Abstract is missing.
- Developing an NTN Architecture for End-to-End Performance EvaluationMd Mahfuzur Rahman, Nishith Tripathi, Jeffrey H. Reed, Lingjia Liu 0001. 1-6 [doi]
- mmPrism: High-Throughput Perception-Aware mmWave Radar Object Recognition in Contested EnvironmentsZihan Shan, Md. Iftekharul Islam Sakib, Matthew Caesar 0001, Tarek F. Abdelzaher, Jae Kim, Peter Wittenberg. 1-7 [doi]
- Fly Aware: Lightweight Real-Time Anomaly Detection and Classification in UAV TelemetryEthan Silverstein, Milind Kathiari, Angel Todorov, Ying Wang. 1-7 [doi]
- Lightweight and Breach-Resilient Authenticated Encryption Framework for Internet of ThingsSaif E. Nouma, Attila A. Yavuz. 1-6 [doi]
- A Quantum Approximate Optimization Algorithm on Conflict Graphs for Radio Resource AllocationMarina Gavrilovskaia, Kwang-Cheng Chen. 1-6 [doi]
- PRISM: Passive Radar Illuminators for Scalable Multistatic UAS DetectionYan Li. 1-6 [doi]
- A Measurement Study of Dynamics and Liquid Data Transport in OneWeb LEO Satellite NetworksOwen Perrin, Evan Gossling, Daji Qiao, Hongwei Zhang 0001. 1-6 [doi]
- Security Risk Assessment with Bayesian Attack Graphs is #P-CompleteSwapnoneel Roy, Prithviraj Dasgupta. 1-6 [doi]
- A Novel LDPP-MADDPG Approach for Distributed Power Allocation in mmWave Cellular NetworksXin Yao, Arupjyoti Bhuyan, Xiang Zhang 0019, Mingyue Ji. 1-6 [doi]
- Privacy-Preserving Authentication for Secure Military 5G NetworksIsabella D. Lutz, Ava Hill, Matthew C. Valenti. 1-7 [doi]
- Explaining Hybrid RL Agents for Cyber Defense using SHAP and Reward DecompositionSilja Kluge, Laurin Holz, Johannes F. Loevenich, Roberto Rigolin F. Lopes. 1-6 [doi]
- Joint Scheduling and Resource Allocation in mmWave IAB Networks Using Deep RLMaryam Abbasalizadeh, Sashank Narain. 1-6 [doi]
- Satellite Optimization in LEO Constellations: A Capacity-Driven Trade-off Between Antennas and DeploymentJoan Muñoz Sanchis, Miguel Ángel Vázquez. 1-6 [doi]
- FUSCO: Distributed Agentic Data Acquisition and Fusion for Semantic Corner Case DetectionMalik Luti, Ian Harshbarger, Matús Dopiriak, Hari Pathanjaly, Juraj Gazda, Marco Levorato. 1-6 [doi]
- Satellite Fingerprinting Using Attention-Integrated Autoencoders for Robust Spoofing DetectionHans Siegfried Amelang, Mohd. Hasan Ali, Dipankar Dasgupta, Myounggyu Won. 1-6 [doi]
- Architecting Adaptive Command and Control Systems with Autonomic ComputingErwin Franz, Christopher Rouff, Ali Tekeoglu. 1-6 [doi]
- Track-MDP++: RL for Target Tracking with General Controlled Sensing ModelsAdarsh M. Subramaniam, Argyrios Gerogiannis, James Zachary Hare, Venugopal V. Veeravalli. 1-6 [doi]
- Real-Time Transmitter Antenna Optimization in Complex 3D Environments using Digital Shadows: A Step Towards EM Digital TwinsAbdul Ghani Zahid, Shuja Ansari, Oluwakayode Onireti. 1-6 [doi]
- Fine-Grained Security Control through Combined Memory Access Protection and Isolation: An Experience ReportThomas Wahl, Jason H. Li, David Lide, Gregory Briskin, Leonid Meyerovich, Kyung Joon Kwak. 1-6 [doi]
- Is Synthetic Flow Data from Generative Models Ready for Network Intrusion Detection Systems?Jiefei Liu, Qixu Gong, Wenbin Jiang, Pratyay Kumar, Abu Saleh Md Tayeen, Huiping Cao, Satyajayant Misra, Jayashree Harikumar. 1-8 [doi]
- Security-QoS Driven UAV Massive-MIMO Integrated Mobile Wireless NetworksXi Zhang, Qixuan Zhu. 1-6 [doi]
- From Packets to Pixels: A Vision Transformer & Few-Shot Learning Approach to Malicious Network Threat DetectionKyle Stein, Aron Price, Justin Donato, Michael Cui, Humberto Ontiveros Garcia, Lanier A. Watkins. 1-6 [doi]
- Collateral Damage Assessment Model for AI System Target Engagement in Military OperationsClara Maathuis, Kasper Cools. 1-6 [doi]
- Isoflux Beamforming Method for Phased Arrays in LEO Satellites Based on Enhanced MMPTEHuadong Guo, Wen Wang 0014, Meng Zhang 0020, Xiaoke Feng, Jinglong Guo. 1-6 [doi]
- Towards Centralized Orchestration of Cyber Protection Condition (CPCON)Mark Timmons, Daniel Lukaszewski, Geoffrey G. Xie, Thomas Mayo, Donald McCanless. 1-6 [doi]
- VF-RRT*-PSO: A Decentralized Planning Framework for Multi-UAV Systems in Cluttered EnvironmentsMohammad Ibrahim, Andreas Mauthe, Thies Möhlenhof. 1-6 [doi]
- Space-Time Beamforming for Uplink Direct-to-Cell Connectivity in Dense LEO Satellite NetworksJungbin Yim, Jinseok Choi, Namyoon Lee. 1-6 [doi]
- NeTIF: Network Traffic to Image Features for Robust Intrusion DetectionStephen Villanueva, Abu Saleh Md Tayeen, Qixu Gong, Satyajayant Misra, Aden Dogar, Huiping Cao, Jiefei Liu, Pratyay Kumar, Jayashree Harikumar. 1-6 [doi]
- Drone Security and Navigation Assurance Via Autonomic CybersecurityIsaiah Henry-Simpson, Andrew Zitter, Wenda Shao, Xianglong Wang, Chinmay Lohani, Spencer Stevens, Denzel Hamilton, Yinzhi Cao, Lanier A. Watkins. 1-6 [doi]
- Medium Access Control Protocol for LEO Satellite Networks with Phased Array Spatial ProcessingVincent W. S. Chan, Brian Li. 1-8 [doi]
- OFDM Based Bistatic Integrated Sensing and Communication: Sensing Beyond CP LimitCuneyd Ozturk, Cagri Goken. 1-6 [doi]
- On Forecasting CBRS Spectrum AvailabilityHaochen Wang, Abhishek Chakraborty 0002, Ramesh R. Rao. 1-6 [doi]
- Stateful Triage for Reliable and Secure Wildfire Monitoring at the EdgeLong Tran, River Bartz, Rajesh Sankaran, Ulrich Kremer, Ramakrishnan Durairajan, Sudarsun Kannan. 1-6 [doi]
- Supply Chain Exploitation of Secure ROS 2 Systems: A Proof-of-Concept on Autonomous Platform Compromise via Keystore ExfiltrationTahmid Hasan Sakib, Yago Romano Martinez, Brady Carter, Syed Rafay Hasan, Terry N. Guo. 1-6 [doi]
- DoA of Multiple Sources with an Array of Passive Tags instead of an Antenna ArrayAnastasios Kleniatis, Georgios Andreadis, Omikumar B. Makadia, Georgios Vougioukas, Ivan Seskar, Narayan B. Mandayam, Richard E. Howard, Aggelos Bletsas. 1-6 [doi]
- Environment Aware Secure Key Derivation via RF Sensing and ISAC in 5G/6G SystemsRobert Zakrzewski, Mark A. Beach. 1-8 [doi]
- CONQUEST: CONtext-Aware QUantum-Inspired Intelligence for Espying AI-aided Cyberworm Security Threats in Military NetworksSimeon Okechukwu Ajakwe, Ihunanya Udodiri Ajakwe, Victor Ikenna Kanu, Jae-Min Lee, Dong-Seong Kim 0002. 1-6 [doi]
