 111-116 [doi]
- Exploring Jamming Threats and Defense Mechanisms in future 6G Communication SystemsAmina Fellan, Hubert Djuitcheu, Daniel Lindenschmitt, Hans D. Schotten. 117-122 [doi]
- Detecting Small Targets With a Terahertz RadarKarl L. Strecker, G. Levi Captain, Forrest Tuschhoff, Rajind Mendis, John F. O'Hara. 123-128 [doi]
- 5G/O-RAN Security Automated TestingDimitri Dessources, Samuel Appiah-Mensah, Connor Amato, Dhairya Parikh, Joseph D. Bull, Eric W. Burger. 129-134 [doi]
- Military Communications in the 6G Era: Finnish PerspectiveHarri Saarnisaari, Marko Höyhtyä, Heikki Rantanen, Juha Mäkelä. 135-140 [doi]
- Towards Robust and Secure Autonomous Cyber Defense Agents in Coalition NetworksJohannes F. Loevenich, Tobias Hürten, Florian Spelter, Erik Adler, Johannes Braun, Linnet Moxon, Yann Gourlet, Thomas Lefeuvre, Roberto Rigolin F. Lopes. 152-157 [doi]
- Training Autonomous Cyber Defense Agents: Challenges & Opportunities in Military NetworksJohannes F. Loevenich, Erik Adler, Adrien Bécue, Alexander Velazquez, Konrad S. Wrona, Vasil Boshnakov, Jerry Falkcrona, Nils Nordbotten, Olwen L. Worthington, Juha Röning, Roberto Rigolin F. Lopes. 158-163 [doi]
- BRETAGNE: Building a Reproducible and Efficient Training AI Gym for Network EnvironmentsYann Gourlet, Thomas Lefeuvre, Johannes F. Loevenich, Tobias Hürten, Florian Spelter, Erik Adler, Johannes Braun, Linnet Moxon, Roberto Rigolin F. Lopes. 164-169 [doi]
- Exploring the Potential of Large Language Models for Red Teaming in Military Coalition NetworksErik Adler, Johannes F. Loevenich, Linnet Moxon, Tobias Hürten, Florian Spelter, Johannes Braun, Yann Gourlet, Thomas Lefeuvre, Roberto Rigolin F. Lopes. 170-175 [doi]
- Hierarchical Multi-Agent Reinforcement Learning for Autonomous Cyber Defense in Coalition NetworksTobias Hürten, Johannes F. Loevenich, Florian Spelter, Erik Adler, Johannes Braun, Linnet Moxon, Yann Gourlet, Thomas Lefeuvre, Roberto Rigolin F. Lopes. 176-181 [doi]
- Trust or Bust: Ensuring Trustworthiness in Autonomous Weapon SystemsKasper Cools, Clara Maathuis. 182-189 [doi]
- Quantum-Resistant One-to-One Communication for Underwater Acoustic NetworksKonrad S. Wrona, Oliwer Sobolewski, Joanna Sliwa 0001, Miroslaw Kutylowski, Przemyslaw Kubiak 0001, Gabriel Wechta, Adrian Cinal, Mateusz Lesniak, Michal Wronski. 190-195 [doi]
- Quantum-Resistant Key Management for Underwater Acoustic Multicast CommunicationOliwer Sobolewski, Konrad S. Wrona, Adrian Cinal, Gabriel Wechta, Joanna Sliwa 0001, Mateusz Lesniak, Michal Wronski, Miroslaw Kutylowski, Przemyslaw Kubiak 0001. 196-201 [doi]
- GPS Spoofing Detection with a Random Forest Multiclass ClassifierBhawana Poudel Devkota, Lucas Saunders, Raju Dhakal, Laxima Niure Kandel. 202-208 [doi]
- Model Poisoning Detection via Forensic AnalysisGalamo F. Monkam, Nathaniel D. Bastian. 209-214 [doi]
- Co-Synthesis of Code and Formal Models Using Large Language Models and FunctorsSumit Kumar Jha 0001, Susmit Jha, Rickard Ewetz, Alvaro Velasquez. 215-220 [doi]
- Deep Learning Based Joint Multi-User MISO Power Allocation and Beamforming DesignCemil Vahapoglu, Timothy J. O'Shea, Tamoghna Roy, Sennur Ulukus. 239-244 [doi]
- Harnessing the Power of LLMs in Source Code Vulnerability DetectionAndrew Arash Mahyari. 251-256 [doi]
- Modeling of THz Propagation in a Congested Workbench Environment Towards 6G D2D SystemsSahaj K. Jha, Naveed A. Abbasi, Seun Sangodoyin. 263-269 [doi]