- Applicability of Björck Sequences to NTN-Based LocalizationHarish Kumar Dureppagari, Chiranjib Saha, R. Michael Buehrer, Harpreet S. Dhillon. 1-6 [doi]
- MobiLLM: An Agentic AI Framework for Closed-Loop Threat Mitigation in 6G Open RANsHaohuang Wen, Prakhar Sharma, Vinod Yegneswaran, Ashish Gehani, Phillip A. Porras, Zhiqiang Lin 0001. 1-6 [doi]
- An Open-Source 5G Sidelink for Reliable Device-to-Device CommunicationEjaz Ahmed, Deokseong Kim, Melissa Cusack, Anh D. Le, Tamal Bose. 1-6 [doi]
- A Game-Theoretic Approach for Mitigating Distributed Reflection DoS Using SDN-Based Temporal Flows RulesVianney Kengne Tchendji, Tangyie Shulem Yaweni, Mthulisi Velempini. 1-6 [doi]
- A Graph Neural Network for Anomaly Detection in Multi-Channel Time Series DataGautham Reddy Prakash, Mary L. Comer, Edward J. Delp, Moses W. Chan, Richard H. Foster, Sundip R. Desai. 1-6 [doi]
- An Autonomic Framework for Optimized Data Confidentiality in the Internet of ThingsRebecca Belval, Christopher Rouff, Ali Tekeoglu. 1-6 [doi]
- Model-agnostic clean-label backdoor mitigation in cybersecurity environmentsGiorgio Severi, Simona Boboila, John T. Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea. 1-6 [doi]
- Application of Post-Quantum Cryptography in IoT NetworksTomasz Styn, Michal Pitera, Mateusz Okon, Patryk Harasik, Marcin Niemiec. 1-6 [doi]
- Distributed Transmit Beamforming Gain Achievability BoundA. Minot, J. Khan, M. Cui-Stein, B. Kurien. 1-6 [doi]
- Configurable Framework for Adaptive UAV Platoon Planning under Limited Communication RangeBaisakhi Chatterjee, Rudra Dutta. 1-6 [doi]
- GNN-Enabled Reinforcement Learning for Robust Task Admission and Routing in IoBT EnvironmentsAthanasios Gkelias, Kin K. Leung, Patrick J. Baker, Olwen Worthington. 1-6 [doi]
- Aerial Jamming Against Aerial Eavesdropping for UAV-Assisted Secure, Ultra-Reliable and Low-Latency CommunicationsEmmanouel T. Michailidis, Nikolaos I. Miridakis. 1-6 [doi]
- Post-Quantum SIM-Less Authentication: Scalable and Secure Solutions for FutureG IoT NetworksAbhisek Jha, SeyedMohammad Kashani, Sang Wu Kim, Ashfaq Khokhar 0001, Farid Naït-Abdesselam. 1-6 [doi]
- STAC: Spatio-Temporal Associations for Cross-Camera Analytics in Bandwidth-Constrained EnvironmentsRagini Gupta, Lingzhi Zhao, Jiaxi Li, Volodymyr Vakhniuk, Claudiu Danilov 0001, Josh Eckhardt, Keyshla Bernard, Klara Nahrstedt. 1-6 [doi]
- Frequency Band Allocation Using Hierarchical Reinforcement Learning for Efficient Wireless Resource ManagementKetema Teshome Getaw, Batu K. Chalise, Asif Mahmood. 1-6 [doi]
- Preflight Network Checks for Unmanned Air System Command & Control in Mobile Networks and Future Multi-Administered DomainsTom Collins, Jens Buysse, Noa Lambert, Tobias Vandenbempt, Adnan Shahid, Ingrid Moerman. 1-6 [doi]
- Demonstration of mmWave Radar Passive Phantom Target Attack and Detection Using CNNQuy T. Le, James T. Jones, Drew Phelps, Emir Ekilic, Wesam Al Amiri, Terry N. Guo, Syed Rafay Hasan. 1-6 [doi]
- CSRAP: Enhanced Canvas Attention Scheduling for Real-Time Mission Critical PerceptionMd. Iftekharul Islam Sakib, Yigong Hu, Tarek F. Abdelzaher. 1-6 [doi]
- A MUSIC-Based Adaptive Beamforming Approach for Mobile Jamming Mitigation in 5G NetworksOlivia Holguin, Rachel Donati, Seyed Bagher Hashemi Natanzi, Bo Tang 0011. 1-6 [doi]
- Blockchain-Enabled Distributed Intrusion Detection System for Securing IoT NetworksCharles Stolz, Jielun Zhang. 1-6 [doi]
- Navigating the Arctic Circle with Starlink and OneWeb LEO SatellitesWill Barrett, Sharbel E. Kozhaya, Zaher M. Kassas, David Marsh. 1-6 [doi]
- Resource Block Hopping for NextG Smart Factory/ManufacturingShikhar Bhattarai, Walter Roensch, Hyuck M. Kwon, Dn Pokhrel. 1-6 [doi]
- RadAround: A Field-Expedient Direction Finder for Contested IoT Sensing & EM Situational AwarenessOwen A. Maute, Blake A. Roberts, Berker Peköz. 1-6 [doi]
- Generative Model-Driven Code Creation and Vulnerability Analysis for Developmental ApplicationsNoah Reneau, Kyle Stein, Brian Walker, Seth Vinson, Lanier A. Watkins. 1-6 [doi]
- Machine Learning Tolerant Application-Level GPS Spoofing on CivTAKMd Shafikuzzaman, Jacob Geisen, Wesam Al Amiri, Syed Rafay Hasan, Terry N. Guo. 1-6 [doi]
- Dynamic Spectral Clustering for Tactical Satellite-Aerial-Ground Integrated NetworksAshlee Rice-Bladykas, Janise McNair, John M. Shea. 1-6 [doi]
- Demonstration of Terahertz Backhaul with 0.28 Tbps-km Capacity-Distance ProductJohn F. O'Hara, Ethan Abele, Russ Messenger, George Levi Captain, Karl L. Strecker, Forrest Tuschhoff, Rajind Mendis. 1-6 [doi]
- Robust Interference Mitigation on Modified Filterbank Multicarrier Spread-Spectrum WaveformsChristopher Barrett, Adaline Lee, Joseph D. Gaeddert. 1-7 [doi]
- Federated-Learning Optimized AirComp Over UAV-Based CF Massive-MIMO Mobile NetworksGuohao Pang, Xi Zhang. 1-6 [doi]
- Practical Considerations for Failure Resilient ML Systems at the EdgeKrishna Praneet Gudipaty, Walid A. Hanafy, Li Wu, Jeffrey Twigg, Benjamin M. Marlin, Jesse Milzman, Suhas N. Diggavi, Tarek F. Abdelzaher, Prashant J. Shenoy. 1-6 [doi]
- An Automated, Scalable Machine Learning Model Inversion Assessment PipelineTyler Shumaker, Jessica Carpenter, David D. Saranchak, Nathaniel D. Bastian. 1-8 [doi]
- Threat-aware Aerial Network ControlTravis Cuvelier, Ryan M. Dreifuerst, Nicholas Pang, Christian Minor, Clare Jenney, Sriram Vishwanath, Hammad Iqbal. 1-7 [doi]
- Proactive Adversarial Defense: Harnessing Prompt Tuning in Vision-Language Models to Detect Unseen Backdoored ImagesKyle Stein, Andrew Arash Mahyari, Guillermo Francia, Eman El-Sheikh. 1-6 [doi]
- Applying Machine Learning for Electronic Warfare Activity Detection at a National ScaleJohan Mattias Juul, Andrew James Roberts, Mohammad Hamad, Adrian Nicholas Venables, Rain Ottis. 1-6 [doi]
- A Repair-Time Trigger for Cyberattack ClassifiersPriscila Silva, Gaspard Baye, Nicola Costagliola, Nathaniel D. Bastian, Gökhan Kul, Lance Fiondella. 1-6 [doi]
- Reinforcement Learning-Based Feeder Link Switchover for Handover Optimization in NTNMin Sik Kim, Jae Yeol Lee, Jae-Hyun Kim. 1-6 [doi]
- Heuristic-Enhanced Mathematical Optimization Algorithms for Channel Assignment and Interference MitigationRyan Li, Vicky H. Mak-Hau, Trudy Lam, Angus Gaudry. 1-6 [doi]
- Evaluation of 5G Signals of Opportunity for High-Altitude Platform Station NavigationFaezeh Mooseli, Will Barrett, Samer Watchi Hayek, Zaher M. Kassas. 1-6 [doi]
- Zero Trust 6G: Survivability Optimization with Stochastic Attack ModelingQasem Abu Al-Haija, Abdullah AlShuaibi. 1-6 [doi]
- Interference-Asymmetric UAV Remote Control Links: Measurements and Performance EvaluationDonggu Lee 0001, Sung Joon Maeng, Özgür Özdemir, Mani Bharathi Pandian, Ismail Güvenç. 1-6 [doi]
- GPU-GLMB: Assessing the Scalability of GPU-Accelerated Multi-Hypothesis TrackingPranav Balakrishnan, Sidisha Barik, Sean M. O'Rourke, Benjamin M. Marlin. 1-6 [doi]
- MAPPO for Edge Server MonitoringSamuel Chamoun, Christian McDowell, Robin Buchanan, Kevin S. Chan, Eric Graves 0001, Yin Sun. 1-6 [doi]
- Satellite Assignment Policy Learning for Coexistence in LEO NetworksJeong Min Kong, Eunsun Kim, Ian P. Roberts. 1-6 [doi]
- Space-Air-Ground Network for Direct-to-Cell CommunicationAbdullah Al Noman, Talip Tolga Sari, Sunday Amatare, Gokhan Secinti, Debashri Roy. 1-6 [doi]
- Digital-Twin Empowered Site-Specific Radio Resource Management in 5G Aerial CorridorPulok Tarafder, Imtiaz Ahmed 0001, Danda B. Rawat, Zoheb Hassan, Kamrul Hasan 0008. 1-6 [doi]
- Passband Signal Detection at the EdgeGavin Parpart, Peter Martin, Stephen Jones, Noah Elmore, Jeremiah Rounds. 1-5 [doi]
- Ma'at: FPGA-Assisted Dual-Core Architecture for Deterministic IoT Telemetry IntegrityMohamed El-Hadedy 0001, Wen-mei Hwu, Benny N. Cheng. 1-6 [doi]
- Anomaly Detection and Mitigation in O-RAN Networks using an LSTM-RNN Autoencoder and Secure SlicingJoshua Moore, Aly Sabri Abdalla, Zehran Reshi, Vuk Marojevic. 1-6 [doi]
- Studying the Effect of Schedule Preemption on Dynamic Task Graph SchedulingMohammadali Khodabandehlou, Jared Coleman, Niranjan Suri, Bhaskar Krishnamachari. 1-6 [doi]
- Replay or Regret: Evaluating Continual Learning Methods for Robust Intrusion DetectionNicola Costagliola, Goktug Ekinci, Nathaniel D. Bastian, Lance Fiondella, Gökhan Kul. 1-6 [doi]
- Formal Verification of Autonomous Cyber Defense for Abstraction of Critical Network ScenariosSamy Meziane, Laurin Holz, Tobias Hürten, Johannes Loevenich, Thies Möhlenhof, Roberto Rigolin F. Lopes. 1-6 [doi]
- A Beamforming Attack on Deep Learning-Based Spectrum Violator LocalizationChibuikem Ezemaduka, Alhussein A. Abouzeid. 1-6 [doi]
- Multiparty, Multilingual Voice Communications in Constrained Tactical Networks with Voice ClonesAndrew Tabarez, Ryan Quinn, John Ostwald, Sinclair Gurney, Nathaniel Soule, Ralph Kohler, Mahmoud Ashour, Madeline Fuentes. 1-6 [doi]
- NextG Positioning at User Equipment against Amplify-and-Forward Relay JammingWalter Roensch, Hyuck M. Kwon, Shikhar Bhattarai, Manjula Naik Banavath. 1-6 [doi]
- Model-Agnostic Unsupervised Detection of Prompt Injection with Multiscale Perplexity SignaturesJielun Zhang, Fuhao Li. 1-6 [doi]
- Conflict Detection in Open-RAN with Recurrent Neural Networks Using Geometric ManifoldsImtiaz Nasim, B. J. Petersen, Nicholas J. Kaminski. 1-6 [doi]
- Two-Dimensional XOR-Based Secret Sharing for Layered Multipath CommunicationWai-Ming Chan, Rémi A. Chou, Taejoon Kim. 1-6 [doi]
- Security Risk Mitigation with Bayesian Attack Graphs is Weakly NP-HardSwapnoneel Roy, Prithviraj Dasgupta. 7-11 [doi]
- Stochastic Resource Allocation Leveraging Adaptive Network Monitoring and Tactical Edge NetworksKevin S. Chan, Julia Deeb-Swihart, Matthew Dwyer 0004, Eric Graves 0001, Sean Harding, Olena Tkachenko. 12-17 [doi]
- Transfer Learning in Adversarial Attacks Across Graph Neural NetworksPooja Chigurupati, Ashokkumar R. Patel, Gökhan Kul. 18-23 [doi]
- Minimizing Resource Allocation Error Through Efficient MonitoringEric Graves 0001, Robert Davis, Olena Tkachenko, Kevin S. Chan. 24-29 [doi]
- Flexible Testbed for Cyber Electromagnetic Activities with 5G NetworksOctavio Galindo, Kevin Valdez, Martha Lucia Torres Lozano, Andres Vicario Cisneros, Virgilio Gonzalez. 132-137 [doi]
- Hardware Acceleration for Massive-MIMO Hybrid Beamforming on RISC-V Vector DSPsJavier Acevedo, Patrick Seeling, Frank H. P. Fitzek. 144-149 [doi]
- Standardized Machine-Readable Point-Data Format for Consolidating Wireless Propagation Across Environments, Frequencies, and InstitutionsDipankar Shakya, Naveed A. Abbasi, Mingjun Ying, Isha Jariwala, Jason J. Qin, Ishaan S. Gupte, Bridget Meier, Guanyue Qian, Daniel Abraham, Theodore S. Rappaport, Andreas F. Molisch. 232-237 [doi]
- A Deep Learning based Generative Channel Emulator for Neural Wireless System DesignAdhitya Bantwal Bhandarkar, Debashri Roy, Tathagata Mukherjee, Sudharaman K. Jayaweera. 238-244 [doi]
- Pointing-Error-Induced Fading in an Open-Loop THz Uplink with Hardware ImpairmentsPietro Brach del Prever, Paolo Testolina, Ahmad Masihi, Sergey Petrushkevich, Michele Polese, Tommaso Melodia, Josep Miquel Jornet. 245-250 [doi]
- Low-SWaP Spectrum Sensing across 32 GHz Bandwidth at D-Band using Maximally-Decimated Uniform Approximate DFT Polyphase FIR Filterbanks on Altera Stratix-10 AX ChipletsMichael Nilan, Buddhipriya Gayanath, Kasun Karunanayake, Arjuna Madanayake, Renato J. Cintra. 251-256 [doi]
- Link Budgets of Engineered Wavefronts in Near-Field THz CommunicationsHichem Guerboukha. 293-298 [doi]
- Sub-band Stitching of Zadoff-Chu Waveforms for Sub-THz Channel SoundingPaul Broome, Daniel J. Jakubisin, Alan J. Michaels, Harpreet S. Dhillon. 299-304 [doi]
- Autoencoder-Based Gaussianity for Low Probability of Intercept Detection in Terahertz CommunicationsAbigail O. Oyekola, Majumder Haider, Imtiaz Ahmed 0001, Danda B. Rawat. 311-316 [doi]
- SPEAR+: Streaming-Based Multi-Channel SDR Implementation Using the RFSoC PlatformWei Cheng 0006, Zhihui Gao, Jose Guajardo, Hesham Beshary, Ali M. Niknejad, Tingjun Chen. 317-322 [doi]