- Long-Distance, Multi-Gigabit-Per-Second Terahertz Wireless CommunicationJohn F. O'Hara, Karl L. Strecker, G. Levi Captain, Forrest Tuschhoff, Rajind Mendis, Mark D'Agostino, Joseph Gates. 270-275 [doi]
- Design and Characterization of Dual-Band Complementary Split-Ring Resonator Array in the D-Band for 6G Wireless NetworksLaxmi Chapagain, Shuai Nie. 276-281 [doi]
- Deep Learning Model-Based Channel Estimation for THz Band Massive MIMO with RF ImpairmentsPulok Tarafder, Imtiaz Ahmed 0001, Danda B. Rawat, Ramesh Annavajjala, Kumar Vijay Mishra. 282-287 [doi]
- SAR Data Generation Using Denoising Diffusion Probabilistic ModelsTrey Crump, Sastry Kompella, Clement Kam, Leandros Tassiulas. 288-293 [doi]
- Joint Long-Term Processed Task and Communication Delay Optimization in UAV-Assisted MEC Systems Using DQNMaryam Farajzadeh Dehkordi, Bijan Jabbari. 294-299 [doi]
- Agile 5G Networks: Advance Traffic Steering xAPP for Interference MitigationHanchao Yang, Connor McPeak, Rakesh Nagampally, Nishith D. Tripathi, Gustave Anderson, Jeffrey H. Reed, Yaling Yang, Daniel J. Jakubisin. 300-305 [doi]
- Aircraft Radar Altimeter Interference Mitigation Through a CNN-Layer Only Denoising Autoencoder ArchitectureSamuel B. Brown, Stephen Young, Adam Wagenknecht, Daniel Jakubisin, Charles E. Thornton, Aaron Orndorff, William C. Headley. 306-311 [doi]
- Bio-Inspired Neural Group Testing for Scalable Inference in Sparse Radar DetectionCharles Montes, Ashkan Beigi, Armani Tayeh, Ruolin Zhou. 312-317 [doi]
- Sidelink-Enabled Cooperative Localization for xG Non-Terrestrial NetworksJames C. Morrison, Nathan Schatz, Seungnyun Kim, Girim Kwon, Bernardo Camajori Tedeschini, Vijitha Weerackody, Andrea Conti 0001, Moe Z. Win. 318-323 [doi]
- Is 9D localization possible with unsynchronized LEO Satellites?Don-Roberts Emenonye, Harpreet S. Dhillon, R. Michael Buehrer. 324-329 [doi]
- Joint 9D Receiver Localization and Ephemeris Correction with LEO and 5G Base StationsDon-Roberts Emenonye, Harpreet S. Dhillon, R. Michael Buehrer. 330-335 [doi]
- Tracking and Identification of Targets via mmWave MIMO RadarAlessandro Vaccari 0002, Moe Z. Win, Andrea Conti 0001. 336-341 [doi]
- Randomized 3D Neighbor Discovery with Mechanically Steered FSO TransceiversZaheen E. Muktadi Syed, Murat Yuksel. 342-347 [doi]
- Operating System Fingerprint Forgery with Data-Plane Programming for Network-level Cyber Deception and Adversary EngagementRobert Starr, Sean Ha, Gavin Smith. 380-385 [doi]
- Security-by-Design for Cross-Constellation Satellite CommunicationsMichael Vai, Shankararaman Ramakrishnan, Joseph Greco, Christopher Hayes, Lori L. Jeromin, Todd Ulmer, John Moores, Jonah Tower, Michael Butterfield, Gregory Kuperman. 386-391 [doi]
- Securing SoC Processors by Routing Memory Transactions Through FPGA FabricRyan Longwell, Abbie Cliche, James Brock, Jason Dahlstrom, Stephen Taylor. 392-398 [doi]
- RAMBLE: Bluetooth Low Energy from DDR5 Memory BusesBrandon John, Erez Binyamin, Brendan Mulholland. 399-404 [doi]
- TTPatternMiner: Automated Learning and Characterization of Attack Pattern from Malicious Cyber CampaignSharif Ullah, Sachin Shetty, Abdul-Rahman, Amin Hass, Xiaoyong Yuan. 405-411 [doi]
- 5G Specifications Formal Verification with Over-the-Air Validation: Prompting is All You NeedTom Wray, Ying Wang. 412-418 [doi]