- WHIRLS: Wideband High-Resolution Labeling of Signals for Spectrum Sensing ApplicationsTianyi Zhao, Benjamin W. Domae, Connor Steigerwald, Luke B. Paradis, Tim Chabuk, Danijela Cabric. 323-329 [doi]
- Indoor/Outdoor Spectrum Sharing Enabled by GNSS-based ClassifiersHossein Nasiri, Muhammad Iqbal Rochman, Monisha Ghosh. 330-337 [doi]
- Enhancing Spectrum Sensing Through Coupled Hidden Markov ModelsHaodong Yang, Joshua Kortje, Biao Chen 0001, Pramod K. Varshney, Jithin Jagannath, Anu Jagannath. 338-343 [doi]
- Interference-Aware Multiuser Hybrid Precoding for Coexistence with LEO Satellite CommunicationNima Razavi, Murat Bayraktar, Nuria González Prelcic, Robert W. Heath Jr.. 344-349 [doi]
- Known-Interference Cancellation Over Time-Varying Rayleigh-Fading ChannelsKarel Pärlin, Aaron Byman, Tommi Meriläinen, Taneli Riihonen. 350-355 [doi]
- Low-Probability of Detection Communications Using Chiral SolutionsR. McKee, D. Barber, C. Nelson, C. Smith. 356-361 [doi]
- Wide Area SATCOM Interference Mitigation for Radio Telescope Arrays Using Distributed RISsJafar Norolahi, Tiep Minh Hoang, Alireza Vahid, Rashmi Shah. 369-374 [doi]
- Jamming Smarter, Not Harder: Exploiting O-RAN Y1 RAN Analytics for Efficient InterferenceAbiodun Ganiyu, Dara Ron, Syed Rafiul Hussain, Vijay K. Shah. 375-382 [doi]
- A Jamming-Resilient 5G PUCCH Receiver for Small Block Coding RegionMustafa Celik, Cagri Goken, Okan Ertürk. 383-388 [doi]
- VeriPHY: Physical Layer Signal Authentication for Wireless Communication in 5G EnvironmentsClifton Paul Robinson, Salvatore D'Oro, Tommaso Melodia. 389-395 [doi]
- TRACER, the Next Generation Ultra-wideband Spectrum ProcessorMatthew French, John Paul Walters, Kenneth M. Zick, Andrew Rittenbach, Connor Imes, Dong-In Kang, Andrew G. Schmidt, Ali Rasteh, Sundeep Rangan, Brandon Reagan, Mark McHenry, Ihsan Akbar. 396-403 [doi]
- Near-Pilotless Single Carrier Communications Using Matrix DecompositionK. Sai Praneeth, Aswathylakshmi P., Radha Krishna Ganti. 410-415 [doi]
- An Iterative Single-Carrier Detector Based on Stochastic Sampling and Soft Interference CancellationStephen N. Jenkins, Behrouz Farhang-Boroujeny. 416-421 [doi]
- IQ Imbalance-Aware Pilot Assignment for Channel Estimation in Delay-Doppler DomainArmed Tusha, Seda Dogan Tusha, Monisha Ghosh. 422-427 [doi]
- Two-Level Priority Coding for Resilience to Arbitrary Blockage PatternsMine Gokce Dogan, Abhiram Kadiyala, Jaimin Shah, Martina Cardone, Christina Fragouli. 428-433 [doi]
- Secrecy through Precoding: a Novel Physical Layer Encryption Scheme with Optimal PAPRClément Leroy, Tarak Arbi, Oudomsack Pierre Pasquero, Benoit Geller. 434-439 [doi]
- Constant False Alarm Rate Detection in the Battlegrounds of the FutureAnna Grabek, Harris Zebrowitz, Rick Howard. 440-447 [doi]
- Frequency-reconfigurable adhoc networks with dynamic metasurface antennasNitish Vikas Deshpande 0001, Ibrahim Kilinc, Joseph Carlson, Robert W. Heath Jr.. 460-465 [doi]
- Interference-resistant reconfigurable antenna arrays via dynamic metasurface antennasJoseph Carlson, Nitish V. Deshpande 0001, Robert W. Heath Jr.. 466-471 [doi]
- Expanding the Direction Finding Field of View of Sparse Digital ArraysNolan Egging, Payam Nayeri, Randy L. Haupt. 472-477 [doi]
- Decision Trees Mapped to Memristive Hardware for Network Intrusion DetectionSyed Sameer Nadeem, Osama Yousuf, Joseph Riem, Tian Lan 0001, Nathaniel D. Bastian, Gina C. Adam. 484-489 [doi]
- Scaling Through Pruning for Resource-Aware Embedded Intrusion Detection on the EdgeAlexandre Broggi, Nathaniel D. Bastian, Lance Fiondella, Gökhan Kul. 490-495 [doi]
- Neurosymbolic AI Transfer Learning Improves Network Intrusion DetectionHuynh T. T. Tran, Jacob Sander, Achraf Cohen, Brian Jalaian, Nathaniel D. Bastian. 496-501 [doi]
- ClusterFed: Self-supervised Federated Network Intrusion Detection using ClusteringSaquib Irtiza, Latifur Khan, Kevin W. Hamlen, Kevin S. Chan, Michael J. De Lucia, Murat Kantarcioglu, Sharad Mehrotra, Ananthram Swami, Bhavani Thuraisingham. 502-508 [doi]
- How to Combat Reactive and Dynamic Jamming Attacks with Reinforcement LearningYalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sastry Kompella. 509-514 [doi]
- Neural-Network Adapted RIS for Active Interference AvoidanceEyad Shtaiwi, Sanaz Naderi, George Sklivanitis, Dimitris A. Pados, Elizabeth Serena Bentley. 515-519 [doi]
- SHARQ: Semantic HARQ for Reliable Distributed DNN ExecutionIan Harshbarger, Leïla Nasraoui, Marco Levorato. 527-532 [doi]
- Machine Learning-Driven Angle of Arrival Estimation for a Moving Signal SourceJin Feng Lin, Charles Montes, Nathaniel D. Bastian, Ruolin Zhou. 533-538 [doi]
- Efficient Design of MET-LDPC Code Ensembles via Multinomial Parameter OptimizationLinh Nguyen, Tuy Tan Nguyen. 539-544 [doi]
- Investigation of STEEP Using Phase-Shift-Keying Signaling for Secure CommunicationsMoontasir Rafique, Yingbo Hua. 545-550 [doi]
- A Terahertz ISAC Framework Based on Frequency Modulated DFT-Spread Single-Carrier OFDMYusong Gong, Lingxiang Li, Zhen Wang, Zhi Chen 0002. 551-556 [doi]
- Securing High Mobility 6G Networks Using Shared Key-Based Physical Layer Security for OTFSIsrat Ara, Brian Kelley. 557-562 [doi]
- Zak-OTFS with Spread Pilot in Sub-6 GHz: Implementation and Over-the-Air ExperimentationJunyao Zheng, Venkatesh Khammammetti, Beyza Dabak, Sandesh Rao Mattu, Tingjun Chen, A. Robert Calderbank. 563-568 [doi]
- Symbol-Level Precoding for Multipath-Tolerant Physical-Layer Secured Communication with Space-Time Modulated Metamaterial AntennasHariharan Venkat, Shaghayegh Vosoughitabar, Shuping Li, Chung-Tse Michael Wu, Narayan B. Mandayam, Waheed U. Bajwa. 569-574 [doi]
- Mitigating Interleaved ADC Mismatches in Automatic Modulation Classification via Sampling Schemes and Layer FusionAlexander Gros, Véronique Moeyaert, Patrice Mégret. 575-581 [doi]
- Improving Robustness of Commercial Radio Access Networks for Military OperationsSouradip Saha, Jean-Christophe Schiel, Warren Low. 582-587 [doi]