- Deep Learning based Jammer Localization in Mobile Communication NetworksChethan Kumar Anjinappa, Dennis Hui, Kumar Balachandran. 419-424 [doi]
- Deep Reinforcement Learning Based Secrecy Performance Optimization for Aerial IRS-Assisted CommunicationsXiaolei Guo, Shunliang Zhang, YinLong Liu. 425-430 [doi]
- Drone RF Signal Detection and Fingerprinting: UAVSig Dataset and Deep Learning ApproachTianyi Zhao, Benjamin W. Domae, Connor Steigerwald, Luke B. Paradis, Tim Chabuk, Danijela Cabric. 431-436 [doi]
- GrizzlyBay: Retroactive SBOM with Automated Identification for Legacy BinariesJunghwan John Rhee, Fei Zuo, Cody Tompkins, Jeehyun Oh, Yung Ryn Choe. 437-444 [doi]
- Machine Learning Prediction of Multi-Band Clutter Loss using Deep Neural NetworksDerrick Dominic, W. Joseph Durkin, Masoud Farshchian, Harris Zebrowitz, Amy Baker, Fredrick Howard. 445-450 [doi]
- Complex-Valued Neural Networks for Distributed Machine Learning Assisted RF PositioningJung-Fu Thomas Cheng, Atieh Rajabi Khamesi, Yufei W. Blankenship. 451-456 [doi]
- Efficient Data Dissemination via Semantic Filtering at the Tactical EdgeLorenzo Colombi, Simon Dahdal, Edoardo Di Caro, Roberto Fronteddu, Alessandro Gilli, Alessandro Morelli, Filippo Poltronieri, Mauro Tortonesi, Niranjan Suri, Cesare Stefanelli. 457-462 [doi]
- Designing Near-Optimal Partially Observable Reinforcement LearningMing Shi 0003, Yingbin Liang, Ness B. Shroff. 463-468 [doi]
- Enhancing Battlefield Awareness: An Aerial RIS-assisted ISAC System with Deep Reinforcement LearningHyunsang Cho, Seonghoon Yoo, Bang Chul Jung, Joonhyuk Kang. 469-474 [doi]
- Let's Take This Upstairs: Localizing Ground Transmitters With High-Altitude BalloonsMatthias Schäfer, Yago Lizarribar, Gérôme Bovet, Dieter Verbruggen. 475-480 [doi]
- Designing a Communication Relay Network for Multi-Domain Maritime OperationsCherry Y. Wakayama, Randall S. Plate, Danielle F. Morey, Zelda B. Zabinsky. 481-486 [doi]
- Hierarchical Adaptation of Multiagent Deep Reinforcement Learning for Multi-Domain Uncrewed Aerial and Ground Vehicle CoordinationIan Ellis Lamptey Hulede, Amitav Mukherjee, Jonathan Ashdown. 487-492 [doi]
- Analyzing Cache Timing-based Side Channel Vulnerability through Cache Line CompositionYuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng. 517-522 [doi]
- BACON: Improving Broadcast Audio AuthenticationTheo Gasteiger, Pericle Perazzo, Markus Schuß, Carlo Alberto Boano, Fikret Basic, Gianluca Dini, Kay Römer. 523-529 [doi]
- Behavior Recognition and Anomaly Detection Utilizing Memory Electromagnetic EmanationJinglong Guo, Yanyun Xu, Meng Zhang 0020, Weiqing Huang, Huadong Guo. 530-535 [doi]
- Blockmesh Data Security and Trust Framework for Tactical NetworksJim Luo, Alexander Velazquez. 536-541 [doi]
- Decentralized Cooperative Multi-Agent Deep Reinforcement Learning for Real-Time Optimization of Emulated Ad-Hoc Radio NetworksThies Möhlenhof, Norman Jansen. 542-547 [doi]
- Optimizing Synchronization Times for Tracking a Mobile Asset in GPS-denied Environments using Deep Q-LearningCaleb M. Bowyer, John M. Shea, Tan F. Wong, Warren E. Dixon. 548-553 [doi]
- Semi-decentralized Message Allocation for Cell-Free Networks using Unsupervised LearningNoel Teku, Ravi Tandon, Tamal Bose. 554-559 [doi]
- Enhancing Interference Mitigation via Hybrid Action Space Control Deep Reinforcement LearningMadan Dahal, Mojtaba Vaezi. 560-565 [doi]