- Parameter Estimation of a Dissipative Quantum ChannelAustin Bristow, Kwang-Cheng Chen. 588-593 [doi]
- Resource Allocation for XR with Edge Offloading: A Reinforcement Learning ApproachAlperen Duru, Mohammad Mozaffari, Ticao Zhang, Mehrnaz Afshang. 594-599 [doi]
- Double Deep Q-Learning Based UAV Base Station Positioning for Sum-Rate and Coverage MaximizationBerke Kilinç, Alper Bereketli. 600-605 [doi]
- Federated Learning for MCS Selection in 5G Sidelink MANETsJamie Sloop, Evan Allen, Evar Jones, Charles E. Thornton, Lingjia Liu 0001, Fred Templin, Daniel J. Jakubisin. 612-617 [doi]
- Deep Reinforcement Learning Based Routing for Heterogeneous Multi-Hop Wireless NetworksBrian Kim, Han-Bae Kong 0001, Terrence J. Moore, Fikadu T. Dagefu. 618-623 [doi]
- Dynamic Flow Routing and Scheduling for Time-Critical Network ServicesXuanli Lin, Zhaofeng Zhang, Zunzheng Zhang, Guoliang Xue. 624-629 [doi]
- Topology-Preserving Power Adaptation for Mobile Ad Hoc NetworksDmitrii Dugaev, Charlie Greenbacker, Ram Ramanathan. 630-635 [doi]
- Edge Server Monitoring for Job AssignmentSamuel Chamoun, Sirin Chakraborty, Eric Graves 0001, Kevin S. Chan, Yin Sun. 636-641 [doi]
- Achieving Deterministic and Reliable Large-Scale Data Transfers in a Scientific NetworkCarolina Minami Oguchi, Vijeth Kumbarahally Lakshminarayana, Alex Sim, Kesheng Wu, Dipak Ghosal. 648-655 [doi]
- Greedy-ECHO: Score-Based Forwarding for Efficient Broadcast in MANETsSheikh Tareq Ahmed, Annamalai Annamalai. 656-661 [doi]
- Performance Characteristics of TCP and QUIC over V2V Wi-Fi in Urban ScenariosChunghan Lee, Seyhan Ucar, Onur Altintas, Kentaro Oguchi 0001. 662-667 [doi]
- MobiSwift: Seamless multi-access connectivity for low latency applications through SRv6 and eBPFYu Mi, Randeep Bhatia, Fang Hao, An Wang 0002, Steven A. Benno, T. V. Lakshman. 668-673 [doi]
- Secret Share Network Coding with User Equipment HoppingWalter Roensch, Shikhar Bhattarai, Hyuck M. Kwon. 674-679 [doi]
- Revenue Optimization in Video Caching Networks with Privacy-Preserving Demand PredictionsYijing Zhang, Md. Ferdous Pervej, Andreas F. Molisch. 680-686 [doi]
- Full-Duplex Beamforming Optimization for Near-Field ISACAhsan Nazar, Zhambyl Shaikhanov, Sennur Ulukus. 687-692 [doi]
- MULTI-SCOUT: Multistatic Integrated Sensing and Communications in 5G and Beyond for Moving Target Detection, Positioning, and TrackingYalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sastry Kompella, Gustave Anderson, Jonathan Ashdown. 693-698 [doi]
- An Open-Source Framework for IEEE 802.11bf Evaluation Under Lossy and Jittery ConditionsTanguy Ropitault, Steve Blandino, Nada Golmie. 705-710 [doi]
- An Assessment of Signal Resampling Effects on Attention-Based SEI for IoT ApplicationsMohamedelfateh A. Mohamedkhir, Joshua H. Tyler, Donald R. Reising. 717-724 [doi]
- Specific Emitter Identification Impacts Due to Collection, Frequency Band, and Antenna ChangesJoshua H. Tyler, Colin J. Keeter, Donald R. Reising. 725-732 [doi]
- An Adversarial-Driven Experimental Study on Deep Learning for RF FingerprintingXinyu Cao, Bimal Adhikari, Shangqing Zhao, Jingxian Wu 0001, Yanjun Pan 0001. 739-744 [doi]
- Using Machine Learning to Detect and Locate Rogue Devices from Time-Domain ReflectometryMichael Eydenberg, Jason J. Haas. 745-751 [doi]
- Islands of Exposure: Attacking HDMI Audio via Electromagnetic Side ChannelsKui Wang, Meng Zhang, Yanyun Xu. 752-757 [doi]
- Attack Behavior Observations and Profiling Through Varying Cyber Deception MechanismsEric Noah Savage, Nathaniel D. Bastian, Ruolin Zhou. 758-763 [doi]
- Chiplet-based Implementation of Decision Trees for Network Intrusion DetectionMd Abrar Ibtesham, Lei Zhang, Joseph Riem, Tian Lan 0001, Nathaniel D. Bastian, Gina C. Adam. 764-769 [doi]
- Securing Swarms: Cross-Domain Adaptation for ROS2-based CPS Anomaly DetectionJulia Boone, Fatemeh Afghah. 770-775 [doi]
- NI-Diff: Zero-Day and Adversarial Network Intrusion Detection with Diffusion ModelsMilin Zhang 0002, Michael J. De Lucia, Ananthram Swami, Jonathan D. Ashdown, Nathaniel D. Bastian, Francesco Restuccia 0001. 776-781 [doi]
- Resilient Wireless Communications with Selective Deep Neural Network ClassificationA. Q. M. Sazzad Sayyed, Jonathan D. Ashdown, Michael De Lucia, Ananthram Swami, Nathaniel D. Bastian, Francesco Restuccia 0001. 782-787 [doi]
- Disruption-Resilient Real-Time Sensor Data Delivery via Neural Multiple Description CodingXinyue Hu, Qixin Zhang, Wei Ye 0009, Eman Ramadan, Zhi-Li Zhang. 788-793 [doi]
- Secure Time-Modulated Intelligent Reflecting Surface via Generative Flow NetworksZhihao Tao, Athina P. Petropulu. 794-799 [doi]
- SSPNet: Semi-Supervised Prototypical Networks for Few-Shot Network Intrusion DetectionUmid Suleymanov, Murat Kantarcioglu, Kevin S. Chan, Michael J. De Lucia, Kevin W. Hamlen, Latifur Khan, Sharad Mehrotra, Ananthram Swami, Bhavani Thuraisingham. 800-806 [doi]
- Probabilistic Latency Modeling for Heterogeneous Inference Tasks in Resource-Constrained NetworksCleon Anderson, Scott E. Brown, Matthew Dwyer 0004, David Harman, Tian Lan. 807-812 [doi]
- Computation- and Communication-Efficient Online FL for Resource-Constrained Aerial VehiclesMd. Ferdous Pervej, Richeng Jin, Md Moin Uddin Chowdhury, Simran Singh, Ismail Güvenç, Huaiyu Dai. 813-819 [doi]
- Federated Learning-Based Anomaly Detection Approach for High-Performance Research NetworksEhsan Saeedizade, Shamik Sengupta, Jay Thom. 820-825 [doi]
- FLASH: Federated Learning Across Simultaneous HeterogeneitiesXiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy Chowdhury. 826-831 [doi]
- WOS: An Optimized Scheduling Scheme for Federated Learning in Dynamic Wireless NetworksFangtong Zhou, Yi Shi 0001, Yubo Wu, Shiva Acharya, Luiz A. DaSilva, Sastry Kompella, Wenjing Lou, Y. Thomas Hou 0001. 832-837 [doi]
- Natural Language Interaction with Databases on Edge Devices in the Internet of Battlefield ThingsChristopher D. Molek, Roberto Fronteddu, K. Brent Venable, Niranjan Suri. 838-843 [doi]
- Towards a Realistic Tactical Mobility Model: Characterizing the Anglova ScenarioEdgar S. Oliveira, Paulo H. L. Rettore, Clayson Celes, Peter Sevenich, Nils Aschenbruck. 844-849 [doi]