- Obstacle-Aware UAV Swarm Deployment for User Coverage Using Deep Reinforcement LearningShilan He, Kyo Hyun Kim, Matthew Caesar 0001, Jae Kim, Josh D. Eckhardt, Greg Kimberly. 566-571 [doi]
- Open-Source Quadcopter for Autonomous UAV Networks for Surveillance using Zigbee Radios and Thermal ImagingJustin Hynes, Alejandro Marcovich, Gustavo Vejarano. 572-577 [doi]
- Graph Neural Network-Based Intrusion Detection System for a Swarm of UAVsUmair Ahmad Mughal, Rachad Atat, Muhammad Ismail 0001. 578-583 [doi]
- D-planner: An Efficient Surrounding-aware Multi-drone System for Urban MonitoringTianhao Yu, Matthew Caesar 0001, Shadman Saqib Eusuf. 584-589 [doi]
- A Step Towards Modern Disinformation Detection: Novel Methods for Detecting LLM-Generated TextSamuel Nathanson, Yungjun Yoo, David Na, Yinzhi Cao, Lanier Watkins. 615-620 [doi]
- Disinformation at Scale: Detecting AI-Human Composite Images via Convolution EnsemblesYungjun Yoo, David Na, Samuel Nathanson, Yinzhi Cao, Lanier Watkins. 621-626 [doi]
- Fine-Grained Location Privacy Protection in 6G ISAC Systems Using Deep LearningMahmudaAkter Keya, Xionglin Zu, Jiawei Yuan, Yaqi He, Kai Zeng 0001, Long Jiao. 627-632 [doi]
- Intelligence, Surveillance and Reconnaissance Task Specifications in Temporal LogicsLaura L. Pullum, Sumit Kumar Jha 0001, Rickard Ewetz. 633-638 [doi]
- Real-world Demonstration of Secure 5G Roaming for Military CommunicationsArupjyoti Bhuyan, Marius Gheorghevici. 639-640 [doi]
- Demonstration of a Real-Time Testbed for D-Band Integrated Sensing and CommunicationSven Wittig, Rodrigo Hernangómez, Karen Vardanyan, Ramez Askar, Amr Haj-Omar, Michael Peter, Slawomir Stanczak. 641-642 [doi]
- Demonstration of 5G non-terrestrial network regenerative L1 processingRobert G. Maunder, Lam Wui Kin, David Harvey. 645-646 [doi]
- AVOID: Automatic Verification Of Internet Data-pathsAlexander Marder, Jon Larrea, kc claffy, Erik Kline, Kyle Jamieson, Bradley Huffaker, Lincoln Thurlow, Matthew Luckie. 647-648 [doi]
- Demo: AiR Cognitive Agent Platform for Robust & Resilient Heterogeneous Wireless NetworksShyam Yadati, Bryan Crompton, Dap Tran, Dukhyun Kim, Apurva Mody. 649-650 [doi]
- Listen-While-Talking: Toward dApp-based Real-Time Spectrum Sharing in O-RANRajeev Gangula, Andrea Lacava, Michele Polese, Salvatore D'Oro, Leonardo Bonati, Florian Kaltenberger, Pedram Johari, Tommaso Melodia. 651-652 [doi]
- Real-Time Localization of Objects using Radio Frequency Propagation in Digital TwinSunday Amatare, Gaurav Singh, Aavash Kharel, Debashri Roy. 653-654 [doi]
- Demo Abstract: End-to-end Dynamic Spectrum Sharing on Open-Source 5G TestbedSean Furman, Timothy Woods, Daniel O'Connor. 655-656 [doi]
- A Demonstration of 5G Sidelink-Enabled MANETs Within CORE/EMANE FrameworkJamie Sloop, Evan Allen, Charles E. Thornton, Lingjia Liu 0001, Fred Templin, Daniel J. Jakubisin. 657-658 [doi]
- Practical Waveform Generation and Labeling for Radio Frequency ApplicationsWilliam H. Clark, Thomas Coulon, Elliott Rheault, Alan J. Michaels. 659-660 [doi]
- Demoing Spectral Warrior: A Virtual Reality Gamification of Radio Frequency ConceptsElliott Rheault, Isaac Tucker, Jason Cox, Tyler Rodgers, William C. Headley. 661-662 [doi]
- Demonstration of Advanced Regenerative 5G NTN NR Satellite Base Station PrototypeAlison Keefe, Suresh Iyer. 663-665 [doi]
- Experimental Analysis of Covert CDMA Against Energy and Cycle Detecting AdversariesS. Johnson, Morriel Kasher, R. Aggarwal, J. Callinan, M. Elo, Predrag Spasojevic, Fikadu T. Dagefu, J. Kong, J. Choi, B. Kim. 666-667 [doi]
- Demonstration of Person Presence Detection Using 5G Synchronization Signals on SDR TestbedIan Ellis Lamptey Hulede, Manu Dwivedi, Oscar Venegas, Saeede Enayati, Akhash Subramanian Shunmugam, Amitav Mukherjee. 668-669 [doi]
- Waveform Shaping in Integrated Sensing and CommunicationsHusheng Li, Zhu Han 0001, H. Vincent Poor. 670-671 [doi]
- Demonstration of 5G DCI Obfuscation with a Spread UnderlayConnor McPeak, Kumar Sai Bondada, Nishith D. Tripathi, Gus Anderson, Jeffrey H. Reed, Daniel J. Jakubisin. 672-673 [doi]
- Enhancing 5G Spectrum Agility Through O-RAN xApp Initiated HandoversConnor McPeak, Rakesh Reddy Nagampally, Hanchao Yang, Nishith D. Tripathi, Gus Anderson, Jeffrey H. Reed, Daniel J. Jakubisin. 674-675 [doi]
- Demonstration of 5G NTN Solution based on O-RAN ArchitectureRaviKanth Pasumarthy, Rajat Kapoor. 676-677 [doi]
- Opportunistic eXtemporarY 5G Encrypted Networks (OXYGEN) with SidelinksColin Funai, Christopher VanderValk, Syed Naqvi, Bishal Thapa. 678-679 [doi]
- Fortifying 5G Networks: Defending Against Jamming Attacks with Multipath CommunicationsHossein Mohammadi, Minglong Zhang, Abhisek Jha, Vuk Marojevic, Remi A. Chou, Taejoon Kim. 680-681 [doi]
- Demonstration of Low-overhead Zero Trust at the Tactical Warfighting EdgeSaketh Poduvu, Roshan Lal Neupane, Alicia Esquivel Morel, Reshmi Mitra, Vijay Anand, Rohit Chadha, Prasad Calyam. 682-683 [doi]
- 5G ORAN O-RU Emulator Implemented on the USRP SDR in the FR1 and FR3 BandsNeel Pandeya, Amr Haj-Omar, Aditya Dhananjay, Michael Zappe. 684-685 [doi]
- A Software-Defined Radio based O-RAN Platform for xApp Conflict Detection and MitigationAbida Sultana, Fahim Bashar, Mayukh Roy Chowdhury, Aloizio Pereira da Silva. 686-687 [doi]
- One-Shot Modulation Recognition Using Artificial Modulation Types for Enhanced Meta-LearningTryggve Svensson, Ema Becirovic. 688-694 [doi]
- Using Deep Learning to Combat Pilot Jamming in SISO OFDM-based Wireless NetworksMohamed K. M. Fadul, Donald R. Reising. 695-702 [doi]
- Joint Optimization of Task Offloading and Resource Allocation in Tactical Edge NetworksZhaofeng Zhang, Xuanli Lin, Guoliang Xue, Yanchao Zhang, Kevin S. Chan. 703-708 [doi]
- Reinforcement Learning Based Covert Routing with Node Failure Resiliency for Heterogeneous NetworksBrian Kim, Justin Kong 0001, Terrence J. Moore, Fikadu T. Dagefu. 709-714 [doi]
- Multiuser Detection With Neural Feature LearningXiangxiang Xu 0001, Lizhong Zheng. 715-720 [doi]
- Model-Based and Model-Free Learning-Based Caching for Dynamic ContentBahman Abolhassani, Atilla Eryilmaz, Y. Thomas Hou 0001. 721-727 [doi]
- AI-enabled Audio and Chat Collaboration ServicesEmil P. Andersen, Jesper R. Goksør, Sindre E. Halleraker, Frank T. Johnsen, Simen Kvalø, Ole P. Myhre, Tobias S. Omdal, Herman H. Seternes, Leander S. Thorstad. 728-733 [doi]
- A Dynamical Systems Approach for Detecting Cyberattacks in Software-Defined NetworksHesham Fouad, Alexander Velazquez, Ira S. Moskowitz. 734-739 [doi]
- Continual Deep Reinforcement Learning to Prevent Catastrophic Forgetting in Jamming MitigationKemal Davaslioglu, Sastry Kompella, Tugba Erpek, Yalin E. Sagduyu. 740-745 [doi]