- Effects of Age of Channel State Information on Throughput for Collaborative Beamforming LinkMichael V. Lipski, Clement Kam, Sastry Kompella, Anthony Ephremides. 850-855 [doi]
- Keeping a Target "On the Radar", Using Model-Based Group Sensor Selection AlgorithmsKaan Buyukkalayci, Xinlin Li, Merve Karakas, Tamoghna Sarkar, Christina Fragouli, Bhaskar Krishnamachari. 856-861 [doi]
- Machine Learning and Smartphone Data-Assisted BER Prediction in nLOS Mission-Critical EnvironmentsMd Mahfuzur Rahman, Nishith Tripathi, Jeffrey H. Reed, Lingjia Liu 0001. 862-867 [doi]
- Resilient and Reliable Cloud Network Control for Mission-Critical Latency-Sensitive ApplicationsChin-Wei Huang, Jaime Llorca, Antonia M. Tulino, Andreas F. Molisch. 868-873 [doi]
- CyberStack: Deep Reinforcement Learning in Stackelberg Games for Military Network DefenseAws Jaber, Angel Genchev, Gudmund Grov, Tsvetelin Tsonev. 874-875 [doi]
- Secure Key Derivation via RF Sensing with ISAC in 5G/6G Tactical Systems (Demo)Robert Zakrzewski, Mark A. Beach. 876-878 [doi]
- Extending Kubernetes to Provide Federated and Adaptive Tactical Edge CloudsAlessandro Amato, Harrie Bastiaansen, Masoud Bozorgi, Willem Datema, Mattia Fogli, Johan van der Geest, Thomas Kudla, Pablo Sanchez, Niranjan Suri, Susan Watson. 879-880 [doi]
- Demo: Real-World Integration and Evaluation of Open-Source 5G Core with Commercial RANGuoying Zu, Joshua Ofori Boateng, Varun S. Advani, Taimoor Ul Islam, Vincent Lee, Sarath Babu 0001, Md Nadim, Daji Qiao, Mohamed Y. Selim, Hongwei Zhang 0001. 881-882 [doi]
- 5G and Radar Coexistence: Demonstrating Pulsed Radar Interference and 5G Performance MetricsEric Forbes, Gustave Anderson, Ying Wang. 883-884 [doi]
- Demonstration of an Interactive Search and Rescue Scenario in AERPAWJohn Kesler, Anil Gürses, Özgür Özdemir, Magreth Mushi, Mihail L. Sichitiu, Ismail Güvenç, Rudra Dutta, Vuk Marojevic. 885-886 [doi]
- RAN Tester UE in Action: Declarative, Automated Security Evaluations for O-RAN deploymentsJoshua Moore, Aly Sabri Abdalla, Charles Ueltschey, Anoop Mishra, Vuk Marojevic. 887-888 [doi]
- IRS-enabled mmWave Signal Obfuscation for LEO NanosatellitesFiona Tisdall, S. Johnson, Morriel Kasher, Fikadu T. Dagefu, Jihun Choi 0003, Justin Kong 0001, Brian Kim, Predrag Spasojevic. 889-890 [doi]
- Demonstrating Jamming Mitigation in O-RAN via AI enabled Intrusion Detection and Secure Slicing xAppsJoshua Moore, Aly Sabri Abdalla, Charles Ueltschey, Vuk Marojevic. 891-892 [doi]
- Demo: Real-Time User Mobility Handling in RIS-Aided mmWave O-RAN SystemsTawfik Osman, Aditya Shekhawat, Georgios C. Trichopoulos, Ahmed Alkhateeb. 893-894 [doi]
- ClickDT: Building Scalable and High-Resolution Wireless Digital Twins with a Few ClicksYiming Li, Scarlett Francini, Zhihui Gao, Tingjun Chen. 895-896 [doi]
- Spectrum Sharing and Spatial Isolation for 5G Cellular Networks and Military Radars in the FR1 Frequency BandsC. Nicolas Barati, Aditya Dhananjay, Michael Zappe, Paulo Marques 0002, Luis Pereira, Roberto Magueta, Sundeep Rangan, Kimberly Gold, Scot A. Hawkins, Sachin Shetty. 897-898 [doi]
- Spectral Warrior: Gamification of Radar and Phased Array Concepts for Military ApplicationsElliott Rheault, Hannah Blake, Espen Lunden, Isaac Tucker, Bradley Davis, William C. Headley. 899-890 [doi]
- A Demonstration of Self-Adaptive Jamming Attack Detection in AI/ML Integrated O-RANMd. Habibur Rahman, Md Sharif Hossen, Nathan H. Stephenson, Vijay K. Shah, Aloizio Da Silva. 901-902 [doi]
- Design and Characterization of Broadband 5G PAs in 40-nm GaN and 22-nm FDSOI CMOS using NI's VST PlatformClint Sweeney, Donald Y. C. Lie, Felipe Silva, Amr Haj-Omar, Jerry Lopez. 903-904 [doi]
- Channel Estimation Using DVB-S2/S2X Pilots for Adaptive MODCOD SelectionWahab Khawaja, Özgür Özdemir, Rune Hylsberg Jacobsen. 905-906 [doi]
- Empirical Performance Evaluation of CCSDS Reed-Solomon and Convolutional Codes for CubeSat Downlink ChannelsWahab Khawaja, Rune Hylsberg Jacobsen. 907-908 [doi]
- ACT-RIC: Adaptive Cyber Threat Handling and CU-UP Migration via O-RAN Near-RT RICAparaajitha Gomathinayakam Latha, Linqi Xiao, Abhishek Bhattacharyya, Koteswararao Kondepu, Venkateswarlu Gudepu, Andrea Fumagalli. 909-910 [doi]
- Smartphone-Based Indoor/Outdoor Inference: A SigCap ApproachHossein Nasiri, Muhammad Iqbal Rochman, Monisha Ghosh. 911-914 [doi]
- PAVE++ Demo: Cross-Layer Formal Verification and OTA Validation for UAV CommunicationsTom Wray, Ying Wang. 915-916 [doi]
- Multi-Layer Secret Sharing for Cross-Layer Attack Defense in 5G Networks: a COTS UE DemonstrationWai-Ming Chan, Rémi A. Chou, Taejoon Kim. 917-918 [doi]
- Experimental Demonstration of Robust Distributed Wireless Clock SynchronizationKumar Sai Bondada, Hiten Kothari, Yibin Liang, Daniel J. Jakubisin, R. Michael Buehrer. 919-920 [doi]
- Experimental Covert Communication Using Software-Defined RadioRohan Bali, Trevor E. Bailey, Michael S. Bullock, Boulat A. Bash. 935-941 [doi]
- Defensive Deception against Subspace-Based AoA Localization under Jamming AttacksAhmed Hemida, Jie Fu 0002, Charles A. Kamhoua, Mingyue Ji. 942-947 [doi]
- mmRhythm: Secure and Usable User Authentication for IoT Devices based on Hand-Tapping PatternsAbdualrhman Almeajel, Yan Zhang, Tao Li, Yanchao Zhang. 948-953 [doi]
- Enabling Trustworthy Federated Learning via Remote Attestation for Mitigating Byzantine ThreatsChaoyu Zhang, Heng Jin, Shanghao Shi, Hexuan Yu, Sydney Johns, Y. Thomas Hou 0001, Wenjing Lou. 954-961 [doi]
- Targeted Attacks and Defenses for Distributed Federated Learning in Vehicular NetworksUtku Demir, Tugba Erpek, Yalin E. Sagduyu, Sastry Kompella, Mengran Xue. 962-967 [doi]
- GNN-Based Predictive Model for Adversarial Cyber Behavior Using the MITRE ATT&CKWooyoung Son, Soonhong Kwon, Jong-Hyouk Lee. 968-973 [doi]
- EVADE: A Lightweight Unsupervised Malicious Detection over Encrypted TrafficDavid Haynes, Phu H. Phung, Boyang Wang. 974-980 [doi]