- Dual-Use Commercial and Military Communications on a Single Platform using RAN Domain Specific LanguageAlan Gatherer, Chaitali Sengupta, Sudipta Sen, Jeffery H. Reed. 746-751 [doi]
- Filtered Randomized Smoothing: A New Defense for Robust Modulation ClassificationWenhan Zhang 0003, Meiyu Zhong, Ravi Tandon, Marwan Krunz. 789-794 [doi]
- Linear Jamming Bandits: Learning to Jam 5G-based Coded Communications SystemsZachary Schutz, Daniel J. Jakubisin, Charles E. Thornton, R. Michael Buehrer. 795-800 [doi]
- DBMAP: Detecting Backdoors via Modality-Agnostic PerturbationsMatthew Yudin, Rauf Izmailov. 801-806 [doi]
- Exposing Vulnerabilities in PDF Malware Detectors to Evasion AttacksMatthew Yudin, Yingbo Song, Constantin Serban, Ritu Chadha. 807-814 [doi]
- ADA: Adversarial Dynamic Test Time Adaptation in Radio Frequency Machine Learning SystemsShahriar Rifat, Michael DeLucia, Ananthram Swami, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia 0001. 815-820 [doi]
- HyperAdv: Dynamic Defense Against Adversarial Radio Frequency Machine Learning SystemsMilin Zhang 0002, Michael DeLucia, Ananthram Swami, Jonathan D. Ashdown, Kurt A. Turck, Francesco Restuccia 0001. 821-826 [doi]
- Intrusion Response System for In-Vehicle Networks: Uncertainty-Aware Deep Reinforcement Learning-based ApproachHan Jun Yoon, David Soon, Terrence J. Moore, Seunghyun Yoon 0001, Hyuk Lim, Dongseong Kim, Frederica F. Nelson, Jin-Hee Cho. 827-832 [doi]
- Resilience Analysis of Electromagnetic Side-channels against Weight PerturbationsBaki Berkay Yilmaz, Angelos D. Keromytis. 833-838 [doi]
- Task-Based Access Control for Computation and Communication in the Tactical Warfighting EdgeSaketh Poduvu, Roshan Lal Neupane, Alicia Esquivel Morel, Reshmi Mitra, Vijay Anand, Rohit Chadha, Prasad Calyam. 839-846 [doi]
- Towards Novel Malicious Packet Recognition: A Few-Shot Learning ApproachKyle Stein, Andrew Arash Mahyari, Guillermo A. Francia III, Eman El-Sheikh. 847-852 [doi]
- Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System CallsPedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez. 853-858 [doi]
- Transformer Masked Autoencoders for RF Device FingerprintingGavin Parpart, Jonathan H. Tu, Bradley D. Clymer, Jung Lee, Jasen Babcock. 859-862 [doi]
- varMax: Towards Confidence-Based Zero-Day Attack RecognitionGaspard Baye, Priscila Silva, Alexandre Broggi, Nathaniel D. Bastian, Lance Fiondella, Gökhan Kul. 863-868 [doi]
- JARVIS: Disjoint Large Language Models on Radio VLANs for Intelligent ServicesMiquel Sirera Perelló, Joshua Groen, Wan Liu, Stratis Ioannidis, Kaushik R. Chowdhury. 869-874 [doi]
- Condar: Context-Aware Distributed Dynamic Object Detection on Radar DataIan Harshbarger, Colin Zejda, Marco Levorato. 875-880 [doi]
- Revisiting Performance Metrics for Multimodal mmWave Beam Prediction Using Deep LearningKatarina Vuckovic, Saba Mohammad Hosseini, Nazanin Rahnavard. 881-887 [doi]
- Beam tracking between LEO satellites for mmWave communicationsXuezhi Wang 0001, Oliver Kirkpatrick, Joseph O'Leary, Jeewani Kodithuwakkuge, Qiang Sun, Kamran Ghobani, Andrew D. Greentree, Bill Moran 0001. 888-893 [doi]
- Subarray Antenna Design for Inter-Satellite Communication Link at 60 GHz with Digital BeamformingPurna B. Samal, Dushmantha N. Thalakotuna, Karu Priyathama Esselle, Jeewani Kodithuwakkuge, Ediz Cetin. 894-899 [doi]
- Adaptive Random Access Satellite Communication in the Presence of InterferenceJonathon H. Copley, Vincent W. S. Chan. 900-907 [doi]