- Detecting Stealthy Anomalies with Autoencoders Using Windowed Variance-Aware Loss FunctionsLuke Hwang, Md Nahidul Islam, Mohd. Hasan Ali, Dipankar Dasgupta, Myounggyu Won. 981-986 [doi]
- Establishing MQTT Covert Channels Through Public BrokersErkin Kirdan, Karl Waedt. 987-992 [doi]
- Covert Communication over LoRaWAN by Exploiting MAC HeadersErick Pacheco, Rolando Hevia, Christopher Marin, Germán Sánchez, Manuel Suarez, A. Selcuk Uluagac, Kemal Akkaya. 993-998 [doi]
- VibLeak: Towards Practical Covert Data Leakage via Phone VibrationsJunye Jiang, Jingcheng Ju, Haowen Xu, Zhenlu Tan, Duohe Ma, Jun Dai, Xiaoyan Sun 0003. 999-1004 [doi]
- Tampering Attacks on CSI Feedback Reports in 5G New RadioSantosh Timilsina, Marwan Krunz. 1005-1010 [doi]
- Tor Networking with m-Anonymity: Performance-Driven Circuit Selection Using LearningKelei Zhang, Amanul Islam, Wenjun Fan, Sang-Yoon Chang. 1011-1016 [doi]
- Automating Cybersecurity Risk Assessment for AI Systems in Military & Critical InfrastructureJohannes F. Loevenich, Laurin Holz, Erik Adler, Tobias Hürten, Florian Spelter, Roberto Rigolin F. Lopes. 1017-1023 [doi]
- A Game-Theoretic Framework for Dynamic Decoy Placement in Cyber NetworksMi Zhou, Zherui Zhou, Qirui Zhang, Andrew Clark. 1024-1030 [doi]
- DART: Enhancing HPC Security with Identity-aware Network Flows for AccountabilityPriyanka Narang, Maruthi Seshidhar Inukonda, Bheemarjuna Reddy Tamma. 1031-1036 [doi]
- Leveraging Formal Methods to Strengthen Cyber-Resilience in Authorization to OperateAlice R. Lee, Jack Cheng, Timothy M. Braje, Noah Luther, Ian McQuoid, Gruia-Catalin Roman, Joseph Dan Trujillo, Richard Skowyra, Samuel Mergendahl. 1037-1043 [doi]
- Fast Online Digital Twinning on FPGA for Mission Critical ApplicationsBin Xu, Ayan Banerjee 0001, Sandeep K. S. Gupta. 1044-1049 [doi]
- Stirring the Data Pot: Shuffling Data in Networks for Fast Decentralized LearningZonghong Liu, Harris Ransom, Kevin S. Chan, Salim El Rouayheb. 1105-1110 [doi]
- Decentralized Model-Distributed InferenceAlp Berke Ardic, Matthew Dwyer, Erdem Koyuncu. 1111-1116 [doi]
- CAMTEC: Context-aware Adaptive Inference for Machine Task Execution in Complex EnvironmentsSharon L. G. Contreras, Marco Levorato, Hyomin Choi, Fabien Racapé, Subhramoy Mohanti. 1117-1122 [doi]
- Quantifying the Impact of Poisoning Attacks in Deep Neural Networks for Attack ClassificationFlorian Spelter, Johannes F. Loevenich, Tobias Hürten, Erik Adler, Roberto Rigolin F. Lopes. 1123-1129 [doi]
- SAJD: Self-Adaptive Jamming Attack Detection in AI/ML Integrated 5G O-RAN NetworksMd. Habibur Rahman, Md Sharif Hossen, Nathan H. Stephenson, Vijay K. Shah, Aloizio Da Silva. 1130-1135 [doi]
- Multi-Agent Cyber Defense with Multi-Level Zero-Trust ActionsMahdi Imani, Tian Lan 0001, Nathaniel D. Bastian. 1136-1141 [doi]
- TRACER: Threat Resilience Assessment for Cyber Evaluation ReadinessTommy Chin, Samuel Best, Noah Korzak, Kun Sun 0001. 1148-1153 [doi]
- Classification of Automated Driving SystemsBidhya Shrestha, Bhargab Acharya, Jonathan Petit, Christos Papadopoulos. 1154-1160 [doi]
- Blind Source Separation-Enabled Joint Communication and Sensing in IBFD MIMO SystemsSiyao Li, Conrad Prisby, Thomas Yang 0001. 1223-1228 [doi]
- Cognitive Radio for Asymmetric Cellular Downlink with Multi-User MIMOOmer Gokalp Serbetci, Lei Chu, Andreas F. Molisch. 1229-1235 [doi]
- Site-Specific Beam Learning for Full-Duplex Massive MIMO Wireless SystemsSamuel Li, Ian P. Roberts. 1236-1241 [doi]
- Phased Array Antenna Adapter for Benchtop Beamforming EmulationMichael Paquette, Evan Briggs, Brian McHugh, Shawn Lefebre, Jared R. Burdin, Josephine Cantalupo, Michael McAdams. 1242-1247 [doi]
- Ambiguity-aware Broad 2D BeamformingNathaniel Rowe, Nicolas Law, Dola Saha. 1248-1253 [doi]
- Exact DoA Estimation in OTFS Radar Systems with Beam Squint Effect and Off-Grid ProblemJeong-Hoon Park, Seong-Cheol Kim, Seongwook Lee. 1254-1259 [doi]
- Detecting Airborne Objects with 5G NR RadarsSteve Blandino, Nada Golmie, Anirudha Sahoo, Thao Nguyen, Tanguy Ropitault, David W. Griffith, Amala Sonny. 1260-1265 [doi]
- Coexistent Evaluation on the Effects of Radar PRF and 5G Symbol Based SchedulingEric Forbes, Ying Wang, Gustave Anderson. 1266-1271 [doi]
- Optimizing Spectrum Sharing: A Novel Approach to Radar Detection Using 5G Sounding Reference SignalsKevin Naranjo, David Li, Harish Ramchandran, Masoud Farshchian. 1272-1277 [doi]
- Pushing the Boundaries in CBRS Band: Robust Radar Detection within High 5G InterferenceShafi Ullah Khan, Michel Kulhandjian, Debashri Roy. 1278-1283 [doi]
- Varuna: Maximizing 5G Coverage with Out-of-Band Interference Protection for Radio AstronomyNaru Jai, Yi Shi 0001, Wenjing Lou, Luiz A. DaSilva, Y. Thomas Hou 0001. 1290-1295 [doi]
- Real-World Integration and Evaluation of Open-Source 5G Core with Commercial RANGuoying Zu, Joshua Ofori Boateng, Varun S. Advani, Taimoor Ul Islam, Vincent Lee, Sarath Babu 0001, Md Nadim, Daji Qiao, Mohamed Y. Selim, Hongwei Zhang 0001. 1296-1301 [doi]
- Extending Communication Range with 5G NR Multi-Hop UE-to-UE RelaysSamantha Gamboa, Thomas R. Henderson, Wesley Garey, Chunmei Liu, Richard Rouil. 1302-1307 [doi]
- Unifying Generative and Classification-Based Relation Extraction via MCTS for nextG Protocol Formal VerificationJingda Yang, Paul Ratazzi, Ying Wang 0113. 1308-1314 [doi]
- Deep Learning Interference Suppression for Cyclostationary SignalsBadhrinarayan Malolan, Daniel J. Jakubisin, Jeffrey H. Reed. 1321-1326 [doi]
- Pairwise Neural Cross-Correlation for Accurate Estimates in Low SNRMiguel Domínguez. 1327-1334 [doi]
- Kolmogorov-Arnold Networks for Multimodal Feature Fusion and mmWave Beam PredictionSaba Mohammad Hosseini, Amirhossein Safari, Nazanin Rahnavard. 1341-1346 [doi]
- SemanticRF: Towards Robust RF Scene Retrieval Using Natural Language SupervisionTrey Crump, Ali Maatouk, Kemal Davaslioglu, Sastry Kompella, Leandros Tassiulas. 1347-1352 [doi]
- Contrastive Multi-Hop Semantic CommunicationYao Wang, Chunyu Hu, Jian Li, Rui Ning, Lusi Li, Daniel Takabi. 1353-1358 [doi]