- Location Verification in Next-Generation Non-Terrestrial NetworksNathan Schatz, Seungnyun Kim, Girim Kwon, Bernardo Camajori Tedeschini, Michael Ricard, Tyler Klein, Vijitha Weerackody, Andrea Conti 0001, Moe Z. Win. 908-913 [doi]
- Reinforcement Learning-enabled Satellite Constellation Reconfiguration and Retasking for Mission-Critical ApplicationsHassan El Alami, Danda B. Rawat. 938-943 [doi]
- RL Based UAV Trajectory Optimization to Avoid Jammers and Optimize Wireless ConnectivityVignesh Manohar, Craig Kleski, Rajesh Rasalkar, Raj Sengupta. 944-949 [doi]
- M&M: Machine-Learning Enhanced MPQUIC for Resilient Communication with mmWave NetworksHongmiao Yu, Shaoyu Tu, K. K. Ramakrishnan, N. Abu-Ghazaleh, Xinyu Zhang, Ananthram Swami. 950-955 [doi]
- Trustworthy Formal Verification in 5G Protocols: Evaluating Generative and Classification Models for Relation ExtractionJingda Yang, Ying Wang. 956-962 [doi]
- Efficient Multi-Authority ABE from Learning With Errors Over RingsJiarui Li, Shucheng Yu. 963-968 [doi]
- High Assurance Multi-Function Crypto DevelopmentJeffrey J. Hughes, Ben Nahill, Eric Simpson, Jeffery Lim, Ryan Burrow, John Dean, Brian Lee, Michael Vai, Roger Khazan, Sean R. O'Melia, Andrew Ho, Michael Parrish, Jeffrey Womack, Scott Trotter, Maria Lodico. 969-974 [doi]
- Joint Server, Source Rate, and Link Allocation Strategy for Semi-QKD in Power SystemsMariam Gado, Muhammad Ismail. 975-980 [doi]
- Military Decoys for the Digital AgeStefan Tschimben, Isabella Bates, Rucha Khairnar, Joanna Crosby, James H. Curry, Keith D. Gremban. 981-986 [doi]
- Fed-FIDS: A Efficient Federated Learning-based Intrusion Detection FrameworkFan Yang, Yupeng Cao, Bingyang Wen, Cristina Comaniciu, K. P. Subbalakshmi. 987-992 [doi]
- Personalized Online Federated Learning With Differential Privacy in Constrained Environments: A Meta-Learning ApproachOlusola Tolulope Odeyomi, Austin Smith, Adrienne Whitmore, Oluwadoyinsola Ige, Kaushik Roy. 993-998 [doi]
- Efficient and Privacy-Preserving Integrity Verification for Federated Learning with TEEsJiarui Li, Nan Chen, Shucheng Yu, Thitima Srivatanakul. 999-1004 [doi]
- Clustered Federated Learning for Massive MIMO Power AllocationYushu Yan, Xiangyu Chang, Amit K. Roy Chowdhury, Srikanth Krishnamurthy, Ananthram Swami, Basak Guler. 1005-1010 [doi]
- Intent-based Network Slice Reconfiguration for Elastic Battlefield CommunicationAnthony Castañares, Deepak K. Tosh. 1028-1033 [doi]
- Network-Aware Traffic Shaping for Information Management SystemsLorenzo Campioni, Alessandro Morelli, Roberto Fronteddu, Tatum Hackler, Niranjan Suri. 1034-1039 [doi]
- Low latency and resilient industrial network with next generation SDN and PLC virtualizationTaposh Kumer Sarker, Deepak K. Tosh. 1040-1045 [doi]
- Overselling Spectrum Slices in Radio Access Networks (RANs): An Optimal Auction Design PerspectiveCariappa K. S, Swastik Brahma, Anthony Macera. 1046-1051 [doi]
- A Game Theory for Resource-Constrained Tactical Cyber OperationsJonathan Goohs, Josiah Dykstra, Anthony Melaragno, William Casey. 1052-1057 [doi]
- Heterogeneous IC Component Identification via EM Side-channelsDonald Greene, Zahir Khan, Angelos D. Keromytis, Baki Berkay Yilmaz. 1058-1063 [doi]
- IRENE: A Toolchain for High-level Micropatching through Recompilable Sub-function RegionsIan Smith, Francesco Bertolaccini, William Tan, Michael D. Brown. 1064-1069 [doi]