- ECSC: Energy-Calibrated Semantic CommunicationZiyu Wang, Yiming Du, Rui Ning, Daniel Takabi, Lusi Li. 1359-1364 [doi]
- Privacy Preserving Semantic Communications Using Vision Language Models: A Segmentation and Generation ApproachHaoran Chang, Mingzhe Chen, HuaXia Wang, Qianqian Zhang 0002. 1365-1370 [doi]
- PhantomRift: A Novel Framework for Stealthy Microservice Disruption via Inferred Gateway Semantics and Deep Dependency MappingXiaofeng Zhang, Jinfa Wang, Jie Liu 0079, Tianheng Qu, Mingdong Liu, Rongrong Xi, Hongsong Zhu. 1371-1376 [doi]
- Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network EnvironmentsSai Sree Laya Chukkapalli, David H. Ledbetter, Anupam Joshi, Tim Finin, Jade Freeman. 1377-1382 [doi]
- PFSM: LLM-Guided Peripheral Modeling via Executable Finite-State SemanticsYaxin Liu, Chuan Qin, Zhanwei Song, Senming Yan, Shichao Lv, Dongliang Fang, Weidong Zhang, Limin Sun 0001. 1383-1388 [doi]
- PAVE-MAVLink: Formal Verification of MAVLink 2 for Secure UAV CommunicationsTom Wray, Ying Wang. 1389-1395 [doi]
- Modeling Risk Assessment in IC Supply Chains under Hardware Trojan Attacks Using Prospect TheorySatyaki Nan. 1396-1401 [doi]
- Accelerating Quantum Key Distribution Over Imperfect Quantum Channels by Reliable Quantum State TomographyPhillip Cornett, Albert B. Dinkins V, Kwang-Cheng Chen. 1402-1407 [doi]
- Towards Privacy Preserving HAR in Contested Environments: An FHE-ORAM ArchitectureIshan Aryendu, Paul Ratazzi, Ying Wang 0113. 1408-1413 [doi]
- SPEAK: a Secure PUF-Enabled Authentication and Key-Exchange Protocol for IoT DevicesIan Donovan, Tarek A. Idriss. 1414-1419 [doi]
- Detecting Presence Of Malicious Hub in MIMI Protocol for Cross-Platform Messaging InteroperabilityHarditya Sarvaiya, Eric W. Burger. 1420-1425 [doi]
- SERA: Automating Semantic-Enhanced Behavior Extraction from Ransomware API sequencesZhengkai Qin, Huan Zhang, Lixin Zhao, Aimin Yu, Lijun Cai, Dan Meng 0002. 1426-1431 [doi]
- GeNetE - Generative Network Environments: A Specialized Small Language ModelSebastian Burfeid, Paulo H. L. Rettore, Philipp Zißner, Peter Sevenich, Clayson Celes, Bruno P. Santos. 1462-1467 [doi]
- Waves of Imagination: Unconditional Spectrogram Generation using Diffusion ArchitecturesRahul Vanukuri, Shafi Ullah Khan, Talip Tolga Sari, Gokhan Secinti, Diego Patiño 0002, Debashri Roy. 1468-1473 [doi]
- Blind Beamforming for Interference Suppression Using Pre-trained Diffusion ModelsTakayuki Kitamura, Tejas Jayashankar, Gregory W. Wornell. 1474-1479 [doi]
- TAP-GAN+: A Topological Adversarial Pipeline for Inference-Time Detection in Machine LearningGalamo F. Monkam, Jie Yan, Nathaniel D. Bastian. 1480-1485 [doi]
- Multi-Agent Deep Reinforcement Learning for Cyber Conflict Simulation and ExperimentationMatthew L. Corbett, Jared M. Murphy, Nathaniel D. Bastian. 1486-1493 [doi]
- Enhancing Abnormal Network Traffic Detection via Efficient Data Generation Leveraging LLMChangming Li, Zejun Xu, Qiufan Ji, Fan Yang, Cong Shi 0004, Michael DeLucia, Yingying Chen 0001. 1494-1499 [doi]
- Constrained Edge AI Deployment: Fine-Tuning vs. Distillation for LLM CompressionJacob Sander, David Moe, Achraf Cohen, Brian Jalaian, K. Brent Venable, Venkat R. Dasari. 1500-1505 [doi]
- Slice-MCP - Fine-Tuned Llama-4 LLM and MCP Enabled 5G Network Slice Orchestration PlatformEranga Bandara, Safdar H. Bouk, Ravi Mukkamala, Abdul-Rahman, Xueping Liang, Ross Gore, Sachin Shetty. 1506-1511 [doi]
- NetPrompt: Evaluation of LLMs as Network Intrusion Detection SystemPratyay Kumar, Abu Saleh Md Tayeen, Qixu Gong, Jiefei Liu, Satyajayant Misra, Huiping Cao, Jayashree Harikumar. 1512-1517 [doi]
- Agentic AI for Cyber Defense: LLM-Guided Hierarchical Multi-Agent Reinforcement LearningGuangyu Jiang, Mahdi Imani, Nathaniel D. Bastian, Tian Lan 0001. 1518-1523 [doi]
- Deep Reinforcement Learning with Deep Double Q-Network Against Smart JammersLan K. Nguyen, Duy H. N. Nguyen, Nghi H. Tran, David Brunnenmeyer. 1524-1529 [doi]
- Radio Frequency Machine Learning Mixture of ExpertsMatthew Judah, Scott Kuzdeba. 1530-1535 [doi]
- Learning to Transmit: RL based Adaptive Transmission for Energy-Efficient IoTRagini Gupta, Xinyu Chen, Samvit Dedhia, Claudiu Danilov 0001, Josh Eckhardt, Keyshla Bernard, Klara Nahrstedt. 1536-1541 [doi]
- FS-PEARL: Few-Shot Model Adaptation for Over-The-Air Spectrum SensingCaleb McIrvin, William C. Headley. 1548-1553 [doi]
- PRNet: Packet Reconstruction Network with Domain-Aware ConstraintsMark Cheung, Sridhar Venkatesan, Ritu Chadha, Constantin Serban. 1554-1559 [doi]
- Machine Learning-based Receiver Scheduling for Electronic SupportVaibhav Sekhar, Gottfried Lechner, Khoa Nguyen, Simon Faulkner. 1560-1565 [doi]
- Anomaly Detection in Containerized Tactical Systems Using Temporal Graph Neural NetworksSoonhong Kwon, Wooyoung Son, Jong-Hyouk Lee. 1566-1571 [doi]
- Multi-Hop Relay-Aided Task Offloading for Tactical Edge ComputingZhaofeng Zhang, Xuanli Lin, Guoliang Xue, Yanchao Zhang, Kevin S. Chan. 1572-1577 [doi]
- Joint Channel Sensing and Dynamic Resource Allocation for Multi-RIS Assisted Wireless Networks: A Bi-Level Optimization ApproachShawon Dey, Lijun Qian, Hao Xu 0002. 1578-1583 [doi]
- Towards Resilient Cybersecurity in IoBT: Aligning Defense in Depth with CIA-CAP ConstraintsEdison Pignaton de Freitas, Ricardo Queiroz de Araujo Fernandes, Paulo H. L. Rettore, Peter Sevenich. 1584-1589 [doi]
- A Hybrid DTN/NDN Middleware Gateway Controller for UAV ApplicationsRonald Langrin, Jeremy Blackstone. 1590-1595 [doi]
- Advances in Quantum Technologies for Defense: Opportunities and Security ChallengesJoanna Sliwa 0001, Konrad S. Wrona, Marco Piani, Marta I. García-Cid, Michal Krelina, Federico Grasselli, Armando N. Pinto, Nuno A. Silva, Joan Bas, Kadir Durak. 1596-1601 [doi]
- Computational Intelligence Used for Strategic Considerations on Disruptive and Emerging Technologies for Multidomain OperationsAndrzej Najgebauer, Ryszard Antkiewicz, Dawid Maslanik. 1614-1619 [doi]
- Next-Generation AI-Enabled Incident Responses for Military Cloud NetworksVasil Boshnakov, Konrad S. Wrona, Caglar Ege Baser. 1620-1626 [doi]