- Most Vulnerable Attack Trace in a Probabilistic Attack GraphXuanli Lin, Zhaofeng Zhang, Yinxin Wan, Ethan Teo, Guoliang Xue, Yanchao Zhang. 1070-1075 [doi]
- Privacy-Preserving and Post-Quantum Counter Denial of Service Framework for Wireless NetworksSaleh Darzi, Attila Altay Yavuz. 1076-1081 [doi]
- X-MBA: Towards Heterogeneous Mixed Boolean-Arithmetic DeobfuscationGengwang Li, Min Yu, Dongliang Fang, Gang Li, Xiang Meng, Jianguo Jiang, Weiqing Huang. 1082-1087 [doi]
- NReplay: 5G Key Reinstallation Attack Based on NAS Layer VulnerabilitiesWei Fan, Bingnan Shi, Cheng Peng. 1088-1093 [doi]
- Optimization of Error Pattern Embedding Steganography within Error-Correcting Code FrameworksYongkyu Jang, Minglong Zhang, Andre Kirchner, Bryan A. Jones, Vuk Marojevic, Taejoon Kim, David J. Love. 1094-1099 [doi]
- Phantom Guard: An MDP-Based Anti-Jamming Defense Strategy for Military 5G NetworksMahmudul Hassan Ashik, Moinul Hossain, Jeffrey N. Twigg, Fikadu T. Dagefu. 1100-1105 [doi]
- REVEAL: Real-time Evaluation and Verification of External Adversarial LinksAlexander Marder, Jon Larrea, kc claffy, Erik Kline, Kyle Jamieson, Bradley Huffaker, Lincoln Thurlow, Matthew Luckie. 1106-1111 [doi]
- Statistical Security-QoS Provisioning for mURLLC Over Massive-MIMO Based 6G Mobile Wireless Networks Using FBCXi Zhang, Qixuan Zhu. 1112-1117 [doi]
- Towards Secure Physical Layer Signal ProcessingScott L. Miller, Alex Sprintson. 1118-1123 [doi]
- Optimal Fidelity-Aware Entanglement Distribution in Linear Quantum NetworksIordanis Koutsopoulos. 1124-1129 [doi]
- Rudra: An Algorithm for Optimizing Spectrum Efficiency with Data Rate Guarantee in Next-G CommunicationsShiva Acharya, Shaoran Li, Yubo Wu, Nan Jiang, Wenjing Lou, Y. Thomas Hou 0001. 1130-1137 [doi]
- Dynamic Routing in Space-Ground Integrated Quantum NetworksTianjie Hu, Jindi Wu, Qun Li 0001. 1138-1143 [doi]
- Developing Quality of Service Mechanisms for Telemedicine in Constrained Battlefield EnvironmentsArnab Das, Paul Fritschen, Fazal Mahmood. 1144-1149 [doi]
- Out-of-Band Interference Management to Protect Radio AstronomyNaru Jai, Yi Shi 0001, Wenjing Lou, Luiz A. DaSilva, Y. Thomas Hou 0001. 1150-1155 [doi]
- Throughput-Optimal RIS-Aided Uplink NOMA Transmissions with Downlink Simultaneous Wireless Information and Power TransferYang Yang 0008, Mustafa Cenk Gursoy, Marcelo M. Carvalho. 1156-1161 [doi]
- A Placement Method for Low-Flying UAVs in High Data Rate Tactical NetworksAnders Hansson, Arwid Komulainen, Ulf Sterner, Jimmi Grönkvist. 1162-1167 [doi]
- Distributed Average Consensus and Connected Dominating SetsJoseph P. Macker, Kyle Lawson Crandall, Jeffery W. Weston. 1168-1173 [doi]
- Ant Backpressure Routing for Wireless Multi-hop Networks with Mixed Traffic PatternsNegar Erfaniantaghvayi, Zhongyuan Zhao 0002, Kevin S. Chan, Gunjan Verma, Ananthram Swami, Santiago Segarra. 1174-1179 [doi]
- A Network Connectivity Analysis of the Anglova ScenarioLorenzo Campioni, Edoardo Di Caro, Maggie R. Breedy, Jan Nilsson, Niranjan Suri. 1180-1185 [doi]
- An Admission Control Algorithm for Isochronous and Asynchronous Traffic in IEEE 802.11ad MACAnirudha Sahoo. 1186-1191 [doi]
- Using 5G to Integrate Heterogeneous Networks with Improved Traffic EngineeringI. Chen, Shukri Abdallah, Feng Xie, Venkatesh Ramaswamy. 1192-1197 [doi]